<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v23i12e28958</article-id>
      <article-id pub-id-type="pmid">34941557</article-id>
      <article-id pub-id-type="doi">10.2196/28958</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Implementation of Fingerprint Technology for Unique Patient Matching and Identification at an HIV Care and Treatment Facility in Western Kenya: Cross-sectional Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Kukafka</surname>
            <given-names>Rita</given-names>
          </name>
        </contrib>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Hannan</surname>
            <given-names>Terry</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Pesälä</surname>
            <given-names>Samuli</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Jaafa</surname>
            <given-names>Noah Kasiiti</given-names>
          </name>
          <degrees>BSc, MHI</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Institute of Biomedical Informatics</institution>
            <institution>Moi University</institution>
            <addr-line>Nandi Road</addr-line>
            <addr-line>Eldoret, PO Box 3900-30100</addr-line>
            <country>Kenya</country>
            <phone>256 753764102</phone>
            <email>kasiitinoah@gmail.com</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8556-4523</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Mokaya</surname>
            <given-names>Benard</given-names>
          </name>
          <degrees>BSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-7178-7109</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Savai</surname>
            <given-names>Simon Muhindi</given-names>
          </name>
          <degrees>BSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6353-0904</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Yeung</surname>
            <given-names>Ada</given-names>
          </name>
          <degrees>MHSA</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-2803-3061</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Siika</surname>
            <given-names>Abraham Mosigisi</given-names>
          </name>
          <degrees>MBChB, MMed</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7669-6612</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Were</surname>
            <given-names>Martin</given-names>
          </name>
          <degrees>MS, MD</degrees>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-6182-093X</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Institute of Biomedical Informatics</institution>
        <institution>Moi University</institution>
        <addr-line>Eldoret</addr-line>
        <country>Kenya</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Vanderbilt Institute for Global Health</institution>
        <institution>Vanderbilt University Medical Center</institution>
        <addr-line>Nashville, TN</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Department of Medicine</institution>
        <institution>School of Medicine</institution>
        <institution>Moi University</institution>
        <addr-line>Eldoret</addr-line>
        <country>Kenya</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Department of Biomedical Informatics and Medicine</institution>
        <institution>Vanderbilt University Medical Center</institution>
        <addr-line>Nashville, TN</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Noah Kasiiti Jaafa <email>kasiitinoah@gmail.com</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>12</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>22</day>
        <month>12</month>
        <year>2021</year>
      </pub-date>
      <volume>23</volume>
      <issue>12</issue>
      <elocation-id>e28958</elocation-id>
      <history>
        <date date-type="received">
          <day>19</day>
          <month>3</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>10</day>
          <month>5</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>16</day>
          <month>6</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>3</day>
          <month>10</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Noah Kasiiti Jaafa, Benard Mokaya, Simon Muhindi Savai, Ada Yeung, Abraham Mosigisi Siika, Martin Were. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 22.12.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2021/12/e28958" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Unique patient identification remains a challenge in many health care settings in low- and middle-income countries (LMICs). Without national-level unique identifiers for whole populations, countries rely on demographic-based approaches that have proven suboptimal. Affordable biometrics-based approaches, implemented with consideration of contextual ethical, legal, and social implications, have the potential to address this challenge and improve patient safety and reporting accuracy. However, limited studies exist to evaluate the actual performance of biometric approaches and perceptions of these systems in LMICs.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The aim of this study is to evaluate the performance and acceptability of fingerprint technology for unique patient matching and identification in the LMIC setting of Kenya.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>In this cross-sectional study conducted at an HIV care and treatment facility in Western Kenya, an open source fingerprint application was integrated within an implementation of the Open Medical Record System, an open source electronic medical record system (EMRS) that is nationally endorsed and deployed for HIV care in Kenya and in more than 40 other countries; hence, it has potential to translate the findings across multiple countries. Participants aged &#62;18 years were conveniently sampled and enrolled into the study. Participants’ left thumbprints were captured and later used to retrieve and match records. The technology’s performance was evaluated using standard measures: sensitivity, false acceptance rate, false rejection rate, and failure to enroll rate. The Wald test was used to compare the accuracy of the technology with the probabilistic patient-matching technique of the EMRS. Time to retrieval and matching of records were compared using the independent samples 2-tailed <italic>t</italic> test. A survey was administered to evaluate patient acceptance and satisfaction with use of the technology.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>In all, 300 participants were enrolled; their mean age was 36.3 (SD 12.2) years, and 58% (174/300) were women. The relevant values for the technology’s performance were sensitivity 89.3%, false acceptance rate 0%, false rejection rate 11%, and failure to enroll rate 2.3%. The technology’s mean record retrieval speed was 3.2 (SD 1.1) seconds versus 9.5 (SD 1.9) seconds with demographic-based record retrieval in the EMRS (<italic>P</italic>&#60;.001). The survey results revealed that 96.3% (289/300) of the participants were comfortable with the technology and 90.3% (271/300) were willing to use it. Participants who had previously used fingerprint biometric systems for identification were estimated to have more than thrice increased odds of accepting the technology (odds ratio 3.57, 95% CI 1.0-11.92).</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Fingerprint technology performed very well in identifying adult patients in an LMIC setting. Patients reported a high level of satisfaction and acceptance. Serious considerations need to be given to the use of fingerprint technology for patient identification in LMICs, but this has to be done with strong consideration of ethical, legal, and social implications as well as security issues.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>biometrics</kwd>
        <kwd>patient matching</kwd>
        <kwd>fingerprints</kwd>
        <kwd>unique patient identification</kwd>
        <kwd>electronic medical record systems</kwd>
        <kwd>low- and middle-income countries (LMICs)</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Unique patient matching and identification across health services is an operational challenge in many health care settings [<xref ref-type="bibr" rid="ref1">1</xref>-<xref ref-type="bibr" rid="ref4">4</xref>]. Commonly used identifiers such as patient names, ID numbers, national ID numbers, and dates of birth are often inadequate at guaranteeing unique patient identification, and sometimes these data may not be available [<xref ref-type="bibr" rid="ref5">5</xref>-<xref ref-type="bibr" rid="ref7">7</xref>]. Failure to correctly match patients largely contributes to inefficiencies in care delivery, resulting in medical errors that can affect patient safety [<xref ref-type="bibr" rid="ref8">8</xref>]. In the United States alone, an estimated average of 400,000 deaths occur annually because of medical errors [<xref ref-type="bibr" rid="ref9">9</xref>]. The problem is even more significant in low- and middle-income countries (LMICs), with many of these countries yet to implement accurate and comprehensive person identification procedures that ensure unambiguous identification of all citizens and residents [<xref ref-type="bibr" rid="ref10">10</xref>].</p>
        <p>Patient identity management has relied heavily on either deterministic or probabilistic algorithms, as well as other statistical matching procedures [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>]. Deterministic matching algorithms use exact match or comparisons between 2 fields [<xref ref-type="bibr" rid="ref13">13</xref>]. These algorithms compare identifiers such as national IDs for each record to determine a match. Probabilistic matching, which is by far the most widely implemented technique for record matching [<xref ref-type="bibr" rid="ref14">14</xref>], does not necessarily depend on unique identifiers [<xref ref-type="bibr" rid="ref15">15</xref>]. This technique assigns weights to records to calculate the probability of linkage among them; it then uses the observed frequency of agreement and disagreement patterns among the records. The total linkage weight is then compared with a threshold above which pairs are considered a match [<xref ref-type="bibr" rid="ref16">16</xref>-<xref ref-type="bibr" rid="ref18">18</xref>]. The challenge with deterministic algorithms is their lack of scalability and the requirement for expensive customization and business rule revisions as databases grow in size [<xref ref-type="bibr" rid="ref19">19</xref>]. Furthermore, not all probabilistic algorithms applied to the same set of circumstances yield results with the same degree of accuracy because they are based on field-specific weights rather than value-specific weights [<xref ref-type="bibr" rid="ref20">20</xref>]. Application of statistical matching approaches is further limited where patients may have isolated sets of their information distributed across multiple disparate systems. In addition, people may not consistently use their official names, with some preferring to use abbreviations or alternative expressions. Name misspellings and name-order transpositions are also encountered [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>].</p>
        <p>In our own institutional experience, the evaluation of various 4-string manipulation strategies to improve the performance of probabilistic models of patient matching based on Kenyan names revealed a suboptimal specificity and positive predictive value of &#60;50% when matching patient names from 2 independent clinical databases [<xref ref-type="bibr" rid="ref23">23</xref>]. This was indeed a low level of performance accuracy, especially in a health care setting. It is therefore imperative that better patient-matching approaches are determined, especially as settings start to exchange, aggregate, and centralize clinical data from multiple sources. Beyond matching performance, any approach to be considered has to be relatively affordable, feasible, and acceptable in LMIC care settings.</p>
      </sec>
      <sec>
        <title>Use of Fingerprinting</title>
        <p>Biometric approaches offer a potential solution to the challenge by trying to tackle some of issues identified in the traditional patient-matching algorithms [<xref ref-type="bibr" rid="ref24">24</xref>]. The use of fingerprinting is already quite common in many LMICs, often for national-level voter registration and immigration services, among others. Fingerprinting and other biometric technologies are not without challenges. Special consideration needs to be given to the ethical, cultural, social, and legal implications of these solutions [<xref ref-type="bibr" rid="ref25">25</xref>]. For example, some people may have concerns about the safety, encryption, and secondary use of their biometric data [<xref ref-type="bibr" rid="ref26">26</xref>]. Studies have cited concerns by users about the hygiene of touching these devices [<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref29">29</xref>]. Given the potential benefits of these technologies for improving patient matching and the poor performance of existing statistical patient-matching models, rigorous evaluations need to be conducted that weigh fingerprinting benefits (improving matching) against concerns by key stakeholders.</p>
        <p>The basic principle of biometric authentication is that everyone is unique and can be identified by their intrinsic physical or behavioral traits [<xref ref-type="bibr" rid="ref30">30</xref>]. Biometric technologies such as fingerprinting offer a potentially promising solution given that fingerprinting scanners are ubiquitous, the technology is relatively easy to acquire and use [<xref ref-type="bibr" rid="ref31">31</xref>], the scanners require minimal database memory requirements, and there have been several demonstrated instances of their large-scale implementation and dominance in other sectors [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]. A fingerprint consists of a pattern of ridges and valleys in the surface of the fingertips, and its formation is related to the earlier fetal months [<xref ref-type="bibr" rid="ref34">34</xref>]. It is the ridges and valleys that are extracted as minutiae that are converted into a template for storage in the database. The template is always retrieved and compared with a fresh scan (new template) during matching and identifications processes [<xref ref-type="bibr" rid="ref35">35</xref>]. In this study, we set out to (1) evaluate the performance of using fingerprint biometric technology for patient matching within an LMIC setting and (2) evaluate acceptability and patient perception of using this system for patient identification and matching.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Study Setting and Participants</title>
        <p>This study was conducted at care facilities served by the Academic Model Providing Access to Healthcare (AMPATH) in Western Kenya. The program offers HIV care and treatment services, with more than 100,000 patients who have tested positive for HIV currently under care. The program operates in partnership with Kenya’s Ministry of Health and with support from the United States Agency for International Development. This study was conducted at AMPATH clinical facilities located in Eldoret, Kenya. The study population included consenting patients aged ≥18 years visiting the AMPATH clinics for care. Patients aged &#60;18 years were excluded because of the intricacies involved in obtaining their consent and in filling surveys. AMPATH uses an adaptation of the Open Medical Record System, an open source electronic medical record system (EMRS) deployed widely in LMICs [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]. Patient records in the system contain demographic information that includes several patient attributes, for example, name, age or birthdate, national ID number if available, and telephone number. The Fellegi–Sunter algorithm is used within the EMRS for patient matching. The Fellegi–Sunter algorithm is a weighted probabilistic-based record linkage approach that relies on matching weights to compute a maximum likelihood estimate that determines whether a record pair is a match or nonmatch [<xref ref-type="bibr" rid="ref38">38</xref>].</p>
      </sec>
      <sec>
        <title>Study Design</title>
        <p>The mUzima Fingerprint Module version 1.0 was developed to work as an integrated module within the EMRS in a client server–model architecture. The module was developed using Java Web Start (Oracle Corporation), which uses the Java Network Launching Protocol to download and run the fingerprint application locally on the client machine. This particular technology provides an easy 1-click activation of remotely hosted applications, guaranteeing application efficiency and elimination of complicated installation or upgrade procedures [<xref ref-type="bibr" rid="ref39">39</xref>].</p>
      </sec>
      <sec>
        <title>Fingerprint Technology–Matching Algorithm</title>
        <p>The fingerprint-matching technology was based on the Bozorth3 fingerprint-matching algorithm (National Institute of Standards and Technology) [<xref ref-type="bibr" rid="ref40">40</xref>]. Bozorth3, a minutiae-based algorithm, does both one-to-one and one-to-many matching operations. The recommended Bozorth3 threshold is the integer 40. However, during the technology testing phase, test runs at a threshold of 40 often produced false positives, and after numerous tests, a threshold of 70 proved to be a better measure to work with for this study. For every patient, 3 instances of the same left thumbprint were captured, converted into templates, and stored in the database. A patient was identified positively if any of the 3 instances returned a matching value of ≥70, the set threshold; otherwise, it returned a nonmatch.</p>
      </sec>
      <sec>
        <title>Fingerprint Technology User Interface</title>
        <p>The fingerprint module user interface provided 2 options for searching a patient either by their demographic information (name) or by fingerprint. A name search using the probabilistic patient-matching algorithm of the current EMRS returned all database instances with the same or similar name, with matches refined as more information was entered (<xref rid="figure1" ref-type="fig">Figure 1</xref>). However, when the same person was searched using their fingerprint as the identifier, a distinct and unique result was returned (<xref rid="figure2" ref-type="fig">Figure 2</xref>). The workflow for the fingerprint technology module is presented in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Screenshot showing the output of a patient search (“Mark”) using a probabilistic-based algorithm.</p>
          </caption>
          <graphic xlink:href="jmir_v23i12e28958_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Screenshot showing the output of a patient search (“Mark”) using fingerprint technology.</p>
          </caption>
          <graphic xlink:href="jmir_v23i12e28958_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Matching Accuracy and Time to Retrieve Records (Fingerprint Technology vs Probabilistic Matching)</title>
        <p>The current probabilistic patient-matching method used within the AMPATH EMRS was compared with the integrated fingerprint-matching and identification module. A convenience sample of 300 patients was recruited and enrolled for the study. When the patients arrived at the clinic for the visit, they received informed consent from the study researcher (NJK), and if they consented, 3 instances of their left thumbprint were captured through the EMRS interface. The fingerprint module converted the captured prints into a template and stored them in the database for later use, to either match or retrieve records. Record retrieval was performed at different points of care within the facility, as would have been required of a provider retrieving a patient record before offering care.</p>
        <p>The performance of the fingerprint technology was evaluated using standard measures: participants correctly identified, sensitivity, false acceptance rate (FAR), false rejection rate (FRR), and failure to enroll rate (FER). The Wald test for proportions was used to compare the accuracy of the fingerprint technology with that of the Fellegi–Sunter probabilistic patient-matching technique used within the EMRS. Time to matching and retrieval of records (measured in seconds using a timer) were compared when records were retrieved through matching of data entered by clinical personnel against those retrieved through fingerprint technology–based patient matching. A survey was also administered to evaluate participants’ acceptance and satisfaction of the fingerprint technology (<xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>). The survey evaluated participants’ understanding, comfort, perception, and willingness to accept the use of fingerprint technology for patient identification.</p>
      </sec>
      <sec>
        <title>Fingerprint Technology Performance Measures (FAR, FRR, and FER)</title>
        <p>Data entry and analyses were performed using STATA software (version 13.1 SE; StataCorp LLC). Age was summarized using mean and the corresponding SD. Categorical variables, for example, gender, level of education, and occupation, were summarized using frequencies and the corresponding percentages. Calculations were also performed on the standard biometric measures (<xref ref-type="table" rid="table1">Table 1</xref>).</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Calculated fingerprint technology performance measures.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="170"/>
            <col width="460"/>
            <col width="370"/>
            <thead>
              <tr valign="top">
                <td>Measure</td>
                <td>Definition</td>
                <td>Formula</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Sensitivity</td>
                <td>The ability of a system to correctly identify and match patients enrolled in the database</td>
                <td>True positives/(true positives + false negatives) × 100</td>
              </tr>
              <tr valign="top">
                <td>Specificity</td>
                <td>The ability of the system to correctly reject patients not enrolled in the database</td>
                <td>True negatives/(true negatives + false positives) × 100</td>
              </tr>
              <tr valign="top">
                <td>False acceptance rate</td>
                <td>The probability that a user who should be rejected is accepted by the system</td>
                <td>False acceptance/total number of attempts × 100</td>
              </tr>
              <tr valign="top">
                <td>False rejection rate</td>
                <td>The probability that a user who should be accepted is rejected by the system</td>
                <td>False rejection/total number of attempts × 100</td>
              </tr>
              <tr valign="top">
                <td>Failure to enroll rate</td>
                <td>The rate at which attempts to create a template from a scanned image are unsuccessful</td>
                <td>False attempts/total number of attempts × 100</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Acceptability of the Fingerprint-Matching System</title>
        <p>Acceptability of the fingerprint biometric system was derived using 3 stand-alone variables: willingness to use the fingerprint system in the future, threats to patient privacy as a result of using the biometric system, and comfort while using the system during registration. The association between categorical variables and acceptability was assessed using the Pearson chi-square test. The logistic regression model was used to assess the predictors of acceptability of the fingerprint biometric system. Odds ratios and the corresponding 95% CIs were reported. The Wald test for proportions was used to compare the level of accuracy of the fingerprint technology with the null value (level of accuracy reported of the probabilistic patient-matching approach).</p>
        <p>This study was approved by the institutional review and ethics committee at Moi University in Eldoret, Kenya (MU/MTRH-IREC approval number FAN: IREC 1832).</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Overview</title>
        <p>A total of 307 participants who were approached consented to the study, of whom 300 (97.7%) were registered using the fingerprint technology for enrollment into the study; the other 7 (2.3%) could not be enrolled because of difficulties in acquiring their prints, thus leading to an FER of 2.3%.</p>
        <p>Demographic details of those enrolled are outlined in <xref ref-type="table" rid="table2">Table 2</xref>. The participants’ mean age was 36.3 (SD 12.2) years. Of the 300 participants, 174 (58%) were women and 215 (71.7%) had secondary or higher level of education (<xref ref-type="table" rid="table2">Table 2</xref>).</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Sociodemographic characteristics of participants (N=300).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="690"/>
            <col width="280"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Variable</td>
                <td>Values</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="2">Age (years), mean (SD)</td>
                <td>36.1 (12.3)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Gender, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Male</td>
                <td>126 (42)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Female</td>
                <td>174 (58)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Education level, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Informal</td>
                <td>10 (3.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Primary</td>
                <td>75 (25)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Secondary</td>
                <td>78 (26)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Tertiary (college or university graduate)</td>
                <td>137 (45.7)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>Occupation, n (%)</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Student</td>
                <td>66 (22)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Working or retired</td>
                <td>125 (41.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Informal employment</td>
                <td>109 (36.3)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Fingerprint Technology Performance</title>
        <p>Considering the 300 appropriately scanned fingerprints, the system had a sensitivity of 89.3% (268/300) and a specificity of zero. However, the 32 unidentified fingerprints during the patient-matching exercise were included as false negatives (32/300, 10.7%; <xref ref-type="table" rid="table3">Table 3</xref>).</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>False acceptance rate (FAR), false rejection rate (FRR), and failure to enroll rate (FER) for the fingerprint technology.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="470"/>
            <col width="440"/>
            <col width="90"/>
            <thead>
              <tr valign="top">
                <td>Metric</td>
                <td>Calculation</td>
                <td>Result (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>FER</td>
                <td>7/307 × 100</td>
                <td>2.3</td>
              </tr>
              <tr valign="top">
                <td>FAR</td>
                <td>0/300 × 100</td>
                <td>0</td>
              </tr>
              <tr valign="top">
                <td>FRR</td>
                <td>32/300 × 100</td>
                <td>10.7</td>
              </tr>
              <tr valign="top">
                <td>Sensitivity</td>
                <td>268/(266 + 32) × 100</td>
                <td>89.3</td>
              </tr>
              <tr valign="top">
                <td>Specificity</td>
                <td>0/(0 + 0) × 100</td>
                <td>0</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>FAR, FRR, and FER</title>
        <p>The fingerprint technology had an FAR of 0%, signifying that the technology was able to perfectly determine that an individual was not yet enrolled into the system, returning such instances as nonmatches. However, of the 300 enrolled individuals, 32 (10.7%) were falsely considered nonmatches (FRR), signifying that some individuals who were in the system could sometimes not be matched (<xref ref-type="table" rid="table3">Table 3</xref>). The reasons for the slightly high FRR were as follows: (1) weak finger pressure on the scanner (12/32, 37%), (2) faded prints (6/32, 19%), (3) scars on the thumb (6/32, 19%), (4) scanner response failure error (5/32, 16%), and (5) low-quality images (3/32, 9%). Of these reasons, (4) and (5) were system-generated notifications, whereas the rest were manually observed and tallied by the research team during the exercise.</p>
      </sec>
      <sec>
        <title>Matching Accuracy and Time to Retrieve Records (Fingerprint Technology vs Probabilistic Matching)</title>
        <p>The accuracy of the fingerprint technology compared with that of the already established accuracy levels of the EMRS that ranged from a minimum of 50% to a maximum of 70% showed a value of <italic>P</italic>&#60;.001 at both minimum and maximum levels, with a power of &#62;99%. It took an average of 3.2 (SD 1.1, range 1.0-6.8) seconds to retrieve patient records using the fingerprint technology compared with 9.5 (SD 1.9, range 6.0-13.0) seconds (<italic>P</italic>&#60;.001) using the probabilistic algorithm of the AMPATH Medical Record System.</p>
      </sec>
      <sec>
        <title>Participants’ Perception of Biometric Systems</title>
        <p>Of the 300 participants, only 107 (35.7%) had heard of a biometric system before; 34 (11.3%) had used a fingerprint identification system before and 11 (3.7%) a facial recognition system, whereas none had used either an eye or iris identification system or a voice-based identification system. Of the 300 participants, 255 (85%) either strongly agreed (65.7%, 197/300) or agreed (19.3%, 58/300) that a biometric system could improve identification, 30 (10%) disagreed, and 15 (5%) responded “Don’t know” to this question. Of the 300 participants, 289 (96.3%) were comfortable or very comfortable with using the fingerprint system, 290 (96.7%) expressed satisfaction with the system, and 271 (90.3%) were willing to use fingerprint technology for patient matching and identification in the future (<xref ref-type="table" rid="table4">Table 4</xref>). Most (241/300, 80.3%) of the participants did not think that technology threatened their privacy.</p>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Participants’ perception of the piloted fingerprint biometric system (N=300).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="690"/>
            <col width="0"/>
            <col width="280"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Variable</td>
                <td>Values, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>Level of comfort during registration using fingerprint system</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Very comfortable</td>
                <td colspan="2">228 (76)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Comfortable</td>
                <td colspan="2">61 (20.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>A little comfortable</td>
                <td colspan="2">5 (1.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Not comfortable</td>
                <td colspan="2">3 (1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Would rather not say</td>
                <td colspan="2">3 (1)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>General perception of the system</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Satisfied</td>
                <td colspan="2">290 (96.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Dissatisfied</td>
                <td colspan="2">10 (3.3)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Willing to use fingerprint system in future</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Yes</td>
                <td colspan="2">271 (90.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>No</td>
                <td colspan="2">8 (2.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Don’t know</td>
                <td colspan="2">21 (7)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Technology threatens own privacy</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Yes</td>
                <td colspan="2">45 (15)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>No</td>
                <td colspan="2">241 (80.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Don’t know</td>
                <td colspan="2">14 (4.7)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Acceptability of Fingerprint Matching</title>
        <p>Acceptability of the fingerprint technology was derived from 3 variables: participants’ comfort: 96.3% (289/300), willingness to use the fingerprint technology in the future: 90.3% (271/300), and participants’ concerns regarding their privacy: 15% (45/300). The variables used to denote acceptability were further combined, that is, acceptability=yes if a participant was willing to use the fingerprint biometric system in the future, was comfortable or very comfortable using the fingerprint biometric system during registration, and did not feel that their privacy was threatened. The derived composite revealed that up to 77% (231/300) of the participants demonstrated acceptability of the fingerprint biometric system.</p>
        <p>The Pearson chi-square test demonstrated no association between sociodemographic characteristics and acceptability of the fingerprint technology. However, the findings revealed that the respondents who agreed that the fingerprint technology offered an improved solution for patient matching were associated with the acceptability of the fingerprint technology for future use, 87.5% (202/300) versus 76.8% (53/300; <italic>P</italic>=.03). Similarly, the respondents who were satisfied with the fingerprint technology for identification were also associated with the acceptability of the fingerprint system for future use, 99.1% (229/300) versus 88.4% (61/300; <italic>P</italic>=.001; <xref ref-type="table" rid="table5">Table 5</xref>).</p>
        <p>After adjusting for the opinion on whether the fingerprint biometric system offered an improved solution, opinion on whether the current patient identifiers (eg, IDs and patient numbers) offered an appropriate solution for identification, previous knowledge of biometric systems, and occupation, participants who had previously used fingerprint biometric systems for identification were estimated to have more than thrice the increased odds of accepting the fingerprint biometric system (odds ratio 3.57, 95% CI 1.0-11.92; <xref ref-type="table" rid="table6">Table 6</xref>).</p>
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Bivariate associations of participants’ perception of biometrics and acceptability of the fingerprint technology system (N=300).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="540"/>
            <col width="180"/>
            <col width="180"/>
            <col width="0"/>
            <col width="70"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Variables</td>
                <td colspan="3">Acceptable in the future, n (%)</td>
                <td><italic>P</italic> value</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <break/>
                </td>
                <td>No (n=69)</td>
                <td>Yes (n=231)</td>
                <td colspan="2">
                  <break/>
                </td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="6">
                  <bold>Have ever heard of biometric systems before</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>No</td>
                <td>42 (60.9)</td>
                <td>151 (65.4)</td>
                <td colspan="2">—<sup>a</sup></td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Yes</td>
                <td>27 (39.1)</td>
                <td>80 (34.6)</td>
                <td colspan="2">.49</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>Have ever used fingerprint biometric system before</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>No</td>
                <td>65 (94.2)</td>
                <td>203 (87.9)</td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Yes</td>
                <td>4 (5.8)</td>
                <td>28 (12.1)</td>
                <td colspan="2">.14</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>Opinion on whether the current patient identifiers (eg, IDs and patient numbers) offer an appropriate solution for identification</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Agree or strongly agree</td>
                <td>30 (43.5)</td>
                <td>79 (34.2)</td>
                <td colspan="2">.16</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Disagree or strongly disagree or don’t know</td>
                <td>39 (56.5)</td>
                <td>152 (65.8)</td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>Opinion on whether biometric systems offer improved solution</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Agree or strongly agree</td>
                <td>53 (76.8)</td>
                <td>202 (87.5)</td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Disagree or strongly disagree or don’t know</td>
                <td>16 (23.2)</td>
                <td>29 (12.6)</td>
                <td colspan="2">.03<sup>b</sup></td>
              </tr>
              <tr valign="top">
                <td colspan="6">
                  <bold>General perception of the system</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Dissatisfied</td>
                <td>8 (11.6)</td>
                <td>2 (0.9)</td>
                <td colspan="2">—</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Satisfied</td>
                <td>61 (88.4)</td>
                <td>229 (99.1)</td>
                <td colspan="2">.001<sup>b</sup></td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table5fn1">
              <p><sup>a</sup>Not available.</p>
            </fn>
            <fn id="table5fn2">
              <p><sup>b</sup>Pearson chi-square test.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table6">
          <label>Table 6</label>
          <caption>
            <p>Determinants of acceptability of the fingerprint biometric system (N=300).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="610"/>
            <col width="220"/>
            <col width="140"/>
            <thead>
              <tr valign="bottom">
                <td colspan="2">Variables</td>
                <td>UOR<sup>a</sup> (95% CI)</td>
                <td>AOR<sup>b</sup> (95% CI)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="4">
                  <bold>Biometric systems offer improved solution</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Disagree or strongly disagree or don’t know</td>
                <td>Reference</td>
                <td>Reference</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Agree or strongly agree</td>
                <td>2.10 (1.06-4.16)</td>
                <td>2.30 (1.12-4.69)</td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Current patient identifiers offer an appropriate solution for identification</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Disagree or strongly disagree or don’t know</td>
                <td>Reference</td>
                <td>Reference</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Agree or strongly agree</td>
                <td>0.68 (0.39-1.17)</td>
                <td>0.61 (0.34-1.09)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">Have ever heard of biometric systems before</td>
                <td>0.82 (0.47-1.43)</td>
                <td>0.51 (0.27-0.96)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">Have ever used fingerprint biometric system for identification</td>
                <td>2.24 (0.76-6.63)</td>
                <td>3.57 (1.07-11.92)<sup>c</sup></td>
              </tr>
              <tr valign="top">
                <td colspan="4">
                  <bold>Occupation</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Working or retired vs student</td>
                <td>1.30 (0.63-2.71)</td>
                <td>1.56 (0.73-3.33)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Informal employment vs student</td>
                <td>0.74 (0.36-1.51)</td>
                <td>0.72 (0.34-1.53)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table6fn1">
              <p><sup>a</sup>UOR: unadjusted odds ratio.</p>
            </fn>
            <fn id="table6fn2">
              <p><sup>b</sup>AOR: adjusted odds ratio.</p>
            </fn>
            <fn id="table6fn3">
              <p><sup>c</sup>Pearson chi-square test.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>The matching speed of the fingerprint technology was significantly lower and better than that of the demographic-based retrieval matching technology, that is, 3.2 (SD 1.1) seconds versus 9.5 (SD 1.9) seconds (<italic>P</italic>&#60;.001). The system operated in a mode where no imposter was falsely considered a match in 300 attempts. However, 10.7% (32/300) of the genuine attempts were falsely considered as nonmatches (FAR 0/300 = 0.0% at an FRR 32/300 = 10.7%). The participants’ acceptability of the technology was demonstrated with most (289/300, 96.3%) of them indicating that they were comfortable with the technology and 90.3% (271/300) being willing to use the technology in the future. Although concerns about performance and acceptability of biometric technologies, especially fingerprint technology, are often discussed, few studies have comprehensively evaluated this technology in LMICs, despite fingerprint technology being widely available and affordable in these settings. Existing studies have largely described development of fingerprint technology systems without reporting on the performance using standard measures [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. The few that have evaluated performance have not looked at the perceptions and acceptability of these systems [<xref ref-type="bibr" rid="ref43">43</xref>]. To our knowledge, this is the first study to comprehensively evaluate performance, acceptability, and attitudes toward the use of fingerprint technology in an LMIC setting. The accuracy of the fingerprint technology–matching algorithm was significantly higher than that of the existing Fellegi–Sunter probabilistic algorithm. This is in line with the previous demonstration of the accuracy of fingerprint systems through systematic reviews, for example, a study of this technology in Nigeria recorded a success rate of 94% [<xref ref-type="bibr" rid="ref43">43</xref>]. Not only did we demonstrate that fingerprint technology performed well, but we also demonstrated that it was more efficient than the traditional record-searching mechanisms at retrieving patient records from the EMRS. Data from this study add to the body of evidence of the potential of fingerprint technology to improve patient identification and matching in LMICs, which often lack unique identifiers and which experience other challenges to patient identification.</p>
        <p>Despite performing better than traditional patient-matching approaches, the technology still failed to enroll a small number of individuals (FER 2.3%, 7/300) and to match 10.7% (32/300) of the registered individuals (FRR 10.7%, 32/300). A key reason for the failure to identify 10.7% (32/300) of the registered individuals was related to issues with the thumbprint of the individual patient (worn out thumbprint), signifying that performance of these systems could be improved by considering alternative or multiple fingers when one did not suffice. The other reasons were related to operator and technology issues, also suggesting that improving the scanner and software could improve system performance. To reduce costs, we tested the technology using only 1 scanner type (DigitalPersona U.are.U 4500; DigitalPersona, Inc) with open source software, but we recognize that there are other scanners that could perform better. There also needs to be better training of operators and improved level of machine-generated notifications to improve performance. In the COVID-19 pandemic era, it is important to not only understand how to operate these systems beyond simply recording fingerprints, but to also learn how to ensure that scanners are cleaned well and social distancing is maintained between the operator and the patient whose fingerprint is being captured. The aforementioned findings also suggest that fingerprint technology should not necessarily be seen as a replacement for traditional deterministic and probabilistic methods; rather, it should be looked upon as an additional and complementary enhancement.</p>
        <p>This study indicated that fingerprint technology would be acceptable to patients in these settings. A surprisingly high number of participants (271/300, 90.3%) were willing to use the technology and expressed satisfaction with its use (290/300, 96.7%). This aligns with the findings from another study on adoption of fingerprint scanning during contact investigation for tuberculosis in Kampala, Uganda, where fingerprint technology was found to be feasible and acceptable [<xref ref-type="bibr" rid="ref44">44</xref>]. A notable finding in our study was that participants’ sociodemographic characteristics and their perceptions were generally not associated with acceptability of the fingerprint technology. Previous users of the fingerprint technology biometric system were associated with more than thrice the increased odds of accepting the fingerprint biometric solution, signifying that if implemented well, fingerprint technology is likely to achieve even more acceptance with patients.</p>
        <p>Only 15% (45/300) of the participants felt that the technology threated their privacy. Previous studies have demonstrated similar lower concern regarding privacy in LMICs. As an example, in a study evaluating authentication options for mobile health apps in younger and older adults, only approximately 10% of the participants were concerned about the storage of their face scans, whereas only 4% were concerned about the privacy requirements [<xref ref-type="bibr" rid="ref45">45</xref>]. Users’ concerns regarding privacy tend to be paradoxical because they sometimes vary depending on the technology and user knowledge of the subject [<xref ref-type="bibr" rid="ref46">46</xref>]. Despite our participant responses, privacy remains a key concern with fingerprint technology. In LMICs, there is a particular need for patient education and sensitization on the privacy and security of these technologies. Furthermore, there should be strong frameworks, guidelines, and standard operating procedures that cover ownership, control, and use of, as well as access to, patients’ biometric data [<xref ref-type="bibr" rid="ref47">47</xref>]. In fact, in settings such as those of LMICs, more protections are needed, given that patients might be vulnerable simply because they may have less understanding of the technology. As previously described, ethical guidelines to consider while implementing biometrics should include, but not be limited to, the following: (1) secondary principles and rights (right of access to information and data protection principles), (2) surveillance society issues (choice, power, empowerment, transparency and accountability, consent, and communication with the user), and (3) health and hygiene concerns regarding biometrics (physical contact between people providing the biometric data and the official enrolling the individuals) [<xref ref-type="bibr" rid="ref48">48</xref>].</p>
        <p>This study included several limitations that deserve a mention. The technology was tested on only 1 scanner type (DigitalPersona U.are.U 4500), and only the thumbprint was used. Although the system performed very well, there is room for improvement to incorporate the capture of more fingers and to leverage the features of other scanners. In addition, infants were not catered for in this study, given the known challenges with fingerprint capture in this population [<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref50">50</xref>]. Beyond attitudes and perceptions of patients, it would also be important to capture the perceptions of other stakeholders regarding fingerprint technologies, including providers, managers, and health ministry leaders. The next steps include further refinement of this system and working with key stakeholders to determine its role in supporting national health information systems in Kenya and other countries.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Fingerprint biometric technology offers an improved patient identification mechanism compared with traditional deterministic and probabilistic techniques. Accuracy can be greatly improved when more than one finger is captured during enrollment because this captures more minutiae. The technology is also acceptable to patients in resource-limited settings. However, large-scale deployment should take ethical, legal, and social implications as well as security issues into consideration.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Fingerprint capture workflow.</p>
        <media xlink:href="jmir_v23i12e28958_app1.png" xlink:title="PNG File , 105 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Questionnaire to evaluate patient perception of fingerprinting patient identification system.</p>
        <media xlink:href="jmir_v23i12e28958_app2.docx" xlink:title="DOCX File , 55 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AMPATH</term>
          <def>
            <p>Academic Model Providing Access to Healthcare</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">EMRS</term>
          <def>
            <p>electronic medical record system</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">FAR</term>
          <def>
            <p>false acceptance rate</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">FER</term>
          <def>
            <p>failure to enroll rate</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">FRR</term>
          <def>
            <p>false rejection rate</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">LMIC</term>
          <def>
            <p>low- and middle-income country</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work was supported in part by the Norwegian Programme for Capacity Development in Higher Education and Research for Development program (Norwegian Agency for Development Cooperation: Project #QZA-0484, Health Informatics Training and Research in East Africa for Improved Health Care project). The content is solely the responsibility of the authors and does not necessarily represent the official views of the Norwegian Agency for Development Cooperation. The authors would like to appreciate the patients who spared their time to share their experiences and opinions. Thanks especially to Academic Model Providing Access to Healthcare Kenya for granting the authors permission to use the facility as the study site.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Morris</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Farnum</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Afzal</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Robinson</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Greene</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Coughlin</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Patient identification and matching final report</article-title>
          <source>Audacious Inquiry, LLC - Prepared for the Office of the National Coordinator for Health Information Technology</source>
          <year>2014</year>
          <access-date>2021-11-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.healthit.gov/sites/default/files/patient_identification_matching_final_report.pdf">https://www.healthit.gov/sites/default/files/patient_identification_matching_final_report.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cidon</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Why patient identification remains a daunting challenge for healthcare</article-title>
          <source>Healthcare Innovation</source>
          <year>2018</year>
          <access-date>2021-11-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hcinnovationgroup.com/clinical-it/article/13009738/why-patient-identification-remains-a-daunting-challenge-for-healthcare">https://tinyurl.com/2tn9373d</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gliklich</surname>
              <given-names>RE</given-names>
            </name>
            <name name-style="western">
              <surname>Dreyer</surname>
              <given-names>NA</given-names>
            </name>
            <name name-style="western">
              <surname>Leavy</surname>
              <given-names>MB</given-names>
            </name>
          </person-group>
          <source>Registries for Evaluating Patient Outcomes: A User's Guide [Internet]. 3rd edition</source>
          <year>2014</year>
          <publisher-loc>Rockville (MD)</publisher-loc>
          <publisher-name>Agency for Healthcare Research and Quality (US)</publisher-name>
          <fpage>1</fpage>
          <lpage>356</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gliklich</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Dreyer</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Leavy</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Registries for Evaluating Patient Outcomes: A User’s Guide. Third edition. Vol 2</source>
          <year>2010</year>
          <publisher-loc>Maryland</publisher-loc>
          <publisher-name>Agency for Healthcare Research and Quality</publisher-name>
          <fpage>38</fpage>
          <lpage>39</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Riplinger</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Piera-Jiménez</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Dooling</surname>
              <given-names>JP</given-names>
            </name>
          </person-group>
          <article-title>Patient identification techniques - approaches, implications, and findings</article-title>
          <source>Yearb Med Inform</source>
          <year>2020</year>
          <month>08</month>
          <volume>29</volume>
          <issue>1</issue>
          <fpage>81</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.thieme-connect.com/DOI/DOI?10.1055/s-0040-1701984"/>
          </comment>
          <pub-id pub-id-type="doi">10.1055/s-0040-1701984</pub-id>
          <pub-id pub-id-type="medline">32823300</pub-id>
          <pub-id pub-id-type="pmcid">PMC7442501</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fernandes</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>O’Connor</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Accurate patient identification - a global challenge</article-title>
          <source>Perspect Heal Inf Manag</source>
          <year>2015</year>
          <access-date>2021-11-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://perspectives.ahima.org/accurate-patient-identification-a-global-challenge/">https://perspectives.ahima.org/accurate-patient-identification-a-global-challenge/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cylus</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Papanicolas</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>PC</given-names>
            </name>
          </person-group>
          <source>Health System Efficiency: How to Make Measurement Matter for Policy and Management</source>
          <year>2016</year>
          <publisher-loc>Geneva</publisher-loc>
          <publisher-name>World Health Organization</publisher-name>
          <fpage>1</fpage>
          <lpage>242</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Landi</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>For hospitals, patient misidentification impacts patient safety, productivity and the bottom line</article-title>
          <source>Healthcare Innovation</source>
          <year>2016</year>
          <access-date>2021-11-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hcinnovationgroup.com/finance-revenue-cycle/article/13027873/for-hospitals-patient-misidentification-impacts-patient-safety-productivity-and-the-bottom-line">https://tinyurl.com/5f5ua36u</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Makary</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Daniel</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Medical error-the third leading cause of death in the US</article-title>
          <source>Br Med J</source>
          <year>2016</year>
          <month>05</month>
          <day>03</day>
          <volume>353</volume>
          <fpage>i2139</fpage>
          <pub-id pub-id-type="doi">10.1136/bmj.i2139</pub-id>
          <pub-id pub-id-type="medline">27143499</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Verbeke</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Karara</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Van Bastelaere</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Nyssen</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Patient identification and hospital information management systems in Sub-Saharan Africa: a prospective study in Rwanda and Burundi</article-title>
          <source>Rwanda Med J</source>
          <year>2012</year>
          <volume>69</volume>
          <issue>4</issue>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.bioline.org.br/pdf?rw12002"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hagger-Johnson</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Harron</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Goldstein</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Aldridge</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Gilbert</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Probabilistic linkage to enhance deterministic algorithms and reduce data linkage errors in hospital administrative data</article-title>
          <source>J Innov Health Inform</source>
          <year>2017</year>
          <month>06</month>
          <day>30</day>
          <volume>24</volume>
          <issue>2</issue>
          <fpage>891</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://dx.doi.org/10.14236/jhi.v24i2.891"/>
          </comment>
          <pub-id pub-id-type="doi">10.14236/jhi.v24i2.891</pub-id>
          <pub-id pub-id-type="medline">28749318</pub-id>
          <pub-id pub-id-type="pmcid">PMC6217911</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Just</surname>
              <given-names>BH</given-names>
            </name>
            <name name-style="western">
              <surname>Marc</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Munns</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sandefer</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Why patient matching is a challenge: research on master patient index (MPI) data discrepancies in key identifying fields</article-title>
          <source>Perspect Health Inf Manag</source>
          <year>2016</year>
          <volume>13</volume>
          <fpage>1e</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/27134610"/>
          </comment>
          <pub-id pub-id-type="medline">27134610</pub-id>
          <pub-id pub-id-type="pmcid">PMC4832129</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schumacher</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Probabilistic versus deterministic data matching: making an accurate decision</article-title>
          <source>Semantic Scholar</source>
          <year>2010</year>
          <access-date>2021-11-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.semanticscholar.org/paper/Probabilistic-Versus-Deterministic-Data-Matching-%3A-Schumacher/743a6f53aa08eb0b89b3c4108c2ab36765658998">https://www.semanticscholar.org/paper/Probabilistic-Versus-Deterministic-Data-Matching-%3A-Schumacher/743a6f53aa08eb0b89b3c4108c2ab36765658998</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sayers</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ben-Shlomo</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Blom</surname>
              <given-names>AW</given-names>
            </name>
            <name name-style="western">
              <surname>Steele</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Probabilistic record linkage</article-title>
          <source>Int J Epidemiol</source>
          <year>2016</year>
          <month>06</month>
          <day>20</day>
          <volume>45</volume>
          <issue>3</issue>
          <fpage>954</fpage>
          <lpage>64</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26686842"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/ije/dyv322</pub-id>
          <pub-id pub-id-type="medline">26686842</pub-id>
          <pub-id pub-id-type="pii">dyv322</pub-id>
          <pub-id pub-id-type="pmcid">PMC5005943</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Verykios</surname>
              <given-names>VS</given-names>
            </name>
            <name name-style="western">
              <surname>Elmagarmid</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Houstis</surname>
              <given-names>EN</given-names>
            </name>
          </person-group>
          <article-title>Automating the approximate record-matching process</article-title>
          <source>Inform Sci</source>
          <year>2000</year>
          <month>7</month>
          <volume>126</volume>
          <issue>1-4</issue>
          <fpage>83</fpage>
          <lpage>98</lpage>
          <pub-id pub-id-type="doi">10.1016/s0020-0255(00)00013-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Elezaj</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Tuxhari</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Record linkage using probabilistic methods and data mining techniques</article-title>
          <source>Mediterr J Soc Sci</source>
          <year>2017</year>
          <volume>8</volume>
          <issue>3</issue>
          <fpage>203</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.5901/mjss.2017.v8n3p203</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dusetzina</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Tyree</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Meyer</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Meyer</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Green</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Carpenter</surname>
              <given-names>WR</given-names>
            </name>
          </person-group>
          <source>Linking Data for Health Services Research: A Framework and Instructional Guide</source>
          <year>2014</year>
          <publisher-loc>Maryland</publisher-loc>
          <publisher-name>Agency for Healthcare Research and Quality and U.S. Department of Health and Human Services</publisher-name>
          <fpage>1</fpage>
          <lpage>86</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Machado</surname>
              <given-names>CJ</given-names>
            </name>
            <name name-style="western">
              <surname>Hill</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Probabilistic record linkage and an automated procedure to minimize the undecided-matched pair problem</article-title>
          <source>Cad Saude Publica</source>
          <year>2004</year>
          <month>08</month>
          <volume>20</volume>
          <issue>4</issue>
          <fpage>915</fpage>
          <lpage>25</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.scielo.br/scielo.php?script=sci_arttext&#38;pid=S0102-311X2004000400005&#38;lng=en&#38;nrm=iso&#38;tlng=en"/>
          </comment>
          <pub-id pub-id-type="doi">10.1590/s0102-311x2004000400005</pub-id>
          <pub-id pub-id-type="medline">15300283</pub-id>
          <pub-id pub-id-type="pii">S0102-311X2004000400005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pita</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Menezes</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Barreto</surname>
              <given-names>ME</given-names>
            </name>
          </person-group>
          <article-title>Applying term frequency-based indexing to improve scalability and accuracy of probabilistic data linkage</article-title>
          <source>LADaS 2018 - Latin America Data Science Workshop</source>
          <year>2018</year>
          <access-date>2024-11-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://ceur-ws.org/Vol-2170/paper9.pdf">http://ceur-ws.org/Vol-2170/paper9.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>VJ</given-names>
            </name>
            <name name-style="western">
              <surname>Overhage</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Egg</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Downs</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Grannis</surname>
              <given-names>SJ</given-names>
            </name>
          </person-group>
          <article-title>An empiric modification to the probabilistic record linkage algorithm using frequency-based weight scaling</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2009</year>
          <month>09</month>
          <day>01</day>
          <volume>16</volume>
          <issue>5</issue>
          <fpage>738</fpage>
          <lpage>45</lpage>
          <pub-id pub-id-type="doi">10.1197/jamia.m3186</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Joffe</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Byrne</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Reeder</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Herskovic</surname>
              <given-names>JR</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>CW</given-names>
            </name>
            <name name-style="western">
              <surname>McCoy</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Sittig</surname>
              <given-names>DF</given-names>
            </name>
            <name name-style="western">
              <surname>Bernstam</surname>
              <given-names>EV</given-names>
            </name>
          </person-group>
          <article-title>A benchmark comparison of deterministic and probabilistic methods for defining manual review datasets in duplicate records reconciliation</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2014</year>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>97</fpage>
          <lpage>104</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/23703827"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/amiajnl-2013-001744</pub-id>
          <pub-id pub-id-type="medline">23703827</pub-id>
          <pub-id pub-id-type="pii">amiajnl-2013-001744</pub-id>
          <pub-id pub-id-type="pmcid">PMC3912727</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fatemi</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Kazemi</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Poole</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Record linkage to match customer names: a probabilistic approach</article-title>
          <source>arXiv</source>
          <year>2018</year>
          <access-date>2021-11-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://arxiv.org/abs/1806.10928">http://arxiv.org/abs/1806.10928</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kasiiti</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Wawira</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Purkayastha</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Were</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Comparative performance analysis of different fingerprint biometric scanners for patient matching</article-title>
          <source>MEDINFO 2017: Precision Healthcare through Informatics</source>
          <year>2017</year>
          <access-date>2021-12-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scholarworks.iupui.edu/bitstream/handle/1805/16900/SHTI245-1053.pdf?sequence=1&#38;isAllowed=y">https://scholarworks.iupui.edu/bitstream/handle/1805/16900/SHTI245-1053.pdf?sequence=1&#38;isAllowed=y</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Monica</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Patient matching strategy should leverage smartphones, biometrics</article-title>
          <source>EHRIntelligence</source>
          <year>2018</year>
          <access-date>2021-11-25</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ehrintelligence.com/news/patient-matching-strategy-should-leverage-smartphones-biometrics">https://ehrintelligence.com/news/patient-matching-strategy-should-leverage-smartphones-biometrics</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <collab>National Research Council</collab>
          </person-group>
          <source>Biometric Recognition: Challenges and Opportunities</source>
          <year>2010</year>
          <publisher-loc>Washington, DC</publisher-loc>
          <publisher-name>The National Academies Press</publisher-name>
          <fpage>1</fpage>
          <lpage>182</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="web">
          <article-title>More hospitals using fingerprint scans for patient ID</article-title>
          <source>Nairaland Forum</source>
          <access-date>2021-11-25</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nairaland.com/3209909/trust-hospital-scan-fingerprint-see">https://www.nairaland.com/3209909/trust-hospital-scan-fingerprint-see</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Blomeke</surname>
              <given-names>CR</given-names>
            </name>
            <name name-style="western">
              <surname>Elliott</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Walter</surname>
              <given-names>TM</given-names>
            </name>
          </person-group>
          <article-title>Bacterial survivability and transferability on biometric devices</article-title>
          <source>Proceedings of the 41st Annual IEEE International Carnahan Conference on Security Technology</source>
          <year>2007</year>
          <conf-name>41st Annual IEEE International Carnahan Conference on Security Technology</conf-name>
          <conf-date>Oct. 8-11, 2007</conf-date>
          <conf-loc>Ottawa, ON, Canada</conf-loc>
          <pub-id pub-id-type="doi">10.1109/ccst.2007.4373472</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chan</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>New scanners for tracking city workers</article-title>
          <source>New York Times</source>
          <year>2007</year>
          <access-date>2021-11-25</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nytimes.com/2007/01/23/nyregion/23scanning.html">https://www.nytimes.com/2007/01/23/nyregion/23scanning.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <collab>World Health Organization</collab>
          </person-group>
          <source>WHO Guidelines on Hand Hygiene in Health Care: First Global Patient Safety Challenge Clean Care is Safer Care</source>
          <year>2009</year>
          <publisher-loc>Geneva</publisher-loc>
          <publisher-name>World Health Organization</publisher-name>
          <fpage>1</fpage>
          <lpage>270</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chinedum</surname>
              <given-names>AV</given-names>
            </name>
          </person-group>
          <article-title>Design and implementation of a biometric information system</article-title>
          <source>J Sci Res Innov Technol</source>
          <year>2017</year>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ijsrit.com/uploaded_all_files/1857996699_u12.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Faridah</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Nasir</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kushsairy</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Safie</surname>
              <given-names>SI</given-names>
            </name>
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Gunawan</surname>
              <given-names>TS</given-names>
            </name>
          </person-group>
          <article-title>Fingerprint biometric systems</article-title>
          <source>Trends Bioinform</source>
          <year>2016</year>
          <month>9</month>
          <day>15</day>
          <volume>9</volume>
          <issue>2</issue>
          <fpage>52</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.3923/tb.2016.52.58</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bahaa-Eldin</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>A medium resolution fingerprint matching system</article-title>
          <source>Ain Shams Eng J</source>
          <year>2013</year>
          <month>09</month>
          <volume>4</volume>
          <issue>3</issue>
          <fpage>393</fpage>
          <lpage>408</lpage>
          <pub-id pub-id-type="doi">10.1016/j.asej.2012.10.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="web">
          <article-title>Biometrics technology market size, share and trends analysis report, report by end-use (Government, Banking and Finance, Transport/Logistics, Defense and Security), by application (AFIS, Iris, Non-AFIS), and segment forecasts, 2018 - 2025</article-title>
          <source>Grand View Research, Inc</source>
          <year>2018</year>
          <access-date>2021-11-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.grandviewresearch.com/industry-analysis/biometrics-industry">https://www.grandviewresearch.com/industry-analysis/biometrics-industry</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jhaveri</surname>
              <given-names>Harshit</given-names>
            </name>
            <name name-style="western">
              <surname>Jhaveri</surname>
              <given-names>Hardik</given-names>
            </name>
            <name name-style="western">
              <surname>Sanghavi</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Biometric security system and its applications in healthcare</article-title>
          <source>Int J Tech Res Appl</source>
          <year>2014</year>
          <volume>2</volume>
          <issue>6</issue>
          <fpage>15</fpage>
          <lpage>20</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ijtra.com/view.php?paper=biometric-security-system-and-its-applications-in-healthcare.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ali</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Mahale</surname>
              <given-names>VH</given-names>
            </name>
            <name name-style="western">
              <surname>Yannawar</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Gaikwad</surname>
              <given-names>AT</given-names>
            </name>
          </person-group>
          <article-title>Overview of fingerprint recognition system</article-title>
          <source>Proceedings of the International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)</source>
          <year>2016</year>
          <conf-name>International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)</conf-name>
          <conf-date>March 3-5, 2016</conf-date>
          <conf-loc>Chennai, India</conf-loc>
          <pub-id pub-id-type="doi">10.1109/iceeot.2016.7754900</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>MacKinnon</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Wasserman</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Implementing electronic medical record systems</article-title>
          <source>IT Prof</source>
          <year>2009</year>
          <month>11</month>
          <volume>11</volume>
          <issue>6</issue>
          <fpage>50</fpage>
          <lpage>3</lpage>
          <pub-id pub-id-type="doi">10.1109/mitp.2009.125</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
          <source>OpenMRS - Medical Record System</source>
          <access-date>2021-11-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://openmrs.org/">https://openmrs.org/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sadinle</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Fienberg</surname>
              <given-names>SE</given-names>
            </name>
          </person-group>
          <article-title>A generalized Fellegi–Sunter framework for multiple record linkage with application to homicide record systems</article-title>
          <source>J Am Stat Assoc</source>
          <year>2013</year>
          <month>06</month>
          <volume>108</volume>
          <issue>502</issue>
          <fpage>385</fpage>
          <lpage>97</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/pdf/1205.3217.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/01621459.2012.757231</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="web">
          <article-title>Java Network Launch Protocol</article-title>
          <source>Oracle</source>
          <access-date>2021-11-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://docs.oracle.com/javase/tutorial/deployment/deploymentInDepth/jnlp.html">https://docs.oracle.com/javase/tutorial/deployment/deploymentInDepth/jnlp.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Maddala</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tangellapally</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Bartuněk</surname>
              <given-names>JS</given-names>
            </name>
            <name name-style="western">
              <surname>Nilsson</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Implementation and evaluation of NIST Biometric Image Software for fingerprint recognition</article-title>
          <source>Proceedings of the ISSNIP Biosignals and Biorobotics Conference 2011</source>
          <year>2011</year>
          <conf-name>ISSNIP Biosignals and Biorobotics Conference 2011</conf-name>
          <conf-date>Jan. 6-8, 2011</conf-date>
          <conf-loc>Vitoria, Brazil</conf-loc>
          <pub-id pub-id-type="doi">10.1109/brc.2011.5740672</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Storisteanu</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Norman</surname>
              <given-names>TL</given-names>
            </name>
            <name name-style="western">
              <surname>Grigore</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Norman</surname>
              <given-names>TL</given-names>
            </name>
          </person-group>
          <article-title>Biometric fingerprint system to enable rapid and accurate identification of beneficiaries</article-title>
          <source>Glob Health Sci Pract</source>
          <year>2015</year>
          <month>03</month>
          <day>05</day>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>135</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.9745/ghsp-d-15-00010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Odei-Lartey</surname>
              <given-names>EO</given-names>
            </name>
            <name name-style="western">
              <surname>Boateng</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Danso</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kwarteng</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Abokyi</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Amenga-Etego</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Gyaase</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Asante</surname>
              <given-names>KP</given-names>
            </name>
            <name name-style="western">
              <surname>Owusu-Agyei</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>The application of a biometric identification technique for linking community and hospital data in rural Ghana</article-title>
          <source>Glob Health Action</source>
          <year>2016</year>
          <month>03</month>
          <day>17</day>
          <volume>9</volume>
          <issue>1</issue>
          <fpage>29854</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/26993473"/>
          </comment>
          <pub-id pub-id-type="doi">10.3402/gha.v9.29854</pub-id>
          <pub-id pub-id-type="medline">26993473</pub-id>
          <pub-id pub-id-type="pii">29854</pub-id>
          <pub-id pub-id-type="pmcid">PMC4799390</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shoewu</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Idowu</surname>
              <given-names>OA</given-names>
            </name>
          </person-group>
          <article-title>Development of attendance management system using biometrics</article-title>
          <source>Pacific J Sci Technol</source>
          <year>2012</year>
          <volume>13</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.akamaiuniversity.us/PJST13_1_300.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>White</surname>
              <given-names>EB</given-names>
            </name>
            <name name-style="western">
              <surname>Meyer</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Ggita</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Babirye</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Mark</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Ayakaka</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Haberer</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Katamba</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Armstrong-Hough</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>JL</given-names>
            </name>
          </person-group>
          <article-title>Feasibility, acceptability, and adoption of fingerprint scanning during contact investigation for tuberculosis in Kampala, Uganda: a parallel-convergent, mixed-methods analysis</article-title>
          <source>Peer J Preprints</source>
          <comment>Preprint posted online on June 27, 2018</comment>
          <pub-id pub-id-type="doi">10.7287/peerj.preprints.27007v1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Grindrod</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Hengartner</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Ong</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Logan</surname>
              <given-names>AG</given-names>
            </name>
            <name name-style="western">
              <surname>Vogel</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Gebotys</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Evaluating authentication options for mobile health applications in younger and older adults</article-title>
          <source>PLoS One</source>
          <year>2018</year>
          <month>1</month>
          <day>4</day>
          <volume>13</volume>
          <issue>1</issue>
          <fpage>e0189048</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0189048"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0189048</pub-id>
          <pub-id pub-id-type="medline">29300736</pub-id>
          <pub-id pub-id-type="pii">PONE-D-17-04611</pub-id>
          <pub-id pub-id-type="pmcid">PMC5754080</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Doherty</surname>
              <given-names>Kieran C</given-names>
            </name>
            <name name-style="western">
              <surname>Christofides</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Yen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bentzen</surname>
              <given-names>HB</given-names>
            </name>
            <name name-style="western">
              <surname>Burke</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Hallowell</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Koenig</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Willison</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <article-title>If you build it, they will come: unintended future uses of organised health data collections</article-title>
          <source>BMC Med Ethics</source>
          <year>2016</year>
          <month>09</month>
          <day>06</day>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>54</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedethics.biomedcentral.com/articles/10.1186/s12910-016-0137-x"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12910-016-0137-x</pub-id>
          <pub-id pub-id-type="medline">27600117</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12910-016-0137-x</pub-id>
          <pub-id pub-id-type="pmcid">PMC5011895</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>North-Samardzic</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Biometric technology and ethics: beyond security applications</article-title>
          <source>J Bus Ethics</source>
          <year>2019</year>
          <month>03</month>
          <day>08</day>
          <volume>167</volume>
          <issue>3</issue>
          <fpage>433</fpage>
          <lpage>50</lpage>
          <pub-id pub-id-type="doi">10.1007/s10551-019-04143-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sprokkereef</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>De Hert</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Ethical practice in the use of biometric indentifiers within the EU</article-title>
          <source>Law Sci Policy</source>
          <year>2007</year>
          <volume>3</volume>
          <issue>2</issue>
          <fpage>177</fpage>
          <lpage>201</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.610.36&#38;rep=rep1&#38;type=pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koda</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Higuchi</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Jain</surname>
              <given-names>AK</given-names>
            </name>
          </person-group>
          <article-title>Advances in capturing child fingerprints: a high resolution CMOS Image Sensor with SLDR method</article-title>
          <source>Proceedings of the International Conference of the Biometrics Special Interest Group (BIOSIG)</source>
          <year>2016</year>
          <conf-name>International Conference of the Biometrics Special Interest Group (BIOSIG)</conf-name>
          <conf-date>Sept. 21-23, 2016</conf-date>
          <conf-loc>Darmstadt, Germany</conf-loc>
          <pub-id pub-id-type="doi">10.1109/biosig.2016.7736909</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Breithaupt</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Sousedik</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Meissner</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Full fingerprint scanner using optical coherence tomography</article-title>
          <source>Proceedings of the 3rd International Workshop on Biometrics and Forensics (IWBF 2015)</source>
          <year>2015</year>
          <conf-name>3rd International Workshop on Biometrics and Forensics (IWBF 2015)</conf-name>
          <conf-date>March 3-4, 2015</conf-date>
          <conf-loc>Gjovik, Norway</conf-loc>
          <pub-id pub-id-type="doi">10.1109/iwbf.2015.7110228</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
