<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article article-type="review-article" dtd-version="2.0" xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JN</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Nursing</journal-id>
      <journal-title>JMIR Nursing</journal-title>
      <issn pub-type="epub">2562-7600</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v7i1e53592</article-id>
      <article-id pub-id-type="pmid">38723253</article-id>
      <article-id pub-id-type="doi">10.2196/53592</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Privacy Barriers in Health Monitoring: Scoping Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Borycki</surname>
            <given-names>Elizabeth</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Zhuang</surname>
            <given-names>Yan</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Mircheva</surname>
            <given-names>Iskra</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Sun</surname>
            <given-names>Luyi</given-names>
          </name>
          <degrees>MS</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Information Security and Communication Technology</institution>
            <institution>Faculty of Information Technology and Electrical Engineering</institution>
            <institution>Norwegian University of Science and Technology</institution>
            <addr-line>Teknologivegen 22</addr-line>
            <addr-line>Gjøvik, 2815</addr-line>
            <country>Norway</country>
            <phone>47 96864781</phone>
            <email>luyi.sun@ntnu.no</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8997-9152</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Yang</surname>
            <given-names>Bian</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6189-1976</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Kindt</surname>
            <given-names>Els</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-6951-7871</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Chu</surname>
            <given-names>Jingyi</given-names>
          </name>
          <degrees>MS</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-2393-4485</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Information Security and Communication Technology</institution>
        <institution>Faculty of Information Technology and Electrical Engineering</institution>
        <institution>Norwegian University of Science and Technology</institution>
        <addr-line>Gjøvik</addr-line>
        <country>Norway</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Centre for IT &amp; IP Law</institution>
        <institution>Faculty of Law and Criminology</institution>
        <institution>KU Leuven</institution>
        <addr-line>Leuven</addr-line>
        <country>Belgium</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Administrative Law</institution>
        <institution>Faculty of Law</institution>
        <institution>China University of Political Science and Law</institution>
        <addr-line>Beijing</addr-line>
        <country>China</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Luyi Sun <email>luyi.sun@ntnu.no</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2024</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>9</day>
        <month>5</month>
        <year>2024</year>
      </pub-date>
      <volume>7</volume>
      <elocation-id>e53592</elocation-id>
      <history>
        <date date-type="received">
          <day>11</day>
          <month>10</month>
          <year>2023</year>
        </date>
        <date date-type="rev-request">
          <day>3</day>
          <month>11</month>
          <year>2023</year>
        </date>
        <date date-type="rev-recd">
          <day>20</day>
          <month>12</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>13</day>
          <month>3</month>
          <year>2024</year>
        </date>
      </history>
      <copyright-statement>©Luyi Sun, Bian Yang, Els Kindt, Jingyi Chu. Originally published in JMIR Nursing (https://nursing.jmir.org), 09.05.2024.</copyright-statement>
      <copyright-year>2024</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Nursing, is properly cited. The complete bibliographic information, a link to the original publication on https://nursing.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://nursing.jmir.org/2024/1/e53592" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Health monitoring technologies help patients and older adults live better and stay longer in their own homes. However, there are many factors influencing their adoption of these technologies. Privacy is one of them.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The aim of this study was to provide an overview of the privacy barriers in health monitoring from current research, analyze the factors that influence patients to adopt assisted living technologies, provide a social psychological explanation, and propose suggestions for mitigating these barriers in future research.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>A scoping review was conducted, and web-based literature databases were searched for published studies to explore the available research on privacy barriers in a health monitoring environment.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>In total, 65 articles met the inclusion criteria and were selected and analyzed. Contradictory findings and results were found in some of the included articles. We analyzed the contradictory findings and provided possible explanations for current barriers, such as demographic differences, information asymmetry, researchers’ conceptual confusion, inducible experiment design and its psychological impacts on participants, researchers’ confirmation bias, and a lack of distinction among different user roles. We found that few exploratory studies have been conducted so far to collect privacy-related legal norms in a health monitoring environment. Four research questions related to privacy barriers were raised, and an attempt was made to provide answers.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>This review highlights the problems of some research, summarizes patients’ privacy concerns and legal concerns from the studies conducted, and lists the factors that should be considered when gathering and analyzing people’s privacy attitudes.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>privacy attitudes</kwd>
        <kwd>health monitoring technologies</kwd>
        <kwd>privacy concerns</kwd>
        <kwd>privacy barriers</kwd>
        <kwd>legal concerns</kwd>
        <kwd>social psychology</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>The proportion of older adults around the world is growing sharply. According to the 2021 aging report published by the European Commission [<xref ref-type="bibr" rid="ref1">1</xref>], the ratio in the European Union (EU) between people aged ≥65 years and those aged 20 to 64 years (also known as the demographic old-age dependency ratio) will increase greatly in the coming decades, from approximately 34% in 2019 to 59% in 2070. In Norway, the population of older adults (aged ≥65 years) will increase from 17.4% in 2019 to 27.8% in 2070 [<xref ref-type="bibr" rid="ref1">1</xref>]. Because of this, the term “aging in place” was put forward in social policy, which refers to providing assisted living facilities to enable older adults to remain in their own homes for as long as possible [<xref ref-type="bibr" rid="ref2">2</xref>]. Various ongoing research projects in ambient assisted living technologies are being, or have been, conducted to help older adults, such as the European AALIANCE2 project; the Ambient Assisted Living Joint Programme, financed by the European Commission [<xref ref-type="bibr" rid="ref3">3</xref>]; and the Active and Assisted Living Programme, also financed by the European Commission [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
        <p>In the meantime, patients are also in need of health monitoring systems. The aging population and patients’ growing needs for health care support have facilitated the development of different types of health monitoring and assisted living technologies, such as socially assistive robots, wearable trackers, telemedicine, image sensors, and so on. According to the study by Rostad and Stokke [<xref ref-type="bibr" rid="ref5">5</xref>], these technologies can be categorized into localization technologies (eg, GPS), compensation technologies (eg, remote control of light and heating, robot vacuums, and cognitive or physical aids), safety technologies (eg, social alarm systems and fall detection sensors), technologies for social contact (eg, tablet computers, smartphones, and gaming devices), therapeutic robots, and treatment technologies (eg, medical remote monitoring and automated pill dispensers), all used for different purposes in health monitoring.</p>
        <p>The application of the aforementioned intelligent devices is supposed to enhance the quality of patients’ lives. Nevertheless, various factors impact patients’ acceptance of health monitoring devices [<xref ref-type="bibr" rid="ref6">6</xref>], including intervention factors (eg, privacy concerns, security concerns, frequency, a lack of awareness, and the observability of outcomes), environmental factors (eg, social influence, social implication, change in technology use by society over time, and group participation), technology factors (eg, complexity, reliability, interface design, compatibility, functionalities, features, aesthetics, and cost), individual factors (eg, level of innovativeness, level of technology learnability, and living alone), psychological factors (eg, attitudinal factors and perception factors), support and training factors (eg, training, quality of training, and facilitating support) in general. Among all these factors, our attention was seized by <italic>privacy concerns</italic>.</p>
        <p>There are different types of privacy; therefore, privacy concerns can be analyzed from different perspectives. The way that researchers distinguish privacy has reflected their different concerns arising from their professional backgrounds; for example, Rosenberg [<xref ref-type="bibr" rid="ref7">7</xref>] distinguished 3 kinds of privacy: territorial privacy, individual privacy, and informational privacy. Clarke [<xref ref-type="bibr" rid="ref8">8</xref>] outlined 4 types of privacy: privacy of a person, privacy of personal data, privacy of personal behavior, and privacy of personal communication. However, with the development of emerging technologies, different categories arose. Some researchers extended the categories formulated by Rosenberg [<xref ref-type="bibr" rid="ref7">7</xref>] and added 3 more categories: privacy of thoughts and feelings, privacy of location and space, privacy of association (including group privacy) [<xref ref-type="bibr" rid="ref9">9</xref>]. More specifically, in different scenarios, users have different privacy concerns, and these concerns can be categorized case by case; for instance, web-based social network users can have 4 dimensions of privacy concerns: virtual territorial privacy, factual privacy, interactional privacy, and psychological privacy [<xref ref-type="bibr" rid="ref10">10</xref>]. Furthermore, Serenko [<xref ref-type="bibr" rid="ref11">11</xref>] narrowed the scope in health care and put forward 3 privacy dimensions: informational privacy, physical privacy, and psychological privacy. These 3 privacy dimensions were regarded as determinants of patient behavior in health care.</p>
        <p>Although privacy concerns are known to be barriers for patients with regard to adopting health monitoring technologies according to some studies [<xref ref-type="bibr" rid="ref12">12</xref>], it is not sufficient to analyze factors impacting the adoption of health monitoring technologies individually because these influential factors may impact each other; for example, despite the fact that privacy concerns are included in intervention factors [<xref ref-type="bibr" rid="ref6">6</xref>], psychological factors, as well as support and training factors with regard to privacy awareness, can also impact patients’ privacy concerns. Patients’ awareness of privacy-related laws in the health care environment will also influence their privacy concerns and decision-making out of respect for authority [<xref ref-type="bibr" rid="ref13">13</xref>]. Considering privacy issues in society, privacy attitudes and concerns are always analyzed from the legal perspective. For patients, their privacy attitudes may have a straight impact on the informed consent process, and they are expected to know how to obtain legal aid in case they encounter technology abuse, or their privacy is intruded upon. For technology vendors, industry standards or privacy policies need to be carefully checked and complied with before their product is released. They need to carry out data protection impact assessments to minimize privacy risks [<xref ref-type="bibr" rid="ref14">14</xref>]. Apart from older patients who are most in need of health monitoring and assisted living technologies, members of the general public are also potential users of these technologies as they age or develop health conditions. Furthermore, with regard to members of the general public, their prevalent uncertainty regarding, and trust issues with, technologies may prompt legislators to adopt a more cautious and conservative approach with regard to such technologies. However, <italic>privacy-friendly</italic> approaches can be seen as a way to motivate technology vendors to be more transparent and, on the one hand, foster <italic>privacy by design</italic>, while, on the other hand, promote social awareness and trust by bridging the information gap. In all, various factors and their relationships need to be always taken into consideration at the same time. Meanwhile, the question persists as to whether privacy concerns are truly barriers because of the rapid changes in society, such as the development of privacy-enhancing technologies. Thus, the rationality of privacy concerns should also be discussed.</p>
        <p>In the past few years, researchers have conducted a series of studies to gather different privacy attitudes or privacy concerns regarding health monitoring and assisted living technologies from people with different demographic characteristics. However, the results vary from study to study not only because of the different user groups to which the participants belong (eg, older adults’ attitudes compared to those of younger adults and female participants’ attitudes compared to those of male participants) but also because of the different experimental approaches used and the different scenarios provided in these studies.</p>
      </sec>
      <sec>
        <title>Research Questions</title>
        <p>In summary, the implementation of assisted living technologies in the aging population era faces several challenges. First, multiple factors impede patients’ adoption of these technologies, and the interrelations among these factors have not been thoroughly explored. Second, the extent to which privacy concerns affect technology adoption needs further investigation. Third, the study design and current results require consolidation for researchers to make meaningful improvements. Addressing these challenges, we pose 4 research questions and conduct a scoping review with the aim of providing an overview of the privacy barriers in health monitoring from current research and elucidating answers to these research questions. The four research questions are listed herein, and the answers to these questions are provided in the Results section.</p>
        <list list-type="order">
          <list-item>
            <p>What are the influential factors that lead to different privacy attitudes and concerns?</p>
          </list-item>
          <list-item>
            <p>How will the methodologies used in different studies influence participants’ privacy awareness with regard to health monitoring technologies from the perspective of social psychology?</p>
          </list-item>
          <list-item>
            <p>What are the legal challenges regarding people’s privacy attitudes and concerns today?</p>
          </list-item>
          <list-item>
            <p>What should be taken into consideration in subsequent studies related to privacy attitudes and concerns in the context of social psychology?</p>
          </list-item>
        </list>
        <p>On the basis of the selected articles, we have summarized 5 hypotheses particularly related to the second challenge, which are clarified in the Results section. The contribution of this paper includes observing the inconsistency of these hypotheses, looking into experimental approaches in each article, and seeking answers to the 4 research questions. We have tried to come up with suggestions that should be taken into consideration comprehensively before implementing health monitoring technologies.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Overview</title>
        <p>A scoping review was conducted to explore the privacy attitudes of different groups of participants in the context of legal norms and social psychology in health monitoring technologies by adopting the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) statement (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>) [<xref ref-type="bibr" rid="ref15">15</xref>]. Scoping reviews include all quantitative, qualitative, and mixed methods studies that are identified as literature on a particular topic or research area [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref17">17</xref>]. They differ from systematic reviews but can be used to inform systematic reviews because more specific questions are usually addressed in a more precise systematic review [<xref ref-type="bibr" rid="ref18">18</xref>]. Of note, there are other approaches to evidence synthesis for systematic reviews, such as realist reviews [<xref ref-type="bibr" rid="ref19">19</xref>], mixed methods reviews [<xref ref-type="bibr" rid="ref19">19</xref>], concept analyses [<xref ref-type="bibr" rid="ref20">20</xref>], and so on. In this study, with the aim of identifying and mapping the available studies, examining how research is conducted in a certain field, summarizing findings, and analyzing results, a scoping review is the best choice compared to other approaches.</p>
      </sec>
      <sec>
        <title>Eligibility Criteria</title>
        <p>We conducted a review for articles published between January 1, 2016, and March 31, 2022. Search parameters were established to identify articles published during this period regarding different participants’ privacy attitudes with regard to health monitoring technologies as well as legal norms regarding privacy in health monitoring in Norway, the EU, and the United States. For an in-depth investigation into the research questions, we acknowledge the regional characteristics evident in previous studies, often shaped by factors such as cultural backgrounds and legal norms. To address this, we have selected these regions. Specifically, this decision is motivated by 2 key considerations. First, EU policies extend to Norway, the authors’ country of residence, thereby potentially impacting health service delivery and the deployment of assisted living technologies. Second, certain EU countries share a common cultural background, suggesting that individuals in these regions may harbor more similar privacy perspectives than individuals in other locations. Furthermore, studies published in the United States were included because it is one of the most developed countries owning quantities of health monitoring technologies. It is worth mentioning that for the articles we identified, even if the authors did not specify the review region or if the authors’ countries of residence were outside the region, we still included these articles because they provided comprehensive views. Other than region specification, studies were included if they (1) reflected the privacy attitudes or privacy concerns of any group of people, (2) reflected any legal concerns or legal frameworks that should be taken into account, (3) were peer-reviewed publications, and (4) were written in English. All study methods (quantitative, qualitative, and multimethod) were eligible for the review.</p>
      </sec>
      <sec>
        <title>Search Terms, Strategy, and Sources</title>
        <p>Instead of searching for privacy barriers directly, we sought studies relevant to people’s privacy attitudes or legal norms regarding privacy in the health monitoring environment and tried to summarize the barriers described in these studies. The literature search was conducted by listing the following search terms in the search string: (“privacy attitudes” OR “legal norms”) AND ((“healthcare monitoring” AND “nursing homes”) OR “homecare monitoring”) AND (“Norway” OR “EU” OR “the U.S.”). The sources of the articles on privacy attitudes and legal norms were mainly 5 databases: Semantic Scholar, PubMed, IEEE Xplore, ScienceDirect, and Scopus. As no relevant articles met the eligibility criteria in IEEE Xplore and ScienceDirect, only articles in the rest of the 3 databases were included. Additional works identified in other databases, such as ACM Digital Library, were categorized into <italic>other sources</italic> because we sorted the articles by relevance and scanned the results directly based on the title and abstract provided at the first attempt instead of following the PRISMA steps strictly, which was the approach we followed for the 5 main databases. Therefore, instead of making an exhaustive selection, we merely added the most relevant and important works.</p>
      </sec>
      <sec>
        <title>Study Selection</title>
        <p>The PRISMA flow diagram is presented in <xref rid="figure1" ref-type="fig">Figure 1</xref>. The search process resulted in the identification of 953 studies. Before the screening, 122 (12.9%) duplicate records were removed from these 953 studies. The first screening was performed on the title, abstract, and language, and 341 (41%) of the 830 articles were identified as not meeting the eligibility criteria. Of the remaining 489 articles, 226 (46.3%) could not be retrieved, leaving 263 (53.7%) reports for assessment. After the second screening, of the 263 articles, we excluded 198 (75.2%) because they (1) were not conducted in the regions specified, (2) were not relevant to privacy attitudes or privacy concerns, and (3) were not relevant to health monitoring or assisted living technologies, leaving 66 (24.8%) articles for the final review, from which we extracted and categorized useful information.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>The review steps.</p>
          </caption>
          <graphic xlink:href="nursing_v7i1e53592_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Data Extraction and Categorization</title>
        <p>The methods for data extraction and categorization were established through the literature review process. Useful information was extracted and input into a form, including title; authors; year of publication; region; topic; technology; participant inclusion criteria (if any); study design; location of the study; key findings; and laws, rules, regulations, directives, and policies mentioned.</p>
      </sec>
      <sec>
        <title>Categories</title>
        <p>The categories we formulated are presented in <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>.</p>
        <boxed-text id="box1" position="float">
          <title>Categorization of the articles included for review.</title>
          <p>
            <bold>Categories</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Article information: title, authors, year of publication, and region</p>
            </list-item>
            <list-item>
              <p>Topic: identified and categorized based on the field covered by the articles; instead of setting the topic as “privacy attitudes” or “legal norms” in general, 5 topics were defined (privacy attitudes, privacy concerns, legal concerns, legal frameworks, and privacy barriers); some of the articles have covered several topics at the same time; reasons for classification are clarified in the <italic>Results</italic> section</p>
            </list-item>
            <list-item>
              <p>Technology: includes health monitoring technologies mentioned in the article; some of the articles have covered a specific device (eg, human behavior modeling [<xref ref-type="bibr" rid="ref21">21</xref>]), while some provide privacy attitudes or legal norms of a general designation, such as smart home technology</p>
            </list-item>
            <list-item>
              <p>Participant inclusion criteria: specifically created for studies with participants invited to take part; inclusion criteria include the number of participants, age, nationality, whether they have any diseases, and place of residence</p>
            </list-item>
            <list-item>
              <p>Key findings: any information related to the 5 topics listed in the Topic category</p>
            </list-item>
            <list-item>
              <p>Laws, rules, regulations, directives, and policies mentioned: specifically created for studies covering legal frameworks or legal barriers; all legal documents mentioned in the articles were extracted</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Overview</title>
        <p>In this section, we will provide the results in the form of categories. As mentioned in the Eligibility Criteria subsection, the review was focused on Norway, the EU, and the United States, or reviews worldwide. When it comes to review articles, they are included regardless of region. Among the 65 articles, there were 4 (6%) from France, 2 (3%) from Finland, 1 (2%) from Sweden, 3 (5%) from Germany, 1 (2%) from Ireland, 2 (3%) from Italy, 3 (5%) from the Netherlands, 5 (8%) from Norway, 2 (3%) from Poland, 1 (2%) from Portugal, 1 (2%) from Spain, 1 (2%) conducted jointly in Germany and Denmark, and 30 (46%) from the United States. Of the remaining 9 articles, 1 (11%) discussed telemonitoring at the EU level; 1 (11%) reviewed laws, standards, and recommendations applicable at the EU level; and 7 (78%) were literature reviews whose authors’ countries of residence were not part of the specified regions. As the results of the reviews were general in nature, they were not categorized into specific areas.</p>
      </sec>
      <sec>
        <title>Privacy Attitudes, Privacy Concerns, and Privacy Barriers</title>
        <p>Articles reflecting privacy concerns were classified into 3 subcategories: privacy attitudes, privacy concerns, and privacy barriers. According to Kokolakis [<xref ref-type="bibr" rid="ref22">22</xref>], although privacy attitudes and privacy concerns have a close relationship, they differ from each other because privacy attitudes are bound to specific contexts such as the appraisal of specific privacy behaviors, while privacy concerns are not, and they can be generic. It is worth mentioning that the articles that either gathered participants’ general privacy concerns or participants’ privacy attitudes were included in the review. The key findings extracted from the results should be categorized as privacy concerns according to the definition. However, we set the topic as <italic>privacy attitudes</italic> if any privacy attitudes were gathered in these studies. Thus, articles covering either privacy concerns or privacy attitudes were included when we compared the findings.</p>
        <p>In contrast to the studies that gathered and analyzed participants’ privacy attitudes or concerns, 11 (17%) of the 66 studies [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref33">33</xref>] discussed people’s adoption of health monitoring technologies. Although some of these studies, such as the study by Charness et al [<xref ref-type="bibr" rid="ref26">26</xref>], also recruited participants, gathered their privacy attitudes, and analyzed results from the attitudes (similar to the methods used by Sánchez et al [<xref ref-type="bibr" rid="ref21">21</xref>] and Caldeira et al [<xref ref-type="bibr" rid="ref34">34</xref>]), these studies provide a broad view from the perspective of technology adoption and acceptance; for instance, in the study by Biermann et al [<xref ref-type="bibr" rid="ref25">25</xref>], researchers came up with several barriers to technology adoption, such as financial reasons, restriction of privacy, and a feeling of surveillance. Among all barriers, concern regarding privacy is merely one of the factors that may influence participants’ technology adoption. Therefore, even if the findings reflecting privacy concerns are similar to those reflecting privacy attitudes and privacy barriers, articles stating that concern regarding privacy is one of the barriers to the adoption and acceptance of assisted living technologies were classified into a different category: privacy barriers.</p>
      </sec>
      <sec>
        <title>Contradictions Among Perceptions of Privacy in Key Findings</title>
        <p>All included studies reflect privacy attitudes, privacy concerns, and privacy barriers, which show many contradictions. In general, the results can be classified into five hypotheses according to the extent of participants’ privacy concerns: (1) participants do not have privacy concerns (<xref ref-type="table" rid="table1">Table 1</xref>); (2) participants have privacy concerns, and they are a major barrier (<xref ref-type="table" rid="table2">Table 2</xref>); (3) participants have privacy concerns, but they do not seem to be a significant barrier (<xref ref-type="table" rid="table3">Table 3</xref>); (4) participants’ privacy concerns vary from person to person, and there is insufficient statistical evidence across a large population to validate whether the concerns will have a significant influence (<xref ref-type="boxed-text" rid="box2">Textbox 2</xref>); and (5) participants have privacy concerns, and their perceptions of privacy are influenced by their background (<xref ref-type="table" rid="table4">Table 4</xref>). It is worth mentioning that some of the studies satisfied 2 hypotheses at the same time because the fifth hypothesis does not violate the second, third, or fourth hypothesis.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Studies that provide evidence for the first hypothesis.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="140"/>
            <col width="320"/>
            <col width="540"/>
            <thead>
              <tr valign="top">
                <td>Study</td>
                <td>Methodology</td>
                <td>Evidence</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Sánchez et al [<xref ref-type="bibr" rid="ref21">21</xref>]</td>
                <td>Interview (exploratory qualitative approach)</td>
                <td>“It was noteworthy that the majority of participants had no privacy concerns.”</td>
              </tr>
              <tr valign="top">
                <td>Caldeira et al [<xref ref-type="bibr" rid="ref34">34</xref>]</td>
                <td>Interview (qualitative approach)</td>
                <td>“Privacy did not seem to be a significant issue for our informants.”</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Studies that provide evidence for the second hypothesis.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="200"/>
            <col width="340"/>
            <col width="460"/>
            <thead>
              <tr valign="top">
                <td>Study</td>
                <td>Methodology</td>
                <td>Evidence</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Schomakers et al [<xref ref-type="bibr" rid="ref35">35</xref>]</td>
                <td>Qualitative prestudy+quantitative main study (multimethod approach)</td>
                <td>“As an important barrier, privacy requirements should thus be considered for mHealth [mobile health] apps for aftercare.”</td>
              </tr>
              <tr valign="top">
                <td>Vassli and Farshchian [<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                <td>Systematic review</td>
                <td>“Many studies found that some or all participants have concerns about privacy. Privacy is regarded as a ‘bigger barrier to adoption, more so than usability.’”</td>
              </tr>
              <tr valign="top">
                <td>Harrington et al [<xref ref-type="bibr" rid="ref36">36</xref>]</td>
                <td>Questionnaire (quantitative study)</td>
                <td>“Privacy was among the leading concerns regarding SARs [socially assistive robots] among the current sample of older Americans.”</td>
              </tr>
              <tr valign="top">
                <td>Choi et al [<xref ref-type="bibr" rid="ref37">37</xref>]</td>
                <td>Questionnaire+semistructured interview (multimethod approach)</td>
                <td>“The participant feedback suggests that perceived privacy concerns, perceived usefulness, and curiosity to technology were strong factors when considering which device to have installed in their home.”</td>
              </tr>
              <tr valign="top">
                <td>Tural et al [<xref ref-type="bibr" rid="ref38">38</xref>]</td>
                <td>Web-based and in-person surveys+focus group (multimethod approach)</td>
                <td>“Privacy and security of personal information seem to be a core issue for willingness to use smart home products as also highlighted by others.”</td>
              </tr>
              <tr valign="top">
                <td>Attié et al [<xref ref-type="bibr" rid="ref39">39</xref>]</td>
                <td>Survey</td>
                <td>“Privacy concerns are the main obstacles to the adoption of SCOs [smart connected objects].”</td>
              </tr>
              <tr valign="top">
                <td>Lederman et al [<xref ref-type="bibr" rid="ref31">31</xref>]</td>
                <td>Review</td>
                <td>“Other researchers suggested that risk perception that is influenced by concern over privacy, security and the learning-curve can have a negative impact on the adoption of IoT [Internet of Things] solutions by medical staff...These risks to privacy and security are a major challenge for IoT in healthcare.”</td>
              </tr>
              <tr valign="top">
                <td>Karlsen et al [<xref ref-type="bibr" rid="ref40">40</xref>]</td>
                <td>Review</td>
                <td>“The lack of security and privacy was a prominent concern due to the constant recording of data and location tracking that comes with the use of a smartwatch.”</td>
              </tr>
              <tr valign="top">
                <td>Gimpel et al [<xref ref-type="bibr" rid="ref41">41</xref>]</td>
                <td>Survey</td>
                <td>“In healthcare digitalization, privacy concerns are one of the major barriers for individuals to accept and use healthcare technologies.”</td>
              </tr>
              <tr valign="top">
                <td>Mujirishvili et al [<xref ref-type="bibr" rid="ref42">42</xref>]</td>
                <td>Scoping review</td>
                <td>“With privacy being a major barrier to video-based AAL [active and assisted living] technologies, security and medical safety were identified as the major benefits across the studies.”</td>
              </tr>
              <tr valign="top">
                <td>Wilczewski et al [<xref ref-type="bibr" rid="ref43">43</xref>]</td>
                <td>Questionnaire</td>
                <td>“Participants commented on privacy concerns with providing personal information to the chatbot. This category had the majority of negative comments (n=10/15 codes; 66.7%) with some participants finding the chatbot ‘a bit intrusive.’”</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Studies that provide evidence for the third hypothesis.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="180"/>
            <col width="300"/>
            <col width="520"/>
            <thead>
              <tr valign="top">
                <td>Study</td>
                <td>Methodology</td>
                <td>Evidence</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Jaschinski et al [<xref ref-type="bibr" rid="ref44">44</xref>]</td>
                <td>Web-based survey (qualitative approach)</td>
                <td>“Older adults’ privacy concerns were secondary to the perceived benefits of AAL [Ambient Assisted Living] in terms of health, safety and independence.”</td>
              </tr>
              <tr valign="top">
                <td>Gettel et al [<xref ref-type="bibr" rid="ref28">28</xref>]</td>
                <td>Scoping review</td>
                <td>“One study highlighted that older adults were concerned about privacy, but other studies found that privacy was not a barrier to AAL [Ambient Assisted Living] technology adoption.”</td>
              </tr>
              <tr valign="top">
                <td>Chung et al [<xref ref-type="bibr" rid="ref45">45</xref>]</td>
                <td>Survey (qualitative approach)</td>
                <td>“The proportion for the privacy concern increased slightly, though not statistically significant, indicating that participants were not bothered by the existence of the device at home.”</td>
              </tr>
              <tr valign="top">
                <td>Fruchter and Liccardi [<xref ref-type="bibr" rid="ref46">46</xref>]</td>
                <td>Web-based review</td>
                <td>“While we found that privacy and security related issues are present within our corpus, our results suggest these topics related to home assistants are rarely voiced, or openly reported by consumers in their online reviews. We can conclude that, for the most part, consumers who review home assistants tend to not discuss privacy or security concerns.”</td>
              </tr>
              <tr valign="top">
                <td>Piau et al [<xref ref-type="bibr" rid="ref47">47</xref>]</td>
                <td>Web-based survey (qualitative approach)</td>
                <td>“Less than a third were concerned about privacy breaches when using these technologies.”</td>
              </tr>
              <tr valign="top">
                <td>Tan et al [<xref ref-type="bibr" rid="ref48">48</xref>]</td>
                <td>Semistructured interviews (qualitative approach)</td>
                <td>“When asked about potential privacy or security concerns, our analysis of participant responses surfaced 6 types of reactions that may explain why they expressed little concern with privacy and security.”</td>
              </tr>
              <tr valign="top">
                <td>Schomakers and Ziefle [<xref ref-type="bibr" rid="ref49">49</xref>]</td>
                <td>Questionnaire (quantitative approach)</td>
                <td>“Our data suggests that privacy concerns are outweighed by security-related benefits in the acceptance decisions, as long as certain lines are not crossed—the unacceptable and must-have characteristics.”</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <boxed-text id="box2" position="float">
          <title>Studies that provide evidence for the fourth hypothesis.</title>
          <p>
            <bold>Study and methodology</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Randall et al [<xref ref-type="bibr" rid="ref50">50</xref>]: focus group or qualitative approach</p>
            </list-item>
            <list-item>
              <p>Gerłowska et al [<xref ref-type="bibr" rid="ref51">51</xref>]: literature review</p>
            </list-item>
            <list-item>
              <p>Soro et al [<xref ref-type="bibr" rid="ref52">52</xref>]: review</p>
            </list-item>
            <list-item>
              <p>Wang et al [<xref ref-type="bibr" rid="ref53">53</xref>]: focus group+survey (multimethod approach)</p>
            </list-item>
            <list-item>
              <p>Pilozzi and Huang [<xref ref-type="bibr" rid="ref54">54</xref>]: no methods directly related to the results</p>
            </list-item>
            <list-item>
              <p>Pekmezaris et al [<xref ref-type="bibr" rid="ref55">55</xref>]: focus group+interview (multimethod approach)</p>
            </list-item>
            <list-item>
              <p>Biermann et al [<xref ref-type="bibr" rid="ref25">25</xref>]: web-based questionnaire (empirical quantitative approach)</p>
            </list-item>
            <list-item>
              <p>Kodate et al [<xref ref-type="bibr" rid="ref56">56</xref>]: questionnaire (quantitative approach)</p>
            </list-item>
            <list-item>
              <p>Berridge et al [<xref ref-type="bibr" rid="ref57">57</xref>]: survey (qualitative approach)</p>
            </list-item>
            <list-item>
              <p>Mittelstadt [<xref ref-type="bibr" rid="ref58">58</xref>]: systematic survey</p>
            </list-item>
            <list-item>
              <p>Koo and Fallon [<xref ref-type="bibr" rid="ref59">59</xref>]: interview (qualitative approach)</p>
            </list-item>
            <list-item>
              <p>Joe et al [<xref ref-type="bibr" rid="ref60">60</xref>]: focus group+questionnaire (multimethod approach)</p>
            </list-item>
            <list-item>
              <p>Chan et al [<xref ref-type="bibr" rid="ref27">27</xref>]: literature review</p>
            </list-item>
            <list-item>
              <p>Chan et al [<xref ref-type="bibr" rid="ref29">29</xref>]: literature review</p>
            </list-item>
            <list-item>
              <p>Sánchez et al [<xref ref-type="bibr" rid="ref61">61</xref>]: literature review</p>
            </list-item>
            <list-item>
              <p>Hjelm et al [<xref ref-type="bibr" rid="ref62">62</xref>]: semistructured interview (qualitative approach)</p>
            </list-item>
            <list-item>
              <p>Cristiano et al [<xref ref-type="bibr" rid="ref63">63</xref>]: interview+focus group (qualitative approach)</p>
            </list-item>
            <list-item>
              <p>Zhang et al [<xref ref-type="bibr" rid="ref64">64</xref>]: questionnaire (quantitative approach)</p>
            </list-item>
            <list-item>
              <p>Mallinson and Shafi [<xref ref-type="bibr" rid="ref32">32</xref>]: review</p>
            </list-item>
            <list-item>
              <p>Guazzini et al [<xref ref-type="bibr" rid="ref65">65</xref>]: questionnaire+focus group (multimethod approach)</p>
            </list-item>
            <list-item>
              <p>Wan et al [<xref ref-type="bibr" rid="ref66">66</xref>]: literature review+semistructured interviews (multimethod approach)</p>
            </list-item>
            <list-item>
              <p>Zheng et al [<xref ref-type="bibr" rid="ref67">67</xref>]: semistructured interviews (qualitative approach)</p>
            </list-item>
            <list-item>
              <p>Yao et al [<xref ref-type="bibr" rid="ref68">68</xref>]: focus group+co-design activities (qualitative approach)</p>
            </list-item>
            <list-item>
              <p>Ahmad et al [<xref ref-type="bibr" rid="ref69">69</xref>]: semistructured interviews (qualitative approach)</p>
            </list-item>
            <list-item>
              <p>Kheirinejad et al [<xref ref-type="bibr" rid="ref70">70</xref>]: questionnaire (quantitative approach)</p>
            </list-item>
          </list>
        </boxed-text>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Studies that provide evidence for the fifth hypothesis.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="140"/>
            <col width="260"/>
            <col width="400"/>
            <col width="200"/>
            <thead>
              <tr valign="top">
                <td>Study</td>
                <td>Methodology</td>
                <td>Evidence</td>
                <td>Influential factors</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Schomakers et al [<xref ref-type="bibr" rid="ref35">35</xref>]</td>
                <td>Qualitative prestudy+quantitative main study (multimethod approach)</td>
                <td>“Acceptance and privacy depend on the context and type of the technology.”</td>
                <td>Context and type of technology</td>
              </tr>
              <tr valign="top">
                <td>Vassli and Farshchian [<xref ref-type="bibr" rid="ref23">23</xref>]</td>
                <td>Systematic review</td>
                <td>“Systems that are considered intrusive or causing infringement on privacy might still be accepted by older adults if their health needs are great enough.”</td>
                <td>Age and health needs</td>
              </tr>
              <tr valign="top">
                <td>Shin et al [<xref ref-type="bibr" rid="ref24">24</xref>]</td>
                <td>Systematic review</td>
                <td>“Personal trust and the device’s usability could affect users’ privacy perception of wearable activity trackers.”</td>
                <td>Personal trust and the device’s usability</td>
              </tr>
              <tr valign="top">
                <td>Soro et al [<xref ref-type="bibr" rid="ref52">52</xref>]</td>
                <td>Review</td>
                <td>“When it comes to privacy, older adults are very thoughtful and want to be empowered and to retain the sense of the home as a haven with respect for their autonomy.”</td>
                <td>Age and autonomy</td>
              </tr>
              <tr valign="top">
                <td>Wang et al [<xref ref-type="bibr" rid="ref53">53</xref>]</td>
                <td>Focus group+survey (multimethod approach)</td>
                <td>“Older adults scored lower in the privacy pragmatic and unconcerned categories and much higher in the privacy fundamentalist category.”</td>
                <td>Age</td>
              </tr>
              <tr valign="top">
                <td>Reeder et al [<xref ref-type="bibr" rid="ref71">71</xref>]</td>
                <td>Semistructured interview (qualitative approach)</td>
                <td>“Older women’s privacy concerns related to sensor technology can vary according to their sociocultural context (e.g., Korean American older adults and Korean older adults VS Caucasian older adults).”</td>
                <td>Age, gender, and sociocultural context</td>
              </tr>
              <tr valign="top">
                <td>Pilozzi and Huang [<xref ref-type="bibr" rid="ref54">54</xref>]</td>
                <td>No methods directly related to the results</td>
                <td>“Individuals with Parkinson’s disease were almost three times more likely to have data-privacy related concerns than controls.”</td>
                <td>Disease (Parkinson disease)</td>
              </tr>
              <tr valign="top">
                <td>Halvorsrud et al [<xref ref-type="bibr" rid="ref72">72</xref>]</td>
                <td>Interview (qualitative approach)</td>
                <td>“This study reveals that older adults’ perspectives on assistive technology (AT) are multifaceted and complex, and can partly be explained by the interacting factors in the HAAT [human activity assistive technology] model: person, technology, environment, and context.”</td>
                <td>Person, technology, environment, and context</td>
              </tr>
              <tr valign="top">
                <td>Langer et al [<xref ref-type="bibr" rid="ref73">73</xref>]</td>
                <td>No methods directly related to the results</td>
                <td>“Women tend to be more concerned with privacy and safety than men, often preferring enclosed latrines in or near their homes.”</td>
                <td>Gender</td>
              </tr>
              <tr valign="top">
                <td>Jaschinski and Ben Allouch [<xref ref-type="bibr" rid="ref74">74</xref>]</td>
                <td>Semistructured interview (qualitative approach)</td>
                <td>“Informal caregivers had a more positive attitude than care receivers.”</td>
                <td>User role</td>
              </tr>
              <tr valign="top">
                <td>Charness et al [<xref ref-type="bibr" rid="ref26">26</xref>]</td>
                <td>Questionnaire (quantitative approach)</td>
                <td>“Older adults, particularly males, showed less concern than younger adults about privacy.”</td>
                <td>Age</td>
              </tr>
              <tr valign="top">
                <td>Chan et al [<xref ref-type="bibr" rid="ref27">27</xref>]</td>
                <td>Literature review</td>
                <td>“There is tension between assistance and autonomy, or privacy and independence that characterizes the individual’s judgment in using telehealth technology.”</td>
                <td>Assistance, autonomy, and independence</td>
              </tr>
              <tr valign="top">
                <td>Sánchez et al [<xref ref-type="bibr" rid="ref61">61</xref>]</td>
                <td>Literature review</td>
                <td>“Privacy can be compromised for persons in need of support...People with higher risk of harm often require intense surveillance to avoid unsafe situations.”</td>
                <td>Support and safety</td>
              </tr>
              <tr valign="top">
                <td>Łukasik et al [<xref ref-type="bibr" rid="ref75">75</xref>]</td>
                <td>Questionnaire (quantitative approach)</td>
                <td>“Medical students were more aware of privacy issues in the statement concerning the possibility of switching off the robot in specific situations.”</td>
                <td>User role</td>
              </tr>
              <tr valign="top">
                <td>Lanne and Leikas [<xref ref-type="bibr" rid="ref30">30</xref>]</td>
                <td>Semistructured interview+literature review (multimethod approach)</td>
                <td>“Using AI [artificial intelligence] in social and health care contains many general challenges. Some of the most commonly discussed topics were related to social trust and the experience of autonomy, power structures, privacy concerns, transparency, and biases leading to unfair treatment of individuals and patient groups.”</td>
                <td>Autonomy, trust, and transparency</td>
              </tr>
              <tr valign="top">
                <td>Simpson et al [<xref ref-type="bibr" rid="ref76">76</xref>]</td>
                <td>Review</td>
                <td>“Privacy concerns are reported as being the main reason patients may choose not to share data in a clinical context, though these concerns mostly relate to the potential for future sharing with external third parties.”</td>
                <td>Potential use of the data</td>
              </tr>
              <tr valign="top">
                <td>Zhang et al [<xref ref-type="bibr" rid="ref64">64</xref>]</td>
                <td>Questionnaire (quantitative approach)</td>
                <td>“Privacy awareness (<italic>P</italic>=.08) has positive effects on privacy concerns.”</td>
                <td>Privacy awareness</td>
              </tr>
              <tr valign="top">
                <td>Seberger and Patil [<xref ref-type="bibr" rid="ref77">77</xref>]</td>
                <td>Semistructured interviews (qualitative approach)</td>
                <td>“In the context of pandemic mitigation technology, including app-based tracking, people perceive a core trade-off between public health and personal privacy.”</td>
                <td>Public health</td>
              </tr>
              <tr valign="top">
                <td>Kolakowsk et al [<xref ref-type="bibr" rid="ref33">33</xref>]</td>
                <td>Literature review</td>
                <td>“Cultural barriers will likely result in unequal diffusion of robot use in elderly assistance over time.”</td>
                <td>Social context</td>
              </tr>
              <tr valign="top">
                <td>Chaparro et al [<xref ref-type="bibr" rid="ref78">78</xref>]</td>
                <td>Review</td>
                <td>“There is a list of factors that affect the attitude and intention to use technologies supporting independent living. These personal and device-related factors comprise user expectancy, biophysical ageing restrictions, anxiety, the previous required knowledge, intrinsic motivation, personality and privacy concerns.”</td>
                <td>Emotion, knowledge, and personality</td>
              </tr>
              <tr valign="top">
                <td>Gimpel et al [<xref ref-type="bibr" rid="ref41">41</xref>]</td>
                <td>Survey</td>
                <td>“Several studies have shown that Germans have higher privacy concerns than citizens in most other countries. Most authors attribute this to German’s historical legacy.”</td>
                <td>Region and sociocultural context</td>
              </tr>
              <tr valign="top">
                <td>Zheng et al [<xref ref-type="bibr" rid="ref67">67</xref>]</td>
                <td>Semistructured interviews (qualitative approach)</td>
                <td>“IoT [Internet of Things] device users in different regions may have differing privacy concerns. For example, American users may be generally more accepting of data collection by industry versus the state, in contrast to consumers in Europe...Since interview participants expressed greater privacy concern about devices that record voice and video, we recommend that such visual indicators be used extensively to indicate these activities, especially in devices traditionally without recording capabilities (e.g. doorbells, lightbulbs, etc.).”</td>
                <td>Region and data type collected by devices</td>
              </tr>
              <tr valign="top">
                <td>Yao et al [<xref ref-type="bibr" rid="ref68">68</xref>]</td>
                <td>Focus group+co-design activities or qualitative approach</td>
                <td>“In general, bystanders had more privacy concerns in the temporary residence scenario and the playdate scenario than the cohabitant scenario. Bystanders also expressed more concerns regarding the video and audio data collected by devices with microphones and cameras (e.g., voice assistants, security cameras) but barely any concern with other devices (e.g., smart coffee makers).”</td>
                <td>User role and residence scenario</td>
              </tr>
              <tr valign="top">
                <td>Ahmad et al [<xref ref-type="bibr" rid="ref79">79</xref>]</td>
                <td>Semistructured interviews</td>
                <td>“Older participants may have different privacy concerns as well as different interpretations of IoT [Internet of Things] designs and indicators. Although one worry may be that younger populations are less concerned about their privacy, we note that Singh et al. [reference citation] found that when it comes to sharing information with smart devices, younger adults are more reluctant than older adults.”</td>
                <td>Age</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <p>The aforementioned contradictory hypotheses have led to the formulation of our research questions, which we attempt to answer in this section.</p>
      <sec>
        <title>Research Question 1: What Are the Influential Factors That Lead to Different Hypotheses?</title>
        <p>To identify the influential factors, we looked into the methodologies used in these studies in detail. To sum up, qualitative, quantitative, and multimethod studies as well as reviews were included in these studies. Except for reviews, the other 3 approaches recruited participants during the study. On the basis of the participant inclusion criteria, we found that the number of participants would influence the results. For those studies that concluded that the majority of participants do not have privacy concerns, the number of participants recruited was small [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. Hence, one could argue that there might have been sampling bias in the qualitative approach applied by the studies conducted. As the number of participants increased, the fact that people had privacy concerns seemed to become a common conclusion.</p>
        <p>Nevertheless, it still seemed hard for researchers to come to an agreement on the importance of privacy issues. Some stated that privacy is an important barrier without verification and regarded it as a consensus [<xref ref-type="bibr" rid="ref35">35</xref>]. However, according to a scoping review of ambient assisted living technology adoption, most studies found that privacy was not a barrier [<xref ref-type="bibr" rid="ref28">28</xref>]. Because of the uncertainty mentioned above [<xref ref-type="bibr" rid="ref22">22</xref>], we agree with the fourth and fifth hypotheses. Although some of the studies presented in <xref ref-type="boxed-text" rid="box2">Textbox 2</xref> have not provided sufficient evidence in support of any conclusions, we regard this fact as indirect evidence for the fourth hypothesis as well. Furthermore, people’s privacy concerns, as presented in <xref ref-type="table" rid="table4">Table 4</xref>, may be influenced by the following factors: (1) context and type of technology; (2) age; (3) health needs; (4) personal trust and the device’s usability; (5) trade-off among privacy, autonomy, assistance, safety, or independence; (6) health status; (7) region; (8) gender; (9) user roles; (10) sociocultural context; (11) emotion; (12) previous knowledge; (13) personality; and (14) potential use of personal data.</p>
      </sec>
      <sec>
        <title>Research Question 2: How Will the Methodologies Influence Participants’ Privacy Awareness With Regard to Health Monitoring Technologies From the Perspective of Social Psychology?</title>
        <p>Even if most of the studies satisfied the fourth and fifth hypotheses, the researchers’ confirmation bias could have influenced the results and participants’ answers. More specifically, in reviews, such bias exists when researchers search for evidence that can support their own beliefs [<xref ref-type="bibr" rid="ref80">80</xref>]. For the other 3 approaches (qualitative, quantitative, and multimethod), researchers’ confirmation bias could also impact their interaction with participants, such as raising inducible questions or providing insufficient information [<xref ref-type="bibr" rid="ref81">81</xref>]. It has already been pointed out that most people lack the cognitive ability to calculate privacy risks and to make rational privacy decisions because of incomplete information, bounded rationality, and information asymmetries [<xref ref-type="bibr" rid="ref49">49</xref>]. Therefore, the information provided to the interviewees might compel them to give answers that match researchers’ expectations. For multimethod studies that include several experiments, the design of the experiments will also guide participants to make different privacy decisions; for example, because several studies found that there is a trade-off among privacy, autonomy, assistance, safety, or independence, we believe that a privacy-related question in the first experiment might encourage the participants to be concerned more about privacy rather than autonomy in the experiments that follow.</p>
        <p>Furthermore, social influence in groups should also be emphasized because participants’ privacy awareness might be influenced not only by the sociocultural context but also by the other participants; for example, a herd mentality can lead participants to converge on a consensus answer and make irrational privacy decisions [<xref ref-type="bibr" rid="ref82">82</xref>].</p>
        <p>On the one hand, researchers found that the wisdom of small groups of people tends to outstrip that of both individuals and a large group of people. According to one of the findings, when there are 4 groups, and the number of participants in a focus group is 5, although opinions within a group might converge, there are still diversities among the different groups, and researchers will be able to gather different views from these groups [<xref ref-type="bibr" rid="ref82">82</xref>]. On the basis of these findings, we analyzed the experiment design of focus groups in the selected studies and found that most experiments lacked diversity in terms of participants’ backgrounds [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref50">50</xref>,<xref ref-type="bibr" rid="ref55">55</xref>,<xref ref-type="bibr" rid="ref63">63</xref>].</p>
        <p>On the other hand, even if the diversity in terms of participants’ backgrounds is enhanced, the results of a group cannot always represent personal privacy attitudes because of group polarization [<xref ref-type="bibr" rid="ref83">83</xref>], that is, it remains questionable whether the decisions made by these groups can represent the views of individuals in the group accurately. In all, we cannot ignore the need and significance with regard to clarifying the ultimate goal of gathering and analyzing privacy attitudes.</p>
      </sec>
      <sec>
        <title>Legal Concerns and Legal Frameworks</title>
        <p>Legal norms, overall, refer to social norms that are enforced by a relatively strong degree of coercion [<xref ref-type="bibr" rid="ref84">84</xref>]. However, few of the articles we identified can be categorized into the topic of legal norms straightforwardly. Therefore, instead of categorizing them into legal norms, we classified the articles describing legal issues into 2 subcategories: legal concerns and legal frameworks. More precisely, the articles reflecting legal concerns were not describing participants’ concerns about the existing legal frameworks; rather, they were describing participants’ attitudes toward technology adoption in light of their awareness of legal obligations; for example, Sánchez et al [<xref ref-type="bibr" rid="ref21">21</xref>] presented the fact that even if participants were aware of municipalities’ legal obligations to provide health care services for older people, they preferred to buy anything they could afford or adopt welfare technologies. The study by Sánchez et al [<xref ref-type="bibr" rid="ref61">61</xref>] also did not present any legal concerns directly gathered from participants, but it highlighted the importance of legal liability for different user roles (physicians, nurses, or relatives of the patients) during a visit to patients and regarded it as legal concern. As a matter of fact, among the studies we selected, there were only a few conducted for gathering people’s legal concerns regarding privacy with respect to health monitoring and assisted living technologies. However, people’s legal concerns regarding privacy and the problems in current legal frameworks might be considered one of the influential factors when it comes to adopting health monitoring technologies, which constitute one of the privacy barriers.</p>
        <p>Regarding legal frameworks, we extracted regulations, laws, policies, directives, and rules from the findings (<xref ref-type="boxed-text" rid="box3">Textbox 3</xref>). These documents are not limited to assisted living technologies; rather, they cover legal aspects in health care in general; for instance, the legal challenges in the home care or health care environment include data privacy, data management, stakeholders’ interests, and informed consent [<xref ref-type="bibr" rid="ref85">85</xref>].</p>
        <p>It is worth mentioning that not all legal documents concerning health monitoring or assisted living technologies are exhaustively listed in <xref ref-type="boxed-text" rid="box3">Textbox 3</xref> because different countries have different laws or rules regulating aspects of health care. Some of the articles pointed out the shortcomings in the existing frameworks. Among these articles, Ryu [<xref ref-type="bibr" rid="ref91">91</xref>] revealed the fact of the absence of legal guidelines in the mobile health domain regarding privacy and confidentiality in more than half of the EU countries and the United States and suggested that mobile health should be included within the framework in different countries; Ambrosino et al [<xref ref-type="bibr" rid="ref92">92</xref>] provided the conclusion that a full legal framework for telemedicine was still lacking in European countries; and Sánchez et al [<xref ref-type="bibr" rid="ref61">61</xref>] stated that the standardization, research, and assessment of the legal aspects should be addressed in an international perspective. However, in this paper, we only focus on the impact of legal norms on privacy concerns.</p>
        <boxed-text id="box3" position="float">
          <title>Legal frameworks.</title>
          <p>
            <bold>Study and the laws, rules, regulations, directives, and policies mentioned</bold>
          </p>
          <list list-type="bullet">
            <list-item>
              <p>Sánchez et al [<xref ref-type="bibr" rid="ref21">21</xref>]: Norwegian Municipal Health and Care Services Act of 2011 (ACT 24/06/2011 no. 30; act relating to municipal health and care services, and so on)</p>
            </list-item>
            <list-item>
              <p>Gerłowska et al [<xref ref-type="bibr" rid="ref51">51</xref>]: European Parliament resolution of February 16, 2017, with recommendations to the European Commission on Civil Law Rules on Robotics (European Parliament, 2017)</p>
            </list-item>
            <list-item>
              <p>Garg et al [<xref ref-type="bibr" rid="ref86">86</xref>]: Health Information Technology for Economic and Clinical Health Act, United States (2009); Health Insurance Portability and Accountability Act, United States (1996)</p>
            </list-item>
            <list-item>
              <p>Costa et al [<xref ref-type="bibr" rid="ref87">87</xref>]: Article 8 of the Charter of Fundamental Rights of the European Union (2010); Article 16 of the Treaty on the Functioning of the European Union (consolidated version of the Treaty on the Functioning of the European Union, 2012); Portuguese data protection law; General Data Protection Regulation</p>
            </list-item>
            <list-item>
              <p>Jin et al [<xref ref-type="bibr" rid="ref88">88</xref>]: Health Insurance Portability and Accountability Act, United States (1996)</p>
            </list-item>
            <list-item>
              <p>Garzo and Garay-Vitoria [<xref ref-type="bibr" rid="ref89">89</xref>]: Regulation 2016/679 (also known as General Data Protection Regulation); Regulation 2017/745 on medical devices (2017); Regulation 536/2014 relating to clinical tests with medication for human use (2014); harmonized standard ISO 14155 related to good clinical practice (International Organization for Standardization, 2020)</p>
            </list-item>
            <list-item>
              <p>Ross et al [<xref ref-type="bibr" rid="ref90">90</xref>]: General Data Protection Regulation; Health Insurance Portability and Accountability Act, United States (1996)</p>
            </list-item>
          </list>
        </boxed-text>
      </sec>
      <sec>
        <title>Research Question 3: What Are the Legal Challenges Regarding People’s Privacy Attitudes and Concerns Today?</title>
        <p>The articles included in the review show the absence of research on legal norms regarding privacy or people’s legal concerns with regard to assisted living technologies in the health monitoring environment; for example, informed consent for various scenarios in health care, different user roles (eg, device owners, bystanders [<xref ref-type="bibr" rid="ref68">68</xref>], and technology developers), and different types of health monitoring technologies require researchers to pay more attention to the legal frameworks rather than merely point out that they are inadequate.</p>
        <p>To this end, a few of the included studies have investigated patients’ informed consent requirements in a health monitoring environment. As stated by Demiris and Hensel [<xref ref-type="bibr" rid="ref93">93</xref>], when patients or older adults approach the end of their lives, they have opportunities to become familiar with smart home applications and perhaps change their minds and consent to use them in light of their value. Patients with cognitive impairment [<xref ref-type="bibr" rid="ref68">68</xref>] who are gradually losing their cognitive ability to make decisions might prefer to disclose more information in exchange for better medical help when giving informed consent. Thus, informed consent requirements need to be updated.</p>
        <p>This also applies to privacy decision-making in health care; for instance, informed consent could be obtained through a shared decision-making framework [<xref ref-type="bibr" rid="ref93">93</xref>]. Generally, informed consent includes data processing, such as storage, transmission, collection, erasure, and sharing. However, when it is applied to a specific field, more concrete explanations of the risks and benefits need to be provided. In shared decision-making, which requires the involvement of patients and clinicians, informed consent serves as a legal process used to promote patient autonomy and self-determination as well as legal rights [<xref ref-type="bibr" rid="ref94">94</xref>]. While shared decision-making includes treatment decision-making, it can also include, for example, privacy decision-making because it allows people to discuss how confidential information can be used and shared [<xref ref-type="bibr" rid="ref95">95</xref>,<xref ref-type="bibr" rid="ref96">96</xref>].</p>
        <p>As shared decision-making is a collaborative process and aims to help patients better understand problems and make rational decisions with support from clinicians, both patients’ and clinicians’ opinions need to be taken into consideration. To be compliant with patients’ privacy needs and the cognitive changes they may be experiencing, we believe that informed consent requirements need to be updated continually as well [<xref ref-type="bibr" rid="ref97">97</xref>].</p>
        <p>The aforementioned cases only serve as examples of applications of legal concerns. More scenarios and elements remain to be clarified, such as identifying direct and indirect stakeholders and their responsibilities and distinguishing the need for informed consent when there are more user roles to be considered (formal caregivers as well as informal caregivers such as friends or relatives) in the health monitoring environment. Some scholars have pointed out that informed consent is not always necessary if the disclosure of information is consistent with respect for underlying human dignity or individual autonomy, which is referred to as “reasonable expectations of privacy” [<xref ref-type="bibr" rid="ref98">98</xref>,<xref ref-type="bibr" rid="ref99">99</xref>]. They argue there are circumstances in which confidential information can be better protected, precluding the need to rely on implied consent. By shifting from implied consent to “reasonable expectations of privacy,” the pressure to classify cases as <italic>implied consent</italic> could be eased [<xref ref-type="bibr" rid="ref100">100</xref>].</p>
        <p>As researchers are currently focusing more on reasonable expectations of privacy with regard to the sharing of confidential health information, reasonable expectations of privacy for adopting health monitoring and assisted living technologies or privacy decision-making concerning these technologies can possibly be taken into account in data protection legislation as well. Although we agree that reasonable expectations of privacy can help reduce participants’ burden when giving consent, the scope of reasonable expectations of privacy still relies on social psychological factors, such as the quality of the physician-patient relationship [<xref ref-type="bibr" rid="ref99">99</xref>]; for example, trust between physicians and patients will increase the level of reasonable expectations of privacy when patients are making decisions, such as whether to allow the health monitoring system to send alerts to the clinician staff under some circumstances.</p>
      </sec>
      <sec>
        <title>Research Question 4: What Should Be Taken Into Consideration in Subsequent Studies Related to Privacy Attitudes and Concerns in the Context of Social Psychology?</title>
        <p>Vassli and Farshchian [<xref ref-type="bibr" rid="ref23">23</xref>] state that one of the most cited reasons that the authors found that might influence participants’ adoption of assisted living technologies was that monitoring devices made them feel observed. This has inspired us to suggest experiments (refer to the following paragraphs) that should be conducted in future studies.</p>
        <p>First, as far as we could find, the selected studies had not looked into the problem of the Hawthorne effect [<xref ref-type="bibr" rid="ref101">101</xref>], which refers to a phenomenon in which people alter their behavior in response to being watched or monitored, that is, they might make an instantaneous modification in their behavior once they become aware that they are being observed. People behave differently even when looking into a mirror (rather than being watched by someone else) [<xref ref-type="bibr" rid="ref102">102</xref>]. In this sense, installing monitoring devices might affect people’s behavior even if they have consented to the use of these technologies.</p>
        <p>Holden [<xref ref-type="bibr" rid="ref103">103</xref>] suggested in 2001 that the possible presence of a Hawthorne effect could lead to participants drawing conclusions subconsciously. Therefore, we cannot predict the influences wrought by the Hawthorne effect, while this remains of key importance because it will consequently impact user experience and influence their decision-making in real life. Although some participants in the studies by Vassli and Farshchian [<xref ref-type="bibr" rid="ref23">23</xref>] and Biermann et al [<xref ref-type="bibr" rid="ref25">25</xref>] tended to ignore the feeling of being observed, the Hawthorne effect can cause positive impacts as well; for example, in the study by Cristiano et al [<xref ref-type="bibr" rid="ref63">63</xref>], even if participants had negative feelings of privacy intrusion when being monitored, this was not always the case because older adults stated that they felt secure when being monitored. This also reflected the trade-off between privacy concerns and security concerns. The researchers claimed in their paper that negative feelings of privacy intrusion could be overcome by providing older adults with appropriate information. In another study of clinical trials in dementia, researchers who were aware of the Hawthorne effect found that more intensive follow-ups would cause better cognitive functioning outcomes [<xref ref-type="bibr" rid="ref104">104</xref>]. Another observation from the Norwegian University of Science and Technology Nord-Trøndelag Health Study [<xref ref-type="bibr" rid="ref103">103</xref>] showed that participants surveyed by the project regularly over many years exhibited statistically better health states than those not surveyed, which might be attributed to the Hawthorne effect as well. In this way, the feeling of being observed can turn out to be a good thing, although some technology researchers try to hide the monitoring devices to reduce patients’ feeling of being observed.</p>
        <p>In all, the Hawthorne effect is a complex phenomenon that can lead to unknown bias. There should be more experiments to compare patients’ or older adults’ behaviors when they are aware of being observed and their behaviors with hidden observation during such research.</p>
        <p>Second, in the follow-up experiment design of observing participants’ privacy behaviors, researchers should keep an eye not only on the privacy paradox phenomenon but also on the stress of cognitive dissonance caused by the phenomenon. The privacy paradox reveals the fact that there are discrepancies between users’ self-declared privacy attitudes and their privacy behavior [<xref ref-type="bibr" rid="ref105">105</xref>,<xref ref-type="bibr" rid="ref106">106</xref>]. These discrepancies will cause cognitive dissonance, which appears when people hold conflicting beliefs, or their behaviors contradict their beliefs [<xref ref-type="bibr" rid="ref107">107</xref>,<xref ref-type="bibr" rid="ref108">108</xref>].</p>
        <p>It is mentally stressful to cope with contradictory experiences or beliefs, and cognitive dissonance will make conditions for patients or older adults in health care settings even more stressful [<xref ref-type="bibr" rid="ref109">109</xref>]. But there can also be positive effects if researchers use a patient’s or an older adult’s motivation to mitigate the dissonance to change their behaviors [<xref ref-type="bibr" rid="ref105">105</xref>]. A few researchers also found that the contrast between privacy concerns and privacy-protecting behaviors is caused by privacy fatigue [<xref ref-type="bibr" rid="ref106">106</xref>], referring to the reduced intention of privacy protection when faced with the increasing complexity of privacy settings or regulations. Because of this, some participants even became confused about the laws or regulations and lacked the ability to make appropriate decisions or give consent [<xref ref-type="bibr" rid="ref107">107</xref>].</p>
        <p>Third, there is a lack of longitudinal studies on privacy attitudes with regard to assisted living technologies. Even if some studies had adopted multimethod approaches, and participants had been invited to take part in several experiments, it is hard for us to identify their cognitive changes over time. Because of the problem we have outlined in research question 1, current experiments might even induce participants to give the answers we want. Thus, we need long-term studies to test patients’ cognitive changes over the technologies.</p>
      </sec>
      <sec>
        <title>Overview</title>
        <p>From the findings we extracted, we aimed to provide a comprehensive understanding of privacy barriers in health monitoring. We have explained the interaction of different factors, especially people’s privacy concerns and legal concerns, and pointed out the impact of social psychological factors on these factors. We suggest that to ensure people’s autonomy while protecting their privacy, the rules applied to them need to meet their demographic characteristics, health conditions, and health needs. Among the listed hypotheses and research questions, we tend to support the fourth hypothesis: people’s privacy concerns vary from person to person, and there is insufficient evidence to validate the importance of privacy barriers currently. As information asymmetries will also lead people to make different privacy decisions, we suppose that the more accurate and useful the information they provide, the more precise the decisions they will make. To intuitively present the influential factors we found in research question 1, we highlight the elements that should be considered and analyzed to measure a person’s privacy concerns (<xref rid="figure2" ref-type="fig">Figure 2</xref>). The categorization of the elements is flexible; for instance, both social trust and technical trust can affect privacy concerns (refer to the inner relations among the elements [solid lines] and subelements [dashed lines] plotted in <xref rid="figure2" ref-type="fig">Figure 2</xref>).</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Influential factors of privacy concerns.</p>
          </caption>
          <graphic xlink:href="nursing_v7i1e53592_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>On the basis of these factors, we have determined that there are few studies investigating the privacy attitudes of other user roles with regard to these technologies. We found that, of the 66 included articles, only 1 (2%) [<xref ref-type="bibr" rid="ref74">74</xref>] has conducted interviews with caregivers, while 2 (3%) [<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref69">69</xref>] discuss the privacy concerns of bystanders. In addition, there are only a few studies that were not conducted within the specified geographic regions that collected technology researchers’ perceptions of ethical issues (privacy is one of the ethical issues interviewed) with regard to smart home technologies [<xref ref-type="bibr" rid="ref108">108</xref>]. Although bystanders will not be the majority of the users of assisted living technologies, we insist that privacy concerns should be gathered from them too. In addition, clinicians’ and technical researchers’ views need to be explored because they can provide more information based on their professional background. Therefore, more studies are required to be conducted from the perspective of different user roles, enabling shared privacy decision-making among them.</p>
        <p>This review also reveals the problems in current research, such as an insufficient number of participants recruited, a lack of diversity regarding focus groups, the confirmation bias of researchers during study design, and the fuzzy definitions of different concepts, and provides suggestions for some of the barriers especially from the perspective of social psychology, such as improving cognitive functioning by applying the Hawthorne effect or reducing cognitive inconsistency by using cognitive dissonance.</p>
        <p>To help participants make more accurate and stable decisions, we suggest that more empirical studies should be conducted that observe participants’ behaviors and measure the distances between behaviors and attitudes. In combination with the self-perception theory [<xref ref-type="bibr" rid="ref110">110</xref>], the participants are expected to observe themselves, notice the inconsistencies, and interpret their attitudes from their behaviors. In subsequent steps, researchers can also guide the participants appropriately based on the social learning theory [<xref ref-type="bibr" rid="ref109">109</xref>], notify participants about the inconsistencies, and ask them to adjust their attitudes or behaviors to reduce the distances. On the basis of the newly gathered attitudes, participants’ preferences and behaviors in real life are expected to be predicted more precisely on the machine level, by using appropriate predicting algorithms.</p>
      </sec>
      <sec>
        <title>Study Limitations</title>
        <p>Despite all the interesting findings, we acknowledge the limitations of the review. First, the scope of findings deviated somewhat from the search terms we set at the beginning. Because of the limited number of articles identified regarding legal concerns and legal frameworks, the legal frameworks and documents that we have listed are not exhaustive; therefore, we have not ventured in depth in this direction. Although we have classified the findings into subcategories of our creation, we cannot deny the fact that few studies are directly related to legal norms regarding privacy in health monitoring. Second, although some search terms were updated continually based on the new ideas we generated, to be compliant with the inclusion criteria (eg, the region specification), some important studies might have been excluded, although their findings may not be applicable and adaptable to the authors’ country of residence. However, we encourage future works to be carried out in other regions to obtain a more comprehensive overview of the problem. Last but not least, although we have tried to interpret the findings from the perspective of social psychology, the evidence we have presented is inconclusive, and they remain to be investigated in long-term studies.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>This scoping review has synthesized existing published research on privacy barriers with regard to the adoption of assisted living technologies. On the basis of the findings and main topics, the studies were classified into five categories: (1) privacy attitudes, (2) privacy concerns, (3) legal concerns, (4) legal frameworks, and (5) privacy barriers. Subsequently, we investigated the methodology and participant inclusion criteria. We have listed the factors that influence people’s privacy concerns and analyzed the social psychological influence of the experiments on people’s privacy awareness. Example legal challenges regarding privacy attitudes have been put forward, and the interaction between privacy factors and legal factors has been discussed. Future research might involve longitudinal studies on the privacy attitudes of different user roles and the informed consent obtained, with more psychological impacts such as the Hawthorne effect and confirmation bias carefully considered.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) checklist.</p>
        <media xlink:href="nursing_v7i1e53592_app1.pdf" xlink:title="PDF File  (Adobe PDF File), 549 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">EU</term>
          <def>
            <p>European Union</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">PRISMA</term>
          <def>
            <p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This work has been cofunded by the Initiative for ICT and digital innovation program of the Research Council of Norway under the scope of and as part of the outcome from the research project Reinforcing the Health Data Infrastructure in Mobility and Assurance through Data Democratization (Health Democratization, 2019–2024, project number 288856).</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <article-title>The 2021 ageing report: underlying assumptions and projection methodologies</article-title>
          <source>The European Commission</source>
          <access-date>2024-04-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://economy-finance.ec.europa.eu/publications/2021-ageing-report-underlying-assumptions-and-projection-methodologies_en">https://economy-finance.ec.europa.eu/publications/2021-ageing-report-underlying-assumptions-and-projection-methodologies_en</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lewis</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Buffel</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Aging in place and the places of aging: a longitudinal study</article-title>
          <source>J Aging Stud</source>
          <year>2020</year>
          <month>09</month>
          <volume>54</volume>
          <fpage>100870</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S0890-4065(20)30040-2"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jaging.2020.100870</pub-id>
          <pub-id pub-id-type="medline">32972616</pub-id>
          <pub-id pub-id-type="pii">S0890-4065(20)30040-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <article-title>The Ambient Assisted Living joint programme</article-title>
          <source>ERA LEARN</source>
          <access-date>2023-10-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.era-learn.eu/network-information/networks/aal-jp">https://www.era-learn.eu/network-information/networks/aal-jp</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="web">
          <article-title>Active and Assisted Living 2</article-title>
          <source>ERA LEARN</source>
          <access-date>2023-10-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.era-learn.eu/network-information/networks/aal-2">https://www.era-learn.eu/network-information/networks/aal-2</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rostad</surname>
              <given-names>HM</given-names>
            </name>
            <name name-style="western">
              <surname>Stokke</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Integrating welfare technology in long-term care services: nationwide cross-sectional survey study</article-title>
          <source>J Med Internet Res</source>
          <year>2021</year>
          <month>08</month>
          <day>16</day>
          <volume>23</volume>
          <issue>8</issue>
          <fpage>e22316</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2021/8/e22316/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/22316</pub-id>
          <pub-id pub-id-type="medline">34398791</pub-id>
          <pub-id pub-id-type="pii">v23i8e22316</pub-id>
          <pub-id pub-id-type="pmcid">PMC8406104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vichitvanichphong</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Talaei-Khoei</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kerr</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Ghapanchi</surname>
              <given-names>AH</given-names>
            </name>
          </person-group>
          <article-title>Assistive technologies for aged care: comparative literature survey on the effectiveness of theories for supportive and empowering technologies</article-title>
          <source>Inf Technol People</source>
          <year>2018</year>
          <volume>31</volume>
          <issue>2</issue>
          <fpage>405</fpage>
          <lpage>27</lpage>
          <pub-id pub-id-type="doi">10.1108/ITP-03-2017-0090</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rosenberg</surname>
              <given-names>RS</given-names>
            </name>
          </person-group>
          <source>The Social Impact of Computers</source>
          <year>1992</year>
          <month>02</month>
          <publisher-loc>Amsterdam, The Netherlands</publisher-loc>
          <publisher-name>Elsevier</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <article-title>Roger Clarke's privacy introduction and definitions</article-title>
          <source>Xamax Consultancy</source>
          <access-date>2023-10-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.rogerclarke.com/DV/Intro.html">http://www.rogerclarke.com/DV/Intro.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gutwirth</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Leenes</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>de Hert</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Poullet</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <source>European Data Protection: Coming of Age</source>
          <year>2013</year>
          <publisher-loc>Dordrecht, The Netherlands</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>AN</given-names>
            </name>
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Privacy in online social networks</article-title>
          <source>Proceedings of the 11th International Conference on Computer and Information Science</source>
          <year>2012</year>
          <conf-name>ICIS 2012</conf-name>
          <conf-date>May 30-June 1, 2012</conf-date>
          <conf-loc>Shanghai, China</conf-loc>
          <pub-id pub-id-type="doi">10.12681/eadd/42507</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Serenko</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Informational, physical, and psychological privacy as determinants of patient behaviour in health care</article-title>
          <source>Patient Safety and Quality Care through Health Informatics</source>
          <year>2014</year>
          <publisher-loc>Hershey, PA</publisher-loc>
          <publisher-name>IGI Global</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ferguson</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Hickman</surname>
              <given-names>LD</given-names>
            </name>
            <name name-style="western">
              <surname>Turkmani</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Breen</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Gargiulo</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Inglis</surname>
              <given-names>SC</given-names>
            </name>
          </person-group>
          <article-title>"Wearables only work on patients that wear them": barriers and facilitators to the adoption of wearable cardiac monitoring technologies</article-title>
          <source>Cardiovasc Digit Health J</source>
          <year>2021</year>
          <month>04</month>
          <day>06</day>
          <volume>2</volume>
          <issue>2</issue>
          <fpage>137</fpage>
          <lpage>47</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2666-6936(21)00020-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.cvdhj.2021.02.001</pub-id>
          <pub-id pub-id-type="medline">35265900</pub-id>
          <pub-id pub-id-type="pii">S2666-6936(21)00020-7</pub-id>
          <pub-id pub-id-type="pmcid">PMC8890057</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tyler</surname>
              <given-names>TR</given-names>
            </name>
            <name name-style="western">
              <surname>Lind</surname>
              <given-names>EA</given-names>
            </name>
          </person-group>
          <article-title>A relational model of authority in groups</article-title>
          <source>Exp Soc Psychol</source>
          <year>1992</year>
          <volume>25</volume>
          <fpage>115</fpage>
          <lpage>91</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/S0065-2601(08)60283-X"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/S0065-2601(08)60283-X</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="web">
          <article-title>Data protection impact assessment (DPIA)</article-title>
          <source>General Data Protection Regulation</source>
          <access-date>2023-10-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://gdpr.eu/data-protection-impact-assessment-template/">https://gdpr.eu/data-protection-impact-assessment-template/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liberati</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Altman</surname>
              <given-names>DG</given-names>
            </name>
            <name name-style="western">
              <surname>Tetzlaff</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Mulrow</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Gøtzsche</surname>
              <given-names>PC</given-names>
            </name>
            <name name-style="western">
              <surname>Ioannidis</surname>
              <given-names>JP</given-names>
            </name>
            <name name-style="western">
              <surname>Clarke</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Devereaux</surname>
              <given-names>PJ</given-names>
            </name>
            <name name-style="western">
              <surname>Kleijnen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The PRISMA statement for reporting systematic reviews and meta-analyses of studies that evaluate health care interventions: explanation and elaboration</article-title>
          <source>PLoS Med</source>
          <year>2009</year>
          <month>07</month>
          <day>21</day>
          <volume>6</volume>
          <issue>7</issue>
          <fpage>e1000100</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://air.unimi.it/handle/2434/168817"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pmed.1000100</pub-id>
          <pub-id pub-id-type="medline">19621070</pub-id>
          <pub-id pub-id-type="pmcid">PMC2707010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pham</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Rajić</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Greig</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Sargeant</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Papadopoulos</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>McEwen</surname>
              <given-names>SA</given-names>
            </name>
          </person-group>
          <article-title>A scoping review of scoping reviews: advancing the approach and enhancing the consistency</article-title>
          <source>Res Synth Methods</source>
          <year>2014</year>
          <month>12</month>
          <volume>5</volume>
          <issue>4</issue>
          <fpage>371</fpage>
          <lpage>85</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/26052958"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/jrsm.1123</pub-id>
          <pub-id pub-id-type="medline">26052958</pub-id>
          <pub-id pub-id-type="pmcid">PMC4491356</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Price</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Surr</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Gough</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Ashley</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Experiences and support needs of informal caregivers of people with multimorbidity: a scoping literature review</article-title>
          <source>Psychol Health</source>
          <year>2020</year>
          <month>01</month>
          <volume>35</volume>
          <issue>1</issue>
          <fpage>36</fpage>
          <lpage>69</lpage>
          <pub-id pub-id-type="doi">10.1080/08870446.2019.1626125</pub-id>
          <pub-id pub-id-type="medline">31321995</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Armstrong</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Hall</surname>
              <given-names>BJ</given-names>
            </name>
            <name name-style="western">
              <surname>Doyle</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Waters</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Cochrane update. 'Scoping the scope' of a Cochrane review</article-title>
          <source>J Public Health (Oxf)</source>
          <year>2011</year>
          <month>03</month>
          <volume>33</volume>
          <issue>1</issue>
          <fpage>147</fpage>
          <lpage>50</lpage>
          <pub-id pub-id-type="doi">10.1093/pubmed/fdr015</pub-id>
          <pub-id pub-id-type="medline">21345890</pub-id>
          <pub-id pub-id-type="pii">fdr015</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pawson</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Greenhalgh</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Harvey</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Walshe</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Realist review--a new method of systematic review designed for complex policy interventions</article-title>
          <source>J Health Serv Res Policy</source>
          <year>2005</year>
          <month>07</month>
          <volume>10 Suppl 1</volume>
          <fpage>21</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.1258/1355819054308530</pub-id>
          <pub-id pub-id-type="medline">16053581</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Matarese</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lommi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>De Marinis</surname>
              <given-names>MG</given-names>
            </name>
            <name name-style="western">
              <surname>Riegel</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>A systematic review and integration of concept analyses of self-care and related concepts</article-title>
          <source>J Nurs Scholarsh</source>
          <year>2018</year>
          <month>05</month>
          <volume>50</volume>
          <issue>3</issue>
          <fpage>296</fpage>
          <lpage>305</lpage>
          <pub-id pub-id-type="doi">10.1111/jnu.12385</pub-id>
          <pub-id pub-id-type="medline">29645402</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sánchez</surname>
              <given-names>VG</given-names>
            </name>
            <name name-style="western">
              <surname>Anker-Hansen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Eilertsen</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Older people's attitudes and perspectives of welfare technology in Norway</article-title>
          <source>J Multidiscip Healthc</source>
          <year>2019</year>
          <month>10</month>
          <day>16</day>
          <volume>12</volume>
          <fpage>841</fpage>
          <lpage>53</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/31802884"/>
          </comment>
          <pub-id pub-id-type="doi">10.2147/JMDH.S219458</pub-id>
          <pub-id pub-id-type="medline">31802884</pub-id>
          <pub-id pub-id-type="pii">219458</pub-id>
          <pub-id pub-id-type="pmcid">PMC6801567</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kokolakis</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon</article-title>
          <source>Comput Secur</source>
          <year>2017</year>
          <month>01</month>
          <volume>64</volume>
          <fpage>122</fpage>
          <lpage>34</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.cose.2015.07.002"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.cose.2015.07.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vassli</surname>
              <given-names>LT</given-names>
            </name>
            <name name-style="western">
              <surname>Farshchian</surname>
              <given-names>BA</given-names>
            </name>
          </person-group>
          <article-title>Acceptance of health-related ICT among elderly people living in the community: a systematic review of qualitative evidence</article-title>
          <source>Int J Hum Comput Interact</source>
          <year>2018</year>
          <volume>34</volume>
          <issue>2</issue>
          <fpage>99</fpage>
          <lpage>116</lpage>
          <pub-id pub-id-type="doi">10.1080/10447318.2017.1328024</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shin</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Jarrahi</surname>
              <given-names>MH</given-names>
            </name>
            <name name-style="western">
              <surname>Fei</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Karami</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gafinowitz</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Byun</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Wearable activity trackers, accuracy, adoption, acceptance and health impact: a systematic literature review</article-title>
          <source>J Biomed Inform</source>
          <year>2019</year>
          <month>05</month>
          <volume>93</volume>
          <fpage>103153</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(19)30071-1"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2019.103153</pub-id>
          <pub-id pub-id-type="medline">30910623</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(19)30071-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Biermann</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Offermann-van Heek</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ziefle</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Older users’ benefit and barrier perception of using ultrasonic whistles in home care</article-title>
          <source>Proceedings of the Human Aspects of IT for the Aged Population. Design for the Elderly and Technology Acceptance</source>
          <year>2019</year>
          <conf-name>HCII 2019</conf-name>
          <conf-date>July 26-31, 2019</conf-date>
          <conf-loc>Orlando, FL</conf-loc>
          <pub-id pub-id-type="doi">10.1007/978-3-030-22012-9_10</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Charness</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Best</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Supportive home health care technology for older adults: attitudes and implementation</article-title>
          <source>Gerontechnology</source>
          <year>2016</year>
          <month>02</month>
          <day>23</day>
          <volume>15</volume>
          <issue>4</issue>
          <fpage>233</fpage>
          <lpage>42</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/29033700"/>
          </comment>
          <pub-id pub-id-type="doi">10.4017/gt.2016.15.4.006.00</pub-id>
          <pub-id pub-id-type="medline">29033700</pub-id>
          <pub-id pub-id-type="pmcid">PMC5640315</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Estève</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Fourniols</surname>
              <given-names>JY</given-names>
            </name>
            <name name-style="western">
              <surname>Escriba</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Campo</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Smart wearable systems: current status and future challenges</article-title>
          <source>Artif Intell Med</source>
          <year>2012</year>
          <month>11</month>
          <volume>56</volume>
          <issue>3</issue>
          <fpage>137</fpage>
          <lpage>56</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.artmed.2012.09.003"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.artmed.2012.09.003</pub-id>
          <pub-id pub-id-type="medline">23122689</pub-id>
          <pub-id pub-id-type="pii">S0933-3657(12)00118-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gettel</surname>
              <given-names>CJ</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Goldberg</surname>
              <given-names>EM</given-names>
            </name>
          </person-group>
          <article-title>Dementia care, fall detection, and ambient-assisted living technologies help older adults age in place: a scoping review</article-title>
          <source>J Appl Gerontol</source>
          <year>2021</year>
          <month>12</month>
          <volume>40</volume>
          <issue>12</issue>
          <fpage>1893</fpage>
          <lpage>902</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33853428"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/07334648211005868</pub-id>
          <pub-id pub-id-type="medline">33853428</pub-id>
          <pub-id pub-id-type="pmcid">PMC8514579</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Campo</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Estève</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Fourniols</surname>
              <given-names>JY</given-names>
            </name>
          </person-group>
          <article-title>Smart homes - current features and future perspectives</article-title>
          <source>Maturitas</source>
          <year>2009</year>
          <month>10</month>
          <day>20</day>
          <volume>64</volume>
          <issue>2</issue>
          <fpage>90</fpage>
          <lpage>7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.maturitas.2009.07.014"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.maturitas.2009.07.014</pub-id>
          <pub-id pub-id-type="medline">19729255</pub-id>
          <pub-id pub-id-type="pii">S0378-5122(09)00260-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lanne</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Leikas</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Ethical AI in the re-ablement of older people: opportunities and challenges</article-title>
          <source>Gerontechnology</source>
          <year>2021</year>
          <volume>20</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <pub-id pub-id-type="doi">10.4017/gt.2021.20.2.26-473.11</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lederman</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ben-Assuli</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Vo</surname>
              <given-names>TH</given-names>
            </name>
          </person-group>
          <article-title>The role of the internet of things in healthcare in supporting clinicians and patients: a narrative review</article-title>
          <source>Health Policy Technol</source>
          <year>2021</year>
          <month>09</month>
          <volume>10</volume>
          <issue>3</issue>
          <fpage>100552</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.hlpt.2021.100552"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.hlpt.2021.100552</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mallinson</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Shafi</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Smart home technology: challenges and opportunities for collaborative governance and policy research</article-title>
          <source>Rev Policy Res</source>
          <year>2022</year>
          <month>02</month>
          <day>20</day>
          <volume>39</volume>
          <issue>3</issue>
          <fpage>330</fpage>
          <lpage>52</lpage>
          <pub-id pub-id-type="doi">10.1111/ropr.12470</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kolakowski</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Shepley</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Valenzuela-Mendoza</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Ziebarth</surname>
              <given-names>NR</given-names>
            </name>
          </person-group>
          <article-title>How the COVID-19 pandemic will change workplaces, healthcare markets and healthy living: an overview and assessment</article-title>
          <source>Sustainability</source>
          <year>2021</year>
          <month>09</month>
          <day>09</day>
          <volume>13</volume>
          <issue>18</issue>
          <fpage>10096</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3390/su131810096"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/su131810096</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Caldeira</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Bietz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vidauri</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Senior care for aging in place: balancing assistance and independence</article-title>
          <source>Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing</source>
          <year>2017</year>
          <conf-name>CSCW '17</conf-name>
          <conf-date>February 25-March 1, 2017</conf-date>
          <conf-loc>Portland, OR</conf-loc>
          <pub-id pub-id-type="doi">10.1145/2998181.2998206</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schomakers</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>Vervier</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Ziefle</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>The impact of user diversity on the acceptance of mHealth for aftercare - identifying the user types ‘assistance seekers’ and ‘privacy supporters’</article-title>
          <source>Proceedings of the Human Aspects of IT for the Aged Population</source>
          <year>2020</year>
          <conf-name>HCII 2020</conf-name>
          <conf-date>July 19-24, 2020</conf-date>
          <conf-loc>Copenhagen, Denmark</conf-loc>
          <pub-id pub-id-type="doi">10.1007/978-3-030-50249-2_28</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harrington</surname>
              <given-names>EE</given-names>
            </name>
            <name name-style="western">
              <surname>Bishop</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Do</surname>
              <given-names>HM</given-names>
            </name>
            <name name-style="western">
              <surname>Sheng</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Perceptions of socially assistive robots: a pilot study exploring older adults’ concerns</article-title>
          <source>Curr Psychol</source>
          <year>2021</year>
          <month>03</month>
          <day>18</day>
          <volume>42</volume>
          <fpage>2145</fpage>
          <lpage>56</lpage>
          <pub-id pub-id-type="doi">10.1007/s12144-021-01627-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>YK</given-names>
            </name>
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Demiris</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Use of an internet-of-things smart home system for healthy aging in older adults in residential settings: pilot feasibility study</article-title>
          <source>JMIR Aging</source>
          <year>2020</year>
          <month>11</month>
          <day>10</day>
          <volume>3</volume>
          <issue>2</issue>
          <fpage>e21964</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://aging.jmir.org/2020/2/e21964/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/21964</pub-id>
          <pub-id pub-id-type="medline">33170128</pub-id>
          <pub-id pub-id-type="pii">v3i2e21964</pub-id>
          <pub-id pub-id-type="pmcid">PMC7685915</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tural</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Austin Cole</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Safely and actively aging in place: older adults' attitudes and intentions toward smart home technologies</article-title>
          <source>Gerontol Geriatr Med</source>
          <year>2021</year>
          <month>05</month>
          <day>22</day>
          <volume>7</volume>
          <fpage>23337214211017340</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/23337214211017340?url_ver=Z39.88-2003&amp;rfr_id=ori:rid:crossref.org&amp;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/23337214211017340</pub-id>
          <pub-id pub-id-type="medline">34095352</pub-id>
          <pub-id pub-id-type="pii">10.1177_23337214211017340</pub-id>
          <pub-id pub-id-type="pmcid">PMC8142240</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Attié</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Meyer-Waarden</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>The acceptance and usage of smart connected objects according to adoption stages: an enhanced technology acceptance model integrating the diffusion of innovation, uses and gratification and privacy calculus theories</article-title>
          <source>Technol Forecast Soc Change</source>
          <year>2022</year>
          <month>03</month>
          <volume>176</volume>
          <fpage>121485</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.techfore.2022.121485"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.techfore.2022.121485</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Karlsen</surname>
              <given-names>IC</given-names>
            </name>
            <name name-style="western">
              <surname>Colomo-Palacios</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Holone</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>The medical use of smartwatches: a tertiary study comparing northern and southern European nursing homes</article-title>
          <source>Proceedings of the Ninth International Conference on Technological Ecosystems for Enhancing Multiculturality</source>
          <year>2021</year>
          <conf-name>TEEM'21</conf-name>
          <conf-date>October 26-29, 2021</conf-date>
          <conf-loc>Barcelona, Spain</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3486011.3486470</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gimpel</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Manner-Romberg</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Schmied</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Winkler</surname>
              <given-names>TJ</given-names>
            </name>
          </person-group>
          <article-title>Understanding the evaluation of mHealth app features based on a cross-country Kano analysis</article-title>
          <source>Electron Mark</source>
          <year>2021</year>
          <volume>31</volume>
          <issue>4</issue>
          <fpage>765</fpage>
          <lpage>94</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/35602116"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s12525-020-00455-y</pub-id>
          <pub-id pub-id-type="medline">35602116</pub-id>
          <pub-id pub-id-type="pii">455</pub-id>
          <pub-id pub-id-type="pmcid">PMC7987738</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mujirishvili</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Maidhof</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Florez-Revuelta</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Ziefle</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Richart-Martinez</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cabrero-García</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Acceptance and privacy perceptions toward video-based active and assisted living technologies: scoping review</article-title>
          <source>J Med Internet Res</source>
          <year>2023</year>
          <month>05</month>
          <day>01</day>
          <volume>25</volume>
          <fpage>e45297</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2023//e45297/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/45297</pub-id>
          <pub-id pub-id-type="medline">37126390</pub-id>
          <pub-id pub-id-type="pii">v25i1e45297</pub-id>
          <pub-id pub-id-type="pmcid">PMC10186188</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wilczewski</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Soni</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ivanova</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ong</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Barrera</surname>
              <given-names>JF</given-names>
            </name>
            <name name-style="western">
              <surname>Bunnell</surname>
              <given-names>BE</given-names>
            </name>
            <name name-style="western">
              <surname>Welch</surname>
              <given-names>BM</given-names>
            </name>
          </person-group>
          <article-title>Older adults' experience with virtual conversational agents for health data collection</article-title>
          <source>Front Digit Health</source>
          <year>2023</year>
          <month>3</month>
          <day>15</day>
          <volume>5</volume>
          <fpage>1125926</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/37006821"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fdgth.2023.1125926</pub-id>
          <pub-id pub-id-type="medline">37006821</pub-id>
          <pub-id pub-id-type="pmcid">PMC10050579</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jaschinski</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Allouch</surname>
              <given-names>SB</given-names>
            </name>
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>van Dijk</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The influence of privacy on the acceptance of technologies for assisted living</article-title>
          <source>Proceedings of the 6th International Conference on Human Aspects of IT for the Aged Population</source>
          <year>2020</year>
          <conf-name>ITAP 2020</conf-name>
          <conf-date>July 19-24, 2020</conf-date>
          <conf-loc>Copenhagen, Denmark</conf-loc>
          <pub-id pub-id-type="doi">10.1007/978-3-030-50249-2_33</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chung</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bleich</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wheeler</surname>
              <given-names>DC</given-names>
            </name>
            <name name-style="western">
              <surname>Winship</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>McDowell</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Baker</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Parsons</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Attitudes and perceptions toward voice-operated smart speakers among low-income senior housing residents: comparison of pre- and post-installation surveys</article-title>
          <source>Gerontol Geriatr Med</source>
          <year>2021</year>
          <month>03</month>
          <day>26</day>
          <volume>7</volume>
          <fpage>23337214211005869</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/23337214211005869?url_ver=Z39.88-2003&amp;rfr_id=ori:rid:crossref.org&amp;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/23337214211005869</pub-id>
          <pub-id pub-id-type="medline">35047655</pub-id>
          <pub-id pub-id-type="pii">10.1177_23337214211005869</pub-id>
          <pub-id pub-id-type="pmcid">PMC8762486</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fruchter</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Liccardi</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Consumer attitudes towards privacy and security in home assistants</article-title>
          <source>Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems</source>
          <year>2018</year>
          <conf-name>CHI EA '18</conf-name>
          <conf-date>April 21-26, 2018</conf-date>
          <conf-loc>Montreal, QC</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3170427.3188448</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Piau</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Steinmeyer</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Mattek</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Lindauer</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Sharma</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Bouranis</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Wild</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Kaye</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Caregiving in older adults; experiences and attitudes toward smart technologies</article-title>
          <source>J Clin Med</source>
          <year>2023</year>
          <month>02</month>
          <day>23</day>
          <volume>12</volume>
          <issue>5</issue>
          <fpage>1789</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=jcm12051789"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/jcm12051789</pub-id>
          <pub-id pub-id-type="medline">36902576</pub-id>
          <pub-id pub-id-type="pii">jcm12051789</pub-id>
          <pub-id pub-id-type="pmcid">PMC10003197</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tan</surname>
              <given-names>NH</given-names>
            </name>
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>RY</given-names>
            </name>
            <name name-style="western">
              <surname>Desjardins</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Munson</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Pierce</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Monitoring pets, deterring intruders, and casually spying on neighbors: everyday uses of smart home cameras</article-title>
          <source>Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems</source>
          <year>2022</year>
          <conf-name>CHI '22</conf-name>
          <conf-date>April 29-May 5, 2022</conf-date>
          <conf-loc>New Orleans, LA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3491102.3517617</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Schomakers</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>Ziefle</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Privacy vs. security: trade-offs in the acceptance of smart technologies for aging-in-place</article-title>
          <source>Int J Hum Comput Interact</source>
          <year>2022</year>
          <month>06</month>
          <day>12</day>
          <volume>39</volume>
          <issue>5</issue>
          <fpage>1043</fpage>
          <lpage>58</lpage>
          <pub-id pub-id-type="doi">10.1080/10447318.2022.2078463</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Randall</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Bennett</surname>
              <given-names>CC</given-names>
            </name>
            <name name-style="western">
              <surname>Šabanović</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Nagata</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Eldridge</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Collins</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Piatt</surname>
              <given-names>JA</given-names>
            </name>
          </person-group>
          <article-title>More than just friends: in-home use and design recommendations for sensing socially assistive robots (SARs) by older adults with depression</article-title>
          <source>Paladyn J Behav Robot</source>
          <year>2019</year>
          <volume>10</volume>
          <fpage>237</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.1515/pjbr-2019-0020</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gerłowska</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Furtak-Niczyporuk</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rejdak</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Robotic assistance for people with dementia: a viable option for the future?</article-title>
          <source>Expert Rev Med Devices</source>
          <year>2020</year>
          <month>06</month>
          <volume>17</volume>
          <issue>6</issue>
          <fpage>507</fpage>
          <lpage>18</lpage>
          <pub-id pub-id-type="doi">10.1080/17434440.2020.1770592</pub-id>
          <pub-id pub-id-type="medline">32511027</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Soro</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ambe</surname>
              <given-names>AH</given-names>
            </name>
            <name name-style="western">
              <surname>Brereton</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Minding the gap: reconciling human and technical perspectives on the IoT for healthy ageing</article-title>
          <source>Wirel Commun Mob Comput</source>
          <year>2017</year>
          <volume>2017</volume>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1155/2017/7439361</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bolling</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Mao</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Reichstadt</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Jeste</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>HC</given-names>
            </name>
            <name name-style="western">
              <surname>Nebeker</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Technology to support aging in place: older adults' perspectives</article-title>
          <source>Healthcare (Basel)</source>
          <year>2019</year>
          <month>04</month>
          <day>10</day>
          <volume>7</volume>
          <issue>2</issue>
          <fpage>60</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=healthcare7020060"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/healthcare7020060</pub-id>
          <pub-id pub-id-type="medline">30974780</pub-id>
          <pub-id pub-id-type="pii">healthcare7020060</pub-id>
          <pub-id pub-id-type="pmcid">PMC6627975</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pilozzi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Overcoming Alzheimer's disease stigma by leveraging artificial intelligence and blockchain technologies</article-title>
          <source>Brain Sci</source>
          <year>2020</year>
          <month>03</month>
          <day>23</day>
          <volume>10</volume>
          <issue>3</issue>
          <fpage>183</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=brainsci10030183"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/brainsci10030183</pub-id>
          <pub-id pub-id-type="medline">32210011</pub-id>
          <pub-id pub-id-type="pii">brainsci10030183</pub-id>
          <pub-id pub-id-type="pmcid">PMC7139597</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pekmezaris</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Williams</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Pascarelli</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Finuf</surname>
              <given-names>KD</given-names>
            </name>
            <name name-style="western">
              <surname>Harris</surname>
              <given-names>YT</given-names>
            </name>
            <name name-style="western">
              <surname>Myers</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Kline</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>VH</given-names>
            </name>
            <name name-style="western">
              <surname>Murray</surname>
              <given-names>LM</given-names>
            </name>
            <name name-style="western">
              <surname>McFarlane</surname>
              <given-names>SI</given-names>
            </name>
            <name name-style="western">
              <surname>Pappas</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Lesser</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Makaryus</surname>
              <given-names>AN</given-names>
            </name>
            <name name-style="western">
              <surname>Martinez</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kozikowski</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Polo</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Guzman</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zeltser</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Marino</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Pena</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>DiClemente</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Granville</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Adapting a home telemonitoring intervention for underserved Hispanic/Latino patients with type 2 diabetes: an acceptability and feasibility study</article-title>
          <source>BMC Med Inform Decis Mak</source>
          <year>2020</year>
          <month>12</month>
          <day>07</day>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>324</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-020-01346-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12911-020-01346-0</pub-id>
          <pub-id pub-id-type="medline">33287815</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12911-020-01346-0</pub-id>
          <pub-id pub-id-type="pmcid">PMC7720574</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kodate</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Donnelly</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Suwa</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tsujimura</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kitinoja</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Hallila</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Toivonen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ide</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Home-care robots - attitudes and perceptions among older people, carers and care professionals in Ireland: a questionnaire study</article-title>
          <source>Health Soc Care Community</source>
          <year>2022</year>
          <month>05</month>
          <volume>30</volume>
          <issue>3</issue>
          <fpage>1086</fpage>
          <lpage>96</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://hdl.handle.net/2115/85113"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/hsc.13327</pub-id>
          <pub-id pub-id-type="medline">33970511</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Berridge</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Halpern</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Levy</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Cameras on beds: the ethics of surveillance in nursing home rooms</article-title>
          <source>AJOB Empir Bioeth</source>
          <year>2019</year>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>55</fpage>
          <lpage>62</lpage>
          <pub-id pub-id-type="doi">10.1080/23294515.2019.1568320</pub-id>
          <pub-id pub-id-type="medline">30794112</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mittelstadt</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Ethics of the health-related internet of things: a narrative review</article-title>
          <source>Ethics Inf Technol</source>
          <year>2017</year>
          <month>7</month>
          <day>4</day>
          <volume>19</volume>
          <fpage>157</fpage>
          <lpage>75</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://paperpile.com/b/f0gPo9/LFk2p"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10676-017-9426-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koo</surname>
              <given-names>SH</given-names>
            </name>
            <name name-style="western">
              <surname>Fallon</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Explorations of wearable technology for tracking self and others</article-title>
          <source>Fash Text</source>
          <year>2018</year>
          <month>03</month>
          <day>28</day>
          <volume>5</volume>
          <fpage>8</fpage>
          <pub-id pub-id-type="doi">10.1186/s40691-017-0123-z</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Joe</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chaudhuri</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Chung</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Demiris</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Older adults' attitudes and preferences regarding a multifunctional wellness tool: a pilot study</article-title>
          <source>Inform Health Soc Care</source>
          <year>2016</year>
          <volume>41</volume>
          <issue>2</issue>
          <fpage>143</fpage>
          <lpage>58</lpage>
          <pub-id pub-id-type="doi">10.3109/17538157.2014.965305</pub-id>
          <pub-id pub-id-type="medline">25325513</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sánchez</surname>
              <given-names>VG</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Bing-Jonsson</surname>
              <given-names>PC</given-names>
            </name>
          </person-group>
          <article-title>Ethics of smart house welfare technology for older adults: a systematic literature review</article-title>
          <source>Int J Technol Assess Health Care</source>
          <year>2017</year>
          <month>11</month>
          <day>20</day>
          <volume>33</volume>
          <issue>6</issue>
          <fpage>691</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1017/s0266462317000964</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hjelm</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Hedlund</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Internet-of-things (IoT) in healthcare and social services - experiences of a sensor system for notifications of deviant behaviours in the home from the users' perspective</article-title>
          <source>Health Informatics J</source>
          <year>2022</year>
          <volume>28</volume>
          <issue>1</issue>
          <fpage>14604582221075562</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/14604582221075562?url_ver=Z39.88-2003&amp;rfr_id=ori:rid:crossref.org&amp;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/14604582221075562</pub-id>
          <pub-id pub-id-type="medline">35225069</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cristiano</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Musteata</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>De Silvestri</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Bellandi</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Ceravolo</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Cesari</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Azzolino</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Sanna</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Trojaniello</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Older adults' and clinicians' perspectives on a smart health platform for the aging population: design and evaluation study</article-title>
          <source>JMIR Aging</source>
          <year>2022</year>
          <month>02</month>
          <day>28</day>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>e29623</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://air.unimi.it/handle/2434/913393"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/29623</pub-id>
          <pub-id pub-id-type="medline">35225818</pub-id>
          <pub-id pub-id-type="pii">v5i1e29623</pub-id>
          <pub-id pub-id-type="pmcid">PMC8922154</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Lim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Dahl</surname>
              <given-names>AA</given-names>
            </name>
          </person-group>
          <article-title>Breaking the data value-privacy paradox in mobile mental health systems through user-centered privacy protection: a web-based survey study</article-title>
          <source>JMIR Ment Health</source>
          <year>2021</year>
          <month>12</month>
          <day>24</day>
          <volume>8</volume>
          <issue>12</issue>
          <fpage>e31633</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mental.jmir.org/2021/12/e31633/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/31633</pub-id>
          <pub-id pub-id-type="medline">34951604</pub-id>
          <pub-id pub-id-type="pii">v8i12e31633</pub-id>
          <pub-id pub-id-type="pmcid">PMC8742208</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guazzini</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Fiorenza</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Panerai</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Duradoni</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>What went wrong? Predictors of contact tracing adoption in Italy during COVID-19 pandemic</article-title>
          <source>Future Internet</source>
          <year>2021</year>
          <month>11</month>
          <day>15</day>
          <volume>13</volume>
          <issue>11</issue>
          <fpage>286</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.3390/fi13110286"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/fi13110286</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wan</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Müller</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Randall</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Wulf</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Design of a GPS monitoring system for dementia care and its challenges in academia-industry project</article-title>
          <source>ACM Trans Comput Hum Interact</source>
          <year>2016</year>
          <month>10</month>
          <day>10</day>
          <volume>23</volume>
          <issue>5</issue>
          <fpage>1</fpage>
          <lpage>36</lpage>
          <pub-id pub-id-type="doi">10.1145/2963095</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Apthorpe</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Chetty</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Feamster</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>User perceptions of smart home IoT privacy</article-title>
          <source>Proc ACM Hum Comput Interact</source>
          <year>2018</year>
          <month>11</month>
          <day>01</day>
          <volume>2</volume>
          <issue>CSCW</issue>
          <fpage>1</fpage>
          <lpage>20</lpage>
          <pub-id pub-id-type="doi">10.1145/3274469</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Basdeo</surname>
              <given-names>JR</given-names>
            </name>
            <name name-style="western">
              <surname>Mcdonough</surname>
              <given-names>OR</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Privacy perceptions and designs of bystanders in smart homes</article-title>
          <source>Proc ACM Hum Comput Interact</source>
          <year>2019</year>
          <month>11</month>
          <day>07</day>
          <volume>3</volume>
          <issue>CSCW</issue>
          <fpage>1</fpage>
          <lpage>24</lpage>
          <pub-id pub-id-type="doi">10.1145/3359161</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahmad</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Farzan</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Kapadia</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>AJ</given-names>
            </name>
          </person-group>
          <article-title>Tangible privacy: towards user-centric sensor designs for bystander privacy</article-title>
          <source>Proc ACM Hum Comput Interact</source>
          <year>2020</year>
          <month>10</month>
          <day>15</day>
          <volume>4</volume>
          <issue>CSCW2</issue>
          <fpage>1</fpage>
          <lpage>28</lpage>
          <pub-id pub-id-type="doi">10.1145/3415187</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kheirinejad</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Alorwu</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Visuri</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hosio</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Contrasting the expectations and experiences related to mobile health use for chronic pain: questionnaire study</article-title>
          <source>JMIR Hum Factors</source>
          <year>2022</year>
          <month>09</month>
          <day>06</day>
          <volume>9</volume>
          <issue>3</issue>
          <fpage>e38265</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://humanfactors.jmir.org/2022/3/e38265/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/38265</pub-id>
          <pub-id pub-id-type="medline">36066960</pub-id>
          <pub-id pub-id-type="pii">v9i3e38265</pub-id>
          <pub-id pub-id-type="pmcid">PMC9490547</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reeder</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Chung</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Lyden</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Winters</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Jankowski</surname>
              <given-names>CM</given-names>
            </name>
          </person-group>
          <article-title>Older women's perceptions of wearable and smart home activity sensors</article-title>
          <source>Inform Health Soc Care</source>
          <year>2020</year>
          <month>01</month>
          <volume>45</volume>
          <issue>1</issue>
          <fpage>96</fpage>
          <lpage>109</lpage>
          <pub-id pub-id-type="doi">10.1080/17538157.2019.1582054</pub-id>
          <pub-id pub-id-type="medline">30919711</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Halvorsrud</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Holthe</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Karterud</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Thorstensen</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Lund</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Perspectives on assistive technology among older Norwegian adults receiving community health services</article-title>
          <source>Disabil Rehabil Assist Technol</source>
          <year>2023</year>
          <month>07</month>
          <volume>18</volume>
          <issue>5</issue>
          <fpage>685</fpage>
          <lpage>92</lpage>
          <pub-id pub-id-type="doi">10.1080/17483107.2021.1906962</pub-id>
          <pub-id pub-id-type="medline">33861681</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Langer</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Meleis</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Knaul</surname>
              <given-names>FM</given-names>
            </name>
            <name name-style="western">
              <surname>Atun</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Aran</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Arreola-Ornelas</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Bhutta</surname>
              <given-names>ZA</given-names>
            </name>
            <name name-style="western">
              <surname>Binagwaho</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bonita</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Caglia</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Claeson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Davies</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Donnay</surname>
              <given-names>FA</given-names>
            </name>
            <name name-style="western">
              <surname>Gausman</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Glickman</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Kearns</surname>
              <given-names>AD</given-names>
            </name>
            <name name-style="western">
              <surname>Kendall</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Lozano</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Seboni</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Sen</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Sindhu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Temin</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Frenk</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Women and health: the key for sustainable development</article-title>
          <source>Lancet</source>
          <year>2015</year>
          <month>09</month>
          <day>19</day>
          <volume>386</volume>
          <issue>9999</issue>
          <fpage>1165</fpage>
          <lpage>210</lpage>
          <pub-id pub-id-type="doi">10.1016/S0140-6736(15)60497-4</pub-id>
          <pub-id pub-id-type="medline">26051370</pub-id>
          <pub-id pub-id-type="pii">S0140-6736(15)60497-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jaschinski</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ben Allouch</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Listening to the ones who care: exploring the perceptions of informal caregivers towards ambient assisted living applications</article-title>
          <source>J Ambient Intell Humaniz Comput</source>
          <year>2018</year>
          <month>5</month>
          <day>25</day>
          <volume>10</volume>
          <fpage>761</fpage>
          <lpage>78</lpage>
          <pub-id pub-id-type="doi">10.1007/s12652-018-0856-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Łukasik</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tobis</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kropińska</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Suwalska</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Role of assistive robots in the care of older people: survey study among medical and nursing students</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>08</month>
          <day>12</day>
          <volume>22</volume>
          <issue>8</issue>
          <fpage>e18003</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/8/e18003/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/18003</pub-id>
          <pub-id pub-id-type="medline">32784187</pub-id>
          <pub-id pub-id-type="pii">v22i8e18003</pub-id>
          <pub-id pub-id-type="pmcid">PMC7450386</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Simpson</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Brown</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Sillence</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Coventry</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Lloyd</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Gibbs</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tariq</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Durrant</surname>
              <given-names>AC</given-names>
            </name>
          </person-group>
          <article-title>Understanding the barriers and facilitators to sharing patient-generated health data using digital technology for people living with long-term health conditions: a narrative review</article-title>
          <source>Front Public Health</source>
          <year>2021</year>
          <month>11</month>
          <day>23</day>
          <volume>9</volume>
          <fpage>641424</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/34888271"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fpubh.2021.641424</pub-id>
          <pub-id pub-id-type="medline">34888271</pub-id>
          <pub-id pub-id-type="pmcid">PMC8650083</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Seberger</surname>
              <given-names>JS</given-names>
            </name>
            <name name-style="western">
              <surname>Patil</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Post-COVID public health surveillance and privacy expectations in the United States: scenario-based interview study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2021</year>
          <month>10</month>
          <day>05</day>
          <volume>9</volume>
          <issue>10</issue>
          <fpage>e30871</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2021/10/e30871/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/30871</pub-id>
          <pub-id pub-id-type="medline">34519667</pub-id>
          <pub-id pub-id-type="pii">v9i10e30871</pub-id>
          <pub-id pub-id-type="pmcid">PMC8494069</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chaparro</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Ruiz</surname>
              <given-names>JF</given-names>
            </name>
            <name name-style="western">
              <surname>Romero</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Peño</surname>
              <given-names>CB</given-names>
            </name>
            <name name-style="western">
              <surname>Irurtia</surname>
              <given-names>LU</given-names>
            </name>
            <name name-style="western">
              <surname>Perea</surname>
              <given-names>MG</given-names>
            </name>
            <name name-style="western">
              <surname>Garcia</surname>
              <given-names>XD</given-names>
            </name>
            <name name-style="western">
              <surname>Molina</surname>
              <given-names>FJ</given-names>
            </name>
            <name name-style="western">
              <surname>Grigoleit</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lopez</surname>
              <given-names>JC</given-names>
            </name>
          </person-group>
          <article-title>The SHAPES smart mirror approach for independent living, healthy and active ageing</article-title>
          <source>Sensors (Basel)</source>
          <year>2021</year>
          <month>11</month>
          <day>28</day>
          <volume>21</volume>
          <issue>23</issue>
          <fpage>7938</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=s21237938"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/s21237938</pub-id>
          <pub-id pub-id-type="medline">34883942</pub-id>
          <pub-id pub-id-type="pii">s21237938</pub-id>
          <pub-id pub-id-type="pmcid">PMC8659491</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Felber</surname>
              <given-names>NA</given-names>
            </name>
            <name name-style="western">
              <surname>Tian</surname>
              <given-names>YJ</given-names>
            </name>
            <name name-style="western">
              <surname>Pageau</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Elger</surname>
              <given-names>BS</given-names>
            </name>
            <name name-style="western">
              <surname>Wangmo</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Mapping ethical issues in the use of smart home health technologies to care for older persons: a systematic review</article-title>
          <source>BMC Med Ethics</source>
          <year>2023</year>
          <month>03</month>
          <day>29</day>
          <volume>24</volume>
          <issue>1</issue>
          <fpage>24</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedethics.biomedcentral.com/articles/10.1186/s12910-023-00898-w"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12910-023-00898-w</pub-id>
          <pub-id pub-id-type="medline">36991423</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12910-023-00898-w</pub-id>
          <pub-id pub-id-type="pmcid">PMC10061702</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Your privacy preference matters: a qualitative study envisioned for homecare</article-title>
          <source>Proceedings of the IEEE Symposium on Computers and Communications (ISCC)</source>
          <year>2021</year>
          <conf-name>ISCC 2021</conf-name>
          <conf-date>September 5-8, 2021</conf-date>
          <conf-loc>Athens, Greece</conf-loc>
          <pub-id pub-id-type="doi">10.1109/iscc53001.2021.9631403</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Elridge</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Cognitive bias</article-title>
          <source>Britannica</source>
          <access-date>2023-10-09</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.britannica.com/science/cognitive-bias">https://www.britannica.com/science/cognitive-bias</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nickerson</surname>
              <given-names>RS</given-names>
            </name>
          </person-group>
          <article-title>Confirmation bias: a ubiquitous phenomenon in many guises</article-title>
          <source>Rev Gen Psychol</source>
          <year>1998</year>
          <month>06</month>
          <day>01</day>
          <volume>2</volume>
          <issue>2</issue>
          <fpage>175</fpage>
          <lpage>220</lpage>
          <pub-id pub-id-type="doi">10.1037/1089-2680.2.2.175</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="web">
          <article-title>Groupthink vs the wisdom of crowds</article-title>
          <source>The Learning NGO</source>
          <access-date>2024-04-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://thelearningngo.wordpress.com/2010/05/15/groupthink-vs-the-wisdom-of-crowds/">https://thelearningngo.wordpress.com/2010/05/15/groupthink-vs-the-wisdom-of-crowds/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vicsek</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>A scheme for analyzing the results of focus groups</article-title>
          <source>Int J Qual Method</source>
          <year>2016</year>
          <month>11</month>
          <day>30</day>
          <volume>6</volume>
          <issue>4</issue>
          <fpage>20</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.1177/160940690700600402</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Daci</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Legal principles, legal values and legal norms: are they the same or different?</article-title>
          <source>Academicus Int Sci J</source>
          <year>2010</year>
          <month>7</month>
          <issue>2</issue>
          <pub-id pub-id-type="doi">10.7336/academicus.2010.02.11</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Garg</surname>
              <given-names>SK</given-names>
            </name>
            <name name-style="western">
              <surname>Lyles</surname>
              <given-names>CR</given-names>
            </name>
            <name name-style="western">
              <surname>Ackerman</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Handley</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Schillinger</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Gourley</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Aulakh</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Sarkar</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>Qualitative analysis of programmatic initiatives to text patients with mobile devices in resource-limited health systems</article-title>
          <source>BMC Med Inform Decis Mak</source>
          <year>2016</year>
          <month>02</month>
          <day>06</day>
          <volume>16</volume>
          <fpage>16</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-016-0258-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12911-016-0258-7</pub-id>
          <pub-id pub-id-type="medline">26851941</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12911-016-0258-7</pub-id>
          <pub-id pub-id-type="pmcid">PMC4744448</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Costa</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Yelshyna</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Moreira</surname>
              <given-names>TC</given-names>
            </name>
            <name name-style="western">
              <surname>Andrade</surname>
              <given-names>FC</given-names>
            </name>
            <name name-style="western">
              <surname>Julián</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Novais</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>A legal framework for an elderly healthcare platform: a privacy and data protection overview</article-title>
          <source>Comput Law Secur Rev</source>
          <year>2017</year>
          <month>10</month>
          <volume>33</volume>
          <issue>5</issue>
          <fpage>647</fpage>
          <lpage>58</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.clsr.2017.03.021"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.clsr.2017.03.021</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jin</surname>
              <given-names>MX</given-names>
            </name>
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>SY</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>LJ</given-names>
            </name>
            <name name-style="western">
              <surname>Behari</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Correa</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Telemedicine: current impact on the future</article-title>
          <source>Cureus</source>
          <year>2020</year>
          <month>08</month>
          <day>20</day>
          <volume>12</volume>
          <issue>8</issue>
          <fpage>e9891</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32968557"/>
          </comment>
          <pub-id pub-id-type="doi">10.7759/cureus.9891</pub-id>
          <pub-id pub-id-type="medline">32968557</pub-id>
          <pub-id pub-id-type="pmcid">PMC7502422</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref89">
        <label>89</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Garzo</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Garay-Vitoria</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Ethical and legal implications for technological devices in clinical research in Europe: flowchart design for ethical and legal decisions in clinical research</article-title>
          <source>Proceedings of the XXI International Conference on Human Computer Interaction</source>
          <year>2021</year>
          <conf-name>Interacción '21</conf-name>
          <conf-date>September 22-24, 2021</conf-date>
          <conf-loc>Málaga, Spain</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3471391.3471403</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref90">
        <label>90</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ross</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Bosman</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Geballa-Koukoula</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Elliott</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Nielen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rafferty</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Salentijn</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Best practices and current implementation of emerging smartphone-based (bio)sensors – part 1: data handling and ethics</article-title>
          <source>TrAC Trend Anal Chem</source>
          <year>2023</year>
          <month>01</month>
          <volume>158</volume>
          <fpage>116863</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.trac.2022.116863"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.trac.2022.116863</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref91">
        <label>91</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ryu</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Book Review: mHealth: new horizons for health through mobile technologies: based on the findings of the second global survey on eHealth (Global Observatory for eHealth Series, Volume 3)</article-title>
          <source>Healthc Inform Res</source>
          <year>2012</year>
          <volume>18</volume>
          <issue>3</issue>
          <fpage>231</fpage>
          <lpage>3</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3483482/"/>
          </comment>
          <pub-id pub-id-type="doi">10.4258/hir.2012.18.3.231</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref92">
        <label>92</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ambrosino</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Vitacca</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dreher</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Isetta</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Montserrat</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Tonia</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Turchetti</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Winck</surname>
              <given-names>JC</given-names>
            </name>
            <name name-style="western">
              <surname>Burgos</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Kampelmacher</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Vagheggini</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Tele-monitoring of ventilator-dependent patients: a European Respiratory Society statement</article-title>
          <source>Eur Respir J</source>
          <year>2016</year>
          <month>09</month>
          <volume>48</volume>
          <issue>3</issue>
          <fpage>648</fpage>
          <lpage>63</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://erj.ersjournals.com/cgi/pmidlookup?view=long&amp;pmid=27390283"/>
          </comment>
          <pub-id pub-id-type="doi">10.1183/13993003.01721-2015</pub-id>
          <pub-id pub-id-type="medline">27390283</pub-id>
          <pub-id pub-id-type="pii">13993003.01721-2015</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref93">
        <label>93</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Demiris</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Hensel</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>“Smart homes” for patients at the end of life</article-title>
          <source>J Housing Elder</source>
          <year>2009</year>
          <month>02</month>
          <day>20</day>
          <volume>23</volume>
          <issue>1-2</issue>
          <fpage>106</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1080/02763890802665049</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref94">
        <label>94</label>
        <nlm-citation citation-type="web">
          <article-title>Cognitive impairment: a call for action, now!</article-title>
          <source>Centers for Disease Control and Prevention</source>
          <access-date>2024-03-19</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.cdc.gov/aging/pdf/cognitive_impairment/cogimp_poilicy_final.pdf">http://www.cdc.gov/aging/pdf/cognitive_impairment/cogimp_poilicy_final.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref95">
        <label>95</label>
        <nlm-citation citation-type="web">
          <article-title>Sample informed consent language library: describing technologies used in research</article-title>
          <source>Harvard Catalyst</source>
          <access-date>2023-10-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://catalyst.harvard.edu/publications-documents/sample-informed-consent-language-library-describing-technologies-used-in-research/">https://catalyst.harvard.edu/publications-documents/sample-informed-consent-language-library-describing-technologies-used-in-research/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref96">
        <label>96</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Whitney</surname>
              <given-names>SN</given-names>
            </name>
            <name name-style="western">
              <surname>McGuire</surname>
              <given-names>AL</given-names>
            </name>
            <name name-style="western">
              <surname>McCullough</surname>
              <given-names>LB</given-names>
            </name>
          </person-group>
          <article-title>A typology of shared decision making, informed consent, and simple consent</article-title>
          <source>Ann Intern Med</source>
          <year>2004</year>
          <month>01</month>
          <day>06</day>
          <volume>140</volume>
          <issue>1</issue>
          <fpage>54</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.7326/0003-4819-140-1-200401060-00012</pub-id>
          <pub-id pub-id-type="medline">14706973</pub-id>
          <pub-id pub-id-type="pii">140/1/54</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref97">
        <label>97</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sanchez</surname>
              <given-names>VG</given-names>
            </name>
            <name name-style="western">
              <surname>Pfeiffer</surname>
              <given-names>CF</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Novais</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Konomi</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Legal aspects on smart house welfare technology for older people in Norway</article-title>
          <source>Intelligent Environments</source>
          <year>2016</year>
          <publisher-loc>Amsterdam, The Netherlands</publisher-loc>
          <publisher-name>IOS Press</publisher-name>
          <fpage>125</fpage>
          <lpage>34</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref98">
        <label>98</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mosca</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Such</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>McBurney</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Value-driven collaborative privacy decision making</article-title>
          <source>King's College London</source>
          <year>2019</year>
          <access-date>2024-03-19</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://nms.kcl.ac.uk/hasp/pubs/Value_driven_Collaborative_Decision_Making__Privacy_Application__PAL2019_.pdf">https://nms.kcl.ac.uk/hasp/pubs/Value_driven_Collaborative_Decision_Making__Privacy_Application__PAL2019_.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref99">
        <label>99</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Reasonable expectations of privacy and disclosure of health data</article-title>
          <source>Med Law Rev</source>
          <year>2019</year>
          <month>08</month>
          <day>01</day>
          <volume>27</volume>
          <issue>3</issue>
          <fpage>432</fpage>
          <lpage>60</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/31220873"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/medlaw/fwz009</pub-id>
          <pub-id pub-id-type="medline">31220873</pub-id>
          <pub-id pub-id-type="pii">5479980</pub-id>
          <pub-id pub-id-type="pmcid">PMC6743819</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref100">
        <label>100</label>
        <nlm-citation citation-type="web">
          <article-title>Shared decision making</article-title>
          <source>National Institute for Health and Care Excellence</source>
          <year>2021</year>
          <month>6</month>
          <day>17</day>
          <access-date>2023-10-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nice.org.uk/guidance/ng197">https://www.nice.org.uk/guidance/ng197</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref101">
        <label>101</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wilkins</surname>
              <given-names>RG</given-names>
            </name>
          </person-group>
          <article-title>Defining the "reasonable expectation of privacy": an emerging tripartite analysis</article-title>
          <source>Vanderbilt Law Rev</source>
          <year>1987</year>
          <volume>40</volume>
          <issue>5</issue>
          <fpage>1077</fpage>
          <pub-id pub-id-type="doi">10.4135/9781452234243.n643</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref102">
        <label>102</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kent</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Shared understandings for informed consent: the relevance of psychological research on the provision of information</article-title>
          <source>Soc Sci Med</source>
          <year>1996</year>
          <month>11</month>
          <volume>43</volume>
          <issue>10</issue>
          <fpage>1517</fpage>
          <lpage>23</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/0277-9536(96)00173-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/0277-9536(96)00173-6</pub-id>
          <pub-id pub-id-type="medline">8923623</pub-id>
          <pub-id pub-id-type="pii">0277953696001736</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref103">
        <label>103</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Holden</surname>
              <given-names>JD</given-names>
            </name>
          </person-group>
          <article-title>Hawthorne effects and research into professional practice</article-title>
          <source>J Eval Clin Pract</source>
          <year>2001</year>
          <month>02</month>
          <day>07</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>65</fpage>
          <lpage>70</lpage>
          <pub-id pub-id-type="doi">10.1046/j.1365-2753.2001.00280.x</pub-id>
          <pub-id pub-id-type="medline">11240840</pub-id>
          <pub-id pub-id-type="pii">jep280</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref104">
        <label>104</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>DU</given-names>
            </name>
            <name name-style="western">
              <surname>Perry</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Kaufman</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Effects of a mirror on young children's transgression in a gift-delay task</article-title>
          <source>Br J Dev Psychol</source>
          <year>2020</year>
          <month>06</month>
          <day>27</day>
          <volume>38</volume>
          <issue>2</issue>
          <fpage>205</fpage>
          <lpage>18</lpage>
          <pub-id pub-id-type="doi">10.1111/bjdp.12312</pub-id>
          <pub-id pub-id-type="medline">31774193</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref105">
        <label>105</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barth</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>de Jong</surname>
              <given-names>MD</given-names>
            </name>
          </person-group>
          <article-title>The privacy paradox – Investigating discrepancies between expressed privacy concerns and actual online behavior – A systematic literature review</article-title>
          <source>Telemat Inform</source>
          <year>2017</year>
          <month>11</month>
          <volume>34</volume>
          <issue>7</issue>
          <fpage>1038</fpage>
          <lpage>58</lpage>
          <pub-id pub-id-type="doi">10.1016/j.tele.2017.04.013</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref106">
        <label>106</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Norberg</surname>
              <given-names>PA</given-names>
            </name>
            <name name-style="western">
              <surname>Horne</surname>
              <given-names>DR</given-names>
            </name>
            <name name-style="western">
              <surname>Horne</surname>
              <given-names>DA</given-names>
            </name>
          </person-group>
          <article-title>The privacy paradox: personal information disclosure intentions versus behaviors</article-title>
          <source>J Consum Affairs</source>
          <year>2007</year>
          <month>03</month>
          <day>06</day>
          <volume>41</volume>
          <issue>1</issue>
          <fpage>100</fpage>
          <lpage>26</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1745-6606.2006.00070.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref107">
        <label>107</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Balakrishnan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Dwivedi</surname>
              <given-names>YK</given-names>
            </name>
          </person-group>
          <article-title>Role of cognitive absorption in building user trust and experience</article-title>
          <source>Psychol Mark</source>
          <year>2021</year>
          <month>02</month>
          <day>24</day>
          <volume>38</volume>
          <issue>4</issue>
          <fpage>643</fpage>
          <lpage>68</lpage>
          <pub-id pub-id-type="doi">10.1002/mar.21462</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref108">
        <label>108</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ghosh</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Using cognitive dissonance theory to understand privacy behavior</article-title>
          <source>Proc Assoc Inf Sci Technol</source>
          <year>2017</year>
          <month>10</month>
          <day>24</day>
          <volume>54</volume>
          <issue>1</issue>
          <fpage>679</fpage>
          <lpage>81</lpage>
          <pub-id pub-id-type="doi">10.1002/pra2.2017.14505401114</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref109">
        <label>109</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Krokstad</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Langhammer</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hveem</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Holmen</surname>
              <given-names>TL</given-names>
            </name>
            <name name-style="western">
              <surname>Midthjell</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Stene</surname>
              <given-names>TR</given-names>
            </name>
            <name name-style="western">
              <surname>Bratberg</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Heggland</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Holmen</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Cohort Profile: the HUNT Study, Norway</article-title>
          <source>Int J Epidemiol</source>
          <year>2013</year>
          <month>08</month>
          <volume>42</volume>
          <issue>4</issue>
          <fpage>968</fpage>
          <lpage>77</lpage>
          <pub-id pub-id-type="doi">10.1093/ije/dys095</pub-id>
          <pub-id pub-id-type="medline">22879362</pub-id>
          <pub-id pub-id-type="pii">dys095</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref110">
        <label>110</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McCarney</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Warner</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Iliffe</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>van Haselen</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Griffin</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Fisher</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>The Hawthorne Effect: a randomised, controlled trial</article-title>
          <source>BMC Med Res Methodol</source>
          <year>2007</year>
          <month>07</month>
          <day>03</day>
          <volume>7</volume>
          <fpage>30</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedresmethodol.biomedcentral.com/articles/10.1186/1471-2288-7-30"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/1471-2288-7-30</pub-id>
          <pub-id pub-id-type="medline">17608932</pub-id>
          <pub-id pub-id-type="pii">1471-2288-7-30</pub-id>
          <pub-id pub-id-type="pmcid">PMC1936999</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
