<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JD</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Diabetes</journal-id>
      <journal-title>JMIR Diabetes</journal-title>
      <issn pub-type="epub">2371-4379</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v6i1e16146</article-id>
      <article-id pub-id-type="pmid">33439129</article-id>
      <article-id pub-id-type="doi">10.2196/16146</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Analysis of Diabetes Apps to Assess Privacy-Related Permissions: Systematic Search of Apps</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Zowalla</surname>
            <given-names>Richard</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Klein</surname>
            <given-names>Gunnar</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Zhou</surname>
            <given-names>Leming</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>Flors-Sidro</surname>
            <given-names>José Javier</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6464-1753</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Househ</surname>
            <given-names>Mowafa</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3648-6271</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Abd-Alrazaq</surname>
            <given-names>Alaa</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <address>
            <institution>Division of Information and Computing Technology</institution>
            <institution>College of Science and Engineering</institution>
            <institution>Hamad Bin Khalifa University</institution>
            <addr-line>Education City</addr-line>
            <addr-line>Doha, </addr-line>
            <country>Qatar</country>
            <phone>974 55708549</phone>
            <email>aabdalrazaq@hbku.edu.qa</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7695-4626</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Vidal-Alaball</surname>
            <given-names>Josep</given-names>
          </name>
          <degrees>MD, MPH, PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3527-4242</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Fernandez-Luque</surname>
            <given-names>Luis</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff5" ref-type="aff">5</xref>
          <xref rid="aff6" ref-type="aff">6</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8165-9904</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Sanchez-Bocanegra</surname>
            <given-names>Carlos Luis</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff7" ref-type="aff">7</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-7033-5971</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Information Systems Department</institution>
        <institution>Consorci Hospitalari Provincial de Castelló</institution>
        <addr-line>Castelló de la Plana</addr-line>
        <country>Spain</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Division of Information and Computing Technology</institution>
        <institution>College of Science and Engineering</institution>
        <institution>Hamad Bin Khalifa University</institution>
        <addr-line>Doha</addr-line>
        <country>Qatar</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Health Promotion in Rural Areas Research Group</institution>
        <institution>Gerència Territorial de la Catalunya Central</institution>
        <institution>Institut Català de la Salut</institution>
        <addr-line>Sant Fruitós de Bages</addr-line>
        <country>Spain</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Unitat de Suport a la Recerca de la Catalunya Central</institution>
        <institution>Fundació Institut Universitari per a la recerca a l'Atenció Primària de Salut Jordi Gol i Gurina</institution>
        <addr-line>Sant Fruitós de Bages</addr-line>
        <country>Spain</country>
      </aff>
      <aff id="aff5">
        <label>5</label>
        <institution>Salumedia Labs</institution>
        <addr-line>Sevilla</addr-line>
        <country>Spain</country>
      </aff>
      <aff id="aff6">
        <label>6</label>
        <institution>Adhera Health Inc</institution>
        <addr-line>Palo Alto, CA</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff7">
        <label>7</label>
        <institution>Faculty of Health Sciences</institution>
        <institution>Universitat Oberta de Catalunya</institution>
        <addr-line>Barcelona</addr-line>
        <country>Spain</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Alaa Abd-Alrazaq <email>aabdalrazaq@hbku.edu.qa</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <season>Jan-Mar</season>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>13</day>
        <month>1</month>
        <year>2021</year>
      </pub-date>
      <volume>6</volume>
      <issue>1</issue>
      <elocation-id>e16146</elocation-id>
      <history>
        <date date-type="received">
          <day>18</day>
          <month>9</month>
          <year>2019</year>
        </date>
        <date date-type="rev-request">
          <day>19</day>
          <month>12</month>
          <year>2019</year>
        </date>
        <date date-type="rev-recd">
          <day>3</day>
          <month>5</month>
          <year>2020</year>
        </date>
        <date date-type="accepted">
          <day>29</day>
          <month>7</month>
          <year>2020</year>
        </date>
      </history>
      <copyright-statement>©José Javier Flors-Sidro, Mowafa Househ, Alaa Abd-Alrazaq, Josep Vidal-Alaball, Luis Fernandez-Luque, Carlos Luis Sanchez-Bocanegra. Originally published in JMIR Diabetes (http://diabetes.jmir.org), 13.01.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Diabetes, is properly cited. The complete bibliographic information, a link to the original publication on http://diabetes.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://diabetes.jmir.org/2021/1/e16146/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Mobile health has become a major vehicle of support for people living with diabetes. Accordingly, the availability of mobile apps for diabetes has been steadily increasing. Most of the previous reviews of diabetes apps have focused on the apps’ features and their alignment with clinical guidelines. However, there is a lack of knowledge on the actual compliance of diabetes apps with privacy and data security guidelines.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The aim of this study was to assess the levels of privacy of mobile apps for diabetes to contribute to the raising of awareness of privacy issues for app users, developers, and governmental data protection regulators.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We developed a semiautomatic app search module capable of retrieving Android apps’ privacy-related information, particularly the dangerous permissions required by apps, with the aim of analyzing privacy aspects related to diabetes apps. Following the research selection criteria, the original 882 apps were narrowed down to 497 apps that were included in the analysis.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Approximately 60% of the analyzed diabetes apps requested potentially dangerous permissions, which pose a significant risk to users’ data privacy. In addition, 28.4% (141/497) of the apps did not provide a website for their privacy policy. Moreover, it was found that 40.0% (199/497) of the apps contained advertising, and some apps that claimed not to contain advertisements actually did. Ninety-five percent of the apps were free, and those belonging to the “medical” and “health and fitness” categories were the most popular. However, app users do not always realize that the free apps’ business model is largely based on advertising and, consequently, on sharing or selling their private data, either directly or indirectly, to unknown third parties.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>The aforementioned findings confirm the necessity of educating patients and health care providers and raising their awareness regarding the privacy aspects of diabetes apps. Therefore, this research recommends properly and comprehensively training users, ensuring that governments and regulatory bodies enforce strict data protection laws, devising much tougher security policies and protocols in Android and in the Google Play Store, and implicating and supervising all stakeholders in the apps’ development process.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>diabetes mellitus</kwd>
        <kwd>privacy</kwd>
        <kwd>mobile apps</kwd>
        <kwd>dangerous permissions</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Diabetes mellitus (DM) is one of the most common chronic conditions around the globe. The number of people with DM has risen globally from 108 million in 1980 to 422 million in 2014 [<xref ref-type="bibr" rid="ref1">1</xref>]. Its prevalence has been increasing everywhere, especially in middle-income countries, from 4.7% in 1980 to 8.5% in 2014. DM increases the risk of serious health problems such as myocardial infarction, renal failure, stroke, and lower limb amputation [<xref ref-type="bibr" rid="ref2">2</xref>]. Diabetic retinopathy is one of the most important causes of blindness worldwide, especially in developed countries [<xref ref-type="bibr" rid="ref3">3</xref>]. DM has also been linked to an increased risk of other conditions such as dementia, depression, and some types of cancer [<xref ref-type="bibr" rid="ref4">4</xref>]. In order to reduce the risk of complications, intensive patient education and support are needed, which can be enhanced by the use of mobile technology.</p>
        <p>Along with the exponential increase in the number of health apps [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref6">6</xref>], in particular the number of diabetes apps has increased significantly in the last several years [<xref ref-type="bibr" rid="ref7">7</xref>]. Mobile health (mHealth) has become a major vehicle of support for people living with diabetes, and the availability of mobile apps for diabetes has been steadily increasing. Most of the previous reviews of diabetes apps have focused on their features and their alignment with clinical guidelines [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref9">9</xref>]. However, there is a lack of knowledge on the actual compliance of diabetes apps with privacy and data security guidelines.</p>
        <p>Therefore, there is a growing concern to review diabetes apps because in many cases they do not possess the quality and content that they should according to their own declared purposes [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. In addition, some studies that have investigated the effectiveness of mobile apps clearly demonstrate data privacy problems [<xref ref-type="bibr" rid="ref12">12</xref>], as well as a lack of transparency with the provided information [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
        <p>Studies on mHealth and privacy have raised some serious concerns in recent years. Because very sensitive information is increasingly accessed and shared using mobile apps, there is an obvious need for clinicians, software developers, users, and patients to be aware of and trained on information privacy aspects. Personal data may be collected through different means, such as being entered directly by the user or being recorded by the phone’s camera, microphone, or paired wireless device (eg, Bluetooth glucometer apps). It is crucial to note that the treatment of these critical data demands a special approach regarding security and privacy. However, some apps do not even provide information regarding their privacy policies. In some instances, these privacy terms are difficult to understand by nontechnical users, and some privacy policies may even be regarded as abusive. To make matters worse, the ecosystem of mobile apps is so complex that even app developers and users may not know with whom the data is being shared and for what purpose [<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref16">16</xref>].</p>
        <p>An additional challenge is that very often stakeholders are not involved in the app development process and consequently cannot provide feedback on privacy preferences [<xref ref-type="bibr" rid="ref10">10</xref>].</p>
        <p>To deal with these issues, some researchers such as Stoyanov et al [<xref ref-type="bibr" rid="ref17">17</xref>] have attempted to develop a suitable framework—the Mobile App Rating Scale—that allows for the evaluation of the quality of apps. Alternatively, other investigations have focused specifically on privacy or legal issues [<xref ref-type="bibr" rid="ref18">18</xref>]. In the case of mHealth for diabetes, recent reviews looked into aspects linked to the efficacy of interventions [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref20">20</xref>] but did not address aspects related to privacy. Other research has investigated privacy aspects in generic mHealth apps [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. However, to the best of our knowledge, this study is the first to focus on investigating privacy issues and dangerous permissions in diabetes mobile apps. Studies looking at diabetes apps have not conducted in-depth analyses of dangerous permissions on the Android platform [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
      </sec>
      <sec>
        <title>Objectives</title>
        <p>The aim of this study was to evaluate the privacy-related permissions of Android diabetes apps in Google's Play Store using a semiautomatic approach that relies on the extraction of privacy-related features (eg, permissions, terms of usage). This approach was designed to assist in identifying strategies to raise the awareness of app users, patients, and clinicians. To illustrate our approach, we provide two case studies of diabetes apps that were comprehensively analyzed (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>).</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Study Design</title>
        <p>The first step in this study was the extraction of metadata from mobile apps’ metadata using a web-based application programming interface (API) [<xref ref-type="bibr" rid="ref23">23</xref>]. We used the platform 42Matters, which offers a web-based commercial tool that facilitates access to the Android Google Play Store and to other mobile platforms’ apps’ metadata through a proprietary API [<xref ref-type="bibr" rid="ref24">24</xref>]. Searches were conducted with the developed script module 42Matters’ index of Android apps. Since the 42Matters platform did not allow the extraction of privacy-related permissions from Apple’s App Store, the research centered on Android apps from Google’s Play Store. Data extraction was focused on potentially dangerous permissions [<xref ref-type="bibr" rid="ref25">25</xref>] that allow the requesting app access to private user data or control over the mobile device, both of which can negatively impact the user. Because this type of permission introduces potential risk, the system does not automatically grant it to the requesting app. Our methodology was based on similar studies of health apps that used the 42Matters platform, but focusing on privacy-related information [<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref27">27</xref>].</p>
        <p>In order to complement the quantitative results already presented, we described and investigated two very popular and well-rated diabetes apps (presented in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>) from a qualitative perspective.</p>
        <p>For the extraction of the diabetes apps’ metadata, we first devised the architecture [<xref ref-type="bibr" rid="ref28">28</xref>] and subsequently developed the corresponding software module for the automatic extraction of mobile app metadata using the web-based API of 42Matters. The output of this module is a data set stored locally in a comma-separated values (CSV) file. The source code for the module was released under the GNU AGPLv3 license and can be found on the GitHub link [<xref ref-type="bibr" rid="ref29">29</xref>]. This module is capable of querying the API of the 42Matters platform to retrieve metadata related to diabetes apps, including the Android permissions required by the apps. The module was designed to extract apps with the following search parameters: (1) language (we searched for English-language apps), (2) keyword search (we searched for apps whose titles included the root words “diabet” and “mellitus”), and (3) app categories (we selected the categories medical, health and fitness, lifestyle, and education).</p>
        <p>The resulting apps were manually reviewed (see <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>) to assess whether they were related to diabetes. All apps were related to diabetes, but we did not address the quality of their content. As explained in the “Limitations” section, choosing a method where search fields matched the description—and not only the title—would have resulted in more apps, many of which would not have been related to diabetes.</p>
        <p>Once the most suitable app categories were identified, it was then possible to move on to design the entire app selection process, which consisted of the following steps (see <xref rid="figure1" ref-type="fig">Figure 1</xref>):</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>App selection process flowchart.</p>
          </caption>
          <graphic xlink:href="diabetes_v6i1e16146_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <list list-type="bullet">
          <list-item>
            <p>Step 1: “Identification” phase—all of the diabetes apps that contained the root words “diabet” or “mellitus” in an app’s title field were selected, resulting in 882 apps; by matching diabet or mellitus, it was possible to ensure that any relevant potential variations of the words that contained these root words (ie, diabetes, diabetic, diabetics, mellitus, etc) were included in the search.</p>
          </list-item>
          <list-item>
            <p>Step 2: “Category filtering” phase—in order to guarantee that only relevant diabetes apps were included in the study, all the retrieved apps that did not belong to the medical, health and fitness, education, or lifestyle categories [<xref ref-type="bibr" rid="ref30">30</xref>] were automatically filtered out by the 42Matters script module and excluded from the study; this filtering resulted in 732 apps.</p>
          </list-item>
          <list-item>
            <p>Step 3: “Screening” phase—in this phase, we manually filtered apps and excluded 5 diabetes apps related to pets, 1 discontinued app, and 55 duplicated apps; this screening resulted in 671 apps.</p>
          </list-item>
          <list-item>
            <p>Step 4: “Eligibility” phase—we excluded apps that did not have a minimum of 50 downloads, and therefore discarded 174 apps.</p>
          </list-item>
          <list-item>
            <p>Step 5: “Inclusion” phase—the resulting 497 apps were analyzed, which were the objects of analysis of this research.</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Data Extraction: Retrieved Metadata Fields</title>
        <p>After the final set of apps was selected in June 2019, a process was initiated to extract all the relevant metadata and information, which were stored in a CSV file. All the retrieved fields are described in the table below.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Description of apps’ retrieved metadata as provided by 42Matters.</p>
          </caption>
          <table border="1" rules="groups" cellpadding="5" frame="hsides" width="1000" cellspacing="0">
            <thead>
              <tr valign="top">
                <td>App’s metadata field</td>
                <td>Description</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Title</td>
                <td>Main name of the app</td>
              </tr>
              <tr valign="top">
                <td>Price</td>
                <td>Price and currency (0 if it was free)</td>
              </tr>
              <tr valign="top">
                <td>Permission</td>
                <td>Required Android permissions of the app</td>
              </tr>
              <tr valign="top">
                <td>Rating</td>
                <td>App’s average rating from 0 to 5 (0=worst, 5=best)</td>
              </tr>
              <tr valign="top">
                <td>Number of downloads</td>
                <td>Number of times the app was downloaded</td>
              </tr>
              <tr valign="top">
                <td>Number of ratings</td>
                <td>Number of times the app was rated</td>
              </tr>
              <tr valign="top">
                <td>Contains advertising</td>
                <td>True if the app contained advertising and false if it did not</td>
              </tr>
              <tr valign="top">
                <td>Category</td>
                <td>Category to which the app belonged (medical, health and fitness, education, or lifestyle)</td>
              </tr>
              <tr valign="top">
                <td>Short description</td>
                <td>Short description of the app’s declared purpose</td>
              </tr>
              <tr valign="top">
                <td>Website</td>
                <td>Website of the app</td>
              </tr>
              <tr valign="top">
                <td>Privacy policy</td>
                <td>Website showing the app’s privacy policy</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Extraction of Android Privacy-Related Permissions</title>
        <p>Starting with Android 6.0 (API 23 level), users grant permissions to apps while using them, not when an app is installed. On the one hand, this approach simplifies the process of installing the app because the user does not need to grant permissions when installing or updating the app. In addition, it provides the user with more control over the app’s functionalities because users can revoke the granted permissions from the app’s configuration screen at any time. On the other hand, this new approach complicates the app’s usability because dangerous permissions have to be granted while using the app, which poses an additional challenge for untrained users. Android distinguishes between 4 categories of permissions: normal, signature, dangerous, and special [<xref ref-type="bibr" rid="ref31">31</xref>].</p>
        <p>Signature and special permissions will not be explained here because they are rarely used and were not found in any of the apps included in our research. The most frequently requested permissions are normal and dangerous permissions. If an app declares a normal permission in its manifest, the system grants permission to it automatically without the user’s intervention. On the other hand, Android considers dangerous permissions as critical because they allow apps to access users’ critical data. More concretely, an Android dangerous permission [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref32">32</xref>] allows the requesting app access to private user data or control over the mobile device. Because this type of permission allows developers to access users’ data, photos, and videos stored on the device, it introduces potential risk, and the system does not automatically grant it to the requesting app [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>].</p>
        <p>In brief, normal permissions do not put the user’s privacy at risk directly. Consequently, if an app declares a normal permission in its metadata, the system grants permission to it automatically without the user’s intervention. On the other hand, a dangerous permission allows an app to access the user’s critical data, and consequently the user should explicitly authorize this permission [<xref ref-type="bibr" rid="ref35">35</xref>]. The 10 most required dangerous permissions found in this research are shown in <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>App Functions</title>
        <p>The process described in the “Methods” section retrieved a total of 497 apps (<xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>). The breakdown of privacy-related permissions is summarized in <xref ref-type="table" rid="table2">Table 2</xref>. Most of the apps required at least one dangerous permission.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Summary of the privacy-related main features of retrieved diabetes apps.</p>
          </caption>
          <table border="1" rules="groups" cellpadding="5" frame="hsides" width="1000" cellspacing="0">
            <thead>
              <tr valign="top">
                <td>Assessed parameter</td>
                <td>Diabetes apps (N=497), n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Does not require any permissions (either normal or dangerous)</td>
                <td>89 (17.9)</td>
              </tr>
              <tr valign="top">
                <td>Only requires normal permissions</td>
                <td>111 (22.3)</td>
              </tr>
              <tr valign="top">
                <td>Requires at least one dangerous permission</td>
                <td>297 (59.8)</td>
              </tr>
              <tr valign="top">
                <td>Does not provide a website link to its privacy policy</td>
                <td>141 (28.4)</td>
              </tr>
              <tr valign="top">
                <td>Contains advertising</td>
                <td>199 (40.0)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>The reason for apps not requesting any permissions is that they serve very basic functions (eg, calculators, logs, diaries, etc) that only need access to very basic and noncritical Android resources. Only 22.3% (111/497) of the apps required normal (noncritical) permissions alone. On the other hand, 59.8% (297/497) of the apps required at least one dangerous permission. This might be partially justified by these apps’ more advanced functionalities (eg, doctor-patient interaction, connecting to a glucometer, calorie-burning calculation, scanning the barcode of diabetic food, etc).</p>
        <p>Regarding privacy, it was worrying to discover that 28.4% (141/497) of the apps did not return the privacy policy metadata field, consequently posing additional difficulty for users to adequately understand how these apps would treat very sensitive personal information.</p>
        <p>Finally, 40.0% (199/497) of the apps contained advertising, which can imply the sharing of critical personal data (eg, a user’s precise location) with unknown third parties for geolocated advertisement. Consequently, because the advertising business model in the mobile ecosystem is usually linked to the sharing or selling of critical personal data [<xref ref-type="bibr" rid="ref36">36</xref>], the aforementioned findings unquestionably confirm the necessity to educate users and raise awareness regarding user privacy in diabetes apps.</p>
      </sec>
      <sec>
        <title>Dangerous Permissions</title>
        <p>As explained below, dangerous permissions refer to permissions that might lead to data breaches of private information [<xref ref-type="bibr" rid="ref37">37</xref>]. From the 497 diabetes apps included in our final analysis, a substantial number of them—297 (59.8%)—required dangerous permissions. <xref ref-type="table" rid="table3">Table 3</xref> shows, in decreasing order, which dangerous permissions were most frequently requested by the apps.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Summary results of apps with the requested privacy-related permissions.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="500"/>
            <col width="500"/>
            <thead>
              <tr valign="top">
                <td>Dangerous permission</td>
                <td>Diabetes apps that requested it (N=497), n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Write external storage</td>
                <td>272 (54.7)</td>
              </tr>
              <tr valign="top">
                <td>Read external storage</td>
                <td>169 (34.0)</td>
              </tr>
              <tr valign="top">
                <td>Access coarse location</td>
                <td>103 (20.7)</td>
              </tr>
              <tr valign="top">
                <td>Access fine location</td>
                <td>95 (19.1)</td>
              </tr>
              <tr valign="top">
                <td>Camera</td>
                <td>89 (17.9)</td>
              </tr>
              <tr valign="top">
                <td>Get accounts</td>
                <td>82 (16.5)</td>
              </tr>
              <tr valign="top">
                <td>Read phone state</td>
                <td>81 (16.3)</td>
              </tr>
              <tr valign="top">
                <td>Record audio</td>
                <td>39 (7.8)</td>
              </tr>
              <tr valign="top">
                <td>Call phone</td>
                <td>23 (4.6)</td>
              </tr>
              <tr valign="top">
                <td>Read contacts</td>
                <td>22 (4.4)</td>
              </tr>
              <tr valign="top">
                <td>Others (the sum of the remaining dangerous permissions)</td>
                <td>28 (5.6)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>In addition, <xref rid="figure2" ref-type="fig">Figure 2</xref> illustrates the number of apps that required each of the top 14 dangerous permissions, arranged by category. The four quadrants represent each of the four categories to which the apps belonged: education, health and fitness, medical, and lifestyle. In addition, the “Advertising” tag indicates whether an app contained advertising: the ones in blue contained advertising, while the ones in red did not. The x-axis shows the number of apps, while the y-axis lists the 14 most requested dangerous permissions.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>The top 14 dangerous permissions by app category (lifestyle, medical, education, and health and fitness) and type of privacy-related permission requested, as well as whether they included advertising (“True”) or not (“False”).</p>
          </caption>
          <graphic xlink:href="diabetes_v6i1e16146_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Results and Comparison With Previous Work</title>
        <p>Although we identified the apps requesting access to the camera (89/497, 17.9%), we need to study the actual usage of apps in order to fully understand the context before we consider that access to be a potential risk. For instance, in the case of diabetes, it is very common to use the camera for food logging. On the other hand, except for advertising or fitness tracking (eg, calorie counting), the need for the user’s geolocation data seems difficult to justify. In this sense, what might be acceptable in one app might not be reasonable in others. Similar studies found that 77 of 186 (41.4%) permissions requested by 58 popular German mHealth apps were not related in any way to the apps’ functionalities [<xref ref-type="bibr" rid="ref38">38</xref>]. Moreover, 15 of 42 (35.7%) Android health and well-being apps accredited by the UK’s NHS Health Apps Library requested critical permissions for unjustifiable reasons [<xref ref-type="bibr" rid="ref12">12</xref>]. Similarly, other research concluded that several popular mental health apps and mHealth apps requested permissions that were not aligned with the apps’ stated purposes [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. One of the consequences of requesting unnecessary dangerous permissions is a decrease in users’ trust, acceptance, and use of these apps.</p>
        <p>Another finding of this study was that 95.4% of the apps were free of charge. The business model of free apps is, in most cases, based on advertising (through services such as Google AdMob), resulting in the disclosure of users’ critical data, either directly (through the app itself) or indirectly (through Google’s commercial advertising platforms).</p>
        <p>The reliance on advertising of some of the studied apps might be linked to the high number of apps requesting geolocation, since location can increase advertisement revenue. A study on NHS-accredited apps found some evidence that patients’ data were information for advertisers [<xref ref-type="bibr" rid="ref12">12</xref>]. Other studies also found that users’ information was shared in 19 of 24 popular medication-related apps in the United Kingdom, the United States, Canada, and Australia [<xref ref-type="bibr" rid="ref39">39</xref>]. Research of privacy in the top 36 mental health and smoking cessation apps also found a lack of compliance with disclosing or sending data to third-party providers [<xref ref-type="bibr" rid="ref40">40</xref>]. Although app developers usually claim that they do not collect or share personally identifiable data, users can be easily identified by correlating advertising services using data analytics [<xref ref-type="bibr" rid="ref39">39</xref>].</p>
        <p>In addition, 28.4% of the studied apps did not provide a privacy policy website, which corroborates results from other research that demonstrated that 48% of 17,991 free Android apps did not have a privacy policy [<xref ref-type="bibr" rid="ref18">18</xref>]. Building on this finding, 81% of 154 Android apps related to hypertension and diabetes did not refer to a privacy policy [<xref ref-type="bibr" rid="ref33">33</xref>]. In addition, a privacy policy was missing in 417 of 600 (69.5%) prominent mHealth apps [<xref ref-type="bibr" rid="ref41">41</xref>]. Most likely, had we not discarded less reliable apps in our research, the percentage of apps that did not provide a link to a website with their privacy policy would have been higher [<xref ref-type="bibr" rid="ref34">34</xref>]. The lack of a privacy policy is a critical fault, as it prevents users from properly understanding how apps treat their very sensitive personal information. Further, the discrepancy between apps’ privacy policies and their actual features has been reported in several studies [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref18">18</xref>]. This issue might be partially attributed to the fact that app developers have insufficient knowledge about privacy best practices [<xref ref-type="bibr" rid="ref42">42</xref>].</p>
        <p>In our study, 59.8% of apps required at least one dangerous permission, the two most requested being write external storage (54.7%) and read external storage (34.0%). This finding confirms the results from previous research. For instance, the most common dangerous permissions requested by the most popular freeware mHealth apps were write external storage (90%) and read external storage (50%) [<xref ref-type="bibr" rid="ref34">34</xref>]. For prominent mental health apps in the Google Play Store, the most frequently requested permissions were also write (73%) and read (73%) external storage. In addition, these two permissions were the most requested (79%) in medicine-related apps in the Google Play Store in the United Kingdom, the United States, Canada, and Australia [<xref ref-type="bibr" rid="ref38">38</xref>]. These permissions may indeed jeopardize users’ privacy because they allow developers to access users’ data, photos, and videos stored on the device [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. Another relevant finding was that health and fitness apps usually requested more dangerous permissions than apps belonging to other categories [<xref ref-type="bibr" rid="ref21">21</xref>].</p>
        <p>Apps’ ever-changing functionality and privacy policies, as well as their complexity, do not facilitate matters, either. Moreover, having to manually accept dangerous permissions when using an app poses an additional challenge that can have detrimental consequences, particularly for less knowledgeable users. For instance, individuals with low literacy rates or the elderly would require adequate training to truly understand what they are consenting to before using diabetes apps. Existing tools to evaluate eHealth literacy skills [<xref ref-type="bibr" rid="ref43">43</xref>] do include security awareness as one of their dimensions. However, the complexity of potential security issues is increasing, and it might be necessary to develop new tools and training methods for both patients and health care providers.</p>
      </sec>
      <sec>
        <title>Practical Implications</title>
        <p>These findings have very important practical implications for users, physicians, developers, and policy makers [<xref ref-type="bibr" rid="ref44">44</xref>,<xref ref-type="bibr" rid="ref45">45</xref>]. To select an appropriate mobile app for diabetes, end users should be aware of what type of personal data is collected, used, and shared by a certain app by carefully reading the app’s description, terms of use, and privacy policy.</p>
        <p>In addition, it is imperative to emphasize the need for training so that users are able to understand complex privacy policies and terms of service and are fully aware of the privacy risks derived from the sharing of their data with third parties. Users should also be knowledgeable about the different types of dangerous permissions so that they can discern how each particular permission may jeopardize their data. The ultimate goal is to empower users so that they can autonomously and proficiently deny access to any unjustifiable dangerous permission.</p>
        <p>To minimize the privacy risks derived from using diabetes apps, savvy users should use AdBlock or encryption apps [<xref ref-type="bibr" rid="ref33">33</xref>]. Moreover, health care providers should ensure that the apps they recommend to patients adhere to a strict privacy code, and they should assist users in selecting suitable apps by explaining both the apps’ benefits and their risks.</p>
        <p>App developers should enforce their apps’ full compliance with internationally recommended standards and practices [<xref ref-type="bibr" rid="ref46">46</xref>-<xref ref-type="bibr" rid="ref49">49</xref>]. Specifically, developers must ensure that their apps’ privacy policies are always readily available, very simple to read, and able to be understood by any user. Further, their apps should never request dangerous permissions not directly related to the apps’ declared purpose. Developers should not—without the users’ explicit consent—collect, use, or share user data for any purpose outside of the predefined scope of the app, and all data sharing practices should be transparently disclosed to users. Last but not least, developers should be aware of diverse privacy laws and data protection legislation, which differ greatly depending on the country or region of use.</p>
        <p>In terms of privacy laws, apps tend to adhere to the data protection legislation in the developers’ country of origin but not in the apps’ country of use. Therefore, regulators around the world should collaborate to establish a specific international accreditation program for diabetes apps. Such a program should be based on unified privacy best practices in which user privacy is the main priority. Because app developers reserve the right to change their privacy policies at any given time and modify their apps’ declared purpose and functionalities, regulators should regularly monitor developers’ adherence to the recommended privacy practices. As well, regulators should emphasize developers’ responsibility and accountability for protecting user data. In addition, app stores should mandate stringent principles and standards that actually compel developers to provide simple and intelligible privacy policies in their apps, especially taking into consideration untrained or illiterate users.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>We opted to use the free version of the commercial platform 42Matters instead of the Google Play Store because the Google Play Store had a limit of 250 apps per query.</p>
        <p>Another limitation was that the developed module exclusively searched for all diabetes apps that contained the root words diabet or mellitus in the title field. There are some diabetes apps in which the aforementioned root words appear in the app’s description but not in the app’s name. Therefore, some diabetes-related apps may have been excluded from the study. However, this criterion was selected for two principal reasons: (1) to ensure that only truly diabetes-related apps were retrieved, and (2) to make the best use of limited resources (there was neither enough time nor enough labor to thoroughly screen 4700+ apps, many of which bore no relation whatsoever to diabetes). In this sense, our research was not intended to be exhaustive. Rather, we wanted to quantify and evaluate the overall privacy characteristics of the most representative sample of diabetes-related apps. A broader search (ie, to query for all apps that contained the root words diabet or mellitus in the apps’ descriptions) would certainly have yielded many false positives of apps unrelated to diabetes and hence required a very resource-intensive manual screening of the apps, which would have been an unnecessary complication of the overall analysis process.</p>
        <p>The study did not comprehensively address either the fact that the number of permissions an app requests does not necessarily reflect how risky the app may be. For instance, an app requesting, unnecessarily, a single dangerous permission, could seriously endanger users’ personal data by collecting and illegitimately sharing them. On the other hand, an app requesting multiple dangerous permissions, but for valid technical or functional needs, could be considered safe. Therefore, the amount of personal information that users are putting at risk depends on many factors, such as the app’s functionality, the permissions it requests, and the context in which these permissions are being used [<xref ref-type="bibr" rid="ref50">50</xref>]. To perform a more complete assessment of apps’ privacy risks, additional technical, human, and contextual research (eg, analysis of the skills of patients using diabetes apps) should be conducted. For example, when dealing with privacy issues in health apps, an important factor to be considered would be the legitimacy of the request, as highlighted in a recent publication on mHealth apps for cancer in which the authors evaluated a new scale to assess the privacy policies of mHealth apps [<xref ref-type="bibr" rid="ref51">51</xref>]. Tracking users’ location might be fair in the case of reporting a medical emergency (eg, hypoglycemic crisis).</p>
        <p>Although the methodology employed in this research was robust and Google is continuously improving Android and the Play Store’s security policy, this study found evidence that it is extremely difficult to prove whether diabetes apps actually comply with their privacy policies. In fact, even Google cannot control the many malicious apps that are frequently uploaded by hackers in its Play Store and is consequently forced to periodically remove massive numbers of these fraudulent apps [<xref ref-type="bibr" rid="ref52">52</xref>-<xref ref-type="bibr" rid="ref54">54</xref>]. Further, a recently published two-year study discovered 2040 potential counterfeit apps that contained malware in the Google Play Store [<xref ref-type="bibr" rid="ref55">55</xref>].</p>
        <p>This study did not cover all of the elements related to the privacy and security of diabetes apps. Privacy protection cannot be guaranteed solely by controlling permissions; for instance, unsecure internet connections can also jeopardize the privacy of mobile app users. Finally, our study only evaluated the apps on one app store; the privacy policies and the requested dangerous permissions in other app stores, such as Apple’s App Store or Samsung's Galaxy Store, might have yielded different outcomes. However, Android’s Google Play Store was also chosen due to its popularity.</p>
      </sec>
      <sec>
        <title>Future Research</title>
        <p>A possible expansion of the research could include investigating those diabetes apps that were excluded from this research, either because they belonged to nonrelevant categories or because the developed module did not search for the root words in the apps’ description field. Future research could also focus on analyzing the taxonomy of app categories and match them to officially recognized and standardized clinical categories, such as the Systematized Nomenclature of Medicine Clinical Terms or Medical Subject Headings. Related to that, there is a new trend emerging toward the creation of machine learning approaches to identify privacy issues in mobile apps [<xref ref-type="bibr" rid="ref56">56</xref>,<xref ref-type="bibr" rid="ref57">57</xref>]. However, to the best of our knowledge, those methods have unfortunately not yet been applied to health apps. Further, there is a need for homogenous approaches for the assessment of privacy in health apps, as was highlighted recently in a scoping review addressing the issue [<xref ref-type="bibr" rid="ref58">58</xref>].</p>
        <p>Finally, from a legal perspective, although many diabetes apps are available worldwide, their privacy policies usually only comply with the specific national data protection regulations of the developers’ country or region of origin. For instance, the BeatO SMART Diabetes Management app claims that both its privacy policy and its terms of use fully adhere to Indian law, but if this app were to be used in the Middle East or the European Union, it would be unclear whether it would also comply with data protection laws in the country or region of use. This could indeed be another matter of study.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>If privacy issues in diabetes mobile apps are not dealt with carefully, users may unwillingly and unknowingly share very sensitive private data. Therefore, it is crucial that all stakeholders are involved in the development of diabetes apps from the very beginning of the process in order to ensure apps’ absolute compliance with data protection regulations and user privacy.</p>
        <p>As the economic value of personal data increases [<xref ref-type="bibr" rid="ref59">59</xref>], a completely new business model for apps has emerged: users pay for the usage of an app with their data, which is then sold to third parties, such as advertising clients [<xref ref-type="bibr" rid="ref60">60</xref>]. The lesson to be learned is that there is a price to pay in exchange for free apps, usually at the expense of privacy. Consequently, new control measures are needed to enable users to decide which personal information they are willing to disclose in return for a certain service [<xref ref-type="bibr" rid="ref61">61</xref>].</p>
        <p>The importance of personal data protection laws and their endorsement are of utmost importance. Well-designed privacy policies may protect individuals by requiring consent for the collection, use, disclosure, or retention of sensitive personal and health information, and they may regulate the use of these extremely sensitive data, allowing users to modify their information as well as to revoke their previous consent.</p>
        <p>Therefore, we recommend proper training for users, enforcement of strict data protection laws by governments and regulatory bodies, much tougher security policies and protocols in both Android apps and the Google Play Store, and the implication and supervision of all stakeholders in the app development process.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Qualitative results of case studies.</p>
        <media xlink:href="diabetes_v6i1e16146_app1.docx" xlink:title="DOCX File , 5315 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Top 10 Android’s dangerous permissions identified.</p>
        <media xlink:href="diabetes_v6i1e16146_app2.docx" xlink:title="DOCX File , 16 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Comma-separated values files.</p>
        <media xlink:href="diabetes_v6i1e16146_app3.docx" xlink:title="DOCX File , 14 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">API</term>
          <def>
            <p>application programming interface</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CSV</term>
          <def>
            <p>comma-separated values</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">DM</term>
          <def>
            <p>diabetes mellitus</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">mHealth</term>
          <def>
            <p>mobile health</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="con">
        <p>JJF-S was the principal investigator. He designed the majority of the work, supervised the research, and took over most of the data interpretation and writing of the manuscript. In addition, he was responsible for developing the software module for extracting apps’ metadata. MH and AA-A significantly contributed to the results and discussion sections of the paper. JV-A contributed to the overall manuscript and study by providing a clinical perspective. LF-L conceived the original research idea and greatly assisted with the design of the methodology and with the discussion section. Finally, CLS-B’s contribution to the analysis and interpretation of the results was fundamental. All of the authors contributed to and approved the manuscript.</p>
      </fn>
      <fn fn-type="conflict">
        <p>LF-L is co-founder of Adhera Health Inc (USA), a digital health company that provides digital therapeutic solutions for people with chronic conditions</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="book">
          <article-title>Global report on diabetes</article-title>
          <source>World Health Organization</source>
          <year>2016</year>
          <publisher-loc>Geneva</publisher-loc>
          <publisher-name>WHO Library</publisher-name>
          <fpage>1</fpage>
          <lpage>88</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Forbes</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Fotheringham</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Vascular complications in diabetes: old messages, new thoughts</article-title>
          <source>Diabetologia</source>
          <year>2017</year>
          <month>11</month>
          <volume>60</volume>
          <issue>11</issue>
          <fpage>2129</fpage>
          <lpage>2138</lpage>
          <pub-id pub-id-type="doi">10.1007/s00125-017-4360-x</pub-id>
          <pub-id pub-id-type="medline">28725914</pub-id>
          <pub-id pub-id-type="pii">10.1007/s00125-017-4360-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bourne</surname>
              <given-names>RRA</given-names>
            </name>
            <name name-style="western">
              <surname>Stevens</surname>
              <given-names>GA</given-names>
            </name>
            <name name-style="western">
              <surname>White</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Flaxman</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Price</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Jonas</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>Keeffe</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Leasher</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Naidoo</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Pesudovs</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Resnikoff</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>HR</given-names>
            </name>
          </person-group>
          <article-title>Causes of vision loss worldwide, 1990–2010: a systematic analysis</article-title>
          <source>The Lancet Global Health</source>
          <year>2013</year>
          <month>12</month>
          <volume>1</volume>
          <issue>6</issue>
          <fpage>e339</fpage>
          <lpage>e349</lpage>
          <pub-id pub-id-type="doi">10.1016/S2214-109X(13)70113-X</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hanyu</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Diabetes-Related Dementia</article-title>
          <source>Adv Exp Med Biol</source>
          <year>2019</year>
          <volume>1128</volume>
          <fpage>147</fpage>
          <lpage>160</lpage>
          <pub-id pub-id-type="doi">10.1007/978-981-13-3540-2_8</pub-id>
          <pub-id pub-id-type="medline">31062329</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Klonoff</surname>
              <given-names>DC</given-names>
            </name>
          </person-group>
          <article-title>The current status of mHealth for diabetes: will it be the next big thing?</article-title>
          <source>J Diabetes Sci Technol</source>
          <year>2013</year>
          <month>05</month>
          <day>01</day>
          <volume>7</volume>
          <issue>3</issue>
          <fpage>749</fpage>
          <lpage>58</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/23759409"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/193229681300700321</pub-id>
          <pub-id pub-id-type="medline">23759409</pub-id>
          <pub-id pub-id-type="pmcid">PMC3869144</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
          <article-title>mHealth App Developer Economics 2015</article-title>
          <source>Research 2 Guidiance</source>
          <year>2015</year>
          <access-date>2019-09-08</access-date>
          <publisher-loc>Berlin</publisher-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://research2guidance.com/product/mhealth-developer-economics-2015/">http://research2guidance.com/product/mhealth-developer-economics-2015/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Jia</surname>
              <given-names>Zhou</given-names>
            </name>
            <name name-style="western">
              <surname>Gavriel</surname>
              <given-names>Salvendy</given-names>
            </name>
          </person-group>
          <article-title>Human Aspects of IT for the Aged Population. Social Media, Games and Assistive Environments</article-title>
          <source>International Conference on Human-Computer Interaction</source>
          <year>2019</year>
          <publisher-loc>Switzerland</publisher-loc>
          <publisher-name>Springer, Cham</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arnhold</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Quade</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kirch</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Mobile applications for diabetics: a systematic review and expert-based usability evaluation considering the special requirements of diabetes patients age 50 years or older</article-title>
          <source>J Med Internet Res</source>
          <year>2014</year>
          <month>04</month>
          <day>09</day>
          <volume>16</volume>
          <issue>4</issue>
          <fpage>e104</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2014/4/e104/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.2968</pub-id>
          <pub-id pub-id-type="medline">24718852</pub-id>
          <pub-id pub-id-type="pii">v16i4e104</pub-id>
          <pub-id pub-id-type="pmcid">PMC4004144</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jeon</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Park</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Experiences of Patients With a Diabetes Self-Care App Developed Based on the Information-Motivation-Behavioral Skills Model: Before-and-After Study</article-title>
          <source>JMIR Diabetes</source>
          <year>2019</year>
          <month>04</month>
          <day>18</day>
          <volume>4</volume>
          <issue>2</issue>
          <fpage>e11590</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://diabetes.jmir.org/2019/2/e11590/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/11590</pub-id>
          <pub-id pub-id-type="medline">30998218</pub-id>
          <pub-id pub-id-type="pii">v4i2e11590</pub-id>
          <pub-id pub-id-type="pmcid">PMC6495295</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Giunti</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Giunta</surname>
              <given-names>DH</given-names>
            </name>
            <name name-style="western">
              <surname>Guisado-Fernandez</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Bender</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Fernandez-Luque</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>A biopsy of Breast Cancer mobile applications: state of the practice review</article-title>
          <source>Int J Med Inform</source>
          <year>2018</year>
          <month>02</month>
          <volume>110</volume>
          <fpage>1</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1386-5056(17)30402-1"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2017.10.022</pub-id>
          <pub-id pub-id-type="medline">29331247</pub-id>
          <pub-id pub-id-type="pii">S1386-5056(17)30402-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Giunti</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Kool</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rivera Romero</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Dorronzoro Zubiete</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Exploring the Specific Needs of Persons with Multiple Sclerosis for mHealth Solutions for Physical Activity: Mixed-Methods Study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>02</month>
          <day>09</day>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>e37</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/2/e37/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.8996</pub-id>
          <pub-id pub-id-type="medline">29426814</pub-id>
          <pub-id pub-id-type="pii">v6i2e37</pub-id>
          <pub-id pub-id-type="pmcid">PMC5889817</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Huckvale</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Prieto</surname>
              <given-names>JT</given-names>
            </name>
            <name name-style="western">
              <surname>Tilney</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Benghozi</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Car</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Unaddressed privacy risks in accredited health and wellness apps: a cross-sectional systematic assessment</article-title>
          <source>BMC Med</source>
          <year>2015</year>
          <month>9</month>
          <day>25</day>
          <volume>13</volume>
          <issue>1</issue>
          <fpage>214</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.biomedcentral.com/1741-7015/13/214"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12916-015-0444-y</pub-id>
          <pub-id pub-id-type="medline">26404673</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12916-015-0444-y</pub-id>
          <pub-id pub-id-type="pmcid">PMC4582624</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yom-Tov</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Fernandez-Luque</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Weber</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Crain</surname>
              <given-names>SP</given-names>
            </name>
          </person-group>
          <article-title>Pro-anorexia and pro-recovery photo sharing: a tale of two warring tribes</article-title>
          <source>J Med Internet Res</source>
          <year>2012</year>
          <month>11</month>
          <day>07</day>
          <volume>14</volume>
          <issue>6</issue>
          <fpage>e151</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2012/6/e151/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.2239</pub-id>
          <pub-id pub-id-type="medline">23134671</pub-id>
          <pub-id pub-id-type="pii">v14i6e151</pub-id>
          <pub-id pub-id-type="pmcid">PMC3510717</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Parker</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Halter</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Karliychuk</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Grundy</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>How private is your mental health app data? An empirical study of mental health app privacy policies and practices</article-title>
          <source>Int J Law Psychiatry</source>
          <year>2019</year>
          <month>05</month>
          <volume>64</volume>
          <fpage>198</fpage>
          <lpage>204</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijlp.2019.04.002</pub-id>
          <pub-id pub-id-type="medline">31122630</pub-id>
          <pub-id pub-id-type="pii">S0160-2527(18)30268-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhou</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Parmanto</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Alfikri</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Bao</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>A Mobile App for Assisting Users to Make Informed Selections in Security Settings for Protecting Personal Health Data: Development and Feasibility Study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>12</month>
          <day>11</day>
          <volume>6</volume>
          <issue>12</issue>
          <fpage>e11210</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/12/e11210/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/11210</pub-id>
          <pub-id pub-id-type="medline">30538088</pub-id>
          <pub-id pub-id-type="pii">v6i12e11210</pub-id>
          <pub-id pub-id-type="pmcid">PMC6305877</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fougerouse</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Yasini</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Marchand</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Aalami</surname>
              <given-names>OO</given-names>
            </name>
          </person-group>
          <article-title>A Cross-Sectional Study of Prominent US Mobile Health Applications: Evaluating the Current Landscape</article-title>
          <source>AMIA Annu Symp Proc</source>
          <year>2017</year>
          <volume>2017</volume>
          <fpage>715</fpage>
          <lpage>723</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29854137"/>
          </comment>
          <pub-id pub-id-type="medline">29854137</pub-id>
          <pub-id pub-id-type="pmcid">PMC5977729</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stoyanov</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Hides</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Kavanagh</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Zelenko</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Tjondronegoro</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Mani</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Mobile app rating scale: a new tool for assessing the quality of health mobile apps</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2015</year>
          <month>03</month>
          <day>11</day>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>e27</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2015/1/e27/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.3422</pub-id>
          <pub-id pub-id-type="medline">25760773</pub-id>
          <pub-id pub-id-type="pii">v3i1e27</pub-id>
          <pub-id pub-id-type="pmcid">PMC4376132</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Parker</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Karliychuk</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Gillies</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Mintzes</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Raven</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Grundy</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>A health app developer's guide to law and policy: a multi-sector policy analysis</article-title>
          <source>BMC Med Inform Decis Mak</source>
          <year>2017</year>
          <month>10</month>
          <day>02</day>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>141</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedinformdecismak.biomedcentral.com/articles/10.1186/s12911-017-0535-0"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12911-017-0535-0</pub-id>
          <pub-id pub-id-type="medline">28969704</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12911-017-0535-0</pub-id>
          <pub-id pub-id-type="pmcid">PMC5625720</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Min</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Khuri</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Xue</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Xie</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>A Kaminsky</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>J Cheskin</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Effectiveness of Mobile Health Interventions on Diabetes and Obesity Treatment and Management: Systematic Review of Systematic Reviews</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>04</month>
          <day>28</day>
          <volume>8</volume>
          <issue>4</issue>
          <fpage>e15400</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/4/e15400/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/15400</pub-id>
          <pub-id pub-id-type="medline">32343253</pub-id>
          <pub-id pub-id-type="pii">v8i4e15400</pub-id>
          <pub-id pub-id-type="pmcid">PMC7218595</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yao</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Vespasiani</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Nicolucci</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dong</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Kwong</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Tian</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Mobile App-Based Interventions to Support Diabetes Self-Management: A Systematic Review of Randomized Controlled Trials to Identify Functions Associated with Glycemic Efficacy</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2017</year>
          <month>03</month>
          <day>14</day>
          <volume>5</volume>
          <issue>3</issue>
          <fpage>e35</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2017/3/e35/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.6522</pub-id>
          <pub-id pub-id-type="medline">28292740</pub-id>
          <pub-id pub-id-type="pii">v5i3e35</pub-id>
          <pub-id pub-id-type="pmcid">PMC5373677</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pustozerov</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>von Jan</surname>
              <given-names>Ute</given-names>
            </name>
            <name name-style="western">
              <surname>Albrecht</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of mHealth Applications Security Based on Application Permissions</article-title>
          <source>Stud Health Technol Inform</source>
          <year>2016</year>
          <volume>226</volume>
          <fpage>241</fpage>
          <lpage>4</lpage>
          <pub-id pub-id-type="medline">27350515</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Quevedo Rodríguez</surname>
              <given-names>Adrián</given-names>
            </name>
            <name name-style="western">
              <surname>Wägner</surname>
              <given-names>Ana M</given-names>
            </name>
          </person-group>
          <article-title>Mobile phone applications for diabetes management: A systematic review</article-title>
          <source>Endocrinol Diabetes Nutr</source>
          <year>2019</year>
          <month>05</month>
          <volume>66</volume>
          <issue>5</issue>
          <fpage>330</fpage>
          <lpage>337</lpage>
          <pub-id pub-id-type="doi">10.1016/j.endinu.2018.11.005</pub-id>
          <pub-id pub-id-type="medline">30745121</pub-id>
          <pub-id pub-id-type="pii">S2530-0164(19)30002-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="web">
          <article-title>iTunes Search API Internet</article-title>
          <source>Apple Inc</source>
          <access-date>2019-09-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://affiliate.itunes.apple.com/resources/documentation/itunes-store-web-service-search-api/">https://affiliate.itunes.apple.com/resources/documentation/itunes-store-web-service-search-api/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="web">
          <article-title>Mobile App Intelligence &#124; 42matters Internet</article-title>
          <source>42matters</source>
          <access-date>2019-07-02</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://42matters.com/">https://42matters.com/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="web">
          <article-title>App Manifest Overview</article-title>
          <source>Android Developers</source>
          <access-date>2019-06-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://developer.android.com/guide/topics/manifest/manifest-intro">https://developer.android.com/guide/topics/manifest/manifest-intro</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ying</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Song</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Fung</surname>
              <given-names>DS</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Attention and Cognitive Bias Modification Apps: Review of the Literature and of Commercially Available Apps</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2018</year>
          <month>05</month>
          <day>24</day>
          <volume>6</volume>
          <issue>5</issue>
          <fpage>e10034</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2018/5/e10034/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/10034</pub-id>
          <pub-id pub-id-type="medline">29793899</pub-id>
          <pub-id pub-id-type="pii">v6i5e10034</pub-id>
          <pub-id pub-id-type="pmcid">PMC5992457</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mendiola</surname>
              <given-names>MF</given-names>
            </name>
            <name name-style="western">
              <surname>Kalnicki</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lindenauer</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Valuable features in mobile health apps for patients and consumers: content analysis of apps and user ratings</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2015</year>
          <month>05</month>
          <day>13</day>
          <volume>3</volume>
          <issue>2</issue>
          <fpage>e40</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2015/2/e40/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/mhealth.4283</pub-id>
          <pub-id pub-id-type="medline">25972309</pub-id>
          <pub-id pub-id-type="pii">v3i2e40</pub-id>
          <pub-id pub-id-type="pmcid">PMC4446515</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>car</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kinne</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Resch</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Generating Big Spatial Data on Firm Innovation Activity from Text- Mined Firm Websites</article-title>
          <source>giforum</source>
          <year>2018</year>
          <volume>1</volume>
          <fpage>82</fpage>
          <lpage>89</lpage>
          <pub-id pub-id-type="doi">10.1553/giscience2018_01_s82</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="web">
          <article-title>42Matters extraction script</article-title>
          <source>GitHub</source>
          <year>2019</year>
          <access-date>2020-01-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://github.com/jose-javier-flors-sidro/42Matters-webcrawler">https://github.com/jose-javier-flors-sidro/42Matters-webcrawler</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="web">
          <article-title>Google's categories description</article-title>
          <source>Play Console Help</source>
          <year>2019</year>
          <access-date>2019-06-18</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://support.google.com/googleplay/android-developer/answer/113475?hl=en-419">https://support.google.com/googleplay/android-developer/answer/113475?hl=en-419</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="web">
          <article-title>Permissions on Android</article-title>
          <source>Android Developers</source>
          <access-date>2019-09-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://developer.android.com/guide/topics/permissions/overview">https://developer.android.com/guide/topics/permissions/overview</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xu</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Permlyzer: Analyzing permission usage in Android applications</article-title>
          <year>2013</year>
          <conf-name>IEEE 24th International Symposium on Software Reliability Engineering (ISSRE)</conf-name>
          <conf-date>2013</conf-date>
          <conf-loc>Pasadena, CA</conf-loc>
          <fpage>400</fpage>
          <lpage>410</lpage>
          <pub-id pub-id-type="doi">10.1109/ISSRE.2013.6698893</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Nora</surname>
              <given-names>Cuppens-Boulahia</given-names>
            </name>
            <name name-style="western">
              <surname>Frédéric</surname>
              <given-names>Cuppens</given-names>
            </name>
            <name name-style="western">
              <surname>Sushil</surname>
              <given-names>Jajodia</given-names>
            </name>
            <name name-style="western">
              <surname>Anas Abou</surname>
              <given-names>El Kalam</given-names>
            </name>
            <name name-style="western">
              <surname>Thierry</surname>
              <given-names>Sans</given-names>
            </name>
          </person-group>
          <article-title>ICT Systems Security and Privacy Protection</article-title>
          <source>IFIP International Information Security Conference</source>
          <year>2014</year>
          <publisher-loc>Berlin, Heidelberg</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Papageorgiou</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Strigkos</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Politou</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Alepis</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Solanas</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Patsakis</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice</article-title>
          <source>IEEE Access</source>
          <year>2018</year>
          <volume>6</volume>
          <fpage>9390</fpage>
          <lpage>9403</lpage>
          <pub-id pub-id-type="doi">10.1109/ACCESS.2018.2799522</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Grundy</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Held</surname>
              <given-names>FP</given-names>
            </name>
            <name name-style="western">
              <surname>Bero</surname>
              <given-names>LA</given-names>
            </name>
          </person-group>
          <article-title>Tracing the Potential Flow of Consumer Data: A Network Analysis of Prominent Health and Fitness Apps</article-title>
          <source>J Med Internet Res</source>
          <year>2017</year>
          <month>06</month>
          <day>28</day>
          <volume>19</volume>
          <issue>6</issue>
          <fpage>e233</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2017/6/e233/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.7347</pub-id>
          <pub-id pub-id-type="medline">28659254</pub-id>
          <pub-id pub-id-type="pii">v19i6e233</pub-id>
          <pub-id pub-id-type="pmcid">PMC5508111</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Shi</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>A New Approach for Mobile Advertising Click-Through Rate Estimation Based on Deep Belief Nets</article-title>
          <source>Comput Intell Neurosci</source>
          <year>2017</year>
          <volume>2017</volume>
          <fpage>7259762</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1155/2017/7259762"/>
          </comment>
          <pub-id pub-id-type="doi">10.1155/2017/7259762</pub-id>
          <pub-id pub-id-type="medline">29209363</pub-id>
          <pub-id pub-id-type="pmcid">PMC5676483</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cha</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Pak</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Protecting contacts against privacy leaks in smartphones</article-title>
          <source>PLoS One</source>
          <year>2018</year>
          <month>7</month>
          <day>11</day>
          <volume>13</volume>
          <issue>7</issue>
          <fpage>e0191502</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0191502"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0191502</pub-id>
          <pub-id pub-id-type="medline">29995881</pub-id>
          <pub-id pub-id-type="pii">PONE-D-17-26712</pub-id>
          <pub-id pub-id-type="pmcid">PMC6040689</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hoppe</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Knackmuß</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Morgenstern</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Creutzburg</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Privacy Issues in Mobile Health Applications - Assessment of Current Android Health Apps</article-title>
          <source>Electronic Imaging</source>
          <year>2017</year>
          <month>01</month>
          <day>29</day>
          <volume>2017</volume>
          <issue>6</issue>
          <fpage>76</fpage>
          <lpage>83</lpage>
          <pub-id pub-id-type="doi">10.2352/ISSN.2470-1173.2017.6.MOBMU-302</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Grundy</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Chiu</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Held</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Continella</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bero</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Holz</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis</article-title>
          <source>BMJ</source>
          <year>2019</year>
          <month>03</month>
          <day>20</day>
          <volume>364</volume>
          <fpage>l920</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.bmj.com/lookup/pmidlookup?view=long&#38;pmid=30894349"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj.l920</pub-id>
          <pub-id pub-id-type="medline">30894349</pub-id>
          <pub-id pub-id-type="pmcid">PMC6425456</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Huckvale</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Torous</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Larsen</surname>
              <given-names>ME</given-names>
            </name>
          </person-group>
          <article-title>Assessment of the Data Sharing and Privacy Practices of Smartphone Apps for Depression and Smoking Cessation</article-title>
          <source>JAMA Netw Open</source>
          <year>2019</year>
          <month>04</month>
          <day>05</day>
          <volume>2</volume>
          <issue>4</issue>
          <fpage>e192542</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://jamanetwork.com/journals/jamanetworkopen/fullarticle/10.1001/jamanetworkopen.2019.2542"/>
          </comment>
          <pub-id pub-id-type="doi">10.1001/jamanetworkopen.2019.2542</pub-id>
          <pub-id pub-id-type="medline">31002321</pub-id>
          <pub-id pub-id-type="pii">2730782</pub-id>
          <pub-id pub-id-type="pmcid">PMC6481440</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sunyaev</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Dehling</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>PL</given-names>
            </name>
            <name name-style="western">
              <surname>Mandl</surname>
              <given-names>KD</given-names>
            </name>
          </person-group>
          <article-title>Availability and quality of mobile health app privacy policies</article-title>
          <source>J Am Med Inform Assoc</source>
          <year>2015</year>
          <month>04</month>
          <volume>22</volume>
          <issue>e1</issue>
          <fpage>e28</fpage>
          <lpage>33</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://jamia.oxfordjournals.org/cgi/pmidlookup?view=long&#38;pmid=25147247"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/amiajnl-2013-002605</pub-id>
          <pub-id pub-id-type="medline">25147247</pub-id>
          <pub-id pub-id-type="pii">amiajnl-2013-002605</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Balebako</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Marsh</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Faith</surname>
              <given-names>CL</given-names>
            </name>
          </person-group>
          <article-title>The Privacy and Security Behaviors of Smartphone App Developers</article-title>
          <source>Internet Society</source>
          <year>2014</year>
          <conf-name>NDSS Symposium 2014</conf-name>
          <conf-date>2014</conf-date>
          <conf-loc>San Diego, California</conf-loc>
          <pub-id pub-id-type="doi">10.14722/usec.2014.23006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chan</surname>
              <given-names>CV</given-names>
            </name>
            <name name-style="western">
              <surname>Matthews</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Kaufman</surname>
              <given-names>DR</given-names>
            </name>
          </person-group>
          <article-title>A taxonomy characterizing complexity of consumer eHealth Literacy</article-title>
          <source>AMIA Annu Symp Proc</source>
          <year>2009</year>
          <month>11</month>
          <day>14</day>
          <volume>2009</volume>
          <fpage>86</fpage>
          <lpage>90</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/20351828"/>
          </comment>
          <pub-id pub-id-type="medline">20351828</pub-id>
          <pub-id pub-id-type="pmcid">PMC2815448</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wicks</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Chiauzzi</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>'Trust but verify'--five approaches to ensure safe medical apps</article-title>
          <source>BMC Med</source>
          <year>2015</year>
          <month>09</month>
          <day>25</day>
          <volume>13</volume>
          <fpage>205</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedicine.biomedcentral.com/articles/10.1186/s12916-015-0451-z"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12916-015-0451-z</pub-id>
          <pub-id pub-id-type="medline">26404791</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12916-015-0451-z</pub-id>
          <pub-id pub-id-type="pmcid">PMC4583172</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wyatt</surname>
              <given-names>JC</given-names>
            </name>
          </person-group>
          <article-title>How can clinicians, specialty societies and others evaluate and improve the quality of apps for patient use?</article-title>
          <source>BMC Med</source>
          <year>2018</year>
          <month>12</month>
          <day>03</day>
          <volume>16</volume>
          <issue>1</issue>
          <fpage>225</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcmedicine.biomedcentral.com/articles/10.1186/s12916-018-1211-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12916-018-1211-7</pub-id>
          <pub-id pub-id-type="medline">30501638</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12916-018-1211-7</pub-id>
          <pub-id pub-id-type="pmcid">PMC6276222</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Martínez-Pérez</surname>
              <given-names>Borja</given-names>
            </name>
            <name name-style="western">
              <surname>de la Torre-Díez</surname>
              <given-names>Isabel</given-names>
            </name>
            <name name-style="western">
              <surname>López-Coronado</surname>
              <given-names>Miguel</given-names>
            </name>
          </person-group>
          <article-title>Privacy and security in mobile health apps: a review and recommendations</article-title>
          <source>J Med Syst</source>
          <year>2015</year>
          <month>01</month>
          <volume>39</volume>
          <issue>1</issue>
          <fpage>181</fpage>
          <pub-id pub-id-type="doi">10.1007/s10916-014-0181-3</pub-id>
          <pub-id pub-id-type="medline">25486895</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
          <article-title>Shaping Europe’s digital future. Privacy Code of Conduct on mobile health apps</article-title>
          <source>European Commision</source>
          <access-date>2019-06-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ec.europa.eu/digital-single-market/en/privacy-code-conduct-mobile-health-apps">https://ec.europa.eu/digital-single-market/en/privacy-code-conduct-mobile-health-apps</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="web">
          <article-title>Mobile Health App Developers: FTC Best Practices</article-title>
          <source>Federal Trade Commission</source>
          <access-date>2019-06-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ftc.gov/tips-advice/business-center/guidance/mobile-health-app-developers-ftc-best-practices">https://www.ftc.gov/tips-advice/business-center/guidance/mobile-health-app-developers-ftc-best-practices</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="web">
          <article-title>Mobile privacy A better practice guide for mobile app developers</article-title>
          <source>Office of the Australian Information Commissioner</source>
          <year>2013</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.oaic.gov.au/privacy/guidance-and-advice/mobile-privacy-a-better-practice-guide-for-mobile-app-developers/">https://www.oaic.gov.au/privacy/guidance-and-advice/mobile-privacy-a-better-practice-guide-for-mobile-app-developers/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Atkinson</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Apps Permissions in the Google Play Store</article-title>
          <source>Pew Res Cent - Internet Technology</source>
          <year>2015</year>
          <month>11</month>
          <day>10</day>
          <access-date>2019-09-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.pewinternet.org/2015/11/10/apps-permissions-in-the-google-play-store/">http://www.pewinternet.org/2015/11/10/apps-permissions-in-the-google-play-store/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Benjumea</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ropero</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rivera-Romero</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Dorronzoro-Zubiete</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Carrasco</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Assessment of the Fairness of Privacy Policies of Mobile Health Apps: Scale Development and Evaluation in Cancer Apps</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>07</month>
          <day>28</day>
          <volume>8</volume>
          <issue>7</issue>
          <fpage>e17134</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/7/e17134/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/17134</pub-id>
          <pub-id pub-id-type="medline">32720913</pub-id>
          <pub-id pub-id-type="pii">v8i7e17134</pub-id>
          <pub-id pub-id-type="pmcid">PMC7420637</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Telecom</collab>
          </person-group>
          <article-title>Google removing 100 apps by Chinese developer from Play Store</article-title>
          <source>Telecom.com</source>
          <access-date>2019-06-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://telecom.economictimes.indiatimes.com/news/google-removing-100-apps-by-chinese-developer-from-play-store/69089407">https://telecom.economictimes.indiatimes.com/news/google-removing-100-apps-by-chinese-developer-from-play-store/69089407</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="web">
          <article-title>Androidauthority</article-title>
          <source>BeiTaAd adware infects 238 apps on Google Play Store</source>
          <access-date>2019-06-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.androidauthority.com/beitaad-google-play-store-994796/">https://www.androidauthority.com/beitaad-google-play-store-994796/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="web">
          <article-title>Adware-Ridden Apps in Google Play Infect 30 Million Android Users</article-title>
          <source>Threatpost</source>
          <access-date>2019-06-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://threatpost.com/google-play-adware-30-million/144098/">https://threatpost.com/google-play-adware-30-million/144098/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rajasegaran</surname>
              <given-names>Jathushan</given-names>
            </name>
            <name name-style="western">
              <surname>Seneviratne</surname>
              <given-names>Suranga</given-names>
            </name>
            <name name-style="western">
              <surname>Jourjon</surname>
              <given-names>Guillaume</given-names>
            </name>
          </person-group>
          <article-title>A Neural Embeddings Approach for Detecting Mobile Counterfeit Apps</article-title>
          <source>arXivLabs</source>
          <year>2018</year>
          <month>04</month>
          <day>26</day>
          <fpage>1</fpage>
          <lpage>11</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/1804.09882"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Gong</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Personalized Mobile App Recommendation?: Reconciling App Functionality and User Privacy Preference</article-title>
          <source>Association for Computing Machinery</source>
          <year>2015</year>
          <conf-name>Eighth ACM International Conference on Web Search and Data Mining (WSDM '15)</conf-name>
          <conf-date>2015</conf-date>
          <conf-loc>New York</conf-loc>
          <fpage>315</fpage>
          <lpage>324</lpage>
          <pub-id pub-id-type="doi">10.1145/2684822.2685322</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Xiong</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ge</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Mobile app recommendations with security and privacy awareness</article-title>
          <source>20th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD '14)</source>
          <year>2014</year>
          <conf-name>Association for Computing Machinery</conf-name>
          <conf-date>2014</conf-date>
          <conf-loc>New York</conf-loc>
          <fpage>951</fpage>
          <lpage>960</lpage>
          <pub-id pub-id-type="doi">10.1145/2623330.2623705</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Benjumea</surname>
              <given-names>Jaime</given-names>
            </name>
            <name name-style="western">
              <surname>Ropero</surname>
              <given-names>Jorge</given-names>
            </name>
            <name name-style="western">
              <surname>Rivera-Romero</surname>
              <given-names>Octavio</given-names>
            </name>
            <name name-style="western">
              <surname>Dorronzoro-Zubiete</surname>
              <given-names>Enrique</given-names>
            </name>
            <name name-style="western">
              <surname>Carrasco</surname>
              <given-names>Alejandro</given-names>
            </name>
          </person-group>
          <article-title>Privacy Assessment in Mobile Health Apps: Scoping Review</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2020</year>
          <month>07</month>
          <day>02</day>
          <volume>8</volume>
          <issue>7</issue>
          <fpage>e18868</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://mhealth.jmir.org/2020/7/e18868/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/18868</pub-id>
          <pub-id pub-id-type="medline">32459640</pub-id>
          <pub-id pub-id-type="pii">v8i7e18868</pub-id>
          <pub-id pub-id-type="pmcid">PMC7367524</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="web">
          <article-title>IoT Research – Smartbands</article-title>
          <source>Securelist</source>
          <access-date>2019-09-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://securelist.com/iot-research-smartbands/69412/">https://securelist.com/iot-research-smartbands/69412/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Leontiadis</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Efstratiou</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Picone</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Mascolo</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Don't kill my ads! Balancing privacy in an ad-supported mobile application market</article-title>
          <source>Twelfth Workshop on Mobile Computing Systems &#38; Applications (HotMobile '12)</source>
          <year>2012</year>
          <conf-name>ssociation for Computing Machinery</conf-name>
          <conf-date>2012</conf-date>
          <conf-loc>New York</conf-loc>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <pub-id pub-id-type="doi">10.1145/2162081.2162084</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="web">
          <article-title>The Security and Privacy of Wearable Health and Fitness Devices</article-title>
          <source>Security Intelligence Logo</source>
          <access-date>2019-09-04</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://securityintelligence.com/the-security-and-privacy-of-wearable-health-and-fitness-devices/">https://securityintelligence.com/the-security-and-privacy-of-wearable-health-and-fitness-devices/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
