<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v22i3e17612</article-id>
      <article-id pub-id-type="pmid">32224492</article-id>
      <article-id pub-id-type="doi">10.2196/17612</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Viewpoint</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Viewpoint</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Connected Medical Technology and Cybersecurity Informed Consent: A New Paradigm</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Hendricks-Sturrup</surname>
            <given-names>Rachele</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Abujarad</surname>
            <given-names>Fuad</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Morse</surname>
            <given-names>Keith</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Bobe</surname>
            <given-names>Jason</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Tully</surname>
            <given-names>Jeffrey</given-names>
          </name>
          <degrees>MD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Anesthesiology and Pain Medicine</institution>
            <institution>UC Davis Medical Center</institution>
            <addr-line>4150 V Street</addr-line>
            <addr-line>Suite 1200 PSSB</addr-line>
            <addr-line>Sacramento, CA, 95817</addr-line>
            <country>United States</country>
            <phone>1 9167345031</phone>
            <email>jefftullymd@gmail.com</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3537-6716</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Coravos</surname>
            <given-names>Andrea</given-names>
          </name>
          <degrees>BS</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <xref rid="aff4" ref-type="aff">4</xref>
          <xref rid="aff5" ref-type="aff">5</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5379-3540</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Doerr</surname>
            <given-names>Megan</given-names>
          </name>
          <degrees>MS, BS</degrees>
          <xref rid="aff6" ref-type="aff">6</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2383-5978</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Dameff</surname>
            <given-names>Christian</given-names>
          </name>
          <degrees>MD, MS</degrees>
          <xref rid="aff7" ref-type="aff">7</xref>
          <xref rid="aff8" ref-type="aff">8</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9613-2603</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Anesthesiology and Pain Medicine</institution>
        <institution>UC Davis Medical Center</institution>
        <addr-line>Sacramento, CA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Elektra Labs</institution>
        <addr-line>Boston, MA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Digital Medicine Society</institution>
        <addr-line>Boston, MA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Harvard-MIT Center for Regulatory Science</institution>
        <addr-line>Boston, MA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff5">
        <label>5</label>
        <institution>Policy Innovation Lab of Tomorrow</institution>
        <institution>Penn State University</institution>
        <addr-line>State College, PA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff6">
        <label>6</label>
        <institution>Sage Bionetworks</institution>
        <addr-line>Seattle, WA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff7">
        <label>7</label>
        <institution>Department of Emergency Medicine</institution>
        <institution>University of California San Diego</institution>
        <addr-line>La Jolla, CA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff8">
        <label>8</label>
        <institution>Department of Computer Science and Engineering</institution>
        <addr-line>La Jolla, CA</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Jeffrey Tully <email>jefftullymd@gmail.com</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>3</month>
        <year>2020</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>30</day>
        <month>3</month>
        <year>2020</year>
      </pub-date>
      <volume>22</volume>
      <issue>3</issue>
      <elocation-id>e17612</elocation-id>
      <history>
        <date date-type="received">
          <day>26</day>
          <month>12</month>
          <year>2019</year>
        </date>
        <date date-type="rev-request">
          <day>22</day>
          <month>1</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>28</day>
          <month>1</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>28</day>
          <month>1</month>
          <year>2020</year>
        </date>
      </history>
      <copyright-statement>©Jeffrey Tully, Andrea Coravos, Megan Doerr, Christian Dameff. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 30.03.2020.</copyright-statement>
      <copyright-year>2020</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://www.jmir.org/2020/3/e17612/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Connected medical technology is increasingly prevalent and offers both a host of new therapeutic potentials and cybersecurity-related considerations. Current practice largely does not include discussions of cybersecurity issues when clinicians obtain informed consent.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This paper aims to raise awareness about cybersecurity considerations for connected medical technology as they relate to informed consent discussions between patients and clinicians.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>Clinicians, health care cybersecurity researchers, and informed consent experts propose the concept of a cybersecurity informed consent for connected medical technology.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>This viewpoint discusses concepts designed to facilitate further discussion on the need, development, and execution of cybersecurity informed consent.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Cybersecurity informed consent may be a necessary component of informed consent practices, as connected medical technology proliferates in the health care environment.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>connected medical technology</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>informed consent</kwd>
        <kwd>privacy</kwd>
        <kwd>patient autonomy</kwd>
        <kwd>digital health</kwd>
        <kwd>medical devices</kwd>
        <kwd>ethics</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <p>The practice of medicine is built on the foundation of clinician-patient engagement, and consent is a key pillar supporting this essential relationship [<xref ref-type="bibr" rid="ref1">1</xref>]. As medicine has shifted from a paternalistic, subordinating art to a collaborative effort of shared goal setting and decision making between parties, so too has the understanding of the ethics and acquisition of consent evolved.</p>
    <p>It is widely acknowledged that consent must be <italic>informed</italic>. This charge demands that clinicians empower patients in shared decision making through culturally competent, plain language dialogue. In doing so, a patient’s informed consent becomes the embodiment of the principle of autonomy as well as a symbol of their investment as the most important stakeholder in the therapeutic alliance.</p>
    <p>In the clinical realm, informed consent precedes care such as new treatment regimens or proposed surgical procedures. The discussion between healer and cared-for has come to possess a distinct anatomy. First, the patient is identified, which must involve not just a name and a record number, but the understanding of their personal story, beliefs, and objectives. Second the clinician discusses the nature of the intervention and presents a tailored list of benefits, risks, and alternatives to the stated plan. The persistent pace of progress in medicine ensures that these latter considerations are closely tied to new frontiers in clinical science.</p>
    <p>Connected medical technology occupies one such frontier. From wearable activity trackers and mobile software apps to implantable medical devices and telemedicine platforms, digital tools are assuming an ever-growing role in health care, with an amplified potential depending on the degree these technologies connect to other devices, computers, or networks [<xref ref-type="bibr" rid="ref2">2</xref>]. The acquisition of large amounts of increasingly granular data and the facilitation of longitudinal and remote clinical interactions are all enabled in part by the continuous connectivity of these devices.</p>
    <p>Though the benefits of such connectivity in diagnosing, monitoring, and treating diseases are widely touted, connectivity may introduce additional risks to patients. As connected medical devices are built with the same or similar hardware and software used in mobile technologies and computers, flaws in code, components, or networks can lead to exploitation and disruption of these devices [<xref ref-type="bibr" rid="ref3">3</xref>]. The analysis of and protection against such attacks constitute a central element of the practice of cybersecurity [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
    <p>Researchers have demonstrated cybersecurity vulnerabilities in medical devices including automated internal cardioverter defibrillators, bedside infusion pumps, and implantable insulin delivery systems [<xref ref-type="bibr" rid="ref5">5</xref>]. Such flaws, if abused, could lead to a number of consequences ranging from exposure of personal and private health information to the malfunction of devices resulting in physical harm. Though there are not yet any reports of patients directly affected by the exploitation of a medical device’s cybersecurity vulnerability, the potential for such events has led to concerted efforts from manufacturers, regulators, and security professionals to advocate for and improve medical cybersecurity practices.</p>
    <p>Clinicians are expected to acquire knowledge on various medications, procedures, and therapies to understand and articulate the risks, benefits, and alternatives of such interventions during the informed consent process. As an increasing number of interventions rely solely or in part on connected technologies, the same attendant framework should exist for these tools. We propose that the unique characteristics of connected technologies warrant development of a “cybersecurity-informed consent” to address the cybersecurity implications of planned interventions. Several challenges exist in creating a model for such a consent.</p>
    <p>First, the epidemiology of health care cybersecurity is an emerging science. The benefits of connected medical devices have been quickly embraced; however, cybersecurity itself has been a blind spot for many practicing connected medicine. This disinclination may arise from a lack of knowledge or understanding of cybersecurity vulnerabilities, or may relate to the lack of identified real-world incidents of cybersecurity vulnerabilities interfering with clinical care. However, the US Food and Drug Administration, in its authority as primary regulator of medical devices, has issued multiple safety communications and recalls consistent with the maxim that “absence of evidence is not evidence of absence” [<xref ref-type="bibr" rid="ref6">6</xref>-<xref ref-type="bibr" rid="ref8">8</xref>].</p>
    <p>A second challenge is the risk-benefit ratio of addressing cybersecurity vulnerabilities. One of the most basic remedies for cybersecurity vulnerabilities is the practice of “patching”—updating a device’s software with new and improved code to address flaws. This is usually a relatively straightforward exercise, occurring almost continuously in many enterprises that use commercial operating systems. However, patching has added complexity with medical devices, because a small but nonnegligible risk exists when software updates intended to address cybersecurity dangers lead to unintended corruption of the device’s normal functioning. Furthermore, while the risk of exploitation of a vulnerability may be unknown, the failure rate of a patch may be well-documented [<xref ref-type="bibr" rid="ref9">9</xref>]. This risk-to-reward imbalance may result in some clinicians advising patients to forego patching of vulnerabilities entirely.</p>
    <p>Third, in contrast to much of medicine, the cybersecurity risk of connected medical interventions may not be fixed—or even consistent—across the life span of a device or app used in an intervention. The same properties in software that allow for updates in functionality and features ensure that the potential for new vulnerabilities exist alongside the promise of additional benefits. A clinician accustomed to largely stable probabilities of, for example, infection with transfusion of blood products may confront a situation with a connected device where current cybersecurity risk is undefined and future danger remains amorphous.</p>
    <p>Given the increasing ubiquity of networked functionality in digital devices ranging from the smallest wearables to the largest surgical robots, the simple option of using nonconnected technologies may not be a choice for clinicians or patients concerned about cybersecurity risks. Those looking to benefit from the most sophisticated pacemakers or insulin pumps may face the realization that alternatives to these devices might not exist.</p>
    <p>The traditional model of clinician-facilitated informed consent relies on the previously discussed core knowledge that many clinicians currently lack. There are increasing efforts to raise awareness of the potential consequences of cybersecurity vulnerabilities on patient safety; however, there is still no widespread curricula for allied health professional students or concerted continuing medical education for practicing providers. Without at least a basic, conceptual understanding of both the risks and remedies, it is both unfair and impractical to expect the clinician to impart the same information for patient consideration.</p>
    <p>Yet patients surely deserve the chance to consider cybersecurity elements within the context of their treatment plans or procedures, and cybersecurity-informed consent creates the environment for the patient to be an active participant in this process. The challenge then becomes incorporating cybersecurity-informed consent into a complex workflow process that already demands significant time and effort, which is largely uncompensated. Several potential models may warrant further evaluation.</p>
    <p>The highest yield method for cyber-informed consent adoption may be educational interventions for the providers whom are most likely to interface with connected medical technologies, including electrophysiologists, endocrinologists, and informaticians, in the form of digital modules, tool kits, or simulations.</p>
    <p>An argument may be made that, as cybersecurity concepts are not immediately germane to the practice of medicine, there exists no explicit demand for clinician involvement in the consent process. This framework implies that the obligation to cyber-consent belongs to other stakeholders such as the manufacturers of the technology. In such a system, a patient might interface with a particular vendor to be educated about the cybersecurity implications of a device in a similar way that proceduralists rely on device representatives to provide technical guidance during the implantation process.</p>
    <p>Informed consent methodology in clinical research has recently evolved in a number of interesting ways that may serve as a good model for cyber-informed consent.</p>
    <p>The opportunity to obtain consent remotely through online portals, along with the ability to present a wide variety of information customized to individual capabilities and cultures, has increased inclusivity and interactivity. It has also generated the idea of “independently navigable” consents that patients complete autonomously without requiring direct interaction with the research team [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>].</p>
    <p>It is clear that more research is needed to determine which cybersecurity-informed consent approach best addresses the unique hurdles of digital medicine. Having a clear, concise informed consent process can be challenging in light of clinician inexperience, as well as uncertainty regarding the true level of risk posed to patients by connected technologies (and the potential for these risks to fluctuate over time). As connected medical interventions offer personalization of care and expanded accessibility, so too will an effective cyber-informed consent empower clinicians and patients in goal-affirming health care decision making.</p>
  </body>
  <back>
    <app-group/>
    <ack>
      <p>The authors wish to thank Adam Conner-Simons for assistance with copyediting this manuscript.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Grady</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Enduring and emerging challenges of informed consent</article-title>
          <source>N Engl J Med</source>
          <year>2015</year>
          <month>02</month>
          <day>26</day>
          <volume>372</volume>
          <issue>9</issue>
          <fpage>855</fpage>
          <lpage>862</lpage>
          <pub-id pub-id-type="doi">10.1056/nejmra1411250</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Iqbal</surname>
              <given-names>MH</given-names>
            </name>
            <name name-style="western">
              <surname>Aydin</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Brunckhorst</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Dasgupta</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>A review of wearable technology in medicine</article-title>
          <source>J R Soc Med</source>
          <year>2016</year>
          <month>10</month>
          <day>11</day>
          <volume>109</volume>
          <issue>10</issue>
          <fpage>372</fpage>
          <lpage>380</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/27729595"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/0141076816663560</pub-id>
          <pub-id pub-id-type="medline">27729595</pub-id>
          <pub-id pub-id-type="pii">109/10/372</pub-id>
          <pub-id pub-id-type="pmcid">PMC5066535</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kruse</surname>
              <given-names>CS</given-names>
            </name>
            <name name-style="western">
              <surname>Frederick</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Jacobson</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Monticone</surname>
              <given-names>DK</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in healthcare: a systematic review of modern threats and trends</article-title>
          <source>Technol Health Care</source>
          <year>2017</year>
          <volume>25</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>10</lpage>
          <pub-id pub-id-type="doi">10.3233/THC-161263</pub-id>
          <pub-id pub-id-type="medline">27689562</pub-id>
          <pub-id pub-id-type="pii">THC1263</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Perakslis</surname>
              <given-names>ED</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity in health care</article-title>
          <source>N Engl J Med</source>
          <year>2014</year>
          <month>07</month>
          <day>31</day>
          <volume>371</volume>
          <issue>5</issue>
          <fpage>395</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1056/NEJMp1404358</pub-id>
          <pub-id pub-id-type="medline">25075831</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Woods</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Coravos</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Corman</surname>
              <given-names>JD</given-names>
            </name>
          </person-group>
          <article-title>The case for a hippocratic oath for connected medical devices: viewpoint</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>03</month>
          <day>19</day>
          <volume>21</volume>
          <issue>3</issue>
          <fpage>e12568</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/3/e12568/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/12568</pub-id>
          <pub-id pub-id-type="medline">30888323</pub-id>
          <pub-id pub-id-type="pii">v21i3e12568</pub-id>
          <pub-id pub-id-type="pmcid">PMC6444210</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Klonoff</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Han</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The first recall of a diabetes device because of cybersecurity risks</article-title>
          <source>J Diabetes Sci Technol</source>
          <year>2019</year>
          <month>09</month>
          <day>17</day>
          <volume>13</volume>
          <issue>5</issue>
          <fpage>817</fpage>
          <lpage>820</lpage>
          <pub-id pub-id-type="doi">10.1177/1932296819865655</pub-id>
          <pub-id pub-id-type="medline">31313589</pub-id>
          <pub-id pub-id-type="pmcid">PMC6955451</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kramer</surname>
              <given-names>DB</given-names>
            </name>
            <name name-style="western">
              <surname>Fu</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Cybersecurity concerns and medical devices: lessons from a pacemaker advisory</article-title>
          <source>JAMA</source>
          <year>2017</year>
          <month>12</month>
          <day>05</day>
          <volume>318</volume>
          <issue>21</issue>
          <fpage>2077</fpage>
          <lpage>2078</lpage>
          <pub-id pub-id-type="doi">10.1001/jama.2017.15692</pub-id>
          <pub-id pub-id-type="medline">29049709</pub-id>
          <pub-id pub-id-type="pii">2659246</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ronquillo</surname>
              <given-names>JG</given-names>
            </name>
            <name name-style="western">
              <surname>Zuckerman</surname>
              <given-names>DM</given-names>
            </name>
          </person-group>
          <article-title>Software-related recalls of health information technology and other medical devices: implications for FDA regulation of digital health</article-title>
          <source>Milbank Q</source>
          <year>2017</year>
          <month>09</month>
          <day>12</day>
          <volume>95</volume>
          <issue>3</issue>
          <fpage>535</fpage>
          <lpage>553</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28895231"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/1468-0009.12278</pub-id>
          <pub-id pub-id-type="medline">28895231</pub-id>
          <pub-id pub-id-type="pmcid">PMC5594275</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Baranchuk</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Refaat</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Patton</surname>
              <given-names>KK</given-names>
            </name>
            <name name-style="western">
              <surname>Chung</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Krishnan</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Kutyifa</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Upadhyay</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Fisher</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Lakkireddy</surname>
              <given-names>DR</given-names>
            </name>
            <collab>American College of Cardiology’s Electrophysiology Section Leadership</collab>
          </person-group>
          <article-title>Cybersecurity for cardiac implantable electronic devices: what should you know?</article-title>
          <source>J Am Coll Cardiol</source>
          <year>2018</year>
          <month>03</month>
          <day>20</day>
          <volume>71</volume>
          <issue>11</issue>
          <fpage>1284</fpage>
          <lpage>1288</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S0735-1097(18)30200-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jacc.2018.01.023</pub-id>
          <pub-id pub-id-type="medline">29475627</pub-id>
          <pub-id pub-id-type="pii">S0735-1097(18)30200-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kraft</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Doerr</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Engaging populations underrepresented in research through novel approaches to consent</article-title>
          <source>Am J Med Genet C Semin Med Genet</source>
          <year>2018</year>
          <month>03</month>
          <day>07</day>
          <volume>178</volume>
          <issue>1</issue>
          <fpage>75</fpage>
          <lpage>80</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29512940"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/ajmg.c.31600</pub-id>
          <pub-id pub-id-type="medline">29512940</pub-id>
          <pub-id pub-id-type="pmcid">PMC5910200</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moore</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tassé</surname>
              <given-names>A-M</given-names>
            </name>
            <name name-style="western">
              <surname>Thorogood</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Winship</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Zawati</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Doerr</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Consent Processes for Mobile App Mediated Research: Systematic Review</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2017</year>
          <month>08</month>
          <day>30</day>
          <volume>5</volume>
          <issue>8</issue>
          <fpage>e126</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2017/8/e126/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.7014</pub-id>
          <pub-id pub-id-type="medline">28855147</pub-id>
          <pub-id pub-id-type="pii">v5i8e126</pub-id>
          <pub-id pub-id-type="pmcid">PMC5597795</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
