<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.0" xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v26i1e46556</article-id>
      <article-id pub-id-type="pmid">39320943</article-id>
      <article-id pub-id-type="doi">10.2196/46556</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Designing A Blockchain-Empowered Telehealth Artifact for Decentralized Identity Management and Trustworthy Communication: Interdisciplinary Approach</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>de Azevedo Cardoso</surname>
            <given-names>Taiane</given-names>
          </name>
        </contrib>
        <contrib contrib-type="editor">
          <name>
            <surname>Leung</surname>
            <given-names>Tiffany</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Chen</surname>
            <given-names>Weiru</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Zhuang</surname>
            <given-names>Yan</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Chen</surname>
            <given-names>Weiru</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Liang</surname>
            <given-names>Xueping</given-names>
          </name>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Florida International University</institution>
            <addr-line>11200 S.W. 8th Street</addr-line>
            <addr-line>Miami, FL, 33199</addr-line>
            <country>United States</country>
            <phone>1 305 348 2830</phone>
            <email>xuliang@fiu.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-8764-9966</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Alam</surname>
            <given-names>Nabid</given-names>
          </name>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5684-1528</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Sultana</surname>
            <given-names>Tahmina</given-names>
          </name>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-7373-4422</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Bandara</surname>
            <given-names>Eranga</given-names>
          </name>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-3214-5346</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Shetty</surname>
            <given-names>Sachin</given-names>
          </name>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-8789-0610</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Florida International University</institution>
        <addr-line>Miami, FL</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Troy University</institution>
        <addr-line>Troy, AL</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Old Dominion University</institution>
        <addr-line>Suffolk, VA</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Xueping Liang <email>xuliang@fiu.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2024</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>25</day>
        <month>9</month>
        <year>2024</year>
      </pub-date>
      <volume>26</volume>
      <elocation-id>e46556</elocation-id>
      <history>
        <date date-type="received">
          <day>15</day>
          <month>2</month>
          <year>2023</year>
        </date>
        <date date-type="rev-request">
          <day>2</day>
          <month>1</month>
          <year>2024</year>
        </date>
        <date date-type="rev-recd">
          <day>17</day>
          <month>1</month>
          <year>2024</year>
        </date>
        <date date-type="accepted">
          <day>18</day>
          <month>6</month>
          <year>2024</year>
        </date>
      </history>
      <copyright-statement>©Xueping Liang, Nabid Alam, Tahmina Sultana, Eranga Bandara, Sachin Shetty. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 25.09.2024.</copyright-statement>
      <copyright-year>2024</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2024/1/e46556" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Telehealth played a critical role during the COVID-19 pandemic and continues to function as an essential component of health care. Existing platforms cannot ensure privacy and prevent cyberattacks.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The main objectives of this study are to understand existing cybersecurity issues in identity management and trustworthy communication processes in telehealth platforms and to design a software architecture integrated with blockchain to improve security and trustworthiness with acceptable performance.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We improved personal information security in existing telehealth platforms by adopting an innovative interdisciplinary approach combining design science, social science, and computer science in the health care domain, with prototype implementation. We used the design science research methodology to implement our overall design. We innovated over existing telehealth platforms with blockchain integration that improves health care delivery services in terms of security, privacy, and efficiency. We adopted a user-centric design approach and started with user requirement collection, followed by system functionality development. Overall system implementation facilitates user requirements, thus promoting user behavior for the adoption of the telehealth platform with decentralized identity management and an access control mechanism.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Our investigation identified key challenges to identity management and trustworthy communication processes in telehealth platforms used in the current health care domain. By adopting distributed ledger technology, we proposed a decentralized telehealth platform to support identity management and a trustworthy communication process. Our design and prototype implementation using a smart contract–driven telehealth platform to provide decentralized identity management and trustworthy communication with token-based access control addressed several security challenges. This was substantiated by testing with 10,000 simulated transactions across 5 peers in the Rahasak blockchain network. The proposed design provides resistance to common attacks while maintaining a linear time overhead, demonstrating improved security and efficiency in telehealth services. We evaluated the performance in terms of transaction throughput, smart contract execution time, and block generation time. To create a block with 10,000 transactions, it takes 8 seconds on average, which is an acceptable overhead for blockchain-based applications.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>We identified technical limitations in current telehealth platforms. We presented several design innovations using blockchain to prototype a system. We also presented the implementation details of a unique distributed architecture for a trustworthy communication system. We illustrated how this design can overcome privacy, security, and scalability limitations. Moreover, we illustrated how improving these factors sets the stage for improving and standardizing the application and for the wide adoption of blockchain-enabled telehealth platforms.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>telehealth</kwd>
        <kwd>blockchain</kwd>
        <kwd>security</kwd>
        <kwd>software</kwd>
        <kwd>proof of concept</kwd>
        <kwd>implementation</kwd>
        <kwd>privacy</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Since the COVID-19 pandemic, the world has seen a dramatic shift toward social distancing efforts with the help of technological tools. Technology-enabled social distancing efforts have led to the wide adoption of work-from-home solutions, virtual meeting places including classrooms, financial service delivery, and health service delivery. A recent guidance regarding operation management from the US Centers for Disease Control and Prevention (CDC) indicates that telehealth services should be optimized when available and appropriate. Government health authorities from other developed and developing countries have issued similar directives. Moreover, health service organizations, such as hospital systems and insurance providers, have started to promote telehealth services to minimize physical traffic in medical facilities. With these recommendations and advancements, health care service use via telehealth services has seen a radical upshift, and it is expected that this trend will be sustained in the postpandemic era. The large-scale adoption of telehealth services within a short time comes with several social and technical concerns. Telehealth services overall are understudied, with complex, highly person-oriented, and often knowledge-intensive services, which pose difficulty in generating successful and sustainable business models [<xref ref-type="bibr" rid="ref1">1</xref>]. Moreover, telehealth services pose privacy and identity protection threats to users that hinder telehealth’s successful adoption.</p>
      <p>Personal privacy is a significant research stream [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref3">3</xref>]. Earlier studies have shown that user’s privacy concerns can be handled by reducing computer anxiety and increasing the incentive to disclose [<xref ref-type="bibr" rid="ref4">4</xref>-<xref ref-type="bibr" rid="ref6">6</xref>]. Later studies have shown more focus on protecting digital identity and trust to reduce privacy concerns, which can be managed well by increasing the trust of online services and increasing the protection of digital identity through anonymity. Sutanto et al [<xref ref-type="bibr" rid="ref7">7</xref>] proposed an IT solution that delivers a personalized service but avoids the third-party use of personal information and thus increases the process and content gratification. As a decentralized solution to digital identity management and identity verification operations, blockchain technology, a consensus-based public or private ledger system, has emerged [<xref ref-type="bibr" rid="ref8">8</xref>]. By considering the benefits of blockchain, such as user’s control over information and decentralized security features, various organizations (ie, the Government of Canada, the United Nations, etc) have started looking into the use case to enhance user privacy by decentralizing user information control [<xref ref-type="bibr" rid="ref9">9</xref>-<xref ref-type="bibr" rid="ref11">11</xref>].</p>
      <p>Considering that blockchain integration into the health care industry could significantly transform traditional services with its security features and capabilities, previous research [<xref ref-type="bibr" rid="ref12">12</xref>] has investigated blockchain adoption in the tracking of medical supplies and infected patients. The data can be handled instantly without any intermediary processing, thus improving efficiency, and data manipulation is impossible owing to the transparent nature of blockchain networks, which can further prevent misinformation [<xref ref-type="bibr" rid="ref13">13</xref>] and preserve privacy. With the adoption of blockchain, data consistency and immutability can be assured along the data-sharing process, thus providing the capability of self-validation for each data record collected and uploaded. Most importantly, patients can limit personal information exposure under their own control. Fragmented records are easy to merge and integrate without any third-party involvement. Patients can own their health records, such as telehealth visits and immunization records, for future reference or verification.</p>
      <p>State-of-the-art telehealth has emerged as a solution to overcome the challenges of an increasing demand for health care, an increasing demand for care outside of the hospital, a demand for efficiency and individualization, and a shortage of health care personnel to attend to an increasing number of patients [<xref ref-type="bibr" rid="ref14">14</xref>]. Studies have shown that there is a positive relationship between telehealth and clinical care outcomes [<xref ref-type="bibr" rid="ref15">15</xref>]. Although current research mostly focuses on the vital sign parameter monitoring solutions of telehealth [<xref ref-type="bibr" rid="ref14">14</xref>], extant literature provides insights into which technology of telehealth is more efficacious. According to Dellifraine Jami and Dansky [<xref ref-type="bibr" rid="ref15">15</xref>], video technology is more efficient among telehealth technologies because of its real-time interactivity. Moreover, studies have shown a relationship between different disease categories and telehealth technology. In a meta-analysis, Dellifraine Jami and Dansky [<xref ref-type="bibr" rid="ref15">15</xref>] revealed that telehealth plays a positive role in improving the condition of psychiatric patients and plays a moderately positive role in heart failure outcomes. Additionally, no relationship was found between telehealth and diabetes outcomes. However, there are still challenges in combining incompatible information systems used by different stakeholders.</p>
      <p>After 2010, telehealth solutions started to grow rapidly [<xref ref-type="bibr" rid="ref16">16</xref>]. Telehealth is now addressing issues of chronic and episodic conditions along with acute conditions. Moreover, studies have shown that telehealth is an effective solution for mental health patients [<xref ref-type="bibr" rid="ref17">17</xref>]. It has been found that telehealth solutions help in reducing health care costs, and the migration of telehealth has been seen from hospitals and satellite clinics to homes and mobile devices [<xref ref-type="bibr" rid="ref16">16</xref>]. However, there are limitations of the current telehealth solutions that need to be addressed by future solutions. These limitations include limited insurance coverage of telehealth, lower quality of patient-physician relationships, different legal issues for different states, and a lack of trust from patients and unwillingness from clinicians [<xref ref-type="bibr" rid="ref16">16</xref>]. Moreover, telehealth can be an effective solution during emergencies. Through telehealth, it is possible to respond quickly to any disaster. However, it is a matter of regret that still telehealth solutions are underutilized in emergency situations [<xref ref-type="bibr" rid="ref18">18</xref>]. In the recent COVID-19 pandemic, we saw an emerging demand for telehealth in emergencies. There were restrictions on face-to-face interactions because of the highly infectious COVID-19. Therefore, telemedicine can provide medical advice and solutions in this regard. However, there is still training needed from the clinician’s side [<xref ref-type="bibr" rid="ref19">19</xref>]. Moreover, a lack of trust remains a challenge. To overcome this challenge, the literature suggests that telehealth should be implemented proactively rather than reactively [<xref ref-type="bibr" rid="ref19">19</xref>]. However, studies have also reported that there are risks of fake providers of telehealth in an emergency [<xref ref-type="bibr" rid="ref18">18</xref>].</p>
      <p>In information systems, discipline, collection, unauthorized secondary use, improper access, and errors are considered as the dimensions of information privacy [<xref ref-type="bibr" rid="ref20">20</xref>]. Malhotra et al [<xref ref-type="bibr" rid="ref21">21</xref>] have indicated that control, awareness, and collection of personal information can reflect the privacy concerns of an individual. It is identified that privacy concerns are dependent on computer anxiety [<xref ref-type="bibr" rid="ref6">6</xref>]. This computer anxiety construct indicates that users are experiencing discomfort about the digitization of their personal life and society. Even though privacy protection is associated with positive practices, users are also motivated to share information about themselves if there are financial gains and conveniences offered by online service providers [<xref ref-type="bibr" rid="ref4">4</xref>]. An experimental study found that (1) a clear privacy statement can reduce privacy concerns, but a security seal cannot; (2) monetary incentive influences information disclosure; and (3) information requests negatively influence information disclosure [<xref ref-type="bibr" rid="ref5">5</xref>]. It is also found that perceived anonymity of self can reduce privacy concerns [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
      <p>An IT solution [<xref ref-type="bibr" rid="ref7">7</xref>] has been proposed that delivers a personalized service but avoids the third-party usage of personal information and thus increases the process and content gratification. Another study has shown that to balance the beneficial use of data and individual privacy in the era of big data, policymakers must address some of the most fundamental concepts of privacy, such as reducing the collection of personally identifiable information, increasing individual control, and implementing the principles of data minimization and purpose limitation policies [<xref ref-type="bibr" rid="ref23">23</xref>]. An enhanced Antecedent-Privacy Concern-Outcome model [<xref ref-type="bibr" rid="ref24">24</xref>] has shown that privacy experiences, awareness, personality, demographic differences, culture, and climate are the antecedents of privacy concern. Two recent studies have reflected on the data sharing and privacy aspects surrounding this [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. According to Son and Kim [<xref ref-type="bibr" rid="ref27">27</xref>], a major consequence of privacy concerns is the user’s privacy-protective behavior. Privacy-protective behavior can be defined as information provision (refusal and misinterpretation), private action (removal and negative word-of-mouth), and public action (direct complaint and indirect complaint).</p>
      <p>On the other hand, the term “digital identity” has evolved through the process of digitization and the internet. Users, by their internet browsing history and footprint, educate others about who they are, what they do, and especially what they think. With the construction process, users’ digital footprints create their “digital identity.” In other literature, the term digital personhood is also used. Digital personhood refers mainly to the projected status in the online environment [<xref ref-type="bibr" rid="ref28">28</xref>]. Windley [<xref ref-type="bibr" rid="ref29">29</xref>] argues that the management and control of user’s digital identity, trust, and privacy are the fundamental concerns for both users and service providers in the current internet economy.</p>
      <p>Prior telehealth platforms are exposed to certain levels of data privacy risks, lack of traceability, centralized control, and lack of data provenance. The research objective of this study is to develop a blockchain-assisted, smart contract–driven telehealth platform that is trustworthy and capable of preventing various cyberattacks. To achieve this objective, we followed the design science research (DSR) paradigm to guide the development of the proposed IT artifact [<xref ref-type="bibr" rid="ref30">30</xref>] and adopted a user-centric design methodology. Based on that, we further analyzed system requirements and backend requirements to retrieve the design methodology. This combination of analysis helps us retrieve the design principles (DPs) and design features provided by blockchain integration. Experimental results reveal that the proposed design and implementation are baked with security considerations at an acceptable level of performance in terms of scalability and throughput characteristics. Moreover, we summarize a list of generalizable and actionable guidelines for future blockchain-assisted projects and integration models.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Capabilities of Blockchain to Support Identity Management</title>
        <p>According to the draft on Blockchain Technology Overview by the National Institute of Standards and Technology (NIST), blockchain is an immutable digital ledger system implemented in a distributed fashion (ie, without a central repository) and usually without a central authority. There are 2 major forms of blockchain-based systems: public blockchain and private blockchain [<xref ref-type="bibr" rid="ref31">31</xref>]. In the public blockchain, the ledger is completely decentralized among the users, and anyone can participate in the system by storing the full ledger in their own custody or by transacting data using the blockchain. The private blockchain preserves some key features of the public blockchain while compromising on the fully unregulated feature. The private blockchain is mostly tested by financial institutions, firms engaged in supply chain and logistics, health care organizations, and government entities. In both the public and private blockchain cases, users and organizations want to leverage the unique capabilities provided by blockchain technology. Previous developments and implementations of blockchains and smart contracts in telehealth were built on top of Ethereum, including teleconsultation, drug administration, and medical testing [<xref ref-type="bibr" rid="ref32">32</xref>]. The BlockHeal framework is validated by demonstrating several use cases, including user registration and verification, patient online consultation with doctors, health care and laboratory facilities, drug counterfeiting, pharmacovigilance, language translations, and emergency facilities [<xref ref-type="bibr" rid="ref33">33</xref>]. There are issues with scalability and security features when faced with multiserver architectures [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
        <sec>
          <title>Decentralization</title>
          <p>Decentralization in blockchain refers to the situation where the ledger can be maintained without the need for any regulator (in the public blockchain context) and without the need for any trusted third-party arbitrator (in the private blockchain context) [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. Ideally, the public blockchain is peer-to-peer and censorship-resistant. As the public blockchain can be operated without the need for any centralized authority, any person, with the help of web-based or mobile-based technologies, can join the blockchain as a user. A person or organization can participate in the public blockchain as a full node, which means they can keep a copy of the entire blockchain and take part in making the entire system fully decentralized across the globe. A private blockchain’s decentralization is mainly for running intraorganizational or interorganizational processes without the need for a third-party intermediary. Business processes can be operated in the form of smart contracts in the blockchain that require the participating departments or organizations to set the terms and conditions upfront. Private blockchain ledgers can be stored within the organization or across multiple organizations to provide a higher level of trust in the transactions.</p>
        </sec>
        <sec>
          <title>Consensus Mechanism</title>
          <p>A consensus mechanism is basically a way to mitigate the double-spending problem and to create a single truth among all the participating nodes or organizations of the blockchain [<xref ref-type="bibr" rid="ref35">35</xref>-<xref ref-type="bibr" rid="ref37">37</xref>]. The consensus mechanism helps the blockchain to remain decentralized across the participating entities. The main benefit of such a mechanism is that it makes sure the current state of the blockchain is the same for all participants, each of the blocks in the blockchain is properly linked with the previous block, and all participating entities can verify the block. Popular consensus mechanisms are Proof of Work, Proof of Stake, Round Robin, etc. In the private blockchain, the consensus mechanism largely depends on the participating organizations. As the private blockchain is mainly useful to store information about operations that can impact multiple organizations, the consensus can also be based on a defined contract.</p>
        </sec>
        <sec>
          <title>Immutability</title>
          <p>The data stored in the blockchain are tamper-proof and immutable [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]. With the help of the consensus mechanism, the blockchain creates a single truth across all the nodes, and thus, it is computationally impossible and infeasible to alter the data that have already been stored in the earlier blocks. Each block contains some transactions, and based on those transactions, a cryptographic hash is created. That cryptographic hash is used to connect the block with the most recently verified block. When a piece of data on a block is altered, the hash gets changed and the block containing the altered data gets isolated from the blockchain. The tamper-proof and immutable feature of the blockchain can be found in both public and private blockchain-based solutions. This benefit of the blockchain increases the security of the data and digital assets on the ledger.</p>
        </sec>
      </sec>
      <sec>
        <title>Privacy Requirements in Identity Management</title>
        <p>The technology literature tries to provide some technical solutions that can be implemented within the organization that is collecting digital identity data from users. Digital identity management can be a pervasive infrastructure that helps an organization handle user account provisioning, authorization, and authentication. Windley [<xref ref-type="bibr" rid="ref29">29</xref>] emphasized the inclusion of 5 building blocks (process architecture, data architecture, technical reference architecture, policies, and interoperability framework) in the identity management system to provide better protection against any breach. However, these technical solutions cannot single-handedly solve privacy breach incidents. Thus, there are some external policies created by governments and standardization bodies in place for organizations. There are 3 categories of regulations and policies an organization might consider following. The first category involves global-level policies such as the recent General Data Protection Regulation (GDPR) and OECD’s Data Protection and User Control for Identity. The second category involves country-level policies such as The United States Privacy Act, The Swiss Federal Law on Personal Data Protection, and the CSA Model Code for the Protection of Personal Information. The third category involves general business-specific policies such as the Health Insurance Portability and Accountability Act.</p>
        <p>Most of these regulations help an organization to define the boundary of the operation needing users’ private data and to synchronize the technical solution with regulatory compliance requirements. Ayed [<xref ref-type="bibr" rid="ref38">38</xref>] stated that increasing users’ control over their digital identity is a key factor in decreasing the chance of privacy-related breaches such as privacy invasion and fraud. Ayed [<xref ref-type="bibr" rid="ref38">38</xref>] further posited that an increase in control will give users ownership over their digital identity and thus will allow users to see what attributes are stored online, how those can be used further, and what steps to take for reducing the risk of becoming an unfortunate victim. To achieve this feature, Ayed [<xref ref-type="bibr" rid="ref38">38</xref>] proposed a digital identity–related privacy requirement (DIPR), which can be used in the process of designing digital identity management systems. The DIPR includes 10 requirements as shown in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>.</p>
      </sec>
      <sec>
        <title>DSR Methodology</title>
        <p>DSR involves the construction of a wide range of sociotechnical artifacts [<xref ref-type="bibr" rid="ref39">39</xref>], and the impact of this research is witnessing a more striking influence with the appropriate and effective consumption and production of knowledge throughout the research process. This paper follows the workflow toward a research contribution that can benefit software developers and technology innovators and most importantly the researchers working in this field in terms of the embedded phenomena in blockchain-assisted telehealth. The application domain of this paper is telehealth, and we argue that the solution maturity is low, while the problem space of telehealth is relatively high. Thus, based on the DSR paradigm identified in [<xref ref-type="bibr" rid="ref39">39</xref>], we are designing a solution to improve current technical adoption. According to the Fogg Behavior Model (FBM) [<xref ref-type="bibr" rid="ref40">40</xref>], there are 3 factors that control behavior change, namely, motivation, ability, and triggers, which can be applied to the health care domain. Specifically, to design a telehealth system and platform and promote the adoption of such a system or platform, users should be sufficiently motivated and have the ability to perform the desired behavior expected by the system or platform, and there are triggers to prompt users to perform the behavior. All 3 factors, according to the FBM, must be present at the same instant for the behavior to occur. We have adopted this behavior design model and proposed a user-centric model for the blockchain-assisted telehealth platform. Combined with the FBM theory, we present this DSR methodology to reflect the user’s motivation and ability to perform telehealth behavior and receive telehealth services triggered by both the blockchain-assisted platform and the user’s medical condition, as well as the health care service provider’s technical capability. Considering the differences between traditional, centralized, and blockchain-supported telehealth and telemedicine systems [<xref ref-type="bibr" rid="ref41">41</xref>], we illustrate that the motivation for technology innovation adoption plays an important role in terms of user experience (UX) and acceptance aspects (<xref rid="figure1" ref-type="fig">Figure 1</xref>).</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Behavior changes from traditional health care to telehealth and blockchain-supported telehealth.</p>
          </caption>
          <graphic xlink:href="jmir_v26i1e46556_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>We have presented both the motivation aspect and simplicity/ability aspect of the behavior change from traditional health care to telehealth and blockchain-supported telehealth. With added motivation and added simplicity, our blockchain-supported telehealth platform design adopts a user-centric methodology and provides a straightforward process for the technology transformation of the underlying architecture implementation. The following section will illustrate how we designed each development cycle and present the main contributions from the design science perspective.</p>
        <sec>
          <title>Design Cycle Description</title>
          <p>Following the modeling design process theory [<xref ref-type="bibr" rid="ref42">42</xref>], the overall design cycle adopted in this paper starts with problem awareness and scope, followed by suggestions from both academic and industrial practices (<xref rid="figure2" ref-type="fig">Figure 2</xref>). Considering the user-centric design paradigm, more than purely technical factors, this paper adds a new dimension in the second stage, which is user requirement collection. Following that, we have developed innovative IT artifacts to provide the functions and platform implementation. As such, we have presented overall DSR outcomes and contributions as follows, which distinguish this paper from previous work.</p>
          <fig id="figure2" position="float">
            <label>Figure 2</label>
            <caption>
              <p>Our design science research approach.</p>
            </caption>
            <graphic xlink:href="jmir_v26i1e46556_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>While there are applications available to support telehealth services, there are few guidelines for decentralized implementation. Based on blockchain characteristics and the needs associated with telehealth services, we have proposed a set of smart contract–driven telehealth DPs from the design requirements collected from user experiments and academic or industrial initiatives.</p>
          <p>We have designed and presented 2 artifacts that can facilitate both user end (frontend) and backend system integration with blockchain technology, namely, the user credential management function and the access control function, which can be driven by underlying smart contracts. The proof-of-concept project demonstrates the feasibility and verifies the usable potential of the proposed concept and design theory. We have followed the reporting guidelines suggested by [<xref ref-type="bibr" rid="ref43">43</xref>] and have provided a checklist in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>.</p>
          <p>From the design of the artifacts, we have presented a reflection of the design and performed an evaluation of the proposed design in terms of security properties and functionality performances, followed by a summary of the lessons learned and contributions to DSR theories.</p>
        </sec>
        <sec>
          <title>Organizational Setting</title>
          <p>In our examination of the current landscape of telehealth, we analyzed both academic literature and practical applications across the industry. Our findings indicate that the telehealth sector is in the early stages of both development and adoption. A range of functionalities have been explored in prior research, including access to medical data, processing of medical services, video conferencing capabilities, epidemiological reporting, support for diagnostics and treatment, aggregation of patient data, scheduling of visits, ordering of medications, and integration of payment and fundraising systems [<xref ref-type="bibr" rid="ref44">44</xref>]. This study focuses on the identity management and communication aspects of telehealth services.</p>
        </sec>
        <sec>
          <title>System Details and System in Use</title>
          <p>This study selected 2 features, which patients care the most about according to our user study related to security and privacy, including the user credential management functionality and access control functionality. The user credential management functionality has a design that incorporates user motivation as well as the ability to adapt to new technologies or platforms. Meanwhile, the access control functionality follows the principle that users are respected in terms of their privacy and data security.</p>
        </sec>
        <sec>
          <title>Participants</title>
          <p>There are 2 categories of participants interviewed during the design requirement collection process, namely, general users (patient side) and subject matter expert users (health provider side). The research included data from 20 general users and 5 expert users within the United States and Europe, and the demographic characteristics of these respondents are shown in <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>. On average, the interview with general users took 71.06 minutes and that with expert users took 66 minutes.</p>
        </sec>
        <sec>
          <title>Outcome and Evaluation Criteria</title>
          <p>From the design of the artifacts, we have presented a reflection of the design and performed an evaluation of the proposed design in terms of security properties and functionality performances, followed by a summary of the lessons learned and contributions to DSR theories. Specifically, we have assessed performance metrics, such as transaction throughput, smart contract execution time, and block generation time. Our security analysis evaluated the resilience of the system against common attacks prevalent in telehealth systems.</p>
        </sec>
        <sec>
          <title>Methods for Data Acquisition and Measurement</title>
          <p>We have adopted a user-centric design approach and have started with user requirement collection. We have used the information in the report by Chanson et al [<xref ref-type="bibr" rid="ref45">45</xref>] for developing the requirements. With the analysis of the collected data, we have moved forward to design the system functionalities that can facilitate user requirements, thus promoting user behaviors toward the telehealth platform. The purpose of the interview study is to inform the design process in terms of user requirements from both general users and expert users for a privacy-preserving telehealth solution. The interview questions are related to prior experience of use or potential functionality expectations from a telehealth artifact.</p>
        </sec>
        <sec>
          <title>Methods for Data Analysis</title>
          <p>In the development of design requirements, we have employed qualitative methods to analyze responses from our interviewees. We have used a thematic analysis approach to interpret the interview data. Our first step involved transcribing the interviews and reading the transcripts multiple times to gain a deep understanding of the content. We performed initial coding in an inductive manner, where codes were generated from the data without trying to fit them into a pre-existing coding frame. This allowed emerging themes to be grounded directly in the interview data. After coding, we grouped related codes into potential themes. These themes were continually reviewed and refined to ensure they accurately represented the data. This part of the analysis was iterative, as themes were defined and redefined through discussions among the research team members. Each theme was then reviewed in the context of the coded extracts and the entire data set. This was to ensure that themes were coherent, consistent, and distinct. We finalized themes by defining and refining their specifics and how they are related to the user requirements in telehealth. This step involved a detailed analysis of each user requirement captured.</p>
          <p>In the system implementation section, following the design evaluation guidelines proposed in [<xref ref-type="bibr" rid="ref30">30</xref>], we have evaluated our artifacts using both the descriptive evaluation method and analytical evaluation method for the security domain, and the experimental evaluation method for the performance domain.</p>
        </sec>
      </sec>
      <sec>
        <title>Ethical Considerations</title>
        <p>We did not submit an application for ethics review board assessment because our research methodology has been classified as “Quality assurance activities designed to continuously improve the quality or performance of a department or program (results will not be shared with public)” according to the Office of Research Integrity (ORI) at Florida International University [<xref ref-type="bibr" rid="ref46">46</xref>]. The interview data were collected anonymously and contained no information that could be linked to specific individuals. The data collected in this study were primarily used to design a software architecture integrated with blockchain technology, following a quality improvement approach. The raw data were analyzed to extract user requirements, which informed the design of the system architecture and the implementation of system functions. We used the raw data solely for the purpose of designing system functions. This paper presents the resulting system architecture and functions, rather than the original data, ensuring that specific details from the interviews remain confidential and are used solely for system development purposes. The results presented in this paper are derived from our analysis and not the original data.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Developing Design Requirements for Telehealth Artifacts</title>
        <sec>
          <title>User Requirements (Frontend)</title>
          <p>From the patient or user-centric standpoint, we retrieved the following 4 features from the survey as design requirements: data ownership, data sharing, self-sovereign identity (SSI) capability, and system monitoring with user notifications (<xref rid="figure3" ref-type="fig">Figure 3</xref>).</p>
          <fig id="figure3" position="float">
            <label>Figure 3</label>
            <caption>
              <p>User-centric approach for requirement collection.</p>
            </caption>
            <graphic xlink:href="jmir_v26i1e46556_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <sec>
            <title>Data Ownership</title>
            <p>Ownership means that everyone using the platform owns their data. They can limit personal information exposure at their own control. Fragmented records are easy to merge and integrate without any third-party involvement. Patients can own their health records, such as telehealth visits and immunization records, for future reference or verification. We have provided snippets of interview comments that helped us generate the data ownership requirements.</p>
            <p>One current telehealth user mentioned:</p>
            <disp-quote>
              <p>Telehealth should make sure, each time before the user who logs into the system, the system itself should at least ask the person one or two personal questions, which have been asked before, so that it could verify if that is it the very same person who is logging in.</p>
            </disp-quote>
            <p>Another telehealth user commented:</p>
            <disp-quote>
              <p>Perhaps telehealth systems should send me regular updates regarding the security of my personal data and should allow me to have control over how secure my data is and what security measures are put in place to protect it.</p>
            </disp-quote>
            <p>One expert user mentioned:</p>
            <disp-quote>
              <p>I would want patients to be able to access their data if they wanted to, so that they can see what is recorded about them. I would want there to be a clear way for patients to review the data and communicate with the service if they felt any information was incorrect or needed amending. I would want patients to be offered clear choices about how their data is managed.</p>
            </disp-quote>
          </sec>
          <sec>
            <title>Data Sharing</title>
            <p>The patient can decide what information gets shared and to whom the information gets shared. The permission for data sharing does not rely on health care providers or medical institutions, which means that the reliance on institutions is minimized. Most importantly, the patient can only share the necessary information without revealing personal or sensitive information. We have provided several interview comments on the data-sharing requirement of telehealth.</p>
            <p>A user commented:</p>
            <disp-quote>
              <p>In my opinion, information should only be shared between doctors - obviously - but also only when completely necessary. For example, if someone is visiting a mental health professional, I think a big concern is that the information shared will be shared with their family doctor for example.</p>
            </disp-quote>
            <p>Another user mentioned:</p>
            <disp-quote>
              <p>Data that is shared between the medical services should only be found on the patient history, only with his or her permission, so that they know that they were there ones who allowed it to happen or to take place.</p>
            </disp-quote>
            <p>A medical professional stated:</p>
            <disp-quote>
              <p>There is a vast security network in place to allow the safe sharing of data between medical service providers. I would expect the telehealth system to have similar security systems in place. For instance, there should be levels of clearance given to different members of staff as to which data they are able to access and who is able to share it.</p>
            </disp-quote>
          </sec>
          <sec>
            <title>SSI Capability</title>
            <p>Patients are required to verify their identity each time they request a telehealth visit. The identification and verification processes are launched on top of the blockchain-supported credential authentication platform. The verified credentials will be hashed and recorded in the blockchain ledger and the patient’s local storage for immutability and protection purposes. We have provided interview comments that helped us generate the SSI requirements.</p>
            <p>One current telehealth user mentioned:</p>
            <disp-quote>
              <p>Telehealth systems can verify user identity by asking questions only the specific user would know the answers to. Identity verification software can be researched and utilized.</p>
            </disp-quote>
            <p>Another telehealth user commented:</p>
            <disp-quote>
              <p>I think it would be beneficial for video calling to be the main method of telehealth services, and then the patient would be able to display their health card.</p>
            </disp-quote>
            <p>An expert user agreed:</p>
            <disp-quote>
              <p>The person could also be asked to input some verification details when logging on for the first time - for example, they could be asked to put in their name, date of birth and address, and these could be checked against the recorded details - if these did not match, then the person would not be able to log on.</p>
            </disp-quote>
          </sec>
          <sec>
            <title>Monitoring and Notifications</title>
            <p>The patient has the option to enable the function of monitoring risks according to their health conditions after the telehealth visit, with assisting wearable devices or other medical equipment. The patient can also be notified about safety measures or potential risks of certain activities, especially in the pandemic era, with their permission and initiative to share the intended activities. We have provided several interview comments on the monitoring and notification requirements of telehealth.</p>
            <p>A user commented:</p>
            <disp-quote>
              <p>Telehealth systems can monitor my progress by allowing me to enter symptoms, information, personal notes, and observations, and so forth into an online diary or sorts.</p>
            </disp-quote>
            <p>Another telehealth user mentioned:</p>
            <disp-quote>
              <p>I think the best option would be to follow up via the same method as the initial consultation that allows for either user to communicate whenever they are available rather than having to be connected at the same time.</p>
            </disp-quote>
            <p>An expert user stated:</p>
            <disp-quote>
              <p>I would like optional questionnaires on the system, that the patient could be asked to complete during or after each session. I would like there to be a broad range of options available, so that the patient and I could pick the questionnaires most suited to them and their health conditions, and we could pick the frequency of monitoring this.</p>
            </disp-quote>
          </sec>
        </sec>
        <sec>
          <title>System Functions (Backend)</title>
          <p>For system functions in the telehealth scenario, we have considered 4 aspects, including architecture, data operation, integration, and interoperation among systems, which will be improved for the adoption of the blockchain component. Moreover, for the security of user accounts and access management, the system functions will include authentication and access control. Detailed descriptions of each function are presented below (<xref rid="figure4" ref-type="fig">Figure 4</xref>).</p>
          <fig id="figure4" position="float">
            <label>Figure 4</label>
            <caption>
              <p>System functionality analysis.</p>
            </caption>
            <graphic xlink:href="jmir_v26i1e46556_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <sec>
            <title>Decentralization</title>
            <p>The system will be built on top of decentralized architecture, which removes the vulnerability of a single point of failure and removes the reliability on a trusted third party. With decentralized architecture, there is extra assurance of the resilience of the system, especially when faced with potential attacks from both insiders and outsiders. The decentralized governance of the data and system operations assures that the system still functions normally even when some portion of the system is compromised. For telehealth visits, it is essential to maintain the business uninterrupted during the communication process between patients and health care providers, and maintain after-visit accessibility. The decentralized server architecture will provide seamless communication and connection whenever the patient needs access to either service or data remotely.</p>
          </sec>
          <sec>
            <title>Immutability</title>
            <p>The blockchain structure provides the function of immutability and tamper resistance in terms of data protection and makes sure that any data records or access logs cannot be modified by malicious users. Both the data records and access records are hashed and stored in the blockchain and local storage. This technique can prevent both insider and outsider attacks. Further, it is essential to provide the authenticity of system logs when auditing or digital forensics is requested.</p>
          </sec>
          <sec>
            <title>Authentication and Access Control</title>
            <p>As we mentioned in the user requirements, the SSI mechanism has been implemented with blockchain technology, so the authentication process in the system is based on the identity and user credentials provided when requested. Delegated access can be designed for users at different levels so that only authorized users can access the data, and the data can only be accessed by users authorized with delegated access and valid tokens [<xref ref-type="bibr" rid="ref47">47</xref>]. Once the tokens expire, access is revoked. Appropriate access control mechanisms should be designed and implemented to protect data security and defend against attacks such as email phishing and social engineering attacks.</p>
          </sec>
          <sec>
            <title>Adaptability</title>
            <p>This system function is required at 3 different levels. First, the telehealth system should adapt to user groups (pediatrics, adults, and seniors). The sign-up process should be easy and transparent. There should not be any technical barriers for users to adopt the system. Moreover, system access cannot be slow and costly. Users should be capable of accessing their comprehensive medical records at their fingertips [<xref ref-type="bibr" rid="ref48">48</xref>]. Second, the telehealth system was demanded by the pandemic situation, but it should also adapt to postpandemic use cases when the telehealth need will be further developed and improved [<xref ref-type="bibr" rid="ref49">49</xref>]. Third, for compliance with regulations, policies, and guidelines from federal, state, and local governments, the system should be accompanied by a function to adapt well to future updates and upgrades by continuous system iterations.</p>
          </sec>
          <sec>
            <title>Interoperability</title>
            <p>The artifact considers and integrates the system upgrade with the function and capability of interoperability, considering the current health care system separation and data silos. The blockchain component serves as an underlayer of the telehealth system and should be designed as an open application programming interface for easy adoption and interoperability. Users should be capable of accessing their medical records from other systems, which can be easily imported. The transfer of records should be seamless, saving money and time.</p>
          </sec>
        </sec>
      </sec>
      <sec>
        <title>Deriving Blockchain DPs and Design Features for Privacy Protection</title>
        <p>Following the existing body of knowledge and the design requirements concluded from the previous step, we have derived the following basic DPs that can be fulfilled with design features [<xref ref-type="bibr" rid="ref50">50</xref>] summarized in the next step.</p>
        <p>First, considering the objectives of this research, the UX and DSR paradigms can be combined to design a user-centric IT system [<xref ref-type="bibr" rid="ref51">51</xref>] and can offer telehealth services to potential users. By applying the DSR and UX principles and exploring how these 2 paradigms can individually and jointly strengthen the design and development processes for user-centric systems, we can identify their value to both theory and practice. Thus, we have derived the following DP (DP1): Focus on a user-centered business process before, during, and after the telehealth service is provisioned. The second philosophy during the design was a minimalist design, and it is summarized as the “less is more” principle, due to the reality that irrelevant information distracts [<xref ref-type="bibr" rid="ref52">52</xref>]. This DP reflects the system design requirements of adaptability and interoperability and is summarized as follows (DP2): Redesign the business process with minimal change to the current working system in telehealth services.</p>
        <p>Owing to the business logic and nature of health care service providers, the telehealth platform needs coordination among multiple health care providers and relevant stakeholders in the telehealth ecosystem to serve many patients on demand [<xref ref-type="bibr" rid="ref53">53</xref>]. Thus, a decentralized design pattern allows a real-time patient response in terms of workload balance. A health care member in the blockchain network can join and access the telehealth platform on demand while the number of patient requests varies. This will lead to the maximization of business value and patient benefit. Thus, we summarize the DP as follows (DP3): Increase business value and reduce costs associated with telehealth integration and adaptation. Another DP is as follows (DP4): Apply automated business process design to telehealth system configuration and maintenance. Considering the user requirements of data ownership, automation can be used to implement and accomplish data sharing, identity management, and monitoring. Automation can be realized by a blockchain smart contract where a business process can be decomposed into single steps that are performed repeatedly and follow specific rules [<xref ref-type="bibr" rid="ref50">50</xref>]. Specifically, in smart contract execution, the business process can be translated into algorithms, which a computer can execute automatically and repeatedly, in near real-time patterns. Meanwhile, automation can reduce the cognitive efforts required from human attention, thus improving the system efficiency and removing human errors. Another DP is as follows <bold>(</bold>DP5): Security-oriented design baked into the entire data lifecycle. Security is always a crucial component, especially when faced with sensitive patient data. The user requirements for frontend design include patient authentication and identification verification processes, which can ensure that the patient is the same person they claim to be. Meanwhile, patient data can be considered a critical asset, and the platform should strictly enforce designed access control policies so that only authorized entities can access patient data and should adopt auditing components.</p>
        <p>Existing blockchain-supported telehealth platforms have various features that can benefit both users and health care providers, as well as other stakeholders. A summary of the features is presented in <xref ref-type="table" rid="table1">Table 1</xref>.</p>
        <p>Based on the DPs, we have proposed the following design features in this paper to provide a blockchain-assisted telehealth solution (<xref rid="figure5" ref-type="fig">Figure 5</xref>). For the system functions in the telehealth scenario, we will consider 4 aspects, including architecture, data operation, integration, and interoperation among systems, which will be improved for the adoption of the blockchain component. Besides, for the security of user accounts and access management, the system functions will include authentication and access control. The system will be built on top of the decentralized architecture, which removes the vulnerability of a single point of failure and removes the reliability on a trusted third party. With decentralized architecture, there is extra assurance of the resilience of the system, especially when faced with potential attacks from both insiders and outsiders. The decentralized governance of the data and system operations assures that the system will function normally even when some part of the system is compromised.</p>
        <p>For telehealth visits, it is essential to maintain the business uninterrupted during the communication process between patients and health care providers, and maintain after-visit accessibility. The decentralized server architecture will provide seamless communication and connection whenever the patient needs access to either service or data remotely. The SSI mechanism will be implemented with blockchain technology, and thus, the authentication process in the system will be based on the identity and user credentials provided when requested. Delegated access can be designed for users at different levels so that only authorized users can access the data, and the data can only be accessed by users authorized with delegated access and valid tokens. Once the tokens expire, access is revoked [<xref ref-type="bibr" rid="ref47">47</xref>]. Appropriate access control mechanisms should be designed and implemented to protect data security and defend against attacks such as email phishing and social engineering attacks. Overall, the security design is baked into the entire data lifecycle, from data collection and data storage to data sharing.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Existing blockchain solutions and design features.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="210"/>
            <col width="260"/>
            <col width="530"/>
            <thead>
              <tr valign="top">
                <td>Design features</td>
                <td>Blockchain capability and components required</td>
                <td>Benefits and improvements</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Medical data access; medical records for distant consultations; patient data and prescription</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Decentralized network</p>
                    </list-item>
                    <list-item>
                      <p>Smart contract</p>
                    </list-item>
                    <list-item>
                      <p>Tamper resistance</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Patient outreach: extend the reach and expand health care services to patients</p>
                    </list-item>
                    <list-item>
                      <p>Data provenance: clinical data; patient data</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Medical services processing</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Transparency</p>
                    </list-item>
                    <list-item>
                      <p>Peer-to-peer communication</p>
                    </list-item>
                    <list-item>
                      <p>Smart contract</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Convenience: conveniently monitor and manage long-term patient care</p>
                    </list-item>
                    <list-item>
                      <p>Workforce limitations: minimize patient access and workforce limitation issues</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Video conferencing</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Peer-to-peer communication</p>
                    </list-item>
                    <list-item>
                      <p>Data provenance</p>
                    </list-item>
                    <list-item>
                      <p>Smart contract</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Effectiveness: present more effective use of health care provider’s time slots</p>
                    </list-item>
                    <list-item>
                      <p>Throughput: assist physicians to serve more patients</p>
                    </list-item>
                    <list-item>
                      <p>Diagnosis time: prevent delay of diagnosis for certain deadly conditions or diseases</p>
                    </list-item>
                    <list-item>
                      <p>Social distance: prevent the spread of airborne infections</p>
                    </list-item>
                    <list-item>
                      <p>Revenue: provide new streams of revenue to physicians and hospitals</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Epidemiology reporting and remote monitoring</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Peer-to-peer communication</p>
                    </list-item>
                    <list-item>
                      <p>Smart contract</p>
                    </list-item>
                    <list-item>
                      <p>Data provenance</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Convenience: conveniently monitor and manage long-term patient care</p>
                    </list-item>
                    <list-item>
                      <p>Throughput: assist physicians to serve more patients</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Diagnostics support; emergency service and translation support</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Peer-to-peer communication</p>
                    </list-item>
                    <list-item>
                      <p>Data provenance</p>
                    </list-item>
                    <list-item>
                      <p>Smart contract</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Convenience: conveniently monitor and manage long-term patient care</p>
                    </list-item>
                    <list-item>
                      <p>Data provenance</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Treatment support and doctor recommendation</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Immutability</p>
                    </list-item>
                    <list-item>
                      <p>Smart contract</p>
                    </list-item>
                    <list-item>
                      <p>Data provenance</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Data provenance</p>
                    </list-item>
                    <list-item>
                      <p>Throughput: assist physicians to support more patients</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Patient data aggregation</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Immutability</p>
                    </list-item>
                    <list-item>
                      <p>Peer-to-peer communication</p>
                    </list-item>
                    <list-item>
                      <p>Data provenance</p>
                    </list-item>
                    <list-item>
                      <p>Smart contract</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Identity management</p>
                    </list-item>
                    <list-item>
                      <p>Access control: authorize participants without a central authority</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Visit arrangement</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Peer-to-peer communication</p>
                    </list-item>
                    <list-item>
                      <p>Smart contract</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Convenience: conveniently arrange patient care</p>
                    </list-item>
                    <list-item>
                      <p>Throughput: assist physicians to serve more patients</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Medicine ordering and drug tracking</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Immutability</p>
                    </list-item>
                    <list-item>
                      <p>Data provenance</p>
                    </list-item>
                    <list-item>
                      <p>Smart contract</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Convenience: conveniently monitor and manage long-term patient care</p>
                    </list-item>
                    <list-item>
                      <p>Data provenance</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Automated payments for billing and claims</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Immutability</p>
                    </list-item>
                    <list-item>
                      <p>Data provenance</p>
                    </list-item>
                    <list-item>
                      <p>Smart contract</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Automated execution: payment settlement</p>
                    </list-item>
                    <list-item>
                      <p>Data provenance</p>
                    </list-item>
                    <list-item>
                      <p>Immutability: ledger service</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>Fundraising</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Data provenance</p>
                    </list-item>
                    <list-item>
                      <p>Smart contract</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Identity management: manage user identities</p>
                    </list-item>
                    <list-item>
                      <p>Anonymity: preserve patient anonymity</p>
                    </list-item>
                    <list-item>
                      <p>Immutability: ledger service</p>
                    </list-item>
                  </list>
                </td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <fig id="figure5" position="float">
          <label>Figure 5</label>
          <caption>
            <p>Proposed design features.</p>
          </caption>
          <graphic xlink:href="jmir_v26i1e46556_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Developing and Implementing the Blockchain Platform for Privacy Protection</title>
        <p>This paper discusses 2 features that are implemented and that users directly interact with according to our user study, namely, user account/credential management functionality and token-based access control functionality, both of which are closely related to security and privacy.</p>
        <p>To provide smart contract–driven functionalities, we have built our platform, Dokka (<xref rid="figure6" ref-type="fig">Figure 6</xref>), with the Rahasak blockchain [<xref ref-type="bibr" rid="ref54">54</xref>]. Rahasak is a permissioned blockchain platform where participating institutions can register and enroll their identity through a membership management service. The platform has been designed using a microservices architecture. Dokka is a blockchain SSI-based credentialing engine for telehealth platforms. Multiple health care companies (eg, Sentara and Cigna) collaborate with blockchain platforms (eg, IBM HUN). There will be a separate blockchain node for each health care company. Smart contracts will be running on each blockchain node. The data on the platform can be shared among multiple hospitals in the network.</p>
        <fig id="figure6" position="float">
          <label>Figure 6</label>
          <caption>
            <p>Dokka platform’s microservice-based architecture.</p>
          </caption>
          <graphic xlink:href="jmir_v26i1e46556_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <sec>
          <title>Smart Contract–Supported User Credential Management</title>
          <p>Physicians can use this application to manage their physician credentials (<xref rid="figure7" ref-type="fig">Figure 7</xref>). Patients can use the application to manage their telehealth functions such as appointment booking and prescription handling (<xref rid="figure8" ref-type="fig">Figure 8</xref>). An SSI-based identity wallet has been implemented to capture or verify user identity proofs. It stores user data on the blockchain platform by using SSI proofs. All services are dockerized and available to deploy with Kubernetes [<xref ref-type="bibr" rid="ref55">55</xref>]. The Dokka platform is built on the microservice architecture [<xref ref-type="bibr" rid="ref56">56</xref>] to support high scalability and high transaction load following the single responsibility principle. To cope with high transaction loads and back-pressure [<xref ref-type="bibr" rid="ref57">57</xref>] operations in practical systems, we have followed a reactive stream–based approach in the implementation process. All microservice communications are handled via the Apache Kafka message broker. The functionalities of the blockchain have been implemented with Aplos smart contracts. There are 3 main smart contracts: account contracts, device contracts, and credentialing contracts. The Dokka mobile wallet is the client application on the Dokka platform. The functions implemented in the blockchain smart contracts will be invoked by mobile clients. The requests generated from mobile apps will be directed to blockchain smart contracts via the Dokka gateway service. There is a peer-to-peer communication channel between Dokka mobile wallets to exchange credential data.</p>
          <fig id="figure7" position="float">
            <label>Figure 7</label>
            <caption>
              <p>Physician interface for credential management.</p>
            </caption>
            <graphic xlink:href="jmir_v26i1e46556_fig7.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure8" position="float">
            <label>Figure 8</label>
            <caption>
              <p>Patient interface for credential management.</p>
            </caption>
            <graphic xlink:href="jmir_v26i1e46556_fig8.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>Token-Based Access Control</title>
          <p>A missing design component in existing studies is the access control mechanism in telehealth platforms. This project adopts token-based access control to secure personal health data access and exposure. The access control policies are enforced by blockchain smart contracts in a decentralized way to ensure integrity and remove the necessity of a trusted third party. Various stakeholders can request data access from the data owner, that is, the registered user in the system. Users have the option to grant, deny, and revoke access from other participants. User registration is based on U-Prove technology [<xref ref-type="bibr" rid="ref58">58</xref>], which includes 3 entities, namely, issuer, prover, and verifier. In our implementation, the issuer and verifier represent the same entity. Parameter definitions for both the prover and issuer in the token generation phase are listed in <xref ref-type="table" rid="table2">Table 2</xref>.</p>
          <p>With the above information provided, we have used issuance protocol version number 0x01 and the user platform identification key to generate a private key in the token generation protocol (<xref rid="figure9" ref-type="fig">Figure 9</xref>). For each telehealth request, the user will generate an access token for the requester. The algorithm supports the generation of multiple keys for a single user for better performance. The Dokka platform nodes issue tokens to users with a digital signature. For privacy concerns, the application attributes are hashed for the generation of U-Prove–based tokens. During certain circumstances, the issuer can generate multiple tokens at one time for better performance.</p>
          <table-wrap position="float" id="table2">
            <label>Table 2</label>
            <caption>
              <p>Parameter definitions for both the prover and issuer in the token generation phase.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="500"/>
              <col width="500"/>
              <thead>
                <tr valign="top">
                  <td>Parameter</td>
                  <td>Parameter definition</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>
                    <italic>(TI): TI</italic>
                    <italic>∈</italic>
                    <italic>(0, 1)*</italic>
                  </td>
                  <td>The value of the token information field</td>
                </tr>
                <tr valign="top">
                  <td>
                    <italic>(PI): PI</italic>
                    <italic>∈</italic>
                    <italic>(0, 1) *</italic>
                  </td>
                  <td>The value of the prover information field</td>
                </tr>
                <tr valign="top">
                  <td>
                    <italic>(AA): (A1, ..., An), TI</italic>
                  </td>
                  <td>Application attributes</td>
                </tr>
                <tr valign="top">
                  <td>
                    <italic>UID</italic>
                    <sub>
                      <italic>H</italic>
                    </sub>
                  </td>
                  <td>Identifier for the secure hash algorithm</td>
                </tr>
                <tr valign="top">
                  <td>
                    <italic>(g0, g1, ..., gn, gt)</italic>
                  </td>
                  <td>Issuer’s public key</td>
                </tr>
                <tr valign="top">
                  <td>
                    <italic>(e1, ..., en)</italic>
                  </td>
                  <td>Format of each application attribute</td>
                </tr>
                <tr valign="top">
                  <td>
                    <italic>(IP): UIDp, desc(Gp),UID</italic>
                    <sub>
                      <italic>H</italic>
                    </sub>
                    <italic>,(g0, g1, ..., gn, gt),(e1, ..., en)</italic>
                  </td>
                  <td>Issuer parameters</td>
                </tr>
                <tr valign="top">
                  <td>
                    <italic>P = H(IP)</italic>
                  </td>
                  <td>The hash of the <italic>(IP)</italic></td>
                </tr>
                <tr valign="top">
                  <td>
                    <italic>(DP): gd, xd, hd</italic>
                  </td>
                  <td>Device parameters</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <fig id="figure9" position="float">
            <label>Figure 9</label>
            <caption>
              <p>Access token generation algorithm.</p>
            </caption>
            <graphic xlink:href="jmir_v26i1e46556_fig9.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
      <sec>
        <title>Evaluation of Security and Design Performance</title>
        <sec>
          <title>Security Analysis</title>
          <p>From the analytical perspective, our security design is baked into the overall telehealth architecture. Based on the attack surface analysis of the telehealth platform, we have considered the authentication, communication, and auditing processes. According to the design blueprint for a large-scale telehealth platform [<xref ref-type="bibr" rid="ref53">53</xref>], 5 layers are taken into account. Using smart contract–driven methodology, this paper improves the security level for each layer, including user authentication, user credential verification, access control, data protection, and auditing (layers 1-5). Users interact with layer 1 directly, and this is the initial step for the telehealth service. During this phase, users are authenticated by the blockchain network via an SSI-enabled identity verification process. Layer 2 determines the appropriate access control policy, and the tokens are issued in this step for both patients and stakeholders. Specifically, the tokens are periodically refreshed to defend against replay attacks, man-in-the-middle attacks, stolen verifier attacks, and impersonation attacks [<xref ref-type="bibr" rid="ref34">34</xref>]. Layer 3 functions on top of the issuance of the tokens, and access is granted automatically via smart contracts. Users can perform data-sharing operations with other parties in layer 4 with appropriate cryptographic settings. The auditing process in layer 5 monitors all the activities in this process and automatically generates alerts once a malicious behavior is detected. The auditing process is captured by smart contracts so that the log is tamper-resistant.</p>
          <p>As pointed out in [<xref ref-type="bibr" rid="ref53">53</xref>], the user registration and identification verification layer is the frontend layer, which is a representative artifact of user-centered design. Thus, we have analyzed the security properties provided by the user registration and identification verification process here from a descriptive perspective. The critical identity information could be accessed by attackers via technical approaches such as key compromise and identity theft. Impersonation attacks are typical cases of identity manipulation attacks, which can be launched via identity theft or credential compromise. If attackers get access to previous account tokens, they could recognize or identify a pattern from these tokens, and thus, valid tokens could be compromised eventually.</p>
          <p>For the token-based access control component, there are potential attacks such as replay attacks. Smart contracts will provide preventive measures against token-related attacks by the enforcement of automatic program execution and peer validation of tokens. In this way, the replay attack will fail due to unauthorized access and the consensus protocols designed for peer validation. For the video conferencing component, there are potential attacks, such as man-in-the-middle attacks and impersonation attacks, but the peer-to-peer communication process is well protected by the underlying smart contracts and cryptographic algorithms.</p>
          <p>In summary, the proposed design provides resistance against common attacks targeting general user communication processes with multiple stakeholders involved. Specifically, the design provides resistance against replay attacks, collusion attacks, man-in-the-middle attacks, stolen verifier attacks, and impersonation attacks [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
        </sec>
        <sec>
          <title>Performance Analysis</title>
          <p>Technically, the blockchain can support telehealth platform functionalities; however, previous studies have mentioned that the blockchain’s scalability is currently limited [<xref ref-type="bibr" rid="ref59">59</xref>]. We evaluated the performance in terms of transaction throughput, smart contract execution time, and block generation time. Besides, the scalability and throughput of blockchain transactions have always been concerns and bottlenecks for system processing capability. In the following experiments, we will investigate these different aspects of system performance and compare them with existing solutions. There are 3 Kafka broker nodes for consensus management, with 3 Zookeeper nodes representing service providers in Dokka with multiple Rahasak blockchain clusters in AWS 2xlarge instances (16 GB RAM and 8 CPUs). The simulation platform uses Apache Cassandra as the state database and is implemented with Scala functional programming and the actor-based Aplos smart contract platform. The evaluation results are obtained with a varying number of blockchain peers in different evaluations.</p>
          <p>For transaction throughput, we recorded the number of digital identity proof create transactions and digital identity proof query transactions that can be executed in each peer in the Dokka platform. Digital identity proof query transactions and invoke transactions generate transaction records that update the status of the ledger, while query transactions only perform search operations without updating the existing transactions. We obtained consistent throughput in each peer on the Dokka platform, flooded with concurrent transaction load (<xref rid="figure10" ref-type="fig">Figure 10</xref>). Similarly, we recorded the time cost to execute and validate different sets of transactions (<xref rid="figure11" ref-type="fig">Figure 11</xref>), which indicates an acceptable and linear time overhead.</p>
          <p><xref rid="figure12" ref-type="fig">Figure 12</xref> shows the transaction scalability aspect. As the number of nodes in the cluster increases, the transaction throughput increases linearly. Query transactions have higher scalability than invoke transactions since the query operation avoids ledger status updates. To evaluate the transaction execution rate, we captured the number of transactions executed using different numbers of blockchain peers. <xref rid="figure13" ref-type="fig">Figure 13</xref> shows that when the number of peers increases, the transaction execution rate increases proportionally.</p>
          <p><xref rid="figure14" ref-type="fig">Figure 14</xref> shows the transaction execution rate and transaction submission rate in a single peer. The results are satisfying with regard to the stable performance over time. Moreover, the average time to generate new blocks is recorded against the number of transactions in a block. Block generation time depends on the message propagation time, block hash time, and transaction verification time. When the number of transactions increases in a single block, these factors will increase. Therefore, when the number of transactions increases, block generation time also increases correspondingly. As shown in <xref ref-type="supplementary-material" rid="app4">Multimedia Appendix 4</xref>, it takes 8 seconds on average to create a block with 10,000 transactions.</p>
          <fig id="figure10" position="float">
            <label>Figure 10</label>
            <caption>
              <p>Invoke and query transaction throughput.</p>
            </caption>
            <graphic xlink:href="jmir_v26i1e46556_fig10.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure11" position="float">
            <label>Figure 11</label>
            <caption>
              <p>Transaction execution time and validation time.</p>
            </caption>
            <graphic xlink:href="jmir_v26i1e46556_fig11.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure12" position="float">
            <label>Figure 12</label>
            <caption>
              <p>Transaction scalability.</p>
            </caption>
            <graphic xlink:href="jmir_v26i1e46556_fig12.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure13" position="float">
            <label>Figure 13</label>
            <caption>
              <p>Transaction execution rate.</p>
            </caption>
            <graphic xlink:href="jmir_v26i1e46556_fig13.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure14" position="float">
            <label>Figure 14</label>
            <caption>
              <p>Transaction execution rate and submission rate in a single blockchain peer.</p>
            </caption>
            <graphic xlink:href="jmir_v26i1e46556_fig14.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>According to the matrix approach [<xref ref-type="bibr" rid="ref39">39</xref>] proposed for evaluating the knowledge contribution in DSR from the information system discipline, the overall contribution in this paper falls into the advancement quadrant introducing an innovation. We presented a decentralized telehealth platform design and development approach that can help guide future blockchain integration and new technology adoption. We have summarized the blockchain telehealth design implications (DIs) as our knowledge contribution to the design theory for blockchain integration strategies.</p>
        <sec>
          <title>DI1: Prioritize User Requirements in the Business Process Design</title>
          <p>Try to focus on the human experience and consider the actions and needs of patients who will use the portal and not just focus on the technical aspects of the system design. Recognize the importance of collaboration with patients to ultimately deliver an impactful experience. User-centric design will benefit every stage of the research, from testing and validation to solutions, in order to meet user needs. Consumer preferences will play an important role in the transition from the pandemic period to the postpandemic period [<xref ref-type="bibr" rid="ref60">60</xref>]. The blockchain integration process is hidden from users, and most of the time, users are not required or not aware of their actions to interact with blockchain networks. Thus, when designing smart contracts, try to optimize the workflow with user-centered principles and provide maximized simplicity.</p>
        </sec>
        <sec>
          <title>DI2: Redesign the Business Process With Minimal Change</title>
          <p>Business processes are not standalone; thus, it is very important to reuse the components of blockchain integration and share the common design artifacts across the system development lifecycle. For health care providers, there is always a need to minimize costs without reducing the quality of the services provided to customers [<xref ref-type="bibr" rid="ref61">61</xref>].</p>
        </sec>
        <sec>
          <title>DI3: Increase Security and Business Value</title>
          <p>Security design should be baked into the entire lifecycle of telehealth design. Specifically, data management and access control policies should be enforced across the system components involved in patient data operations. Along with deployability, scalability, reliability, and ease of use, patient trust should be taken care of so that users are motivated to adopt the telehealth platform at their comfort level. Do not oversimplify the process, and try to understand the business value up front and focus on long-term benefits.</p>
        </sec>
        <sec>
          <title>DI4: Pilot Project Experiment and Iteration</title>
          <p>End users can provide feedback about the current iteration of the portal to inform future improvements that will meet their needs. Considering complicated patient demographics and enabling various functionalities in multiple rounds of iterations will boost patient enrollment and engagement [<xref ref-type="bibr" rid="ref62">62</xref>]. Evaluate different platform options and product features to best suit the business use cases for telehealth innovations.</p>
        </sec>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Blockchain as a new technology is not yet fully developed in the health care domain [<xref ref-type="bibr" rid="ref63">63</xref>] or framed by government rules and regulations [<xref ref-type="bibr" rid="ref64">64</xref>]. There are some technical limitations of our prototype, especially related to the health care domain. First, generalized and standardized mechanisms for institutional collaboration are required to address the gaps between different medical procedures before, during, and after the telehealth process. Second, the sharing of health care data can lead to unintended intellectual information disclosure if the deployment of the system is not done correctly. Using thorough planning and negotiation between institutions can address this limitation. Third, the incentive mechanism for institutional collaboration could also be explored to address this limitation in future work. Full participation from all stakeholders [<xref ref-type="bibr" rid="ref65">65</xref>] is extremely essential for promoting the adoption of this innovative architectural design to achieve better health care delivery.</p>
      </sec>
      <sec>
        <title>Comparison With Prior Work</title>
        <p>Prior work has provided an overview of the adoption of digital technologies in the health care domain, which highlighted blockchain as an innovative solution to provide assistance to diagnosis during a crisis [<xref ref-type="bibr" rid="ref66">66</xref>]. The necessity of security regulations and privacy policies is indicated to adopt blockchain technology [<xref ref-type="bibr" rid="ref41">41</xref>], which calls for studies like ours to protect patient data and especially the communication process in the telehealth platform. Previous developments and implementations of smart contracts were built on top of Ethereum for 3 telehealth services, including teleconsultation, drug administration, and medical testing [<xref ref-type="bibr" rid="ref32">32</xref>]. The BlockHeal framework has been validated by demonstrating several use cases, including user registration and verification, patient online consultation with doctors, health care and laboratory facilities, drug counterfeiting, pharmacovigilance, language translations, and emergency facilities [<xref ref-type="bibr" rid="ref33">33</xref>]. There are issues with scalability and security features when faced with multiserver architectures [<xref ref-type="bibr" rid="ref34">34</xref>]. We have compared blockchain-assisted telehealth solutions in <xref ref-type="table" rid="table3">Table 3</xref> and have highlighted our contribution.</p>
        <p>In summary, while there are applications available to support telehealth services, there are few guidelines for decentralized implementation. Based on blockchain characteristics and the needs associated with telehealth services, we have proposed a set of smart contract–driven telehealth DPs from the design requirements collected from user experiments and academic or industrial initiatives. We have designed and presented 2 artifacts that can facilitate both user end (frontend) and backend system integration with blockchain technology, namely, the user credential management function and access control function, driven by underlying smart contracts. The proof-of-concept project demonstrates the feasibility and verifies the usable potential of the proposed concept and design theory. From the artifact design, we have presented a reflection of the design and have performed an evaluation of the proposed design in terms of security properties and functionality performances, followed by a summary of the lessons learned and contributions to DSR theories.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>A comparison of blockchain-assisted telehealth solutions.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="200"/>
            <col width="180"/>
            <col width="230"/>
            <col width="200"/>
            <col width="190"/>
            <thead>
              <tr valign="top">
                <td>Solution</td>
                <td>Storage</td>
                <td>Blockchain role</td>
                <td>Smart contract</td>
                <td>Blockchain type</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Authentication for multiserver edge computing [<xref ref-type="bibr" rid="ref34">34</xref>]</td>
                <td>Edge and cloud</td>
                <td>Authentication and key agreement</td>
                <td>Practical byzantine fault tolerance (PBFT)</td>
                <td>A lightweight consortium blockchain</td>
              </tr>
              <tr valign="top">
                <td>MEC<sup>a</sup> real-time authentication between IoT, MEC, and cloud [<xref ref-type="bibr" rid="ref67">67</xref>]</td>
                <td>Storage offloading capability</td>
                <td>Rewarding scheme</td>
                <td>Access control</td>
                <td>Permissioned, Hyperledger Fabric</td>
              </tr>
              <tr valign="top">
                <td>Blockchain-based telehealth framework, BlockHeal [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
                <td>Decentralized Hyperledger Fabric</td>
                <td>Decentralized applications (DApps)</td>
                <td>Central health regulatory authority</td>
                <td>Permissioned, Hyperledger Fabric</td>
              </tr>
              <tr valign="top">
                <td>Remote patient monitoring [<xref ref-type="bibr" rid="ref68">68</xref>]</td>
                <td>EHR<sup>b</sup> data management using Ethereum</td>
                <td>Blockchain-oriented software (BOS) engineering</td>
                <td>Solidity</td>
                <td>Permissioned, Ethereum and Hyperledger Fabric</td>
              </tr>
              <tr valign="top">
                <td>MedHypChain [<xref ref-type="bibr" rid="ref69">69</xref>]</td>
                <td>Cloud blockchain</td>
                <td>Identity-based broadcast group signcryption mechanism</td>
                <td>PBFT chaincode</td>
                <td>Permissioned, Hyperledger Fabric</td>
              </tr>
              <tr valign="top">
                <td>Three telehealth services [<xref ref-type="bibr" rid="ref32">32</xref>]</td>
                <td>IPFS<sup>c</sup>, cloud, and blockchain</td>
                <td>Tracing, tracking, alert, and provenance</td>
                <td>Public</td>
                <td>Permissioned, Ethereum</td>
              </tr>
              <tr valign="top">
                <td>Our solution</td>
                <td>IPFS and blockchain</td>
                <td>Tracing, tracking, access control, identity management, alert, and provenance</td>
                <td>Actor-based smart contract</td>
                <td>Permissioned, Rahasak</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table3fn1">
              <p><sup>a</sup>MEC: multiaccess edge computing.</p>
            </fn>
            <fn id="table3fn2">
              <p><sup>b</sup>EHR: electronic health record.</p>
            </fn>
            <fn id="table3fn3">
              <p><sup>c</sup>IPFS: InterPlanetary File System.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Conclusion and Future Directions</title>
        <p>We presented the design, development, and implementation of a blockchain-assisted and smart contract–driven telehealth platform that can help users communicate remotely and improve medical services efficiently. The system adopts a user-centric approach and follows the behavior design model to promote new technology adoption among different groups of users. We further evaluated the security and performance of the platform, which exhibited the feasibility and efficiency of the proposed platform. Moreover, we concluded with a set of actionable guidelines and DIs to facilitate the design of a practical blockchain-based telehealth platform. Owing to the limited adoption of blockchain technology in the health care sector, there is a lack of fundamental design theory for blockchain technology integration in the current stage [<xref ref-type="bibr" rid="ref44">44</xref>]. It is important to address who gets to see what data and when [<xref ref-type="bibr" rid="ref70">70</xref>]. Future research can dive deep into each service model and analyze the market segmentation as a new ecosystem. The application of nonfungible tokens to health care [<xref ref-type="bibr" rid="ref71">71</xref>] is another application scenario of blockchain technology that will significantly transform the innovation of the health care industry. For example, telehealth record data can be shared directly with the patient after the televisit and with the health care provider or insurance provider. This might lead to incentive plans that lower insurance premiums paid by patients out-of-pocket when they can demonstrate cost-efficient and flexible health care management.</p>
        <p>This study extends the existing body of knowledge and develops a set of actionable guidelines to facilitate the design of a practical blockchain-based telehealth platform, reflecting the rigor of design research contributions. To the best of our knowledge, few studies have focused on this topic. The extension of our work will benefit several new directions for new technology integration, blockchain adoption, data privacy, and trust in multiple aspects of smart and connected health. Adapting to the sharing economy approach, the telehealth platform should explore the potential as a one-stop service application for patients in need and a promising solution for stakeholders in terms of a new business model.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Digital identity-related privacy requirements.</p>
        <media xlink:href="jmir_v26i1e46556_app1.docx" xlink:title="DOCX File , 17 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Reporting guideline checklist.</p>
        <media xlink:href="jmir_v26i1e46556_app2.docx" xlink:title="DOCX File , 18 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Demographic characteristics of interview respondents.</p>
        <media xlink:href="jmir_v26i1e46556_app3.docx" xlink:title="DOCX File , 17 KB"/>
      </supplementary-material>
      <supplementary-material id="app4">
        <label>Multimedia Appendix 4</label>
        <p>Block creation time against the number of transactions in the block.</p>
        <media xlink:href="jmir_v26i1e46556_app4.png" xlink:title="PNG File , 18 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">DI</term>
          <def>
            <p>design implication</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">DIPR</term>
          <def>
            <p>digital identity–related privacy requirement</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">DP</term>
          <def>
            <p>design principle</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">DSR</term>
          <def>
            <p>design science research</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">FBM</term>
          <def>
            <p>Fogg Behavior Model</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">SSI</term>
          <def>
            <p>self-sovereign identity</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">UX</term>
          <def>
            <p>user experience</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>The authors thank all the reviewers and editors for their helpful suggestions and comments during the review process. The authors also thank all the colleagues who provided valuable feedback during the manuscript preparation process.</p>
    </ack>
    <notes>
      <sec>
        <title>Data Availability</title>
        <p>Data will be provided upon reasonable request.</p>
      </sec>
    </notes>
    <fn-group>
      <fn fn-type="con">
        <p>XL, NA, TS, EB, and SS designed the study and developed the study architecture. XL, NA, and TS drafted the manuscript. XL and EB implemented the architecture. SS reviewed the manuscript for intellectual content. All authors read and approved the final manuscript.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Blohm</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Leimeister</surname>
              <given-names>JM</given-names>
            </name>
          </person-group>
          <article-title>Anatomy of successful business models for complex services: Insights from the telemedicine field</article-title>
          <source>Journal of Management Information Systems</source>
          <year>2015</year>
          <month>12</month>
          <day>16</day>
          <volume>32</volume>
          <issue>3</issue>
          <fpage>75</fpage>
          <lpage>104</lpage>
          <pub-id pub-id-type="doi">10.1080/07421222.2015.1095034</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bélanger</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Crossler</surname>
              <given-names>RE</given-names>
            </name>
          </person-group>
          <article-title>Privacy in the digital age: A review of information privacy research in information systems</article-title>
          <source>MIS Quarterly</source>
          <year>2011</year>
          <volume>35</volume>
          <issue>4</issue>
          <fpage>1017</fpage>
          <pub-id pub-id-type="doi">10.2307/41409971</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Information privacy research: An interdisciplinary review</article-title>
          <source>MIS Quarterly</source>
          <year>2011</year>
          <volume>35</volume>
          <issue>4</issue>
          <fpage>989</fpage>
          <pub-id pub-id-type="doi">10.2307/41409970</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hann</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Hui</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>ST</given-names>
            </name>
            <name name-style="western">
              <surname>Png</surname>
              <given-names>IP</given-names>
            </name>
          </person-group>
          <article-title>Overcoming online information privacy concerns: An information-processing theory approach</article-title>
          <source>Journal of Management Information Systems</source>
          <year>2014</year>
          <month>12</month>
          <day>08</day>
          <volume>24</volume>
          <issue>2</issue>
          <fpage>13</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.2753/mis0742-1222240202</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hui</surname>
              <given-names>KL</given-names>
            </name>
            <name name-style="western">
              <surname>Teo</surname>
              <given-names>HH</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>SYT</given-names>
            </name>
          </person-group>
          <article-title>The value of privacy assurance: An exploratory field experiment</article-title>
          <source>MIS Quarterly</source>
          <year>2007</year>
          <volume>31</volume>
          <issue>1</issue>
          <fpage>19</fpage>
          <pub-id pub-id-type="doi">10.2307/25148779</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stewart</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Segars</surname>
              <given-names>AH</given-names>
            </name>
          </person-group>
          <article-title>An empirical examination of the concern for information privacy instrument</article-title>
          <source>Information Systems Research</source>
          <year>2002</year>
          <month>03</month>
          <volume>13</volume>
          <issue>1</issue>
          <fpage>36</fpage>
          <lpage>49</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.13.1.36.97</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sutanto</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Palme</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Tan</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Phang</surname>
              <given-names>CW</given-names>
            </name>
          </person-group>
          <article-title>Addressing the personalization-privacy paradox:  An empirical assessment from a field experiment on smartphone users</article-title>
          <source>MISQ</source>
          <year>2013</year>
          <month>4</month>
          <day>4</day>
          <volume>37</volume>
          <issue>4</issue>
          <fpage>1141</fpage>
          <lpage>1164</lpage>
          <pub-id pub-id-type="doi">10.25300/misq/2013/37.4.07</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mattila</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The Blockchain Phenomenon: The Disruptive Potential of Distributed Consensus Architectures</article-title>
          <source>ETLA Working Papers</source>
          <year>2016</year>
          <access-date>2024-09-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.etla.fi/wp-content/uploads/ETLA-Working-Papers-38.pdf">https://www.etla.fi/wp-content/uploads/ETLA-Working-Papers-38.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jacobovitz</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <source>Blockchain for identity management</source>
          <year>2016</year>
          <publisher-loc>Beer Sheva</publisher-loc>
          <publisher-name>The Lynne and William Frankel Center for Computer Science Department of Computer Science, Ben-Gurion University</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Airport passenger processing technology: a biometric airport journey</article-title>
          <source>Embry-Riddle Aeronautical University</source>
          <year>2018</year>
          <access-date>2024-09-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://commons.erau.edu/cgi/viewcontent.cgi?article=1384&amp;context=edt">https://commons.erau.edu/cgi/viewcontent.cgi?article=1384&amp;context=edt</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zyskind</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Nathan</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Pentland</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Decentralizing privacy: Using blockchain to protect personal data</article-title>
          <year>2015</year>
          <conf-name>2015 IEEE Security and Privacy Workshops</conf-name>
          <conf-date>May 21-22, 2015</conf-date>
          <conf-loc>San Jose, CA</conf-loc>
          <pub-id pub-id-type="doi">10.1109/SPW.2015.27</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Khurshid</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Applying blockchain technology to address the crisis of trust during the COVID-19 pandemic</article-title>
          <source>JMIR Med Inform</source>
          <year>2020</year>
          <month>09</month>
          <day>22</day>
          <volume>8</volume>
          <issue>9</issue>
          <fpage>e20477</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://medinform.jmir.org/2020/9/e20477/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/20477</pub-id>
          <pub-id pub-id-type="medline">32903197</pub-id>
          <pub-id pub-id-type="pii">v8i9e20477</pub-id>
          <pub-id pub-id-type="pmcid">PMC7511222</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>MC</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>How can blockchain help people in the event of pandemics such as the COVID-19?</article-title>
          <source>J Med Syst</source>
          <year>2020</year>
          <month>04</month>
          <day>16</day>
          <volume>44</volume>
          <issue>5</issue>
          <fpage>102</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32300906"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10916-020-01577-8</pub-id>
          <pub-id pub-id-type="medline">32300906</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10916-020-01577-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC7162413</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koch</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Home telehealth--current state and future trends</article-title>
          <source>Int J Med Inform</source>
          <year>2006</year>
          <month>08</month>
          <volume>75</volume>
          <issue>8</issue>
          <fpage>565</fpage>
          <lpage>76</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2005.09.002</pub-id>
          <pub-id pub-id-type="medline">16298545</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(05)00188-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dellifraine</surname>
              <given-names>Jami L</given-names>
            </name>
            <name name-style="western">
              <surname>Dansky</surname>
              <given-names>KH</given-names>
            </name>
          </person-group>
          <article-title>Home-based telehealth: a review and meta-analysis</article-title>
          <source>J Telemed Telecare</source>
          <year>2008</year>
          <month>03</month>
          <day>01</day>
          <volume>14</volume>
          <issue>2</issue>
          <fpage>62</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1258/jtt.2007.070709</pub-id>
          <pub-id pub-id-type="medline">18348749</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dorsey</surname>
              <given-names>ER</given-names>
            </name>
            <name name-style="western">
              <surname>Topol</surname>
              <given-names>EJ</given-names>
            </name>
          </person-group>
          <article-title>State of telehealth</article-title>
          <source>N Engl J Med</source>
          <year>2016</year>
          <month>07</month>
          <day>14</day>
          <volume>375</volume>
          <issue>2</issue>
          <fpage>154</fpage>
          <lpage>161</lpage>
          <pub-id pub-id-type="doi">10.1056/nejmra1601705</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shigekawa</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Fix</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Corbett</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Roby</surname>
              <given-names>DH</given-names>
            </name>
            <name name-style="western">
              <surname>Coffman</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The current state of telehealth evidence: A rapid review</article-title>
          <source>Health Aff (Millwood)</source>
          <year>2018</year>
          <month>12</month>
          <volume>37</volume>
          <issue>12</issue>
          <fpage>1975</fpage>
          <lpage>1982</lpage>
          <pub-id pub-id-type="doi">10.1377/hlthaff.2018.05132</pub-id>
          <pub-id pub-id-type="medline">30633674</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lurie</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Carr</surname>
              <given-names>BG</given-names>
            </name>
          </person-group>
          <article-title>The role of telehealth in the medical response to disasters</article-title>
          <source>JAMA Intern Med</source>
          <year>2018</year>
          <month>06</month>
          <day>01</day>
          <volume>178</volume>
          <issue>6</issue>
          <fpage>745</fpage>
          <lpage>746</lpage>
          <pub-id pub-id-type="doi">10.1001/jamainternmed.2018.1314</pub-id>
          <pub-id pub-id-type="medline">29710200</pub-id>
          <pub-id pub-id-type="pii">2678828</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Thomas</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Snoswell</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Haydon</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Mehrotra</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Clemensen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Caffery</surname>
              <given-names>LJ</given-names>
            </name>
          </person-group>
          <article-title>Telehealth for global emergencies: Implications for coronavirus disease 2019 (COVID-19)</article-title>
          <source>J Telemed Telecare</source>
          <year>2020</year>
          <month>03</month>
          <day>20</day>
          <volume>26</volume>
          <issue>5</issue>
          <fpage>309</fpage>
          <lpage>313</lpage>
          <pub-id pub-id-type="doi">10.1177/1357633x20916567</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Milberg</surname>
              <given-names>SJ</given-names>
            </name>
            <name name-style="western">
              <surname>Burke</surname>
              <given-names>SJ</given-names>
            </name>
          </person-group>
          <article-title>Information privacy: Measuring individuals' concerns about organizational practices</article-title>
          <source>MIS Quarterly</source>
          <year>1996</year>
          <month>06</month>
          <volume>20</volume>
          <issue>2</issue>
          <fpage>167</fpage>
          <pub-id pub-id-type="doi">10.2307/249477</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Malhotra</surname>
              <given-names>NK</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Internet users' information privacy concerns (IUIPC): The construct, the scale, and a causal model</article-title>
          <source>Information Systems Research</source>
          <year>2004</year>
          <month>12</month>
          <volume>15</volume>
          <issue>4</issue>
          <fpage>336</fpage>
          <lpage>355</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.1040.0032</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jiang</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Heng</surname>
              <given-names>CS</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>BCF</given-names>
            </name>
          </person-group>
          <article-title>Research note—Privacy concerns and privacy-protective behavior in synchronous online social interactions</article-title>
          <source>Information Systems Research</source>
          <year>2013</year>
          <month>09</month>
          <volume>24</volume>
          <issue>3</issue>
          <fpage>579</fpage>
          <lpage>595</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.1120.0441</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tene</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Polonetsky</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Big data for all: Privacy and user control in the age of analytics</article-title>
          <source>Nw J Tech Intell Prop</source>
          <year>2013</year>
          <volume>11</volume>
          <issue>5</issue>
          <fpage>Article 1</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dinev</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>McConnell</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>HJ</given-names>
            </name>
          </person-group>
          <article-title>Research commentary—Informing privacy research through information systems, psychology, and behavioral economics: thinking outside the “APCO” box</article-title>
          <source>Information Systems Research</source>
          <year>2015</year>
          <month>12</month>
          <volume>26</volume>
          <issue>4</issue>
          <fpage>639</fpage>
          <lpage>655</lpage>
          <pub-id pub-id-type="doi">10.1287/isre.2015.0600</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gopal</surname>
              <given-names>RD</given-names>
            </name>
            <name name-style="western">
              <surname>Hidaji</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Patterson</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Rolland</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zhdanov</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>How much to share with third parties? User privacy concerns and website dilemmas</article-title>
          <source>MISQ</source>
          <year>2018</year>
          <month>1</month>
          <day>1</day>
          <volume>42</volume>
          <issue>1</issue>
          <fpage>143</fpage>
          <lpage>164</lpage>
          <pub-id pub-id-type="doi">10.25300/misq/2018/13839</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Menon</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Sarkar</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Privacy and big data: Scalable approaches to sanitize large transactional databases for sharing</article-title>
          <source>MIS Quarterly</source>
          <year>2016</year>
          <volume>40</volume>
          <issue>4</issue>
          <fpage>963</fpage>
          <lpage>982</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://misq.umn.edu/privacy-and-big-data-scalable-approaches-to-sanitize-large-transactional-databases-for-sharing.html"/>
          </comment>
          <pub-id pub-id-type="doi">10.1201/b19694-18</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Son</surname>
              <given-names>JY</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>SS</given-names>
            </name>
          </person-group>
          <article-title>Internet users' information privacy-protective responses: A taxonomy and a nomological model</article-title>
          <source>MIS Quarterly</source>
          <year>2008</year>
          <volume>32</volume>
          <issue>3</issue>
          <fpage>503</fpage>
          <pub-id pub-id-type="doi">10.2307/25148854</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rundle</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Blakley</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Broberg</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>At a crossroads: personhood and digital identity in the information society</article-title>
          <source>Analysis &amp; Policy Observatory</source>
          <year>2008</year>
          <access-date>2024-09-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://apo.org.au/node/16588">https://apo.org.au/node/16588</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Windley</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <source>Digital Identity: Unmasking Identity Management Architecture (IMA)</source>
          <year>2005</year>
          <publisher-loc>Sebastopol, CA</publisher-loc>
          <publisher-name>O'Reilly Media</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hevner</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>March</surname>
              <given-names>ST</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ram</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Design science in information systems research</article-title>
          <source>MIS Quarterly</source>
          <year>2004</year>
          <volume>28</volume>
          <issue>1</issue>
          <fpage>75</fpage>
          <pub-id pub-id-type="doi">10.2307/25148625</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yaga</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Mell</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Roby</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Scarfone</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Blockchain technology overview</article-title>
          <source>arXiv</source>
          <year>2019</year>
          <access-date>2024-09-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/1906.11078">https://arxiv.org/abs/1906.11078</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hasan</surname>
              <given-names>HR</given-names>
            </name>
            <name name-style="western">
              <surname>Salah</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Jayaraman</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Yaqoob</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Omar</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ellahham</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Blockchain-enabled telehealth services using smart contracts</article-title>
          <source>IEEE Access</source>
          <year>2021</year>
          <volume>9</volume>
          <fpage>151944</fpage>
          <lpage>151959</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2021.3126025</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bawany</surname>
              <given-names>NZ</given-names>
            </name>
            <name name-style="western">
              <surname>Qamar</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Tariq</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Adnan</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Integrating healthcare services using blockchain-based telehealth framework</article-title>
          <source>IEEE Access</source>
          <year>2022</year>
          <volume>10</volume>
          <fpage>36505</fpage>
          <lpage>36517</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2022.3161944</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Xue</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Malekian</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment</article-title>
          <source>Journal of Systems Architecture</source>
          <year>2021</year>
          <month>05</month>
          <volume>115</volume>
          <fpage>102024</fpage>
          <pub-id pub-id-type="doi">10.1016/j.sysarc.2021.102024</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>IC</given-names>
            </name>
            <name name-style="western">
              <surname>Liao</surname>
              <given-names>TC</given-names>
            </name>
          </person-group>
          <article-title>A survey of blockchain security issues and challenges</article-title>
          <source>Int J Netw Secur</source>
          <year>2017</year>
          <volume>19</volume>
          <issue>5</issue>
          <fpage>653</fpage>
          <lpage>659</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://ijns.jalaxy.com.tw/contents/ijns-v19-n5/ijns-2017-v19-n5-p653-659.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Walsh</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>OReilly</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Gleasure</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Feller</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Cristoforo</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>New kid on the block: a strategic archetypes approach to understanding the Blockchain</article-title>
          <year>2016</year>
          <conf-name>Thirty Seventh International Conference on Information Systems</conf-name>
          <conf-date>December 11-14, 2016</conf-date>
          <conf-loc>Dublin, Ireland</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://core.ac.uk/reader/301370270"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Christiansen</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Blockchain: An Exploded View</article-title>
          <source>Academia</source>
          <year>2016</year>
          <access-date>2024-09-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.academia.edu/26216202/Blockchain_An_Exploded_View">https://www.academia.edu/26216202/Blockchain_An_Exploded_View</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ayed</surname>
              <given-names>GB</given-names>
            </name>
          </person-group>
          <source>Architecting User-Centric Privacy-as-a-Set-of-Services: Digital Identity-Related Privacy Framework</source>
          <year>2014</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gregor</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hevner</surname>
              <given-names>AR</given-names>
            </name>
          </person-group>
          <article-title>Positioning and presenting design science research for maximum impact</article-title>
          <source>MISQ</source>
          <year>2013</year>
          <month>2</month>
          <day>2</day>
          <volume>37</volume>
          <issue>2</issue>
          <fpage>337</fpage>
          <lpage>355</lpage>
          <pub-id pub-id-type="doi">10.25300/misq/2013/37.2.01</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fogg</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>A behavior model for persuasive design</article-title>
          <source>Persuasive '09: Proceedings of the 4th International Conference on Persuasive Technology</source>
          <year>2009</year>
          <conf-name>4th International Conference on Persuasive Technology</conf-name>
          <conf-date>April 26-29, 2009</conf-date>
          <conf-loc>Claremont, CA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/1541948.1541999</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahmad</surname>
              <given-names>RW</given-names>
            </name>
            <name name-style="western">
              <surname>Salah</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Jayaraman</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Yaqoob</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Ellahham</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Omar</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The role of blockchain technology in telehealth and telemedicine</article-title>
          <source>Int J Med Inform</source>
          <year>2021</year>
          <month>04</month>
          <volume>148</volume>
          <fpage>104399</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33540131"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2021.104399</pub-id>
          <pub-id pub-id-type="medline">33540131</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(21)00025-3</pub-id>
          <pub-id pub-id-type="pmcid">PMC7842132</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Takeda</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Veerkamp</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Yoshikawa</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Modeling design process</article-title>
          <source>AI Mag</source>
          <year>1990</year>
          <volume>11</volume>
          <issue>4</issue>
          <fpage>37</fpage>
          <pub-id pub-id-type="doi">10.1609/aimag.v11i4.855</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Talmon</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ammenwerth</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Brender</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>de Keizer</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Nykänen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Rigby</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>STARE-HI -Statement on reporting of evaluation studies in health informatics</article-title>
          <source>Yearb Med Inform</source>
          <year>2018</year>
          <month>03</month>
          <day>07</day>
          <volume>18</volume>
          <issue>01</issue>
          <fpage>23</fpage>
          <lpage>31</lpage>
          <pub-id pub-id-type="doi">10.1055/s-0038-1638633</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koshechkin</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Lebedev</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Radzievsky</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Seepold</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Martinez</surname>
              <given-names>NM</given-names>
            </name>
          </person-group>
          <article-title>Blockchain technology projects to provide telemedical services: Systematic review</article-title>
          <source>J Med Internet Res</source>
          <year>2021</year>
          <month>08</month>
          <day>18</day>
          <volume>23</volume>
          <issue>8</issue>
          <fpage>e17475</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2021/8/e17475/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/17475</pub-id>
          <pub-id pub-id-type="medline">34407924</pub-id>
          <pub-id pub-id-type="pii">v23i8e17475</pub-id>
          <pub-id pub-id-type="pmcid">PMC8411324</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chanson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bogner</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bilgeri</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Fleisch</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Wortmann</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Blockchain for the IoT: Privacy-preserving protection of sensor data</article-title>
          <source>JAIS</source>
          <year>2019</year>
          <fpage>1272</fpage>
          <lpage>1307</lpage>
          <pub-id pub-id-type="doi">10.17705/1jais.00567</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="web">
          <article-title>Determining if IRB Review is Needed</article-title>
          <source>Florida International University</source>
          <access-date>2024-06-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://research.fiu.edu/irb/determine-irb-review/">https://research.fiu.edu/irb/determine-irb-review/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rathee</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Kountchev</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Mironov</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>MedSecureChain: Applying Blockchain for Delegated Access in Health Care</article-title>
          <source>New Approaches for Multidimensional Signal Processing. Smart Innovation, Systems and Technologies, vol 216</source>
          <year>2021</year>
          <publisher-loc>Singapore</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>153</fpage>
          <lpage>163</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>PD</given-names>
            </name>
            <name name-style="western">
              <surname>Cobb</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Turer</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Jordan</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Humphrey</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kepner</surname>
              <given-names>AL</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Rosenbloom</surname>
              <given-names>ST</given-names>
            </name>
          </person-group>
          <article-title>Rapid development of telehealth capabilities within pediatric patient portal infrastructure for COVID-19 care: barriers, solutions, results</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2020</year>
          <month>07</month>
          <day>01</day>
          <volume>27</volume>
          <issue>7</issue>
          <fpage>1116</fpage>
          <lpage>1120</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32302395"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocaa065</pub-id>
          <pub-id pub-id-type="medline">32302395</pub-id>
          <pub-id pub-id-type="pii">5821425</pub-id>
          <pub-id pub-id-type="pmcid">PMC7188108</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bakken</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Telehealth: Simply a pandemic response or here to stay?</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2020</year>
          <month>07</month>
          <day>01</day>
          <volume>27</volume>
          <issue>7</issue>
          <fpage>989</fpage>
          <lpage>990</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32692845"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocaa132</pub-id>
          <pub-id pub-id-type="medline">32692845</pub-id>
          <pub-id pub-id-type="pii">5874474</pub-id>
          <pub-id pub-id-type="pmcid">PMC7647362</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Meth</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Mueller</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Maedche</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Designing a requirement mining system</article-title>
          <source>JAIS</source>
          <year>2015</year>
          <month>09</month>
          <volume>16</volume>
          <issue>9</issue>
          <fpage>799</fpage>
          <lpage>837</lpage>
          <pub-id pub-id-type="doi">10.17705/1jais.00408</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Djamasbi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Strong</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>EV</given-names>
            </name>
            <name name-style="western">
              <surname>Ruiz</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Designing and testing user-centric systems with both user experience and design science research principles</article-title>
          <source>AMCIS Proc</source>
          <year>2016</year>
          <fpage>11</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://aisel.aisnet.org/amcis2016/HCI/Presentations/11"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Holzinger</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Miesenberger</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Klaus</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zagler</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>User-Centered Interface Design for Disabled and Elderly People: First Experiences with Designing a Patient Communication System (PACOSY)</article-title>
          <source>Computers Helping People with Special Needs. ICCHP 2002. Lecture Notes in Computer Science, vol 2398</source>
          <year>2002</year>
          <publisher-loc>Berlin, Heidelberg</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>33</fpage>
          <lpage>40</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Poonsuph</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>The design blueprint for a large-scale telehealth platform</article-title>
          <source>Int J Telemed Appl</source>
          <year>2022</year>
          <month>1</month>
          <day>5</day>
          <volume>2022</volume>
          <fpage>8486508</fpage>
          <lpage>15</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1155/2022/8486508"/>
          </comment>
          <pub-id pub-id-type="doi">10.1155/2022/8486508</pub-id>
          <pub-id pub-id-type="medline">35035477</pub-id>
          <pub-id pub-id-type="pmcid">PMC8754604</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bandara</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Liang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Foytik</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Shetty</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ranasinghe</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>De Zoysa</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Rahasak—Scalable blockchain architecture for enterprise applications</article-title>
          <source>Journal of Systems Architecture</source>
          <year>2021</year>
          <month>06</month>
          <volume>116</volume>
          <fpage>102061</fpage>
          <pub-id pub-id-type="doi">10.1016/j.sysarc.2021.102061</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lukša</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Kubernetes in Action</source>
          <year>2017</year>
          <publisher-loc>Munich, Germany</publisher-loc>
          <publisher-name>Carl Hanser Verlag</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thönes</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Microservices</article-title>
          <source>IEEE Softw</source>
          <year>2015</year>
          <month>1</month>
          <volume>32</volume>
          <issue>1</issue>
          <fpage>116</fpage>
          <lpage>116</lpage>
          <pub-id pub-id-type="doi">10.1109/ms.2015.11</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Destounis</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Paschos</surname>
              <given-names>GS</given-names>
            </name>
            <name name-style="western">
              <surname>Koutsopoulos</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Streaming big data meets backpressure in distributed network computation</article-title>
          <year>2016</year>
          <conf-name>35th Annual IEEE International Conference on Computer Communications</conf-name>
          <conf-date>April 10-14, 2016</conf-date>
          <conf-loc>San Francisco, CA</conf-loc>
          <pub-id pub-id-type="doi">10.1109/infocom.2016.7524388</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Paquin</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>U-Prove Technology Overview V1.1 (Revision 2)</article-title>
          <source>Microsoft</source>
          <access-date>2024-09-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.microsoft.com/en-us/research/publication/u-prove-technology-overview-v1-1-revision-2/">https://www.microsoft.com/en-us/research/publication/u-prove-technology-overview-v1-1-revision-2/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zawada</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Poster: Blockchain Application Feasibility in Telehealth for DSCSA Compliance</article-title>
          <year>2020</year>
          <conf-name>2020 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)</conf-name>
          <conf-date>December 16-18, 2020</conf-date>
          <conf-loc>Crystal City, VA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3384420.3431772</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="web">
          <article-title>Possible Futures: Telehealth During and After the Pandemic</article-title>
          <source>YouTube</source>
          <access-date>2022-09-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.youtube.com/watch?v=D4FnZZNnsDA">https://www.youtube.com/watch?v=D4FnZZNnsDA</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jain</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Dass</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Jude</surname>
              <given-names>HD</given-names>
            </name>
            <name name-style="western">
              <surname>Gupta</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Khanna</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Khamparia</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Chapter 3 - Blockchain: A novel paradigm for secured data transmission in telemedicine</article-title>
          <source>Wearable Telemedicine Technology for the Healthcare Industry: Product Design and Development</source>
          <year>2022</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>Academic Press</publisher-name>
          <fpage>33</fpage>
          <lpage>52</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="web">
          <article-title>Integrated Patient Portals and Improving the Virtual Experience</article-title>
          <source>YouTube</source>
          <access-date>2022-09-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.youtube.com/watch?v=-kddMUrrie4">https://www.youtube.com/watch?v=-kddMUrrie4</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yeung</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>The health care sector's experience of blockchain: A cross-disciplinary investigation of its real transformative potential</article-title>
          <source>J Med Internet Res</source>
          <year>2021</year>
          <month>12</month>
          <day>20</day>
          <volume>23</volume>
          <issue>12</issue>
          <fpage>e24109</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2021/12/e24109/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/24109</pub-id>
          <pub-id pub-id-type="medline">34932009</pub-id>
          <pub-id pub-id-type="pii">v23i12e24109</pub-id>
          <pub-id pub-id-type="pmcid">PMC8726042</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dubovitskaya</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Baig</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Shukla</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Zambani</surname>
              <given-names>PS</given-names>
            </name>
            <name name-style="western">
              <surname>Swaminathan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Jahangir</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Chowdhry</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Lachhani</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Idnani</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Schumacher</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Aberer</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Stoller</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Ryu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>ACTION-EHR: Patient-centric blockchain-based electronic health record data management for cancer care</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>08</month>
          <day>21</day>
          <volume>22</volume>
          <issue>8</issue>
          <fpage>e13598</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/8/e13598/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/13598</pub-id>
          <pub-id pub-id-type="medline">32821064</pub-id>
          <pub-id pub-id-type="pii">v22i8e13598</pub-id>
          <pub-id pub-id-type="pmcid">PMC7474412</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mackey</surname>
              <given-names>TK</given-names>
            </name>
            <name name-style="western">
              <surname>Miyachi</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Fung</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Qian</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Short</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Combating health care fraud and abuse: Conceptualization and prototyping study of a blockchain antifraud framework</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>09</month>
          <day>10</day>
          <volume>22</volume>
          <issue>9</issue>
          <fpage>e18623</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/9/e18623/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/18623</pub-id>
          <pub-id pub-id-type="medline">32909952</pub-id>
          <pub-id pub-id-type="pii">v22i9e18623</pub-id>
          <pub-id pub-id-type="pmcid">PMC7516680</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Golinelli</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Boetto</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Carullo</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Nuzzolese</surname>
              <given-names>AG</given-names>
            </name>
            <name name-style="western">
              <surname>Landini</surname>
              <given-names>MP</given-names>
            </name>
            <name name-style="western">
              <surname>Fantini</surname>
              <given-names>MP</given-names>
            </name>
          </person-group>
          <article-title>Adoption of digital technologies in health care during the COVID-19 pandemic: Systematic review of early scientific literature</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>11</month>
          <day>06</day>
          <volume>22</volume>
          <issue>11</issue>
          <fpage>e22280</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/11/e22280/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/22280</pub-id>
          <pub-id pub-id-type="medline">33079693</pub-id>
          <pub-id pub-id-type="pii">v22i11e22280</pub-id>
          <pub-id pub-id-type="pmcid">PMC7652596</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hewa</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Braeken</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ylianttila</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Liyanage</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Multi-Access Edge Computing and Blockchain-based Secure Telehealth System Connected with 5G and IoT</article-title>
          <year>2020</year>
          <conf-name>GLOBECOM 2020 - 2020 IEEE Global Communications Conference</conf-name>
          <conf-date>December 07-11, 2020</conf-date>
          <conf-loc>Taipei, Taiwan</conf-loc>
          <pub-id pub-id-type="doi">10.1109/globecom42002.2020.9348125</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hossain</surname>
              <given-names>FM</given-names>
            </name>
            <name name-style="western">
              <surname>Shahriar</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Valero</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sneha</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ahamed</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Rahman</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring</article-title>
          <year>2021</year>
          <conf-name>2021 IEEE International Conference on Digital Health (ICDH)</conf-name>
          <conf-date>September 05-10, 2021</conf-date>
          <conf-loc>Chicago, IL</conf-loc>
          <pub-id pub-id-type="doi">10.1109/icdh52753.2021.00054</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Chand</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>MedHypChain: A patient-centered interoperability hyperledger-based medical healthcare system: Regulation in COVID-19 pandemic</article-title>
          <source>J Netw Comput Appl</source>
          <year>2021</year>
          <month>04</month>
          <day>01</day>
          <volume>179</volume>
          <fpage>102975</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/34173429"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jnca.2021.102975</pub-id>
          <pub-id pub-id-type="medline">34173429</pub-id>
          <pub-id pub-id-type="pii">S1084-8045(21)00002-3</pub-id>
          <pub-id pub-id-type="pmcid">PMC7805409</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chatterjee</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Byun</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Dutta</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Pedersen</surname>
              <given-names>RU</given-names>
            </name>
            <name name-style="western">
              <surname>Pottathil</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Designing an Internet-of-Things (IoT) and sensor-based in-home monitoring system for assisting diabetes patients: iterative learning from two case studies</article-title>
          <source>European Journal of Information Systems</source>
          <year>2018</year>
          <month>07</month>
          <day>03</day>
          <volume>27</volume>
          <issue>6</issue>
          <fpage>670</fpage>
          <lpage>685</lpage>
          <pub-id pub-id-type="doi">10.1080/0960085x.2018.1485619</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gambril</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Boyd</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Egbaria</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Application of nonfungible tokens to health care. Comment on "Blockchain Technology Projects to Provide Telemedical Services: Systematic Review"</article-title>
          <source>J Med Internet Res</source>
          <year>2022</year>
          <month>05</month>
          <day>30</day>
          <volume>24</volume>
          <issue>5</issue>
          <fpage>e34276</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2022/5/e34276/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/34276</pub-id>
          <pub-id pub-id-type="medline">35635749</pub-id>
          <pub-id pub-id-type="pii">v24i5e34276</pub-id>
          <pub-id pub-id-type="pmcid">PMC9153915</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
