<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v27i1e68661</article-id>
      <article-id pub-id-type="pmid">40294402</article-id>
      <article-id pub-id-type="doi">10.2196/68661</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Viewpoint</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Viewpoint</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>A System Model and Requirements for Transformation to Human-Centric Digital Health</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Mavragani</surname>
            <given-names>Amaryllis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Lee</surname>
            <given-names>Won Bok</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Azizi</surname>
            <given-names>Amirabbas</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Ruotsalainen</surname>
            <given-names>Pekka</given-names>
          </name>
          <degrees>PhD, Prof Dr</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Faculty of Information Technology and Communication Sciences (ICT)</institution>
            <institution>Tampere University</institution>
            <addr-line>Kalevantie 4</addr-line>
            <addr-line>Tampere, 33014</addr-line>
            <country>Finland</country>
            <phone>358 2945211</phone>
            <email>pekka.ruotsalainen@tuni.fi</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-9069-0863</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Blobel</surname>
            <given-names>Bernd</given-names>
          </name>
          <degrees>PhD, Prof Dr</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <xref rid="aff3" ref-type="aff">3</xref>
          <xref rid="aff4" ref-type="aff">4</xref>
          <xref rid="aff5" ref-type="aff">5</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0008-5927-458X</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Faculty of Information Technology and Communication Sciences (ICT)</institution>
        <institution>Tampere University</institution>
        <addr-line>Tampere</addr-line>
        <country>Finland</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Medical Faculty</institution>
        <institution>University of Regensburg</institution>
        <addr-line>Regensburg</addr-line>
        <country>Germany</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>First Faculty of Medicine, Charles University</institution>
        <addr-line>Prague</addr-line>
        <country>Czech Republic</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Deggendorf Institute of Technology</institution>
        <institution>eHealth Competence Center Bavaria</institution>
        <addr-line>Deggendorf</addr-line>
        <country>Germany</country>
      </aff>
      <aff id="aff5">
        <label>5</label>
        <institution>Department of Informatics, Bioengineering, Robotics and  Systems Engineering (DIBRIS)</institution>
        <institution>University of Genoa</institution>
        <addr-line>Genoa</addr-line>
        <country>Italy</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Pekka Ruotsalainen <email>pekka.ruotsalainen@tuni.fi</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2025</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>28</day>
        <month>4</month>
        <year>2025</year>
      </pub-date>
      <volume>27</volume>
      <elocation-id>e68661</elocation-id>
      <history>
        <date date-type="received">
          <day>11</day>
          <month>11</month>
          <year>2024</year>
        </date>
        <date date-type="rev-request">
          <day>31</day>
          <month>1</month>
          <year>2025</year>
        </date>
        <date date-type="rev-recd">
          <day>24</day>
          <month>2</month>
          <year>2025</year>
        </date>
        <date date-type="accepted">
          <day>18</day>
          <month>3</month>
          <year>2025</year>
        </date>
      </history>
      <copyright-statement>©Pekka Ruotsalainen, Bernd Blobel. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 28.04.2025.</copyright-statement>
      <copyright-year>2025</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2025/1/e68661" xlink:type="simple"/>
      <abstract>
        <p>Digital transformation is widely understood as a process where technology is used to modify an organization’s products and services and to create new ones. It is rapidly advancing in all sectors of society. Researchers have shown that it is a multidimensional process determined by human decisions based on ideologies, ideas, beliefs, goals, and the ways in which technology is used. In health care and health, the end result of digital transformation is digital health. In this study, a detailed literature review covering 560 research articles published in major journals was performed, followed by an analysis of ideas, beliefs, and goals guiding digital transformation and their possible consequences for privacy, human rights, dignity, and autonomy in health care and health. Results of literature analyses demonstrated that from the point of view of privacy, dignity, and human rights, the current laws, regulations, and system architectures have major weaknesses. One possible model of digital health is based on the dominant ideas and goals of the business world related to the digital economy and neoliberalism, including privatization of health care services, monetization and commodification of health data, and personal responsibility for health. These ideas represent meaningful risks to human rights, privacy, dignity, and autonomy. In this paper, we present an alternative solution for digital health called human-centric digital health (HCDH). Using system thinking and system modeling methods, we developed a system model for HCDH. It uses 5 views (ideas, health data, principles, regulation, and organizational and technical innovations) to align with human rights and values and support dignity, privacy, and autonomy. To make HCDH future proof, extensions to human rights, the adoption of the principle of restricted informational ownership of health data, and the development of new duties, responsibilities, and laws are needed. Finally, we developed a system-oriented, architecture-centric, ontology-based, and policy-driven approach to represent and manage HCDH ecosystems.</p>
      </abstract>
      <kwd-group>
        <kwd>digital health</kwd>
        <kwd>human rights</kwd>
        <kwd>privacy</kwd>
        <kwd>dignity</kwd>
        <kwd>autonomy</kwd>
        <kwd>digital economy</kwd>
        <kwd>neoliberalism</kwd>
        <kwd>modeling</kwd>
        <kwd>system analysis</kwd>
        <kwd>artificial intelligence</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Digital transformation is widely understood as a process where digital technology, such as smart sensors, digital monitoring and surveillance tools, ecosystems, the cloud, the Internet of Things, simulation, artificial intelligence (AI), digitalization, and datafication are used by an organization to modify its processes, products, and services to create new ones [<xref ref-type="bibr" rid="ref1">1</xref>]. According to researchers, digital transformation changes the ways people communicate, learn, and participate. It also raises business and administration efficiency and transforms the organization’s structure and customer relationships [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref5">5</xref>]. Furthermore, digital transformation benefits the whole society by providing better and accessible public services; therefore, it has the power to improve health care and personal health management [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref6">6</xref>].</p>
      <p>Digital technology is undoubtedly an enabler for digital transformation, but results depend on how and by whom technology is used, as well as the ideas, beliefs, and goals behind decisions. It is often presented as an unavoidable and one-way result of the evolution of digital technology, but this is a misunderstanding. In the business world, digital transformation is increasingly realized using ideas of free market economy, digital information capitalism, and neoliberalism [<xref ref-type="bibr" rid="ref7">7</xref>].</p>
      <p>The use of information technology in health care has a long history. Presently, technologies such as medical imaging, smart medical devices, internet, digital platforms, AI, robotics, big data analytics, blockchain, and smart wearables are widely used [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref9">9</xref>]. Digital transformation in health care is not limited to the use of digital artifacts; it also includes the advancement from data focus to knowledge focus [<xref ref-type="bibr" rid="ref10">10</xref>]. It is expected to change health care processes and structures; enable personalized services and innovative solutions, such as online remote monitoring, virtual care, digital physician, and health chat boxes; advance diagnosis; and improve planning and management [<xref ref-type="bibr" rid="ref11">11</xref>]. It changes the patient-physician relationship and responsibilities, including where the health data are processed and by whom, medical education, and patient engagement [<xref ref-type="bibr" rid="ref3">3</xref>]. It also enables companies to develop new medical devices and innovative digital services for health care as well as commercial devices and applications for personal health and wellness monitoring and management, such as smartwatches, heart rate monitors, blood pressure monitors, electrocardiogram monitors, sleep trackers, smart wearables, and medication reminders [<xref ref-type="bibr" rid="ref12">12</xref>].</p>
      <p>Digital health (DH) is the end result of ongoing digital transformation in health care and health [<xref ref-type="bibr" rid="ref10">10</xref>]. According to the World Health Organization, it “can revolutionize how people worldwide achieve higher standards of health and access services to promote and protect their health and well-being and have proven potential to enhance health outcomes” [<xref ref-type="bibr" rid="ref8">8</xref>]. It has the potential to improve patients’ overall health care experience and to offer personalized care everywhere [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
      <p>The ongoing discussion of digital transformation in health care and health is associated with positive promises, such as higher efficiency, lower costs, easy availability and equal access to services, easy personal health management, new innovative services, and better data-driven decision-making [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>]. These promises are merchandized to decision makers and society as an inevitable outcome of technological determinism aimed at digitalizing human life, body, and mind [<xref ref-type="bibr" rid="ref16">16</xref>]. At the same time, discussion of possible negative consequences is largely neglected, and they are presented as things to be solved in the future. According to researchers, digital transformation, datafication, digital tools, and algorithms have already enabled almost unlimited data surveillance and tailored nudging of people. It has provided a huge amount of power to data collectors and algorithm owners, and its negative impacts on health care and health are immense. This has raised concerns about human rights, privacy, and autonomy [<xref ref-type="bibr" rid="ref17">17</xref>]. For managing this problem, the IEEE P7008 Standard for Ethically Driven Nudging for Robotic, Intelligent, and Autonomous Systems should be deployed.</p>
      <p>In this paper, we aimed to present detailed insights into the digital transformation of health care and health to DH and develop a new model called human-centric DH (HCDH) that provides most of the promised benefits of DH without the loss of human rights, privacy, dignity, and autonomy.</p>
    </sec>
    <sec>
      <title>Holistic View of DH</title>
      <p>In this paper, DH was studied as a holistic system. Up to 560 research articles published in major journals covering a wide range of topics such as human rights, dignity, privacy and autonomy, neoliberalism, digital transformation, digital technology, DH care, DH, and digital twin were reviewed in detail. We analyzed ideas, beliefs, and goals guiding the transformation of health and health care to DH and their possible consequences on information privacy, human rights, dignity, and autonomy. On the basis of the analysis performed, a framework of 6 views that impact the nature and functions of DH was developed (<xref rid="figure1" ref-type="fig">Figure 1</xref>). Ideologies, that is, beliefs and opinions, form the base of transformation. The “data view” is derived from the fact that successful DH requires a great deal of health-related data to enable its services. Guiding rules, principles, and norms (eg, human rights, laws, and regulations) both direct and set restrictions concerning what data can be collected and used. The “architectural view” indicates that DH is an information system that requires a conceptual, organizational, and technical architecture. Finally, technological, architectural, and organizational innovations are enablers for the realization of DH as the system that fulfills its ideas and goals.</p>
      <fig id="figure1" position="float">
        <label>Figure 1</label>
        <caption>
          <p>A framework for transformation of health and health care to digital health.</p>
        </caption>
        <graphic xlink:href="jmir_v27i1e68661_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
    </sec>
    <sec>
      <title>DH Concept</title>
      <p>DH itself is a concept with many definitions. In a review by Fatehi et al [<xref ref-type="bibr" rid="ref18">18</xref>], they found 95 different definitions of DH. A narrow health care–focused definition expresses that DH is “the cultural transformation of disruptive technologies that provide digital and objective data accessible to both caregivers and patients” [<xref ref-type="bibr" rid="ref19">19</xref>]. According to Yeung et al [<xref ref-type="bibr" rid="ref20">20</xref>], DH is a broad term covering the application of digital technologies in the context of health based on the definition for health (“a state of complete physical, mental, and social well-being and not merely the absence of disease or infirmity”) by the World Health Organization [<xref ref-type="bibr" rid="ref21">21</xref>]. This definition expands the concept of DH to cover health determinants other than health care services (eg, environment, genetics, and social relations) [<xref ref-type="bibr" rid="ref22">22</xref>]. It also encompasses uses of digital technologies, such as the internet, big data analytics, AI, and robotics [<xref ref-type="bibr" rid="ref20">20</xref>]. Because access and use of health care services have a much lesser impact on human health than other health determinants, personal wellness lifestyle management, and digital technology that is used to collect and use personal health information should also be included in the concept of DH [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. In this paper, the definition by Fatehi et al [<xref ref-type="bibr" rid="ref18">18</xref>], “Digital Health is proper use of digital technology for improving the health and well-being of people at individual and population levels, as well as enhancing,” is used [<xref ref-type="bibr" rid="ref18">18</xref>].</p>
    </sec>
    <sec>
      <title>Economic Ideologies and Digital Transformation in Health Care and Health</title>
      <p>In spite of health care’s strong professional ideology, its service providers are increasingly looking not only for better service accessibility and higher quality but also higher efficiency, optimal allocation of resources, lower costs, and possibilities of digital technology. This indicates that economic ideologies are increasingly transforming health care.</p>
      <p>Classical capitalism is an economic model based on private ownership of property and business. Its goal is the maximization of its own (monetary) utility without responsibility for possible negative consequences [<xref ref-type="bibr" rid="ref24">24</xref>]. Free market and weak state control are its additional elements. According to Sadiku et al [<xref ref-type="bibr" rid="ref25">25</xref>], digital capitalism (ie, platform capitalism, informational capitalism, and surveillance capitalism) is a natural extension of classical capitalism [<xref ref-type="bibr" rid="ref15">15</xref>]. It uses digital technologies, such as the internet, AI, digital algorithms, blockchain, digital platforms, and the Internet of Things for data collection, processing, and sharing [<xref ref-type="bibr" rid="ref26">26</xref>]. Therefore, data about people’s activities, behaviors, lifestyle habits, and emotions are both a meaningful commodity and product, and it is expected that in the long run, all aspects of human life can be quantified and transformed into information for private or public benefit [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref27">27</xref>].</p>
      <p>According to McGregor [<xref ref-type="bibr" rid="ref7">7</xref>], neoliberalism is the logical evolution of digital capitalism. Neoliberalists believe that social good will be maximized by maximizing “the reach and frequency of market transaction,” and a “good life” arises from “free” individuals under a free market system [<xref ref-type="bibr" rid="ref28">28</xref>]. At the ideological level, neoliberalism’s aim is the commodification of goods, services, and knowledge, and reducing most aspects of human lives into “goods” (ie, datafication) [<xref ref-type="bibr" rid="ref28">28</xref>]. Core ideas in neoliberalism are privatization of public services, deregulation, marketization, self-regulation, strong private property rights, free markets and trade, the removal of regulatory barriers to commerce, and maximizing efficiency. Furthermore, the government’s main role is to boost private-sector business and weaken regulations. Personalized data are collected to generate behavioral changes. One of neoliberal goals is to commodify traditional public services [<xref ref-type="bibr" rid="ref29">29</xref>]. Neoliberalists replace the concepts of the public good and the community with individual responsibility based on self-interest and individualism [<xref ref-type="bibr" rid="ref7">7</xref>]. It is also assumed that humans will always try to favor themselves, and that they do not feel the need to consider the consequences of their actions toward others [<xref ref-type="bibr" rid="ref7">7</xref>].</p>
      <p>Because a market economy and neoliberalism are prevailing and dominating ideologies in many sectors of society, a likely scenario is that DH will be built around beliefs and goals of a market economy and neoliberalism. In this paper, this scenario (“neoliberal DH”) is used as an example. In health care and health, this means that services are organized using the economic free market model and privatization, monetization of patient data, and datafication of all health data as the most effective solutions to organize and offer equal health care services and treatments for all [<xref ref-type="bibr" rid="ref7">7</xref>]. Another idea is consumerization, where people are understood as rational health consumers having the ability and capacity to self-manage their health and sickness. Commodification is also necessary for better care and lower cost, especially the commodification of the content of regulated health care records, as well as other personal health-related data. The idea of health care as a public good is replaced by the idea of individual responsibility for health and health care as private goods. Datafication of all health data is necessary for disease prediction, personalized care, early detection of diseases, modification of people’s health behaviors, creating digitally engaged patients, and earning money [<xref ref-type="bibr" rid="ref30">30</xref>].</p>
    </sec>
    <sec>
      <title>Principles and Guiding Norms</title>
      <p>According to Stanley et al [<xref ref-type="bibr" rid="ref31">31</xref>], normative ethical theories and religious traditions offer general moral principles for people to follow. The United Nations’ human rights are universally accepted and used in many international and national laws as guiding principles and norms for human behavior. Human rights are basic rights and important for human flourishing, individual freedom, and social justice [<xref ref-type="bibr" rid="ref32">32</xref>]. Human rights and dignity are 2 interlinked concepts. In the preamble of the United Nations Declaration of Human Rights (UNDHR), human dignity is the inherent dignity, that is, human rights are derived from human dignity, as human dignity is the foundational principle of human rights and the wellness of society. They are needed to prevent injustice, exploitation, discrimination, and inequality [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. Examples of human rights are the right to life, equality before the law, liberty, personal security, the right to education, and the right to free movement. Among the 30 articles of the UNDHR, articles 12 and 18 are especially meaningful for DH [<xref ref-type="bibr" rid="ref35">35</xref>]. According to article 12, “No one shall be subjected to arbitrary interference with his privacy, family, home, or correspondence, nor to attacks upon his honor and reputation. Everyone has the right to the protection of the law against such interference or attacks,” and according to article 18, “Everyone has the right to freedom of thought” [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. Furthermore, governments have obligations to protect human rights everywhere, including in the digital context [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref37">37</xref>].</p>
      <p>Dignity itself is a multidimensional and vague concept. At the general level, dignity concerns “moral status involving inherent unearthed form of worth that is independent of the interest of others and not based on one’s merits” [<xref ref-type="bibr" rid="ref38">38</xref>]. The idea of the intrinsic human worth of honor or respect is global and exists in some way in all cultures [<xref ref-type="bibr" rid="ref34">34</xref>]. Dignity is also linked to personal characteristics and collective behaviors in social relations. Human dignity gives moral weight to the idea that people cannot be owned as property by others [<xref ref-type="bibr" rid="ref39">39</xref>]. Furthermore, the European Union Charter of Fundamental Rights declares that human dignity is inviolable and must be respected and protected [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
      <p>Autonomy includes concepts such as self-rule, self-determination, individuality, and independence [<xref ref-type="bibr" rid="ref41">41</xref>]. Furthermore, it addresses the right of people or a group to govern themselves or to organize their own activities [<xref ref-type="bibr" rid="ref42">42</xref>]. According to the UNDHR, bodily autonomy is a fundamental right. Individual autonomy is widely understood as the capacity to be one’s own person, to live one’s life, and not to be the product of manipulative or distorting external forces [<xref ref-type="bibr" rid="ref43">43</xref>]. In liberalism, autonomy implies the ability to reflect wholly on oneself, to accept or reject personal values, connections, and features [<xref ref-type="bibr" rid="ref43">43</xref>].</p>
      <p>Privacy is a vague, emotional, and contextual concept with social and technical dimensions [<xref ref-type="bibr" rid="ref44">44</xref>]. It is dynamic because people’s privacy expectations and needs vary situationally. Privacy is also one of the human rights. The UNDHR expresses that “No one shall be subject to arbitrary interference with his privacy” [<xref ref-type="bibr" rid="ref35">35</xref>]. Autonomy and privacy are closely interconnected. According to Citron [<xref ref-type="bibr" rid="ref45">45</xref>], without personal autonomy, there is hardly personal privacy, and privacy ensures dignity. Furthermore, we must understand privacy as a moral right, human right, and legal right, and that invasion of privacy is a violation of human dignity [<xref ref-type="bibr" rid="ref45">45</xref>]. Because privacy is not an absolute right, it is not uncommon to think that other values, such as the public good or common good, can supersede it.</p>
      <p>Traditionally, the focus of privacy has been the individual, the individual’s space, and individual interests. It has been seen as a right to control what others know of us, and the ability to control data collection, use, and disclosure [<xref ref-type="bibr" rid="ref44">44</xref>]. Control of data flow and use of data are dominating mechanisms to balance others’ “need to know” and individuals’ intention to limit what others know of us [<xref ref-type="bibr" rid="ref39">39</xref>]. Contextual privacy by Nissenbaum [<xref ref-type="bibr" rid="ref46">46</xref>] is a new approach that allows information to flow freely inside the context and between contexts following “filtering rules” defined by stakeholders in the context. Privacy also has a social dimension, enabling the management of the social boundaries and freedom of thought, including limiting the power of governments and data companies regarding the use of data [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref47">47</xref>].</p>
      <p>According to Wang et al [<xref ref-type="bibr" rid="ref48">48</xref>], digital privacy is a “selective psychological and technical control of access to the digital self in the form of online profiles, personal data, and digital assets.” Internet privacy addresses the level of privacy a person has on the internet. Online privacy refers to the right to privacy in online situations. New ideas about privacy include group privacy, privacy as ability, privacy as property, and mental privacy. The authors state that privacy remains an abstract concept until people have the ability and power to express personal privacy preferences in real-life situations.</p>
      <p>According to Abernethy et al [<xref ref-type="bibr" rid="ref11">11</xref>], the prevailing pervasive, dynamic, and virtual digital world, where passive and online data collection on people’s activities and behaviors takes place routinely, and where people self-disclose their personal information, has challenged most of the traditional privacy models. The digital world is virtually without privacy boundaries, and information collection, sharing, and self-disclosure make us transparent to others. This and AI transform how privacy is understood and change the level of actual privacy we have [<xref ref-type="bibr" rid="ref49">49</xref>]. According to researchers, in the digital world, privacy is not only needed to protect personal health-related data but also to preserve one’s human rights, dignity, and autonomy [<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref50">50</xref>].</p>
    </sec>
    <sec>
      <title>Laws and Regulations</title>
      <p>Different countries have national regulatory frameworks for health care regulating the collection, use, sharing, and storing of patient data and patients’ information autonomy. Thus far, DH-specific laws have been missing, and therefore, existing general and health care–specific regulations can be used where appropriate. In a former paper [<xref ref-type="bibr" rid="ref51">51</xref>], the authors stated that the current regulatory environment is insufficient and outdated for digital environments. Brantly and Brantly [<xref ref-type="bibr" rid="ref52">52</xref>] argued that the regulations fail to place the patient or person and his or her well-being at the center, and the expected benefits of needs of digital markets increasingly override the data subject’s privacy, dignity, and autonomy [<xref ref-type="bibr" rid="ref52">52</xref>].</p>
    </sec>
    <sec>
      <title>Health Data and Ownership</title>
      <p>The power and benefits of DH are strongly dependent on the availability and quality of health data coming from different sources, such as health care activities, smartphones, health apps, and social media, frequently generated by patients themselves [<xref ref-type="bibr" rid="ref53">53</xref>]. There are different opinions regarding which data should be classified as health data and the nature of health data. Currently, it is unclear whether health data should cover lifestyle and well-being data and sensor data regarding an individual’s daily behaviors, habits, and preferences [<xref ref-type="bibr" rid="ref54">54</xref>]. A narrow view on health data includes only data generated by health care professionals and medical devices, that is, the content of the regulated patient record. A wider view recommends that all kinds of health-related data, which come from inside and outside the regulated health care domain and can be collected, processed, stored, and interlinked, should be included in the discussed health data space [<xref ref-type="bibr" rid="ref55">55</xref>,<xref ref-type="bibr" rid="ref56">56</xref>]. In this wider view, sources of health data include regulated health care service providers, nonregulated wellness firms, governments, internet firms, social networks, industry and researchers, and people and patients who voluntarily generate and disclose health-related data.</p>
      <p>A similar dichotomy also exists in regulations. The European Union General Data Protection Regulation (EU-GDPR) treats health data as a special category of sensitive information and uses a broad view of health data by defining it as “personal data concerning health” that includes “all data pertaining to the health status of a data subject” [<xref ref-type="bibr" rid="ref57">57</xref>]. Recital 35 of the EU-GDPR details this definition by defining health data as “any information on a disease, disability, disease risk, medical history, clinical treatment, or the physiological or biomedical state of the data subject” [<xref ref-type="bibr" rid="ref58">58</xref>]. In Contrast, in the United States, the term “protected health information” is used for health data, covering only entities directly related to health care operations [<xref ref-type="bibr" rid="ref55">55</xref>,<xref ref-type="bibr" rid="ref59">59</xref>].</p>
      <p>Opinions concerning the nature of health data also vary. Health data are understood as public goods, common goods, commodities, or personal properties [<xref ref-type="bibr" rid="ref60">60</xref>]. Some argue that health data should be common goods that enable economic growth and new research innovations [<xref ref-type="bibr" rid="ref61">61</xref>], and others propose the open data model as the future way to go. Martin and Begany [<xref ref-type="bibr" rid="ref62">62</xref>] argued that government agencies should implement an open health data model for better efficiency and for benefits, such as improved health literacy, data-driven changes in health care delivery, consumer engagement, and community development. In contrast, Verhulst [<xref ref-type="bibr" rid="ref27">27</xref>] stated that health data cannot be treated solely as a public or private good.</p>
      <p>The ownership of health data is also a critical question. Opinions are shared regarding the concepts of ownership and property of health data. In principle, the owner of health data can be the data subject or patient, a public or private organization, or the ownership can be shared. Nowadays, companies (eg, internet giants and mediators) that have used remarkable resources to collect, organize, and use health data often expect that “they either fully own or have full and complete rights to the data” [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref47">47</xref>]. This view is also supported by the EU in its regulation that grants property rights to those “who collate large compilations of digital data and other data” [<xref ref-type="bibr" rid="ref63">63</xref>]. As part of the digital single market strategy, the European Commission sees that ownership, such as property rights and database rights, poses a threat to the development of an EU data market, and big data should be as freely accessible as possible [<xref ref-type="bibr" rid="ref64">64</xref>].</p>
      <p>A benefit of personal ownership of health data is that it gives the person or patient the power to maintain privacy and autonomy in different contexts and situations, and to restrict unnecessary data collection. Shared ownership of health data means that, in a specific context, a group of users have the right to use it freely. According to Lipton [<xref ref-type="bibr" rid="ref30">30</xref>], the models of legal ownership require human effort to create those data, and because personal information is not created by a person, it cannot be owned. Some researchers have proposed that in the digital world, health data should be a special and legal intellectual property of the data subject [<xref ref-type="bibr" rid="ref65">65</xref>].</p>
    </sec>
    <sec>
      <title>Organization, Architecture, and Technology</title>
      <p>A DH system can be built using different organizational solutions and models, such as public-private partnerships, data trust models, data cooperatives, data collaboratives, and health data market models [<xref ref-type="bibr" rid="ref66">66</xref>]. DH can be a public-private partnership system or a multistakeholder health ecosystem, where the main players are commercial organizations owning not only health data but also algorithms, analytic tools, and personal health applications supporting self-diagnosing and self-care, and where the role of public health care is small. Data collaboratives are initiatives for data collection, sharing, and processing. The health data cooperative (eg, a health data bank) enables the users to collect, store, manage, use, and share health information to analyze it, and to conduct big data analytics [<xref ref-type="bibr" rid="ref67">67</xref>]. In the data cooperative, health data are equal properties of all its members, and it offers worldwide accessibility to data [<xref ref-type="bibr" rid="ref67">67</xref>,<xref ref-type="bibr" rid="ref68">68</xref>]. The platform for health data marketplaces can be owned by the government or a private organization [<xref ref-type="bibr" rid="ref69">69</xref>]. Its business model is built around personalization and the commodification of incoming data. Data trusts are intermediaries where the owners or managers have the responsibility to act in the interest of beneficiaries [<xref ref-type="bibr" rid="ref39">39</xref>]. An interesting new solution is based on the fiduciary duty model [<xref ref-type="bibr" rid="ref70">70</xref>,<xref ref-type="bibr" rid="ref71">71</xref>]. According to Hashiguchi et al [<xref ref-type="bibr" rid="ref70">70</xref>], the legal fiducial duty model can be used in public-private partnership solutions.</p>
      <p>From the technological point of view, DH is a complex sociotechnical information system. Different architectural approaches and different hardware and software solutions can be used to realize DH systems, such as a digital ecosystem and platform, blockchain, edge computing, confidential computing, federated learning system, digital algorithms, the Internet of Things devices, smart sensors and wearables, and health applications, among others [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref60">60</xref>].</p>
    </sec>
    <sec>
      <title>Technological Innovations</title>
      <p>New technological innovations are coming soon into practice, such as digital phenotyping, biomedicalization, use of digital biomarkers, synthetic biology, gene manufacturing and editing, DNA tailoring and printing, brain computer interface (BCI), use of digital biomarkers, generative AI, AI-enabled robotics, quantum computing, and digital twin technology [<xref ref-type="bibr" rid="ref72">72</xref>]. They offer new possibilities for DH and in the development of new services and tools, such as online patient monitoring, self-reporting, AI-assisted care robots, AI-based DH assistants, and conversational agents using generative AI [<xref ref-type="bibr" rid="ref73">73</xref>].</p>
      <p>Digital biomarkers are quantifiable physiological and behavioral data collected by personal digital devices, and digital phenotyping involves the collection and quantification of individual-level characteristics. Both are used to explain, influence, and predict health-related outcomes [<xref ref-type="bibr" rid="ref74">74</xref>]. The focus in biomedicalization is behavioral and lifestyle modifications of humans [<xref ref-type="bibr" rid="ref75">75</xref>,<xref ref-type="bibr" rid="ref76">76</xref>].</p>
      <p>BCI uses implanted or outside-the-body monitoring devices to measure, quantify, and interpret human behaviors and even thinking [<xref ref-type="bibr" rid="ref77">77</xref>]. In BCI, direct communication link between the brain and a computer is used to enable access to our mind and even to upload our brain with new data [<xref ref-type="bibr" rid="ref78">78</xref>]. Currently, BCI allows recording of brain activity and translation of brain signals to text [<xref ref-type="bibr" rid="ref79">79</xref>].</p>
      <p>Th digital self is a virtual model of a person’s physical characteristics and provides a larger view of an individual as a computer representation in the digital domain based on their personal data [<xref ref-type="bibr" rid="ref80">80</xref>]. It can be used to simulate a person’s behaviors [<xref ref-type="bibr" rid="ref81">81</xref>]. A digital patient twin (DPT) is a simulation model of a patient constructed from patient data, genetic data, personally generated health data, data from monitoring devices, and population data [<xref ref-type="bibr" rid="ref81">81</xref>]. Generative AI, digital phenotyping, and digitalization of the human body and behaviors enable the creation of the DPT. It offers huge opportunities for “precision medicine” by enabling the simulation of how the body responds to treatment and medication.</p>
      <p>The digitally engaged patient (ie, the empowered or activated patient) approach assumes that more information leads to improved quality of care and economic efficiency. Digitally engaged patients use personal monitoring tools to self-monitor personal biomarkers, self-care of their own illnesses, and manage their personal health [<xref ref-type="bibr" rid="ref4">4</xref>]. It is expected that in the long run, digitally engaged patients can develop health care provider–level expertise concerning their diseases.</p>
      <p>Because new technologies offer unprecedented, detailed insight into the human body and mind, they also raise new concerns for human rights, privacy, dignity, and autonomy [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref82">82</xref>].</p>
    </sec>
    <sec>
      <title>DH: Concerns to Human Rights, Dignity, Privacy, and Autonomy</title>
      <sec>
        <title>Human Rights and Dignity</title>
        <p>Digitalization of all aspects of the human body, behaviors, emotions, feelings, thinking, and mind enables the creation of personalized repositories of the self, owned either by the government or private organizations. That kind of ownership (also known as owning a digital version of a person) can be understood as digital slavery. According to human rights, “slavery shall be prohibited in all their forms” [<xref ref-type="bibr" rid="ref35">35</xref>]. Therefore, digital slavery is against human rights. Because DH twins are forms of a digital self, creating and trading them without permission is against human rights.</p>
        <p>The ability to own health data and use AI technology, digital nudges, and conversational agents gives public and private organizations the ability to control and manipulate an individual’s health behaviors, emotions, mind, and thinking online and offline in a way that can cause the loss of dignity [<xref ref-type="bibr" rid="ref72">72</xref>,<xref ref-type="bibr" rid="ref83">83</xref>]. This can cause harm and interfere with personal dignity and autonomy. It is generally wrong and contradicts human rights.</p>
        <p>In the digital world, many social processes can be used to violate dignity. In an article, Jacobson [<xref ref-type="bibr" rid="ref84">84</xref>] named 24 such kinds of processes. Jacobson argues that the following among them are relevant for DH: dismissing intrusions to personal boundaries; threatening an actor as a thing, not a person; limiting an actor’s ability to direct his or her own life; manipulating for material gain or psychological advantage; seeing an actor not as a unique individual, but only as a member of a collective; pressure or bypassing reasons; and treating a person as thing [<xref ref-type="bibr" rid="ref84">84</xref>].</p>
        <p>Nowadays, an important problem is that private companies only have a moral duty to respect and protect human rights [<xref ref-type="bibr" rid="ref85">85</xref>]. Furthermore, weakening the state’s role in DH weakens its ability to protect human rights and dignity.</p>
      </sec>
      <sec>
        <title>Privacy and Autonomy</title>
        <p>Digital transformation and DH have already started to change the way privacy is understood. According to Suleyman and Bhaskar [<xref ref-type="bibr" rid="ref72">72</xref>], autonomy and privacy are challenged by pervasive online data collection and surveillance systems and the use of AI. Today, it is widely accepted that publicly available personal information and metadata require no protection, and firms do not have the responsibility to control the secondary use of health data that erodes privacy. Companies also often see that a high level of privacy reduces their economic gain. Therefore, companies’ primary interest is the ability to freely collect and use health data and not to protect privacy and autonomy [<xref ref-type="bibr" rid="ref45">45</xref>].</p>
        <p>Currently, a person has little or no power to control the collection, use, and sale of personal health data [<xref ref-type="bibr" rid="ref86">86</xref>]. Furthermore, the ownership of health data is increasingly transferred to AI system developers [<xref ref-type="bibr" rid="ref72">72</xref>]. This gives them the power to change the way privacy and autonomy are understood and implemented, and thereby to reduce data subjects’ privacy and autonomy. Another complaint is that many internet service providers do not have a strong privacy mechanism in place, and information platforms are unaccountable for vulnerabilities in their information systems, and privacy and security concerns that they generate [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref87">87</xref>]. Furthermore, self-reporting, online data collection, surveillance, lack of transparency and accountability, and the mining of health data raise autonomy and privacy concerns, and algorithmic manipulation erodes human autonomy and alter how it is understood [<xref ref-type="bibr" rid="ref53">53</xref>].</p>
      </sec>
      <sec>
        <title>Laws and Regulations</title>
        <p>Broadly, current laws and regulations have many weaknesses. They are inadequate and fail to sufficiently protect privacy [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref86">86</xref>]. Nowadays, laws insufficiently regulate how companies can use data [<xref ref-type="bibr" rid="ref66">66</xref>], and they use a too narrow definition for health data. In current laws, privacy is not correctly managed, and it is balanced against other rights and public goods. Consequently, other rights, such as national security legislations and legitimate interest to know, regularly override privacy. Furthermore, current privacy laws do not regulate the use of inferred and derived data products and do not set concrete responsibilities for organizations collecting and using health data. Laws are also poorly prepared for new privacy and autonomy risks existing in DH and raised from the use of new technology. For example, the EU-GDPR protects only the privacy of a natural person who is alive, and it neglects to protect inferred data, personal profiles, the data donation model, and the use of data after death [<xref ref-type="bibr" rid="ref15">15</xref>]. Furthermore, it protects biometric data (eg, fingerprints, facial images, and voice) and physical and physiological characteristics of a person, but not induced informational products and digital and simulated models, such as the DPT. In the EU-GDPR, legitimate interest means that a company can process sensitive data as long as a person’s fundamental rights and freedom are not seriously impacted, and the legitimate interest does not require a specific purpose nor the users’ consent to collect and process data [<xref ref-type="bibr" rid="ref30">30</xref>]. According to Cohen [<xref ref-type="bibr" rid="ref87">87</xref>], legitimate interest does not fulfill the requirements of transparency, data minimization, purpose limitation, and accountability.</p>
        <p>The EU AI Act is a step forward in regulating the use of AI. The act has 4-level classification of AI risks (eg, unacceptable, high, limited, and minimal risk). AI systems that use technology, such as subliminal manipulation, social scoring, or predictive tools, and pose a clear threat to safety and rights belong to the high-risk group and should be banned [<xref ref-type="bibr" rid="ref83">83</xref>]. Instead, high-risk AI systems should be regulated, and limited-risk systems require just transparency [<xref ref-type="bibr" rid="ref88">88</xref>]. The weakness is that other kinds of manipulation, such as trickery, pressure, or bypassing reasons and treating a person as a thing, require only transparency [<xref ref-type="bibr" rid="ref89">89</xref>]. A general problem is that there is currently no consensus on which forms of influence are manipulative. For example, it is unclear what is an acceptable level of manipulation of a person’s health behaviors for better personal health [<xref ref-type="bibr" rid="ref83">83</xref>]. Furthermore, the term “risk” is error-prone because in real life, it is almost impossible to measure the actual risk for privacy and autonomy [<xref ref-type="bibr" rid="ref90">90</xref>]. In the United States, the new AI Bill of Rights looks data privacy through design choices, such as protection by default, and supports algorithmic transparency and the users’ ability to opt out of automated systems. Unfortunately, this bill is not binding and does not regulate private companies [<xref ref-type="bibr" rid="ref83">83</xref>].</p>
        <p>According to researchers, the current laws are too weak in protecting privacy and unable to manage problems created by digital technology and digital transformation based on ideas of digital capitalism and neoliberalism [<xref ref-type="bibr" rid="ref91">91</xref>]. Furthermore, laws are based on an individualistic privacy model that is too narrow assumption [<xref ref-type="bibr" rid="ref47">47</xref>].</p>
      </sec>
      <sec>
        <title>Organizational Models and the Use of Digital Technology</title>
        <p>DH can be realized using different organizational approaches, such as public-private partnerships, data trust models, data cooperatives, data collaboratives, and health data markets [<xref ref-type="bibr" rid="ref66">66</xref>]. However, none of them guarantee privacy and individual autonomy. Challenges in the health data marketplace model cover trust, privacy, and security. Regarding data trust, the challenge is the control of health data use as well as the possible misuse against human rights and dignity. In DH ecosystems, patient data can be a commodity and different stakeholders, such as universities, public health care providers, big and small technological companies, and nonregulated private organizations, can use and share health data freely. Furthermore, the “ecosystem” where stakeholders have different business needs, regulations, and responsibilities raises concerns of data misuse, loss of privacy and autonomy, and endangers dignity and human rights [<xref ref-type="bibr" rid="ref12">12</xref>].</p>
        <p>The use of digital technologies promises huge benefits to improve health and well-being; however, it also raises threats to privacy, autonomy, and dignity by altering the ways individuals, governments, and firms interact [<xref ref-type="bibr" rid="ref92">92</xref>]. Health AI needs a lot of training data, including reference data from healthy persons to perform a detailed analysis, create profiles, and develop tailored predictions and simulations. This and the fact that the use of AI applications in care makes patient data part of the training data leads to loss of privacy and autonomy. Currently, AI systems are “black boxes” without transparency and the ability to explain how their decisions are made. Furthermore, they lack the capacity to recognize causality and ability, and to answer questions “why” and “how.” Many of the promises of AI are just beliefs [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref93">93</xref>]. This makes the forecast of negative consequences unpredictable [<xref ref-type="bibr" rid="ref71">71</xref>]. Nowadays, information systems and AI algorithms can access a large amount of health data without having the necessary safeguards, and they lack accountability [<xref ref-type="bibr" rid="ref39">39</xref>]. Furthermore, transparency alone is insufficient because it fails to protect people against emotional manipulation [<xref ref-type="bibr" rid="ref94">94</xref>,<xref ref-type="bibr" rid="ref95">95</xref>].</p>
        <p>New technological innovations create new challenges to human rights, dignity, privacy, autonomy, and equity. For example, the brain computer technology creates danger to freedom of thought and autonomy. Generative AI used in health can produce much misinformation (hallucinations) and raise concerns about the fair use of data and data ownership. In the future, AI technology may be able to infer our thoughts, and neurotechnology could decode our emotions, and perhaps soon our thoughts, and in this way, our mental freedom would be in danger [<xref ref-type="bibr" rid="ref96">96</xref>]. Digital technologies, such as nudging, manipulation, and conversational agents, enable the manipulation of people’s health behaviors, emotions, and mood, and in this way undermine autonomy and dignity [<xref ref-type="bibr" rid="ref97">97</xref>]. Furthermore, machine learning and AI can destroy privacy by enabling tailored surveillance and reidentification [<xref ref-type="bibr" rid="ref55">55</xref>]. Crucial and currently unsolved questions include who can create and use DPT, whether a health care provider can make and modify it without a patient’s informed consent, and for what purposes it can be used without a care relationship. In the future, it is possible that DPT may be increasingly the subject of care without a patient-physician relationship. This can destroy autonomy and lead to new paternalism and unknown or undefined responsibilities [<xref ref-type="bibr" rid="ref97">97</xref>].</p>
      </sec>
      <sec>
        <title>Concerns in Neoliberal DH</title>
        <p>In this paper, neoliberal DH is studied as a possible solution for DH. According to researchers, the belief that it is the most effective solution and offers the best health outcomes and lower costs is not an “objective truth” [<xref ref-type="bibr" rid="ref47">47</xref>]. The maximizing single service provider’s economic gain will not automatically maximize the quality of service and offer the lowest total costs. Furthermore, individuals who have money, social position, and relations have the best ability to use services and receive benefits. The result is that neoliberal DH can be harmful to the population’s health and well-being and can negatively impact health care affordability and quality [<xref ref-type="bibr" rid="ref91">91</xref>].</p>
        <p>Neoliberal DH has various impacts on human rights, dignity, privacy, and autonomy, as shown in <xref ref-type="table" rid="table1">Table 1</xref>.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Impacts of neoliberal ideas on human rights, dignity, privacy, and autonomy in digital health.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="280"/>
            <col width="520"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td>Idea or goal</td>
                <td>Meaning in digital health</td>
                <td>Impact on</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Digitalization of all information</td>
                <td>A person’s life, emotions, and health behaviors are digitalized.</td>
                <td>Privacy, human rights, and dignity</td>
              </tr>
              <tr valign="top">
                <td>Privatization and monetization of health data</td>
                <td>Health data are available for all and sold for money. The person has no possibility of knowing how health data are used and by whom. Health data are shared with private artificial intelligence developers, and they become part of the big data training bases.</td>
                <td>Privacy, dignity, and autonomy</td>
              </tr>
              <tr valign="top">
                <td>Commodification and privatization of public health services</td>
                <td>Weakens the role of public services.</td>
                <td>Privacy, human rights, and autonomy</td>
              </tr>
              <tr valign="top">
                <td>Self-regulation, deregulation, and minimization of the state’s role</td>
                <td>Protective restrictions for health data misuse and quality norms are weakened. The power of private organizations has increased.</td>
                <td>Autonomy and privacy</td>
              </tr>
              <tr valign="top">
                <td>Transferring responsibility to a person</td>
                <td>Makes the person or patient a consumer. A person or patient has the responsibility of care, personal health, and for self-monitoring.</td>
                <td>Autonomy and privacy</td>
              </tr>
              <tr valign="top">
                <td>Private ownership of personal health data and digital products derived from it</td>
                <td>Private organizations own health data, personal profiles, and digital health twins derived from them; enables tailored manipulation of a person’s health behaviors.</td>
                <td>Human rights, dignity, and privacy; autonomy and privacy</td>
              </tr>
              <tr valign="top">
                <td>Minimizing private service providers’ responsibility</td>
                <td>Private organizations lack the responsibility for the negative consequences of the use of health data.</td>
                <td>Human rights and privacy</td>
              </tr>
              <tr valign="top">
                <td>Digital services substitute human contact</td>
                <td>Caring data, profiles, forecasts, and digital patient twin.</td>
                <td>Human rights and dignity</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>According to Wong [<xref ref-type="bibr" rid="ref39">39</xref>], the commodification of public health services and health data, especially when it is linked to monetization and privatization, creates meaningful human rights, privacy, and autonomy concerns [<xref ref-type="bibr" rid="ref39">39</xref>]. Commodification and privatization of health data move the ownership of health data to private organizations that give them the power to change norms and use health data for the development of new business, services, and tools [<xref ref-type="bibr" rid="ref98">98</xref>]. Furthermore, the monetization of health data enables selling it to private and public users operating in different environments and jurisdictions. It increases the number of actors collecting, using, and storing health data in different contexts, and powerful private organizations (eg, internet giants and mediators) acquire the power to reshape laws, regulations, and standards for their own sake [<xref ref-type="bibr" rid="ref87">87</xref>]. The result is increased risk of data misuse, unlawful destruction and modification, unauthorized disclosure or access, and use of data for other purposes than for which it was collected [<xref ref-type="bibr" rid="ref85">85</xref>].</p>
        <p>Defining people as consumers enables the transfer of responsibility of health and care to the person in the form of self-care, home care, home hospital, self-tracking, digitally engaged patient, and self-control, and at the same time reduces health care cost [<xref ref-type="bibr" rid="ref47">47</xref>]. The problem in self-responsibility is that many exogenous factors impacting personal health and wellness are largely beyond individual control, such as environmental and air pollution, genetic predispositions, biological factors, neuropsychology, genetics, and epigenetics, as well as factors related to a person’s economic and socioeconomic status [<xref ref-type="bibr" rid="ref99">99</xref>]. Furthermore, researchers have shown that the idea of a rational human that is personally responsible for own beliefs, intentions, health behaviors, and actions is only a belief, and people hardly have the knowledge and power to make rational health decisions [<xref ref-type="bibr" rid="ref47">47</xref>]. Therefore, the idea of placing the responsibility for health and wellness on individuals is a mistake [<xref ref-type="bibr" rid="ref99">99</xref>].</p>
      </sec>
    </sec>
    <sec>
      <title>A Road to HCDH</title>
      <p>The ultimate goal of the HCDH model is to support good health and wellness for all and not to produce harm and maximize profit. It sees DH as a sociotechnical system whose core elements are ideas, goals, principles, and regulations. The term “human-centered” means that the patient’s or person’s needs for human rights, dignity, autonomy, and privacy are acknowledged, and the person or patient is the stakeholder in the DH system, having the power to use autonomy to set personal privacy obligations. The model highlights that the main challenge in creating HCDH are the formulation of fundamental ideas and goals, understanding health data in the right way, and the creation of principles, new laws, and requirements. System thinking and modeling methods were used to develop the model. The model uses broad definition for DH provided by Fatehi et al [<xref ref-type="bibr" rid="ref18">18</xref>] and takes a wide approach to health data, as depicted in <xref rid="figure2" ref-type="fig">Figure 2</xref>.</p>
      <fig id="figure2" position="float">
        <label>Figure 2</label>
        <caption>
          <p>System model for creation of human-centric digital health.</p>
        </caption>
        <graphic xlink:href="jmir_v27i1e68661_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <p>In this model, ideas, goals, and concerns affect the formulation of principles. They also affect how health data are understood and managed by laws and regulations. Laws that regulate DH systems need a huge amount of health data. The role of technology, architecture, and innovations is to enable the realization of the HCDH system.</p>
    </sec>
    <sec>
      <title>Foundational Ideas and Goals in the HCDH Model</title>
      <p>Foundational ideas and goals for HCDH are derived from the results of the literature analysis and concerns discussed in the DH: Concerns to Human Rights, Dignity, Privacy, and Autonomy section are shown in <xref ref-type="table" rid="table2">Table 2</xref>, together with corresponding ideas and goals, ideas of economic markets, and neoliberalism.</p>
      <table-wrap position="float" id="table2">
        <label>Table 2</label>
        <caption>
          <p>Ideas and goals of human-centric digital health and neoliberal digital health.</p>
        </caption>
        <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
          <col width="500"/>
          <col width="500"/>
          <thead>
            <tr valign="top">
              <td>Ideas and goals of human-centric digital health</td>
              <td>Ideas and goals of neoliberal digital health</td>
            </tr>
          </thead>
          <tbody>
            <tr valign="top">
              <td>Maximization of health and wellness for all. Efficiency and cost saving cannot override human rights, privacy, and autonomy.</td>
              <td>Maximization of own economic gain. Maximal efficiency and minimized costs.</td>
            </tr>
            <tr valign="top">
              <td>Digitalization of health data that is ethically and lawfully collected.</td>
              <td>Digitalization of all personal information.</td>
            </tr>
            <tr valign="top">
              <td>Digital health Services are public goods. Public and private production of health services.</td>
              <td>Private ownership of digital health services. Private production of health services.</td>
            </tr>
            <tr valign="top">
              <td>Health data are not commodities and cannot be monetized.</td>
              <td>Commodification and monetization of health data.</td>
            </tr>
            <tr valign="top">
              <td>Personal health data are owned by the data subject and are not public goods or commodities. A person is the owner of digital products, such as digital patient twin derived from health data.</td>
              <td>Private ownership of health data and digital products derived from it.</td>
            </tr>
            <tr valign="top">
              <td>Strengthening of the role of the state. Strong privacy, dignity, and autonomy regulations</td>
              <td>Deregulation and minimization of the role of the state. Weakening of privacy regulations.</td>
            </tr>
            <tr valign="top">
              <td>Public and private organizations have responsibility for the consequences of the use and sharing of health data and digital products derived from data.</td>
              <td>No responsibility for negative consequences.</td>
            </tr>
            <tr valign="top">
              <td>Patient is the stakeholder in digital health.</td>
              <td>Patient is a health consumer.</td>
            </tr>
            <tr valign="top">
              <td>A person has the moral responsibility to promote good health behaviors and is not solely responsible for their own health and sickness.</td>
              <td>Making a person or patient responsible for their own health and sickness management.</td>
            </tr>
          </tbody>
        </table>
      </table-wrap>
      <sec>
        <title>Rights, Principles, and Responsibilities in HCDH</title>
        <p>Essentially, human rights apply online just as they do offline [<xref ref-type="bibr" rid="ref100">100</xref>]. There are fundamental questions in DH to be solved such as which rights should be absolute, and how privacy and health data should be understood. The authors state that rights presented in chapters 12 and 18 of the UNDHR and human dignity should be recognized as absolute rights. Human rights should be extended to cover sensitive data about humans and mental autonomy [<xref ref-type="bibr" rid="ref39">39</xref>], and the extension “Nobody has the right to own a person physically, socially, mentally, or informationally” should be added. Furthermore, freedom of thought should be an absolute right [<xref ref-type="bibr" rid="ref96">96</xref>]. Dignity should be understood as a human right, and it should also include social dignity. Without autonomy, we cannot exercise our other human rights; therefore, the right to mental autonomy is also needed. The authors state that the abovementioned human rights e cannot be balanced against other rights or others’ needs. Without the proposed extensions, public and private organizations have the power to modify our choices through nudges and other manipulation technologies. The authors also propose that personal digital self is not a commodity, and the person owns his or her digital copies (eg, DPT). This indicates that any form of digital self cannot be created, modified, or sold without a person’s consent.</p>
        <p>HCDH also requires new responsibilities, which should be similar for public and private organizations collecting, processing, storing, and sharing health data. The current and widely used nonbinding moral responsibility to process health data fairly is insufficient. Responsibilities in DH should include the responsibility for negative consequences and harm caused to the data subject and society. Harm should be understood not only as economic loss, but instead it should cover health-related psychological and social harms and harms to autonomy [<xref ref-type="bibr" rid="ref87">87</xref>]. Harms are difficult to predict and measure; therefore, they should be prevented proactively.</p>
      </sec>
      <sec>
        <title>Privacy and Health Data</title>
        <p>According to researchers, currently it is almost impossible for a person to control the collection of health data and its flow across digital boundaries [<xref ref-type="bibr" rid="ref90">90</xref>]. Therefore, it is necessary to extend the privacy concept to include behavioral privacy, privacy of thoughts and emotions, as well as metadata privacy. Furthermore, the authors state that privacy should be understood as the real-life ability to set personal rules (policies) regulating how health data are used in a situation, and as the legal duty for data collectors and processors to use data according to those rules. Furthermore, private information should be treated as private, and not as a resource that can be exploited by data companies [<xref ref-type="bibr" rid="ref101">101</xref>]. According to researchers, privacy solutions using a fiduciary duty model and legal binding data rules and responsibilities should be used in the digital world [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref87">87</xref>,<xref ref-type="bibr" rid="ref102">102</xref>], and the authors propose using them in HCDH. In DH, privacy should cover data collection, processing, and sharing of behavioral data, metadata, biomarkers, and person- or patient-generated data. It is also necessary to scrutinize why health data are used and by whom, and analyze the direct and indirect consequences of the possible misuse of health data (eg, discrimination, behavioral manipulation, and emotional manipulation). Available standards, such as the IEEE 7012 Standard for Machine Readable Privacy Terms, should be implemented.</p>
        <p>In HCDH, the authors recommend the use of the wide approach for health data in such a way that it includes health-related behaviors, metadata, emotional data, inferred data, derived data, and self-generated data. Health data should also include induced products and simulations, such as a person’s digital self, digital twin, and DPT.</p>
        <p>For HCDH, the authors propose the use of a special kind of ownership model where health data are personal properties and restricted public goods, that is, the person is the data owner, but health care providers, public health organizations, and professionals developing health care services, and researchers have the right to use it. Other uses of health data, such as the development of new health devices, products, and services and making economic gain, require a person’s consent. Furthermore, because people own their DH twin, it cannot be freely used, sold, or monetized by the data processor or other actors. This kind of personal ownership of health data corrects the existing data asymmetry (ie, those who have the ability to use health data also receive the biggest benefits) and power asymmetry by reducing the power data collectors can use over the data subject, and the lack of control [<xref ref-type="bibr" rid="ref27">27</xref>]. It also supports the data subject’s autonomy.</p>
        <p>In the future, personal wellness and health devices will generate a huge number of digital biomarkers and phenotypes used, stored, and shared by private industry. Digital biomarkers and phenotypes can also be linked with other personal data, resulting in potentially health-relevant data [<xref ref-type="bibr" rid="ref103">103</xref>]. Currently, biomarkers are not classified as health data [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref55">55</xref>]. Furthermore, the digitization of past health-related data cannot be controlled by the data subject. To avoid risks for privacy and autonomy, the authors state that both digital biomarkers and past health data should be classified as health data.</p>
      </sec>
      <sec>
        <title>Laws and Regulations</title>
        <p>According to available studies, current regulations are insufficient and unable to guarantee human rights, privacy, and autonomy in DH, especially in its multistakeholder digital ecosystems and future private-public coalitions, and against the network’s third-party data brokers and analytics companies [<xref ref-type="bibr" rid="ref101">101</xref>]. Therefore, new laws and regulations are needed to make HCDH successful.</p>
        <p>The authors propose that AI-based health algorithms should be defined as a medical device, and a law is needed to make certification of algorithms and AI applications using manipulative technology mandatory [<xref ref-type="bibr" rid="ref45">45</xref>]. Furthermore, in DH, auditing, certification, and algorithmic verification should be made mandatory. It is also necessary to ban collection and surveillance through metadata and hidden reidentification [<xref ref-type="bibr" rid="ref30">30</xref>]. New laws are required to regulate the use of self-tracking technologies and postmortem use of digital self and DPT [<xref ref-type="bibr" rid="ref47">47</xref>]. Laws should extend transparency obligations for governments and industry, public authorities, and big data organizations collecting and processing health data.</p>
        <p>The EU AI Act should be extended to prohibit AI systems that purposefully and materially manipulate a person’s preferences and generate harm. Furthermore, it is necessary to limit the use of facial recognition and ban algorithmic psychological, behavioral, emotional, and mind manipulation. According to the United Nations, a law is inevitable to protect people from unlawful or unnecessary surveillance, and to place human rights at the center of the regulation of digital technologies [<xref ref-type="bibr" rid="ref104">104</xref>]. People also need the right to delete personal health data from commercial AI training databases [<xref ref-type="bibr" rid="ref105">105</xref>]. Concerning AI algorithms, the principle of transparency is insufficient. For health AI applications, understandability of results, where they come from, and answers to questions about why and how data are used are needed.</p>
      </sec>
      <sec>
        <title>Technology and Architecture</title>
        <p>In the digital world, there are many technological and algorithmic solutions and tools for maintaining privacy and anonymity, such as homomorphic encryption, differential privacy, blockchain technology, edge computing, secure multiparty computation, federated learning, tor lie services, dining cryptography, zero knowledge proof, noise adding, duty encryption, data poisoning, mobile edge computing, confidential computing, chatbots, privacy preserving, collaborative mining, ethical nudging, electronic consent, IP hiding, personal assistants for privacy, privacy policy analysis, risk estimation with AI, falsification of disclosed data at use device level, and collaborative machine learning [<xref ref-type="bibr" rid="ref85">85</xref>,<xref ref-type="bibr" rid="ref106">106</xref>], and more are being developed. Despite their benefits, the authors state that none of them alone can fulfill the needs for human rights, dignity, privacy, and autonomy in DH. Instead, a combination of different organizational, architectural, and technical solutions is needed. One possible solution is a public-private partnership ecosystem based on the fiducial duty model and the use of homomorphic encryption, federated learning, edge computing, or confidential computing [<xref ref-type="bibr" rid="ref60">60</xref>].</p>
      </sec>
    </sec>
    <sec>
      <title>Design and Management of HCDH Ecosystems</title>
      <p>For designing and managing HCDH ecosystems, we must understand and formally as well as consistently represent multidisciplinary and dynamic systems in various contexts for enabling mapping between the different technologies, disciplines, methodologies, perspectives, intentions, and languages, among others. The solution is a system-oriented, architecture-centric, ontology-based, and policy-driven approach to transformed health ecosystems, using the universal type theory for abstraction and universal logic for representing relations. ISO 23903:2021 “Health informatics—interoperability and integration reference architecture—model and framework” provides a generic specification for managing interoperability and integration challenges in dynamic, complex, context-aware, and multidisciplinary health systems as “system of systems.” The system is represented using the generic component model [<xref ref-type="bibr" rid="ref107">107</xref>,<xref ref-type="bibr" rid="ref108">108</xref>]. A model is thereby defined as a representation of objects of a domain, their properties, relations, and interactions, enabling rational and active business in the represented domain (<xref rid="figure3" ref-type="fig">Figure 3</xref>). It consists of 3 dimensions: the domains involved in the business process, the granularity (composition and decomposition) of the system components, and the view of the evolutionary or development process. Thereby, the latter follows the ISO 10746 Reference Model Open Distributed Processing, defining the views of enterprise, information, computation, engineering, and technology; however, it is inevitably extended by the real-world business view.</p>
      <fig id="figure3" position="float">
        <label>Figure 3</label>
        <caption>
          <p>The International Organization for Standardization 23903 model and framework with focus on the policy domain (a) and its subdomains (b).</p>
        </caption>
        <graphic xlink:href="jmir_v27i1e68661_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <p>The domain actors define the goals and objectives of the ecosystem. The behavior of the system is controlled by the policy domain, which must be refined into the following policy subdomains:</p>
      <list list-type="bullet">
        <list-item>
          <p>the process policy domain, necessary for running the business process, separated into the service provider process policy domain (necessities for running the process) and the service user process policy domain (wishes and expectations) perspective</p>
        </list-item>
        <list-item>
          <p>the contextual policy domain, representing situational and intentional impacts</p>
        </list-item>
        <list-item>
          <p>the ethical policy domain, defining and enforcing humanistic, ethical, and moral requirements and solutions</p>
        </list-item>
        <list-item>
          <p>the legal policy domain, representing laws and regulations</p>
        </list-item>
      </list>
      <p>The policies are formally represented using the policy ontology defined by the authors in ISO 22600 Privilege Management and Access Control.</p>
      <p><xref rid="figure3" ref-type="fig">Figure 3</xref> formally represents all aspects shown in <xref rid="figure1" ref-type="fig">Figure 1</xref>, such as technology as domain information; communication technology, digital technologies, policies, information, data, implementation, and maintenance as viewpoints; as well as ideology, motivation, and beliefs as contexts.</p>
    </sec>
    <sec>
      <title>Challenges and Barriers in the HCDH Model</title>
      <p>On the one hand, the expected positive impacts of DH seem to be so remarkable that the ongoing transformation is justifiable. On the other hand, DH should not overshadow human rights and cause the loss of dignity, privacy, and autonomy. In this paper, we have analyzed ideas and principles driving the evolution toward DH, and the impacts of this transformation on human rights, dignity, privacy, and autonomy through 6 views. On the basis of an extended literature analysis, we found that 1 possible transformation to DH uses ideologies of digital market economy and neoliberalism. Our analysis show that this kind of development, linked to the belief that technology has only 1 predefined direction, raises the risk of degradation of human rights, loss of dignity, privacy, and autonomy, and increasing inequality in health. In this paper, an alternative solution called “HCDH” is proposed. It respects human rights and dignity and maintains privacy and autonomy. In this model, a person or patient is a stakeholder, and not just a source of raw material or consumer. For HCDH, we have developed a system model; incorporated human-centric ideas, principles, and requirements; and proposed supporting laws. Cornerstones in HCDH are new rights that offer an individual a high level of autonomy and privacy, and a special kind of health data ownership, where health data are personal properties and restricted public goods. Our solution is also proactively prepared for privacy and autonomy concerns arising from new technological innovations, such as DPT and the use of AI for behavioral manipulation.</p>
      <p>The HCDH model also has challenges. A major challenge is that guiding rules and principles of HCDH limit the ability of the data industry to collect, use, privatize, and monetize health data and use it for inferred or derived digital products and applications. As the current industry’s business model is based on free collection and use of data, they will voluntarily not stop the extensive collection of health data, push back its “ownership” to data patients and persons, and will not quit their money-making machine, thereby reducing their economic growth and ability to make innovations. Another problem is the wide definition used for health data. In the future, the findings of medical research and the better understanding of determinants for health can lead to an undesirable situation where most personal data would be health-relevant and also part of health data [<xref ref-type="bibr" rid="ref55">55</xref>,<xref ref-type="bibr" rid="ref61">61</xref>,<xref ref-type="bibr" rid="ref109">109</xref>]. The industry may also argue that the expected benefits of the collection and use of health data legitimately pose possible negative consequences to human rights, dignity, autonomy, and privacy, and those consequences can be solved later [<xref ref-type="bibr" rid="ref78">78</xref>]. The authors see this differently. In most real-life cases, innovations and development of new health products and services can be realized using AI-generated artificial data, and the current extensive, and wide collection of health data that violates human rights, privacy, and autonomy is unnecessary. Furthermore, the idea that negative consequences can be solved in the future is only a belief.</p>
      <p>A possible barrier is that HCDH will be discarded by policy makers and data industry. In this case, the only protection persisting for the data subject or patient is to self-defend privacy, dignity, and autonomy at a local or personal level. There are already solutions for this approach, such as the creation of virtual unlinked personalities; hiding sources of data; developing apps, which enable the monitoring and filtering of data flow from personal devices; using personal intelligent agents to make data vanish; and using applications that generate poisoned information for data collectors and for AI training bases. However, the authors argue that wide range use of self-defending tools will have major negative impacts on the usability, quality, and reliability of health data repositories and it can distort results of AI applications [<xref ref-type="bibr" rid="ref110">110</xref>]. Therefore, this kind of development is undesirable and should be avoided. Instead, governments and industry should offer people solutions that proactively prevent the misuse of health data by promoting human rights, dignity, privacy, and autonomy [<xref ref-type="bibr" rid="ref70">70</xref>], such as the proposed HCDH.</p>
      <p>DH should benefit people and patients in a way that is ethical, safe, secure, reliable, equitable, and sustainable. We must understand that if human rights, privacy, dignity, autonomy, and personal ownership of health data are lost, we will never get them back. Similar to Wong [<xref ref-type="bibr" rid="ref39">39</xref>], we state that it is essential to understand that human rights, dignity, privacy, and autonomy should be core elements in DH. Without this, we are in danger of becoming holograms and digital slaves.</p>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AI</term>
          <def>
            <p>artificial intelligence</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">BCI</term>
          <def>
            <p>brain computer interface</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">DH</term>
          <def>
            <p>digital health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">DPT</term>
          <def>
            <p>digital patient twin</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">EU-GDPR</term>
          <def>
            <p>European Union General Data Protection Regulation</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">HCDH</term>
          <def>
            <p>human-centric digital health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">UNDHR</term>
          <def>
            <p>United Nations Declaration of Human Rights</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vial</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Understanding digital transformation: a review and a research agenda</article-title>
          <source>J Strateg Inf Syst</source>
          <year>2019</year>
          <volume>28</volume>
          <issue>2</issue>
          <fpage>118</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jsis.2019.0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <article-title>Rights in the digital age challenges and ways forward</article-title>
          <source>Organisation for Economic Co-operation and Development</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.oecd-ilibrary.org/docserver/deb707a8-en.pdf?expires=1731223570&#38;id=id&#38;accname=guest&#38;checksum=DFFC7DF0D9ADAFB4AEBF1D473E3AD422">https://www.oecd-ilibrary.org/docserver/deb707a8-en.pdf?expires=1731223570&#38;id=id&#38;accname=guest&#38;checksum=DFFC7DF0D9ADAFB4AEBF1D473E3AD422</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stoumpos</surname>
              <given-names>AI</given-names>
            </name>
            <name name-style="western">
              <surname>Kitsios</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Talias</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Digital transformation in healthcare: technology acceptance and its applications</article-title>
          <source>Int J Environ Res Public Health</source>
          <year>2023</year>
          <month>02</month>
          <day>15</day>
          <volume>20</volume>
          <issue>4</issue>
          <fpage>3407</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=ijerph20043407"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/ijerph20043407</pub-id>
          <pub-id pub-id-type="medline">36834105</pub-id>
          <pub-id pub-id-type="pii">ijerph20043407</pub-id>
          <pub-id pub-id-type="pmcid">PMC9963556</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lupton</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The digitally engaged patient: self-monitoring and self-care in the digital health era</article-title>
          <source>Soc Theory Health</source>
          <year>2013</year>
          <month>6</month>
          <day>19</day>
          <volume>11</volume>
          <issue>3</issue>
          <fpage>256</fpage>
          <lpage>70</lpage>
          <pub-id pub-id-type="doi">10.1057/sth.2013.10</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mergel</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Edelmann</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Haug</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Defining digital transformation: results from expert interviews</article-title>
          <source>Gov Inf Q</source>
          <year>2019</year>
          <month>10</month>
          <volume>36</volume>
          <issue>4</issue>
          <fpage>101385</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3390/ijerph20043407"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.giq.2019.06.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kraus</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Schiavone</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Pluzhnikova</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Invernizzi</surname>
              <given-names>AC</given-names>
            </name>
          </person-group>
          <article-title>Digital transformation in healthcare: analyzing the current state-of-research</article-title>
          <source>J Bus Res</source>
          <year>2021</year>
          <month>02</month>
          <volume>123</volume>
          <fpage>557</fpage>
          <lpage>67</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.sciencedirect.com/science/article/pii/S0148296320306913?via%3Dihub"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbusres.2020.10.030</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McGregor</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Neoliberalism and health care</article-title>
          <source>Int J Consum Stud</source>
          <year>2008</year>
          <month>07</month>
          <day>07</day>
          <volume>25</volume>
          <issue>2</issue>
          <fpage>82</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1111/j.1470-6431.2001.00183.x"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/j.1470-6431.2001.00183.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <article-title>Global strategy on digital health 2020-2025</article-title>
          <source>World Health Organization</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.who.int/docs/default-source/documents/gs4dhdaa2a9f352b0445bafbc79ca799dce4d.pdf">https://www.who.int/docs/default-source/documents/gs4dhdaa2a9f352b0445bafbc79ca799dce4d.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Paul</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Maglaras</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Ferrag</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Almomani</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Digitization of healthcare sector: a study on privacy and security concerns</article-title>
          <source>ICT Express</source>
          <year>2023</year>
          <month>08</month>
          <volume>9</volume>
          <issue>4</issue>
          <fpage>571</fpage>
          <lpage>88</lpage>
          <pub-id pub-id-type="doi">10.1016/j.icte.2023.02.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Blobel</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Oemig</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Ruotsalainen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Lopez</surname>
              <given-names>DM</given-names>
            </name>
          </person-group>
          <article-title>Transformation of health and social care systems-an interdisciplinary approach toward a foundational architecture</article-title>
          <source>Front Med (Lausanne)</source>
          <year>2022</year>
          <month>3</month>
          <day>7</day>
          <volume>9</volume>
          <fpage>802487</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/35402446"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fmed.2022.802487</pub-id>
          <pub-id pub-id-type="medline">35402446</pub-id>
          <pub-id pub-id-type="pmcid">PMC8992002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abernethy</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Adams</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Barrett</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bechtel</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Brennan</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Butte</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Faulkner</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Fontaine</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Friedhoff</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Halamka</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Howell</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Long</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>McGraw</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Perlin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rucker</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Sandy</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Savage</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Stump</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Tang</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Topol</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Tuckson</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Valdes</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>The promise of digital health: then, now, and the future</article-title>
          <source>NAM Perspect</source>
          <year>2022</year>
          <volume>2022</volume>
          <fpage>e34</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/36177208"/>
          </comment>
          <pub-id pub-id-type="doi">10.31478/202206e</pub-id>
          <pub-id pub-id-type="medline">36177208</pub-id>
          <pub-id pub-id-type="pii">10.31478/202206e</pub-id>
          <pub-id pub-id-type="pmcid">PMC9499383</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ruotsalainen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Blobel</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Transformed health ecosystems-challenges for security, privacy, and trust</article-title>
          <source>Front Med (Lausanne)</source>
          <year>2022</year>
          <month>3</month>
          <day>25</day>
          <volume>9</volume>
          <fpage>827253</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/35402454"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fmed.2022.827253</pub-id>
          <pub-id pub-id-type="medline">35402454</pub-id>
          <pub-id pub-id-type="pmcid">PMC8990842</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Giunti</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Melles</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Goossens</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Digital patient experience: umbrella systematic review</article-title>
          <source>J Med Internet Res</source>
          <year>2022</year>
          <month>08</month>
          <day>04</day>
          <volume>24</volume>
          <issue>8</issue>
          <fpage>e37952</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2022/8/e37952/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/37952</pub-id>
          <pub-id pub-id-type="medline">35925651</pub-id>
          <pub-id pub-id-type="pii">v24i8e37952</pub-id>
          <pub-id pub-id-type="pmcid">PMC9389377</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hendl</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Shukla</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Can digital health democratize health care?</article-title>
          <source>Bioethics</source>
          <year>2024</year>
          <month>01</month>
          <day>09</day>
          <volume>38</volume>
          <issue>6</issue>
          <fpage>491</fpage>
          <lpage>502</lpage>
          <pub-id pub-id-type="doi">10.1111/bioe.13266</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zuboff</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power</source>
          <year>2019</year>
          <publisher-loc>London, UK</publisher-loc>
          <publisher-name>Profile Books</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="web">
          <article-title>I invented the world wide web</article-title>
          <source>The New York Times</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nytimes.com/2019/11/24/opinion/world-wide-web.html">https://www.nytimes.com/2019/11/24/opinion/world-wide-web.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Karppinen</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Tumber</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Waisbord</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Human rights and digital</article-title>
          <source>The Routledge Companion to Media and Human Rights</source>
          <year>2017</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Routledge</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fatehi</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Samadbeik</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kazemi</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>What is digital health? Review of definitions</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2020</year>
          <month>11</month>
          <day>23</day>
          <volume>275</volume>
          <fpage>67</fpage>
          <lpage>71</lpage>
          <pub-id pub-id-type="doi">10.3233/SHTI200696</pub-id>
          <pub-id pub-id-type="medline">33227742</pub-id>
          <pub-id pub-id-type="pii">SHTI200696</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Meskó</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Drobni</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Bényei</surname>
              <given-names>É</given-names>
            </name>
            <name name-style="western">
              <surname>Gergely</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Győrffy</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Digital health is a cultural transformation of traditional healthcare</article-title>
          <source>Mhealth</source>
          <year>2017</year>
          <month>09</month>
          <volume>3</volume>
          <fpage>38</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/29184890"/>
          </comment>
          <pub-id pub-id-type="doi">10.21037/mhealth.2017.08.07</pub-id>
          <pub-id pub-id-type="medline">29184890</pub-id>
          <pub-id pub-id-type="pii">mh-03-2017.08.07</pub-id>
          <pub-id pub-id-type="pmcid">PMC5682364</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yeung</surname>
              <given-names>AW</given-names>
            </name>
            <name name-style="western">
              <surname>Torkamani</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Butte</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Glicksberg</surname>
              <given-names>BS</given-names>
            </name>
            <name name-style="western">
              <surname>Schuller</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Rodriguez</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Ting</surname>
              <given-names>DS</given-names>
            </name>
            <name name-style="western">
              <surname>Bates</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Schaden</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Peng</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Willschke</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>van der Laak</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Car</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rahimi</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Celi</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Banach</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kletecka-Pulker</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kimberger</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Eils</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Islam</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>ST</given-names>
            </name>
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>TY</given-names>
            </name>
            <name name-style="western">
              <surname>Gao</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Brunak</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Atanasov</surname>
              <given-names>AG</given-names>
            </name>
          </person-group>
          <article-title>The promise of digital healthcare technologies</article-title>
          <source>Front Public Health</source>
          <year>2023</year>
          <month>9</month>
          <day>26</day>
          <volume>11</volume>
          <fpage>1196596</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/37822534"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fpubh.2023.1196596</pub-id>
          <pub-id pub-id-type="medline">37822534</pub-id>
          <pub-id pub-id-type="pmcid">PMC10562722</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="web">
          <article-title>WHO remains firmly committed to the principles set out in the preamble to the Constitution</article-title>
          <source>World Health Organization</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.who.int/about/governance/constitution">https://www.who.int/about/governance/constitution</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="web">
          <article-title>News</article-title>
          <source>World Health Organization</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.who.int/news-room/questions-and-answers/item/">https://www.who.int/news-room/questions-and-answers/item/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coveney</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Highfield</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <source>Virtual You</source>
          <year>2023</year>
          <publisher-loc>Hoboken, NJ</publisher-loc>
          <publisher-name>Princeton University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
          <article-title>Capitalism</article-title>
          <source>Cambridge Dictionary</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dictionary.cambridge.org/dictionary/english/capitalism">https://dictionary.cambridge.org/dictionary/english/capitalism</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sadiku</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Chukwu</surname>
              <given-names>UC</given-names>
            </name>
            <name name-style="western">
              <surname>Ajayi-Majebi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Musa</surname>
              <given-names>SM</given-names>
            </name>
          </person-group>
          <article-title>Digital capitalism: a primer</article-title>
          <source>Int J Trend Sci Res</source>
          <year>2022</year>
          <volume>6</volume>
          <issue>4</issue>
          <fpage>590</fpage>
          <lpage>7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ijtsrd.com/papers/ijtsrd50147.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bi</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>From information extraction to remaining data—the production mystery of digital capitalism</article-title>
          <source>Comput Sci Math Forum</source>
          <year>2023</year>
          <volume>8</volume>
          <issue>1</issue>
          <fpage>15</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3390/cmsf2023008015"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/cmsf2023008015</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Verhulst</surname>
              <given-names>SG</given-names>
            </name>
          </person-group>
          <article-title>Operationalizing digital self-determination</article-title>
          <source>Data Policy</source>
          <year>2023</year>
          <month>04</month>
          <day>24</day>
          <volume>5</volume>
          <fpage>1</fpage>
          <pub-id pub-id-type="doi">10.1017/dap.2023.11</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Neubauer</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Neoliberalism in the information age, or vice versa? Global citizenship, technology, and hegemonic ideology</article-title>
          <source>tripleC</source>
          <year>2011</year>
          <month>09</month>
          <day>06</day>
          <volume>9</volume>
          <issue>2</issue>
          <fpage>195</fpage>
          <lpage>230</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.triple-c.at"/>
          </comment>
          <pub-id pub-id-type="doi">10.31269/triplec.v9i2.238</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="web">
          <article-title>Commodification</article-title>
          <source>University of Georgia</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://neolib.uga.edu/commodification">https://neolib.uga.edu/commodification</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lipton</surname>
              <given-names>JD</given-names>
            </name>
          </person-group>
          <source>Our Data, Ourselves: A Personal Guide to Digital Privacy</source>
          <year>2022</year>
          <publisher-loc>Oxford, UK</publisher-loc>
          <publisher-name>University California Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stanley</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Henne</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Niemi</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Sinnott-Armstrong</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>De Brigard</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Making moral principles suit yourself</article-title>
          <source>Psychon Bull Rev</source>
          <year>2021</year>
          <month>10</month>
          <volume>28</volume>
          <issue>5</issue>
          <fpage>1735</fpage>
          <lpage>41</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3758/s13423-021-01935-8"/>
          </comment>
          <pub-id pub-id-type="doi">10.3758/s13423-021-01935-8</pub-id>
          <pub-id pub-id-type="medline">33948917</pub-id>
          <pub-id pub-id-type="pii">10.3758/s13423-021-01935-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Marks</surname>
              <given-names>SP</given-names>
            </name>
          </person-group>
          <article-title>Human rights: a brief introduction</article-title>
          <source>Harvard University</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.hsph.harvard.edu/wp-content/uploads/sites/134/2017/07/Human-Rights-A-brief-intro-2017.pdf">https://www.hsph.harvard.edu/wp-content/uploads/sites/134/2017/07/Human-Rights-A-brief-intro-2017.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="web">
          <article-title>Dignity</article-title>
          <source>EU Charter of Fundamental Rights</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://fra.europa.eu/en/eu-charter/title/title-i-dignity">https://fra.europa.eu/en/eu-charter/title/title-i-dignity</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Andorno</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>ten Have</surname>
              <given-names>HA</given-names>
            </name>
            <name name-style="western">
              <surname>Gordijn</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Human dignity and human rights</article-title>
          <source>Handbook of Global Bioethics</source>
          <year>2014</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>45</fpage>
          <lpage>57</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="web">
          <article-title>Universal declaration of human rights</article-title>
          <source>United Nations</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.un.org/en/about-us/universal-declaration-of-human-rights">https://www.un.org/en/about-us/universal-declaration-of-human-rights</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="web">
          <article-title>The right to privacy in the digital age: meeting report</article-title>
          <source>Geneva Academy</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.geneva-academy.ch/joomlatools-files/docman-files/ReportThe%20Right%20to%20Privacy%20in%20the%20Digital%20Age.pdf">https://www.geneva-academy.ch/joomlatools-files/docman-files/ReportThe%20Right%20to%20Privacy%20in%20the%20Digital%20Age.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
          <article-title>A/HRC/51/17: the right to privacy in the digital age</article-title>
          <source>United Nations</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ohchr.org/en/documents/thematic-reports/ahrc5117-right-privacy-digital-age">https://www.ohchr.org/en/documents/thematic-reports/ahrc5117-right-privacy-digital-age</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nickel</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Etinson</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The Stanford Encyclopedia of Philosophy (fall 2024 edition)</article-title>
          <source>The Stanford Encyclopedia</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://plato.stanford.edu/archives/fall2024/entries/rights-human/&#62;">https://plato.stanford.edu/archives/fall2024/entries/rights-human/&#62;</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>WH</given-names>
            </name>
          </person-group>
          <source>We, the Data: Human Rights in the Digital Age</source>
          <year>2023</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>MIT Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="web">
          <article-title>Charter of fundamental rights of the European Union</article-title>
          <source>European Union</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.europarl.europa.eu/charter/pdf/text_en.pdf">https://www.europarl.europa.eu/charter/pdf/text_en.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Agich</surname>
              <given-names>JG</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>van Staden</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Key concepts: autonomy</article-title>
          <source>Philosophy, Psychiatry &#38; Psychology</source>
          <year>2009</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>The Johns Hopkins University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="web">
          <article-title>Autonomy</article-title>
          <source>Cambridge Dictionary</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dictionary.cambridge.org/dictionary/english/autonomy">https://dictionary.cambridge.org/dictionary/english/autonomy</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Christman</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Autonomy in moral and political philosophy</article-title>
          <source>Stanford Encyclopedia of Philosophy</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://plato.stanford.edu/entries/autonomy-moral/">https://plato.stanford.edu/entries/autonomy-moral/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Becker</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Privacy in the digital age: comparing and contrasting individual versus social approaches towards privacy</article-title>
          <source>Ethics Inf Technol</source>
          <year>2019</year>
          <month>7</month>
          <day>17</day>
          <volume>21</volume>
          <issue>4</issue>
          <fpage>307</fpage>
          <lpage>17</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1007/s10676-019-09508-z"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10676-019-09508-z</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Citron</surname>
              <given-names>DK</given-names>
            </name>
          </person-group>
          <source>The Fight for Privacy - Protecting Dignity, Identity, and Love in the Digital Age</source>
          <year>2022</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>W.W Norton Company</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nissenbaum</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Privacy as contextual integrity</article-title>
          <source>Washington Law Review</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digitalcommons.law.uw.edu/wlr/vol79/iss1/10/">https://digitalcommons.law.uw.edu/wlr/vol79/iss1/10/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ajana</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Digital health and the biopolitics of the quantified self</article-title>
          <source>Digit Health</source>
          <year>2017</year>
          <month>02</month>
          <day>01</day>
          <volume>3</volume>
          <fpage>2055207616689509</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/abs/10.1177/2055207616689509?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/2055207616689509</pub-id>
          <pub-id pub-id-type="medline">29942580</pub-id>
          <pub-id pub-id-type="pii">10.1177_2055207616689509</pub-id>
          <pub-id pub-id-type="pmcid">PMC6001256</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Managing privacy in the digital economy</article-title>
          <source>Fundam Res</source>
          <year>2021</year>
          <month>09</month>
          <volume>1</volume>
          <issue>5</issue>
          <fpage>543</fpage>
          <lpage>51</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.fmre.2021.08.009</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Das</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>HP</given-names>
            </name>
            <name name-style="western">
              <surname>Forlizzi</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Privacy in the age of AI</article-title>
          <source>Commun ACM</source>
          <year>2023</year>
          <month>10</month>
          <day>20</day>
          <volume>66</volume>
          <issue>11</issue>
          <fpage>29</fpage>
          <lpage>31</lpage>
          <pub-id pub-id-type="doi">10.1145/3625254</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cohen</surname>
              <given-names>JE</given-names>
            </name>
          </person-group>
          <source>Configuring the Networked Self: Law, Code, and the Play of Everyday Practice</source>
          <year>2012</year>
          <publisher-loc>London, UK</publisher-loc>
          <publisher-name>Yale University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Khatiwada</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>JC</given-names>
            </name>
            <name name-style="western">
              <surname>Blobel</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Patient-generated health data (PGHD): understanding, requirements, challenges, and existing techniques for data security and privacy</article-title>
          <source>J Pers Med</source>
          <year>2024</year>
          <month>03</month>
          <day>03</day>
          <volume>14</volume>
          <issue>3</issue>
          <fpage>282</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=jpm14030282"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/jpm14030282</pub-id>
          <pub-id pub-id-type="medline">38541024</pub-id>
          <pub-id pub-id-type="pii">jpm14030282</pub-id>
          <pub-id pub-id-type="pmcid">PMC10971637</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brantly</surname>
              <given-names>AF</given-names>
            </name>
            <name name-style="western">
              <surname>Brantly</surname>
              <given-names>ND</given-names>
            </name>
          </person-group>
          <article-title>Patient-centric cybersecurity</article-title>
          <source>J Cyberpol</source>
          <year>2020</year>
          <month>12</month>
          <day>09</day>
          <volume>5</volume>
          <issue>3</issue>
          <fpage>372</fpage>
          <lpage>91</lpage>
          <pub-id pub-id-type="doi">10.1080/23738871.2020.1856902</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vayena</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Haeusermann</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Adjekum</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Blasimme</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Digital health: meeting the ethical and policy challenges</article-title>
          <source>Swiss Med Wkly</source>
          <year>2018</year>
          <volume>148</volume>
          <fpage>w14571</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.4414/smw.2018.14571"/>
          </comment>
          <pub-id pub-id-type="doi">10.4414/smw.2018.14571</pub-id>
          <pub-id pub-id-type="medline">29376547</pub-id>
          <pub-id pub-id-type="pii">smw-14571</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yaka</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>A deep dive into dynamic data flows, wearable devices, and the concept of health data</article-title>
          <source>Int Data Priv Law</source>
          <year>2023</year>
          <volume>13</volume>
          <issue>2</issue>
          <fpage>124</fpage>
          <lpage>40</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://academic.oup.com/idpl/article/13/2/124/7186915"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/idpl/ipad007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schneble</surname>
              <given-names>CO</given-names>
            </name>
            <name name-style="western">
              <surname>Elger</surname>
              <given-names>BS</given-names>
            </name>
            <name name-style="western">
              <surname>Shaw</surname>
              <given-names>DM</given-names>
            </name>
          </person-group>
          <article-title>All our data will be health data one day: the need for universal data protection and comprehensive consent</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>05</month>
          <day>28</day>
          <volume>22</volume>
          <issue>5</issue>
          <fpage>e16879</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/5/e16879/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/16879</pub-id>
          <pub-id pub-id-type="medline">32463372</pub-id>
          <pub-id pub-id-type="pii">v22i5e16879</pub-id>
          <pub-id pub-id-type="pmcid">PMC7290498</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kahn</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Terry</surname>
              <given-names>SF</given-names>
            </name>
          </person-group>
          <article-title>Who owns (or controls) health data?</article-title>
          <source>Sci Data</source>
          <year>2024</year>
          <month>02</month>
          <day>01</day>
          <volume>11</volume>
          <issue>1</issue>
          <fpage>156</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/s41597-024-02982-1"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41597-024-02982-1</pub-id>
          <pub-id pub-id-type="medline">38302466</pub-id>
          <pub-id pub-id-type="pii">10.1038/s41597-024-02982-1</pub-id>
          <pub-id pub-id-type="pmcid">PMC10834592</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="web">
          <article-title>Home page</article-title>
          <source>General Data Protection Regulation</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://gdpr-info.eu/">https://gdpr-info.eu/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="web">
          <article-title>EU GDPR recital</article-title>
          <source>SecureDataService</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.privacy-regulation.eu/en/r35.htm">https://www.privacy-regulation.eu/en/r35.htm</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="web">
          <article-title>Berkerley human research protection program</article-title>
          <source>UC Berkeley</source>
          <access-date>2025-12-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://cphs.berkeley.edu/hipaa/hipaa18.html">https://cphs.berkeley.edu/hipaa/hipaa18.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ruotsalainen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Blobel</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Future pHealth ecosystem-holistic view on privacy and trust</article-title>
          <source>J Pers Med</source>
          <year>2023</year>
          <month>06</month>
          <day>26</day>
          <volume>13</volume>
          <issue>7</issue>
          <fpage>e34</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=jpm13071048"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/jpm13071048</pub-id>
          <pub-id pub-id-type="medline">37511661</pub-id>
          <pub-id pub-id-type="pii">jpm13071048</pub-id>
          <pub-id pub-id-type="pmcid">PMC10381737</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Purtova</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>van Maanen</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Data as an economic good, data as a commons, and data governance</article-title>
          <source>Law Innov Technol</source>
          <year>2024</year>
          <month>11</month>
          <day>02</day>
          <volume>16</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.1080/17579961.2023.2265270</pub-id>
          <pub-id pub-id-type="medline">39634789</pub-id>
          <pub-id pub-id-type="pii">2265270</pub-id>
          <pub-id pub-id-type="pmcid">PMC11614035</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>EG</given-names>
            </name>
            <name name-style="western">
              <surname>Begany</surname>
              <given-names>GM</given-names>
            </name>
          </person-group>
          <article-title>Opening government health data to the public: benefits, challenges, and lessons learned from early innovators</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2017</year>
          <month>03</month>
          <day>01</day>
          <volume>24</volume>
          <issue>2</issue>
          <fpage>345</fpage>
          <lpage>51</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/27497796"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/jamia/ocw076</pub-id>
          <pub-id pub-id-type="medline">27497796</pub-id>
          <pub-id pub-id-type="pii">ocw076</pub-id>
          <pub-id pub-id-type="pmcid">PMC7651893</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="web">
          <article-title>DIRECTIVE 96/9 EC of the European Parliament and of the Council</article-title>
          <source>European Parliament</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:31996L0009">https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:31996L0009</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Banterle</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Synodinou</surname>
              <given-names>TE</given-names>
            </name>
            <name name-style="western">
              <surname>Jougleux</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Markou</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Prastitou</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Data ownership in the data economy: a European dilemma</article-title>
          <source>EU Internet Law in the Digital Era: Regulation and Enforcement</source>
          <year>2020</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>199</fpage>
          <lpage>225</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Balkin</surname>
              <given-names>JM</given-names>
            </name>
          </person-group>
          <article-title>Information fiduciaries and the first amendment</article-title>
          <source>UC Davis Law Review</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://lawreview.sf.ucdavis.edu/sites/g/files/dgvnsk15026/files/media/documents/49-4_Balkin.pdf">https://lawreview.sf.ucdavis.edu/sites/g/files/dgvnsk15026/files/media/documents/49-4_Balkin.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ligett</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Nissim</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>We need to focus on how our data is used, not just how it is shared</article-title>
          <source>Commun ACM</source>
          <year>2023</year>
          <month>08</month>
          <day>23</day>
          <volume>66</volume>
          <issue>9</issue>
          <fpage>32</fpage>
          <lpage>4</lpage>
          <pub-id pub-id-type="doi">10.1145/3572912</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Roessel</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Reumann</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Brand</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Potentials and challenges of the health data cooperative model</article-title>
          <source>Public Health Genomics</source>
          <year>2017</year>
          <month>6</month>
          <day>22</day>
          <volume>20</volume>
          <issue>6</issue>
          <fpage>321</fpage>
          <lpage>31</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1159/000489994"/>
          </comment>
          <pub-id pub-id-type="doi">10.1159/000489994</pub-id>
          <pub-id pub-id-type="medline">29936514</pub-id>
          <pub-id pub-id-type="pii">000489994</pub-id>
          <pub-id pub-id-type="pmcid">PMC6159824</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bühler</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Nübel</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Jelinek</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Riechert</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Bauer</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Schmid</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Schneider</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Data cooperatives as a catalyst for collaboration, data sharing and the digital transformation of the construction sector</article-title>
          <source>Buildings</source>
          <year>2023</year>
          <month>02</month>
          <day>05</day>
          <volume>13</volume>
          <issue>2</issue>
          <fpage>442</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3390/"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/buildings13020442</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Venters</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Platform, or technology project? A spectrum of six strategic ‘plays’ from UK government IT initiatives and their implications for policy</article-title>
          <source>Gov Inf Q</source>
          <year>2021</year>
          <month>10</month>
          <volume>38</volume>
          <issue>4</issue>
          <fpage>101628</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.giq.2021.101628"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.giq.2021.101628</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hashiguchi</surname>
              <given-names>TC</given-names>
            </name>
            <name name-style="western">
              <surname>Oderkirk</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Slawomirski</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Fulfilling the promise of artificial intelligence in the health sector: let's get real</article-title>
          <source>Value Health</source>
          <year>2022</year>
          <month>03</month>
          <volume>25</volume>
          <issue>3</issue>
          <fpage>368</fpage>
          <lpage>73</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1098-3015(21)03225-3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jval.2021.11.1369</pub-id>
          <pub-id pub-id-type="medline">35227447</pub-id>
          <pub-id pub-id-type="pii">S1098-3015(21)03225-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ruotsalainen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Blobel</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Health information systems in the digital health ecosystem-problems and solutions for ethics, trust and privacy</article-title>
          <source>Int J Environ Res Public Health</source>
          <year>2020</year>
          <month>04</month>
          <day>26</day>
          <volume>17</volume>
          <issue>9</issue>
          <fpage>3006</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=ijerph17093006"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/ijerph17093006</pub-id>
          <pub-id pub-id-type="medline">32357446</pub-id>
          <pub-id pub-id-type="pii">ijerph17093006</pub-id>
          <pub-id pub-id-type="pmcid">PMC7246854</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Suleyman</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bhaskar</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>The Coming Wave: Technology, Power, and the Twenty-First Century's Greatest Dilemma</source>
          <year>2023</year>
          <publisher-loc>Lanham, MD</publisher-loc>
          <publisher-name>Penguin Random House</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oudin</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Maatoug</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Bourla</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ferreri</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Bonnot</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Millet</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Schoeller</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Mouchabac</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Adrien</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Digital phenotyping: data-driven psychiatry to redefine mental health</article-title>
          <source>J Med Internet Res</source>
          <year>2023</year>
          <month>10</month>
          <day>04</day>
          <volume>25</volume>
          <fpage>e44502</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2023//e44502/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/44502</pub-id>
          <pub-id pub-id-type="medline">37792430</pub-id>
          <pub-id pub-id-type="pii">v25i1e44502</pub-id>
          <pub-id pub-id-type="pmcid">PMC10585447</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Babrak</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Menetski</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rebhan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Nisato</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Zinggeler</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Brasier</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Baerenfaller</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Brenzikofer</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Baltzer</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Vogler</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Gschwind</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Schneider</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Streiff</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Groenen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Miho</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Traditional and digital biomarkers: two worlds apart?</article-title>
          <source>Digit Biomark</source>
          <year>2019</year>
          <month>8</month>
          <day>16</day>
          <volume>3</volume>
          <issue>2</issue>
          <fpage>92</fpage>
          <lpage>102</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1159/000502000"/>
          </comment>
          <pub-id pub-id-type="doi">10.1159/000502000</pub-id>
          <pub-id pub-id-type="medline">32095769</pub-id>
          <pub-id pub-id-type="pii">dib-0003-0092</pub-id>
          <pub-id pub-id-type="pmcid">PMC7015353</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Maturo</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Medicalization: current concept and future directions in a bionic society</article-title>
          <source>Mens Sana Monogr</source>
          <year>2012</year>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>122</fpage>
          <pub-id pub-id-type="doi">10.4103/0973-1229.91587</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Clarke</surname>
              <given-names>AE</given-names>
            </name>
            <name name-style="western">
              <surname>Mamo</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Fishman</surname>
              <given-names>JR</given-names>
            </name>
            <name name-style="western">
              <surname>Shim</surname>
              <given-names>JK</given-names>
            </name>
            <name name-style="western">
              <surname>Fosket</surname>
              <given-names>JR</given-names>
            </name>
          </person-group>
          <article-title>Biomedicalization: technoscientific transformations of health, illness, and U.S. biomedicine</article-title>
          <source>Am Sociol Rev</source>
          <year>2003</year>
          <month>04</month>
          <volume>68</volume>
          <issue>2</issue>
          <fpage>161</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://psycnet.apa.org/doi/10.2307/1519765"/>
          </comment>
          <pub-id pub-id-type="doi">10.2307/1519765</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coin</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Mulder</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dubljević</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Ethical aspects of BCI technology: what is the state of the art?</article-title>
          <source>Philosophies</source>
          <year>2020</year>
          <month>10</month>
          <day>24</day>
          <volume>5</volume>
          <issue>4</issue>
          <fpage>31</fpage>
          <pub-id pub-id-type="doi">10.3390/philosophies5040031</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saha</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mamun</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Mostafa</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Naik</surname>
              <given-names>GR</given-names>
            </name>
            <name name-style="western">
              <surname>Darvishi</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Khandoker</surname>
              <given-names>AH</given-names>
            </name>
            <name name-style="western">
              <surname>Baumert</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Progress in brain computer interface: challenges and opportunities</article-title>
          <source>Front Syst Neurosci</source>
          <year>2021</year>
          <month>2</month>
          <day>25</day>
          <volume>15</volume>
          <fpage>578875</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33716680"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fnsys.2021.578875</pub-id>
          <pub-id pub-id-type="medline">33716680</pub-id>
          <pub-id pub-id-type="pmcid">PMC7947348</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Klein</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Goering</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Gagne</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Shea</surname>
              <given-names>CV</given-names>
            </name>
            <name name-style="western">
              <surname>Franklin</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Zorowitz</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dougherty</surname>
              <given-names>DD</given-names>
            </name>
            <name name-style="western">
              <surname>Widge</surname>
              <given-names>AS</given-names>
            </name>
          </person-group>
          <article-title>Brain-computer interface-based control of closed-loop brain stimulation: attitudes and ethical considerations</article-title>
          <source>Brain-Computer Interfaces</source>
          <year>2016</year>
          <month>07</month>
          <day>18</day>
          <volume>3</volume>
          <issue>3</issue>
          <fpage>140</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1080/2326263x.2016.1207497</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Teller</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Legal aspects related to digital twin</article-title>
          <source>Philos Trans A Math Phys Eng Sci</source>
          <year>2021</year>
          <month>10</month>
          <day>04</day>
          <volume>379</volume>
          <issue>2207</issue>
          <fpage>20210023</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1098/rsta.2021.0023"/>
          </comment>
          <pub-id pub-id-type="doi">10.1098/rsta.2021.0023</pub-id>
          <pub-id pub-id-type="medline">34398645</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fischer</surname>
              <given-names>RP</given-names>
            </name>
            <name name-style="western">
              <surname>Volpert</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Antonino</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Ahrens</surname>
              <given-names>TD</given-names>
            </name>
          </person-group>
          <article-title>Digital patient twins for personalized therapeutics and pharmaceutical manufacturing</article-title>
          <source>Front Digit Health</source>
          <year>2023</year>
          <volume>5</volume>
          <fpage>1302338</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/38250053"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fdgth.2023.1302338</pub-id>
          <pub-id pub-id-type="medline">38250053</pub-id>
          <pub-id pub-id-type="pmcid">PMC10796488</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cusumano</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Generative AI as a new innovation platform</article-title>
          <source>Commun ACM</source>
          <year>2023</year>
          <month>09</month>
          <day>22</day>
          <volume>66</volume>
          <issue>10</issue>
          <fpage>18</fpage>
          <lpage>21</lpage>
          <pub-id pub-id-type="doi">10.1145/3615859</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shein</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Governments setting limits on AI</article-title>
          <source>Commun ACM</source>
          <year>2024</year>
          <month>03</month>
          <day>25</day>
          <volume>67</volume>
          <issue>4</issue>
          <fpage>12</fpage>
          <lpage>4</lpage>
          <pub-id pub-id-type="doi">10.1145/3640506</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jacobson</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>A taxonomy of dignity: a grounded theory study</article-title>
          <source>BMC Int Health Hum Rights</source>
          <year>2009</year>
          <month>2</month>
          <day>24</day>
          <volume>9</volume>
          <issue>1</issue>
          <fpage>33</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.biomedcentral.com/1472-698X/9/3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/1472-698x-9-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Esom</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Dhaliwal</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Amon</surname>
              <given-names>JJ</given-names>
            </name>
          </person-group>
          <article-title>Human rights and digital health technologies</article-title>
          <source>Health Hum Rights</source>
          <year>2020</year>
          <month>12</month>
          <volume>22</volume>
          <issue>2</issue>
          <fpage>21</fpage>
          <lpage>32</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33390689"/>
          </comment>
          <pub-id pub-id-type="medline">33390689</pub-id>
          <pub-id pub-id-type="pii">hhr-22-02-021</pub-id>
          <pub-id pub-id-type="pmcid">PMC7762914</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ruotsalainen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Blobel</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Pohjolainen</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Privacy and trust in eHealth: a fuzzy linguistic solution for calculating the merit of service</article-title>
          <source>J Pers Med</source>
          <year>2022</year>
          <month>04</month>
          <day>19</day>
          <volume>12</volume>
          <issue>5</issue>
          <fpage>657</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=jpm12050657"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/jpm12050657</pub-id>
          <pub-id pub-id-type="medline">35629080</pub-id>
          <pub-id pub-id-type="pii">jpm12050657</pub-id>
          <pub-id pub-id-type="pmcid">PMC9147882</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cohen</surname>
              <given-names>JE</given-names>
            </name>
          </person-group>
          <source>Between Truth and Power: The Legal Constructions of Informational Capitalism</source>
          <year>2019</year>
          <publisher-loc>Oxford, UK</publisher-loc>
          <publisher-name>Oxford University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="web">
          <article-title>Prohibited AI practices</article-title>
          <source>The EU Artificial Intelligence Act</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://artificialintelligenceact.eu/article/5/">https://artificialintelligenceact.eu/article/5/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="web">
          <article-title>The ethics of manipulation</article-title>
          <source>Stanford Encyclopedia of Philosophy Archive</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://plato.stanford.edu/archives/sum2022/entries/ethics-manipulation/">https://plato.stanford.edu/archives/sum2022/entries/ethics-manipulation/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ruotsalainen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Blobel</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Privacy and trust in pHealth - past, present and future</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2022</year>
          <month>11</month>
          <day>03</day>
          <volume>299</volume>
          <fpage>104</fpage>
          <lpage>17</lpage>
          <pub-id pub-id-type="doi">10.3233/SHTI220968</pub-id>
          <pub-id pub-id-type="medline">36325851</pub-id>
          <pub-id pub-id-type="pii">SHTI220968</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref91">
        <label>91</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kieffer</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hepburn</surname>
              <given-names>KJ</given-names>
            </name>
          </person-group>
          <article-title>Is neoliberalism killing us? A cross sectional study of the impact of neoliberal beliefs on health and social wellbeing in the midst of the COVID-19 pandemic</article-title>
          <source>Int J Soc Determinants Health Health Serv</source>
          <year>2022</year>
          <month>10</month>
          <day>22</day>
          <volume>53</volume>
          <issue>3</issue>
          <fpage>363</fpage>
          <lpage>73</lpage>
          <pub-id pub-id-type="doi">10.1177/00207314221134040</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref92">
        <label>92</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brantly</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Utopia lost – human rights in a digital world</article-title>
          <source>Appl Cybersecur Internet Gov</source>
          <year>2022</year>
          <month>12</month>
          <day>3</day>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>19</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.acigjournal.com/pdf-184290-105048?filename=Utopia%20Lost%20_%20Human.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.5604/01.3001.0016.1238</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref93">
        <label>93</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Levine</surname>
              <given-names>EV</given-names>
            </name>
          </person-group>
          <article-title>Cargo cult AI</article-title>
          <source>Commun ACM</source>
          <year>2023</year>
          <month>08</month>
          <day>23</day>
          <volume>66</volume>
          <issue>9</issue>
          <fpage>46</fpage>
          <lpage>51</lpage>
          <pub-id pub-id-type="doi">10.1145/3606946</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref94">
        <label>94</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Varošanec</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>On the path to the future: mapping the notion of transparency in the EU regulatory framework for AI</article-title>
          <source>Int Rev Law Comput Technol</source>
          <year>2022</year>
          <month>04</month>
          <day>08</day>
          <volume>36</volume>
          <issue>2</issue>
          <fpage>95</fpage>
          <lpage>117</lpage>
          <pub-id pub-id-type="doi">10.1080/13600869.2022.2060471</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref95">
        <label>95</label>
        <nlm-citation citation-type="web">
          <article-title>Ensuring the protection of human rights</article-title>
          <source>United Nations</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.un.org/techenvoy/sites/www.un.org.techenvoy/files/general/Digital_Human_Rights_Summary_PDF.pdf">https://www.un.org/techenvoy/sites/www.un.org.techenvoy/files/general/Digital_Human_Rights_Summary_PDF.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref96">
        <label>96</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Farahany</surname>
              <given-names>NA</given-names>
            </name>
          </person-group>
          <source>The Battle for Your Brain: Defending the Right to Think Freely in the Age of Neurotechnology</source>
          <year>2023</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>St Martins</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref97">
        <label>97</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zarsky</surname>
              <given-names>TZ</given-names>
            </name>
          </person-group>
          <article-title>Privacy and manipulation in the digital age</article-title>
          <source>Theo Inq L</source>
          <year>2019</year>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>22</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.degruyterbrill.com/document/doi/10.1515/til-2019-0006/html"/>
          </comment>
          <pub-id pub-id-type="doi">10.1515/til-2019-0006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref98">
        <label>98</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mouton Dorey</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Baumann</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Biller-Andorno</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Patient data and patient rights: Swiss healthcare stakeholders' ethical awareness regarding large patient data sets - a qualitative study</article-title>
          <source>BMC Med Ethics</source>
          <year>2018</year>
          <month>03</month>
          <day>07</day>
          <volume>19</volume>
          <issue>1</issue>
          <fpage>20</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedethics.biomedcentral.com/articles/10.1186/s12910-018-0261-x"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12910-018-0261-x</pub-id>
          <pub-id pub-id-type="medline">29514635</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12910-018-0261-x</pub-id>
          <pub-id pub-id-type="pmcid">PMC5842517</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref99">
        <label>99</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Traina</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Feiring</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Priority setting and personal health responsibility: an analysis of Norwegian key policy documents</article-title>
          <source>J Med Ethics</source>
          <year>2022</year>
          <month>01</month>
          <day>02</day>
          <volume>48</volume>
          <issue>1</issue>
          <fpage>39</fpage>
          <lpage>45</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://jme.bmj.com/lookup/pmidlookup?view=long&#38;pmid=32122963"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/medethics-2019-105612</pub-id>
          <pub-id pub-id-type="medline">32122963</pub-id>
          <pub-id pub-id-type="pii">medethics-2019-105612</pub-id>
          <pub-id pub-id-type="pmcid">PMC8717478</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref100">
        <label>100</label>
        <nlm-citation citation-type="web">
          <article-title>A new UN office for digital and emerging technologies</article-title>
          <source>United Nations</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.un.org/techenvoy/">https://www.un.org/techenvoy/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref101">
        <label>101</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lamdan</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>DATA Cartels</source>
          <year>2023</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>Stanford University Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref102">
        <label>102</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wachter</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mittelstadt</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>A right to reasonable inferences: re-thinking data protection law in the age of big data and AI</article-title>
          <source>Colum Bus L Rev</source>
          <year>2019</year>
          <volume>2</volume>
          <fpage>1</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ssrn.com/abstract=3248829"/>
          </comment>
          <pub-id pub-id-type="doi">10.31228/osf.io/mu2kf</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref103">
        <label>103</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jain</surname>
              <given-names>SH</given-names>
            </name>
            <name name-style="western">
              <surname>Powers</surname>
              <given-names>BW</given-names>
            </name>
            <name name-style="western">
              <surname>Hawkins</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>Brownstein</surname>
              <given-names>JS</given-names>
            </name>
          </person-group>
          <article-title>The digital phenotype</article-title>
          <source>Nat Biotechnol</source>
          <year>2015</year>
          <month>05</month>
          <volume>33</volume>
          <issue>5</issue>
          <fpage>462</fpage>
          <lpage>3</lpage>
          <pub-id pub-id-type="doi">10.1038/nbt.3223</pub-id>
          <pub-id pub-id-type="medline">25965751</pub-id>
          <pub-id pub-id-type="pii">nbt.3223</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref104">
        <label>104</label>
        <nlm-citation citation-type="web">
          <article-title>The United Nations secretary-general’s roadmap for digital cooperation ensuring the protection of human rights</article-title>
          <source>United Nations</source>
          <access-date>2024-04-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.un.org/techenvoy/content/roadmap-digital-cooperation">https://www.un.org/techenvoy/content/roadmap-digital-cooperation</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref105">
        <label>105</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bualamwini</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Unmasking AI</source>
          <year>1999</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Penguin Random House</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref106">
        <label>106</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nguyen</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Rivera</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Gualtieri</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>A new health care paradigm: the power of digital health and e-patients</article-title>
          <source>Mayo Clin Proc Digit Health</source>
          <year>2023</year>
          <month>09</month>
          <volume>1</volume>
          <issue>3</issue>
          <fpage>203</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.mcpdig.2023.04.005,"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.mcpdig.2023.04.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref107">
        <label>107</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Blobel</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Intelligent security and privacy solutions for enabling personalized telepathology</article-title>
          <source>Diagn Pathol</source>
          <year>2011</year>
          <month>03</month>
          <day>30</day>
          <volume>6</volume>
          <issue>Suppl 1</issue>
          <fpage>S4</fpage>
          <lpage>228</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://diagnosticpathology.biomedcentral.com/articles/10.1186/1746-1596-6-S1-S4"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/1746-1596-6-S1-S4</pub-id>
          <pub-id pub-id-type="medline">21489199</pub-id>
          <pub-id pub-id-type="pii">1746-1596-6-S1-S4</pub-id>
          <pub-id pub-id-type="pmcid">PMC3073222</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref108">
        <label>108</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brochhausen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bost</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Brochhausen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Blobel</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Understanding the gap between information models and realism-based ontologies using the generic component model</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2021</year>
          <month>10</month>
          <day>27</day>
          <volume>285</volume>
          <fpage>159</fpage>
          <lpage>64</lpage>
          <pub-id pub-id-type="doi">10.3233/SHTI210590</pub-id>
          <pub-id pub-id-type="medline">34734868</pub-id>
          <pub-id pub-id-type="pii">SHTI210590</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref109">
        <label>109</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Grön</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Common good in the era of data-intensive healthcare</article-title>
          <source>Humanit Soc Sci Commun</source>
          <year>2021</year>
          <month>10</month>
          <day>12</day>
          <volume>8</volume>
          <issue>1</issue>
          <fpage>230</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1057/s41599-021-00911-w"/>
          </comment>
          <pub-id pub-id-type="doi">10.1057/s41599-021-00911-w</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref110">
        <label>110</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Verde</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Marulli</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Marrone</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Exploring the impact of data poisoning attacks on machine learning model reliability</article-title>
          <source>Procedia Comput Sci</source>
          <year>2021</year>
          <volume>192</volume>
          <fpage>2624</fpage>
          <lpage>32</lpage>
          <pub-id pub-id-type="doi">10.1016/j.procs.2021.09.032</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
