| Literature DB >> 32706733 |
Afua van Haasteren1, Effy Vayena1, John Powell2.
Abstract
BACKGROUND: The mobile health (mHealth) app trustworthiness (mHAT) checklist was created to identify end users' opinions on the characteristics of trustworthy mHealth apps and to communicate this information to app developers. To ensure that the checklist is suited for all relevant stakeholders, it is necessary to validate its contents.Entities:
Keywords: checklist; mobile health apps; survey; trust; trustworthiness; validation
Mesh:
Year: 2020 PMID: 32706733 PMCID: PMC7404005 DOI: 10.2196/16844
Source DB: PubMed Journal: JMIR Mhealth Uhealth ISSN: 2291-5222 Impact factor: 4.773
Figure 1Professional expertise of respondents (n=37). IT: information technology; UX: user experience.
Rankings of respondent ratings of checklist items.
| Item | Negative, n (%) | Neutral, n (%) | Positive, n (%) | ||
|
|
|
|
| ||
|
| The privacy policies accompanying the app can be concise, clear, and easy to understand | 1 (3) | 6 (21) | 22 (76) | |
|
| The terms of service accompanying the app can be concise and easy to read | 1 (3) | 7 (24) | 21 (72) | |
|
| The app can be programmed such that it does not require too many end-user personal data | 2 (7) | 6 (21) | 21 (72) | |
|
| The app can provide accurate measurements | 3 (10) | 5 (17) | 21 (72) | |
|
| The app can be accompanied by clear end-user safety guidelines | 3 (10) | 6 (21) | 20 (69) | |
|
| The app can be created with evidence from robust research | 4 (14) | 5 (17) | 20 (69) | |
|
| The app can inform end users about errors in measurements | 11 (38) | 8 (28) | 10 (34) | |
|
|
|
|
|
| |
|
|
| Fix bugs inherent within the app | 5 (17) | 4 (14) | 20 (69) |
|
|
| Amend app contents based on improved research | 4 (14) | 7 (24) | 18 (62) |
|
|
|
|
|
| |
|
|
| In-house team | 4 (14) | 6 (21) | 19 (66) |
|
|
| External third-party team | 5 (17) | 6 (21) | 18 (62) |
|
| The app can ensure that personalized data for end users is precise | 1 (3) | 12 (41) | 16 (55) | |
|
| The research-backed evidence used to create the app can be easy to locate and understand | 6 (21) | 8 (28) | 15 (52) | |
|
| The app can highlight potential risks or side effects resulting from its use | 9 (31) | 8 (28) | 12 (41) | |
|
|
|
|
| ||
|
| My company can be transparent about our data-handling history and data breaches | 2 (7) | 4 (14) | 22 (79) | |
|
| My company can demonstrate that it values data-protection regulations | 2 (7) | 4 (14) | 22 (78) | |
|
| My company can employ skilled personnel within the app development domain to perform all tasks relating to the app | 4 (14) | 4 (14) | 20 (71) | |
|
| My company can adopt clear policies on how to handle end-user data | 3 (11) | 6 (21) | 19 (68) | |
|
| Our app can be affiliated with a nongovernmental organization or a reputable government agency | 5 (18) | 8 (29) | 15 (54) | |
|
| My company has developed similar apps in the past | 8 (29) | 5 (18) | 15 (54) | |
|
| My company has other reputable products or services to associate the app with | 7 (25) | 7 (25) | 14 (50) | |
|
|
|
|
| ||
|
| End users can readily suggest the app to others | 2 (8) | 4 (16) | 19 (76) | |
|
| The app store can display how often the app has been downloaded | 3 (12) | 5 (20) | 17 (68) | |
|
| The app can display the positive reviews that it receives | 5 (20) | 6 (24) | 14 (56) | |
|
|
|
|
|
| |
|
|
| In the top results of search engines | 6 (24) | 10 (40) | 9 (36) |
|
|
| As a featured app in the app store | 4 (16) | 10 (40) | 11 (44) |
|
| The app can accompany a wearable device | 5 (20) | 10 (40) | 10 (40) | |
|
|
|
|
| ||
|
| The app can be easy to use and have a friendly end-user interface | 1 (4) | 4 (17) | 19 (79) | |
|
| The app can be made aesthetically appealing | 1 (4) | 5 (21) | 18 (75) | |
|
| The app can be programmed to send out a reasonable number of notifications | 1 (4) | 5 (21) | 18 (75) | |
|
| The data generated from the app can be anonymized to make individuals unidentifiable | 3 (13) | 3 (13) | 18 (75) | |
|
| The app can be easily accessed by the end users it aims to target | 1 (4) | 5 (21) | 18 (75) | |
|
| The data generated from the app can be secured by end-to-end encryption | 0 (0) | 7 (29) | 17 (71) | |
|
|
|
|
|
| |
|
|
| Stored locally on the device | 3 (13) | 5 (21) | 16 (67) |
|
|
| Encrypted | 1 (4) | 7 (29) | 16 (67) |
|
| The app features can be customized by end users | 4 (16) | 5 (20) | 15 (62) | |
|
| Privacy can be a core consideration throughout the life cycle of the app | 4 (17) | 7 (29) | 13 (54) | |
|
| End users can easily access all of their data (eg, address and billing information) | 4 (17) | 7 (29) | 13 (54) | |
|
|
|
|
| ||
|
| The app can allow end users to easily delete their data | 1 (4) | 6 (26) | 16 (70) | |
|
| The app can seek explicit end-user permission before sharing data with third parties | 3 (13) | 6 (26) | 14 (61) | |
|
| The app can allow end users to opt in or decide which data can be stored or processed | 2 (9) | 7 (30) | 14 (61) | |
|
| The app can give end users the freedom to control how their data are used | 2 (9) | 8 (35) | 13 (57) | |
|
| The app can allow end users to restrict data sharing to third parties such as social networking sites | 1 (4) | 9 (39) | 13 (57) | |
|
| The app can designate end users as proprietors (ie, owners) of their data | 7 (30) | 7 (30) | 9 (39) | |