<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">JMIR Hum Factors</journal-id><journal-id journal-id-type="publisher-id">humanfactors</journal-id><journal-id journal-id-type="index">6</journal-id><journal-title>JMIR Human Factors</journal-title><abbrev-journal-title>JMIR Hum Factors</abbrev-journal-title><issn pub-type="epub">2292-9495</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v12i1e66513</article-id><article-id pub-id-type="doi">10.2196/66513</article-id><article-categories><subj-group subj-group-type="heading"><subject>Original Paper</subject></subj-group></article-categories><title-group><article-title>Developing a Data Trust Model (Not Only) for Sleep Research: Conceptual Study and Quantitative Survey</article-title></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>Dressle</surname><given-names>Raphael Jan</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Riemann</surname><given-names>Dieter</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Thoma</surname><given-names>Nicole</given-names></name><degrees>MSc</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Erler</surname><given-names>Christina</given-names></name><degrees>MSc, PhD</degrees><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Burmeister</surname><given-names>Rodger</given-names></name><degrees>Dipl-Inf</degrees><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Jogwitz</surname><given-names>Bianka</given-names></name><degrees>MA</degrees><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Domschke</surname><given-names>Katharina</given-names></name><degrees>MD, PhD</degrees><xref ref-type="aff" rid="aff1">1</xref><xref ref-type="aff" rid="aff4">4</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Spiegelhalder</surname><given-names>Kai</given-names></name><degrees>MD, PhD</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Boldt</surname><given-names>Joachim</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff5">5</xref><xref ref-type="aff" rid="aff6">6</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Wiertz</surname><given-names>Svenja</given-names></name><degrees>DPhil</degrees><xref ref-type="aff" rid="aff5">5</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Feige</surname><given-names>Bernd</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib></contrib-group><aff id="aff1"><institution>Department of Psychiatry and Psychotherapy, Medical Center - University of Freiburg, Faculty of Medicine, University of Freiburg</institution><addr-line>Albert-Ludwigs-Universit&#x00E4;t Freiburg, c/o Medizinische Fakult&#x00E4;t, Klinik f&#x00FC;r Psychiatrie und Psychotherapie, Hauptstra&#x00DF;e 5</addr-line><addr-line>Freiburg</addr-line><country>Germany</country></aff><aff id="aff2"><institution>FZI Research Center for Information Technology</institution><addr-line>Karlsruhe</addr-line><country>Germany</country></aff><aff id="aff3"><institution>Medical Center - University of Freiburg, Faculty of Medicine, University of Freiburg</institution><addr-line>Freiburg</addr-line><country>Germany</country></aff><aff id="aff4"><institution>German Center for Mental Health (DZPG), Partner site Berlin/Potsdam</institution><addr-line>Berlin</addr-line><country>Germany</country></aff><aff id="aff5"><institution>Department of Medical Ethics and the History of Medicine, University of Freiburg</institution><addr-line>Freiburg</addr-line><country>Germany</country></aff><aff id="aff6"><institution>Center for Philosophy and Ethics of Health, University of Southern Denmark</institution><addr-line>Odense</addr-line><country>Denmark</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Kushniruk</surname><given-names>Andre</given-names></name></contrib><contrib contrib-type="editor"><name name-style="western"><surname>Gong</surname><given-names>Yang</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Aretz</surname><given-names>Benjamin</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Sadr</surname><given-names>Hossein</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Nayak</surname><given-names>Mandar</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Raphael Jan Dressle, PhD, Department of Psychiatry and Psychotherapy, Medical Center - University of Freiburg, Faculty of Medicine, University of Freiburg, Albert-Ludwigs-Universit&#x00E4;t Freiburg, c/o Medizinische Fakult&#x00E4;t, Klinik f&#x00FC;r Psychiatrie und Psychotherapie, Hauptstra&#x00DF;e 5, Freiburg, 79104, Germany, 49 761 270-65570; <email>raphael.dressle@uniklinik-freiburg.de</email></corresp></author-notes><pub-date pub-type="collection"><year>2025</year></pub-date><pub-date pub-type="epub"><day>2</day><month>12</month><year>2025</year></pub-date><volume>12</volume><elocation-id>e66513</elocation-id><history><date date-type="received"><day>15</day><month>09</month><year>2024</year></date><date date-type="rev-recd"><day>24</day><month>06</month><year>2025</year></date><date date-type="accepted"><day>01</day><month>08</month><year>2025</year></date></history><copyright-statement>&#x00A9; Raphael Jan Dressle, Dieter Riemann, Nicole Thoma, Christina Erler, Rodger Burmeister, Bianka Jogwitz, Katharina Domschke, Kai Spiegelhalder, Joachim Boldt, Svenja Wiertz, Bernd Feige. Originally published in JMIR Human Factors (<ext-link ext-link-type="uri" xlink:href="https://humanfactors.jmir.org">https://humanfactors.jmir.org</ext-link>), 2.12.2025. </copyright-statement><copyright-year>2025</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Human Factors, is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://humanfactors.jmir.org">https://humanfactors.jmir.org</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://humanfactors.jmir.org/2025/1/e66513"/><abstract><sec><title>Background</title><p>A large amount of data are generated in health care facilities, yet it is rarely made available for secondary research use. The reasons are manifold. Most importantly, different stakeholders&#x2019; needs must be balanced. However, there are currently hardly any feasible solutions for this.</p></sec><sec><title>Objective</title><p>This study aimed to develop a data trust model with supporting user interface applications to provide a legally and ethically sound framework for secondary use of medical data. The development was based on extensive surveys of various stakeholders.</p></sec><sec sec-type="methods"><title>Methods</title><p>Semistructured interviews were conducted with researchers (data users) and institutional representatives of the Medical Center&#x2013;University of Freiburg, and online questionnaires were administered to patients (data subjects), data users, and institutional representatives. The questionnaire for data subjects covered the dimensions of trust (measured with a 5-point Likert scale), quality of interaction and involvement (measured with a 4-point Likert scale), subjective and objective understanding, and usability (measured with the user version of the Mobile Application Rating Scale). For all other stakeholder groups, the questionnaire focused on usability measured using the user version of the Mobile Application Rating Scale. The surveys comprised a requirement elicitation followed by two rounds of evaluation. Independent-samples Welch <italic>t</italic> tests were used to compare group means between the first and second evaluations.</p></sec><sec sec-type="results"><title>Results</title><p>We devised SouveMed, a framework for secondary use of medical data, applied to the use case of sleep research data. The model includes secure onboarding of data subjects and using digital consent and a digital interface for data users for onboarding, defining research aims, querying the amount of available data, and, finally, either downloading data or having algorithms run on it. At its core is a data trust entity that matches descriptions, consents, and constraints of all stakeholders using digital representations and constraint-solving techniques. Fourteen participants took part in the requirements elicitation, 22 in the first evaluation, and 16 in the second evaluation. In both the first and the second evaluations, data subjects showed a high level of trust in the concept, with mean ratings on the trust scale of 4.23 (SD 0.46) in the first and 4.23 (SD 0.68) in the second evaluation (<italic>t</italic><sub>15.78</sub>=0.03, <italic>P</italic>=.97). Regarding usability, the mean functionality score of the data user system increased from 3.56 (SD 0.77) in the first to 4.58 (SD 0.38) out of 5 points in the second evaluation (<italic>t</italic><sub>10.69</sub>=&#x2212;3.28, <italic>P</italic>=.008). The mean functionality score of the data subject system increased from 4.30 (SD 0.41) in the first to 4.50 (SD 0.74) in the second evaluation (<italic>t</italic><sub>13.99</sub>=&#x2212;0.75, <italic>P</italic>=.46).</p></sec><sec sec-type="conclusions"><title>Conclusions</title><p>The SouveMed concept provides a comprehensive framework for the secondary use of medical data. The developed processes can be adapted to other areas of medical research.</p></sec><sec><title>Trial Registration</title><p>German Clinical Trial Register DRKS00031093; https://drks.de/search/en/trial/DRKS00031093/details</p></sec></abstract><kwd-group><kwd>health data</kwd><kwd>data trust</kwd><kwd>sleep research</kwd><kwd>informed consent</kwd><kwd>consent management</kwd><kwd>digital infrastructure</kwd><kwd>patient participation</kwd><kwd>sleep</kwd><kwd>survey</kwd><kwd>trust</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><p>Digitalization in health care holds great potential for data-driven research and scientific progress for the benefit of patients and the general public. This includes, for example, automated systems for disease prediction [<xref ref-type="bibr" rid="ref1">1</xref>-<xref ref-type="bibr" rid="ref3">3</xref>], as well as innovative approaches that enhance data exchange between practitioners and enable better patient monitoring [<xref ref-type="bibr" rid="ref4">4</xref>]. However, the use of data for purposes outside the specific treatment context (ie, secondary use) is hindered by several aspects. While an increasing amount of data is being digitally recorded during treatment, the common notion of <italic>data silos</italic>, where data is in principle readily accessible for research purposes, is too simplistic. This is because many processes in routine clinical care are not yet sufficiently digitized, and many analog, paper-based processes remain [<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref6">6</xref>]. Furthermore, even digitized data is often not sufficiently preprocessed to be directly accessible for research purposes. They are documented using different software systems that lack interoperability and are stored in a variety of file formats [<xref ref-type="bibr" rid="ref5">5</xref>-<xref ref-type="bibr" rid="ref7">7</xref>]. In clinical practice, for example, questionnaires are still frequently handed out in paper form. Digitizing these questionnaires can simply mean that they are scanned and saved in PDF format. A major challenge in this context is the fact that electronic health records, while principally useful for research, are primarily intended to document treatment and reimbursement. Separate measures are necessary to render health record data <italic>fit for purpose</italic> regarding research and to check data quality [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref9">9</xref>].</p><p>Legal restrictions are another major obstacle. In the European Union, the introduction of the General Data Protection Regulation (GDPR) has been celebrated as a milestone for the protection of data subjects&#x2019; rights but has also been criticized for creating obstacles to research [<xref ref-type="bibr" rid="ref10">10</xref>-<xref ref-type="bibr" rid="ref13">13</xref>]. For example, it has been criticized that the GDPR sets higher standards for anonymization than was previously the case in many European Union member states [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref14">14</xref>]. Recital 26 of the GDPR states that pseudonymized data &#x201C;should be considered to be information on an identifiable natural person.&#x201D; This has been interpreted to mean that, in principle, all key-coded data must be considered and treated as identifiable personal data, even if the researcher holding the data is not in possession of the key to re-identify it [<xref ref-type="bibr" rid="ref14">14</xref>]. Therefore, a legal basis is required for the processing of this data, which generally requires greater efforts from researchers and their infrastructure in terms of data protection.</p><p>Article 9 of the GDPR outright prohibits the processing of sensitive personal data, which includes health-related data. An exception is made in Article 9 (2) (a) if the patient (data subject) has given explicit consent to the processing of the personal data. Another exception refers directly to scientific research. Under Article 9 (2) (j), processing of sensitive data is allowed for research purposes if appropriate safeguards are in place and a lawful basis for the processing of data is given in the Union or the relevant member state in accordance with Article 6 [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref15">15</xref>].</p><p>With regard to consent, there are different consent models to choose from, ranging from broad consent (ie, consent for future studies whose exact research questions and specifications are unknown) to specific consent for a particular study. Hybrid models between broad and specific consent have been developed that allow participants to specify the terms of use without having to give consent for each individual study (tiered consent; for a general overview on different consent models, see [<xref ref-type="bibr" rid="ref16">16</xref>]). However, in the area of secondary use of medical data, it may be impractical to obtain explicit consent (eg, due to the need to <italic>reconsent</italic> for data already generated), and it has been suggested that it would often be useful to consider other possible legal bases (eg, [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref14">14</xref>]).</p><p>The secondary use of health data must, however, also comply with other legal and ethical principles that are not fully taken into account in the GDPR [<xref ref-type="bibr" rid="ref14">14</xref>]. While from the perspective of the GDPR, obtaining active consent might be replaced by referring to the special purpose of scientific research (if the required legal basis in the relevant member state exists, as mentioned above), consent is still a central ethical standard in medical research. Of particular interest in the field of medical research are the ethical principles formulated in the Declaration of Helsinki (DOH) [<xref ref-type="bibr" rid="ref17">17</xref>] and Taipei (DOT) [<xref ref-type="bibr" rid="ref18">18</xref>] of the World Medical Association. The DOH formulates general ethical principles for medical research involving human subjects, while the DOT focuses specifically on principles for databases containing health data. Both statements emphasize the importance of explicit consent for the secondary use of health data. The DOH states that &#x201C;physicians or other qualified individuals must obtain free and informed consent from research participants for the collection, processing, storage, and foreseeable secondary use of biological material and identifiable or re-identifiable data&#x201D; [<xref ref-type="bibr" rid="ref17">17</xref>]. The DOT sets out further rules, such as the right to receive information about the use of the data and the right to change or withdraw consent at any time [<xref ref-type="bibr" rid="ref18">18</xref>]. Indeed, these principles are in line with the spirit of the GDPR, which formulates and generally strengthens key data subject rights centered on purpose limitation, sovereignty, and transparency, including the right to be informed about processing and the rights to erasure and restriction of processing (see Articles 5 and 6) [<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref19">19</xref>].</p><p>In addition to these basic requirements for the secondary use of research data, it should not be neglected that the secondary use of medical and research data affects many different interests, which must be carefully balanced in order to achieve the acceptance of all stakeholders. Besides the data subject and data users, these stakeholders crucially include the data-generating side, which is typically a clinic or practitioner who cannot waive their care obligations regarding the patient, including the use of sensitive data. With respect to the data subjects, it has been shown that patients are generally very willing to allow access to their health data for public research purposes [<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref24">24</xref>]. Nevertheless, many patients are concerned about a lack of privacy, transparency, and data security [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. To address these concerns, a sufficient level of trust is required [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. In this regard, appropriate patient involvement and communication appears to be crucial [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. Adequate information about the secondary use of health data should be provided in an understandable and, at best, personalized form [<xref ref-type="bibr" rid="ref26">26</xref>], including information about specific projects and findings related to data use [<xref ref-type="bibr" rid="ref28">28</xref>]. Although there are large interindividual differences in the level of involvement favored by patients, many studies show that a large number of patients prefer a high level of control over their health data [<xref ref-type="bibr" rid="ref28">28</xref>-<xref ref-type="bibr" rid="ref32">32</xref>].</p><p>As noted above, data users are another important stakeholder group. There is a widespread view that considers health data to be the private property of patients. However, this approach falls short. Concepts of ownership cannot easily be applied to data, and health data can be considered as coconstructed, involving both the data subject and the clinicians and researchers with the generating institution, who contribute their efforts in collecting, classifying, interpreting, processing, and storing the data [<xref ref-type="bibr" rid="ref33">33</xref>-<xref ref-type="bibr" rid="ref35">35</xref>]. Because of this crucial contribution and the care obligations of the generating institutions noted above, the needs and constraints of institutions and researchers involved in the generation of health data must be equally considered. Correspondingly, the willingness of institutions and researchers to share health data without appropriate incentives, as well as trust and legal security, is often low [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]. At the same time, data users formulate their own requirements for the composition of data sets, utilization options, and acceptable expenditures.</p><p>The secondary use of health data, therefore, takes place in a complex environment: legal norms (relating to, but not limited to, data protection regulation), ethical standards, and the interests and needs of different stakeholder groups must be taken into account and balanced. At the same time, a progressive increase in the amount of data available can be expected, which necessitates time- and cost-efficient processes to make use of this data. While initiatives such as the envisaged European Health Data Space (EHDS), the centralized Finnish health data registries, and the German <italic>Medizininformatikinitiative</italic> (medical informatics initiative), among others, prove that the secondary use of health data is on the political and societal agenda, overall, the development is still in its infancy and the great potential that lies in the secondary use of data is currently not being realized. As a possible solution to the problems outlined above, the possibility of data trust models is being discussed (eg, [<xref ref-type="bibr" rid="ref38">38</xref>-<xref ref-type="bibr" rid="ref41">41</xref>]). In a report for the United Kingdom government by Hall and Pesenti [<xref ref-type="bibr" rid="ref41">41</xref>] on the future use of artificial intelligence, data trusts are defined in an overarching manner as &#x201C;a set of relationships underpinned by a repeatable framework, compliant with parties&#x2019; obligations, to share data in a fair, safe and equitable way&#x201D; (p. 46). Nevertheless, as comprehensively summarized by Lauf et al [<xref ref-type="bibr" rid="ref42">42</xref>], there is currently no universally accepted definition of a data trust. Instead, based on an analysis of applications across various domains, four <italic>archetypes</italic> of data trusts have been proposed, each with distinct characteristics: data brokerage trustees, data processing trustees, data aggregation trustees, and data custody trustees [<xref ref-type="bibr" rid="ref42">42</xref>]. In view of the strict data protection requirements associated with the use of health data, existing studies in the medical domain have examined technical features designed to mitigate potential risks. For example, based on a security-by-design approach, the modular separation of demographic and medical data has been proposed to improve data protection within a data trust [<xref ref-type="bibr" rid="ref43">43</xref>]. In the context of the German medical informatics initiative, the secondary use of medical data is being facilitated by the so-called data integration centers at several university hospitals. Access to the data is controlled by <italic>use and access committees</italic>, which manually review and evaluate data requests before granting access [<xref ref-type="bibr" rid="ref44">44</xref>,<xref ref-type="bibr" rid="ref45">45</xref>]. However, beyond these technical and organizational considerations, the successful implementation of a data trust model also depends on stakeholder acceptance and its effective integration into existing clinical workflows.</p><p>The aim of the present study was to design a comprehensive legally and ethically sound data trust model from the early conceptualization, through the technical implementation of a prototype system, to its evaluation from the perspectives of various stakeholders. In this study, a data trust model was conceptualized as a neutral entity that facilitates data use while accounting for the interests of all involved stakeholders. Importantly, the data trust&#x2014;by our definition&#x2014;does not make decisions on behalf of others. At its core, the system includes a matching service that automatically compares the rules and requirements specified by each stakeholder. When these align, access is granted, without the system itself exercising intentionality. Development prioritized preserving data subjects&#x2019; sovereignty while ensuring that system processes remain scalable.</p><p>The evaluation was preregistered in a clinical trials registry (German Clinical Trials Registry DRKS00031093). A particular focus was on the use case of sleep research. Sleep research seemed particularly suitable as it is a highly relevant field that warrants further intensified research efforts due to the high prevalence and disease burden of sleep disorders. For example, up to 10% of the general population experiences an insomnia disorder [<xref ref-type="bibr" rid="ref46">46</xref>] and between 9% and 38% (dependent on age group and methodological approach used) from obstructive sleep apnea [<xref ref-type="bibr" rid="ref47">47</xref>]. In addition, the field of sleep research is particularly suitable for data-based approaches, as investigating sleep generates a large amount of data, such as sensor data (from the conventionally used polysomnography to modern lifestyle devices such as smartwatches) and subjective data [<xref ref-type="bibr" rid="ref48">48</xref>]. Besides that, this field is especially sensitive because of its links to psychiatry and is underrepresented in current data-sharing initiatives.</p></sec><sec id="s2" sec-type="methods"><title>Methods</title><sec id="s2-1"><title>Overview of Study Design</title><p>The conceptualization of the data trust model was carried out in five steps (see <xref ref-type="fig" rid="figure1">Figure 1</xref>). First, a participatory approach was used to identify relevant needs regarding a data trust model from the perspective of different stakeholders and to define basic requirements for a data trust (requirement elicitation). This included a survey of data subjects, patient representatives, and sleep researchers (data users). An initial conceptual model was then developed, which included a refinement of the relevant procedures and first interactive mock-ups of user interfaces (UI). In a second step, these UIs and procedures were evaluated from the perspective of data subjects, data users, and institutional representatives (including data protection and ethics experts; first evaluation). The feedback was used to further refine the system prototype that was developed in parallel. This prototype was then evaluated again in a second evaluation, which was similar to the process used in the first round of evaluation.</p><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>Overview of the study design. HCTS: Human-Computer Trust Scale; QII: Quality of Interaction and Involvement; uMARS: user version of the Mobile Application Rating Scale.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="humanfactors_v12i1e66513_fig01.png"/></fig></sec><sec id="s2-2"><title>Requirements Elicitation</title><p>Separate questionnaires were developed for data subjects/patient representatives and data users. The questions were developed on the basis of a structured consensus process in the project group with the participation of IT experts and sleep researchers and included questions on general attitudes toward data sharing and preferred consent models as well as technical and organizational requirements, depending on the target group. The full questionnaire used for the requirements elicitation is available upon request.</p></sec><sec id="s2-3"><title>Evaluation</title><sec id="s2-3-1"><title>Overview</title><p>The aim of the evaluation study was twofold. First, we wanted to gain some general insights into attitudes toward data sharing with a data trust model from the perspective of different stakeholder groups. These included data subjects from the sleep laboratory, Department of Psychiatry, Medical Center&#x2013;University of Freiburg, as well as data users/representatives from data-generating institutions. We also aimed at evaluating our specific data sharing process and data trust model from both perspectives. To this end, we conducted a series of anonymous surveys using a semistructured interview and questionnaires (see below). The relevant constructs for the development of the questionnaires were identified in internal project workshops as well as on the basis of a systematic literature search and the needs analysis.</p></sec><sec id="s2-3-2"><title>Semistructured Interviews</title><p>Semistructured interviews were conducted with data users and institutional representatives to gain a more comprehensive picture of the views on data sharing and the corresponding needs. This consisted of a total of 10 predefined questions (see <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>).</p></sec><sec id="s2-3-3"><title>Questionnaire</title><p>In total, the questionnaire for data subjects comprised 51 items, which included 4 sociodemographic questions, 5 open questions, 33 Likert scale items, and 9 statement items. The questionnaire for data users/institutional representatives included a total of 30 items, which included 2 sociodemographic questions, 6 open questions, 16 Likert scale items, and 6 statement items.</p><p>Trust was assessed using the <italic>human-computer trust scale</italic> (HCTS) [<xref ref-type="bibr" rid="ref49">49</xref>]. The HCTS is a 12-item questionnaire for assessing user trust based on the <italic>human-computer trust model</italic> [<xref ref-type="bibr" rid="ref50">50</xref>]. The HCTS includes questions on three dimensions that have been shown to measure trust. These include benevolence (ie, the belief that a system acts in the interest of the user and provides sufficient help if necessary), competence (ie, whether the system has all features and functions that are necessary to fulfill the intended tasks), and perceived risk (individual evaluation regarding the probability of adverse consequences when using the system). All questions were answered on a 5-point Likert scale from 1 (&#x201C;strongly disagree&#x201D;) to 5 (&#x201C;strongly agree&#x201D;).</p><p>Quality of interaction and involvement (QII) was assessed using 7 questions developed by Abdelhamid et al [<xref ref-type="bibr" rid="ref51">51</xref>]. The questions were translated into German and adapted to relate specifically to the SouveMed process (eg, &#x201C;Have your feelings and emotions been given the attention they deserve?&#x201D;). Data subjects had to answer on a 4-point Likert scale (&#x201C;yes, always&#x201D; to &#x201C;no, never&#x201D;).</p><p>The German version of the Mobile Application Rating Scale (MARS) [<xref ref-type="bibr" rid="ref52">52</xref>] was used to assess usability. Three of four sections that are part of the user version of the MARS (uMARS) [<xref ref-type="bibr" rid="ref53">53</xref>] were presented. These include the following sections: functionality (eg, &#x201C;How easy is it to learn how to use the SouveMed app; how clear are the menu labels, icons and instructions?&#x201D;), aesthetics (eg, &#x201C;Visual appeal: How good does the SouveMed app look?&#x201D;), and subjective quality (eg, &#x201C;Would you recommend the SouveMed app to people who might benefit from it?&#x201D;). We decided to use only a subset of the sections to avoid overlap with other elements of our comprehensive questionnaire and because some sections were not applicable to the objectives and content of our specific system. All questions were answered on a 5-point Likert scale, with responses reflecting judgments ranging from &#x201C;inadequate&#x201D; to &#x201C;excellent.&#x201D; Higher scores, therefore, reflect higher quality ratings for the respective domain.</p><p>Sociodemographic information and understanding were assessed using 13 items of the questionnaire developed by Richter et al [<xref ref-type="bibr" rid="ref21">21</xref>]. This included a self-assessment of understanding, subjective reasons for possible poor understanding, and questions to assess the content-related understanding objectively.</p></sec></sec><sec id="s2-4"><title>Participants</title><p>Current patients and participants of other studies in the sleep laboratory at the Department of Psychiatry, Medical Center&#x2013;University of Freiburg, as well as data users, that is, sleep researchers and representatives of the Medical Center&#x2013;University of Freiburg with special expertise in data protection or ethics, were approached and invited to participate voluntarily in the study. Participants who were 18 years or older were included and provided informed consent. We excluded pregnant participants and patients with severe mental or somatic disorders that would have made it unreasonable or impracticable to conduct the survey.</p></sec><sec id="s2-5"><title>Ethical Considerations</title><p>Approval of the ethics committee of the University of Freiburg, Freiburg, Germany, was obtained (case number 23-1047-S2). The study was conducted in accordance with applicable German and EU data protection regulations as well as the DOH. Participation was voluntary and not compensated. All participants were informed about the aims, methods, risks, and potential benefits of the study and provided documented informed consent. No personally identifying information was collected, ensuring that all study data were fully anonymized.</p></sec><sec id="s2-6"><title>Statistical Analysis</title><p>The results were averaged, and questionnaire scores are presented as mean (SD) values where possible. Analyses were performed using the statistics software R (version 4.5.0). In the case of missing data, subjects were excluded only from analyses involving the variables for which data were missing (pairwise deletion). Independent-samples Welch <italic>t</italic> tests were used to compare group means between the first and second evaluation, and Hedges <italic>g</italic> was calculated as a measure of effect size. <italic>P</italic> values &#x2264;.05 were considered statistically significant.</p></sec></sec><sec id="s3" sec-type="results"><title>Results</title><sec id="s3-1"><title>Requirements Elicitation and the SouveMed Data Trust</title><sec id="s3-1-1"><title>Requirements Elicitation</title><p>We received feedback from a total of 14 participants, including 10 data subjects/patient representatives and 4 data users. From the data subject&#x2019;s perspective, the survey revealed a clear preference for the possibility of personal contact as part of the informed consent process. There was also a preference for a consent model that allows for further refinement of the conditions under which data sharing is permitted. However, the majority of respondents were critical of giving separate consent for each individual data request. In addition, there was a high general willingness to provide data, although sufficient transparency and data security were often formulated as the most important conditions for this. Furthermore, 5 (50%) of the data subjects considered it &#x201C;very important&#x201D; or &#x201C;important&#x201D; to receive information about study results that were obtained using their own data. With 6 data subjects (60%), a majority considered it &#x201C;very important&#x201D; or &#x201C;important&#x201D; to receive a brief description of study projects, and 5 (50%) considered it &#x201C;very important&#x201D; or &#x201C;important&#x201D; to receive more detailed information about the status of these studies. A large proportion of the data subjects surveyed were therefore interested in comprehensive participation.</p><p>From the perspective of data users, there was a clear preference for the European Data Format for the raw polysomnography data. The availability of a range of relevant metadata (eg, number of people, age, diagnosis statistics, etc) was also seen as essential to the attractiveness of the system.</p></sec><sec id="s3-1-2"><title>The SouveMed Data Trust</title><p>Based on the needs analysis and workshops by the project group, we developed the <italic>SouveMed</italic> concept, a comprehensive workflow for the secondary use of health data (see <xref ref-type="fig" rid="figure2">Figure 2</xref>) with the following key features from the perspective of different stakeholder groups. From the perspective of data subjects, the following functions exist:</p><list list-type="bullet"><list-item><p><italic>Onboarding:</italic> A key element of the SouveMed concept is the separation of the onboarding process, that is, the willingness to participate in SouveMed and manage consents with the SouveMed system, from the act of consenting to or disallowing the use of data. It is therefore envisaged that data subjects will only be approached during their visit to the clinical facility to obtain information about SouveMed and to register on the platform. This involves establishing the data subject&#x2019;s identity and generating a SouveMed ID, that is, a number that can be used together with a password to log in to the platform.</p></list-item><list-item><p><italic>Providing consent:</italic> In order to allow participants the necessary time for their decision as well as independence from the clinical setting, decisions are laid down digitally on the SouveMed platform. Consent is designed as a tiered consent (see <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>): It applies to a specific visit in the clinical facility and can be further specified, for example, regarding user groups (public or commercial research) and type of shared data (individual or aggregated). The currently valid consent can be viewed at any time on the digital platform, and consent can be withdrawn just as easily as given, amounting to a revocation of data use.</p></list-item><list-item><p xml:lang="en-us"><italic>Participating in data usage:</italic> The SouveMed platform enables participation in the use of data. Data subjects can obtain information about projects that have accessed their data (including a clear description of the main objectives and results of the studies) and have an overview of current and past consents via a consent archive. Should concerns about data protection or other questions arise, they can easily find the relevant contact information on the SouveMed platform.</p></list-item></list><fig position="float" id="figure2"><label>Figure 2.</label><caption><p>The SouveMed concept.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="humanfactors_v12i1e66513_fig02.png"/></fig><p>From the perspective of data users, the following functions exist:</p><list list-type="bullet"><list-item><p><italic>Feasibility inquiry:</italic> Users can submit a feasibility inquiry for a defined research project (ie, specify the inclusion and exclusion criteria and receive the number of available matches with these criteria), as a low-threshold way to determine whether a research project with SouveMed data is realizable.</p></list-item><list-item><p><italic>Usage inquiry:</italic> If the result of the feasibility inquiry appears promising, data users can request data usage directly via the SouveMed platform. They can also obtain an overview of their former and current inquiries.</p></list-item><list-item><p><italic>Data analysis on the platform</italic>. Users can submit their own scripted algorithms and evaluate datasets in a controlled data trust environment using the curious container technique (for more details, see [<xref ref-type="bibr" rid="ref54">54</xref>]). This allows for increased data protection, as only aggregated data are shared, including data from participants who only consented to the sharing of aggregated data.</p></list-item><list-item><p><italic>Enabling participation of data subjects:</italic> Users can use the SouveMed platform to report incidental findings, as well as provide study outlines and results to data subjects.</p></list-item></list><p>Finally, from the perspective of the data-generating institutions:</p><list list-type="bullet"><list-item><p>Institutions can define requirements for data use, for example, embargos.</p></list-item><list-item><p>Institutions can monitor the data flow decisions of the platform and ensure conformance with requirements.</p></list-item><list-item><p>Technical prerequisites were established for this control functionality for data-generating institutions, but it was not implemented as a web interface; SouveMed is designed to be decentralized with a data access component that is under control of the generating institution.</p></list-item></list><p>In the SouveMed project, separate UIs were developed for data users (see <xref ref-type="fig" rid="figure3">Figure 3</xref>) and data subjects (see <xref ref-type="fig" rid="figure4">Figure 4</xref>). Conceptually, it is intended that data users must create their own user account, whereby a contract between the affiliated institution and SouveMed is a prerequisite for this. A key element of the SouveMed system is the <italic>data trust component</italic>, which automatically matches the descriptions, preferences, and requirements of all stakeholders (data subject, researcher, and institution) using digital contract representations. For details on the technical implementation of the described functions of the SouveMed concept, please refer to [<xref ref-type="bibr" rid="ref54">54</xref>] and [<xref ref-type="bibr" rid="ref55">55</xref>].</p><fig position="float" id="figure3"><label>Figure 3.</label><caption><p>User interface for data users.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="humanfactors_v12i1e66513_fig03.png"/></fig><fig position="float" id="figure4"><label>Figure 4.</label><caption><p>User interface for data subjects.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="humanfactors_v12i1e66513_fig04.png"/></fig></sec></sec><sec id="s3-2"><title>Evaluation</title><sec id="s3-2-1"><title>Sample Characteristics</title><p>A total of 22 participants (14 females and 8 males) were studied in the first evaluation. These included 11 patients with sleep disorders and 11 data users/institutional representatives. In the second evaluation, a total of 16 participants (9 females and 7 males) were examined. These included 10 patients with sleep disorders and 6 data users. Of the 22 participants in the first evaluation, 5 (23%) were between 18 and 30 years old, 10 (45%) between 31 and 45 years old, 4 (18%) between 46 and 60 years old, and 3 (14%) between 61 and 75 years old. Of the 16 participants in the second evaluation, 2 (13%) fell into the age range of 18 to 30 years, 7 (44%) into the age range of 31 to 45 years, 5 (31%) into the age range of 46 to 60 years, and 2 (13%) into the age range of 61 to 75 years.</p><p>The general willingness to make data available for secondary use was assessed in the data subject group with a mean value of 4.35 (SD 0.58) on a 5-point Likert scale (&#x201C;very low&#x201D;=1 point to &#x201C;very high&#x201D;=5 points; for the first and second evaluations combined). The need for a corresponding system was assessed in the group of data users/institutional representatives with a mean value of 4.29 (SD 0.77) on a 5-point Likert scale (&#x201C;very low&#x201D;=1 point to &#x201C;very high&#x201D;=5 points; for the first and second evaluations combined).</p></sec><sec id="s3-2-2"><title>Semistructured Interview</title><p>Data users and institutional representatives described the system as clear and equipped with all the functions they required. It was pointed out that thorough explanations of the secondary use of research data are also important for this stakeholder group. Furthermore, it was uniformly emphasized that the need for a system that facilitates the secondary use of research data is very high.</p><p>Previous contact with the concept of data trust models was mentioned by only two participants. With regard to the required functionalities, it was emphasized that access to the system should be easy and that all legal requirements should be met. When the representatives of the institutions were asked whether they would agree to the use of SouveMed in their institution, all gave positive feedback. One person emphasized the importance of an integrated model for all areas of health care in order to avoid isolated solutions for different areas.</p></sec><sec id="s3-2-3"><title>User Version of the MARS</title><p>In the first evaluation, 8 data users/institutional representatives and 10 data subjects provided complete data on the uMARS. In the second evaluation, 6 data users and 10 data subjects provided complete data on the uMARS.</p><sec id="s3-2-3-1"><title>Functionality</title><p>The mean functionality score of the data user system increased from 3.56 (SD 0.77) in the first evaluation to 4.58 (SD 0.38) in the second evaluation. This difference was statistically significant (<italic>t</italic><sub>10.69</sub>=&#x2212;3.28, <italic>P</italic>=.008), with a large effect size (<italic>g</italic>=&#x2212;1.51, 95% CI &#x2212;2.76 to &#x2212;0.26). The mean functionality score of the data subject system increased from 4.30 (SD 0.41) in the first evaluation to 4.50 (SD 0.74) in the second evaluation. This difference was not statistically significant (<italic>t</italic><sub>13.99</sub>=&#x2212;0.75, <italic>P</italic>=.46; <italic>g</italic>=&#x2212;0.32, 95% CI &#x2212;1.23 to 0.58).</p></sec><sec id="s3-2-3-2"><title>Aesthetics</title><p>The mean aesthetics score of the data user system increased from 4.08 (SD 0.68) in the first evaluation to 4.17 (SD 0.55) in the second evaluation. This difference was not statistically significant (<italic>t</italic><sub>11.91</sub>=&#x2212;0.25, <italic>P</italic>=.80; <italic>g</italic>=&#x2212;0.12, 95% CI &#x2212;1.23 to 0.98). The mean aesthetics score of the data subject system increased from 3.93 (SD 0.44) in the first evaluation to 4.23 (SD 0.94) in the second evaluation. This difference was not statistically significant (<italic>t</italic><sub>12.72</sub>=&#x2212;0.91, <italic>P</italic>=.38; <italic>g</italic>=&#x2212;0.39, 95% CI &#x2212;1.30 to 0.52).</p></sec><sec id="s3-2-3-3"><title>Subjective Quality</title><p>In the first evaluation, the mean score for the recommendation item (&#x201C;Would you recommend this app to people who might benefit from it?&#x201D;) of the data user system was 4.63 (SD 0.52). In the second evaluation, the mean score increased to 4.83 (SD 0.41). This difference was not statistically significant (<italic>t</italic><sub>11.93</sub>=&#x2212;0.84, <italic>P</italic>=.42; <italic>g</italic>=&#x2212;0.42, 95% CI &#x2212;1.52 to 0.70.</p><p>In the first evaluation, the mean score for the recommendation item of the data subject system was 3.90 (SD 0.74). In the second evaluation, the mean score increased to 4.20 (SD 0.79). This difference was not statistically significant (<italic>t</italic><sub>17.92</sub>=&#x2212;0.88, <italic>P</italic>=.39; <italic>g</italic>=&#x2212;0.38, 95% CI &#x2212;1.28 to 0.53).</p><p>In the first evaluation, data users rated the system with an average of 3.75 out of 5 (SD 0.71) stars and in the second evaluation with 4.17 (SD 0.41) stars. This difference was not statistically significant (<italic>t</italic><sub>11.44</sub>=&#x2212;1.39, <italic>P</italic>=.44; <italic>g</italic>=&#x2212;0.65, 95% CI &#x2212;1.78 to 0.48). Data subjects rated the system with an average of 3.90 (SD 0.57) stars in the first evaluation and 4.10 (SD 0.57) stars in the second evaluation. This difference was not statistically significant (<italic>t</italic><sub>18.00</sub>=&#x2212;0.79, <italic>P</italic>=.44; <italic>g</italic>=&#x2212;0.34, 95% CI &#x2212;1.24 to 0.57).</p></sec></sec></sec><sec id="s3-3"><title>Trust</title><p>In the first evaluation, the assessment of data subject trust resulted in a mean rating of 4.23 (SD 0.46) on the HCTS. One data subject did not respond to the trust scale and was excluded from the analysis. In the second evaluation, the mean rating was 4.23 (SD 0.68; see <xref ref-type="fig" rid="figure5">Figure 5</xref> for item-level mean values). This difference was not statistically significant (<italic>t</italic><sub>15.78</sub>=0.03, <italic>P</italic>=.97; <italic>g</italic>=0.01, 95% CI &#x2212;0.87 to 0.91).</p><fig position="float" id="figure5"><label>Figure 5.</label><caption><p>Data subject trust.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="humanfactors_v12i1e66513_fig05.png"/></fig></sec><sec id="s3-4"><title>Quality of Interaction and Involvement</title><p>In the first evaluation, the assessment of QII resulted in a mean rating of 1.10 (SD 0.19), with lower scores indicating higher perceived quality. In the second evaluation, the mean rating was 1.17 (SD 0.34; see <xref ref-type="fig" rid="figure6">Figure 6</xref> for item-level mean values). This difference was not statistically significant (<italic>t</italic><sub>14.12</sub>=&#x2212;0.58, <italic>P</italic>=.57; <italic>g</italic>=&#x2212;0.26, 95% CI &#x2212;1.15 to 0.66). In the first evaluation, 1 data subject did not respond to the QII scale and was excluded from the analysis.</p><fig position="float" id="figure6"><label>Figure 6.</label><caption><p>Quality of interaction and involvement.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="humanfactors_v12i1e66513_fig06.png"/></fig></sec><sec id="s3-5"><title>Subjective Understanding</title><p>When participants were asked whether they thought the information about their data use was understandable, the mean rating was 4.40 (SD 0.97) in the first evaluation and 4.30 (SD 0.95) in the second evaluation. This difference was not statistically significant (<italic>t</italic><sub>17.99</sub>=0.23, <italic>P</italic>=.82; <italic>g</italic>=0.10, 95% CI &#x2212;0.80 to 1.00). The scope/length of the information was rated as &#x201C;just right&#x201D; by 8 of 11 (73%) data subjects in the first evaluation, &#x201C;too long&#x201D; by 3 of 11 (27%) data subjects, and &#x201C;too short&#x201D; by none. In the second evaluation, it was rated as &#x201C;just right&#x201D; by 8 of 10 (80%), &#x201C;too long&#x201D; by 2 of 10 (20%) data subjects, and &#x201C;too short&#x201D; by none. The results on objective understanding can be found in the supplementary material (see <xref ref-type="supplementary-material" rid="app3">Multimedia Appendix 3</xref>).</p></sec><sec id="s3-6"><title>Perceived Risk</title><p>Data users and institutional representatives were asked to rate the perceived risk to their institution of using SouveMed. Sixteen (94%) out of 17 responded that they perceived no risk (for the first and second evaluation combined), and 1 of 17 (6%) perceived a risk (for the first and second evaluation combined). Data protection concerns were mentioned as a potential risk.</p></sec></sec><sec id="s4" sec-type="discussion"><title>Discussion</title><sec id="s4-1"><title>Principal Findings</title><p>Making health data accessible for secondary research use is a major challenge in the upcoming decades for both health care institutions and research organizations. In addition to the increasing opportunities created by digitalization and the high willingness of data subjects to make health data available, as the present study and other works show [<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref23">23</xref>], the potential is not being realized for a number of reasons. These include changing legal norms, inadequate preprocessing of data, and the existence of a large number of different, sometimes conflicting interests of the various stakeholders.</p></sec><sec id="s4-2"><title>The SouveMed Concept</title><p>Data trust models are a promising solution to address this complexity. However, apart from a few small, heterogeneous initiatives, there are hardly any fully developed approaches in this regard in the field of medical research. We have therefore developed an ethically sound framework for the secondary use of medical data that is applied to the use case of sleep research. The model includes secure onboarding of data subjects and digital use of information, consent, and feedback channels; a digital interface for data users for onboarding, defining research aims and categorization, querying available data set numbers, and, finally, either downloading data or having algorithms run on it; and, crucially, a digital data trust that matches the descriptions and preconditions of all stakeholders (data subject, data user, and institution) using digital contract representations. Data access is granted in our model only when all requirements and conditions set forth by the various stakeholders are satisfied. The explicit focus of our data trust model is on data subject sovereignty and participation, as data subject involvement and appropriate communication are critical to build trust [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>] and were central to many data subjects in our needs analysis. Accordingly, a majority of data subjects emphasized the importance of a personal contact person in the consent process to be able to ask individual questions. In addition, transparency about data use was mentioned as an important prerequisite for the willingness to provide data, and there was a clear preference for a consent model that allows for further refinement of the conditions under which data sharing is permitted. Based on these results, the SouveMed model provides the opportunity for data subjects to give <italic>real</italic> informed consent by presenting them with comprehensible information material and encouraging them to ask individualized questions in the information process. By separating information and consent in terms of time and space, the ethically questionable linking of health care and the provision of informed consent is avoided. Participants also have the opportunity to receive information about study projects that use their data. The combination of information in face-to-face contact and via a digital platform enables both personalized information for data subjects and patient sovereignty over the amount of involvement, both key requirements demanded of a system for secondary use of health data (eg, [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref31">31</xref>]).</p><p>SouveMed uses an opt-in solution where data subjects explicitly decide whether or not they wish to share data. This is in line with generally recognized ethical standards for medical research [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref56">56</xref>]. In addition, the present finding regarding the usefulness of tiered consent provided in an electronic format is in line with previous studies investigating different consent models and modes of patient involvement (eg, [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref57">57</xref>-<xref ref-type="bibr" rid="ref59">59</xref>]). In our approach, the use of a digital interface for consent management also allows data subjects to easily withdraw their consent, which fulfills the requirement in Article 7 of the GDPR that withdrawal of consent must be as easy as giving consent [<xref ref-type="bibr" rid="ref15">15</xref>].</p></sec><sec id="s4-3"><title>Evaluation of the SouveMed Concept</title><p>The present evaluation study showed a high degree of trust in our concept in both the first and second evaluations, as measured by the HCTS. It also showed a high level of satisfaction with our communication process, also in the first and second evaluations. Thus, the SouveMed system has proven to be effective in meeting data subjects&#x2019; main concerns related to the secondary use of health data. The results of the usability assessment using the uMARS showed very good usability for both evaluations, with a slight increase in usability in the second evaluation. Good usability is key to increasing and maintaining data subjects&#x2019; motivation to actively participate in SouveMed and is probably also related to trust [<xref ref-type="bibr" rid="ref60">60</xref>].</p><p>From the perspective of data users and institutions, they may benefit from easy access to raw data and the ability to run algorithms on data in a secure environment. Both our requirements analysis and our evaluation study have shown that there is an urgent need for systems that enable secondary use of research data. The data on uMARS from our evaluation study showed excellent usability in all three subscales (functionality, aesthetics, and subjective quality) from the perspective of data users and institutions, which improved even further in the second evaluation. In this evaluation, all data users surveyed stated that the SouveMed system offers all the functionalities they desire from such a system. Except for a significant increase in the perceived functionality of the data user system, no statistically significant differences were observed between the first and second evaluations. This result is likely due to the limited sample size and the already high ratings in the first evaluation, which constrained the potential for further measurable improvements.</p><p>Overall, these results indicate that the SouveMed data trust effectively realizes the needs and requirements identified during the needs analysis and literature review.</p></sec><sec id="s4-4"><title>Future Perspectives</title><p>Various legislative initiatives in the European Union (eg, EHDS [<xref ref-type="bibr" rid="ref61">61</xref>]) and in Germany (eg, <italic>Forschungsdatengesetz</italic> [<xref ref-type="bibr" rid="ref62">62</xref>] and <italic>Gesundheitsdatennutzungsgesetz</italic> [<xref ref-type="bibr" rid="ref63">63</xref>]) are currently aimed at simplifying the secondary use of health data. This is to be welcomed in principle, as it contributes to the development of a viable research landscape and addresses a major challenge in medical research. Nevertheless, the solutions must be preceded by an analysis of the underlying problems and address them precisely. The results of this and numerous other studies indicate that the secondary use of health data is not hindered by a lack of willingness on the part of data subjects to provide data. It therefore does not seem necessary to pass over data subjects by allowing the use of health data without consent. There is also no lack of infrastructure for centralized data storage, which entails far more risks but only minimal benefits [<xref ref-type="bibr" rid="ref64">64</xref>]. What is notably absent is a clear workflow for the secondary use of health data that can be easily integrated into routine clinical care, that takes data subjects&#x2019; needs into account and thereby gains their long-term acceptance, and that relieves researchers of complex legal considerations and negotiations.</p><p>In the European Union, a standardized legal framework has been established through the EHDS, which permits an opt-out mechanism for the secondary use of health data [<xref ref-type="bibr" rid="ref61">61</xref>]. According to Article 54, this should be implemented via &#x201C;&#x2026;an easily understandable and accessible user-friendly mechanism to exercise that right to opt out&#x2026;&#x201D; Article 54 further emphasizes that it is &#x201C;&#x2026;imperative to provide natural persons with sufficient and complete information regarding their right to opt out&#x2026;&#x201D; Nevertheless, how this will be implemented in practice in the individual member states is still largely unclear. Although an opt-in solution is preferred in our project, the SouveMed concept could serve as a blueprint for a system that enables data subjects to receive information about the secondary use of their health data and to express their preferences, including a possible opt-out.</p><p>Sleep research was selected as a use case because large volumes of data are typically generated in this field (eg, through polysomnography). In this context, it is important to consider that the likelihood of reidentifying individuals grows with the amount of data collected, making true anonymization increasingly difficult. Similar challenges are expected in other areas of research due to expanding data volumes. Therefore, we argue that the active involvement of data subjects and other stakeholders is becoming ever more critical.</p><p>A key advantage of SouveMed is also the algorithmic trust component. Future data exchange will increasingly have to rely on algorithmic decisions to manage large amounts of requests in a time- and cost-efficient manner. Data use and access committees would oversee the rules of data use rather than each single application.</p></sec><sec id="s4-5"><title>Limitations</title><p>There are some limitations to this study. First, the sample size was small and therefore probably not sufficiently representative. Therefore, surveys of larger patient and other stakeholder groups that include other diagnostic entities are needed. In addition, no <italic>real</italic> implementation of the SouveMed system was carried out as there were insufficient resources to achieve this in the current project. Although we tried to keep the framework of the evaluation as natural as possible, everyone involved was aware that it was not about real data sharing, which could have influenced the results.</p><p>Many aspects of our model were developed not only conceptually but also technically (see [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref55">55</xref>]). Nevertheless, further studies focusing on the technical implementation of digital contract representations are needed, as this is a key element of an effectively functioning matching algorithm that was not fully elaborated technically in the SouveMed project.</p></sec></sec></body><back><notes><sec><title>Funding</title><p>This study was funded by the German Ministry of Education and Research (grant 16DTM115A). We acknowledge support by the Open Access Publication Fund of the University of Freiburg.</p></sec></notes><fn-group><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">DOH</term><def><p>Declaration of Helsinki</p></def></def-item><def-item><term id="abb2">DOT</term><def><p>Declaration of Taipei</p></def></def-item><def-item><term id="abb3">EHDS</term><def><p>European Health Data Space</p></def></def-item><def-item><term id="abb4">GDPR</term><def><p>General Data Protection Regulation</p></def></def-item><def-item><term id="abb5">HCTS</term><def><p>Human-Computer Trust Scale</p></def></def-item><def-item><term id="abb6">MARS</term><def><p>Mobile Application Rating Scale</p></def></def-item><def-item><term id="abb7">QII</term><def><p>Quality of Interaction and Involvement</p></def></def-item><def-item><term id="abb8">UI</term><def><p>user interface</p></def></def-item><def-item><term id="abb9">uMARS</term><def><p>user version of the Mobile Application Rating Scale</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Saberi</surname><given-names>ZA</given-names> </name><name name-style="western"><surname>Sadr</surname><given-names>H</given-names> </name><name name-style="western"><surname>Yamaghani</surname><given-names>MR</given-names> </name></person-group><article-title>An intelligent diagnosis system for predicting coronary heart disease</article-title><conf-name>2024 10th International Conference on Artificial Intelligence and Robotics (QICAR)</conf-name><conf-date>Feb 29, 2024</conf-date><pub-id pub-id-type="doi">10.1109/QICAR61538.2024.10496601</pub-id></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nazari</surname><given-names>M</given-names> </name><name name-style="western"><surname>Emami</surname><given-names>H</given-names> </name><name name-style="western"><surname>Rabiei</surname><given-names>R</given-names> </name><name name-style="western"><surname>Hosseini</surname><given-names>A</given-names> </name><name name-style="western"><surname>Rahmatizadeh</surname><given-names>S</given-names> </name></person-group><article-title>Detection of cardiovascular diseases using data mining approaches: application of an ensemble-based model</article-title><source>Cogn Comput</source><year>2024</year><month>09</month><volume>16</volume><issue>5</issue><fpage>2264</fpage><lpage>2278</lpage><pub-id pub-id-type="doi">10.1007/s12559-024-10306-z</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sadr</surname><given-names>H</given-names> </name><name name-style="western"><surname>Salari</surname><given-names>A</given-names> </name><name name-style="western"><surname>Ashoobi</surname><given-names>MT</given-names> </name><name name-style="western"><surname>Nazari</surname><given-names>M</given-names> </name></person-group><article-title>Cardiovascular disease diagnosis: a holistic approach using the integration of machine learning and deep learning models</article-title><source>Eur J Med Res</source><year>2024</year><month>09</month><day>11</day><volume>29</volume><issue>1</issue><fpage>455</fpage><pub-id pub-id-type="doi">10.1186/s40001-024-02044-7</pub-id><pub-id pub-id-type="medline">39261891</pub-id></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nazari</surname><given-names>M</given-names> </name><name name-style="western"><surname>Moayed Rezaie</surname><given-names>S</given-names> </name><name name-style="western"><surname>Yaseri</surname><given-names>F</given-names> </name><name name-style="western"><surname>Sadr</surname><given-names>H</given-names> </name><name name-style="western"><surname>Nazari</surname><given-names>E</given-names> </name></person-group><article-title>Design and analysis of a telemonitoring system for high-risk pregnant women in need of special care or attention</article-title><source>BMC Pregnancy Childbirth</source><year>2024</year><month>12</month><day>18</day><volume>24</volume><issue>1</issue><fpage>817</fpage><pub-id pub-id-type="doi">10.1186/s12884-024-07019-4</pub-id><pub-id pub-id-type="medline">39696006</pub-id></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Benson</surname><given-names>T</given-names> </name><name name-style="western"><surname>Grieve</surname><given-names>G</given-names> </name></person-group><person-group person-group-type="editor"><name name-style="western"><surname>Benson</surname><given-names>T</given-names> </name><name name-style="western"><surname>Grieve</surname><given-names>G</given-names> </name></person-group><article-title>Why interoperability is hard</article-title><source>Principles of Health Interoperability: FHIR, HL7 and SNOMED CT</source><fpage>21</fpage><lpage>40</lpage><pub-id pub-id-type="doi">10.1007/978-3-030-56883-2_2</pub-id><pub-id pub-id-type="other">978-3-030-56882-5</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Pohlmann</surname><given-names>S</given-names> </name><name name-style="western"><surname>Kunz</surname><given-names>A</given-names> </name><name name-style="western"><surname>Ose</surname><given-names>D</given-names> </name><etal/></person-group><article-title>Digitalizing health services by implementing a personal electronic health record in Germany: qualitative analysis of fundamental prerequisites from the perspective of selected experts</article-title><source>J Med Internet Res</source><year>2020</year><month>01</month><day>29</day><volume>22</volume><issue>1</issue><fpage>e15102</fpage><pub-id pub-id-type="doi">10.2196/15102</pub-id><pub-id pub-id-type="medline">32012060</pub-id></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Edmondson</surname><given-names>ME</given-names> </name><name name-style="western"><surname>Reimer</surname><given-names>AP</given-names> </name></person-group><article-title>Challenges frequently encountered in the secondary use of electronic medical record data for research</article-title><source>Comput Inform Nurs</source><year>2020</year><month>07</month><volume>38</volume><issue>7</issue><fpage>338</fpage><lpage>348</lpage><pub-id pub-id-type="doi">10.1097/CIN.0000000000000609</pub-id><pub-id pub-id-type="medline">32149742</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Declerck</surname><given-names>J</given-names> </name><name name-style="western"><surname>Kalra</surname><given-names>D</given-names> </name><name name-style="western"><surname>Vander Stichele</surname><given-names>R</given-names> </name><name name-style="western"><surname>Coorevits</surname><given-names>P</given-names> </name></person-group><article-title>Frameworks, dimensions, definitions of aspects, and assessment methods for the appraisal of quality of health data for secondary use: comprehensive overview of reviews</article-title><source>JMIR Med Inform</source><year>2024</year><month>03</month><day>6</day><volume>12</volume><issue>1</issue><fpage>e51560</fpage><pub-id pub-id-type="doi">10.2196/51560</pub-id><pub-id pub-id-type="medline">38446534</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Robertson</surname><given-names>ARR</given-names> </name><name name-style="western"><surname>Fernando</surname><given-names>B</given-names> </name><name name-style="western"><surname>Morrison</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Kalra</surname><given-names>D</given-names> </name><name name-style="western"><surname>Sheikh</surname><given-names>A</given-names> </name></person-group><article-title>Structuring and coding in health care records: a qualitative analysis using diabetes as a case study</article-title><source>jhi</source><year>2014</year><volume>22</volume><issue>2</issue><fpage>275</fpage><lpage>283</lpage><pub-id pub-id-type="doi">10.14236/jhi.v22i2.90</pub-id></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>de Hert</surname><given-names>P</given-names> </name><name name-style="western"><surname>Papakonstantinou</surname><given-names>V</given-names> </name></person-group><article-title>The new General Data Protection Regulation: still a sound system for the protection of individuals?</article-title><source>Comput Law Security Rev</source><year>2016</year><month>04</month><volume>32</volume><issue>2</issue><fpage>179</fpage><lpage>194</lpage><pub-id pub-id-type="doi">10.1016/j.clsr.2016.02.006</pub-id></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dove</surname><given-names>ES</given-names> </name></person-group><article-title>The EU General Data Protection Regulation: implications for international scientific research in the digital era</article-title><source>J Law Med Ethics</source><year>2018</year><volume>46</volume><issue>4</issue><fpage>1013</fpage><lpage>1030</lpage><pub-id pub-id-type="doi">10.1177/1073110518822003</pub-id></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Rumbold</surname><given-names>JMM</given-names> </name><name name-style="western"><surname>Pierscionek</surname><given-names>B</given-names> </name></person-group><article-title>The effect of the General Data Protection Regulation on medical research</article-title><source>J Med Internet Res</source><year>2017</year><month>02</month><day>24</day><volume>19</volume><issue>2</issue><fpage>e47</fpage><pub-id pub-id-type="doi">10.2196/jmir.7108</pub-id><pub-id pub-id-type="medline">28235748</pub-id></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Vukovic</surname><given-names>J</given-names> </name><name name-style="western"><surname>Ivankovic</surname><given-names>D</given-names> </name><name name-style="western"><surname>Habl</surname><given-names>C</given-names> </name><name name-style="western"><surname>Dimnjakovic</surname><given-names>J</given-names> </name></person-group><article-title>Enablers and barriers to the secondary use of health data in Europe: General Data Protection Regulation perspective</article-title><source>Arch Public Health</source><year>2022</year><month>04</month><day>9</day><volume>80</volume><issue>1</issue><fpage>115</fpage><pub-id pub-id-type="doi">10.1186/s13690-022-00866-7</pub-id><pub-id pub-id-type="medline">35397557</pub-id></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Peloquin</surname><given-names>D</given-names> </name><name name-style="western"><surname>DiMaio</surname><given-names>M</given-names> </name><name name-style="western"><surname>Bierer</surname><given-names>B</given-names> </name><name name-style="western"><surname>Barnes</surname><given-names>M</given-names> </name></person-group><article-title>Disruptive and avoidable: GDPR challenges to secondary research uses of data</article-title><source>Eur J Hum Genet</source><year>2020</year><month>06</month><volume>28</volume><issue>6</issue><fpage>697</fpage><lpage>705</lpage><pub-id pub-id-type="doi">10.1038/s41431-020-0596-x</pub-id><pub-id pub-id-type="medline">32123329</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="web"><article-title>Regulation (EU) 2016/679 of the European Parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/EC (General Data Protection Regulation)</article-title><source>European Union</source><access-date>2024-02-27</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679">https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679</ext-link></comment></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wiertz</surname><given-names>S</given-names> </name><name name-style="western"><surname>Boldt</surname><given-names>J</given-names> </name></person-group><article-title>Evaluating models of consent in changing health research environments</article-title><source>Med Health Care Philos</source><year>2022</year><month>06</month><volume>25</volume><issue>2</issue><fpage>269</fpage><lpage>280</lpage><pub-id pub-id-type="doi">10.1007/s11019-022-10074-3</pub-id><pub-id pub-id-type="medline">35286521</pub-id></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><collab>World Medical Association</collab></person-group><article-title>World Medical Association Declaration of Helsinki: ethical principles for medical research involving human participants</article-title><source>JAMA</source><year>2025</year><month>01</month><day>7</day><volume>333</volume><issue>1</issue><fpage>71</fpage><lpage>74</lpage><pub-id pub-id-type="doi">10.1001/jama.2024.21972</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="web"><article-title>WMA Declaration of Taipei on ethical considerations regarding health databases and biobanks</article-title><source>The World Medical Association</source><access-date>2024-02-27</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.wma.net/policies-post/wma-declaration-of-taipei-on-ethical-considerations-regarding-health-databases-and-biobanks/">https://www.wma.net/policies-post/wma-declaration-of-taipei-on-ethical-considerations-regarding-health-databases-and-biobanks/</ext-link></comment></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Mondschein</surname><given-names>CF</given-names> </name><name name-style="western"><surname>Monda</surname><given-names>C</given-names> </name></person-group><person-group person-group-type="editor"><name name-style="western"><surname>Kubben</surname><given-names>P</given-names> </name><name name-style="western"><surname>Dumontier</surname><given-names>M</given-names> </name><name name-style="western"><surname>Dekker</surname><given-names>A</given-names> </name></person-group><article-title>The EU&#x2019;s General Data Protection Regulation (GDPR) in a research context</article-title><source>Fundamentals of Clinical Data Science</source><publisher-name>Springer International Publishing</publisher-name><fpage>2019</fpage><pub-id pub-id-type="doi">10.1007/978-3-319-99713-1_5</pub-id><pub-id pub-id-type="other">978-3-319-99712-4</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Richter</surname><given-names>G</given-names> </name><name name-style="western"><surname>Borzikowsky</surname><given-names>C</given-names> </name><name name-style="western"><surname>Lesch</surname><given-names>W</given-names> </name><etal/></person-group><article-title>Secondary research use of personal medical data: attitudes from patient and population surveys in The Netherlands and Germany</article-title><source>Eur J Hum Genet</source><year>2021</year><month>03</month><volume>29</volume><issue>3</issue><fpage>495</fpage><lpage>502</lpage><pub-id pub-id-type="doi">10.1038/s41431-020-00735-3</pub-id><pub-id pub-id-type="medline">33005018</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Richter</surname><given-names>G</given-names> </name><name name-style="western"><surname>Krawczak</surname><given-names>M</given-names> </name><name name-style="western"><surname>Lieb</surname><given-names>W</given-names> </name><name name-style="western"><surname>Wolff</surname><given-names>L</given-names> </name><name name-style="western"><surname>Schreiber</surname><given-names>S</given-names> </name><name name-style="western"><surname>Buyx</surname><given-names>A</given-names> </name></person-group><article-title>Broad consent for health care-embedded biobanking: understanding and reasons to donate in a large patient sample</article-title><source>Genet Med</source><year>2018</year><month>01</month><volume>20</volume><issue>1</issue><fpage>76</fpage><lpage>82</lpage><pub-id pub-id-type="doi">10.1038/gim.2017.82</pub-id><pub-id pub-id-type="medline">28640237</pub-id></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Richter</surname><given-names>G</given-names> </name><name name-style="western"><surname>Borzikowsky</surname><given-names>C</given-names> </name><name name-style="western"><surname>Lieb</surname><given-names>W</given-names> </name><name name-style="western"><surname>Schreiber</surname><given-names>S</given-names> </name><name name-style="western"><surname>Krawczak</surname><given-names>M</given-names> </name><name name-style="western"><surname>Buyx</surname><given-names>A</given-names> </name></person-group><article-title>Patient views on research use of clinical data without consent: legal, but also acceptable?</article-title><source>Eur J Hum Genet</source><year>2019</year><month>06</month><volume>27</volume><issue>6</issue><fpage>841</fpage><lpage>847</lpage><pub-id pub-id-type="doi">10.1038/s41431-019-0340-6</pub-id><pub-id pub-id-type="medline">30683927</pub-id></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Garrison</surname><given-names>NA</given-names> </name><name name-style="western"><surname>Sathe</surname><given-names>NA</given-names> </name><name name-style="western"><surname>Antommaria</surname><given-names>AHM</given-names> </name><etal/></person-group><article-title>A systematic literature review of individuals&#x2019; perspectives on broad consent and data sharing in the United States</article-title><source>Genet Med</source><year>2016</year><month>07</month><volume>18</volume><issue>7</issue><fpage>663</fpage><lpage>671</lpage><pub-id pub-id-type="doi">10.1038/gim.2015.138</pub-id><pub-id pub-id-type="medline">26583683</pub-id></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hutchings</surname><given-names>E</given-names> </name><name name-style="western"><surname>Loomes</surname><given-names>M</given-names> </name><name name-style="western"><surname>Butow</surname><given-names>P</given-names> </name><name name-style="western"><surname>Boyle</surname><given-names>FM</given-names> </name></person-group><article-title>A systematic literature review of attitudes towards secondary use and sharing of health administrative and clinical trial data: a focus on consent</article-title><source>Syst Rev</source><year>2021</year><month>05</month><day>4</day><volume>10</volume><issue>1</issue><fpage>132</fpage><pub-id pub-id-type="doi">10.1186/s13643-021-01663-z</pub-id><pub-id pub-id-type="medline">33941282</pub-id></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hutchings</surname><given-names>E</given-names> </name><name name-style="western"><surname>Loomes</surname><given-names>M</given-names> </name><name name-style="western"><surname>Butow</surname><given-names>P</given-names> </name><name name-style="western"><surname>Boyle</surname><given-names>FM</given-names> </name></person-group><article-title>A systematic literature review of health consumer attitudes towards secondary use and sharing of health administrative and clinical trial data: a focus on privacy, trust, and transparency</article-title><source>Syst Rev</source><year>2020</year><month>10</month><day>9</day><volume>9</volume><issue>1</issue><fpage>235</fpage><pub-id pub-id-type="doi">10.1186/s13643-020-01481-9</pub-id><pub-id pub-id-type="medline">33036664</pub-id></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Cumyn</surname><given-names>A</given-names> </name><name name-style="western"><surname>M&#x00E9;nard</surname><given-names>JF</given-names> </name><name name-style="western"><surname>Barton</surname><given-names>A</given-names> </name><name name-style="western"><surname>Dault</surname><given-names>R</given-names> </name><name name-style="western"><surname>L&#x00E9;vesque</surname><given-names>F</given-names> </name><name name-style="western"><surname>Ethier</surname><given-names>JF</given-names> </name></person-group><article-title>Patients&#x2019; and members of the public&#x2019;s wishes regarding transparency in the context of secondary use of health data: scoping review</article-title><source>J Med Internet Res</source><year>2023</year><month>04</month><day>13</day><volume>25</volume><fpage>e45002</fpage><pub-id pub-id-type="doi">10.2196/45002</pub-id><pub-id pub-id-type="medline">37052967</pub-id></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Park</surname><given-names>YJ</given-names> </name><name name-style="western"><surname>Chung</surname><given-names>JE</given-names> </name></person-group><article-title>Health privacy as sociotechnical capital</article-title><source>Comput Human Behav</source><year>2017</year><month>11</month><volume>76</volume><fpage>227</fpage><lpage>236</lpage><pub-id pub-id-type="doi">10.1016/j.chb.2017.07.025</pub-id></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Damschroder</surname><given-names>LJ</given-names> </name><name name-style="western"><surname>Pritts</surname><given-names>JL</given-names> </name><name name-style="western"><surname>Neblo</surname><given-names>MA</given-names> </name><name name-style="western"><surname>Kalarickal</surname><given-names>RJ</given-names> </name><name name-style="western"><surname>Creswell</surname><given-names>JW</given-names> </name><name name-style="western"><surname>Hayward</surname><given-names>RA</given-names> </name></person-group><article-title>Patients, privacy and trust: patients&#x2019; willingness to allow researchers to access their medical records</article-title><source>Soc Sci Med</source><year>2007</year><month>01</month><volume>64</volume><issue>1</issue><fpage>223</fpage><lpage>235</lpage><pub-id pub-id-type="doi">10.1016/j.socscimed.2006.08.045</pub-id><pub-id pub-id-type="medline">17045717</pub-id></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Holm</surname><given-names>S</given-names> </name><name name-style="western"><surname>Kristiansen</surname><given-names>TB</given-names> </name><name name-style="western"><surname>Ploug</surname><given-names>T</given-names> </name></person-group><article-title>Control, trust and the sharing of health information: the limits of trust</article-title><source>J Med Ethics</source><year>2021</year><month>12</month><volume>47</volume><issue>12</issue><fpage>e35</fpage><lpage>e35</lpage><pub-id pub-id-type="doi">10.1136/medethics-2019-105887</pub-id></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Broes</surname><given-names>S</given-names> </name><name name-style="western"><surname>Verbaanderd</surname><given-names>C</given-names> </name><name name-style="western"><surname>Casteels</surname><given-names>M</given-names> </name><name name-style="western"><surname>Lacombe</surname><given-names>D</given-names> </name><name name-style="western"><surname>Huys</surname><given-names>I</given-names> </name></person-group><article-title>Sharing of clinical trial data and samples: the cancer patient perspective</article-title><source>Front Med</source><year>2020</year><month>02</month><volume>7</volume><fpage>33</fpage><pub-id pub-id-type="doi">10.3389/fmed.2020.00033</pub-id></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Cumyn</surname><given-names>A</given-names> </name><name name-style="western"><surname>Dault</surname><given-names>R</given-names> </name><name name-style="western"><surname>Barton</surname><given-names>A</given-names> </name><name name-style="western"><surname>Cloutier</surname><given-names>AM</given-names> </name><name name-style="western"><surname>Ethier</surname><given-names>JF</given-names> </name></person-group><article-title>Citizens, research ethics committee members and researchers&#x2019; attitude toward information and consent for the secondary use of health data: implications for research within learning health systems</article-title><source>J Empir Res Hum Res Ethics</source><year>2021</year><month>07</month><volume>16</volume><issue>3</issue><fpage>165</fpage><lpage>178</lpage><pub-id pub-id-type="doi">10.1177/1556264621992214</pub-id><pub-id pub-id-type="medline">33710932</pub-id></nlm-citation></ref><ref id="ref32"><label>32</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>King</surname><given-names>T</given-names> </name><name name-style="western"><surname>Brankovic</surname><given-names>L</given-names> </name><name name-style="western"><surname>Gillard</surname><given-names>P</given-names> </name></person-group><article-title>Perspectives of Australian adults about protecting the privacy of their health information in statistical databases</article-title><source>Int J Med Inform</source><year>2012</year><month>04</month><volume>81</volume><issue>4</issue><fpage>279</fpage><lpage>289</lpage><pub-id pub-id-type="doi">10.1016/j.ijmedinf.2012.01.005</pub-id><pub-id pub-id-type="medline">22306206</pub-id></nlm-citation></ref><ref id="ref33"><label>33</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Liddell</surname><given-names>K</given-names> </name><name name-style="western"><surname>Simon</surname><given-names>DA</given-names> </name><name name-style="western"><surname>Lucassen</surname><given-names>A</given-names> </name></person-group><article-title>Patient data ownership: who owns your health?</article-title><source>J Law Biosci</source><year>2021</year><volume>8</volume><issue>2</issue><fpage>lsab023</fpage><pub-id pub-id-type="doi">10.1093/jlb/lsab023</pub-id><pub-id pub-id-type="medline">34611493</pub-id></nlm-citation></ref><ref id="ref34"><label>34</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ballantyne</surname><given-names>A</given-names> </name></person-group><article-title>How should we think about clinical data ownership?</article-title><source>J Med Ethics</source><year>2020</year><month>05</month><volume>46</volume><issue>5</issue><fpage>289</fpage><lpage>294</lpage><pub-id pub-id-type="doi">10.1136/medethics-2018-105340</pub-id><pub-id pub-id-type="medline">31911499</pub-id></nlm-citation></ref><ref id="ref35"><label>35</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hummel</surname><given-names>P</given-names> </name><name name-style="western"><surname>Braun</surname><given-names>M</given-names> </name><name name-style="western"><surname>Dabrock</surname><given-names>P</given-names> </name></person-group><article-title>Own data? Ethical reflections on data ownership</article-title><source>Philos Technol</source><year>2021</year><month>09</month><volume>34</volume><issue>3</issue><fpage>545</fpage><lpage>572</lpage><pub-id pub-id-type="doi">10.1007/s13347-020-00404-9</pub-id></nlm-citation></ref><ref id="ref36"><label>36</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Perrier</surname><given-names>L</given-names> </name><name name-style="western"><surname>Blondal</surname><given-names>E</given-names> </name><name name-style="western"><surname>MacDonald</surname><given-names>H</given-names> </name></person-group><article-title>The views, perspectives, and experiences of academic researchers with data sharing and reuse: a meta-synthesis</article-title><source>PLoS ONE</source><year>2020</year><volume>15</volume><issue>2</issue><fpage>e0229182</fpage><pub-id pub-id-type="doi">10.1371/journal.pone.0229182</pub-id><pub-id pub-id-type="medline">32106224</pub-id></nlm-citation></ref><ref id="ref37"><label>37</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Tenopir</surname><given-names>C</given-names> </name><name name-style="western"><surname>Allard</surname><given-names>S</given-names> </name><name name-style="western"><surname>Douglass</surname><given-names>K</given-names> </name><etal/></person-group><article-title>Data sharing by scientists: practices and perceptions</article-title><source>PLoS ONE</source><year>2011</year><volume>6</volume><issue>6</issue><fpage>e21101</fpage><pub-id pub-id-type="doi">10.1371/journal.pone.0021101</pub-id><pub-id pub-id-type="medline">21738610</pub-id></nlm-citation></ref><ref id="ref38"><label>38</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Paprica</surname><given-names>PA</given-names> </name><name name-style="western"><surname>Sutherland</surname><given-names>E</given-names> </name><name name-style="western"><surname>Smith</surname><given-names>A</given-names> </name><etal/></person-group><article-title>Essential requirements for establishing and operating data trusts: practical guidance co-developed by representatives from fifteen Canadian organizations and initiatives</article-title><source>Int J Popul Data Sci</source><year>2020</year><month>08</month><day>24</day><volume>5</volume><issue>1</issue><fpage>1353</fpage><pub-id pub-id-type="doi">10.23889/ijpds.v5i1.1353</pub-id><pub-id pub-id-type="medline">33644412</pub-id></nlm-citation></ref><ref id="ref39"><label>39</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Milne</surname><given-names>R</given-names> </name><name name-style="western"><surname>Sorbie</surname><given-names>A</given-names> </name><name name-style="western"><surname>Dixon-Woods</surname><given-names>M</given-names> </name></person-group><article-title>What can data trusts for health research learn from participatory governance in biobanks?</article-title><source>J Med Ethics</source><year>2022</year><month>05</month><volume>48</volume><issue>5</issue><fpage>323</fpage><lpage>328</lpage><pub-id pub-id-type="doi">10.1136/medethics-2020-107020</pub-id><pub-id pub-id-type="medline">33741681</pub-id></nlm-citation></ref><ref id="ref40"><label>40</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hogan</surname><given-names>WR</given-names> </name><name name-style="western"><surname>Shenkman</surname><given-names>EA</given-names> </name><name name-style="western"><surname>Robinson</surname><given-names>T</given-names> </name><etal/></person-group><article-title>The OneFlorida Data Trust: a centralized, translational research data infrastructure of statewide scope</article-title><source>J Am Med Inform Assoc</source><year>2022</year><month>03</month><day>15</day><volume>29</volume><issue>4</issue><fpage>686</fpage><lpage>693</lpage><pub-id pub-id-type="doi">10.1093/jamia/ocab221</pub-id><pub-id pub-id-type="medline">34664656</pub-id></nlm-citation></ref><ref id="ref41"><label>41</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Hall</surname><given-names>W</given-names> </name><name name-style="western"><surname>Pesenti</surname><given-names>J</given-names> </name></person-group><article-title>Growing the artificial intelligence industry in the UK</article-title><source>Australian Policy Online</source><year>2017</year><month>10</month><day>15</day><access-date>2024-03-04</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://apo.org.au/node/114781">https://apo.org.au/node/114781</ext-link></comment></nlm-citation></ref><ref id="ref42"><label>42</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Lauf</surname><given-names>F</given-names> </name><name name-style="western"><surname>Scheider</surname><given-names>S</given-names> </name><name name-style="western"><surname>Friese</surname><given-names>J</given-names> </name><name name-style="western"><surname>Kilz</surname><given-names>S</given-names> </name><name name-style="western"><surname>Radic</surname><given-names>M</given-names> </name><name name-style="western"><surname>Burmann</surname><given-names>A</given-names> </name></person-group><article-title>Exploring design characteristics of data trustees in healthcare - taxonomy and archetypes</article-title><access-date>2025-11-18</access-date><conf-name>Proceedings of the thirty-first European Conference on Information Systems</conf-name><conf-date>Jun 11-16, 2023</conf-date><comment><ext-link ext-link-type="uri" xlink:href="https://aisel.aisnet.org/ecis2023_rp/323/">https://aisel.aisnet.org/ecis2023_rp/323/</ext-link></comment></nlm-citation></ref><ref id="ref43"><label>43</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Poschen</surname><given-names>C</given-names> </name><name name-style="western"><surname>Herres</surname><given-names>B</given-names> </name><name name-style="western"><surname>Knorr</surname><given-names>K</given-names> </name></person-group><article-title>A threat-driven design of a data-trustee infrastructure for medical data</article-title><conf-name>2024 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)</conf-name><conf-date>Dec 3-6, 2024</conf-date><pub-id pub-id-type="doi">10.1109/BIBM62325.2024.10822788</pub-id></nlm-citation></ref><ref id="ref44"><label>44</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Prokosch</surname><given-names>HU</given-names> </name><name name-style="western"><surname>Gebhardt</surname><given-names>M</given-names> </name><name name-style="western"><surname>Gruendner</surname><given-names>J</given-names> </name><etal/></person-group><article-title>Towards a national portal for medical research data (FDPG): vision, status, and lessons learned</article-title><source>Stud Health Technol Inform</source><year>2023</year><month>05</month><day>18</day><volume>302</volume><fpage>307</fpage><lpage>311</lpage><pub-id pub-id-type="doi">10.3233/SHTI230124</pub-id><pub-id pub-id-type="medline">37203668</pub-id></nlm-citation></ref><ref id="ref45"><label>45</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Semler</surname><given-names>S</given-names> </name><name name-style="western"><surname>Wissing</surname><given-names>F</given-names> </name><name name-style="western"><surname>Heyder</surname><given-names>R</given-names> </name></person-group><article-title>German Medical Informatics Initiative: a national approach to integrating health data from patient care and medical research</article-title><source>Methods Inf Med</source><year>2018</year><month>07</month><volume>57</volume><issue>S 01</issue><fpage>e50</fpage><lpage>e56</lpage><pub-id pub-id-type="doi">10.3414/ME18-03-0003</pub-id></nlm-citation></ref><ref id="ref46"><label>46</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Riemann</surname><given-names>D</given-names> </name><name name-style="western"><surname>Espie</surname><given-names>CA</given-names> </name><name name-style="western"><surname>Altena</surname><given-names>E</given-names> </name><etal/></person-group><article-title>The European Insomnia Guideline: an update on the diagnosis and treatment of insomnia 2023</article-title><source>J Sleep Res</source><year>2023</year><month>12</month><volume>32</volume><issue>6</issue><fpage>e14035</fpage><pub-id pub-id-type="doi">10.1111/jsr.14035</pub-id></nlm-citation></ref><ref id="ref47"><label>47</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Senaratna</surname><given-names>CV</given-names> </name><name name-style="western"><surname>Perret</surname><given-names>JL</given-names> </name><name name-style="western"><surname>Lodge</surname><given-names>CJ</given-names> </name><etal/></person-group><article-title>Prevalence of obstructive sleep apnea in the general population: a systematic review</article-title><source>Sleep Med Rev</source><year>2017</year><month>08</month><volume>34</volume><fpage>70</fpage><lpage>81</lpage><pub-id pub-id-type="doi">10.1016/j.smrv.2016.07.002</pub-id><pub-id pub-id-type="medline">27568340</pub-id></nlm-citation></ref><ref id="ref48"><label>48</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Perez-Pozuelo</surname><given-names>I</given-names> </name><name name-style="western"><surname>Zhai</surname><given-names>B</given-names> </name><name name-style="western"><surname>Palotti</surname><given-names>J</given-names> </name><etal/></person-group><article-title>The future of sleep health: a data-driven revolution in sleep science and medicine</article-title><source>NPJ Digit Med</source><year>2020</year><volume>3</volume><issue>1</issue><fpage>42</fpage><pub-id pub-id-type="doi">10.1038/s41746-020-0244-4</pub-id><pub-id pub-id-type="medline">32219183</pub-id></nlm-citation></ref><ref id="ref49"><label>49</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gulati</surname><given-names>S</given-names> </name><name name-style="western"><surname>Sousa</surname><given-names>S</given-names> </name><name name-style="western"><surname>Lamas</surname><given-names>D</given-names> </name></person-group><article-title>Design, development and evaluation of a human-computer trust scale</article-title><source>Behav Inf Technol</source><year>2019</year><month>10</month><day>3</day><volume>38</volume><issue>10</issue><fpage>1004</fpage><lpage>1015</lpage><pub-id pub-id-type="doi">10.1080/0144929X.2019.1656779</pub-id></nlm-citation></ref><ref id="ref50"><label>50</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Sousa</surname><given-names>S</given-names> </name><name name-style="western"><surname>Lamas</surname><given-names>D</given-names> </name><name name-style="western"><surname>Dias</surname><given-names>P</given-names> </name></person-group><person-group person-group-type="editor"><name name-style="western"><surname>Zaphiris</surname><given-names>P</given-names> </name><name name-style="western"><surname>Ioannou</surname><given-names>A</given-names> </name></person-group><article-title>A model for human-computer trust: contributions towards leveraging user engagement</article-title><source>Learning and Collaboration Technologies Designing and Developing Novel Learning Experiences</source><year>2014</year><publisher-name>Springer International Publishing</publisher-name><fpage>128</fpage><lpage>137</lpage><pub-id pub-id-type="doi">10.1007/978-3-319-07482-5_13</pub-id><pub-id pub-id-type="other">978-3-319-07481-8</pub-id></nlm-citation></ref><ref id="ref51"><label>51</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Abdelhamid</surname><given-names>M</given-names> </name><name name-style="western"><surname>Gaia</surname><given-names>J</given-names> </name><name name-style="western"><surname>Sanders</surname><given-names>GL</given-names> </name></person-group><article-title>Putting the focus back on the patient: how privacy concerns affect personal health information sharing intentions</article-title><source>J Med Internet Res</source><year>2017</year><month>09</month><day>13</day><volume>19</volume><issue>9</issue><fpage>e169</fpage><pub-id pub-id-type="doi">10.2196/jmir.6877</pub-id><pub-id pub-id-type="medline">28903895</pub-id></nlm-citation></ref><ref id="ref52"><label>52</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Messner</surname><given-names>EM</given-names> </name><name name-style="western"><surname>Terhorst</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Barke</surname><given-names>A</given-names> </name><etal/></person-group><article-title>The German version of the Mobile App Rating Scale (MARS-G): development and validation study</article-title><source>JMIR Mhealth Uhealth</source><year>2020</year><month>03</month><day>27</day><volume>8</volume><issue>3</issue><fpage>e14479</fpage><pub-id pub-id-type="doi">10.2196/14479</pub-id><pub-id pub-id-type="medline">32217504</pub-id></nlm-citation></ref><ref id="ref53"><label>53</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Stoyanov</surname><given-names>SR</given-names> </name><name name-style="western"><surname>Hides</surname><given-names>L</given-names> </name><name name-style="western"><surname>Kavanagh</surname><given-names>DJ</given-names> </name><name name-style="western"><surname>Wilson</surname><given-names>H</given-names> </name></person-group><article-title>Development and validation of the user version of the Mobile Application Rating Scale (uMARS)</article-title><source>JMIR Mhealth Uhealth</source><year>2016</year><month>06</month><day>10</day><volume>4</volume><issue>2</issue><fpage>e72</fpage><pub-id pub-id-type="doi">10.2196/mhealth.5849</pub-id></nlm-citation></ref><ref id="ref54"><label>54</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Burmeister</surname><given-names>R</given-names> </name><name name-style="western"><surname>Erler</surname><given-names>C</given-names> </name><name name-style="western"><surname>Gauger</surname><given-names>F</given-names> </name><name name-style="western"><surname>Dressle</surname><given-names>RJ</given-names> </name><name name-style="western"><surname>Feige</surname><given-names>B</given-names> </name></person-group><article-title>Advancing sleep research through dynamic consent and trustee-based medical data processing</article-title><year>2024</year><access-date>2025-11-06</access-date><conf-name>Proceedings of the Eighteenth International Conference on Digital Society</conf-name><conf-date>May 26-30, 2024</conf-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.iaria.org/conferences2024/ICDS24.html">https://www.iaria.org/conferences2024/ICDS24.html</ext-link></comment></nlm-citation></ref><ref id="ref55"><label>55</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Erler</surname><given-names>C</given-names> </name><name name-style="western"><surname>Bauer</surname><given-names>AM</given-names> </name><name name-style="western"><surname>Gauger</surname><given-names>F</given-names> </name><name name-style="western"><surname>Stork</surname><given-names>W</given-names> </name></person-group><article-title>Decision model to design trust-focused and blockchain-based health data management applications</article-title><source>Blockchains</source><year>2024</year><month>06</month><volume>2</volume><issue>2</issue><fpage>79</fpage><lpage>106</lpage><pub-id pub-id-type="doi">10.3390/blockchains2020005</pub-id></nlm-citation></ref><ref id="ref56"><label>56</label><nlm-citation citation-type="web"><article-title>WMA Declaration of Helsinki &#x2013; ethical principles for medical research involving human subjects</article-title><source>The World Medical Association</source><year>2013</year><access-date>2024-02-27</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.wma.net/policies-post/wma-declaration-of-helsinki-ethical-principles-for-medical-research-involving-human-subjects/">https://www.wma.net/policies-post/wma-declaration-of-helsinki-ethical-principles-for-medical-research-involving-human-subjects/</ext-link></comment></nlm-citation></ref><ref id="ref57"><label>57</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Spencer</surname><given-names>K</given-names> </name><name name-style="western"><surname>Sanders</surname><given-names>C</given-names> </name><name name-style="western"><surname>Whitley</surname><given-names>EA</given-names> </name><name name-style="western"><surname>Lund</surname><given-names>D</given-names> </name><name name-style="western"><surname>Kaye</surname><given-names>J</given-names> </name><name name-style="western"><surname>Dixon</surname><given-names>WG</given-names> </name></person-group><article-title>Patient perspectives on sharing anonymized personal health data using a digital system for dynamic consent and research feedback: a qualitative study</article-title><source>J Med Internet Res</source><year>2016</year><month>04</month><day>15</day><volume>18</volume><issue>4</issue><fpage>e66</fpage><pub-id pub-id-type="doi">10.2196/jmir.5011</pub-id><pub-id pub-id-type="medline">27083521</pub-id></nlm-citation></ref><ref id="ref58"><label>58</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wiertz</surname><given-names>S</given-names> </name><name name-style="western"><surname>Boldt</surname><given-names>J</given-names> </name></person-group><article-title>Ethical, legal, and practical concerns surrounding the implemention of new forms of consent for health data research: qualitative interview study</article-title><source>J Med Internet Res</source><year>2024</year><month>08</month><day>7</day><volume>26</volume><fpage>e52180</fpage><pub-id pub-id-type="doi">10.2196/52180</pub-id><pub-id pub-id-type="medline">39110970</pub-id></nlm-citation></ref><ref id="ref59"><label>59</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Budin-Lj&#x00F8;sne</surname><given-names>I</given-names> </name><name name-style="western"><surname>Teare</surname><given-names>HJA</given-names> </name><name name-style="western"><surname>Kaye</surname><given-names>J</given-names> </name><etal/></person-group><article-title>Dynamic consent: a potential solution to some of the challenges of modern biomedical research</article-title><source>BMC Med Ethics</source><year>2017</year><month>01</month><day>25</day><volume>18</volume><issue>1</issue><fpage>4</fpage><pub-id pub-id-type="doi">10.1186/s12910-016-0162-9</pub-id><pub-id pub-id-type="medline">28122615</pub-id></nlm-citation></ref><ref id="ref60"><label>60</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Casal&#x00F3;</surname><given-names>LV</given-names> </name><name name-style="western"><surname>Flavi&#x00E1;n</surname><given-names>C</given-names> </name><name name-style="western"><surname>Guinal&#x00ED;u</surname><given-names>M</given-names> </name></person-group><article-title>Generating trust and satisfaction in e-services: the impact of usability on consumer behavior</article-title><source>J Relationship Marketing</source><year>2010</year><month>11</month><day>30</day><volume>9</volume><issue>4</issue><fpage>247</fpage><lpage>263</lpage><pub-id pub-id-type="doi">10.1080/15332667.2010.522487</pub-id></nlm-citation></ref><ref id="ref61"><label>61</label><nlm-citation citation-type="web"><article-title>Regulation (EU) 2025/327 of the European Parliament and of the council of 11 February 2025 on the European Health Data Space and amending directive 2011/24/EU and regulation (EU) 2024/2847</article-title><source>European Union</source><year>2025</year><access-date>2025-05-25</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L_202500327">https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L_202500327</ext-link></comment></nlm-citation></ref><ref id="ref62"><label>62</label><nlm-citation citation-type="web"><article-title>Eckpunkte BMBF Forschungsdatengesetz</article-title><source>Bundesministerium f&#x00FC;r Bildung und Forschung</source><year>2024</year><access-date>2025-06-22</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.bmbf.de/SharedDocs/Downloads/DE/gesetze/forschungsdatengesetz/sonstige/Eckpunktepapier.pdf?__blob=publicationFile&#x0026;v=3">https://www.bmbf.de/SharedDocs/Downloads/DE/gesetze/forschungsdatengesetz/sonstige/Eckpunktepapier.pdf?__blob=publicationFile&#x0026;v=3</ext-link></comment></nlm-citation></ref><ref id="ref63"><label>63</label><nlm-citation citation-type="web"><article-title>Gesetz zur verbesserten Nutzung von Gesundheitsdaten</article-title><source>Bundesrepublik Deutschland</source><year>2024</year><access-date>2025-06-22</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.recht.bund.de/bgbl/1/2024/102/VO.html">https://www.recht.bund.de/bgbl/1/2024/102/VO.html</ext-link></comment></nlm-citation></ref><ref id="ref64"><label>64</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hallock</surname><given-names>H</given-names> </name><name name-style="western"><surname>Marshall</surname><given-names>SE</given-names> </name><name name-style="western"><surname>&#x2019;t Hoen</surname><given-names>PAC</given-names> </name><etal/></person-group><article-title>Federated networks for distributed analysis of health data</article-title><source>Front Public Health</source><year>2021</year><volume>9</volume><fpage>712569</fpage><pub-id pub-id-type="doi">10.3389/fpubh.2021.712569</pub-id><pub-id pub-id-type="medline">34660512</pub-id></nlm-citation></ref></ref-list><app-group><supplementary-material id="app1"><label>Multimedia Appendix 1</label><p>Semistructured interview (interview guide, English version).</p><media xlink:href="humanfactors_v12i1e66513_app1.docx" xlink:title="DOCX File, 14 KB"/></supplementary-material><supplementary-material id="app2"><label>Multimedia Appendix 2</label><p>Providing consent via the SouveMed system.</p><media xlink:href="humanfactors_v12i1e66513_app2.png" xlink:title="PNG File, 619 KB"/></supplementary-material><supplementary-material id="app3"><label>Multimedia Appendix 3</label><p>Results on objective understanding.</p><media xlink:href="humanfactors_v12i1e66513_app3.png" xlink:title="PNG File, 165 KB"/></supplementary-material></app-group></back></article>