e.g. mhealth
Search Results (1 to 5 of 5 Results)
Download search results: CSV END BibTex RIS
Skip search results from other journals and go to results- 3 JMIR Public Health and Surveillance
- 1 Interactive Journal of Medical Research
- 1 JMIR Biomedical Engineering
- 0 Journal of Medical Internet Research
- 0 Medicine 2.0
- 0 iProceedings
- 0 JMIR Research Protocols
- 0 JMIR Human Factors
- 0 JMIR Medical Informatics
- 0 JMIR mHealth and uHealth
- 0 JMIR Serious Games
- 0 JMIR Mental Health
- 0 JMIR Rehabilitation and Assistive Technologies
- 0 JMIR Preprints
- 0 JMIR Bioinformatics and Biotechnology
- 0 JMIR Medical Education
- 0 JMIR Cancer
- 0 JMIR Challenges
- 0 JMIR Diabetes
- 0 JMIR Data
- 0 JMIR Cardio
- 0 JMIR Formative Research
- 0 Journal of Participatory Medicine
- 0 JMIR Dermatology
- 0 JMIR Pediatrics and Parenting
- 0 JMIR Aging
- 0 JMIR Perioperative Medicine
- 0 JMIR Nursing
- 0 JMIRx Med
- 0 JMIRx Bio
- 0 JMIR Infodemiology
- 0 Transfer Hub (manuscript eXchange)
- 0 JMIR AI
- 0 JMIR Neurotechnology
- 0 Asian/Pacific Island Nursing Journal
- 0 Online Journal of Public Health Informatics
- 0 JMIR XR and Spatial Computing (JMXR)

Further, commercial tools for identity verification from public records may also be used depending on the location of the study, ethics committee approval, and the researcher’s ability to access these. However, these tools rely on up-to-date public records and prevent anonymous participation, which again may create barriers.
Interact J Med Res 2025;14:e60548
Download Citation: END BibTex RIS

This risk of false alarms underscores the crucial role of human input for data curation and signal verification.
Delays in the effective response to a genuine health threat are often the result of the time to verification of a health event—determining if an unofficial reported threat is real so an appropriate response can ensue.
JMIR Public Health Surveill 2024;10:e52093
Download Citation: END BibTex RIS

The blockchain's public verification is utilized for passport verification, while smart contracts (SCs) with various purposes verify that a user's VP is valid. Finally, the public chain technique can be used to save building costs and create a worldwide VP chain.
The architectural design application is divided into 2 parts: entity architecture and blockchain architecture. Basically, the system is an architecture of multientities interacting with each other using SCs built on the blockchain.
JMIR Public Health Surveill 2022;8(4):e32411
Download Citation: END BibTex RIS

Fingerprint Biometric System Hygiene and the Risk of COVID-19 Transmission
The primary purpose of fingerprint recognition or identification systems is to provide trustworthy verification of users to control access to resources such as computers as well as to critical facilities such as offices and hospitals.
JMIR Biomed Eng 2020;5(1):e19623
Download Citation: END BibTex RIS

Moreover, the majority of HIV-preventive interventions for MSM have focused on behavior change at the individual level [30-33], thereby emphasizing the need to not only develop e Health HIV-preventive interventions for male couples, but to also develop methods to maximize recruitment efforts and verification of valid data from both members of the couple (ie, dyadic data) online.
JMIR Public Health Surveill 2016;2(2):e152
Download Citation: END BibTex RIS