| Literature DB >> 32735226 |
Pere Llorens-Vernet1, Jordi Miró1.
Abstract
BACKGROUND: In recent years, there has been an exponential growth of mobile health (mHealth)-related apps. This has occurred in a somewhat unsupervised manner. Therefore, having a set of criteria that could be used by all stakeholders to guide the development process and the assessment of the quality of the apps is of most importance.Entities:
Keywords: Delphi method; MAG; assessment; guide; mobile apps; mobile health; validity
Mesh:
Year: 2020 PMID: 32735226 PMCID: PMC7428935 DOI: 10.2196/17760
Source DB: PubMed Journal: JMIR Mhealth Uhealth ISSN: 2291-5222 Impact factor: 4.773
Figure 1Steps in the Delphi poll.
Sample characteristics in each round.
| Characteristics | Invited participants (N=158) | Participants round 1 (n=42) | Participants round 2 (n=24) | |
|
| ||||
|
| Male | 17 (42.5) | 15 (44.12) | 9 (37.5) |
|
| Female | 23 (57.5) | 19 (55.88) | 15 (62.5) |
|
| ||||
|
| Health care professionals | 45 (28.48) | 16 (38.1) | 9 (37.5) |
|
| Developers | 41 (25.95) | 14 (33.33) | 8 (33.33) |
|
| Final users | 72 (45.57) | 12 (28.57) | 7 (29.17) |
| Age (years), meana | 39.82 | 41.39 | 43.08 | |
|
| ||||
|
| Spain | 78 (49.37) | 28 (82.35) | 20 (83.33) |
|
| United States | 13 (8.23) | 1 (2.94) | 1 (4.17) |
|
| Argentina | 1 (0.63) | 1 (2.94) | 1 (4.17) |
|
| Italy | 1 (0.63) | 1 (2.94) | 1 (4.17) |
|
| Australia | 6 (3.8) | 1 (2.94) | 1 (4.17) |
|
| United Kingdom | 15 (9.49) | 2 (5.88) | 0 (0.00) |
|
| Canada | 8 (5.06) | 0 (0.00) | 0 (0.00) |
|
| Brazil | 3 (1.9) | 0 (0.00) | 0 (0.00) |
|
| India | 6 (3.8) | 0 (0.00) | 0 (0.00) |
|
| Indonesia | 1 (0.63) | 0 (0.00) | 0 (0.00) |
|
| Germany | 5 (3.16) | 0 (0.00) | 0 (0.00) |
|
| Poland | 2 (1.27) | 0 (0.00) | 0 (0.00) |
|
| Ireland | 2 (1.27) | 0 (0.00) | 0 (0.00) |
|
| Turkey | 1 (0.63) | 0 (0.00) | 0 (0.00) |
|
| Kazakhstan | 1 (0.63) | 0 (0.00) | 0 (0.00) |
|
| Switzerland | 3 (1.9) | 0 (0.00) | 0 (0.00) |
|
| Colombia | 1 (0.63) | 0 (0.00) | 0 (0.00) |
|
| Romania | 1 (0.63) | 0 (0.00) | 0 (0.00) |
|
| Hungary | 1 (0.63) | 0 (0.00) | 0 (0.00) |
|
| Lithuania | 1 (0.63) | 0 (0.00) | 0 (0.00) |
|
| Bulgaria | 2 (1.27) | 0 (0.00) | 0 (0.00) |
|
| Greece | 1 (0.63) | 0 (0.00) | 0 (0.00) |
|
| Sweden | 2 (1.27) | 0 (0.00) | 0 (0.00) |
|
| Israel | 1 (0.63) | 0 (0.00) | 0 (0.00) |
|
| Belgium | 2 (1.27) | 0 (0.00) | 0 (0.00) |
aInformation was not available for all participants.
Items that reached consensus about their importance.
| Category and item | Round 1 (n=42) | Round 2 (n=24) | |||||
|
| Consensus, n (%) | Mean (SD) | 95% CI | Consensus, n (%) | Mean (SD) | 95% CI | |
|
| |||||||
|
| 1. The app has been tested by potential users before being made available to the public. | 33 (78.57) | 9.14 (1.92) | 8.56-9.72 | 20 (83.33) | 9.21 (1.61) | 8.56-9.85 |
|
| 2. It is easy to use (ie, navigation is intuitive). | 39 (92.86) | 9.67 (0.61) | 9.48-9.85 | 21 (87.50) | 9.50 (0.72) | 9.21-9.79 |
|
| 3. Functionality is adapted to the purpose of the app. | 40 (95.24) | 9.74 (0.63) | 9.55-9.93 | 21 (87.50) | 9.42 (0.93) | 9.05-9.79 |
|
| 4. Functionality is adjusted according to the profile and needs of the targeted user. | —a | — | — | 19 (79.17) | 9.08 (0.93) | 8.71-9.45 |
|
| 5. Access is adapted for people with disabilities. | — | — | — | 19 (79.17) | 9.00 (1.41) | 8.43-9.57 |
|
| 6. It complies with regulatory accessibility standards. | — | — | — | 18 (75.00) | 9.17 (1.13) | 8.71-9.62 |
|
| 7. The language used makes it accessible to any user. | — | — | — | 19 (79.17) | 9.04 (1.55) | 8.42-9.66 |
|
| 8. All users have access to all resources regardless of their capabilities. | 28 (66.67) | 8.60 (1.67) | 8.09-9.10 | 18 (75.00) | 9.08 (1.06) | 8.66-9.51 |
|
| |||||||
|
| 9. The app gives information about the terms and conditions of purchases in the app. | 35 (83.33) | 9.29 (1.90) | 8.71-9.86 | 21 (87.50) | 9.50 (1.18) | 9.03-9.97 |
|
| 10. It must only ask for user data that is essential for the app to operate. | 34 (80.95) | 9.26 (1.53) | 8.80-9.72 | 18 (75.00) | 8.92 (2.04) | 8.10-9.73 |
|
| 11. It gives information about access policies and data processing, and ensures the right of access to recorded information. | 34 (80.95) | 9.02 (2.25) | 8.34-9.70 | 18 (75.00) | 9.38 (0.97) | 8.99-9.76 |
|
| 12. It gives information about possible commercial agreements with third parties. | 32 (76.19) | 8.79 (2.54) | 8.02-9.55 | 20 (83.33) | 9.17 (2.12) | 8.32-10.01 |
|
| 13. It clearly allows the user the option of nontransfer of data to third parties or for commercial purposes. | — | — | — | 23 (95.83) | 9.71 (0.55) | 9.49-9.93 |
|
| 14. It guarantees the privacy of the information recorded. | 39 (92.86) | 9.71 (0.77) | 9.48-9.95 | 20 (83.33) | 9.46 (1.10) | 9.02-9.90 |
|
| 15. It requires users to give their express consent. | 36 (85.71) | 9.12 (2.19) | 8.46-9.78 | 19 (79.17) | 9.38 (1.01) | 8.97-9.78 |
|
| 16. It warns of the risks of using the app. | 36 (85.71) | 9.33 (1.86) | 8.77-9.89 | 19 (79.17) | 9.25 (1.19) | 8.77-9.73 |
|
| 17. It tells users when it accesses other resources on the mobile device such as their accounts or their social network profiles. | 36 (85.71) | 9.33 (1.76) | 8.80-9.87 | 22 (91.67) | 9.71 (0.75) | 9.41-10.01 |
|
| 18. It takes measures to protect minors in accordance with current legislation. | 38 (90.48) | 9.43 (1.74) | 8.90-9.96 | 23 (95.83) | 9.79 (0.51) | 9.59-10.00 |
|
| 19. Confidential user data is protected and anonymized, and there is a privacy mechanism so that users can control their data. | 38 (90.48) | 9.60 (1.06) | 9.27-9.92 | 21 (87.50) | 9.46 (1.18) | 8.99-9.93 |
|
| 20. It offers to erase the data when the service is finished. | — | — | — | 19 (79.17) | 9.04 (1.68) | 8.37-9.71 |
|
| 21. It gives information about privacy policies in a simple and understandable way. | — | — | — | 20 (83.33) | 9.33 (1.09) | 8.90-9.77 |
|
| 22. It complies with all current privacy laws. | — | — | — | 22 (91.67) | 9.54 (1.28) | 9.03-10.06 |
|
| |||||||
|
| 23. The app has encryption mechanisms for storing, collecting, and exchanging information. | 35 (83.33) | 9.40 (1.33) | 9.00-9.81 | 19 (79.17) | 9.13 (1.57) | 8.50-9.75 |
|
| 24. It has password management mechanisms. | 33 (78.57) | 9.05 (1.71) | 8.53-9.56 | 19 (79.17) | 9.04 (1.90) | 8.28-9.80 |
|
| 25. It states the terms and conditions of cloud services. | 32 (76.19) | 8.93 (2.23) | 8.25-9.60 | 19 (79.17) | 9.29 (1.08) | 8.86-9.72 |
|
| 26. The cloud services used have the relevant security measures. | 36 (85.71) | 9.40 (1.47) | 8.96-9.85 | 21 (87.50) | 9.29 (1.60) | 8.65-9.93 |
|
| 27. The authorization and authentication mechanisms protect users’ credentials and allow access to their data. | 37 (88.10) | 9.57 (1.02) | 9.26-9.88 | 21 (87.50) | 9.42 (1.21) | 8.93-9.90 |
|
| 28. It limits access to data that is only necessary for the user. | 33 (78.57) | 8.98 (2.25) | 8.30-9.66 | 19 (79.17) | 8.96 (2.10) | 8.12-9.80 |
|
| 29. It detects and identifies cybersecurity vulnerabilities, possible threats, and the risk of being exploited. | 36 (85.71) | 9.33 (1.76) | 8.80-9.87 | 18 (75.00) | 8.96 (2.16) | 8.10-9.82 |
|
| 30. It applies the appropriate security measures to cybersecurity vulnerabilities in the face of possible threats to reduce the risk of being exploited. | 35 (83.33) | 9.62 (0.82) | 9.37-9.87 | 19 (79.17) | 9.38 (0.92) | 9.01-9.74 |
|
| 31. It informs users of the possible risks associated with the app’s use of personal data. | — | — | — | 20 (83.33) | 9.25 (1.11) | 8.80-9.70 |
|
| |||||||
|
| 32. The benefits and advantages of using the app are explained. | 31 (73.81) | 8.95 (1.58) | 8.48-9.43 | 18 (75.00) | 9.08 (1.53) | 8.47-9.70 |
|
| 33. Experts have participated in the development of the app (for example, specialized professionals, health organizations, scientific societies, or specialized external organizations). | 35 (83.33) | 9.52 (1.02) | 9.22-9.83 | 21 (87.50) | 9.58 (0.72) | 9.30-9.87 |
|
| |||||||
|
| 34. It uses scientific evidence to guarantee the quality of the content. | 36 (85.71) | 9.60 (0.86) | 9.34-9.85 | 20 (83.33) | 9.46 (0.78) | 9.15-9.77 |
|
| 35. It is based on ethical principles and values. | 39 (92.86) | 9.71 (0.77) | 9.48-9.95 | 22 (91.67) | 9.75 (0.61) | 9.51-9.99 |
|
| |||||||
|
| 36. The possible risks to users are identified. | 36 (85.71) | 9.45 (1.15) | 9.10-9.80 | 20 (83.33) | 9.46 (0.88) | 9.10-9.81 |
|
| 37. It ensures that there are no adverse effects. | — | — | — | 18 (75.00) | 8.92 (2.12) | 8.07-9.77 |
|
| 38. It complies with regulatory standards as a medical device. | — | — | — | 22 (91.67) | 9.46 (1.67) | 8.79-10.13 |
|
| 39. Users are warned when adverse events are identified so they can delete the app and avoid potential risks. | — | — | — | 18 (75.00) | 8.83 (1.93) | 8.06-9.60 |
|
| 40. Users are warned that the app is not meant to replace the services provided by a professional. | 40 (95.24) | 9.74 (0.63) | 9.55-9.93 | 22 (91.67) | 9.67 (0.64) | 9.41-9.92 |
|
| 41. It recommends always consulting a specialist in case of doubt. | — | — | — | 22 (91.67) | 9.33 (1.66) | 8.67-10.00 |
|
| 42. Potential risks for users caused by incorrect use and possible adverse effects are explained. | 34 (80.95) | 9.48 (0.92) | 9.20-9.75 | 20 (83.33) | 9.38 (1.17) | 8.91-9.84 |
|
| |||||||
|
| 43. It gives a warning if updates can influence insensitive data (changes the use of the data or different data is collected). | 32 (76.19) | 8.90 (2.07) | 8.28-9.53 | 19 (79.17) | 9.17 (1.40) | 8.60-9.73 |
|
| 44. Every time an update of a third-party component is published, the change is inspected and the risk evaluated. | 33 (78.57) | 8.98 (1.81) | 8.43-9.52 | 20 (83.33) | 8.96 (1.97) | 8.17-9.75 |
|
| |||||||
|
| 45. It works correctly. It does not fail during use (blocks, etc). | 36 (85.71) | 9.36 (1.23) | 8.99-9.73 | 23 (95.83) | 9.75 (0.53) | 9.54-9.96 |
|
| 46. Functions are correctly retrieved after context changes (switch to another app and return, etc), external interruptions (incoming calls or messages, etc), and switching off the terminal. | 30 (71.43) | 8.93 (1.50) | 8.47-9.38 | 21 (87.50) | 9.46 (0.83) | 9.13-9.79 |
|
| 47. It does not waste resources excessively: battery, central processing unit, memory, data, network, etc. | 29 (69.05) | 8.88 (1.48) | 8.43-9.33 | 19 (79.17) | 9.25 (1.11) | 8.80-9.70 |
|
| 48. It has a data recovery system in case of loss. | — | — | — | 19 (79.17) | 8.67 (2.28) | 7.76-9.58 |
aThese items were not available in round 1.