| Literature DB >> 27031856 |
Pascal B Pfiffner1,2, Isaac Pinyol1, Marc D Natter1, Kenneth D Mandl1,3,4.
Abstract
A renewed interest by consumer information technology giants in the healthcare domain is focused on transforming smartphones into personal health data storage devices. With the introduction of the open source ResearchKit, Apple provides a framework for researchers to inform and consent research subjects, and to readily collect personal health data and patient reported outcomes (PRO) from distributed populations. However, being research backend agnostic, ResearchKit does not provide data transmission facilities, leaving research apps disconnected from the health system. Personal health data and PROs are of the most value when presented in context along with health system data. Our aim was to build a toolchain that allows easy and secure integration of personal health and PRO data into an open source platform widely adopted across 140 academic medical centers. We present C3-PRO: the Consent, Contact, and Community framework for Patient Reported Outcomes. This open source toolchain connects, in a standards-compliant fashion, any ResearchKit app to the widely-used clinical research infrastructure Informatics for Integrating Biology and the Bedside (i2b2). C3-PRO leverages the emerging health data standard Fast Healthcare Interoperability Resources (FHIR).Entities:
Mesh:
Year: 2016 PMID: 27031856 PMCID: PMC4816293 DOI: 10.1371/journal.pone.0152722
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Screenshots of the C Tracker app making use of C3-PRO.
A) App dashboard for participation overview. B) Viewing the generated consent PDF file, including signature and date, on device. C) Filling out a short survey, showing one of the questions rendered by ResearchKit.
Fig 2OAuth2 dynamic client registration flow, extended to use the app's App Store receipt.
The receipt data is sent alongside the standard OAuth2 registration parameters and verified with Apple's iTunes servers. If the receipt is valid, standard dynamic client registration continues. Subsequently the app can request access tokens with the supplied client key and -secret through an OAuth2 "client credentials” flow.
Fig 3C3-PRO data flow.
Data flow from data capture on the phone through the C3-PRO receiver, consumer and i2b2 cell into the i2b2 database.