Developing mobile health applications for neglected tropical disease research
Andrés Navarro, Luisa Rubiano, Juan David Arango, Carlos A Rojas, Neal Alexander, Nancy Gore Saravia, Eliah Aronoff-Spencer, Andrés Navarro, Luisa Rubiano, Juan David Arango, Carlos A Rojas, Neal Alexander, Nancy Gore Saravia, Eliah Aronoff-Spencer
Abstract
Mobile applications (apps) can bring health research and its potential downstream benefits closer to underserved populations. Drawing on experience developing an app for detecting and referring cases of cutaneous leishmaniasis in Colombia, called Guaral/app, we review key steps in creating such mobile health (mHealth) tools. These require consideration of the sociotechnical context using methods such as systems analysis and human-centered design (HCD), predicated on engagement and iteration with all stakeholders. We emphasize usability and technical concerns and describe the interdependency of technical and human considerations for mHealth systems in rural communities.
Conflict of interest statement
The authors have declared that no competing interests exist.
Figures
References
- IDEO. the Field Guide To Human-Centered Design. Igarss 2014. 2014. 1–5 p. ISBN: 9780874216561; 10.1007/s13398-014-0173-7.2
- World Health Organization. Monitoring and evaluating digital health interventions: A practical guide to conducting research and assessment. Global mHealth initiative. [Internet]. 2016. Available from: . [cited 2018 Oct 12].
- Leishmaiasis/app. Available from: . No Title. [cited 2018 Oct 12].
- Zupancic Joze, et al., eds. Evolution and Challenges in System Development. Springer Science & Business Media, 2012. p. 742
- Agarwal S, Lefevre AE, Lee J, L’engle K, Mehl G, Sinha C, et al. Guidelines for reporting of health interventions using mobile phones: Mobile health (mHealth) Evidence reporting and assessment (mERA) checklist. BMJ. 2016;352:1–10.
- Bass L, Bergey J, Clements P, Merson P, Ozkaya I, Sangwan R. A Comparison of Requirements Specification Methods from a Software Architecture Perspective. Tech Rep C ESC-TR-2006-013 [Internet]. 2006;(August). Available from: . [cited 2018 Oct 12].
- Chung Lawrence, et al. Non-functional requirements in software engineering. Vol. 5 Springer Science & Business Media, 2012.
- Kelly G, McKenzie B. Security, privacy, and confidentiality issues on the internet. Journal of Medical Internet Research. 2002. p. 65–75.
- Mayer D, Suarez D. Faux Disk Encryption: Realities of Secure Storage On Mobile Devices. 2015;1–21.ISBN: 9781450341783 10.1145/2897073.2897711
Source: PubMed