<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v22i6e16887</article-id>
      <article-id pub-id-type="pmid">32348278</article-id>
      <article-id pub-id-type="doi">10.2196/16887</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Using Blockchain Technology to Mitigate Challenges in Service Access for the Homeless and Data Exchange Between Providers: Qualitative Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Zhang</surname>
            <given-names>Wenhui</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Kuo</surname>
            <given-names>Tsung-Ting</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Khurshid</surname>
            <given-names>Anjum</given-names>
          </name>
          <degrees>MBBS, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Dell Medical School</institution>
            <institution>The University of Texas at Austin</institution>
            <addr-line>1701 Trinity Street</addr-line>
            <addr-line>Austin, TX, 78712</addr-line>
            <country>United States</country>
            <phone>1 5124955225</phone>
            <email>anjum.khurshid@austin.utexas.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-8946-0622</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Rajeswaren</surname>
            <given-names>Vivian</given-names>
          </name>
          <degrees>BSc</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7654-0984</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Andrews</surname>
            <given-names>Steven</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-4797-4032</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Dell Medical School</institution>
        <institution>The University of Texas at Austin</institution>
        <addr-line>Austin, TX</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>University of Colorado at Denver</institution>
        <institution>Anshutz Medical Campus</institution>
        <addr-line>Aurora, CO</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Anjum Khurshid <email>anjum.khurshid@austin.utexas.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>6</month>
        <year>2020</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>4</day>
        <month>6</month>
        <year>2020</year>
      </pub-date>
      <volume>22</volume>
      <issue>6</issue>
      <elocation-id>e16887</elocation-id>
      <history>
        <date date-type="received">
          <day>3</day>
          <month>11</month>
          <year>2019</year>
        </date>
        <date date-type="rev-request">
          <day>23</day>
          <month>12</month>
          <year>2019</year>
        </date>
        <date date-type="rev-recd">
          <day>25</day>
          <month>2</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>26</day>
          <month>2</month>
          <year>2020</year>
        </date>
      </history>
      <copyright-statement>©Anjum Khurshid, Vivian Rajeswaren, Steven Andrews. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 04.06.2020.</copyright-statement>
      <copyright-year>2020</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2020/6/e16887" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>In the homeless population, barriers to housing and supportive services include a lack of control or access to data. Disparate data formats and storage across multiple organizations hinder up-to-date intersystem access to records and a unified view of an individual’s health and documentation history. The utility of blockchain to solve interoperability in health care is supported in recent literature, but the technology has yet to be tested in real-life conditions encompassing the complex regulatory standards in the health sector.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This study aimed to test the feasibility and performance of a blockchain system in a homeless community to securely store and share data across a system of providers in the health care ecosystem.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We performed a series of platform demonstrations and open-ended qualitative feedback interviews to determine the key needs and barriers to user and stakeholder adoption. Account creation and data transactions promoting organizational efficiency and improved health outcomes in this population were tested with homeless users and service providers.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Persons experiencing homelessness and care organizations could successfully create accounts, grant and revoke data sharing permissions, and transmit documents across a distributed network of providers. However, there were issues regarding the security of shared data, user experience and adoption, and organizational preparedness for service providers as end users. We tested a set of assumptions related to these problems within the project time frame and contractual obligations with an existing blockchain-based platform.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Blockchain technology provides decentralized data sharing, validation, immutability, traceability, and integration. These core features enable a secure system for the management and distribution of sensitive information. This study presents a concrete evaluation of the effectiveness of blockchain through an existing platform while revealing limitations from the perspectives of user adoption, cost-effectiveness, scalability, and regulatory frameworks.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>blockchain</kwd>
        <kwd>distributed ledger technology</kwd>
        <kwd>health care</kwd>
        <kwd>data sharing</kwd>
        <kwd>homeless</kwd>
        <kwd>data autonomy</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>According to Austin’s Ending Community Homelessness Coalition (ECHO), more than 7100 people in Austin experienced homelessness and needed housing and other supportive services in 2016 [<xref ref-type="bibr" rid="ref1">1</xref>]. One of the many barriers to housing for persons experiencing homelessness (PEH) is the lack of access to their own documentation and the time and money required to replace lost or stolen documents. Client data are often distributed between service providers, causing a deterioration in health and delays in service when accessing data from multiple sources. Existing database systems such as Homeless Management Information System (HMIS) to manage documentation for the PEH lack interoperability for different document formats and organizations outside the system, do not facilitate data ownership for clients, and cannot guarantee data privacy and security.</p>
        <p>The Mayor’s Challenge Competition, sponsored by Bloomberg Philanthropies, is designed to facilitate innovative and scalable solutions for city leaders to tackle urgent local challenges. Austin, Texas, was one of the 35 cities selected to prototype and test their ideas over 6 months with a grant support of US $100,000. Through a partnership between Dell Medical School, the City of Austin government, Austin Travis County Emergency Medical Services, and community organizations, a pilot study was conducted to test the first use of blockchain technology to validate identities and improve access to services for the PEH in the country.</p>
      </sec>
      <sec>
        <title>Objectives</title>
        <p>To solve these problems of <italic>transaction identity</italic>, we previously proposed the use of distributed ledger technology (DLT), or blockchain technology, to provide a validated, immutable identity and record of service transactions [<xref ref-type="bibr" rid="ref2">2</xref>]. The literature shows promise using blockchain for data control in electronic health records, public health surveillance, disease management, genomic and biomedical data, and clinical trials [<xref ref-type="bibr" rid="ref3">3</xref>-<xref ref-type="bibr" rid="ref9">9</xref>]. Blockchain is currently used in rural Indonesia, Syrian refugee camps, and the slums of Kenya for similar identity management applications. Key life events such as birth registration, immunizations, health provider visits, and agricultural harvests are securely recorded and maintained on a blockchain, creating an immutable, accessible, and portable identity for displaced and marginalized people. Following this model, we explored the use of a true <italic>economic passport</italic> for the homeless, working toward the goal of ending homelessness. This technology was chosen as a solution over other methods of storing and sharing information such as a digital wallet or a relational database because its features met the requirements of our use case. We have continued this study, and here, we provide results from our testing of the deployment of this approach.</p>
        <p>Blockchain is a technology for shared databases used by multiple writers in which each organization’s entries must be verified and cannot be modified by an outside party. When transactions from one entity are needed by another to provide a service or verify a document, storing transactions in a single shared database promotes expedient exchange of information. A regular shared database can reliably manage the permissioning of multiple authorized users to view data. However, a relational database system in which various entities update and write information can result in unrecoverable errors. Maintenance of a health and social service information system involves backup storage services, recovery mechanisms, and updating information [<xref ref-type="bibr" rid="ref7">7</xref>]. In the event of a database server failure, the entire system is affected, and information can be lost if it has not been backed up and stored. Ownership of the master file by a centralized user also accords control to a single party; thus, there is no inherent safeguard against data tampering, and the integrity of data cannot be guaranteed [<xref ref-type="bibr" rid="ref10">10</xref>].</p>
        <p>Blockchains organize data so that secure transactions are approved and recorded through consensus from entities on the chain [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>], providing greater error checking and transactional validity than relational shared databases [<xref ref-type="bibr" rid="ref10">10</xref>-<xref ref-type="bibr" rid="ref12">12</xref>]. A blockchain distributes data across the network, with data copied on each node of the chain [<xref ref-type="bibr" rid="ref13">13</xref>]. Each node installs the genesis block or the first block in the chain [<xref ref-type="bibr" rid="ref10">10</xref>]. A group of validated transactions is added to a new block with the file attachment, sender, receiver, timestamp, and cryptographic hash of the previous block [<xref ref-type="bibr" rid="ref14">14</xref>]. A hash is a one-way encryption function, which is used to generate a public and private key for each user [<xref ref-type="bibr" rid="ref15">15</xref>]. Information sent over the blockchain is secured by a user’s private key and cannot be viewed or modified without the key [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref>]. Data are encrypted and unintelligible to protect private information stored on the blockchain or in the event of a security breach [<xref ref-type="bibr" rid="ref14">14</xref>]. An individual block’s hash depends on the hash of the previous block, locking transactions together [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref14">14</xref>]. Modifying data in one block would alter all subsequent blocks, making the blockchain an immutable and authoritative record of transactions [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref12">12</xref>-<xref ref-type="bibr" rid="ref14">14</xref>]. Blockchain also uses a consensus validation mechanism replacing a trusted third-party intermediary or a manual offline reconciliation process with peer-to-peer protocols, allowing organizations to agree upon submitted entries without a singular point of failure or control [<xref ref-type="bibr" rid="ref10">10</xref>-<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref16">16</xref>]. A network of users collectively adheres to previously agreed upon rules automatically implemented to verify the authenticity of transactions and ordering of records added to the chain [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref16">16</xref>].</p>
        <p>A <italic>public</italic> blockchain is completely decentralized, and transactions depend on consensus from a majority of nodes. In a <italic>private</italic> blockchain, users are granted access by permission from the owner of the blockchain [<xref ref-type="bibr" rid="ref10">10</xref>]. For sensitive data such as personal identity records, private blockchains limit transaction visibility to authorized users and promote scalability because of greater user and transactional control [<xref ref-type="bibr" rid="ref12">12</xref>]. A private blockchain is only partially decentralized because nodes are limited to trusted users with varying degrees of access and sharing permissions. If a conflict or security breach arises, the system can be recovered from any user and timestamp [<xref ref-type="bibr" rid="ref10">10</xref>]. The only security issue is that a majority of nodes could collude to rewrite the chain, as there is a partially centralized authority controlling the nodes in the chain. However, in a permissioned system, it is unlikely that users aim to violate the immutability of the blockchain, as they are trusted entities using the blockchain for organizational or personal benefit [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref16">16</xref>-<xref ref-type="bibr" rid="ref18">18</xref>].</p>
        <p>Lack of interoperability between service providers arises from nonuniform data formats and storage methods [<xref ref-type="bibr" rid="ref13">13</xref>]. Blockchain creates an accessible and authoritative ledger of diverse document types, acting as a method for storing and gathering information from multiple independent systems [<xref ref-type="bibr" rid="ref6">6</xref>]. Off-blockchain data storage can be integrated for large files or extensive data storage in a variety of formats and is scalable to include a larger health and social service ecosystem. The blockchain can also be used to facilitate communication for application programming interfaces (APIs), which can restructure, aggregate, and merge data from various sources in a standardized format. A blockchain-based API model allows for decentralized and authoritative data exchange between systems, user identification, a validated transaction history, and proof of transaction legitimacy [<xref ref-type="bibr" rid="ref19">19</xref>].</p>
        <p>In this study, we describe the results of a pilot test using a blockchain solution to mitigate the current challenges in service access for the homeless and data exchange between providers. The potential for blockchain in various health care settings has been examined in several studies [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref6">6</xref>-<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. However, these studies are theoretical in nature, and to our knowledge, no published studies have examined the feasibility, effectiveness, or performance of blockchain in a real-life public setting. In this study, we used a private, permissioned blockchain system for secure storage and transmission of documents with planned API integration for intersystem data access and transmission from legacy databases. This model additionally permits individuals to access and control their own data by uploading official documents and sharing self- or provider-uploaded records with select organizations. Our approach in this study aimed to increase agency, motivation, and control while reducing service barriers for the homeless and supplying more complete and accurate information for service providers.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Generating Testable Assumptions</title>
        <p>Austin, Texas, was 1 of the 35 cities selected by the 2018 Mayor’s Challenge Competition, sponsored by Bloomberg Philanthropies. The competition was designed to facilitate innovative and scalable solutions for city leaders to tackle urgent local challenges. Each Champion City selected in the Mayor’s Challenge Competition was to prototype and test their ideas over 6 months. Through a partnership between Dell Medical School, the City of Austin’s Office of Technology Innovation, Austin Travis County Emergency Medical Services, and community organizations, a pilot study was conducted to test the use of blockchain technology to validate identities for the homeless.</p>
        <p>Participation in the Mayor’s Challenge Competition required a series of steps to design and implement testing. First, we identified assumptions underlying the idea, which will be required for stakeholder participation. We found that the following set of assumptions must be tested and shown to be valid for the successful implementation of our solution (see <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>): (1) our prototype platform would be appropriate for PEH in Austin, (2) PEH will be able to understand its features and will consent to participate in such a system, (3) providers will be able to access and trust the information on the platform, (4) blockchain technology is essential to manage identity for PEH, (5) privacy and confidentiality of data will be protected, (6) service delivery will be facilitated, and (7) interorganizational efficiency will increase by sharing data in a standardized manner with shared governance on the platform. After determining how to test and evaluate these assumptions, we developed and modified prototypes and tests based on real-life findings, user feedback, and an evolving understanding of our idea. For prototype testing, we used an existing blockchain technology platform that had been implemented outside the United States to manage the identities of refugees.</p>
        <p>Second, we identified markers for what constitutes an appropriate test of a platform based on blockchain technology (see <xref ref-type="table" rid="table1">Table 1</xref>). To be effective, the platform needs to be able to allow individuals to enter the system by creating an account. They need to be able to upload documents and then share those documents with others, with control over which documents get shared with which other participants. Service providers need to be able to additionally conduct transactions, especially transactions of identity validation, and to share information with each other. All these actions and pieces of information need to be recorded and available, to be differentially accessible based on user-controlled permissions, and to remain securely protected and immutable. The system overall needs to be easily understood by users.</p>
        <p>Before testing our assumptions, initial engagement with the homeless population was performed to determine their needs and concerns. Two-hour meetings were held biweekly over a period of 12 months. Attendees included 20 homeless individuals in the City of Austin and 1 to 2 staff members from the City of Austin Office of Innovation who regularly interacted with the homeless population. The homeless participants were rotated monthly to include a larger subset of the population, and each participant was compensated for their time at a rate of US $20 per hour. Meetings consisted of open-ended questions regarding difficulties those with lived experience of homelessness face in daily life, interacting with service providers, maintaining documents, and filling out applications.</p>
        <p>On the basis of these discussions and the answers we received to the questions in <xref ref-type="table" rid="table2">Table 2</xref>, we developed a list of documents that are most useful for testing our solution. <xref rid="figure1" ref-type="fig">Figure 1</xref> lists types of documents and types of organizations and gives a sense of how difficult it is to reobtain a particular document. The figure provides insight into what a person experiencing homelessness needs to be able to manage to prove their identity to receive services, especially those that provide health care and potential housing.</p>
        <p>As can be seen, the documents required for identity verification varied across types of organizations. Every organization, though, needed an official photo ID; yet, about one-third of clients lacked such a basic identity document when first entering the system. Replacing a photo ID is a time-intensive effort. Approximately half of the presenting users lacked insurance cards, which were required by many organizations. Looking at the entirety of the figure, though, it becomes clear that managing identity involves managing a significant number of identity documents across a wide audience of service organizations.</p>
        <p>As some of the assumptions had overlapping aspects, we describe our methodology in testing all 7 assumptions in the subgroups below.</p>
        <boxed-text id="box1" position="float">
          <title>Testable assumptions for solution implementation.</title>
          <list list-type="order">
            <list-item>
              <p>Given that our blockchain platform is modified from a pre-existing platform for refugees, the use case of refugees must be nominally equivalent to the use case of people experiencing homelessness</p>
            </list-item>
            <list-item>
              <p>To gain user participation, people experiencing homelessness must understand the functionality and features of the platform, and consent to participate.</p>
            </list-item>
            <list-item>
              <p>Stakeholder participation requires providers to access, accept, and trust information shared through the blockchain network.</p>
            </list-item>
            <list-item>
              <p>Blockchain is necessary to meet our goals.</p>
            </list-item>
            <list-item>
              <p>Privacy and confidentiality of personal data needs to be protected.</p>
            </list-item>
            <list-item>
              <p>Enabling access to information facilitates service transactions.</p>
            </list-item>
            <list-item>
              <p>The technology enables a shared data standard and governance that increases inter-organizational efficiency.</p>
            </list-item>
          </list>
        </boxed-text>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Blockchain components needed for a successful prototype.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="620"/>
            <col width="380"/>
            <thead>
              <tr valign="top">
                <td>Test</td>
                <td>Elements needed</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>(1) Allow individuals to create accounts and upload documents</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Profiles</p>
                    </list-item>
                    <list-item>
                      <p>Ability to connect profiles</p>
                    </list-item>
                    <list-item>
                      <p>Individual document repository</p>
                    </list-item>
                    <list-item>
                      <p>Ability to grant repository and asset level access</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>(2) Allow individuals to share documents with differentiated permissions</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Ability to find other profiles in the system</p>
                    </list-item>
                    <list-item>
                      <p>Ability to send a document</p>
                    </list-item>
                    <list-item>
                      <p>Ability to share a document</p>
                    </list-item>
                    <list-item>
                      <p>Profile user-controlled permission</p>
                    </list-item>
                    <list-item>
                      <p>Data level permission</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>(3) Allow service providers to share documents and conduct transactions, including verification of service use</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Ability to see a validated document</p>
                    </list-item>
                    <list-item>
                      <p>Ability to share a document</p>
                    </list-item>
                    <list-item>
                      <p>Ability to see permissions by individuals</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>(4) Allow service providers to share with each other</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Ability to find other verifiable users/profiles</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>(5) Capture all transactions/records</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Ledger with varied permissions</p>
                    </list-item>
                    <list-item>
                      <p>All actions write to a ledger</p>
                    </list-item>
                    <list-item>
                      <p>Inability to delete from ledger</p>
                    </list-item>
                  </list>
                </td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Research questions.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="620"/>
            <col width="380"/>
            <thead>
              <tr valign="top">
                <td>Particpants</td>
                <td>Questions</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>For persons experiencing homelessness:</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Which things on your to-do list frustrate you the most?</p>
                    </list-item>
                    <list-item>
                      <p>Which records or documents are you in most need of accessing?</p>
                    </list-item>
                    <list-item>
                      <p>If you could reduce a barrier to a daily goal, what would it be?</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>For community health paramedics, when you help the homeless:</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Where do you see the most missed opportunities?</p>
                    </list-item>
                    <list-item>
                      <p>What common miscommunications could be prevented if you had direct information or document access?</p>
                    </list-item>
                    <list-item>
                      <p>What information is lacking that would help you the most?</p>
                    </list-item>
                  </list>
                </td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Documents needed across service providers and their homeless clients. CUCC: Community Care Clinics; DACC: Downtown Austin Community Court ; DPS: Department of Public Safety; ECHO: Ending Community Homelessness Coalition; EMS: Emergency Medical Services; IC: Integral Care; SNAP: Supplemental Nutrition Assistance Program; SSA: Social Security Administration; VA: Veterans’ Administration.</p>
          </caption>
          <graphic xlink:href="jmir_v22i6e16887_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Testing Assumptions 1 and 5: Usability and Security of the Platform</title>
        <p>Assumptions 1 and 5 regarding the viability of an existing private, permissioned blockchain platform for our use case and the security and privacy of data were tested in 2 sessions on June 14, 2018, and July 13, 2018. In the first session, our testing plan was for the homeless clients to set up an account, upload a document onto the blockchain, deny a request to connect from an organization, accept a request to connect from an organization, and participate in a 3-party transaction between the client and 2 service providers. All tests were performed with platform provider staff, our team members, and 2 homeless individuals. Members of our team created mock provider accounts before testing with our homeless participants. For our second testing session, we modified the user interface so that an account profile contained the user’s picture and name with categories for general profile information, identity documents, medical documents, and dependents or emergency contacts.</p>
      </sec>
      <sec>
        <title>Testing Assumption 2: User Participation and Understanding of the Technology</title>
        <p>We tested our assumption regarding user participation (assumption 2) at 2 pop-up resource clinics, where the homeless could access multiple health, social, and other service interventions. Our group of 8 city officials and 5 individuals from our team engaged a total of 34 homeless residents. Of the 34 homeless residents, 15 agreed to participate, 11 indicated interest when more information and a working platform were available, and 8 either declined to participate or did not finish the discussion.</p>
        <p>Attendees were offered the opportunity to discuss and provide feedback on a technology designed to securely store and share their documents. In our discussions with homeless participants, we used 3 different prototypes of our platform with increasing levels of fidelity to a real-life DLT platform. At the lowest level, to explain the concept of DLT in a nontechnical manner, we created a prototype of the platform using several journals with a lock and key (<xref rid="figure2" ref-type="fig">Figure 2</xref>). Each journal represented the record of a user or a service provider. In a DLT, when a document (or other record) is written in the journal or uploaded onto the blockchain, none of the other users in the individual’s network can see its contents until permission is granted, even if they are aware that there is an existing entry in the ledger (or block on the chain). In our testing analogy, granting permission is represented by the key that opens the lock to a specific physical journal. We also demonstrated distributed data storage by tearing up a piece of paper from a user’s journal and spreading the pieces into buckets representing different institutions. In this scenario, when a document was accessed with permission, the pieces were reassembled.</p>
        <p>Increasing the fidelity of the prototypes, we next showed screenshots of the platform prototype with sample transactions, and then, at the highest fidelity level, a digital prototype on a mobile phone with uploaded data was presented. These 2 prototypes were used to further explain the technology and platform concepts. The static screenshot-based prototype showed prospective categories (eg, identity, residency, medical profile, employment history, education, and children/preferred contacts) for the different types of documents. We also showed screenshots of a request from a provider for permission to see a user’s data, accepting and giving the provider permission to view specific documents, and a transaction history showing that a document was shared with a provider.</p>
        <p>At this stage in our project, the high-fidelity prototype platform was then used to demonstrate uploading and viewing a picture of a driver’s license via the platform. The prototype platform for refugees had not been modified at all for our use case. Thus, our demonstration was performed in a sandbox or in a closed, nonlive testing environment to safely experiment with Web or software projects. We additionally decided to conduct further tests with sample documents until the technology was fully configured and free of errors.</p>
        <p>Understanding and acceptance of metrics were measured with participation consent forms and qualitative feedback through open-ended questions.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Distributed ledger technology prototype.</p>
          </caption>
          <graphic xlink:href="jmir_v22i6e16887_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Testing Assumptions 3, 6, and 7: Stakeholder Participation and Organizational/Data Standards</title>
        <p>We tested assumptions 3, 6, and 7 regarding stakeholder participation and organizational and data standards through interview questions with representatives of the Downtown Austin Community Court, Central Health, and ECHO who interact with and provide services to PEH regularly (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>). The participants were initially explained the technology platform, its relevant features, and our assumptions to test its practicality in addressing PEH identity management for health care and social services. Each representative was provided an opportunity to respond to the semistructured, facilitated discussion.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Test of Assumptions</title>
        <p>As was clear in the Methods section, multiple assumptions were tested in each of the approaches. As such, we note which assumption(s) was being tested, where appropriate. In particular, note that assumption 6 about data availability facilitating service transactions permeates most aspects of the testing process. The assumptions are listed in <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>, and more detailed testing results are listed in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>.</p>
      </sec>
      <sec>
        <title>Assumptions 1 and 5</title>
        <p>In testing assumptions 1 and 5, both of our homeless participants were able to set up a user account, accept a connection request, deny and accept a provider connection request, and exchange transactions to and from providers. Specific observations, difficulties encountered, and their relevance to our project and testing assumptions are displayed in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendices 2</xref> and <xref ref-type="supplementary-material" rid="app3">3</xref>. During the second session, with modifications to the test, some of the onboarding workflow resulting from entering extensive personal information created a more streamlined user experience in terms of finding and categorizing types of documents. However, testers still experienced several challenges (<xref ref-type="supplementary-material" rid="app2">Multimedia Appendices 2</xref> and <xref ref-type="supplementary-material" rid="app3">3</xref>) in addition to those previously documented in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref> regarding platform features and functionality. In general, the problems that users experience tend to fall into 5 buckets: trusting self-uploaded documents, understanding blockchain concepts, platform performance issues, confusion about the workflow, and privacy concerns. We return to this in the discussion below.</p>
        <p>Overall, users on the platform were able to accomplish the tasks expected of them even if guidance was required, but there were definite issues that need to be solved. Trying to use an existing platform developed to assist refugees without modification did not translate to the use case of working with those experiencing homelessness. Furthermore, privacy and security did indeed turn out to be of paramount importance to end users.</p>
      </sec>
      <sec>
        <title>Assumptions 2 and 6</title>
        <p>The results of our tests showed that the homeless can understand the platform and its potential benefits, and a majority of individuals consented to participate immediately or at a later date. Feedback from our PEH test participants included the need for a wider variety of documents that can be validated and authenticated on the platform, leading us to consider possibilities for future expansion, such as involving state or federal institutions. We also planned to create benchmark documents facilitating services such as housing, disability benefits, Supplemental Nutrition Assistance Program (SNAP), medical, court documents, and insurance. Each benchmark document would consist of validation from multiple providers that the documents necessary for a service have been obtained and authenticated, increasing efficiency for service providers and improving access to services for their homeless clients.</p>
      </sec>
      <sec>
        <title>Assumptions 3 and 6</title>
        <p>The results showed that providers will accept data shared through the blockchain platform, but permissible document fidelity varies across organizations. Specifically, the requirements of what would be considered a certified document varied (see <xref ref-type="table" rid="table3">Table 3</xref>). Transactions requiring hard copies included employment documents, bank transactions, social security, and vital records, which would be difficult to include without altering the standards for data. The Medical Access Program Card (a local health insurance card), SNAP application documents, and housing applications permit document copies and can easily facilitate transactions without adjusting data standards.</p>
        <p>The need for interorganizational records or documents from clients also varied. Many providers kept internal digital copies of client records and provided services to the homeless without proof of identity because of flexible policies for this population. Identification documents are unnecessary for social security, disability benefits, transitional housing, or rehabilitation services, but the lack of identification documents can delay medical care at hospitals. These providers envisioned a role for a distributed ledger system when clients did not grant permission for document storage and for time-sensitive documents such as a current utility bill needed to prove residency. In these cases, system-level efficiency could be improved if provider employees knew what type of documents were available and if documents of interest could easily be located without looking through extraneous information.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Level of document certification</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="150"/>
            <col width="250"/>
            <col width="300"/>
            <col width="300"/>
            <thead>
              <tr valign="top">
                <td>Certification level</td>
                <td>Definition</td>
                <td>Requirements to meet level of certification</td>
                <td>Examples</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Validated</td>
                <td>Approved to be valid document and belong to the holder (platform user)</td>
                <td>Documents coming directly (digitally and physically) from the originating Source</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Birth certificate uploaded and sent by Vital Records</p>
                    </list-item>
                    <list-item>
                      <p>Medical record sent by a doctor</p>
                    </list-item>
                    <list-item>
                      <p>Medical Assistance Program (MAP) card sent by the issuing entity</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Verified</td>
                <td>Verified that document belongs to the holder (platform user) and document is what it claims to be</td>
                <td>Physical document must be seen by the certifying entity</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>ID that is seen in person by Austin Police Department (APD) and uploaded or sent to a user</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Uncertified</td>
                <td>Exists as a document/asset, but not marked as validated or verified</td>
                <td>None</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>A self-uploaded form, such as a Homelessness Statement</p>
                    </list-item>
                  </list>
                </td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Assumption 4</title>
        <p>Potential changes in the organizational workflow to accommodate a new system, such as our platform, was another area of friction. The HMIS provided by the US Department of Housing and Urban Development (HUD) is already widely used across the country as a centralized database to confidentially aggregate data on the homeless and housing provisions provided to these individuals. Copies of documents and IDs can be stored via HMIS, and organizations funded by HUD are required to use HMIS for client data. From the service provider perspective, blockchain is most useful for documents not currently stored in the HMIS database or for client personal use to keep track of future appointments and pending documents needed for services. This showed that the blockchain platform may, for the time being, work complementary to other existing databases or information systems, adding new features that are difficult to establish using legacy systems.</p>
      </sec>
      <sec>
        <title>Assumptions 5 and 6</title>
        <p>Technological concerns included the privacy and confidentiality of indelible and immutable client data for a service that might not be successful in the long term. Providers agreed that the technology showed value for the nonhomeless population as well, but opinions on whether the technological barriers were surmountable for the homeless were mixed. The most vulnerable members of the homeless population struggle to keep a phone and remember their email IDs and passwords, complicating platform access and use. There will always be a level of tension between ease of use and privacy/security concerns. However, adequately addressing the latter may help facilitate more practical solutions for the former. The readiness to overcome any specific requirements for the use of the solution by PEH seemed to be determined by how many of their problems were being solved effectively by using such a platform.</p>
      </sec>
      <sec>
        <title>Assumption 7</title>
        <p>Analysis of interview feedback elucidated the requirement of clearly defined roles for each organization. Not all providers wanted responsibility or additional work processes of account creation, document validation, and resolution of transactional or account legitimacy. Legal issues and worries regarding Health Insurance Portability and Accountability Act (HIPAA) compliance to share personal health information and other client data between organizations were further constraints on stakeholder roles, participation, and interorganizational efficiency. The questions around governance and standardized processes for onboarding and managing roles remained unresolved. It was not clear whether the City of Austin had the capacity to manage a blockchain platform or if there was another organization in the city, which had the capacity and trust of all other stakeholders and general citizens, including the PEH.</p>
      </sec>
      <sec>
        <title>Assumptions 1 and 4</title>
        <p>The results of our tests demonstrated that the platform we had chosen to use lacked core functionality and configuration specifically needed for our particular use case. The user experience was time consuming and not intuitive for tasks such as account creation and sharing of data, which will likely hinder client and provider understanding, acceptance, and adoption of the platform. Validated data could not be securely shared while protecting privacy and confidentiality; thus, data transactions on the blockchain platform cannot facilitate services or increase interorganizational efficiency. The nature of sharing and transacting data on this platform was specific to the original use case of small farmers and refugees and was not suitable for our purpose of securely sharing and storing documentation. As our contract with the platform provider was constrained to limited modifications because of the time frame and budget of the project, we were unable to make the necessary changes to continue testing this platform for our use case. Given these findings, testing assumption 4 on the equivalence of the 2 platform use cases was invalidated.</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Secure, fast, and reliable sharing of validated health and identity data is crucial to improve the quality of life and health outcomes of the general population, particularly vulnerable populations such as those experiencing homelessness. Our project tested whether a blockchain-based platform had the functionality to manage permissioned access and distribution of data while empowering patients with control over their own records. This study also showed the need to address challenges in establishing and operationalizing a blockchain system before trial or full-scale production.</p>
        <p>Although broader and timely access to health and identity records can be achieved through blockchain, there are costs in transferring to a new system and training professionals and patients on the best methods of use to improve efficiency and outcomes. In the underserved populations, initial adoption depends on a user-friendly interface and an end user experience accounting for varying levels of technological access and ability. Unfamiliarity with blockchain technology and usage also creates challenges in adoption for service providers. Understanding the basic principles of blockchain technology is necessary to confer trust in the system and allow changes in workflow, promoting organizational efficiency and preventing the burden of additional verification of authorized documentation. Institutions participating in a blockchain system must also mutually agree upon the size of data that may be stored or transferred on the blockchain to maximize system performance [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref12">12</xref>].</p>
        <p>Our research showed that a blockchain can be used to manage personal and health data by facilitating interoperability, patient control of documents, and a record of consented document access while maintaining data privacy and security. A validated, immutable, and decentralized ledger promotes system and transactional trustworthiness but cannot guarantee the absence of falsifications or errors from the point of origin. These mistakes are perpetuated in the blockchain without a manual content verification procedure [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. Our results show that a private, permission-based blockchain might be suitable for sensitive personal and health information with regulatory guidelines and standards to ensure appropriate use of data. In a permissioned system, participating organizations need to decide who is responsible for the creation of new accounts [<xref ref-type="bibr" rid="ref10">10</xref>]. Individual users may also request for their data to be erased [<xref ref-type="bibr" rid="ref11">11</xref>]. If the data are protected health information (PHI), HIPAA mandates its deletion in the event of unauthorized access. PHI must also be destroyed when a data storage device is decommissioned. This is only possible when documents are not stored in the blockchain. If data are stored in an off-blockchain data repository or database, a record of the existence of deleted data may still be maintained within the chain [<xref ref-type="bibr" rid="ref24">24</xref>]. There is ambiguity regarding whether metadata of PHI are considered PHI [<xref ref-type="bibr" rid="ref25">25</xref>], but legal counsel with respect to the application of HIPAA and data privacy standards is vital to ensure compliance with regulatory frameworks [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. A potential limitation regarding these data and use standards arises with respect to a private, partially centralized blockchain. To achieve compliance and vendor neutrality, an outside enforcing authority may be required [<xref ref-type="bibr" rid="ref12">12</xref>].</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Timeline and budgetary constraints from the Mayor’s Challenge Project limited our ability to fully modify the platform for our use case. We were unable to develop an end user experience promoting homeless client adoption or develop changes in workflow, policy, and data sharing agreements for the best use of blockchain technology. The significant security and usability issues with our original platform prevented large-scale implementation in an empirical setting.</p>
        <p>Further research is required to compare the efficacy and costs of an approach based on blockchain technology with other alternative approaches. Although the research presented here shows the potential of a blockchain-based approach, we need to better understand the comparative benefits and costs. For example, the City of Austin could have created a central database to which all partners and collaborators would agree to add their data. Questions on whether all participants would adopt the use of standard data types and a centralized, city-owned database would need to be addressed. Experience has shown that not all advocacy groups or people experiencing homelessness fully trust the city government, for example. The purpose here, however, was to show whether a blockchain-based approach could work, and it was not to address the question of comparative effectiveness.</p>
      </sec>
      <sec>
        <title>Comparison With Prior Work</title>
        <p>Several studies to date have explored the potential applications of blockchain to solve key issues in the health care sector. This study demonstrates a methodology and rigor that may be needed to test if a blockchain can be used to securely store and track verified documentation, promote client ownership of data, and improve interoperability by facilitating permission-based data sharing. This study paves the way for future studies by detailing specific organizational, logistical, and system considerations for successful and scalable implementation.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Blockchain may provide a means for consented access to validated personal and health data, thus increasing interoperability without compromising the security or privacy of data [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref24">24</xref>]. Existing solutions need to be put through rigorous testing before being adopted at scale. We developed assumptions based on feedback from end users, PEH, and service providers on important aspects to be tested. We engaged these groups actively to test the assumptions using a preexisting platform and found that many of the assumptions could not be validated, given the constraints of the platform, limitations on time and resources in the pilot, and lack of clarity on legal and compliance implications of this new technology. On the basis of our learnings through this pilot study, we opine that using an off-blockchain data lake or extant provider databases for PHI storage and systematic storage of an index of health records and associated metadata on the chain can permit the management of access and data control while complying with privacy and regulatory standards [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref27">27</xref>]. Maintaining limited personal data on the blockchain maximizes the speed of transactions and scalability of the blockchain system [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref20">20</xref>]. Through an API, organizations can integrate data and receive accurate, updated information in a usable format [<xref ref-type="bibr" rid="ref19">19</xref>]. Faster availability of real-time data reduces delays in service [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref28">28</xref>] and promotes coordinated health care and specialized treatment based on outcomes and efficacy. Shifting data ownership and control to the individual optimizes access to health and social services and engages a patient in their own care through selective sharing of information and data with providers or researchers [<xref ref-type="bibr" rid="ref29">29</xref>-<xref ref-type="bibr" rid="ref31">31</xref>]. Patient-reported measurable outcomes and data from mobile apps or on-person sensors may also be integrated, creating a single access point for all real-time health data and improving personalized health care [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref>]. These benefits outweigh the challenges in adoption, employment, and investment of a blockchain system. The application of current recommendations and continued research into blockchain implementation is crucial to develop cost-effective strategies for the operationalization of blockchains while ensuring efficiency, data privacy, and scalability in the health care ecosystem [<xref ref-type="bibr" rid="ref24">24</xref>].</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Interview questions for service providers.</p>
        <media xlink:href="jmir_v22i6e16887_app1.png" xlink:title="PNG File , 277 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Platform testing session results.</p>
        <media xlink:href="jmir_v22i6e16887_app2.png" xlink:title="PNG File , 431 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Second session findings.</p>
        <media xlink:href="jmir_v22i6e16887_app3.png" xlink:title="PNG File , 322 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">API</term>
          <def>
            <p>application programming interface</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">DLT</term>
          <def>
            <p>distributed ledger technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">ECHO</term>
          <def>
            <p>Ending Community Homelessness Coalition</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">HIPAA</term>
          <def>
            <p>Health Insurance Portability and Accountability Act</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">HMIS</term>
          <def>
            <p>Homeless Management Information System</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">HUD</term>
          <def>
            <p>US Department of Housing and Urban Development</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">PEH</term>
          <def>
            <p>persons experiencing homelessness</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">PHI</term>
          <def>
            <p>protected health information</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">SNAP</term>
          <def>
            <p>Supplemental Nutrition Assistance Program</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>The authors would like to thank Bloomberg Philanthropies for their financial support through the Mayor’s Challenge Program, City of Austin’s Office of Technology Innovation, Austin Mayor’s Office, Austin/Travis County Emergency Medical Services, Central Health, and PEH who participated in the study.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>AK and VR designed the study along with City of Austin partners. AK, SA, and VR wrote the manuscript. AK, SA, and VR reviewed and approved the final version of the manuscript.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <source> Ending Community Homelessness Coalition</source>
          <year>2016</year>
          <month>05</month>
          <day>17</day>
          <access-date>2019-05-03</access-date>
          <comment>Ending Community Homelessness Coalition 2016 Annual Report<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.webcitation.org/786921PpK">http://www.webcitation.org/786921PpK</ext-link>
                         <ext-link ext-link-type="webcite" xlink:href="786921PpK"/>                         </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Khurshid</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gadnis</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Using blockchain to create transaction identity for persons experiencing homelessness in America: policy proposal</article-title>
          <source>JMIR Res Protoc</source>
          <year>2019</year>
          <month>03</month>
          <day>6</day>
          <volume>8</volume>
          <issue>3</issue>
          <fpage>e10654</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchprotocols.org/2019/3/e10654/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/10654</pub-id>
          <pub-id pub-id-type="medline">30839279</pub-id>
          <pub-id pub-id-type="pii">v8i3e10654</pub-id>
          <pub-id pub-id-type="pmcid">PMC6425314</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Angraal</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Krumholz</surname>
              <given-names>HM</given-names>
            </name>
            <name name-style="western">
              <surname>Schulz</surname>
              <given-names>WL</given-names>
            </name>
          </person-group>
          <article-title>Blockchain technology: applications in health care</article-title>
          <source>Circ Cardiovasc Qual Outcomes</source>
          <year>2017</year>
          <month>09</month>
          <volume>10</volume>
          <issue>9</issue>
          <fpage>e003800</fpage>
          <pub-id pub-id-type="doi">10.1161/CIRCOUTCOMES.117.003800</pub-id>
          <pub-id pub-id-type="medline">28912202</pub-id>
          <pub-id pub-id-type="pii">CIRCOUTCOMES.117.003800</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Funk</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Riddell</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ankel</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Cabrera</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Blockchain technology: a data framework to improve validity, trust, and accountability of information exchange in health professions education</article-title>
          <source>Acad Med</source>
          <year>2018</year>
          <month>12</month>
          <volume>93</volume>
          <issue>12</issue>
          <fpage>1791</fpage>
          <lpage>4</lpage>
          <pub-id pub-id-type="doi">10.1097/ACM.0000000000002326</pub-id>
          <pub-id pub-id-type="medline">29901658</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kamel Boulos</surname>
              <given-names>MN</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>JT</given-names>
            </name>
            <name name-style="western">
              <surname>Clauson</surname>
              <given-names>KA</given-names>
            </name>
          </person-group>
          <article-title>Geospatial blockchain: promises, challenges, and scenarios in health and healthcare</article-title>
          <source>Int J Health Geogr</source>
          <year>2018</year>
          <month>07</month>
          <day>5</day>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>25</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ij-healthgeographics.biomedcentral.com/articles/10.1186/s12942-018-0144-x"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12942-018-0144-x</pub-id>
          <pub-id pub-id-type="medline">29973196</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12942-018-0144-x</pub-id>
          <pub-id pub-id-type="pmcid">PMC6033217</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Košťál</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Helebrandt</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Belluš</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ries</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kotuliak</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Management and monitoring of IoT devices using blockchain</article-title>
          <source>Sensors (Basel)</source>
          <year>2019</year>
          <month>02</month>
          <day>19</day>
          <volume>19</volume>
          <issue>4</issue>
          <fpage>856</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.mdpi.com/resolver?pii=s19040856"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/s19040856</pub-id>
          <pub-id pub-id-type="medline">30791392</pub-id>
          <pub-id pub-id-type="pii">s19040856</pub-id>
          <pub-id pub-id-type="pmcid">PMC6413109</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Krawiec</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>White</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Filipova</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Quarre</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Barr</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <source>Deloitte</source>
          <year>2016</year>
          <access-date>2019-05-06</access-date>
          <comment>Blockchain: Opportunities for Health Care<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www2.deloitte.com/us/en/pages/public-sector/articles/blockchain-opportunities-for-health-care.html">https://www2.deloitte.com/us/en/pages/public-sector/articles/blockchain-opportunities-for-health-care.html</ext-link>
                         <ext-link ext-link-type="webcite" xlink:href="78AaeFsla"/>                         </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mertz</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>(Block) chain reaction: a blockchain revolution sweeps into health care, offering the possibility for a much-needed data solution</article-title>
          <source>IEEE Pulse</source>
          <year>2018</year>
          <volume>9</volume>
          <issue>3</issue>
          <fpage>4</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1109/MPUL.2018.2814879</pub-id>
          <pub-id pub-id-type="medline">29757744</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roman-Belmonte</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>de la Corte-Rodriguez</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Rodriguez-Merchan</surname>
              <given-names>EC</given-names>
            </name>
          </person-group>
          <article-title>How blockchain technology can change medicine</article-title>
          <source>Postgrad Med</source>
          <year>2018</year>
          <month>05</month>
          <volume>130</volume>
          <issue>4</issue>
          <fpage>420</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1080/00325481.2018.1472996</pub-id>
          <pub-id pub-id-type="medline">29727247</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhuang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Sheets</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Shae</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Tsai</surname>
              <given-names>JJ</given-names>
            </name>
            <name name-style="western">
              <surname>Shyu</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Applying blockchain technology for health information exchange and persistent monitoring for clinical trials</article-title>
          <source>AMIA Annu Symp Proc</source>
          <year>2018</year>
          <volume>2018</volume>
          <fpage>1167</fpage>
          <lpage>75</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/30815159"/>
          </comment>
          <pub-id pub-id-type="medline">30815159</pub-id>
          <pub-id pub-id-type="pmcid">PMC6371378</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Park</surname>
              <given-names>YR</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Na</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Is blockchain technology suitable for managing personal health records? Mixed-methods study to test feasibility</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>02</month>
          <day>8</day>
          <volume>21</volume>
          <issue>2</issue>
          <fpage>e12533</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/2/e12533/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/12533</pub-id>
          <pub-id pub-id-type="medline">30735142</pub-id>
          <pub-id pub-id-type="pii">v21i2e12533</pub-id>
          <pub-id pub-id-type="pmcid">PMC6384539</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vazirani</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>O'Donoghue</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Brindley</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Meinert</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Implementing blockchains for efficient health care: systematic review</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>02</month>
          <day>12</day>
          <volume>21</volume>
          <issue>2</issue>
          <fpage>e12439</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/2/e12439/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/12439</pub-id>
          <pub-id pub-id-type="medline">30747714</pub-id>
          <pub-id pub-id-type="pii">v21i2e12439</pub-id>
          <pub-id pub-id-type="pmcid">PMC6390185</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dimitrov</surname>
              <given-names>DV</given-names>
            </name>
          </person-group>
          <article-title>Blockchain applications for healthcare data management</article-title>
          <source>Healthc Inform Res</source>
          <year>2019</year>
          <month>01</month>
          <volume>25</volume>
          <issue>1</issue>
          <fpage>51</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.e-hir.org/DOIx.php?id=10.4258/hir.2019.25.1.51"/>
          </comment>
          <pub-id pub-id-type="doi">10.4258/hir.2019.25.1.51</pub-id>
          <pub-id pub-id-type="medline">30788182</pub-id>
          <pub-id pub-id-type="pmcid">PMC6372466</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>DR</given-names>
            </name>
            <name name-style="western">
              <surname>Bhattacharya</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Butte</surname>
              <given-names>AJ</given-names>
            </name>
          </person-group>
          <article-title>Prototype of running clinical trials in an untrustworthy environment using blockchain</article-title>
          <source>Nat Commun</source>
          <year>2019</year>
          <month>02</month>
          <day>22</day>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>917</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/30796226"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41467-019-08874-y</pub-id>
          <pub-id pub-id-type="medline">30796226</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41467-019-08874-y</pub-id>
          <pub-id pub-id-type="pmcid">PMC6384889</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hylock</surname>
              <given-names>Ray Hales</given-names>
            </name>
            <name name-style="western">
              <surname>Zeng</surname>
              <given-names>Xiaoming</given-names>
            </name>
          </person-group>
          <article-title>A Blockchain Framework for Patient-Centered Health Records and Exchange (HealthChain): Evaluation and Proof-of-Concept Study</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>08</month>
          <day>31</day>
          <volume>21</volume>
          <issue>8</issue>
          <fpage>e13592</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/8/e13592/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/13592</pub-id>
          <pub-id pub-id-type="medline">31471959</pub-id>
          <pub-id pub-id-type="pii">v21i8e13592</pub-id>
          <pub-id pub-id-type="pmcid">PMC6743266</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dexter</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>Mango Research-Blockchain Explained Simply!</source>
          <year>2018</year>
          <access-date>2019-05-03</access-date>
          <comment>How Are Blockchain Transactions Validated? Consensus vs Validation<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mangoresearch.co/blockchain-consensus-vs-validation/">https://www.mangoresearch.co/blockchain-consensus-vs-validation/</ext-link>
                         <ext-link ext-link-type="webcite" xlink:href="786Ae8d7C"/>                         </comment>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pérez-Solà</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Delgado-Segura</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Navarro-Arribas</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Herrera-Joancomartí</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Another coin bites the dust: an analysis of dust in UTXO-based cryptocurrencies</article-title>
          <source>R Soc Open Sci</source>
          <year>2019</year>
          <month>01</month>
          <volume>6</volume>
          <issue>1</issue>
          <fpage>180817</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://royalsocietypublishing.org/doi/full/10.1098/rsos.180817?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub%3dpubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1098/rsos.180817</pub-id>
          <pub-id pub-id-type="medline">30800345</pub-id>
          <pub-id pub-id-type="pii">rsos180817</pub-id>
          <pub-id pub-id-type="pmcid">PMC6366196</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wood</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <source>Semantic Scholar</source>
          <year>2014</year>
          <access-date>2019-05-06</access-date>
          <comment>Ethereum: A Secure Decentralised Generalised Transaction Ledger<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://pdfs.semanticscholar.org/259c/790cfa0b7a73836812217ad149d34aa09aa6.pdf?_ga=2.191984810.127702914.1586246225-1679671381.1567599385">https://pdfs.semanticscholar.org/259c/790cfa0b7a73836812217ad149d34aa09aa6.pdf?_ga=2.191984810.127702914.1586246225-1679671381.1567599385</ext-link>
                         <ext-link ext-link-type="webcite" xlink:href="78AcHc1hD"/>                         </comment>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Dowd</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <source>HITInfrastructure</source>
          <year>2016</year>
          <access-date>2019-05-03</access-date>
          <comment>Why Application Programming Interfaces Are Key for Healthcare<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hitinfrastructure.com/features/why-application-programming-interfaces-are-key-for-healthcare">https://hitinfrastructure.com/features/why-application-programming-interfaces-are-key-for-healthcare</ext-link>
                         <ext-link ext-link-type="webcite" xlink:href="786A5nuc8"/>                         </comment>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gordon</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>Catalini</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Blockchain technology foBlockchain technology for healthcare: facilitating the transition to patient-driven interoperabilityr healthcare: facilitating the transition to patient-driven interoperability</article-title>
          <source>Comput Struct Biotechnol J</source>
          <year>2018</year>
          <volume>16</volume>
          <fpage>224</fpage>
          <lpage>30</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2001-0370(18)30028-X"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.csbj.2018.06.003</pub-id>
          <pub-id pub-id-type="medline">30069284</pub-id>
          <pub-id pub-id-type="pii">S2001-0370(18)30028-X</pub-id>
          <pub-id pub-id-type="pmcid">PMC6068317</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kuo</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ohno-Machado</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Blockchain distributed ledger technologies for biomedical and health care applications</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2017</year>
          <month>11</month>
          <day>1</day>
          <volume>24</volume>
          <issue>6</issue>
          <fpage>1211</fpage>
          <lpage>20</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29016974"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocx068</pub-id>
          <pub-id pub-id-type="medline">29016974</pub-id>
          <pub-id pub-id-type="pii">4108087</pub-id>
          <pub-id pub-id-type="pmcid">PMC6080687</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dubovitskaya</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Ryu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Schumacher</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>How Blockchain Could Empower eHealth: An Application for Radiation Oncology</article-title>
          <source>Proceedings of the VLDB Workshop on Data Management and Analytics for Medicine and Healthcare</source>
          <year>2017</year>
          <conf-name>DMAH'17</conf-name>
          <conf-date>September 1, 2017</conf-date>
          <conf-loc>Munich, Germany</conf-loc>
          <fpage>3</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-319-67186-4_1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yue</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Jin</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control</article-title>
          <source>J Med Syst</source>
          <year>2016</year>
          <month>10</month>
          <volume>40</volume>
          <issue>10</issue>
          <fpage>218</fpage>
          <pub-id pub-id-type="doi">10.1007/s10916-016-0574-6</pub-id>
          <pub-id pub-id-type="medline">27565509</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-016-0574-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Meinert</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Alturkistani</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Foley</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Osama</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Car</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Majeed</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>van Velthoven</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wells</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Brindley</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Blockchain implementation in health care: protocol for a systematic review</article-title>
          <source>JMIR Res Protoc</source>
          <year>2019</year>
          <month>02</month>
          <day>8</day>
          <volume>8</volume>
          <issue>2</issue>
          <fpage>e10994</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchprotocols.org/2019/2/e10994/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/10994</pub-id>
          <pub-id pub-id-type="medline">30735146</pub-id>
          <pub-id pub-id-type="pii">v8i2e10994</pub-id>
          <pub-id pub-id-type="pmcid">PMC6384534</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Esposito</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>de Santis</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Tortora</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Choo</surname>
              <given-names>KR</given-names>
            </name>
          </person-group>
          <article-title>Blockchain: a panacea for healthcare cloud-based data security and privacy?</article-title>
          <source>IEEE Cloud Comput</source>
          <year>2018</year>
          <month>01</month>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>31</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1109/MCC.2018.011791712</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Murphy</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <source>EHRIntelligence</source>
          <year>2016</year>
          <access-date>2019-05-03</access-date>
          <comment>How Health IT Standards Enable Patient Access to Health Data<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ehrintelligence.com/news/how-health-it-standards-enable-patient-access-to-health-data">https://ehrintelligence.com/news/how-health-it-standards-enable-patient-access-to-health-data</ext-link>
                         <ext-link ext-link-type="webcite" xlink:href="786AGKJgE"/>                         </comment>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mamoshina</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Ojomoko</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Yanovich</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Ostrovski</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Botezatu</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Prikhodko</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Izumchenko</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Aliper</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Romantsov</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Zhebrak</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ogu</surname>
              <given-names>IO</given-names>
            </name>
            <name name-style="western">
              <surname>Zhavoronkov</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Converging blockchain and next-generation artificial intelligence technologies to decentralize and accelerate biomedical research and healthcare</article-title>
          <source>Oncotarget</source>
          <year>2018</year>
          <month>01</month>
          <day>19</day>
          <volume>9</volume>
          <issue>5</issue>
          <fpage>5665</fpage>
          <lpage>90</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.impactjournals.com/oncotarget/misc/linkedout.php?pii=22345"/>
          </comment>
          <pub-id pub-id-type="doi">10.18632/oncotarget.22345</pub-id>
          <pub-id pub-id-type="medline">29464026</pub-id>
          <pub-id pub-id-type="pii">22345</pub-id>
          <pub-id pub-id-type="pmcid">PMC5814166</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de Salvo</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <source>HealthIT</source>
          <year>2015</year>
          <access-date>2019-03-05</access-date>
          <comment>Connecting Health and Care for the Nation: A Shared Nationwide Interoperability Roadmap<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.healthit.gov/sites/default/files/hie-interoperability/nationwide-interoperability-roadmap-final-version-1.0.pdf">https://www.healthit.gov/sites/default/files/hie-interoperability/nationwide-interoperability-roadmap-final-version-1.0.pdf</ext-link>
                         <ext-link ext-link-type="webcite" xlink:href="78AeSxDNr"/>                         </comment>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Engelhardt</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Hitching healthcare to the chain: an introduction to blockchain technology in the healthcare sector</article-title>
          <source>TIM Rev</source>
          <year>2017</year>
          <month>10</month>
          <day>27</day>
          <volume>7</volume>
          <issue>10</issue>
          <fpage>22</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.22215/timreview/1111</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kitson</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Marshall</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bassett</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Zeitz</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>What are the core elements of patient-centred care? A narrative review and synthesis of the literature from health policy, medicine and nursing</article-title>
          <source>J Adv Nurs</source>
          <year>2013</year>
          <month>01</month>
          <volume>69</volume>
          <issue>1</issue>
          <fpage>4</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1365-2648.2012.06064.x</pub-id>
          <pub-id pub-id-type="medline">22709336</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Prajna</surname>
              <given-names>SS</given-names>
            </name>
          </person-group>
          <source>Comms MEA</source>
          <year>2017</year>
          <access-date>2019-05-06</access-date>
          <comment>Unleashing the Power of the Ledger<ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.commsmea.com/16927-unleashing-the-power-of-the-ledger">https://www.commsmea.com/16927-unleashing-the-power-of-the-ledger</ext-link>
                         <ext-link ext-link-type="webcite" xlink:href="78Aem4zko"/>                         </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
