<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v22i9e21922</article-id>
      <article-id pub-id-type="pmid">32936082</article-id>
      <article-id pub-id-type="doi">10.2196/21922</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Viewpoint</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Viewpoint</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Ethical Challenges and Opportunities Associated With the Ability to Perform Medical Screening From Interactions With Search Engines: Viewpoint</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Danforth</surname>
            <given-names>Christopher</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Sanz</surname>
            <given-names>Ferran</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Yom-Tov</surname>
            <given-names>Elad</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Microsoft Research</institution>
            <addr-line>Alan Turing 3</addr-line>
            <addr-line>Herzeliya, 4672415</addr-line>
            <country>Israel</country>
            <phone>972 747111359</phone>
            <email>eladyt@microsoft.com</email>
          </address>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-2380-4584</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Cherlow</surname>
            <given-names>Yuval</given-names>
          </name>
          <degrees>Rabbi</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-1063-4317</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Microsoft Research</institution>
        <addr-line>Herzeliya</addr-line>
        <country>Israel</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Faculty of Industrial Engineering and Management</institution>
        <institution>Technion</institution>
        <addr-line>Haifa</addr-line>
        <country>Israel</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>The Tzohar Rabbinical Organization</institution>
        <addr-line>Lod</addr-line>
        <country>Israel</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Elad Yom-Tov <email>eladyt@microsoft.com</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>9</month>
        <year>2020</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>16</day>
        <month>9</month>
        <year>2020</year>
      </pub-date>
      <volume>22</volume>
      <issue>9</issue>
      <elocation-id>e21922</elocation-id>
      <history>
        <date date-type="received">
          <day>29</day>
          <month>6</month>
          <year>2020</year>
        </date>
        <date date-type="rev-request">
          <day>4</day>
          <month>8</month>
          <year>2020</year>
        </date>
        <date date-type="rev-recd">
          <day>9</day>
          <month>8</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>11</day>
          <month>8</month>
          <year>2020</year>
        </date>
      </history>
      <copyright-statement>©Elad Yom-Tov, Yuval Cherlow. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 16.09.2020.</copyright-statement>
      <copyright-year>2020</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://www.jmir.org/2020/9/e21922/" xlink:type="simple"/>
      <abstract>
        <p>Recent research has shown the efficacy of screening for serious medical conditions from data collected while people interact with online services. In particular, queries to search engines and the interactions with them were shown to be advantageous for screening a range of conditions including diabetes, several forms of cancer, eating disorders, and depression. 
These screening abilities offer unique advantages in that they can serve a broad strata of the society, including people in underserved populations and in countries with poor access to medical services. However, these advantages need to be balanced against the potential harm to privacy, autonomy, and nonmaleficence, which are recognized as the cornerstones of ethical medical care. 
Here, we discuss these opportunities and challenges, both when collecting data to develop online screening services and when deploying them. We offer several solutions that balance the advantages of these services with the ethical challenges they pose.</p>
      </abstract>
      <kwd-group>
        <kwd>search engines</kwd>
        <kwd>diagnosis</kwd>
        <kwd>screening</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Recent work has demonstrated the ability to screen for serious medical conditions using search engine logs [<xref ref-type="bibr" rid="ref1">1</xref>-<xref ref-type="bibr" rid="ref5">5</xref>]. The development and deployment of these abilities can open new opportunities for earlier diagnosis and more equitable care but require careful consideration of the associated ethical challenges. The goal of this paper is to discuss the ethical pros and cons of these capabilities and to set the stage for a broader discussion of these issues.</p>
      <p>Search engines are used by the vast majority of internet users to obtain information on a variety of topics, including medicine [<xref ref-type="bibr" rid="ref6">6</xref>]. Search engine operators collect information on the interaction of users with their services to improve the operation of their search engines, for example, by measuring user satisfaction from specific answers given to them [<xref ref-type="bibr" rid="ref7">7</xref>]. It is important to stress that the data collected by search engine operators are not collected to improve medical research or improve people’s health but to enhance search engine operation.</p>
      <p>The data collected by search engine operators include, for example, query text, links shown to the user, time of clicking on the links, duration of reading each link, and mouse movements, which serve as a proxy for eye gaze tracking [<xref ref-type="bibr" rid="ref8">8</xref>]. The data collected by search engines are usually anonymous, in the sense that specific individuals cannot be easily linked to their data, but, unless specified by the user, multiple searches can be attributed, with high likelihood, to the same user.</p>
      <p>As noted above, these data have been shown to be effective for screening people for a variety of medical conditions, such as diabetes [<xref ref-type="bibr" rid="ref4">4</xref>], several forms of cancer [<xref ref-type="bibr" rid="ref1">1</xref>-<xref ref-type="bibr" rid="ref3">3</xref>], eating disorders, and depression [<xref ref-type="bibr" rid="ref5">5</xref>]. Interactions with search engines are useful for such screening because of a combination of factors, including people’s limited knowledge of the association between symptoms and conditions [<xref ref-type="bibr" rid="ref9">9</xref>]; the fact that many conditions (eg, ovarian cancer) have benign symptoms, of which only the confluence indicates disease, but psychological biases lead people to focus on only the latest symptom [<xref ref-type="bibr" rid="ref2">2</xref>]; and people’s natural tendency to defer treatment but ask about it online.</p>
      <p>These screening capabilities offer unique advantages in that they can serve a broad strata of the society, including people in underserved populations and in countries with poor access to medical services [<xref ref-type="bibr" rid="ref7">7</xref>]. However, these advantages come at a possible cost to privacy, autonomy, and nonmaleficence, which are recognized as the cornerstones of ethical medical care [<xref ref-type="bibr" rid="ref10">10</xref>]. Note that the legal aspects of providing (and of not providing) these capabilities are not discussed in this work.</p>
      <p>We note that other services, including content providers (eg, Wikipedia and patient groups [<xref ref-type="bibr" rid="ref11">11</xref>]) and social media platforms (eg, Facebook [<xref ref-type="bibr" rid="ref12">12</xref>] and Twitter [<xref ref-type="bibr" rid="ref13">13</xref>]) collect similar data. However, for the reasons described above, we focus on search engines. Moreover, for a broader discussion on the ethics of internet research, readers can refer to the article by Buchanan and Zimmer [<xref ref-type="bibr" rid="ref14">14</xref>].</p>
      <p>In our opinion, the ethical questions that arise from the ability to screen search engine logs should be divided into questions that appear during the development of screening capabilities and questions that should be resolved before medical interventions are provided to people as part of the use of a resulting product. Here, we discuss both these areas.</p>
    </sec>
    <sec sec-type="development">
      <title>Development</title>
      <sec>
        <title>Incidental Finding</title>
        <p>“Incidental finding” [<xref ref-type="bibr" rid="ref15">15</xref>] refers to the case where, during research on one medical topic, data indicates that a person under study has another medical condition of which he/she is (possibly) unaware. Consider a person who contributes their genetic information to build a new screening test for a specific hereditary condition. Upon examination, researchers realize that this person’s genetic information reveals that he/she has another, perhaps common, mutation, which indicates that the person has a serious medical condition that he/she may not know about.</p>
        <p>The commonly accepted solution to this challenge in genetic research is to screen for mutations that are common, life-saving, and do not require the person to have a deep understanding of genetics in order to decide whether he/she would like to be treated. If such a mutation is identified, the researcher informs the person that he/she should consult with a genetic counsellor but does not provide advice, as this is not the researcher’s specialty. This route is taken also because, if the burden of treatment (or advice) is placed on the researcher, medical research will, in practice, be severely restricted. This is also the reason that, in many cases, ethics committees recommend opting for completely anonymous research, which reduces the ethical burden on the researcher.</p>
        <p>We claim that there is similarity between the question of incidental finding in the medical domain and the case where researchers use data collected during people’s interactions with search engines to later determine that a user may have a medical condition. This can arise from a simple interaction, such as a query suggesting suicidal ideation, to a more elaborate insight obtained from a predictive model based on interactions with the internet service. However, the analogy is not perfect. People who donate their data for medical research know that their data will be examined for medical purposes, whereas people who use a search engine do not expect their data to be used for medical research. In fact, in many cases, people who use search engines may not realize that their interaction data are being collected. We note in passing that routine experiments, such as Facebook’s modification of the order of postings by friends, caused an uproar when they were described in an academic paper [<xref ref-type="bibr" rid="ref16">16</xref>].</p>
        <p>Nevertheless, we argue that these differences should not prevent us from using the insight medical ethics has garnered on the question of incidental findings because people who contribute their data to medical research may not realize that other findings are possible, and on the other hand, as public awareness of search engine data grows, people will realize that these data can provide them with benefits.</p>
      </sec>
      <sec>
        <title>Informed Consent and Autonomy</title>
        <p>Search engines, as other internet services, have a system of consent that often includes the use of data collected by the search engine for research purposes. People who use a search engine implicitly consent to its use and further can click on the link at the bottom of the search page where its “Terms of Use” are specified. However, it is difficult to refer to this as informed consent in the medical sense. For example, the authors found that in a sample of approximately 116 million users, only 0.05% clicked on the Terms of Use page during a 1-month period. Experience from other web services suggests that even if a pop-up window would require people to consent to their data being used for research, most people would click on the window without considering what they are consenting to [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
        <p>Additionally, Terms of Use are necessarily broad in their description and, we assume, are often broader than informed consent forms signed by people participating in medical research.</p>
        <p>Thus, it is still a challenge to develop a form of consent that both satisfies the ethical requirements for data use and does not overburden users in their interactions with the search engine.</p>
      </sec>
      <sec>
        <title>Willingness to Provide Search Data for Medical Research</title>
        <p>There is often an implicit assumption that people would not want their data, collected for other purposes, to be used for medical research without their specific consent. Gefen et al [<xref ref-type="bibr" rid="ref18">18</xref>] tried to quantify the value that people assign to their data and found that, in a sample of people from around the world, 99% were willing to provide their search engine data in exchange for monetary compensation lower than US $1500 and 53% were willing to pay to have their data analyzed, even if the value of the analysis would be to the society at large rather than to them directly.</p>
        <p>Thus, while a minority of users would not agree to the use of their data regardless of compensation, many would agree, and a relevant portion of the population even sees value in the availability of these services, which exceeds that of the data itself.</p>
      </sec>
      <sec>
        <title>Anonymity</title>
        <p>As noted above, most of the search data used for medical research has, to date, been anonymous as far as researchers are concerned. This anonymization is provided through the provision of a random user identifier and by not including information that could easily compromise anonymity (eg, location). However, as shown in the AOL leak [<xref ref-type="bibr" rid="ref19">19</xref>], a malicious researcher may be able to identify a small number of users when such anonymization is used. Therefore, it may be necessary to assume that data are not fully anonymized to a malicious researcher and perhaps even sometimes to a benevolent researcher.</p>
        <p>Companies collecting data may, on the other hand, be able to identify a user. This can happen, for example, if users register to their services with their real name. Thus, even if data are anonymous to a researcher, it could, conceivably, be deidentified by the organization collecting the data. In such a case, the problem of incidental findings can arise, as described above.</p>
        <p>Finally, an advantage to having data linked to an individual (either anonymous or identifiable) is the ability of users to control the use of their data, as offered, for example, in the European Union’s recent General Data Protection Regulation (GDPR).</p>
      </sec>
      <sec>
        <title>Representativeness</title>
        <p>The question of representation in internet data appears in several forms. First, there are the questions of who uses the services from which data are collected and whether they faithfully characterize the entire population. Second, not all people use the internet in similar ways to acquire information, which causes another form of bias in the data.</p>
        <p>The first source of representation bias could greatly impact populations, especially in financially disadvantaged parts of the society and in countries with lower access to the internet. Although many efforts have been devoted to closing this gap, it still exists. For example, the percentage of people with access to the internet in different countries ranges from almost 0% to 100% [<xref ref-type="bibr" rid="ref20">20</xref>]. Thus, it is important to account for such representation biases when using the data to build a model that can be useful to all people.</p>
        <p>The second source of representation bias is less well known but is no less important. As shown in past work [<xref ref-type="bibr" rid="ref21">21</xref>], the use of search engines for medical queries, for example, is highly dependent on people’s age and gender. Moreover, only around 16% of people use search engines to query for medical information [<xref ref-type="bibr" rid="ref9">9</xref>], adding to the representation bias.</p>
      </sec>
      <sec>
        <title>Summary</title>
        <p>Taking the above-mentioned points into consideration, we suggest that in the case of research on medical conditions using search engine data collected for operational purposes, it may be preferable to use anonymized data rather than to obtain consent for the use of identifiable information. If the former route is taken, it is important that ethical committees approve the research, serving in their capacity as representatives of society. We recognize that this is an imperfect solution because of both the inability to seek informed consent and the difficulty for ethics committees to represent search engine users who come from a range of countries and societies, each with its own norms and expectations. However, we view this as a balance between the competing challenges outlined above.</p>
      </sec>
    </sec>
    <sec sec-type="production">
      <title>Production</title>
      <sec>
        <title>Approaches for Providing Search-Based Screening Information</title>
        <p>Once a screening method is developed, it may be put into regular use. This could be done in several ways, which are described below.</p>
        <p>Suppose an anonymous search engine user is predicted to have a medical condition (eg, screened positive according to interactions with the search engine for the medical condition). The first and most intrusive way to provide the user with this information is to display a notice at a prominent location on the screen. This is currently done only to people who search for information on how to kill themselves [<xref ref-type="bibr" rid="ref22">22</xref>] or for related topics. In such cases, a banner notice is displayed with the telephone number of a local helpline.</p>
        <p>Another way that could be used is to bias (modify) search results toward suggesting the suspected condition. For example, if a user searches for “constant thirst,” instead of showing the regular set of results, users who are predicted to have diabetes will be shown more results that suggest diabetes. A similar “personalized search” is currently part of the service of all major search engine providers (eg, when results are served such that they are relevant to the user’s current location). Therefore, such a solution might not be perceived as a major change by users.</p>
        <p>The third way we envision to display information is through the use of search advertisements [<xref ref-type="bibr" rid="ref3">3</xref>]. Advertisements are not part of the main search results (“organic results”) and are assessed differently by users [<xref ref-type="bibr" rid="ref23">23</xref>]. People who search for diagnostic information (“do I have diabetes?”) will be shown advertisements that would suggest help in diagnosis (“Worried you have diabetes? Click here to obtain more information”). People who click on the advertisements will be given diagnostic assistance, for example, in the form of clinical questionnaires. As shown recently [<xref ref-type="bibr" rid="ref3">3</xref>], it is possible to train advertising systems to focus on people who are the most at risk.</p>
        <p>We note that advertising in the health domain is currently limited by the policy of advertising systems. On one hand, this prevents abuse of the system by purveyors of unapproved medical services, but also means that any use of this method will often require approval by advertising system managers.</p>
        <p>A fourth method to inform people of a possible medical concern is through the normal use of a search engine after first obtaining informed consent to provide these insights. If this method is adopted, users will be shown an informed consent form whenever they are identified as new users by the search engine. The form will offer the users to receive screening information but will default to not receiving the information unless the users positively indicate their interest in receiving this information. Users who consent will then be given alerts whenever a possible medical condition is predicted, based on their queries and behaviors.</p>
        <p>Finally, a system might be built where users register and agree to provide their search data on a continuous basis in exchange for alerts when a medical concern is identified in these searches. The data collection, storage methods, and data use would be clearly described to the user. This is similar to services that analyze people’s genetic material, where their data will be the search data (or browsing data, in general) and the analysis will be conducted on an ongoing basis, rather than a single transfer of data. Such a system could be offered by search engine providers or, perhaps preferably, by medical providers or dedicated companies.</p>
      </sec>
      <sec>
        <title>Unsolicited Diagnosis</title>
        <p>Unsolicited diagnosis [<xref ref-type="bibr" rid="ref24">24</xref>] or unsolicited medical opinion [<xref ref-type="bibr" rid="ref25">25</xref>] refers to the case where people may be provided with medical information when they do not expect it. For example [<xref ref-type="bibr" rid="ref26">26</xref>], consider the case of a dermatologist who is standing at the back of an elevator at the mall and notices that the person standing in front has a mole that the dermatologist thinks is likely cancerous. In this case, the person who has the mole is not expecting to receive a diagnosis from a random person at the mall (though a specialist in this case), and thus, this is a case of unsolicited diagnosis. Medical ethicists have considered the question of whether the medical specialist has a duty to inform the person to seek medical attention and whether the specialist has a right to do so. On one hand, the person is not expecting a diagnosis and there is no doctor-patient relationship between the two. On the other hand, not informing the person may lead to serious and irreparable damage. The conclusion reached by some ethicists [<xref ref-type="bibr" rid="ref26">26</xref>] is that medical doctors have a duty to offer their unsolicited medical opinion, especially when the medical condition requires urgent attention for treatment. However, doctors need to consider the possible harm of such an intervention. Note that a legal duty to act is very much country-specific, often defined through legislation (ie, “good Samaritan” laws [<xref ref-type="bibr" rid="ref27">27</xref>]) to protect people who take such action.</p>
        <p>We note in passing that the balance between benefit and harm for the individual may differ from that for the society. For example, some conditions currently have no treatment because they cannot be identified early enough and so many people would prefer not to know that they have such conditions. However, suppose search engine data could provide such an early alert [<xref ref-type="bibr" rid="ref28">28</xref>]. In such a case, if enough people knew they have these conditions, pharmaceutical companies might be compelled to develop treatments. However, as this is a secondary effect, we have not focused on it.</p>
      </sec>
      <sec>
        <title>Risk Compensation</title>
        <p>Risk compensation (also referred to as moral hazard [<xref ref-type="bibr" rid="ref29">29</xref>]) describes increased risk taking caused by the perceived usefulness of safety measures. For example, it has been suggested that condom distribution fosters inhibition among HIV-positive people [<xref ref-type="bibr" rid="ref30">30</xref>].</p>
        <p>If internet platforms disclose offering screening services, users may choose to modify their behaviors in ways that could harm them. For example, as noted above, only around 16% of users queried about medical symptoms prior to diagnosis [<xref ref-type="bibr" rid="ref9">9</xref>]. It is difficult to predict illness for people who do not query, but they may assume that a screening model is examining their queries and will alert them when it is necessary to visit a health provider, thus preferring not to access medical care even when they think they should. This is especially likely in the fifth solution described above, because users who register with a dedicated service expect it to provide such alerts. Therefore, it may be important for such a service to alert users about its inability to screen when it predicts that they will not ask relevant questions.</p>
      </sec>
      <sec>
        <title>Cost of Errors</title>
        <p>No system is perfect, including those discussed in this paper. The cost of errors is an important factor in whether and how information should be provided to users. A false positive error means that a person is informed (depending on the method of provision described above) of a medical condition when he/she does not have one. This can cause undue stress and result in unnecessary medical procedures [<xref ref-type="bibr" rid="ref31">31</xref>]. A false negative error means that a person who should have been provided with an alert does not receive one, possibly causing late diagnosis (as described above).</p>
      </sec>
      <sec>
        <title>Summary: Advantages and Disadvantages of Different Notification Methods</title>
        <p>The first method described above, whereby a notice is shown to the user, is advantageous in that it provides people with immediate, clear, and actionable information. However, we advocate its use in only the most extreme situations (eg, expressed intention of suicide) because it is intrusive and may cause more harm than good in the form of breaching privacy and impinging on people’s autonomy.</p>
        <p>The second (biasing results), third (advertisements), and fourth (explicit prior informed consent) methods are advantageous in that they do not force information upon users and allow users to decide if they would like to use the offered information. These methods (especially biasing results and advertisements), however, somewhat impinge on privacy and autonomy. Additionally, not all users will recognize the help offered to them, and only some will make use of it even when they recognize it. We note that in the case of advertising, the act of choosing to click on the advertisement should be considered informed consent (assuming that the advertisement is appropriately phrased). We also recognize that obtaining explicit informed consent (eg, the fourth method) can be difficult from a design perspective and can burden users who, for example, use private browsing. For these reasons, we believe that these methods, especially the one using advertisements, correctly balance benefit and harm.</p>
        <p>Finally, the fifth method (dedicated system) is clearly superior in terms of autonomy and consent, but based on prior experience, we assume that only a minority of users, probably skewed toward the more affluent parts of society, will use this method. Thus, while extremely beneficial for individuals, it should be considered less useful at the societal level.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <fn-group>
      <fn fn-type="con">
        <p>EYT conceived this paper. YC and EYT discussed the questions raised herein, suggested relevant past work, and wrote the paper.</p>
      </fn>
      <fn fn-type="conflict">
        <p>YC declares no conflicts of interest. EYT is an employee of Microsoft, owner of the Bing search engine. The positions described in the paper are those of the authors and not necessarily those of their respective employers.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>White</surname>
              <given-names>RW</given-names>
            </name>
            <name name-style="western">
              <surname>Horvitz</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of the Feasibility of Screening Patients for Early Signs of Lung Carcinoma in Web Search Logs</article-title>
          <source>JAMA Oncol</source>
          <year>2017</year>
          <month>03</month>
          <day>01</day>
          <volume>3</volume>
          <issue>3</issue>
          <fpage>398</fpage>
          <lpage>401</lpage>
          <pub-id pub-id-type="doi">10.1001/jamaoncol.2016.4911</pub-id>
          <pub-id pub-id-type="medline">27832243</pub-id>
          <pub-id pub-id-type="pii">2580709</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Soldaini</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Yom-Tov</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Inferring Individual Attributes from Search Engine Queries and Auxiliary Information</article-title>
          <source>WWW '17: Proceedings of the 26th International Conference on World Wide Web</source>
          <year>2017</year>
          <conf-name>26th International Conference on World Wide Web</conf-name>
          <conf-date>April 2017</conf-date>
          <conf-loc>Perth, Australia</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3038912.3052629</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yom-Tov</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Screening for Cancer Using a Learning Internet Advertising System</article-title>
          <source>ACM Trans. Comput. Healthcare</source>
          <year>2020</year>
          <month>04</month>
          <day>15</day>
          <volume>1</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <pub-id pub-id-type="doi">10.1145/3373720</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hochberg</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Daoud</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Shehadeh</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Yom-Tov</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Can internet search engine queries be used to diagnose diabetes? Analysis of archival search data</article-title>
          <source>Acta Diabetol</source>
          <year>2019</year>
          <month>10</month>
          <volume>56</volume>
          <issue>10</issue>
          <fpage>1149</fpage>
          <lpage>1154</lpage>
          <pub-id pub-id-type="doi">10.1007/s00592-019-01350-5</pub-id>
          <pub-id pub-id-type="medline">31093762</pub-id>
          <pub-id pub-id-type="pii">10.1007/s00592-019-01350-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schueller</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Steakley-Freeman</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Mohr</surname>
              <given-names>DC</given-names>
            </name>
            <name name-style="western">
              <surname>Yom-Tov</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Understanding perceived barriers to treatment from web browsing behavior</article-title>
          <source>J Affect Disord</source>
          <year>2020</year>
          <month>04</month>
          <day>15</day>
          <volume>267</volume>
          <fpage>63</fpage>
          <lpage>66</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jad.2020.01.131</pub-id>
          <pub-id pub-id-type="medline">32063574</pub-id>
          <pub-id pub-id-type="pii">S0165-0327(19)31146-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fox</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Duggan</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Health Online 2013</article-title>
          <source>Pew Research Center</source>
          <year>2013</year>
          <access-date>2020-03-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pewinternet.org/wp-content/uploads/sites/9/media/Files/Reports/PIP_HealthOnline.pdf">https://www.pewinternet.org/wp-content/uploads/sites/9/media/Files/Reports/PIP_HealthOnline.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Youngho</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Hassan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>White</surname>
              <given-names>RW</given-names>
            </name>
            <name name-style="western">
              <surname>Zitouni</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Modeling dwell time to predict click-level satisfaction</article-title>
          <source>WSDM '14: Proceedings of the 7th ACM international conference on Web search and data mining</source>
          <year>2014</year>
          <conf-name>7th ACM international conference on Web search and data mining</conf-name>
          <conf-date>February 2014</conf-date>
          <conf-loc>New York, NY, USA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/2556195.2556220</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Youngmann</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Yom-Tov</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Anxiety and Information Seeking: Evidence From Large-Scale Mouse Tracking</article-title>
          <source>Proceedings of the World Wide Web Conference on World Wide Web (WWW 2018)</source>
          <year>2018</year>
          <conf-name>World Wide Web Conference on World Wide Web (WWW 2018)</conf-name>
          <conf-date>2018</conf-date>
          <conf-loc>Lyon, France</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3178876.3186156</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hochberg</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Allon</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Yom-Tov</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Assessment of the Frequency of Online Searches for Symptoms Before Diagnosis: Analysis of Archival Data</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>03</month>
          <day>06</day>
          <volume>22</volume>
          <issue>3</issue>
          <fpage>e15065</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/3/e15065/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/15065</pub-id>
          <pub-id pub-id-type="medline">32141835</pub-id>
          <pub-id pub-id-type="pii">v22i3e15065</pub-id>
          <pub-id pub-id-type="pmcid">PMC7084283</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gillon</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Medical ethics: four principles plus attention to scope</article-title>
          <source>BMJ</source>
          <year>1994</year>
          <month>07</month>
          <day>16</day>
          <volume>309</volume>
          <issue>6948</issue>
          <fpage>184</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/8044100"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj.309.6948.184</pub-id>
          <pub-id pub-id-type="medline">8044100</pub-id>
          <pub-id pub-id-type="pmcid">PMC2540719</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yom-Tov</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <source>Crowdsourced Health: How What You Do on the Internet Will Improve Medicine</source>
          <year>2016</year>
          <publisher-loc>Cambridge, Massachusetts, United States</publisher-loc>
          <publisher-name>MIT Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>De Choundhury</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Counts</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Horvitz</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Hoff</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Characterizing and predicting postpartum depression from shared facebook data</article-title>
          <source>CSCW '14: Proceedings of the 17th ACM conference on Computer supported cooperative work &#38; social computing</source>
          <year>2014</year>
          <conf-name>17th ACM conference on Computer supported cooperative work &#38; social computing</conf-name>
          <conf-date>February 2014</conf-date>
          <conf-loc>Vancouver, BC, Canada</conf-loc>
          <fpage>626</fpage>
          <lpage>639</lpage>
          <pub-id pub-id-type="doi">10.1145/2531602.2531675</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reece</surname>
              <given-names>AG</given-names>
            </name>
            <name name-style="western">
              <surname>Reagan</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Lix</surname>
              <given-names>KL</given-names>
            </name>
            <name name-style="western">
              <surname>Dodds</surname>
              <given-names>PS</given-names>
            </name>
            <name name-style="western">
              <surname>Danforth</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Langer</surname>
              <given-names>EJ</given-names>
            </name>
          </person-group>
          <article-title>Forecasting the onset and course of mental illness with Twitter data</article-title>
          <source>Sci Rep</source>
          <year>2017</year>
          <month>10</month>
          <day>11</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>13006</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://dx.doi.org/10.1038/s41598-017-12961-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41598-017-12961-9</pub-id>
          <pub-id pub-id-type="medline">29021528</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41598-017-12961-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC5636873</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Buchanan</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Zimmer</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Internet Research Ethics</source>
          <year>2012</year>
          <access-date>2020-05-19</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://plato.stanford.edu/entries/ethics-internet-research/">https://plato.stanford.edu/entries/ethics-internet-research/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Christenhusz</surname>
              <given-names>GM</given-names>
            </name>
            <name name-style="western">
              <surname>Devriendt</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Dierickx</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>To tell or not to tell? A systematic review of ethical reflections on incidental findings arising in genetics contexts</article-title>
          <source>Eur J Hum Genet</source>
          <year>2013</year>
          <month>03</month>
          <volume>21</volume>
          <issue>3</issue>
          <fpage>248</fpage>
          <lpage>55</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://dx.doi.org/10.1038/ejhg.2012.130"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/ejhg.2012.130</pub-id>
          <pub-id pub-id-type="medline">22739341</pub-id>
          <pub-id pub-id-type="pii">ejhg2012130</pub-id>
          <pub-id pub-id-type="pmcid">PMC3573190</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jouhki</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lauk</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Penttinen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sormanen</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Uskali</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Facebook’s Emotional Contagion Experiment as a Challenge to Research Ethics</article-title>
          <source>MaC</source>
          <year>2016</year>
          <month>10</month>
          <day>10</day>
          <volume>4</volume>
          <issue>4</issue>
          <fpage>75</fpage>
          <lpage>85</lpage>
          <pub-id pub-id-type="doi">10.17645/mac.v4i4.579</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Acquisti</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Adjerid</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Balebako</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Brandimarte</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Cranor</surname>
              <given-names>LF</given-names>
            </name>
            <name name-style="western">
              <surname>Komanduri</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Leon</surname>
              <given-names>PG</given-names>
            </name>
            <name name-style="western">
              <surname>Sadeh</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Schaub</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Sleeper</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Nudges for Privacy and Security</article-title>
          <source>ACM Comput. Surv</source>
          <year>2017</year>
          <month>10</month>
          <day>09</day>
          <volume>50</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>41</lpage>
          <pub-id pub-id-type="doi">10.1145/3054926</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gefen</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Ben-Porat</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Tennenholtz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Yom-Tov</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Privacy, Altruism, and Experience: Estimating the Perceived Value of Internet Data for Medical Uses</article-title>
          <source>WWW '20: Companion Proceedings of the Web Conference 2020</source>
          <year>2020</year>
          <conf-name>Web Conference 2020</conf-name>
          <conf-date>April 2020</conf-date>
          <conf-loc>Taipei, Taiwan</conf-loc>
          <fpage>552</fpage>
          <lpage>556</lpage>
          <pub-id pub-id-type="doi">10.1145/3366424.3383414</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Vaidya</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Karras</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Goel</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility</article-title>
          <source>IEEE Trans. Dependable and Secure Comput</source>
          <year>2015</year>
          <month>9</month>
          <day>1</day>
          <volume>12</volume>
          <issue>5</issue>
          <fpage>504</fpage>
          <lpage>518</lpage>
          <pub-id pub-id-type="doi">10.1109/tdsc.2014.2369034</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="web">
          <article-title>Individuals using the Internet (% of population)</article-title>
          <source>The World Bank</source>
          <year>2018</year>
          <access-date>2020-05-19</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://data.worldbank.org/indicator/IT.NET.USER.ZS">https://data.worldbank.org/indicator/IT.NET.USER.ZS</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yom-Tov</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Demographic differences in search engine use with implications for cohort selection</article-title>
          <source>Inf Retrieval J</source>
          <year>2019</year>
          <month>1</month>
          <day>1</day>
          <volume>22</volume>
          <issue>6</issue>
          <fpage>570</fpage>
          <lpage>580</lpage>
          <pub-id pub-id-type="doi">10.1007/s10791-018-09349-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Yom-Tov</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Do Search Engine Helpline Notices Aid in Preventing Suicide? Analysis of Archival Data</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>03</month>
          <day>26</day>
          <volume>21</volume>
          <issue>3</issue>
          <fpage>e12235</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/3/e12235/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/12235</pub-id>
          <pub-id pub-id-type="medline">30912753</pub-id>
          <pub-id pub-id-type="pii">v21i3e12235</pub-id>
          <pub-id pub-id-type="pmcid">PMC6454333</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Danescu-Niculescu-Mizil</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Broder</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gabrilovich</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Josifovski</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Pang</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Competing for users' attention: on the interplay between organic and sponsored search results</article-title>
          <source>WWW '10: Proceedings of the 19th International Conference on World Wide Web</source>
          <year>2010</year>
          <conf-name>19th International Conference on World Wide Web</conf-name>
          <conf-date>2010</conf-date>
          <conf-loc>Raleigh, North Carolina</conf-loc>
          <fpage>291</fpage>
          <lpage>300</lpage>
          <pub-id pub-id-type="doi">10.1145/1772690.1772721</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mitchell</surname>
              <given-names>EW</given-names>
            </name>
          </person-group>
          <article-title>The ethics of unsolicited diagnosis of mental disorder in acquaintances: benefits and dangers</article-title>
          <source>Psychiatrist</source>
          <year>2018</year>
          <month>01</month>
          <day>02</day>
          <volume>35</volume>
          <issue>8</issue>
          <fpage>297</fpage>
          <lpage>301</lpage>
          <pub-id pub-id-type="doi">10.1192/pb.bp.110.032953</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ratzan</surname>
              <given-names>RM</given-names>
            </name>
          </person-group>
          <article-title>Unsolicited medical opinion</article-title>
          <source>J Med Philos</source>
          <year>1985</year>
          <month>05</month>
          <volume>10</volume>
          <issue>2</issue>
          <fpage>147</fpage>
          <lpage>62</lpage>
          <pub-id pub-id-type="doi">10.1093/jmp/10.2.147</pub-id>
          <pub-id pub-id-type="medline">4009080</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Preller</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Salloch</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Melanoma in the shopping mall: A utilitarian argument for offering unsolicited medical opinions in informal settings</article-title>
          <source>Bioethics</source>
          <year>2018</year>
          <month>03</month>
          <volume>32</volume>
          <issue>3</issue>
          <fpage>193</fpage>
          <lpage>198</lpage>
          <pub-id pub-id-type="doi">10.1111/bioe.12426</pub-id>
          <pub-id pub-id-type="medline">29369379</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pardun</surname>
              <given-names>JT</given-names>
            </name>
          </person-group>
          <article-title>Good Samaritan Laws: A Global Perspective</article-title>
          <source>Loyola of Los Angeles International and Comparative Law Journal</source>
          <year>1998</year>
          <volume>20</volume>
          <issue>3</issue>
          <fpage>591</fpage>
          <lpage>613</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Youngmann</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Allerhand</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Paltiel</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Yom-Tov</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Arkadir</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>A machine learning algorithm successfully screens for Parkinson's in web users</article-title>
          <source>Ann Clin Transl Neurol</source>
          <year>2019</year>
          <month>12</month>
          <volume>6</volume>
          <issue>12</issue>
          <fpage>2503</fpage>
          <lpage>2509</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1002/acn3.50945"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/acn3.50945</pub-id>
          <pub-id pub-id-type="medline">31714022</pub-id>
          <pub-id pub-id-type="pmcid">PMC6917308</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reynolds</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>A critical examination of the climate engineering moral hazard and risk compensation concern</article-title>
          <source>The Anthropocene Review</source>
          <year>2014</year>
          <month>10</month>
          <day>08</day>
          <volume>2</volume>
          <issue>2</issue>
          <fpage>174</fpage>
          <lpage>191</lpage>
          <pub-id pub-id-type="doi">10.1177/2053019614554304</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shelton</surname>
              <given-names>JD</given-names>
            </name>
          </person-group>
          <article-title>Ten myths and one truth about generalised HIV epidemics</article-title>
          <source>The Lancet</source>
          <year>2007</year>
          <month>12</month>
          <volume>370</volume>
          <issue>9602</issue>
          <fpage>1809</fpage>
          <lpage>1811</lpage>
          <pub-id pub-id-type="doi">10.1016/s0140-6736(07)61755-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hatch</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>Snowball in a Blizzard: A Physician's Notes on Uncertainty in Medicine</source>
          <year>2016</year>
          <publisher-loc>New York, NY, USA</publisher-loc>
          <publisher-name>Basic Books</publisher-name>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
