<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">ResProt</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Res Protoc</journal-id>
      <journal-title>JMIR Research Protocols</journal-title>
      <issn pub-type="epub">1929-0748</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
    <article-id pub-id-type="publisher-id">v6i8e156</article-id>
    <article-id pub-id-type="pmid">28784592</article-id>
    <article-id pub-id-type="doi">10.2196/resprot.6452</article-id>
    <article-categories>
      <subj-group subj-group-type="heading">
        <subject>Tutorial</subject>
      </subj-group>
      <subj-group subj-group-type="article-type">
        <subject>Tutorial</subject>
      </subj-group>
    </article-categories>
    <title-group>
      <article-title>Opening the Black Box of Electronic Health: Collecting, Analyzing, and Interpreting Log Data</article-title>
    </title-group>
    <contrib-group>
      <contrib contrib-type="editor">
        <name>
          <surname>Eysenbach</surname>
          <given-names>Gunther</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Karppinen</surname>
          <given-names>Pasi</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Han</surname>
          <given-names>Jeong-Yeob</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Chien</surname>
          <given-names>Yu Tai</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Liao</surname>
          <given-names>Gen-Yih</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Su</surname>
          <given-names>Wu-Chen</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Smith</surname>
          <given-names>Douglas</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="author" id="contrib1" corresp="yes">
      <name name-style="western">
        <surname>Sieverink</surname>
        <given-names>Floor</given-names>
      </name>
      <degrees>MSc, MA</degrees>
      <xref rid="aff1" ref-type="aff">1</xref>
      <address>
        <institution>Centre for eHealth and Wellbeing Research</institution>
        <institution>Department of Psychology, Health and Technology</institution>
        <institution>University of Twente</institution>
        <addr-line>P.O. Box 217</addr-line>
        <addr-line>Enschede, 7500 AE</addr-line>
        <country>Netherlands</country>
        <phone>31 628554510</phone>
        <fax>31 534892895</fax>
        <email>f.sieverink@utwente.nl</email>
      </address>  
      <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-7018-2634</ext-link></contrib>
      <contrib contrib-type="author" id="contrib2">
        <name name-style="western">
          <surname>Kelders</surname>
          <given-names>Saskia</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <xref rid="aff2" ref-type="aff">2</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-8949-6871</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib3">
        <name name-style="western">
          <surname>Poel</surname>
          <given-names>Mannes</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff3" ref-type="aff">3</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-3813-9732</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib4">
        <name name-style="western">
          <surname>van Gemert-Pijnen</surname>
          <given-names>Lisette</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-6511-7240</ext-link>
      </contrib>
    </contrib-group>
    <aff id="aff1">
    <sup>1</sup>
    <institution>Centre for eHealth and Wellbeing Research</institution>
    <institution>Department of Psychology, Health and Technology</institution>  
    <institution>University of Twente</institution>  
    <addr-line>Enschede</addr-line>
    <country>Netherlands</country></aff>
    <aff id="aff2">
    <sup>2</sup>
    <institution>Optentia Research Focus Area</institution>
    <institution>North-West University</institution>  
    <addr-line>Vanderbijlpark</addr-line>
    <country>South Africa</country></aff>
    <aff id="aff3">
    <sup>3</sup>
    <institution>Human Media Interaction group</institution>
    <institution>Department of Computer Science</institution>  
    <institution>University of Twente</institution>  
    <addr-line>Enschede</addr-line>
    <country>Netherlands</country></aff>
    <author-notes>
      <corresp>Corresponding Author: Floor Sieverink 
      <email>f.sieverink@utwente.nl</email></corresp>
    </author-notes>
    <pub-date pub-type="collection"><month>08</month><year>2017</year></pub-date>
    <pub-date pub-type="epub">
      <day>07</day>
      <month>08</month>
      <year>2017</year>
    </pub-date>
    <volume>6</volume>
    <issue>8</issue>
    <elocation-id>e156</elocation-id>
    <!--history from ojs - api-xml-->
    <history>
      <date date-type="received">
        <day>5</day>
        <month>8</month>
        <year>2016</year>
      </date>
      <date date-type="rev-request">
        <day>25</day>
        <month>11</month>
        <year>2016</year>
      </date>
      <date date-type="rev-recd">
        <day>2</day>
        <month>3</month>
        <year>2017</year>
      </date>
      <date date-type="accepted">
        <day>12</day>
        <month>7</month>
        <year>2017</year>
      </date>
    </history>
    <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
    <copyright-statement>©Floor Sieverink, Saskia Kelders, Mannes Poel, Lisette van Gemert-Pijnen. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 07.08.2017.</copyright-statement>
    <copyright-year>2017</copyright-year>
    <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
      <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Research Protocols, is properly cited. The complete bibliographic information, a link to the original publication on http://www.researchprotocols.org, as well as this copyright and license information must be included.</p>
    </license>  
    <self-uri xlink:href="http://www.researchprotocols.org/2017/8/e156/" xlink:type="simple"/>

<related-article related-article-type="correction-forward" xlink:title="This is a corrected version. See correction statement in:" xlink:href="http://www.researchprotocols.org/2018/1/e10/" vol="7" page="e10"> </related-article>

    <abstract>
      <p>In electronic health (eHealth) research, limited insight has been obtained on process outcomes or how the use of technology has contributed to the users’ ability to have a healthier life, improved well-being, or activate new attitudes in their daily tasks. As a result, eHealth is often perceived as a black box. To open this black box of eHealth, methodologies must extend beyond the classic effect evaluations. The analyses of log data (anonymous records of real-time actions performed by each user) can provide continuous and objective insights into the actual usage of the technology. However, the possibilities of log data in eHealth research have not been exploited to their fullest extent. The aim of this paper is to describe how log data can be used to improve the evaluation and understand the use of eHealth technology with a broader approach than only descriptive statistics. This paper serves as a starting point for using log data analysis in eHealth research. Here, we describe what log data is and provide an overview of research questions to evaluate the system, the context, the users of a technology, as well as the underpinning theoretical constructs. We also explain the requirements for log data, the starting points for the data preparation, and methods for data collection. Finally, we describe methods for data analysis and draw a conclusion regarding the importance of the results for both scientific and practical applications. The analysis of log data can be of great value for opening the black box of eHealth. A deliberate log data analysis can give new insights into how the usage of the technology contributes to found effects and can thereby help to improve the persuasiveness and effectiveness of eHealth technology and the underpinning behavioral models.</p>
    </abstract>
    <kwd-group>
      <kwd>eHealth</kwd>
      <kwd>black box</kwd>
      <kwd>evaluation</kwd>
      <kwd>log data analysis</kwd>
    </kwd-group></article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Many electronic health (eHealth) technologies, such as behavior change technologies, aim to support users in reaching certain health-related behavioral outcomes. While such technologies can be effective [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>], one of the main problems is that users’ adoption and long-term use remains lower than expected [<xref ref-type="bibr" rid="ref3">3</xref>-<xref ref-type="bibr" rid="ref5">5</xref>]. Moreover, eHealth research is dominated by a classic conception of medical research where randomized controlled trials (RCTs) are the golden standard for measuring outcomes [<xref ref-type="bibr" rid="ref6">6</xref>]. Although RCTs provide valuable insight into the effectiveness of an intervention, fundamental to this methodology is to have the technology as a fixed entity for all participants throughout the entire intervention period. In contrast, (eHealth) technology can be characterized by its constant evolution and, consequently, apps or interventions often become obsolete by the time the results of the RCT are available.</p>
      <p>Furthermore, to conform to the complexity of behavior change, eHealth technologies often consist of multiple components that may interact in reaching a certain effect and that people can use in many different ways in terms of the elements they use as well as the frequency, time, and place of use [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref8">8</xref>]. However, RCTs only provide insight into outcomes at fixed time points and treat technologies as a singular entity. Therefore, no insight can be obtained on process outcomes or how the use of the different components of the technology has contributed to healthier living, improved well-being, or a user’s ability to conduct daily tasks [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>]. This particular lack of insight is known as the “Black Box Phenomenon” [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref11">11</xref>]. To open the black box of eHealth and to investigate why, how, and for whom a certain technology is of the most value, methodologies must extend beyond the classic evaluations of effect only. In other words, the characteristics of eHealth technology change the way evaluations are conducted. In this view, Hekler and colleagues pled for an “agile science” approach that enables early and frequent insight into the process of behavior change via technology [<xref ref-type="bibr" rid="ref7">7</xref>].</p>
      <p>The CeHRes Roadmap (<xref ref-type="fig" rid="figure1">Figure 1</xref>) adopts an agile approach in the development and evaluation process of eHealth technology. This roadmap is based on an extensive literature review of eHealth frameworks and follows a holistic and participatory research and development approach. The following phases can be distinguished in the development and evaluation of eHealth: (1) contextual inquiry, (2) value specification, (3) design, (4) operationalization, and (5) summative evaluation. The results of each phase should be the subject of formative evaluation in order to collect input for improving the product [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
      <p>According to the roadmap, technology development and evaluation is an iterative, flexible, and dynamic process without a fixed endpoint. In this approach, continuous (formative and summative) evaluation is needed that is interwoven with all stages of technology development. The outcomes of such evaluations will be used for analyzing the process, recognizing the areas of improvement, and diving deeper into the usage (the dose) that is needed to reach certain effects (the response). Thus, technology already in early stages of development will be reshaped by its usage. In order to do so, more advanced methods are needed to understand what people do with eHealth technology and how this is related to the impact.</p>
      <p>The analysis of log data, defined as anonymous records of real-time actions performed by each user, has the potential to provide continuous and objective insight into the actual usage (of the different components) of the technology. Such analyses are a promising approach to explain the outcomes of the more traditional methods, such as RCTs, by gaining insight into the mediating mechanisms that contribute to the found effects [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref9">9</xref>] and have also the potential to identify unexpected effects of a technology. Thus, the use of log data fits the aim of eHealth evaluation according to the CeHRes Roadmap by enabling early improvements of the technology in order to improve the evaluation outcomes.</p>
      <p>Log data analyses are currently used in diversified domains, such as education [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref>], human-computer interaction [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>], and network security [<xref ref-type="bibr" rid="ref16">16</xref>] where they are mainly used to analyze system performance and acceptance based on models for information retrieval. However, technology has evolved and the aim of behavior change technologies is not only to provide information, but rather to stimulate and support people in their process of behavior change [<xref ref-type="bibr" rid="ref17">17</xref>]. Therefore, information is needed regarding how the use of technology can explain the engagement and involvement of the individual user, the found effects, and how the technology fits the user and the context.</p>
      <p>Log data analyses in eHealth research have mainly focused on descriptive statistics, such as the number of logins, time spent, and the frequency of use of the different elements by all users as a group [<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref20">20</xref>]. Although these statistics do provide valuable information regarding the usage of the technology, they also assume a dose-response relationship without taking the goal of the user into account. Furthermore, such analyses do not always provide insight into the actual process of technology use in relation to behavior change. For example, a longer and more frequent exposure to an eHealth technology might indicate how well the system fits the users’ needs, but it can also signify unfocused and/or non-strategic use or an inefficient system [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. The same applies to only counting the number of logins, since a user can log out directly without using the technology. As such, measures are needed that indicate how the actual use of the (different elements of the) technology can explain the found effects.</p>
      <p>There is evidence that the use of log data can be of added value to the more traditional approaches of eHealth evaluation, but its possibilities have not yet been exploited to their fullest extent or have mostly been described on a conceptual level [<xref ref-type="bibr" rid="ref7">7</xref>-<xref ref-type="bibr" rid="ref9">9</xref>]. The aim of this paper is to give a more practical description of how log data can be of added value to understand the use of an eHealth technology with a broader approach than only descriptive statistics. Here, we describe what research questions can be answered using log data. Furthermore, we provide direction on which steps need to be taken in the collection, preparation, and analysis of log data, and how to interpret and apply the results (<xref ref-type="fig" rid="figure1">Figure 1</xref>).</p>
      <p>The results and ideas presented in this paper are substantiated with examples from prior log data research. They do not provide an exhaustive overview of all research conducted in this field but are used to illustrate the possibilities of log data as a starting point for further research to open the black box of eHealth.</p>
      <fig id="figure1" position="float">
        <label>Figure 1</label>
        <caption>
          <p>Steps in log data analysis.</p>
        </caption>
        <graphic xlink:href="resprot_v6i8e156_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
  
 </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
      <title>What is Log Data?</title>
      <p>Generally (transactional) log data can be seen as behavioral logs that contain information regarding the interactions between a system and the users of that system [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref15">15</xref>]. These interactions can include information regarding time of the action, content that is viewed or used, mouse clicks, browsing patterns, or saving information in the system. An important benefit of log data is that it represents the actual and continuous usage behavior and not subjective, recalled behavior.</p>
      <p>The use of log data mainly focuses on the interaction with Web-based technologies. However, eHealth technology has evolved from Web- or telephone-based systems that required users’ active involvement into unobtrusive and pervasive systems that are embedded into users’ daily lives. For example, many people currently use lifestyle apps, such as “Runkeeper” or food diaries, to support their daily routines. Wearable devices like the Fitbit, Jawbone, or Apple Watch can continuously collect real-time health-related data for personalized coaching via apps for mobile phones or tablets. To be able to understand as much as possible of what people do, log data should not be limited to technologies and/or how they experience it, but to the actual usage of Web-based technologies including interactions with mobile phone apps and wearables as well.</p>
    </sec>
    <sec>
      <title>Composing Research Questions</title>
      <p>Before the log data can be collected and analyzed, an important step is to revisit the goals of the technology and the subsequent research questions. A variety of research questions can be addressed with log data analysis, depending on the type and the goal of the eHealth technology and on the phase of development. According to the CeHRes Roadmap, log data analyses can be of added value in both the formative and summative evaluation phases [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
      <p>Formative evaluation is conducted within and between the different phases of the roadmap. The aim of this type of evaluation is to check whether the goals of that phase have been reached. In the early operationalization phase, for example, log data has the potential to evaluate the use of the system and to assess what people do (or not do) with a technology. Critical moments for dropping out can be identified, as well as profiles for both users and usage. The results from these evaluations can be used to improve an early release of the technology before it will be available for a bigger group of users, which fits the “agile science” approach [<xref ref-type="bibr" rid="ref7">7</xref>]. Possible research questions for formative system evaluations are shown in <xref ref-type="boxed-text" rid="box1">Textbox 1</xref>.</p>
      <boxed-text id="box1" position="float">
        <title>Questions for formative system evaluations.</title>
        <p>Questions</p>
        <list list-type="bullet">
          <list-item>
            <p>What usage patterns emerge when users navigate through the technology?</p>
          </list-item>
          <list-item>
            <p>Which (combinations of) elements of the technology are used?</p>
          </list-item>
          <list-item>
            <p>When do users drop out?</p>
          </list-item>
          <list-item>
            <p>How do users respond to behavior change strategies and persuasive triggers (strategies to support users in performing certain [usage] behaviors and/or long-term use, such as reminders)?</p>
          </list-item>
        </list>
      </boxed-text>
      <p>For example, in a previous study we found that users of a personal health record (PHR), an electronic application consisting of different tools for monitoring and coaching patients with chronic conditions to support self-management [<xref ref-type="bibr" rid="ref22">22</xref>], followed the global menu structure when exploring the PHR for the first time. Furthermore, most users were likely to drop out when they visited the education section as a first step after the first login [<xref ref-type="bibr" rid="ref23">23</xref>].</p>
      <p>The uptake and impact of a technology are measured during the summative evaluation phase. Impact refers to whether the intended goals of the technology have been realized in terms of behavioral, clinical, and organizational outcomes. Uptake refers to the implementation and usage of the technology. Log data can be used to assess the uptake of the technology. Where log data analyses in the operationalization phase mainly focus on the system performance, in this phase research questions to evaluate the whole of the system, the user, and the context can be formulated. Possible research questions to evaluate the system can be seen in <xref ref-type="boxed-text" rid="box2">Textbox 2</xref>.</p>
      <boxed-text id="box2" position="float">
        <title>Questions to evaluate the system.</title>
        <p>Questions</p>
        <list list-type="bullet">
          <list-item>
            <p>How do users use the technology in order to complete an intervention or to achieve their health-related goals (in terms of frequency or combinations of elements they use)?</p>
          </list-item>
          <list-item>
            <p>How well do the users adhere to the intended usage of the technology?</p>
            <list list-type="bullet">
              <list-item>
                <p>What are predictors for adherence or dropping-out?</p>
              </list-item>
              <list-item>
                <p>How does the use of the technology change over time?</p>
              </list-item>
            </list>
          </list-item>
          <list-item>
            <p>How did these usage patterns contribute to the (clinical, behavioral and organizational) impact? In other words, what is the dose-response relationship?</p>
          </list-item>
        </list>
      </boxed-text>
      <p>For example, studies by Kelders et al [<xref ref-type="bibr" rid="ref21">21</xref>] and Van Gemert et al [<xref ref-type="bibr" rid="ref24">24</xref>] showed when users of a Web-based intervention for the early treatment of depressive symptoms (“Living to the Full”) were at risk of dropping out and might need additional support. In another example, Freyne et al [<xref ref-type="bibr" rid="ref25">25</xref>] found that uploading a profile picture on a diet support site in the first week resulted in higher return rates.</p>
      <p>Research questions to evaluate the users of the technology and possible context-related questions are shown in <xref ref-type="boxed-text" rid="box3">Textbox 3</xref>.</p>
      <boxed-text id="box3" position="float">
        <title>User evaluation and context-related questions.</title>
        <p>Questions</p>
        <list list-type="bullet">
          <list-item>
            <p>User evaluation</p>
            <p>Who is motivated and capable of using the eHealth technology?</p>
            <list list-type="bullet">
              <list-item>
                <p>Who are the long-term users?</p>
              </list-item>
              <list-item>
                <p>Who are the drop-outs?</p>
              </list-item>
            </list>
          </list-item>
          <list-item>
            <p>Context-related evaluation</p>
            <list list-type="bullet">
              <list-item>
                <p>How does the responsiveness of caregivers (eg, time until replying to a users’ message) influence the use of eHealth technology by patients?</p>
              </list-item>
              <list-item>
                <p>How does the technology integrate into users’ daily lives?</p>
              </list-item>
            </list>
          </list-item>
        </list>
      </boxed-text>
      <p>Log data analyses can also provide answers to more fundamental research questions related to existing models and theories [<xref ref-type="bibr" rid="ref8">8</xref>]. Behavior change theories and behavior models often form the basis for the content and the structure of eHealth technologies. For example, mental health interventions are frequently based on the principles of cognitive behavioral therapy and principles from the goal setting theory are used to support users in reaching their health-related goals. Log data can be used to check whether the incorporated (combination of) elements that represent certain theoretical concepts (eg, a chat box to facilitate social support) have been used. Or, when one of the goals of a technology is to improve self-efficacy, for example, log data can provide insight into what the most effective usage patterns are and for whom to experience any improvements in the self-efficacy. Research questions related to the evaluation of existing models and theories are shown in <xref ref-type="boxed-text" rid="box4">Textbox 4</xref>.</p>
      <boxed-text id="box4" position="float">
        <title>Research questions to evaluate existing models and theories.</title>
        <p>Questions</p>
        <list list-type="bullet">
          <list-item>
            <p>To what extent did the users find and use the (combination of) elements of the technology that represent certain theoretical concepts?</p>
          </list-item>
          <list-item>
            <p>How did the use of (a combination of) these elements contributed to any improvements in the outcomes?</p>
          </list-item>
        </list>
      </boxed-text>
      <p>For example, the “Living to the Full” intervention is based on the principles of acceptance and commitment therapy (ACT). An effect evaluation indicated that a Web-based technology based on ACT might help users reduce depressive complaints [<xref ref-type="bibr" rid="ref26">26</xref>]. However, a log data analysis revealed that many users of that intervention did not open the mindfulness exercises that are assumed to be an important element of ACT [<xref ref-type="bibr" rid="ref24">24</xref>]. This might be an indicator that the concept of mindfulness is insufficiently operationalized in the intervention and that the found effects are an underestimation of the attainable effects.</p>
      <p>While not complete or exhaustive, this overview serves as a starting point for composing suitable research questions for a holistic and agile evaluation of eHealth technology. The proposed questions can be adjusted based on the goal of the technology and the incorporated behavioral models and/or theories. The answers to the research questions can provide input for improving the look and feel and architecture of the technology as well as the fit between the technology, the user, and the context. In turn, this information can be used to increase the effectiveness, persuasiveness, and the long-term usage of the technology.</p>
    </sec>
    <sec>
      <title>Data Collection</title>
      <p>Depending on the research questions, there are different ways to collect log data. To gain rich and in-depth knowledge regarding the usage patterns of individual users server-side log data, containing information about communications with the server (requests such as opening a page, clicking a link, saving health values, or other information), can be collected. In Web-based applications, this type of logging is preferably a file where the Web addresses of the requested subpages of the system are registered. This is the most efficient way without substantially losing system performance. Another advantage is that, after updates and modifications of the system, Web addresses referring to new subpages and functions are automatically logged.</p>
      <p>On the other side, a single user action (eg, clicking a button to add a health measurement) can lead to multiple server requests leading to multiple Web addresses in the log data file. This can make it harder to identify single user actions. It is therefore necessary to determine which (combinations of) server requests specify certain actions and to link these to a specific identification for that action, such as a code or description.</p>
      <p>Besides server-side logging, client-side logging can also provide valuable information regarding the usage of the technology. Client-side information contains actions that do not require server requests, such as scrolling up and down the screen, moving the pointer, and clicking and filling out a text field. The research questions determine the logging method that provides the most valuable information. However, it is also important to take the possibilities and the consequences of the different logging methods into account, such as a loss of system performance.</p>
      <sec>
        <title>Requirements of Log Data</title>
        <p>Log data files are most often Comma-Separated Values (.csv) files that can easily be opened using Excel or SPSS. Information regarding the user identity, date and time of the action, and an identification of the action is essential to identify the user, logins, and the usage patterns within and between logins. An example of a fictional log data file is shown in <xref ref-type="fig" rid="figure2">Figure 2</xref>. Depending on the research questions, additional information can be desirable regarding the device (eg, personal computer, mobile phone, tablet, or wearable), a specification of the action (eg, measurements or other information saved in the database), the Global Positioning System (GPS) coordinates of the user, and the status of the user collected via wearables, such as stress, sleep, and activity patterns.</p>
        <p>In order to answer the research questions, data files should be of sufficient quality, wherein the goal of the technology and the used behavior change theories and models form the basis for the data that is needed for the analyses. For example, if the research question is “What are predictors for adherence to the technology?” then the data should contain information from which the adherence can be derived, as well as the variables (such as user or usage characteristics) that might possibly predict adherence. When the focus is on exploring the dose-response relationship, there must be a possibility to link the log data to other outcomes, for instance, via the user identification number.</p>
        <p>The amount of data needed depends on the complexity of the research question and can only be determined empirically. In general, a reasonable amount of data per user and a reasonable amount of users are needed in the dataset. For example, when analyzing 100 usage sessions, 10 usage sessions of 10 different users provide more generalizeable information than 50 usage sessions of 2 different users. Of course, the more data the better, but it needs to contain the needed information to answer the research question as well.</p>
        <p>Importantly, the data should be available for analysis under the applicable privacy regulations, whether or not with informed consent of the individual users of the technology. Informed consent depends upon whether log data includes or needs to be combined with personal data. Currently, it remains undecided whether log data in itself is personal data, as usage data does not always, per se, contain information that can be traced back to individual users. However, as the possibilities for data analytics develop, it may become quite possible in the (near) future to trace users back to specific individuals based on their usage patterns on other technologies. Narayanan and Shmatikov, for example, were able to de-anonymize Netflix users based on reviews in the Internet Movie Database (IMDB) [<xref ref-type="bibr" rid="ref27">27</xref>]. Thus, it may be hard to truly anonymize log data. Therefore, researchers need to always consider the applicable regulations to determine whether informed consent is needed from the users before log data can be collected and analyzed for research purposes.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>A fictional example of log data.</p>
          </caption>
          <graphic xlink:href="resprot_v6i8e156_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Data Preparation</title>
        <p>Preparing the data before analysis is vital since, for the most part, typical log data consist of tens of thousands records. Hence, these records must first be filtered for the information that is needed for the analysis (eg, Web addresses or the codes for specific actions). Then this information needs to be translated into new variables, such as the number of sessions and/or activities per user, sequence of the activities, and/or time spent per login. An example of how the raw data depicted in <xref ref-type="fig" rid="figure2">Figure 2</xref> can be translated into data for analyses is shown in <xref ref-type="fig" rid="figure3">Figure 3</xref>.</p>
        <p>In <xref ref-type="fig" rid="figure3">Figure 3</xref>, every row in the new data set represents one user. The number of sessions is defined as a period of activity ended by a period of at least 30 minutes of inactivity. In this example, this definition has consequences for User 1, having 3 logins and 2 sessions. By counting the number of logins it would seem like this user has a higher activity level then by counting the number of sessions. It is possible that a user picks up the activities where he left off when returning within 30 minutes after the last action. Furthermore, no user actions were registered during the first and the second login. Hence, counting the number of logins (only) might give a distorted image on the amount of actual use of the different elements of technology.</p>
        <p>Second, a distinction was made in this example between visiting a certain element of the technology and actually using it (eg, opening, monitoring, and adding a value, or opening the mailbox and sending a message). Thus, 2 out of the 3 users in this example opened the function for monitoring, but only 1 actually used this function by adding a value to the database. Furthermore, 2 out of 3 users opened their mailboxes and sent a message to a caregiver, where User 3 opened the mailbox twice but sent a message only once.</p>
        <p>These are only a few examples of the variables that can be calculated from a raw log data set. Depending on the research questions, new or other variables can be calculated as well. When the question is how the usage in the first sessions correlates to adherence, a distinction can be made between the activities (eg, opening the mailbox and sending a message) in the first, second, third, and further sessions. Also, variables can be added regarding the adherence by a user (where an adherent user is indicated with a “1” and a non-adherent user with a “0”), whether the sent message has been answered (and within what time period), the location of the user (where GPS coordinates are given for every session), the emotional status of the user, activity levels, or the time (in days or hours) between the previous and the current sessions. By combining different data sources, new variables do not have to contain, by definition, information from the same data file.</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>An example of data transformation, based on the data in <xref ref-type="fig" rid="figure2">Figure 2</xref>.</p>
          </caption>
          <graphic xlink:href="resprot_v6i8e156_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec>
      <title>Data Analysis</title>
      <p>Once the log datasets are prepared, the files are ready for analysis. The first, and up to now, most commonly used method is to describe the frequencies of use, including number of logins or sessions per user, use of the different elements of the technology, moment of use, and time spent on the technology. Although more exposure to an eHealth technology does not always lead to better health outcomes, this information might still provide a starting point for further research. Next, pathway analyses and predictive modeling provide deeper insights into the usage patterns of individual users.</p>
      <p>A pathway analysis can provide more information regarding the different usage patterns that occur. In previous research, for example, the usage patterns of adherers and early and late non-adherers to the ”Living to the Full“ intervention were compared [<xref ref-type="bibr" rid="ref21">21</xref>]. A 1-way analyses of variance (ANOVA) and chi-square tests showed that early non-adherers used fewer and shorter sessions than late non-adherers and adherers. Early non-adherers also used fewer sessions to complete a lesson. Furthermore, late non-adherers had a shorter total duration of sessions than the adherers. Logistic regression was used to assess the baseline characteristics of adherers and non-adherers.</p>
      <p>We have also analyzed usage patterns of first visits to the PHR for patients with chronic conditions [<xref ref-type="bibr" rid="ref23">23</xref>]. The results showed that users followed the structure of the system. While these analyses were conducted by hand on a subset of all users, methods for Markov modeling can be more convenient for analyzing the dominant path through the system of a more extended group of users [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]. This methodology can be used, for example, to analyze how people use the different elements of a technology in terms of frequency and the order they select to reach a certain goal [<xref ref-type="bibr" rid="ref30">30</xref>].</p>
      <p>More advanced and predictive information for pattern recognition within complex data sets can be obtained by applying machine-learning algorithms [<xref ref-type="bibr" rid="ref31">31</xref>]. To do so, the Waikato Environment for Knowledge Analysis (Weka) tool is a relatively accessible and easy to use software package for applying machine learning algorithms for data mining tasks [<xref ref-type="bibr" rid="ref32">32</xref>]. By using Weka, supervised learning, unsupervised learning, and market-basket methods for analysis can be applied. Supervised learning predicts adherence and effects from early use patterns, which enables early intervention for users at risk [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. This method has the potential to answer research questions concerning when users drop out and what the predictors are for users dropping out or returning to the application. Unsupervised learning determines what usage profiles appear from the log data and if this data can be matched to a certain group of participants [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. This method has the potential to answer research questions like ”What are the characteristics of (non-)users, and who are the dropouts?“ Market-basket analysis allows researchers to ask what elements of the technology are often used together [<xref ref-type="bibr" rid="ref36">36</xref>]. Examples of such analyses can be found in the domain of online shopping, where customers get to see suggestions of products based on the products they looked at.</p>
      <p>Although it is difficult to make predictions based on the usage data of relatively small groups of users (eg, in a RCT) and not all research questions can be answered with this data, even these analyses can provide valuable scientific and practical input for future system improvements.</p>
    </sec>
</sec>

    <sec sec-type="discussion">
      <title>Discussion</title>
      <p>Log data analyses can be used as part of the formative, as well as the summative, evaluation of eHealth technology. As a formative evaluation, log data can provide ongoing and real-time information on how to improve the technology and on the process in which the technology is embedded. As part of the summative evaluation, log data can provide explanations on the uptake and the outcomes of the technology, which can be both scientifically and practically valuable.</p>
      <sec>
        <title>Scientific Translation</title>
        <p>Log data analyses provide input for opening the black box of eHealth. Log data analyses not only provide insight into the effects of the single elements of a technology, but can also stipulate essential information about the effects of combinations of elements. In this way, log data can provide input to better understand the results of experimental research designs, such as RCTs or the multiphase optimization strategy (MOST) for eHealth evaluation. In a MOST, potential effective elements are selected for incorporation in an intervention (based on existing theories and/or previous research) and tested in 3 subsequent phases (screening phase, refining phase, confirming phase) [<xref ref-type="bibr" rid="ref37">37</xref>]. Log data has the potential to validate the results of a RCT or these different phases of the MOST. For example, did the users actually find all the incorporated elements of the technology and are these elements used in the intended way? [<xref ref-type="bibr" rid="ref24">24</xref>] And how does the use of the different elements correlate to the found effects, and for whom? Based on such insights, existing technologies can be improved and effective elements can be identified and combined into new technologies. These results are not always revealed through questionnaires, interviews, or usability tests.</p>
        <p>Another advantage of a log data analysis is that it can reveal real-time insights into the user’s response to specific persuasive triggers in different situations (eg, in terms of location, status of the user), providing new possibilities for the timing of persuasion [<xref ref-type="bibr" rid="ref38">38</xref>]. Furthermore, several studies have demonstrated that individuals respond differently to the same persuasive strategies [<xref ref-type="bibr" rid="ref39">39</xref>], indicating that personalization of a technology (adapting a technology to individual users) might increase a program’s persuasiveness and its long-term use and effectiveness [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
        <p>In the domain of eHealth, personalization is often limited to adapting the content of the technology to a confined user profile based on user characteristics like age, gender, and level of education [<xref ref-type="bibr" rid="ref41">41</xref>]. However, there is evidence that such demographics (user profiles) do not predict engagement [<xref ref-type="bibr" rid="ref42">42</xref>]. User profiles, such as early usage patterns for example, do potentially predict whether or not an individual will maintain long-term use of an application. For example, Freyne et al [<xref ref-type="bibr" rid="ref25">25</xref>] found that individuals’ use of specific elements of a technology in the first week influences their use of that technology in the second week. Based upon these results, more extended user profiles can be created that take (early) usage behavior into account, extending user profiles beyond a limited set of user characteristics.</p>
        <p>Log data analyses also allow a timely response to flaws in the technology, a shorter evaluation cycle, and the development of more transparent technology, as stressed in the ”agile science“ approach [<xref ref-type="bibr" rid="ref7">7</xref>]. Until now, modifications of technologies have often been made after an evaluation period. However, technology use is not stagnant, rather it is dynamic and changing over time, and statistics that fit this characteristic are required [<xref ref-type="bibr" rid="ref43">43</xref>]. With a real-time analysis of log data, adaptive interfaces can be created that respond to individual (changes in) usage patterns. The effects of these adaptive interfaces on the usage can then be analyzed further and improved.</p>
        <p>Log data can also be used to test the models and theories that are incorporated in the technology in order to improve the existing behavioral models. Patrick and colleagues made the following comparison for this approach:</p>
        <disp-quote>
          <p>It could be argued that today’s current behavioral theories are akin to the Farmer’s Almanac as they are largely descriptive, past-oriented, and simplified to a few elements. These models for understanding behavior and behavior change provide largely “on average” insights without the level of specification and prediction that could occur in behavioral science if the approach to communication, data, and iterative evaluation of computationally complex, multilevel models now common in meteorology could be replicated. (p829) [<xref ref-type="bibr" rid="ref31">31</xref>]</p>
        </disp-quote>
        <p>Log data has the potential to predict usage behavior and can thus be of added value in the development of complex, multilevel models for behavior change.</p>
        <p>Furthermore, machine-learning algorithms can make predictions regarding whether and when a user might dropout from using the technology, making it possible to intervene in a timely manner and increase adherence to the technology. However, when focusing on research questions to assess adherence, it is important to substantiate this term: when is a user considered to be adherent? In research, assumptions are made about the intended usage of a technology which are not well defined or evidence-based [<xref ref-type="bibr" rid="ref44">44</xref>-<xref ref-type="bibr" rid="ref46">46</xref>]. As a result, it is hard to assess the results of the analyses and compare those to the outcomes of other, similar technologies. A definition of adherence does not always have to be derived from the extent to which a technology is completed (eg, a user is adherent when he/she completed 3 out of 4 lessons), but can also be extracted from other literature. For example, Kaushal and Rhodes discovered that exercising for at least 4 times a week for 6 weeks was the minimum activity to establish an exercise habit [<xref ref-type="bibr" rid="ref47">47</xref>]. This type of evidence can be used for defining adherence to a technology, for example, a user is adherent when at least 4 usage sessions per week can be identified for a period of 6 weeks. In this example, mere login data (eg, the more logins, the better the adherence is) does not reveal adherence, but assigning a substantiated threshold value does.</p>
        <p>An advantage of log data is that it is always available and easy to collect, without requiring any extra effort from the participants. A common problem in (eHealth) research is that participants often find it time consuming and labor intensive to complete questionnaires at different time points or to participate in an interview or focus group, resulting in dropouts from the research study. However, this result does not necessarily mean that the same participants who did not participate in the research dropped out from using the technology. By using log data in addition to questionnaires, researchers have more than one method to collect data and are no longer dependent on having a majority of the participants complete questionnaires or participate in interviews or focus groups.</p>
        <p>However, there are important limitations for using log data in eHealth evaluation. First, the results of the log data analyses do not always indicate why certain usage patterns occur. It is therefore important to use a mixed-methods approach to combine the analyses with additional research via interviews, usability tests, or other quantitative and qualitative research methods. For example, the log data analysis from the ”Living to the Full“ intervention showed that a fairly large group dropped out during the 6th lesson. It was revealed by counselors giving the course that this is indeed a hard lesson for participants because of the focus on observing themselves and learning new skills to accept suffering [<xref ref-type="bibr" rid="ref21">21</xref>]. Additional research can provide more precise insight into what users experience or why they tend to drop out at certain points. Log data analysis focused on such questions can provide researchers specific areas or user groups to examine through future interviews, questionnaires, or usability tests. The results of these evaluations can then be used to improve the technology as well as to highlight the crucial moments in the treatment protocols for blended therapy. Furthermore, using log data in research might require an extra effort from researchers, developers, database managers, etc. For example, it takes time to develop a plan for data collection, management, and analysis, as well as to incorporate the possibility for data collection into the technology.</p>
      </sec>
      <sec>
        <title>Practical Value</title>
        <p>Besides the scientific value, the results of a log data analysis can be of added value for eHealth developers and healthcare providers. For example, the results of a pathway analysis and the identified usage profiles can be used as input for adapting and matching the system design to the users in order to make the technology more persuasive. Information regarding the elements that are often used together can also provide real-time feedback and suggestions to the users, guiding their follow-up actions in the system such as:</p>
        <disp-quote>
          <p>You have added a goal. Other users have added their current weight as well. Click here to add your weight</p>
        </disp-quote>
        <p>Because log data analysis via (un)supervised learning can provide information about users that might potentially drop out from an intervention, on a practical level, healthcare providers can then make use of this information to intervene and stimulate these users to continue using the system. In addition, log data can be used to show healthcare providers how their responsiveness to client messages influences a client’s adherence to the therapy. When composing protocols for (blended) care via eHealth technologies, researchers can then take advantage of the added value of log data analyses.</p>
        <p>Until recently, technologies have often changed after an evaluation period, but with a real-time analysis of log data, adaptive interfaces can be created that respond to individual users. The effects of the interface on the use of the technology can then be directly identified, allowing a fast response to flaws in the technology, a shorter evaluation cycle, and the development of more transparent technology.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>The analysis of log data can be of great value for scientists and designers as well as caregivers and policy makers in their research into the black box of eHealth technology. A deliberate analysis of log data can provide insight into the usage of the technology by all users as a group as well as by individual users, helping to accelerate the persuasiveness and effectiveness of eHealth technology. Furthermore, log data can be used to assess the theories that underpin a technology. However, from the collection of log data to translating the results into valuable information, various steps need to be taken, each with their own considerations. This paper serves as a starting point for using log data analysis in eHealth research.</p>
      </sec>
    </sec>
  </body>
  <back>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">ACT</term>
          <def>
            <p>acceptance and commitment therapy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">eHealth</term>
          <def>
            <p>electronic health</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">GPS</term>
          <def>
            <p>Global Positioning System</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">MOST</term>
          <def>
            <p>multiphase optimization strategy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">PHR</term>
          <def>
            <p>personal health record</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">RCT</term>
          <def>
            <p>randomized controlled trial</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">Weka</term>
          <def>
            <p>Waikato Environment for Knowledge Analysis</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Harjumaa</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Persuasive systems design: key issues, process model, and system features</article-title>
        <source>CAIS</source>  
        <year>2009</year>  
        <volume>24</volume>  
        <issue>1</issue>  
        <fpage>28</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://aisel.aisnet.org/cais/vol24/iss1/28"/>
        </comment> </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kelders</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Oörni</surname>
            <given-names>Anssi</given-names>
          </name>
          <name name-style="western">
            <surname>van Gemert-Pijnen</surname>
            <given-names>JE</given-names>
          </name>
        </person-group>
        <article-title>Health behavior change support systems as a research discipline; a viewpoint</article-title>
        <source>Int J Med Inform</source>  
        <year>2016</year>  
        <month>12</month>  
        <volume>96</volume>  
        <fpage>3</fpage>  
        <lpage>10</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijmedinf.2016.06.022</pub-id>
        <pub-id pub-id-type="medline">27432207</pub-id>
        <pub-id pub-id-type="pii">S1386-5056(16)30151-4</pub-id></nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Nijland</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>van Gemert-Pijnen</surname>
            <given-names>JE</given-names>
          </name>
          <name name-style="western">
            <surname>Kelders</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Brandenburg</surname>
            <given-names>BJ</given-names>
          </name>
          <name name-style="western">
            <surname>Seydel</surname>
            <given-names>ER</given-names>
          </name>
        </person-group>
        <article-title>Factors influencing the use of a Web-based application for supporting the self-care of patients with type 2 diabetes: a longitudinal study</article-title>
        <source>J Med Internet Res</source>  
        <year>2011</year>  
        <month>09</month>  
        <day>30</day>  
        <volume>13</volume>  
        <issue>3</issue>  
        <fpage>e71</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2011/3/e71/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.1603</pub-id>
        <pub-id pub-id-type="medline">21959968</pub-id>
        <pub-id pub-id-type="pii">v13i3e71</pub-id>
        <pub-id pub-id-type="pmcid">PMC3222177</pub-id></nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>van Gemert-Pijnen</surname>
            <given-names>JE</given-names>
          </name>
          <name name-style="western">
            <surname>Nijland</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>van Limburg</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Ossebaard</surname>
            <given-names>HC</given-names>
          </name>
          <name name-style="western">
            <surname>Kelders</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Eysenbach</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Seydel</surname>
            <given-names>ER</given-names>
          </name>
        </person-group>
        <article-title>A holistic framework to improve the uptake and impact of eHealth technologies</article-title>
        <source>J Med Internet Res</source>  
        <year>2011</year>  
        <month>12</month>  
        <day>05</day>  
        <volume>13</volume>  
        <issue>4</issue>  
        <fpage>e111</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2011/4/e111/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.1672</pub-id>
        <pub-id pub-id-type="medline">22155738</pub-id>
        <pub-id pub-id-type="pii">v13i4e111</pub-id>
        <pub-id pub-id-type="pmcid">PMC3278097</pub-id></nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Black</surname>
            <given-names>AD</given-names>
          </name>
          <name name-style="western">
            <surname>Car</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Pagliari</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Anandan</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Cresswell</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Bokun</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>McKinstry</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Procter</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Majeed</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Sheikh</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>The impact of eHealth on the quality and safety of health care: a systematic overview</article-title>
        <source>PLoS Med</source>  
        <year>2011</year>  
        <month>01</month>  
        <day>18</day>  
        <volume>8</volume>  
        <issue>1</issue>  
        <fpage>e1000387</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dx.plos.org/10.1371/journal.pmed.1000387"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1371/journal.pmed.1000387</pub-id>
        <pub-id pub-id-type="medline">21267058</pub-id>
        <pub-id pub-id-type="pmcid">PMC3022523</pub-id></nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Eysenbach</surname>
            <given-names>G</given-names>
          </name>
          <collab>CONSORT-EHEALTH Group</collab>
        </person-group>
        <article-title>CONSORT-EHEALTH: improving and standardizing evaluation reports of Web-based and mobile health interventions</article-title>
        <source>J Med Internet Res</source>  
        <year>2011</year>  
        <month>12</month>  
        <day>31</day>  
        <volume>13</volume>  
        <issue>4</issue>  
        <fpage>e126</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2011/4/e126/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.1923</pub-id>
        <pub-id pub-id-type="medline">22209829</pub-id>
        <pub-id pub-id-type="pii">v13i4e126</pub-id>
        <pub-id pub-id-type="pmcid">PMC3278112</pub-id></nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hekler</surname>
            <given-names>EB</given-names>
          </name>
          <name name-style="western">
            <surname>Klasnja</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Riley</surname>
            <given-names>WT</given-names>
          </name>
          <name name-style="western">
            <surname>Buman</surname>
            <given-names>MP</given-names>
          </name>
          <name name-style="western">
            <surname>Huberty</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Rivera</surname>
            <given-names>DE</given-names>
          </name>
          <name name-style="western">
            <surname>Martin</surname>
            <given-names>CA</given-names>
          </name>
        </person-group>
        <article-title>Agile science: creating useful products for behavior change in the real world</article-title>
        <source>Transl Behav Med</source>  
        <year>2016</year>  
        <month>06</month>  
        <volume>6</volume>  
        <issue>2</issue>  
        <fpage>317</fpage>  
        <lpage>28</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/27357001"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1007/s13142-016-0395-7</pub-id>
        <pub-id pub-id-type="medline">27357001</pub-id>
        <pub-id pub-id-type="pii">10.1007/s13142-016-0395-7</pub-id>
        <pub-id pub-id-type="pmcid">PMC4927453</pub-id></nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Moller</surname>
            <given-names>AC</given-names>
          </name>
          <name name-style="western">
            <surname>Merchant</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Conroy</surname>
            <given-names>DE</given-names>
          </name>
          <name name-style="western">
            <surname>West</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Hekler</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Kugler</surname>
            <given-names>KC</given-names>
          </name>
          <name name-style="western">
            <surname>Michie</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Applying and advancing behavior change theories and techniques in the context of a digital health revolution: proposals for more effectively realizing untapped potential</article-title>
        <source>J Behav Med</source>  
        <year>2017</year>  
        <month>02</month>  
        <volume>40</volume>  
        <issue>1</issue>  
        <fpage>85</fpage>  
        <lpage>98</lpage>  
        <pub-id pub-id-type="doi">10.1007/s10865-016-9818-7</pub-id>
        <pub-id pub-id-type="medline">28058516</pub-id>
        <pub-id pub-id-type="pii">10.1007/s10865-016-9818-7</pub-id>
        <pub-id pub-id-type="pmcid">PMC5532801</pub-id></nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Han</surname>
            <given-names>JY</given-names>
          </name>
        </person-group>
        <article-title>Transaction logfile analysis in health communication research: challenges and opportunities</article-title>
        <source>Patient Educ Couns</source>  
        <year>2011</year>  
        <month>03</month>  
        <volume>82</volume>  
        <issue>3</issue>  
        <fpage>307</fpage>  
        <lpage>12</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.pec.2010.12.018</pub-id>
        <pub-id pub-id-type="medline">21277146</pub-id>
        <pub-id pub-id-type="pii">S0738-3991(10)00790-1</pub-id></nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Resnicow</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Strecher</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Couper</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Chua</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Little</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Nair</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Polk</surname>
            <given-names>TA</given-names>
          </name>
          <name name-style="western">
            <surname>Atienza</surname>
            <given-names>AA</given-names>
          </name>
        </person-group>
        <article-title>Methodologic and design issues in patient-centered e-health research</article-title>
        <source>Am J Prev Med</source>  
        <year>2010</year>  
        <month>01</month>  
        <volume>38</volume>  
        <issue>1</issue>  
        <fpage>98</fpage>  
        <lpage>102</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/20117564"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.amepre.2009.09.034</pub-id>
        <pub-id pub-id-type="medline">20117564</pub-id>
        <pub-id pub-id-type="pii">S0749-3797(09)00638-2</pub-id>
        <pub-id pub-id-type="pmcid">PMC5413301</pub-id></nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>van Gemert-Pijnen</surname>
            <given-names>JE</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>van Gemert-Pijnen</surname>
            <given-names>JE</given-names>
          </name>
          <name name-style="western">
            <surname>Peters</surname>
            <given-names>O</given-names>
          </name>
          <name name-style="western">
            <surname>Ossebaard</surname>
            <given-names>HC</given-names>
          </name>
        </person-group>
        <source>Improving eHealth</source>  
        <year>2013</year>  
        <publisher-loc>The Hague</publisher-loc>
        <publisher-name>Eleven International Publishing</publisher-name></nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bruckman</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Weiss</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Nolan</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Hunsinger</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Trifonas</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Analysis of log file data to understand behavior learning in an online community</article-title>
        <source>International Handbook of Virtual Learning Environments</source>  
        <year>2006</year>  
        <publisher-loc>Dordrecht</publisher-loc>
        <publisher-name>Springer Netherlands</publisher-name>
        <fpage>1449</fpage>  
        <lpage>1465</lpage> </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jamali</surname>
            <given-names>HR</given-names>
          </name>
          <name name-style="western">
            <surname>Nicholas</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Huntington</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>The use and users of scholarly e‐journals: a review of log analysis studies</article-title>
        <source>AP</source>  
        <year>2005</year>  
        <month>12</month>  
        <volume>57</volume>  
        <issue>6</issue>  
        <fpage>554</fpage>  
        <lpage>571</lpage>  
        <pub-id pub-id-type="doi">10.1108/00012530510634271</pub-id></nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Dumais</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Jeffries</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Russell</surname>
            <given-names>Dm</given-names>
          </name>
          <name name-style="western">
            <surname>Tang</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Teevan</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Olson</surname>
            <given-names>JS</given-names>
          </name>
          <name name-style="western">
            <surname>Kellogg</surname>
            <given-names>WA</given-names>
          </name>
        </person-group>
        <article-title>Understanding user behavior through log data analysis</article-title>
        <source>Ways of Knowing in HCI</source>  
        <year>2014</year>  
        <publisher-loc>New York, NY</publisher-loc>
        <publisher-name>Springer New York</publisher-name>
        <fpage>349</fpage>  
        <lpage>72</lpage> </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Jansen</surname>
            <given-names>BJ</given-names>
          </name>
        </person-group>
        <article-title>Search log analysis: What it is, what's been done, how to do it</article-title>
        <source>Libr Inf Sci Res</source>  
        <year>2006</year>  
        <volume>28</volume>  
        <issue>3</issue>  
        <fpage>407</fpage>  
        <lpage>32</lpage> </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Choi</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Chang</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>Y</given-names>
          </name>
          <name name-style="western">
            <surname>Lee</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Son</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Jin</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Detecting and monitoring game bots based on large-scale user-behavior log data analysis in multiplayer online games</article-title>
        <source>J Supercomput</source>  
        <year>2015</year>  
        <month>10</month>  
        <day>26</day>  
        <volume>72</volume>  
        <issue>9</issue>  
        <fpage>3572</fpage>  
        <lpage>3587</lpage>  
        <pub-id pub-id-type="doi">10.1007/s11227-015-1545-2</pub-id></nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Chatterjee</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Price</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Healthy living with persuasive technologies: framework, issues, and challenges</article-title>
        <source>J Am Med Inform Assoc</source>  
        <year>2009</year>  
        <volume>16</volume>  
        <issue>2</issue>  
        <fpage>171</fpage>  
        <lpage>8</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/19074300"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1197/jamia.M2859</pub-id>
        <pub-id pub-id-type="medline">19074300</pub-id>
        <pub-id pub-id-type="pii">M2859</pub-id>
        <pub-id pub-id-type="pmcid">PMC2649327</pub-id></nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Glasgow</surname>
            <given-names>RE</given-names>
          </name>
          <name name-style="western">
            <surname>Christiansen</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Kurz</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>King</surname>
            <given-names>DK</given-names>
          </name>
          <name name-style="western">
            <surname>Woolley</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Faber</surname>
            <given-names>AJ</given-names>
          </name>
          <name name-style="western">
            <surname>Estabrooks</surname>
            <given-names>PA</given-names>
          </name>
          <name name-style="western">
            <surname>Strycker</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Toobert</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Dickman</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Engagement in a diabetes self-management website: usage patterns and generalizability of program use</article-title>
        <source>J Med Internet Res</source>  
        <year>2011</year>  
        <month>01</month>  
        <day>25</day>  
        <volume>13</volume>  
        <issue>1</issue>  
        <fpage>e9</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2011/1/e9/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.1391</pub-id>
        <pub-id pub-id-type="medline">21371992</pub-id>
        <pub-id pub-id-type="pii">v13i1e9</pub-id>
        <pub-id pub-id-type="pmcid">PMC3221359</pub-id></nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Stolyar</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Lober</surname>
            <given-names>WB</given-names>
          </name>
          <name name-style="western">
            <surname>Herbaugh</surname>
            <given-names>AL</given-names>
          </name>
          <name name-style="western">
            <surname>Shinstrom</surname>
            <given-names>SE</given-names>
          </name>
          <name name-style="western">
            <surname>Zierler</surname>
            <given-names>BK</given-names>
          </name>
          <name name-style="western">
            <surname>Soh</surname>
            <given-names>CB</given-names>
          </name>
          <name name-style="western">
            <surname>Kim</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>Usage patterns of a personal health record by elderly and disabled users</article-title>
        <source>AMIA Annu Symp Proc</source>  
        <year>2007</year>  
        <month>10</month>  
        <day>11</day>  
        <fpage>409</fpage>  
        <lpage>13</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/18693868"/>
        </comment>  
        <pub-id pub-id-type="medline">18693868</pub-id>
        <pub-id pub-id-type="pmcid">PMC2655817</pub-id></nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kuijpers</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Groen</surname>
            <given-names>WG</given-names>
          </name>
          <name name-style="western">
            <surname>Oldenburg</surname>
            <given-names>HS</given-names>
          </name>
          <name name-style="western">
            <surname>Wouters</surname>
            <given-names>MW</given-names>
          </name>
          <name name-style="western">
            <surname>Aaronson</surname>
            <given-names>NK</given-names>
          </name>
          <name name-style="western">
            <surname>van Harten</surname>
            <given-names>WH</given-names>
          </name>
        </person-group>
        <article-title>eHealth for breast cancer survivors: use, feasibility and impact of an interactive portal</article-title>
        <source>JMIR Cancer</source>  
        <year>2016</year>  
        <month>05</month>  
        <day>10</day>  
        <volume>2</volume>  
        <issue>1</issue>  
        <fpage>e3</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://cancer.jmir.org/2016/1/e3/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/cancer.5456</pub-id>
        <pub-id pub-id-type="medline">28410178</pub-id>
        <pub-id pub-id-type="pii">v2i1e3</pub-id>
        <pub-id pub-id-type="pmcid">PMC5369634</pub-id></nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kelders</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Bohlmeijer</surname>
            <given-names>ET</given-names>
          </name>
          <name name-style="western">
            <surname>van Gemert-Pijnen</surname>
            <given-names>JE</given-names>
          </name>
        </person-group>
        <article-title>Participants, usage, and use patterns of a web-based intervention for the prevention of depression within a randomized controlled trial</article-title>
        <source>J Med Internet Res</source>  
        <year>2013</year>  
        <month>08</month>  
        <day>20</day>  
        <volume>15</volume>  
        <issue>8</issue>  
        <fpage>e172</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2013/8/e172/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.2258</pub-id>
        <pub-id pub-id-type="medline">23963284</pub-id>
        <pub-id pub-id-type="pii">v15i8e172</pub-id>
        <pub-id pub-id-type="pmcid">PMC3757912</pub-id></nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Pagliari</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Detmer</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Singleton</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Potential of electronic personal health records</article-title>
        <source>BMJ</source>  
        <year>2007</year>  
        <month>08</month>  
        <day>18</day>  
        <volume>335</volume>  
        <issue>7615</issue>  
        <fpage>330</fpage>  
        <lpage>3</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/17703042"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1136/bmj.39279.482963.AD</pub-id>
        <pub-id pub-id-type="medline">17703042</pub-id>
        <pub-id pub-id-type="pii">335/7615/330</pub-id>
        <pub-id pub-id-type="pmcid">PMC1949437</pub-id></nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sieverink</surname>
            <given-names>F</given-names>
          </name>
          <name name-style="western">
            <surname>Kelders</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Braakman-Jansen</surname>
            <given-names>LMA</given-names>
          </name>
          <name name-style="western">
            <surname>van Gemert-Pijnen</surname>
            <given-names>JE</given-names>
          </name>
        </person-group>
        <article-title>The added value of log file analyses of the use of a personal health record for patients with type 2 diabetes mellitus: preliminary results</article-title>
        <source>J Diabetes Sci Technol</source>  
        <year>2014</year>  
        <month>03</month>  
        <volume>8</volume>  
        <issue>2</issue>  
        <fpage>247</fpage>  
        <lpage>255</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/24876574"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1177/1932296814525696</pub-id>
        <pub-id pub-id-type="medline">24876574</pub-id>
        <pub-id pub-id-type="pii">1932296814525696</pub-id>
        <pub-id pub-id-type="pmcid">PMC4455425</pub-id></nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Van Gemert-Pijnen</surname>
            <given-names>JE</given-names>
          </name>
          <name name-style="western">
            <surname>Kelders</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Bohlmeijer</surname>
            <given-names>ET</given-names>
          </name>
        </person-group>
        <article-title>Understanding the usage of content in a mental health intervention for depression: an analysis of log data</article-title>
        <source>J Med Internet Res</source>  
        <year>2014</year>  
        <month>01</month>  
        <day>31</day>  
        <volume>16</volume>  
        <issue>1</issue>  
        <fpage>e27</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2014/1/e27/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.2991</pub-id>
        <pub-id pub-id-type="medline">24486914</pub-id>
        <pub-id pub-id-type="pii">v16i1e27</pub-id>
        <pub-id pub-id-type="pmcid">PMC3936274</pub-id></nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Freyne</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Saunders</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Brindal</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Berkovsky</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Smith</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>Factors associated with persistent participation in an online diet intervention</article-title>
        <source>CHI '12 Extended Abstracts on Human Factors in Computing Systems</source>  
        <year>2012</year>  
        <conf-name>CHI Conference on Human Factors in Computing Systems</conf-name>
        <conf-date>2012 May 05-12</conf-date>
        <conf-loc>Austin, Texas</conf-loc>
        <fpage>2375</fpage>  
        <lpage>80</lpage> </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bohlmeijer</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Fledderus</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Rokx</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Pieterse</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Efficacy of an early intervention based on acceptance and commitment therapy for adults with depressive symptomatology: evaluation in a randomized controlled trial</article-title>
        <source>Behav Res Ther</source>  
        <year>2011</year>  
        <month>01</month>  
        <volume>49</volume>  
        <issue>1</issue>  
        <fpage>62</fpage>  
        <lpage>7</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.brat.2010.10.003</pub-id>
        <pub-id pub-id-type="medline">21074752</pub-id>
        <pub-id pub-id-type="pii">S0005-7967(10)00220-2</pub-id></nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Narayanan</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Shmatikov</surname>
            <given-names>V</given-names>
          </name>
        </person-group>
        <article-title>Robust de-anonymization of large sparse datasets</article-title>
        <year>2008</year>  
        <conf-name>Proceedings of the 2008 IEEE Symposium on Security and Privacy</conf-name>
        <conf-date>2008 May 18-21</conf-date>
        <conf-loc>Oakland, California</conf-loc>
        <fpage>111</fpage>  
        <lpage>125</lpage> </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Seneta</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <article-title>Markov and the birth of chain dependence theory</article-title>
        <source>Int Stat Rev</source>  
        <year>1996</year>  
        <month>12</month>  
        <volume>64</volume>  
        <issue>3</issue>  
        <fpage>255</fpage>  
        <lpage>63</lpage>  
        <pub-id pub-id-type="doi">10.2307/1403785</pub-id></nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Borges</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Levene</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Evaluating variable-length Markov chain models for analysis of user web navigation sessions</article-title>
        <source>IEEE Trans Knowl Data Eng</source>  
        <year>2007</year>  
        <month>04</month>  
        <volume>19</volume>  
        <issue>4</issue>  
        <fpage>441</fpage>  
        <lpage>452</lpage>  
        <pub-id pub-id-type="doi">10.1109/TKDE.2007.1012</pub-id></nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Akkersdijk</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Kelders</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Braakman-Jansen</surname>
            <given-names>LMA</given-names>
          </name>
          <name name-style="western">
            <surname>van Gemert-Pijnen</surname>
            <given-names>JE</given-names>
          </name>
        </person-group>
        <article-title>Using Markov chains to analyze paths through a personal health record</article-title>
        <source>Persuasive Technology XII (Adjunct Proceedings)</source>  
        <year>2017</year>  
        <conf-name>Persuasive Technology XII</conf-name>
        <conf-date>2017 April 03-06</conf-date>
        <conf-loc>Amsterdam</conf-loc></nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Patrick</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Hekler</surname>
            <given-names>EB</given-names>
          </name>
          <name name-style="western">
            <surname>Estrin</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Mohr</surname>
            <given-names>DC</given-names>
          </name>
          <name name-style="western">
            <surname>Riper</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Crane</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Godino</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Riley</surname>
            <given-names>WT</given-names>
          </name>
        </person-group>
        <article-title>The pace of technologic change: implications for digital health behavior intervention research</article-title>
        <source>Am J Prev Med</source>  
        <year>2016</year>  
        <month>11</month>  
        <volume>51</volume>  
        <issue>5</issue>  
        <fpage>816</fpage>  
        <lpage>824</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.amepre.2016.05.001</pub-id>
        <pub-id pub-id-type="medline">27745681</pub-id>
        <pub-id pub-id-type="pii">S0749-3797(16)30138-6</pub-id></nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hall</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Frank</surname>
            <given-names>E</given-names>
          </name>
          <name name-style="western">
            <surname>Holmes</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Pfahringer</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Reutemann</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Witten</surname>
            <given-names>IH</given-names>
          </name>
        </person-group>
        <article-title>The WEKA data mining software</article-title>
        <source>SIGKDD Explor Newsl</source>  
        <year>2009</year>  
        <month>11</month>  
        <day>16</day>  
        <volume>11</volume>  
        <issue>1</issue>  
        <fpage>10</fpage>  
        <pub-id pub-id-type="doi">10.1145/1656274.1656278</pub-id></nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Han</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Pei</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Kamber</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <source>Data Mining: Concepts and Techniques</source>  
        <year>2011</year>  
        <publisher-loc>Burlington, Massachusetts</publisher-loc>
        <publisher-name>Morgan Kaufmann</publisher-name></nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Hekler</surname>
            <given-names>EB</given-names>
          </name>
          <name name-style="western">
            <surname>Michie</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Pavel</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Rivera</surname>
            <given-names>DE</given-names>
          </name>
          <name name-style="western">
            <surname>Collins</surname>
            <given-names>LM</given-names>
          </name>
          <name name-style="western">
            <surname>Jimison</surname>
            <given-names>HB</given-names>
          </name>
          <name name-style="western">
            <surname>Garnett</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Parral</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Spruijt-Metz</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Advancing models and theories for digital behavior change interventions</article-title>
        <source>Am J Prev Med</source>  
        <year>2016</year>  
        <month>11</month>  
        <volume>51</volume>  
        <issue>5</issue>  
        <fpage>825</fpage>  
        <lpage>832</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.amepre.2016.06.013</pub-id>
        <pub-id pub-id-type="medline">27745682</pub-id>
        <pub-id pub-id-type="pii">S0749-3797(16)30241-0</pub-id>
        <pub-id pub-id-type="pmcid">PMC5506832</pub-id></nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Paliouras</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Papatheodorou</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Karkaletsis</surname>
            <given-names>V</given-names>
          </name>
          <name name-style="western">
            <surname>Spyropoulos</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Discovering user communities on the Internet using unsupervised machine learning techniques</article-title>
        <source>Interact Comput</source>  
        <year>2002</year>  
        <month>12</month>  
        <volume>14</volume>  
        <issue>6</issue>  
        <fpage>761</fpage>  
        <lpage>791</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://doi.org/10.1016/S0953-5438(02)00015-2"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/S0953-5438(02)00015-2</pub-id></nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Anand</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Patrick</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Hughes</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Bell</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>A data mining methodology for cross-sales</article-title>
        <source>Knowl Based Syst</source>  
        <year>1998</year>  
        <month>5</month>  
        <volume>10</volume>  
        <issue>7</issue>  
        <fpage>449</fpage>  
        <lpage>461</lpage>  
        <pub-id pub-id-type="doi">10.1016/S0950-7051(98)00035-5</pub-id></nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Collins</surname>
            <given-names>LM</given-names>
          </name>
          <name name-style="western">
            <surname>Murphy</surname>
            <given-names>SA</given-names>
          </name>
          <name name-style="western">
            <surname>Strecher</surname>
            <given-names>V</given-names>
          </name>
        </person-group>
        <article-title>The multiphase optimization strategy (MOST) and the sequential multiple assignment randomized trial (SMART): new methods for more potent eHealth interventions</article-title>
        <source>Am J Prev Med</source>  
        <year>2007</year>  
        <month>05</month>  
        <volume>32</volume>  
        <issue>5 Suppl</issue>  
        <fpage>S112</fpage>  
        <lpage>8</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/17466815"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.amepre.2007.01.022</pub-id>
        <pub-id pub-id-type="medline">17466815</pub-id>
        <pub-id pub-id-type="pii">S0749-3797(07)00051-7</pub-id>
        <pub-id pub-id-type="pmcid">PMC2062525</pub-id></nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Räisänen</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Oinas-Kukkonen</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Pahnila</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Finding kairos in quitting smoking: smokers' perceptions of warning pictures</article-title>
        <source>Persuasive Technology: Third International Conference</source>  
        <year>2008</year>  
        <conf-name>Persuasive Technology 2008</conf-name>
        <conf-date>2008 Jun 04-06</conf-date>
        <conf-loc>Oulu, Finland</conf-loc>
        <fpage>254</fpage>  
        <lpage>257</lpage> </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kaptein</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Eckles</surname>
            <given-names>D</given-names>
          </name>
        </person-group>
        <article-title>Heterogeneity in the effects of online persuasion</article-title>
        <source>JIM</source>  
        <year>2012</year>  
        <volume>26</volume>  
        <issue>3</issue>  
        <fpage>176</fpage>  
        <lpage>88</lpage> </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kaptein</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Markopoulos</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>de Ruyter</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Aarts</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <article-title>Personalizing persuasive technologies: explicit and implicit personalization using persuasion profiles</article-title>
        <source>Int J Hum Comput Stud</source>  
        <year>2015</year>  
        <month>05</month>  
        <volume>77</volume>  
        <fpage>38</fpage>  
        <lpage>51</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijhcs.2015.01.004</pub-id></nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kaptein</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Lacroix</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Saini</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <article-title>Individual Differences in Persuadability in the Health Promotion Domain</article-title>
        <source>PERSUASIVE 2010</source>  
        <year>2010</year>  
        <conf-name>Proceedings of the 5th International Conference on Persuasive Technology</conf-name>
        <conf-date>2010 Jun 07-10</conf-date>
        <conf-loc>Copenhagen, Denmark</conf-loc>
        <fpage>94</fpage>  
        <lpage>105</lpage> </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>van Mierlo</surname>
            <given-names>T</given-names>
          </name>
          <name name-style="western">
            <surname>Li</surname>
            <given-names>X</given-names>
          </name>
          <name name-style="western">
            <surname>Hyatt</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Ching</surname>
            <given-names>AT</given-names>
          </name>
        </person-group>
        <article-title>Demographic and indication-specific characteristics have limited association with social network engagement: evidence from 24,954 members of four health care support groups</article-title>
        <source>J Med Internet Res</source>  
        <year>2017</year>  
        <month>02</month>  
        <day>17</day>  
        <volume>19</volume>  
        <issue>2</issue>  
        <fpage>e40</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2017/2/e40/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.6330</pub-id>
        <pub-id pub-id-type="medline">28213340</pub-id>
        <pub-id pub-id-type="pii">v19i2e40</pub-id>
        <pub-id pub-id-type="pmcid">PMC5336601</pub-id></nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Magni</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Susan Taylor</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Venkatesh</surname>
            <given-names>V</given-names>
          </name>
        </person-group>
        <article-title>‘To play or not to play’: a cross-temporal investigation using hedonic and instrumental perspectives to explain user intentions to explore a technology</article-title>
        <source>Int J Hum Comput Stud</source>  
        <year>2010</year>  
        <month>9</month>  
        <volume>68</volume>  
        <issue>9</issue>  
        <fpage>572</fpage>  
        <lpage>588</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.ijhcs.2010.03.004</pub-id></nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kelders</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Kok</surname>
            <given-names>RN</given-names>
          </name>
          <name name-style="western">
            <surname>Ossebaard</surname>
            <given-names>HC</given-names>
          </name>
          <name name-style="western">
            <surname>Van Gemert-Pijnen</surname>
            <given-names>JE</given-names>
          </name>
        </person-group>
        <article-title>Persuasive system design does matter: a systematic review of adherence to web-based interventions</article-title>
        <source>J Med Internet Res</source>  
        <year>2012</year>  
        <month>11</month>  
        <day>14</day>  
        <volume>14</volume>  
        <issue>6</issue>  
        <fpage>e152</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2012/6/e152/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.2104</pub-id>
        <pub-id pub-id-type="medline">23151820</pub-id>
        <pub-id pub-id-type="pii">v14i6e152</pub-id>
        <pub-id pub-id-type="pmcid">PMC3510730</pub-id></nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Donkin</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Christensen</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Naismith</surname>
            <given-names>SL</given-names>
          </name>
          <name name-style="western">
            <surname>Neal</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Hickie</surname>
            <given-names>IB</given-names>
          </name>
          <name name-style="western">
            <surname>Glozier</surname>
            <given-names>N</given-names>
          </name>
        </person-group>
        <article-title>A systematic review of the impact of adherence on the effectiveness of e-therapies</article-title>
        <source>J Med Internet Res</source>  
        <year>2011</year>  
        <month>08</month>  
        <day>05</day>  
        <volume>13</volume>  
        <issue>3</issue>  
        <fpage>e52</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2011/3/e52/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.1772</pub-id>
        <pub-id pub-id-type="medline">21821503</pub-id>
        <pub-id pub-id-type="pii">v13i3e52</pub-id>
        <pub-id pub-id-type="pmcid">PMC3222162</pub-id></nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="confproc">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Su</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Chih</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Is more eHealth system use better for cancer patients and family caregivers? A literature review</article-title>
        <year>2016</year>  
        <conf-name>AMIA 2016 Annual Symposium</conf-name>
        <conf-date>2016 Nov 12-16</conf-date>
        <conf-loc>Chicago, IL</conf-loc>
        <pub-id pub-id-type="doi">10.13140/RG.2.1.4077.7200</pub-id></nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kaushal</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Rhodes</surname>
            <given-names>RE</given-names>
          </name>
        </person-group>
        <article-title>Exercise habit formation in new gym members: a longitudinal study</article-title>
        <source>J Behav Med</source>  
        <year>2015</year>  
        <month>08</month>  
        <volume>38</volume>  
        <issue>4</issue>  
        <fpage>652</fpage>  
        <lpage>63</lpage>  
        <pub-id pub-id-type="doi">10.1007/s10865-015-9640-7</pub-id>
        <pub-id pub-id-type="medline">25851609</pub-id></nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>