<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">JMIR Rehabil Assist Technol</journal-id><journal-id journal-id-type="publisher-id">rehab</journal-id><journal-id journal-id-type="index">17</journal-id><journal-title>JMIR Rehabilitation and Assistive Technologies</journal-title><abbrev-journal-title>JMIR Rehabil Assist Technol</abbrev-journal-title><issn pub-type="epub">2369-2529</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v13i1e79553</article-id><article-id pub-id-type="doi">10.2196/79553</article-id><article-categories><subj-group subj-group-type="heading"><subject>Original Paper</subject></subj-group></article-categories><title-group><article-title>Blockchain-Based Mobile App for Digital Identification of Older Adults in Rural Peru: Design and Usability Evaluation Study</article-title></title-group><contrib-group><contrib contrib-type="author" equal-contrib="yes"><name name-style="western"><surname>Arana-Ramos</surname><given-names>Wilver</given-names></name><degrees>BSc</degrees><xref ref-type="aff" rid="aff1"/><xref ref-type="fn" rid="equal-contrib1">*</xref></contrib><contrib contrib-type="author" equal-contrib="yes"><name name-style="western"><surname>Pastrana-Leon</surname><given-names>Aldo Francisco</given-names></name><degrees>BSc</degrees><xref ref-type="aff" rid="aff1"/><xref ref-type="fn" rid="equal-contrib1">*</xref></contrib><contrib contrib-type="author" corresp="yes" equal-contrib="yes"><name name-style="western"><surname>Morales-Arevalo</surname><given-names>Juan Carlos</given-names></name><degrees>MBA, MSc</degrees><xref ref-type="aff" rid="aff1"/><xref ref-type="fn" rid="equal-contrib1">*</xref></contrib></contrib-group><aff id="aff1"><institution>Department of Software Engineering, Faculty of Engineering, Peruvian University of Applied Sciences</institution><addr-line>Av. Alonso de Molina Nro. 1611, Lima Polo And Hunt Club (Av. Primavera 2390)</addr-line><addr-line>Lima</addr-line><country>Peru</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Munce</surname><given-names>Sarah</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Wrigley</surname><given-names>Cara</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Guo</surname><given-names>Song-Bin</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Juan Carlos Morales-Arevalo, MBA, MSc, Department of Software Engineering, Faculty of Engineering, Peruvian University of Applied Sciences, Av. Alonso de Molina Nro. 1611, Lima Polo And Hunt Club (Av. Primavera 2390), Lima, 15023, Peru, +51 994 866 160; <email>juan.morales@upc.edu.pe</email></corresp><fn fn-type="equal" id="equal-contrib1"><label>*</label><p>all authors contributed equally</p></fn></author-notes><pub-date pub-type="collection"><year>2026</year></pub-date><pub-date pub-type="epub"><day>2</day><month>2</month><year>2026</year></pub-date><volume>13</volume><elocation-id>e79553</elocation-id><history><date date-type="received"><day>24</day><month>06</month><year>2025</year></date><date date-type="rev-recd"><day>20</day><month>11</month><year>2025</year></date><date date-type="accepted"><day>03</day><month>12</month><year>2025</year></date></history><copyright-statement>&#x00A9; Wilver Arana-Ramos, Aldo Francisco Pastrana-Leon, Juan Carlos Morales-Arevalo. Originally published in JMIR Rehabilitation and Assistive Technology (<ext-link ext-link-type="uri" xlink:href="https://rehab.jmir.org">https://rehab.jmir.org</ext-link>), 2.2.2026. </copyright-statement><copyright-year>2026</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Rehabilitation and Assistive Technology, is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://rehab.jmir.org/">https://rehab.jmir.org/</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://rehab.jmir.org/2026/1/e79553"/><abstract><sec><title>Background</title><p>Older adults in rural areas of Peru encounter many challenges in accessing critical public services, such as health care, education, and social assistance, due to low levels of digital literacy, limited access to technology, and the lack of formalized, secure ID. This inhibits entry into digital health, education, and social assistance systems and increases their risk of vulnerability and social exclusion.</p></sec><sec><title>Objective</title><p>This study aimed to design a blockchain technology&#x2013;based mobile app architecture that helps facilitate secure and inclusive digital ID for older adults in rural areas of Peru, enabling access to vital services through a decentralized, privacy-preserving solution.</p></sec><sec sec-type="methods"><title>Methods</title><p>This study followed the design thinking process, which consists of five phases: empathize, define, ideate, prototype, and evaluate. A total of 16 adults (aged 61-85 years) were interviewed to determine the usability barriers and security and privacy concerns with mobile technology, which was used to define functional and nonfunctional requirements. These requirements were developed based on the interviews. The primary features the target population valued included blockchain authentication, assisted registration, multilingual functionality, and a user-friendly interface. The features were prioritized and prototyped using the Figma web-based app. The architecture of the app was developed using the C4 model and accounted for sequential development while ensuring scalability, modularity, and decentralization. Usability was assessed quantitatively by administering the System Usability Scale to the same 16 participants after they had interacted with the prototype.</p></sec><sec sec-type="results"><title>Results</title><p>The mean System Usability Scale score was 60.78 (SD 13.68), indicating acceptable usability. The main issues identified were a lack of skills to navigate digital interfaces, concerns regarding data security, and accessibility challenges for people with disabilities. Participants provided high ratings for the assisted registration system and notifications. The modular, blockchain-based system architecture showed substantial potential for scalability and broader inclusion. The prioritization matrix identified that, for adoption, features must incorporate good design, be multilingual, and require secure authentication.</p></sec><sec sec-type="conclusions"><title>Conclusions</title><p>The proposed blockchain-based mobile app offers a viable technical and socially inclusive model for secure digital ID of older adults in underserved contexts. Usability testing suggested that the solution was perceived as secure, usable, and appropriate for the target population. Although not fully deployed, our prototypes and system architecture provide a good starting point for future implementation. The findings in this study can contribute to efforts to facilitate digital inclusion, access to services, and respect for people&#x2019;s autonomy in identity management systems for vulnerable people.</p></sec></abstract><kwd-group><kwd>blockchain technology</kwd><kwd>data privacy</kwd><kwd>digital divide</kwd><kwd>essential public service</kwd><kwd>portable digital identity</kwd><kwd>older people</kwd><kwd>user-centric design</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><p>Digital technologies have become increasingly important in identity management across all sectors of the economy. The proliferation of mobile apps designed to improve access to services has further deepened this relevance [<xref ref-type="bibr" rid="ref1">1</xref>]. Older adults living in rural areas of Peru face unique challenges, such as higher levels of digital illiteracy and limited public service coverage. These challenges hinder access to essential services such as health care, education, and social support and mirror broader barriers reported for digital health innovations in low- and middle-income health care systems in South and Southeast Asia [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref4">4</xref>]. Advances in digital identity models, such as self-sovereign identities (SSIs), have opened up new possibilities for improving security, privacy, and access to services [<xref ref-type="bibr" rid="ref5">5</xref>]. The emergence of identity verification systems that leverage blockchain infrastructure and protocols exemplifies this change, as they ensure there are no gaps in identity verification and authentication processes and allow users to exercise holistic control over their personal information [<xref ref-type="bibr" rid="ref6">6</xref>].</p><p>Nonetheless, traditional identity management systems that typically use centralized data formats and 2-factor authentication often fail older adults in rural settings [<xref ref-type="bibr" rid="ref7">7</xref>]. Centralized databases are limited, as they rely on dependable connectivity, technical skills, and trust in institutions to function as intended, even though there isn&#x2019;t adequate infrastructure in many rural contexts. In addition, centralized database models present vulnerabilities by creating a single point of failure that makes any district-based database susceptible to unauthorized access or misuse of information. Furthermore, the use of passwords, tokens, and SMS codes presents usability challenges, as older adults may be less versed in the use of mobile devices and may have difficulty remembering and entering credentials [<xref ref-type="bibr" rid="ref8">8</xref>]. Conversely, blockchain protocols decentralize validation across identifiable participants and enable user control over personal data by creating a single entry point to the data. Collectively, these properties make blockchain protocols safer, more transparent, and more empowering for this population.</p><p>These advances in technology go well beyond data protection. They are fundamental to improving efficiency in the delivery of public and private services. For example, health credential verification and the interoperability of electronic health records are relevant in the health care context. The same is true in education and public participation [<xref ref-type="bibr" rid="ref9">9</xref>], where the use of mobile apps that integrate SSIs could help reduce the digital divide and provide access to vital resources for all [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref3">3</xref>]. However, their implementation remains limited due to the fragmentation of existing platforms and the lack of a widely accepted interoperable standard. In addition, challenges remain related to centralized data sets, transparency in verification, adherence to strong data privacy policies, and the centralized control of information [<xref ref-type="bibr" rid="ref10">10</xref>].</p><p>In this context, the focus of this study is on designing a blockchain-based mobile app architecture to support digital identity verification and access to necessary services. The goal is to create a system that can be implemented quickly and efficiently while respecting appropriate privacy, security, and decentralization practices in relation to structural data [<xref ref-type="bibr" rid="ref11">11</xref>].</p><p>This study follows a user-centered design thinking (DT) approach to ensure that the proposed solutions are accessible, secure, and appropriate for the target population, rural older adults [<xref ref-type="bibr" rid="ref12">12</xref>]. The research will include a comprehensive review of current solutions, such as blockchain and smart contracts applied to identity systems, in order to identify the most effective methods for improving user interaction and building trust in digital service platforms [<xref ref-type="bibr" rid="ref13">13</xref>]. This research is qualitative and will combine a detailed literature review with the design and creation of system architecture models that will eventually be applied in the real world. The goal will be to establish a robust framework for mobile services that use advanced identity verification technologies, highlighting the potential of blockchain to ensure data permanence and integrity. The results of this study provide useful approaches for building mobile systems that prioritize accessibility, security, and transparency, with a special focus on improving essential services [<xref ref-type="bibr" rid="ref13">13</xref>]. This strategy is even more significant for rural communities, as it allows older adults in these communities to access digital ID solutions that respect their privacy and give them control of their personal information.</p><p>Therefore, the objective of this study was to design and evaluate the usability of a blockchain-based mobile app architecture that supports secure digital ID and access to essential services for older adults living in rural areas of Peru.</p></sec><sec id="s2" sec-type="methods"><title>Methods</title><sec id="s2-1"><title>Ethical Considerations</title><p>This research involved 16 older adults (aged 61-85 years) living in rural areas of Peru who voluntarily took part in interviews and usability tests. All participants signed an informed consent form. No sensitive data were collected, and personal information was anonymized and managed in accordance with the principles of confidentiality and data protection.</p><p>Formal ethics board (IRB) approval was not required according to institutional guidelines [<xref ref-type="bibr" rid="ref14">14</xref>], as the study focused on the design and usability evaluation of a digital prototype. The research was non-interventional in nature, involved voluntary adult participants, and did not include clinical procedures or the collection of sensitive personal or health data. All participants provided informed consent prior to participation. The study was conducted in accordance with the principles of the Declaration of Helsinki.</p></sec><sec id="s2-2"><title>Research Methodology</title><p>This research adopted the DT methodology to develop a mobile app. The user-centered design approach is highly effective in digital product development because it supports users&#x2019; needs at every stage while also ensuring a product is functional and accessible to the target audience [<xref ref-type="bibr" rid="ref15">15</xref>-<xref ref-type="bibr" rid="ref18">18</xref>]. Among the several established design frameworks, such as user-centered design, participatory design, and agile user experience, DT was selected because it provides a structured yet flexible process that begins with empathy as its core principle. This characteristic aligns with the study&#x2019;s focus on understanding the lived experiences of older adults in rural Peru, whose limited digital literacy and accessibility challenges require solutions grounded in human context rather than purely technical efficiency. By explicitly situating this work within a lineage of research that views empathy as the foundation for inquiry and intervention, the DT framework allows the research team to translate qualitative insights into practical, socially responsive design decisions [<xref ref-type="bibr" rid="ref15">15</xref>-<xref ref-type="bibr" rid="ref17">17</xref>].</p><p>The design process was broken into five phases: empathize, define, ideate, prototype, and test, and each phase was important for our design of a blockchain-based mobile product for digital ID and safe access to services. A complete overview of these activities is provided below.</p></sec><sec id="s2-3"><title>Empathize Phase</title><p>A total of 16 older adults aged 61 to 85 years were interviewed to identify some of the key barriers when trying to access digital services or engage with new technologies. The interviews revealed a number of key issues directly related to participants&#x2019; comfort levels and hesitancy with digital technology, and their anxiety surrounding cybersecurity, which often impaired their use of multiple digital platforms. These findings illustrate that solutions must be technically feasible, but also usable, secure, and easy to navigate [<xref ref-type="bibr" rid="ref15">15</xref>].</p></sec><sec id="s2-4"><title>Define Phase</title><p>The research team identified important findings from the interviews that influenced the project [<xref ref-type="bibr" rid="ref19">19</xref>]. Based on the interview findings, the research team identified key user priorities, specifically the importance of a user-friendly interface, transparent privacy control, and user management (input). The study also highlighted the need for ID systems that are achievable and meaningful to users (at all digital literacy levels) [<xref ref-type="bibr" rid="ref17">17</xref>].</p></sec><sec id="s2-5"><title>Ideate Phase</title><p>At this stage of the research and development process, the team specified some core features of the app, such as authentication methods incorporating blockchain technologies, a security alerts feature, and personalization options for service access that the user sets according to their needs and preferences. The goal was to create a well-integrated solution in which users could access and manage strategic services relevant to them in a secure and efficient manner [<xref ref-type="bibr" rid="ref18">18</xref>].</p></sec><sec id="s2-6"><title>Prototype Phase</title><p>Prototypes and low- and medium-fidelity mockups were developed on the Figma platform. The prototypes helped to visualize the interface design of the app and observe users&#x2019; interactions with the app&#x2019;s functions [<xref ref-type="bibr" rid="ref19">19</xref>]. The technical system architecture was developed in accordance with the C4 model (this study included only &#x201C;context,&#x201D; &#x201C;containers,&#x201D; and &#x201C;components,&#x201D; excluding &#x201C;code,&#x201D; as we did not model the code level) to allow the system to be scalable and adaptable within a blockchain structure [<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref22">22</xref>].</p></sec><sec id="s2-7"><title>Testing Phase</title><p>To quantitatively evaluate prototype app usability, the study applied the System Usability Scale (SUS) developed by Brooke [<xref ref-type="bibr" rid="ref23">23</xref>] in 1996. The SUS is a well-respected instrument used in usability research, due in part to its simplicity and its provision of a straightforward numerical metric of users&#x2019; perceptions of system usability [<xref ref-type="bibr" rid="ref23">23</xref>].</p><p>A survey was created using the standard 10-item SUS, in which respondents indicated whether they agreed or disagreed with statements using a 5-point Likert scale from 1 (&#x201C;strongly disagree&#x201D;) to 5 (&#x201C;strongly agree&#x201D;). The full set of questions used is in <xref ref-type="other" rid="box1">Textbox 1</xref>.</p><p>The launch survey was conducted on 16 older adults that were representative of the targeted users, all of whom had previous interactions with the prototype. The sample size matched the guidelines recommended for initial usability testing using the SUS. Scoring was based on subtracting 1 from the participants&#x2019; response for the odd-numbered items and subtracting the even-numbered item responses from 5. The scores were summed and multiplied by 2.5 to create a final score with a range of 0 to 100, with higher scores representing better usability. User feedback was an important part of the process for improving interface accessibility and ease of use [<xref ref-type="bibr" rid="ref24">24</xref>]. This cyclical, user-centered approach ensures that the app meets technical specifications while being accessible, safe, and easy to use for older adults with various levels of technological capabilities [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref17">17</xref>].</p><boxed-text id="box1"><title> Questions on the System Usability Scale.</title><p>1. I would like to use this application frequently.</p><p>2. I found the application unnecessarily complex.</p><p>3. I found the application easy to use.</p><p>4. I would need the help of a person with technical knowledge to be able to use this application.</p><p>5. The various functions of the application are well integrated.</p><p>6. I found too much inconsistency in the application.</p><p>7. I imagine most people could learn to use this application quickly.</p><p>8. I found the application cumbersome to use.</p><p>9. I felt very confident using this application.</p><p>10. I learned to use the application quickly.</p></boxed-text></sec></sec><sec id="s3" sec-type="results"><title>Results</title><p>This section elaborates on the results from the various design phases and the process of developing a mobile app designed for digital identity and secure access to vital services based on blockchain technology, which was achieved using the DT approach. This allowed the team to better understand the needs of the targeted end users, older adults, and ensured that the prototype genuinely reflects the expectations and needs of this group. The major findings and responses presented in each phase are described below.</p><sec id="s3-1"><title>Empathize Phase: Interview Findings</title><p>During the empathize phase, interviews were conducted with 16 older adults, ranging in age from 61 to 85 years, to identify the barriers and difficulties they face when interacting with mobile apps. The most common problems encountered are presented in <xref ref-type="other" rid="box2">Textbox 2</xref>.</p><p>Based on the findings obtained, two empathy maps were developed to reflect the needs and emotions of users in relation to technology [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. These are presented in <xref ref-type="fig" rid="figure1">Figures 1</xref> and <xref ref-type="fig" rid="figure2">2</xref>, where the first corresponds to users and the second to the local authorities.</p><boxed-text id="box2"><title> Identified problems.</title><list list-type="bullet"><list-item><p>Difficulty navigating apps: users indicated that the app interfaces were complex and difficult to understand.</p></list-item><list-item><p>Data security concerns: older adults expressed distrust about the handling of their personal data on digital platforms.</p></list-item><list-item><p>Lack of interface customization: some users reported that the apps were not tailored to their individual needs, making adoption difficult.</p></list-item><list-item><p>Lack of digital literacy: many older adults have difficulty understanding apps due to their unfamiliarity with digital technologies.</p></list-item><list-item><p>Limited accessibility: the lack of accessibility options for people with visual or motor disabilities made interaction complicated for a segment of the population.</p></list-item></list></boxed-text><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>Empathy map: user perspective.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="rehab_v13i1e79553_fig01.png"/></fig><fig position="float" id="figure2"><label>Figure 2.</label><caption><p>Empathy map: local authorities&#x2019; perspective.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="rehab_v13i1e79553_fig02.png"/></fig></sec><sec id="s3-2"><title>Define Phase: Functional and Nonfunctional Requirements</title><p>Based on the findings obtained in the empathize phase, the functional and nonfunctional requirements for the mobile app were defined. These were established based on the specific needs of the users. The most relevant requirements are presented in <xref ref-type="table" rid="table1">Table 1</xref> below.</p><p>The following are the most relevant user statements, selected from those collected for their significant contribution to understanding users&#x2019; expectations regarding interaction with the app and ensuring that their needs are adequately addressed. These user stories are presented in <xref ref-type="table" rid="table2">Table 2</xref>.</p><table-wrap id="t1" position="float"><label>Table 1.</label><caption><p>Functional and nonfunctional requirements.</p></caption><table id="table1" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Requirement</td><td align="left" valign="bottom">Description</td><td align="left" valign="bottom">Type</td></tr></thead><tbody><tr><td align="left" valign="top">Registration in the app</td><td align="left" valign="top">Allows the user to register in the mobile app with the support of a caregiver, enabling access to their digital identification and essential services.</td><td align="left" valign="top">Functional</td></tr><tr><td align="left" valign="top">Digital identification display</td><td align="left" valign="top">Allows the user to securely access their digital identification based on blockchain technology, guaranteeing the authenticity and protection of their personal data.</td><td align="left" valign="top">Functional</td></tr><tr><td align="left" valign="top">Selection of essential health service</td><td align="left" valign="top">Provides the user with the ability to view and select health services available in their locality, facilitating timely access to vital information.</td><td align="left" valign="top">Functional</td></tr><tr><td align="left" valign="top">Information security</td><td align="left" valign="top">The app must ensure the integrity, confidentiality, and authenticity of user data through the use of blockchain technology and robust security protocols.</td><td align="left" valign="top">Nonfunctional</td></tr><tr><td align="left" valign="top">Multilingual support</td><td align="left" valign="top">The app must support multiple languages to facilitate access to services for users who do not speak the platform&#x2019;s main language.</td><td align="left" valign="top">Nonfunctional</td></tr><tr><td align="left" valign="top">Notification system</td><td align="left" valign="top">The system must have a notification controller that manages reminders, alerts, and updates, sending them to users and local authorities.</td><td align="left" valign="top">Functional</td></tr></tbody></table></table-wrap><table-wrap id="t2" position="float"><label>Table 2.</label><caption><p>Relevant user stories.</p></caption><table id="table2" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">User ID</td><td align="left" valign="bottom">User statement</td></tr></thead><tbody><tr><td align="left" valign="top">US-01</td><td align="left" valign="top">As an older adult user, I would like to view my digital identification in order to access my personal data securely.</td></tr><tr><td align="left" valign="top">US-02</td><td align="left" valign="top">As a local authority, I want to filter the list of registered seniors by name or digital identification to quickly locate a specific user and facilitate records management.</td></tr><tr><td align="left" valign="top">US-03</td><td align="left" valign="top">As an older adult user, I would like to register in the application in order to access the available services.</td></tr><tr><td align="left" valign="top">US-04</td><td align="left" valign="top">As an older adult user, I wish to attach and upload images such as a signature, face, or identification to be registered in my account.</td></tr><tr><td align="left" valign="top">US-05</td><td align="left" valign="top">As a local authority, I wish to modify the distribution of essential services.</td></tr><tr><td align="left" valign="top">US-06</td><td align="left" valign="top">As an older adult user, I want to visualize the services provided by the application to easily access the available options.</td></tr><tr><td align="left" valign="top">US-07</td><td align="left" valign="top">As a local authority, I want to view the list of registered seniors to properly track their enrollment and access to available services.</td></tr><tr><td align="left" valign="top">US-08</td><td align="left" valign="top">As a local authority, I want to visualize the services provided by the application to easily access the available options and also have the possibility to add new broadcasts to each selected service.</td></tr></tbody></table></table-wrap></sec><sec id="s3-3"><title>Ideate Phase: Key Functionalities and Prioritization Matrix</title><p>In this phase, the key functionalities needed for the mobile app were identified. The functionalities were prioritized according to their impact on user experience and the effort required for their implementation. These results are presented in <xref ref-type="table" rid="table3">Table 3</xref>.</p><p><xref ref-type="table" rid="table4">Table 4</xref> shows the prioritization matrix, which ranks the key functionalities according to their impact and implementation effort.</p><table-wrap id="t3" position="float"><label>Table 3.</label><caption><p>Selected key functionalities.</p></caption><table id="table3" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Key functionality</td><td align="left" valign="bottom">Description</td></tr></thead><tbody><tr><td align="left" valign="top">Blockchain authentication</td><td align="left" valign="top">A decentralized authentication system to ensure the security and privacy of user data.</td></tr><tr><td align="left" valign="top">Intuitive interface</td><td align="left" valign="top">Simple and accessible design, with customization options to enhance the experience for older adults.</td></tr><tr><td align="left" valign="top">Assisted registration system</td><td align="left" valign="top">Provides personalized assistance during the registration process to ensure the inclusion of older adults who are not fully technologically autonomous.</td></tr><tr><td align="left" valign="top">Multilingual support</td><td align="left" valign="top">The app must support multiple languages to facilitate access to services for users who do not speak the platform&#x2019;s main language.</td></tr><tr><td align="left" valign="top">Notification system</td><td align="left" valign="top">The system should send notifications to remind users about important events or updates related to services, such as health care, education, and social assistance.</td></tr></tbody></table></table-wrap><table-wrap id="t4" position="float"><label>Table 4.</label><caption><p>Functionality prioritization matrix.</p></caption><table id="table4" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Functionality</td><td align="left" valign="bottom">Impact</td><td align="left" valign="bottom">Effort</td><td align="left" valign="bottom">Priority</td></tr></thead><tbody><tr><td align="left" valign="top">Blockchain authentication</td><td align="left" valign="top">High</td><td align="left" valign="top">Medium</td><td align="left" valign="top">High</td></tr><tr><td align="left" valign="top">Intuitive Interface</td><td align="left" valign="top">High</td><td align="left" valign="top">High</td><td align="left" valign="top">Medium</td></tr><tr><td align="left" valign="top">Assisted registration system</td><td align="left" valign="top">High</td><td align="left" valign="top">Medium</td><td align="left" valign="top">High</td></tr><tr><td align="left" valign="top">Multilingual support</td><td align="left" valign="top">High</td><td align="left" valign="top">Medium</td><td align="left" valign="top">High</td></tr><tr><td align="left" valign="top">Notification system</td><td align="left" valign="top">High</td><td align="left" valign="top">Medium</td><td align="left" valign="top">High</td></tr></tbody></table></table-wrap></sec><sec id="s3-4"><title>Prototyping Phase: C4 Model, User Flow, and Mockups</title><p>During the prototyping phase, a comprehensive representation of the system was developed, covering both the technical architecture and the user experience. For this purpose, the C4 model was applied, which allows for structuring the system architecture at different levels of abstraction. <xref ref-type="fig" rid="figure3">Figure 3</xref> shows the context diagram, which illustrates the general interaction between the mobile app, the users (older adults and local authorities), and the external identity verification services. <xref ref-type="fig" rid="figure4">Figure 4</xref> presents the container diagram, which decomposes the system into its main modules: mobile interface, cloud backend, and decentralized database, along with the technologies used. <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> presents the component diagram, which describes the internal elements of the back end, such as the authentication manager, the service controller, and the notification module.</p><fig position="float" id="figure3"><label>Figure 3.</label><caption><p>C4 model context diagram.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="rehab_v13i1e79553_fig03.png"/></fig><fig position="float" id="figure4"><label>Figure 4.</label><caption><p>C4 model container diagram.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="rehab_v13i1e79553_fig04.png"/></fig><p>To validate the user experience, navigation flows were developed that represent common user steps from login to service access. <xref ref-type="fig" rid="figure5">Figure 5</xref> shows one of these flows, focusing on digital ID.</p><p>Finally, low and medium fidelity mockups were designed in Figma. <xref ref-type="fig" rid="figure6">Figure 6</xref> illustrates the most representative screens of the prototype: user registration, ID display, and service dissemination. These prototypes were essential to validate the suitability of the design to the capabilities and preferences of the target audience.</p><p><xref ref-type="fig" rid="figure5">Figure 5</xref> illustrates the proposed navigation flow for the digital ID process of older adults. This sequential design optimizes the user experience through a clear interface and guided steps from the initial registration to the display of the digital ID, ensuring accessibility, usability, and efficiency in identity management.</p><p><xref ref-type="fig" rid="figure6">Figure 6</xref> presents a series of mockups that illustrate key system functionalities from the administrator&#x2019;s perspective. These include user registration, display of ID information, and management of essential services such as health care, social support, education, and food. The design promotes efficient administration and clear dissemination of campaigns targeting vulnerable populations.</p><fig position="float" id="figure5"><label>Figure 5.</label><caption><p>Ideal navigation flow for identification.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="rehab_v13i1e79553_fig05.png"/></fig><fig position="float" id="figure6"><label>Figure 6.</label><caption><p>Mockups: registration, identification, and dissemination of essential services.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="rehab_v13i1e79553_fig06.png"/></fig></sec><sec id="s3-5"><title>Testing Phase: Usability Evaluation</title><p>In this phase, the results obtained by applying the SUS to a sample of 16 older adults, representative users of the target population who interacted with the mobile app prototype, were analyzed. The mean SUS score was 60.78 (SD 13.68) on a scale from 0 to 100, where higher values indicate better perceived usability, as can be seen in <xref ref-type="fig" rid="figure7">Figure 7</xref>. This score is interpreted as an acceptable usability according to the standards established in the literature, which indicates that the designed prototype is perceived as easy to use, safe, and suitable for the target population.</p><fig position="float" id="figure7"><label>Figure 7.</label><caption><p>Distribution of System Usability Scale (SUS) scores using a boxplot.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="rehab_v13i1e79553_fig07.png"/></fig></sec></sec><sec id="s4" sec-type="discussion"><title>Discussion</title><sec id="s4-1"><title>Outline</title><p>In this study, we designed and evaluated the usability of a blockchain-based mobile app architecture intended to support secure digital ID and access to essential services for older adults in rural Peru. Usability testing with 16 older adults showed that the mean SUS score was 60.78 (SD 13.68), indicating acceptable usability. Older adults viewed the app as secure and mostly easy to use and specifically highlighted the intuitive interface, assisted registration process, and personalized notifications as positive features [<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref27">27</xref>], although there were ongoing issues related to digital literacy, trust in data security, and accessibility for users with disabilities.</p><p>In terms of accessibility, the design targeted low digital literacy and disability-related barriers through large high-contrast fonts, simplified menus, intuitive iconography, and an assisted registration flow [<xref ref-type="bibr" rid="ref19">19</xref>]. In our sample, most participants self-reported no visual or motor limitations; those who did generally required more time and occasional assistance during formative sessions, which directly informed these adaptations [<xref ref-type="bibr" rid="ref8">8</xref>]. The confirmatory evaluation will quantify effectiveness using prespecified metrics, including completion without assistance across core tasks, median task time, error rate, and SUS, stratified by limitation status.</p><p>The prototypes and C4 models developed demonstrate a clear and scalable architecture, since they are structured in modular layers that allow incorporating new functionalities without affecting the stability of the system [<xref ref-type="bibr" rid="ref22">22</xref>]. This scalability is reflected in the use of the C4 model, which facilitates the expansion of the system both in terms of components and cloud services, adapting to different regions or user groups [<xref ref-type="bibr" rid="ref28">28</xref>]. The solution presented is accessible and reliable, as evidenced by the results obtained in the usability tests with older adults [<xref ref-type="bibr" rid="ref29">29</xref>].</p><p>Unlike the conceptual framework proposed by Tan et al [<xref ref-type="bibr" rid="ref30">30</xref>], which focuses on a governance taxonomy for blockchain-based systems in the public sector at macro, meso, and micro levels, our proposal is based on a practical and applied approach, which directly implements such principles in a functional architecture with tested prototypes. This framework includes concrete technical decisions on decentralized authentication, user privacy, and accessibility. The designed app facilitates secure and efficient access to essential services, promoting digital inclusion and trust in the handling of personal information [<xref ref-type="bibr" rid="ref11">11</xref>]. As a limitation, while the study initially focused on design and prototyping, the app is currently being evaluated in real-world settings with older adults from the target population to validate its effectiveness, usability, and adoption in practical environments.</p></sec><sec id="s4-2"><title>Related Work</title><p>In recent years, academic studies have begun to examine how blockchain technology can reinforce governance structures, support the decentralization of public service delivery, enhance security for mobile apps, and improve the user experience in distributed digital environments. Below are four thematic categories that frame the most relevant work.</p><sec id="s4-2-1"><title>Application of Blockchain in Public Sector Governance Models</title><p>Tan et al [<xref ref-type="bibr" rid="ref30">30</xref>] address the implementation of blockchain&#x2019;s potential to transform public services by improving transparency, efficiency, and security, key aspects for the design of blockchain-based mobile apps. Through a conceptual framework, the authors explore key governance decisions at three levels: micro, meso, and macro. These governance elements, illustrated in <xref ref-type="fig" rid="figure8">Figure 8</xref>, affect the design and implementation of blockchain-based systems in the public sector [<xref ref-type="bibr" rid="ref31">31</xref>]. However, they identify limitations such as the lack of interoperable infrastructure and the need for effective governance models. This study contributes to these limitations by proposing a solution based on a more flexible approach to digital identity management and access to essential services, especially through mobile apps that enable better interaction with public services [<xref ref-type="bibr" rid="ref30">30</xref>].</p><fig position="float" id="figure8"><label>Figure 8.</label><caption><p>Key elements in the economic design of governance.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="rehab_v13i1e79553_fig08.png"/></fig><p>Specifically, the proposed architecture directly operationalizes Tan et al&#x2019;s [<xref ref-type="bibr" rid="ref30">30</xref>] microlevel governance principle through user-centered control of digital credentials. For instance, the assisted registration system and blockchain-based authentication module enable users to manage their identity data without relying on centralized authorities. Likewise, the notification and verification features provide transparency and consent management, ensuring that users are aware of and approve any data exchanges. At the mesolevel, interoperability is supported by modular components that facilitate integration with local authority systems, while the macrolevel implications relate to potential scalability within national digital identity strategies. In this way, our design translates Tan et al&#x2019;s [<xref ref-type="bibr" rid="ref30">30</xref>] theoretical governance taxonomy into practical app features that promote individual autonomy and trust in digital identity management.</p><p>For his part, Ibrahim [<xref ref-type="bibr" rid="ref32">32</xref>] explores the impact of decentralization on improving public services, highlighting the need to optimize government efficiency and accountability by delegating authority to local governments. This approach, which highlights the importance of tailoring services to local needs, is essential when considering blockchain-based mobile apps for public services. However, Ibrahim notes that disparities in local resources and capabilities limit the effectiveness of decentralization. Our research complements this analysis by integrating blockchain-based technologies, providing a solution that improves security, accessibility, and efficiency in digital ID and access to essential services, overcoming local resource barriers through a decentralized and accessible infrastructure [<xref ref-type="bibr" rid="ref32">32</xref>].</p></sec><sec id="s4-2-2"><title>Innovations in Blockchain-Based Mobile Apps for Security and Education</title><p>Rizky et al [<xref ref-type="bibr" rid="ref33">33</xref>] propose a blockchain-based mobile app for decentralization of information management in the field of e-journals, addressing security and reliability issues in centralized systems. Although their focus is on data security in academic platforms, their findings on decentralization and security are highly relevant to the design of mobile apps that manage digital ID in essential public services. Using a SWOT (strengths, weaknesses, opportunities, and threats) analysis and a waterfall development approach, the study implements blockchain to ensure a network resilient to external interference. However, scalability in larger environments remains a challenge. Our research advances this by proposing technical solutions that improve the efficiency and accessibility of essential services, overcoming these limitations by integrating blockchain for secure and decentralized digital ID.</p><p>Similarly, Asmawi et al [<xref ref-type="bibr" rid="ref34">34</xref>] developed BlockScholar, a blockchain-based mobile educational app to facilitate the understanding of blockchain. Their research addresses the gap in interactive and accessible educational resources, highlighting the need for platforms that offer immersive and accessible learning on blockchain. They used the rapid application development model to create interactive and gamified content, as illustrated in <xref ref-type="fig" rid="figure9">Figure 9</xref>. Although the study made progress in accessibility and comprehension, it still faces challenges in adaptability to diverse educational contexts. Therefore, our research proposes solutions that enhance learning personalization and expand the coverage of blockchain-related topics.</p><fig position="float" id="figure9"><label>Figure 9.</label><caption><p>Rapid application development model phases.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="rehab_v13i1e79553_fig09.png"/></fig></sec><sec id="s4-2-3"><title>Security, Identity, and Digital Inclusion with Blockchain</title><p>Gumilar et al [<xref ref-type="bibr" rid="ref35">35</xref>] explore the integration of financial technology in digital inclusion, with an emphasis on digital financial literacy as a catalyst for reducing economic and social disparities [<xref ref-type="bibr" rid="ref35">35</xref>]. Through a systematic literature review, they used Scopus databases (2020-2024) to examine how the adoption of digital financial services optimizes inclusion. The results highlighted the importance of improving digital financial literacy but noted limitations in consumer use and protection. In line with these findings, our research extends the analysis by proposing innovative technological solutions and a more accessible design to improve adoption in underserved populations.</p><p>On the other hand, Musa et al [<xref ref-type="bibr" rid="ref36">36</xref>] propose a blockchain-based approach to improve the security of data storage in Android mobile apps. They address the problem of vulnerability and unauthorized access to sensitive data by using blockchain to provide decentralized and secure storage. Their methodology includes the implementation of a 6-layer framework called BSADS (blockchain-based secure android data storage), which optimizes efficiency and security, as detailed in their proposed framework. Despite advances, scalability and costs remain limitations. This research contributes to overcoming these challenges by proposing lightweight node solutions and cost optimization techniques.</p></sec><sec id="s4-2-4"><title>Identity and User Experience Management on Blockchain</title><p>Alanzi and Alkhatib&#x2019;s [<xref ref-type="bibr" rid="ref37">37</xref>] study presents blockchain-based identity management solutions aimed at improving privacy and security in traditional centralized systems. Using blockchain technologies such as Ethereum and smart contracts, they address issues of third-party control, single point of failure, and vulnerability to data manipulation. However, limitations in scalability and weak authentication of some proposed systems are identified. In this context, our research extends these approaches, proposing improved decentralized infrastructure and optimizing the design of smart contracts to increase security and efficiency in digital identity management systems.</p><p>On the other hand, Jang and Han [<xref ref-type="bibr" rid="ref38">38</xref>] developed a user experience framework for blockchain-based services, specifically focused on improving user interaction in contexts such as finance and health care [<xref ref-type="bibr" rid="ref38">38</xref>]. Through an analysis of active services, they identified both general and blockchain-specific functions, highlighting improved efficiency and security. However, their study faces limitations in general applicability due to a lack of standardization. Consequently, our research extends this framework, addressing the implementation of blockchain in digital identity and essential services, improving accessibility and user experience through advanced technological solutions [<xref ref-type="bibr" rid="ref38">38</xref>]. <xref ref-type="table" rid="table5">Table 5</xref> summarizes the key approaches and inputs underlying the development of a blockchain-based mobile app for digital ID and access to essential services.</p><table-wrap id="t5" position="float"><label>Table 5.</label><caption><p>Fundamental approaches for blockchain-based mobile apps.</p></caption><table id="table5" frame="hsides" rules="groups"><thead><tr><td align="left" valign="top">Approach</td><td align="left" valign="top">Contribution</td><td align="left" valign="top">Referenced works</td></tr></thead><tbody><tr><td align="left" valign="top">Taxonomy of governance</td><td align="left" valign="top"><list list-type="bullet"><list-item><p>Rationale for the governance approach</p></list-item></list></td><td align="left" valign="top"><list list-type="bullet"><list-item><p>Tan et al [<xref ref-type="bibr" rid="ref30">30</xref>]</p></list-item></list></td></tr><tr><td align="left" valign="top">Decentralization</td><td align="left" valign="top"><list list-type="bullet"><list-item><p>Decentralization analysis</p></list-item></list></td><td align="left" valign="top"><list list-type="bullet"><list-item><p>Ibrahim [<xref ref-type="bibr" rid="ref32">32</xref>]</p></list-item></list></td></tr><tr><td align="left" valign="top">Patterns of mobile apps</td><td align="left" valign="top"><list list-type="bullet"><list-item><p>Mobile app design patterns</p></list-item></list></td><td align="left" valign="top"><list list-type="bullet"><list-item><p>Rizky et al [<xref ref-type="bibr" rid="ref33">33</xref>]</p></list-item><list-item><p>Asmawi et al [<xref ref-type="bibr" rid="ref34">34</xref>]</p></list-item></list></td></tr><tr><td align="left" valign="top">Inclusion, security, identity, and user experience</td><td align="left" valign="top"><list list-type="bullet"><list-item><p>Design and accessibility considerations</p></list-item><list-item><p>Blockchain security and authentication</p></list-item><list-item><p>Digital identity management</p></list-item><list-item><p>User experience and accessible design</p></list-item></list></td><td align="left" valign="top"><list list-type="bullet"><list-item><p>Gumilar et al [<xref ref-type="bibr" rid="ref35">35</xref>]</p></list-item><list-item><p>Musa et al [<xref ref-type="bibr" rid="ref36">36</xref>]</p></list-item><list-item><p>Alanzi and Alkhatib [<xref ref-type="bibr" rid="ref37">37</xref>]</p></list-item><list-item><p>Jang and Han [<xref ref-type="bibr" rid="ref38">38</xref>]</p></list-item></list></td></tr></tbody></table></table-wrap></sec></sec><sec id="s4-3"><title>Conclusions</title><p>This study designed a functional architectural proposal for a blockchain-based mobile app that facilitates digital ID and access to essential services, with a focus on the inclusion and data security of older adults. The solution addresses usability, privacy, and decentralization issues, overcoming the limitations of traditional centralized and vulnerable systems. In addition to its technical and usability benefits, the proposed system entails ethical challenges related to data governance. If local authorities or institutions act as blockchain nodes, they could potentially exert undue control over users&#x2019; identity data. To prevent this, future implementations should ensure transparent node management, community oversight, and independent auditing. These measures are key to promoting genuine digital inclusion while safeguarding autonomy and trust in rural contexts. Nevertheless, usability tests applied using the SUS revealed high acceptance and perceived ease of use by older adults, demonstrating that the proposal represents a solid basis for the comprehensive development of the app, which has been implemented in a functional prototype currently undergoing real-world testing with older adult participants in rural areas.</p></sec></sec></body><back><ack><p>The authors would like to thank the Direcci&#x00F3;n de Investigaci&#x00F3;n de la Universidad Peruana de Ciencias Aplicadas (UPC) for the support provided for the publication of this article.</p></ack><notes><sec><title>Funding</title><p>This work received financial support from the Direcci&#x00F3;n de Investigaci&#x00F3;n de la Universidad Peruana de Ciencias Aplicadas (UPC) exclusively for the article processing fee (APF). No additional funding was provided for the research activities.</p></sec><sec><title>Data Availability</title><p>The data collected in this study consist of usability evaluation responses (eg, survey data such as System Usability Scale scores and qualitative feedback) obtained from voluntary participants during prototype testing. No clinical, laboratory, or medical record data were collected. The dataset is not publicly available due to privacy and ethical considerations, but can be provided by the corresponding author upon reasonable request.</p></sec></notes><fn-group><fn fn-type="con"><p>WA-R and AFP-L contributed equally to this work. They led the study execution, including participant recruitment, data collection, usability evaluation, analysis of results, and drafting of the manuscript. JCM-A provided research supervision and leadership, contributed to the study planning and methodological guidance, ensured alignment with journal requirements, coordinated the submission and revision process, and performed critical review and editing of the manuscript.</p><p>All authors reviewed and approved the final version of the manuscript.</p></fn><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">DT</term><def><p>design thinking</p></def></def-item><def-item><term id="abb2">SSI</term><def><p>self-sovereign identity</p></def></def-item><def-item><term id="abb3">SUS</term><def><p>System Usability Scale</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Cai</surname><given-names>S</given-names> </name><name name-style="western"><surname>Du</surname><given-names>J</given-names> </name><name name-style="western"><surname>Chen</surname><given-names>X</given-names> </name><name name-style="western"><surname>Li</surname><given-names>E</given-names> </name><name name-style="western"><surname>Chen</surname><given-names>Y</given-names> </name></person-group><article-title>The relationship between e-health literacy and educational participation motivation among elderly individuals: the chained mediating effects of self-identity and social capital</article-title><source>Br J Hosp Med (Lond)</source><year>2024</year><month>09</month><day>30</day><volume>85</volume><issue>9</issue><fpage>1</fpage><lpage>13</lpage><pub-id pub-id-type="doi">10.12968/hmed.2024.0261</pub-id><pub-id pub-id-type="medline">39347685</pub-id></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Farao</surname><given-names>A</given-names> </name><name name-style="western"><surname>Paparis</surname><given-names>G</given-names> </name><name name-style="western"><surname>Panda</surname><given-names>S</given-names> </name><name name-style="western"><surname>Panaousis</surname><given-names>E</given-names> </name><name name-style="western"><surname>Zarras</surname><given-names>A</given-names> </name><name name-style="western"><surname>Xenakis</surname><given-names>C</given-names> </name></person-group><article-title>INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain</article-title><source>Int J Inf Secur</source><year>2024</year><month>02</month><volume>23</volume><issue>1</issue><fpage>347</fpage><lpage>371</lpage><pub-id pub-id-type="doi">10.1007/s10207-023-00741-8</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Morte-Nadal</surname><given-names>T</given-names> </name><name name-style="western"><surname>Esteban-Navarro</surname><given-names>M&#x00C1;</given-names> </name></person-group><article-title>Recommendations for digital inclusion in the use of European digital public services</article-title><source>Humanit Soc Sci Commun</source><year>2025</year><volume>12</volume><issue>1</issue><fpage>273</fpage><pub-id pub-id-type="doi">10.1057/s41599-025-04576-7</pub-id></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Yi</surname><given-names>S</given-names> </name><name name-style="western"><surname>Yam</surname><given-names>ELY</given-names> </name><name name-style="western"><surname>Cheruvettolil</surname><given-names>K</given-names> </name><etal/></person-group><article-title>Perspectives of digital health innovations in low- and middle-income health care systems from South and Southeast Asia</article-title><source>J Med Internet Res</source><year>2024</year><month>11</month><day>25</day><volume>26</volume><fpage>e57612</fpage><pub-id pub-id-type="doi">10.2196/57612</pub-id><pub-id pub-id-type="medline">39586089</pub-id></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Song</surname><given-names>W</given-names> </name><name name-style="western"><surname>Nokhbeh Zaeem</surname><given-names>R</given-names> </name><name name-style="western"><surname>Liau</surname><given-names>D</given-names> </name><etal/></person-group><article-title>Self-sovereign identity and user control for privacy-preserving contact tracing</article-title><conf-name>WI-IAT &#x2019;21</conf-name><conf-date>Dec 14-17, 2021</conf-date><conf-loc>Melbourne, Australia</conf-loc><fpage>438</fpage><lpage>445</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://dl.acm.org/doi/proceedings/10.1145/3486622">https://dl.acm.org/doi/proceedings/10.1145/3486622</ext-link></comment><pub-id pub-id-type="doi">10.1145/3486622.3493914</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>George</surname><given-names>M</given-names> </name><name name-style="western"><surname>Chacko</surname><given-names>AM</given-names> </name></person-group><article-title>Health passport: a blockchain-based PHR-integrated self-sovereign identity system</article-title><source>Front Blockchain</source><year>2023</year><volume>6</volume><fpage>1075083</fpage><pub-id pub-id-type="doi">10.3389/fbloc.2023.1075083</pub-id></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ji</surname><given-names>H</given-names> </name><name name-style="western"><surname>Dong</surname><given-names>J</given-names> </name><name name-style="western"><surname>Pan</surname><given-names>W</given-names> </name><name name-style="western"><surname>Yu</surname><given-names>Y</given-names> </name></person-group><article-title>Associations between digital literacy, health literacy, and digital health behaviors among rural residents: evidence from Zhejiang, China</article-title><source>Int J Equity Health</source><year>2024</year><month>04</month><day>9</day><volume>23</volume><issue>1</issue><fpage>68</fpage><pub-id pub-id-type="doi">10.1186/s12939-024-02150-2</pub-id><pub-id pub-id-type="medline">38594723</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lu</surname><given-names>SY</given-names> </name><name name-style="western"><surname>Yoon</surname><given-names>S</given-names> </name><name name-style="western"><surname>Yee</surname><given-names>WQ</given-names> </name><name name-style="western"><surname>Heng Wen Ngiam</surname><given-names>N</given-names> </name><name name-style="western"><surname>Ng</surname><given-names>KYY</given-names> </name><name name-style="western"><surname>Low</surname><given-names>LL</given-names> </name></person-group><article-title>Experiences of a community-based digital intervention among older people living in a low-income neighborhood: qualitative study</article-title><source>JMIR Aging</source><year>2024</year><month>04</month><day>25</day><volume>7</volume><fpage>e52292</fpage><pub-id pub-id-type="doi">10.2196/52292</pub-id><pub-id pub-id-type="medline">38662423</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Prieto-Egido</surname><given-names>I</given-names> </name><name name-style="western"><surname>Sanchez-Chaparro</surname><given-names>T</given-names> </name><name name-style="western"><surname>Urquijo-Reguera</surname><given-names>J</given-names> </name></person-group><article-title>Impacts of information and communication technologies on the SDGs: the case of Mayu Telecomunicaciones in rural areas of Peru</article-title><source>Inf Technol Dev</source><year>2023</year><month>01</month><day>2</day><volume>29</volume><issue>1</issue><fpage>103</fpage><lpage>127</lpage><pub-id pub-id-type="doi">10.1080/02681102.2022.2073581</pub-id></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Li</surname><given-names>J</given-names> </name><name name-style="western"><surname>Liang</surname><given-names>N</given-names> </name><name name-style="western"><surname>Wu</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Ma</surname><given-names>X</given-names> </name><name name-style="western"><surname>Liao</surname><given-names>Z</given-names> </name></person-group><article-title>Effect of internet usage on the life satisfaction of the elderly spousal caregivers of disabled elderly</article-title><source>Sci Rep</source><year>2024</year><volume>14</volume><issue>1</issue><fpage>22294</fpage><pub-id pub-id-type="doi">10.1038/s41598-024-73298-8</pub-id></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Konopik</surname><given-names>J</given-names> </name><name name-style="western"><surname>Blunck</surname><given-names>D</given-names> </name></person-group><article-title>Development of an evidence-based conceptual model of the health care sector under digital transformation: integrative review</article-title><source>J Med Internet Res</source><year>2023</year><volume>25</volume><fpage>e41512</fpage><pub-id pub-id-type="doi">10.2196/41512</pub-id></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Husain</surname><given-names>L</given-names> </name><name name-style="western"><surname>Greenhalgh</surname><given-names>T</given-names> </name></person-group><article-title>Examining intersectionality and barriers to the uptake of video consultations among older adults from disadvantaged backgrounds with limited English proficiency: qualitative narrative interview study</article-title><source>J Med Internet Res</source><year>2025</year><month>01</month><day>6</day><volume>27</volume><fpage>e65690</fpage><pub-id pub-id-type="doi">10.2196/65690</pub-id><pub-id pub-id-type="medline">39761566</pub-id></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Zu&#x00F1;e Chero</surname><given-names>L</given-names> </name><name name-style="western"><surname>Capu&#x00F1;ay-Uceda</surname><given-names>OE</given-names> </name><name name-style="western"><surname>Idrogo Burga</surname><given-names>E</given-names> </name><name name-style="western"><surname>Capu&#x00F1;ay-Uceda</surname><given-names>CE</given-names> </name></person-group><article-title>Inequalities in learning performance caused by the digital divide during the health emergency</article-title><conf-name>22nd LACCEI International Multi-Conference for Engineering, Education and Technology (LACCEI 2024</conf-name><conf-date>Jul 17-19, 2024</conf-date><comment><ext-link ext-link-type="uri" xlink:href="https://laccei.org/LACCEI2024-CostaRica">https://laccei.org/LACCEI2024-CostaRica</ext-link></comment><pub-id pub-id-type="doi">10.18687/LACCEI2024.1.1.1042</pub-id></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="web"><source>UPC Code of Ethics in Scientific Research of the Peruvian University of Applied Sciences (UPC)</source><access-date>2026-02-02</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://investigacion.upc.edu.pe/assets/files/C%C3%B3digo-de-%C3%A9tica-en-la-investigacion-cientifica-de-la-UPC.pdf">https://investigacion.upc.edu.pe/assets/files/C%C3%B3digo-de-%C3%A9tica-en-la-investigacion-cientifica-de-la-UPC.pdf</ext-link></comment></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Nimmanterdwong</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Boonviriya</surname><given-names>S</given-names> </name><name name-style="western"><surname>Tangkijvanich</surname><given-names>P</given-names> </name></person-group><article-title>Human-centered design of mobile health apps for older adults: systematic review and narrative synthesis</article-title><source>JMIR Mhealth Uhealth</source><year>2022</year><month>01</month><day>14</day><volume>10</volume><issue>1</issue><fpage>e29512</fpage><pub-id pub-id-type="doi">10.2196/29512</pub-id><pub-id pub-id-type="medline">35029535</pub-id></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sobrinho</surname><given-names>A da S</given-names> </name><name name-style="western"><surname>Gomes</surname><given-names>G de O</given-names> </name><name name-style="western"><surname>Bueno J&#x00FA;nior</surname><given-names>CR</given-names> </name></person-group><article-title>Developing a multiprofessional mobile app to enhance health habits in older adults: user-centered approach</article-title><source>JMIR Form Res</source><year>2024</year><month>04</month><day>15</day><volume>8</volume><issue>8</issue><fpage>e54214</fpage><pub-id pub-id-type="doi">10.2196/54214</pub-id><pub-id pub-id-type="medline">38619865</pub-id></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Essop</surname><given-names>H</given-names> </name><name name-style="western"><surname>Kekana</surname><given-names>R</given-names> </name><name name-style="western"><surname>Smuts</surname><given-names>H</given-names> </name></person-group><article-title>Co-designing of a prototype mobile application for fetal radiation dose monitoring among pregnant radiographers using a design thinking approach</article-title><source>Health Informatics J</source><year>2024</year><volume>30</volume><issue>3</issue><fpage>14604582241284960</fpage><pub-id pub-id-type="doi">10.1177/14604582241284960</pub-id><pub-id pub-id-type="medline">39348214</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Chen</surname><given-names>E</given-names> </name><name name-style="western"><surname>Bishop</surname><given-names>J</given-names> </name><name name-style="western"><surname>Guge Cozon</surname><given-names>L</given-names> </name><etal/></person-group><article-title>Integrating human-centered design methods Into a health promotion project: supplemental nutrition assistance program education case study for intervention design</article-title><source>JMIR Form Res</source><year>2023</year><month>04</month><day>21</day><volume>7</volume><fpage>e37515</fpage><pub-id pub-id-type="doi">10.2196/37515</pub-id><pub-id pub-id-type="medline">37083485</pub-id></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gomez-Hernandez</surname><given-names>M</given-names> </name><name name-style="western"><surname>Ferre</surname><given-names>X</given-names> </name><name name-style="western"><surname>Moral</surname><given-names>C</given-names> </name><name name-style="western"><surname>Villalba-Mora</surname><given-names>E</given-names> </name></person-group><article-title>Design guidelines of mobile apps for older adults: systematic review and thematic analysis</article-title><source>JMIR Mhealth Uhealth</source><year>2023</year><month>09</month><day>21</day><volume>11</volume><fpage>e43186</fpage><pub-id pub-id-type="doi">10.2196/43186</pub-id><pub-id pub-id-type="medline">37733401</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Rashidi</surname><given-names>H</given-names> </name><name name-style="western"><surname>Rashidi</surname><given-names>Z</given-names> </name></person-group><article-title>Software architecture tools: a classification and survey with recommendation for an organization</article-title><source>J Comput Secur</source><year>2023</year><issue>10</issue><fpage>61</fpage><lpage>81</lpage><pub-id pub-id-type="doi">10.22108/jcs.2023.137862.1131</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Voorheis</surname><given-names>P</given-names> </name><name name-style="western"><surname>Zhao</surname><given-names>A</given-names> </name><name name-style="western"><surname>Kuluski</surname><given-names>K</given-names> </name><etal/></person-group><article-title>Integrating behavioral science and design thinking to develop mobile health interventions: systematic scoping review</article-title><source>JMIR Mhealth Uhealth</source><year>2022</year><month>03</month><day>16</day><volume>10</volume><issue>3</issue><fpage>e35799</fpage><pub-id pub-id-type="doi">10.2196/35799</pub-id><pub-id pub-id-type="medline">35293871</pub-id></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Liang</surname><given-names>X</given-names> </name><name name-style="western"><surname>Zhao</surname><given-names>J</given-names> </name><name name-style="western"><surname>Chen</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Bandara</surname><given-names>E</given-names> </name><name name-style="western"><surname>Shetty</surname><given-names>S</given-names> </name></person-group><article-title>Architectural design of a blockchain-enabled, federated learning platform for algorithmic fairness in predictive health care: design science study</article-title><source>J Med Internet Res</source><year>2023</year><month>10</month><day>30</day><volume>25</volume><fpage>e46547</fpage><pub-id pub-id-type="doi">10.2196/46547</pub-id><pub-id pub-id-type="medline">37902833</pub-id></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Brooke</surname><given-names>J</given-names> </name></person-group><person-group person-group-type="editor"><name name-style="western"><surname>Jordan</surname><given-names>PW</given-names> </name><name name-style="western"><surname>Thomas</surname><given-names>B</given-names> </name><name name-style="western"><surname>Weerdmeester</surname><given-names>BA</given-names> </name><name name-style="western"><surname>McClelland</surname><given-names>IL</given-names> </name></person-group><article-title>SUS: a &#x201C;quick and dirty&#x201D; usability scale</article-title><source>Usability Evaluation in Industry</source><year>1996</year><publisher-name>Taylor &#x0026; Francis</publisher-name><fpage>189</fpage><lpage>194</lpage><pub-id pub-id-type="doi">10.1201/9781498710411</pub-id></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hill</surname><given-names>JR</given-names> </name><name name-style="western"><surname>Brown</surname><given-names>JC</given-names> </name><name name-style="western"><surname>Campbell</surname><given-names>NL</given-names> </name><name name-style="western"><surname>Holden</surname><given-names>RJ</given-names> </name></person-group><article-title>Usability-in-place-remote usability testing methods for homebound older adults: rapid literature review</article-title><source>JMIR Form Res</source><year>2021</year><month>11</month><day>2</day><volume>5</volume><issue>11</issue><fpage>e26181</fpage><pub-id pub-id-type="doi">10.2196/26181</pub-id><pub-id pub-id-type="medline">34726604</pub-id></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sweeney</surname><given-names>M</given-names> </name><name name-style="western"><surname>Barton</surname><given-names>W</given-names> </name><name name-style="western"><surname>Nebeker</surname><given-names>C</given-names> </name></person-group><article-title>Evaluating mobile apps targeting older adults: descriptive study</article-title><source>JMIR Form Res</source><year>2023</year><month>04</month><day>27</day><volume>7</volume><fpage>e37329</fpage><pub-id pub-id-type="doi">10.2196/37329</pub-id><pub-id pub-id-type="medline">37103995</pub-id></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Schroeder</surname><given-names>T</given-names> </name><name name-style="western"><surname>Dodds</surname><given-names>L</given-names> </name><name name-style="western"><surname>Georgiou</surname><given-names>A</given-names> </name><name name-style="western"><surname>Gewald</surname><given-names>H</given-names> </name><name name-style="western"><surname>Siette</surname><given-names>J</given-names> </name></person-group><article-title>Older adults and new technology: mapping review of the factors associated with older adults&#x2019; intention to adopt digital technologies</article-title><source>JMIR Aging</source><year>2023</year><month>05</month><day>16</day><volume>6</volume><fpage>e44564</fpage><pub-id pub-id-type="doi">10.2196/44564</pub-id><pub-id pub-id-type="medline">37191976</pub-id></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kim</surname><given-names>S</given-names> </name><name name-style="western"><surname>Park</surname><given-names>C</given-names> </name><name name-style="western"><surname>Park</surname><given-names>S</given-names> </name><etal/></person-group><article-title>Measuring digital health literacy in older adults: development and validation study</article-title><source>J Med Internet Res</source><year>2025</year><month>02</month><day>5</day><volume>27</volume><fpage>e65492</fpage><pub-id pub-id-type="doi">10.2196/65492</pub-id><pub-id pub-id-type="medline">39908081</pub-id></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Liang</surname><given-names>X</given-names> </name><name name-style="western"><surname>Alam</surname><given-names>N</given-names> </name><name name-style="western"><surname>Sultana</surname><given-names>T</given-names> </name><name name-style="western"><surname>Bandara</surname><given-names>E</given-names> </name><name name-style="western"><surname>Shetty</surname><given-names>S</given-names> </name></person-group><article-title>Designing a blockchain-empowered telehealth artifact for decentralized identity management and trustworthy communication: interdisciplinary approach</article-title><source>J Med Internet Res</source><year>2024</year><month>09</month><day>25</day><volume>26</volume><fpage>e46556</fpage><pub-id pub-id-type="doi">10.2196/46556</pub-id><pub-id pub-id-type="medline">39320943</pub-id></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Koo</surname><given-names>JH</given-names> </name><name name-style="western"><surname>Park</surname><given-names>YH</given-names> </name><name name-style="western"><surname>Kang</surname><given-names>DR</given-names> </name></person-group><article-title>Factors predicting older people&#x2019;s acceptance of a personalized health care service app and the effect of chronic disease: cross-sectional questionnaire study</article-title><source>JMIR Aging</source><year>2023</year><month>06</month><day>21</day><volume>6</volume><fpage>e41429</fpage><pub-id pub-id-type="doi">10.2196/41429</pub-id><pub-id pub-id-type="medline">37342076</pub-id></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Tan</surname><given-names>E</given-names> </name><name name-style="western"><surname>Mahula</surname><given-names>S</given-names> </name><name name-style="western"><surname>Crompvoets</surname><given-names>J</given-names> </name></person-group><article-title>Blockchain governance in the public sector: a conceptual framework for public management</article-title><source>Gov Inf Q</source><year>2022</year><month>01</month><volume>39</volume><issue>1</issue><fpage>101625</fpage><pub-id pub-id-type="doi">10.1016/j.giq.2021.101625</pub-id></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Barrera</surname><given-names>C</given-names> </name></person-group><source>A framework for blockchain governance design: the Prysm group wheel</source><year>2019</year><access-date>2025-06-01</access-date><publisher-name>Medium</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://medium.com/prysmeconomics/a-framework-for-blockchain-governance-design-the-prysm-group-wheel-703279c1b0dd">https://medium.com/prysmeconomics/a-framework-for-blockchain-governance-design-the-prysm-group-wheel-703279c1b0dd</ext-link></comment></nlm-citation></ref><ref id="ref32"><label>32</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ibrahim</surname><given-names>AHH</given-names> </name></person-group><article-title>Decentralization and its impact on improving public services</article-title><source>Int J Soc Sci</source><year>2024</year><volume>7</volume><issue>2</issue><fpage>45</fpage><lpage>53</lpage><pub-id pub-id-type="doi">10.21744/ijss.v7n2.2278</pub-id></nlm-citation></ref><ref id="ref33"><label>33</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Rizky</surname><given-names>A</given-names> </name><name name-style="western"><surname>Lutfiani</surname><given-names>N</given-names> </name><name name-style="western"><surname>Sri Mariyati</surname><given-names>W</given-names> </name><name name-style="western"><surname>Atika Sari</surname><given-names>A</given-names> </name><name name-style="western"><surname>Febrianto</surname><given-names>KR</given-names> </name></person-group><article-title>Decentralization of information using blockchain technology on mobile apps e-journal</article-title><source>B-FronT</source><year>2022</year><volume>1</volume><issue>2</issue><fpage>1</fpage><lpage>10</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://journal.pandawan.id/b-front/issue/view/5">https://journal.pandawan.id/b-front/issue/view/5</ext-link></comment><pub-id pub-id-type="doi">10.34306/bfront.v1i2.37</pub-id></nlm-citation></ref><ref id="ref34"><label>34</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Asmawi</surname><given-names>A</given-names> </name><name name-style="western"><surname>Saifulbahri</surname><given-names>EM</given-names> </name><name name-style="western"><surname>Mohd Ariffin</surname><given-names>NA</given-names> </name></person-group><article-title>Development of BlockScholar as an educational mobile application on blockchain technology</article-title><source>ARASET</source><year>2023</year><volume>34</volume><issue>1</issue><fpage>15</fpage><lpage>23</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://semarakilmu.com.my/journals/index.php/applied_sciences_eng_tech/issue/view/207">https://semarakilmu.com.my/journals/index.php/applied_sciences_eng_tech/issue/view/207</ext-link></comment><pub-id pub-id-type="doi">10.37934/araset.34.1.1523</pub-id></nlm-citation></ref><ref id="ref35"><label>35</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gumilar</surname><given-names>DWA</given-names> </name><name name-style="western"><surname>Sangka</surname><given-names>KB</given-names> </name><name name-style="western"><surname>Totalia</surname><given-names>SA</given-names> </name></person-group><article-title>Digital financial literacy and digital financial inclusion in the era of digital disruption: systematic literature review</article-title><source>FJMR</source><year>2024</year><volume>3</volume><issue>5</issue><fpage>1563</fpage><lpage>1576</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://journal.formosapublisher.org/index.php/fjmr/issue/view/559">https://journal.formosapublisher.org/index.php/fjmr/issue/view/559</ext-link></comment><pub-id pub-id-type="doi">10.55927/fjmr.v3i5.9213</pub-id></nlm-citation></ref><ref id="ref36"><label>36</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Musa</surname><given-names>HS</given-names> </name><name name-style="western"><surname>Krichen</surname><given-names>M</given-names> </name><name name-style="western"><surname>Altun</surname><given-names>AA</given-names> </name><name name-style="western"><surname>Ammi</surname><given-names>M</given-names> </name></person-group><article-title>Survey on blockchain-based data storage security for android mobile applications</article-title><source>Sensors (Basel)</source><year>2023</year><month>10</month><day>26</day><volume>23</volume><issue>21</issue><fpage>8749</fpage><pub-id pub-id-type="doi">10.3390/s23218749</pub-id><pub-id pub-id-type="medline">37960449</pub-id></nlm-citation></ref><ref id="ref37"><label>37</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Alanzi</surname><given-names>H</given-names> </name><name name-style="western"><surname>Alkhatib</surname><given-names>M</given-names> </name></person-group><article-title>Towards improving privacy and security of identity management systems using blockchain technology: a systematic review</article-title><source>Appl Sci (Basel)</source><year>2022</year><volume>12</volume><issue>23</issue><fpage>12415</fpage><pub-id pub-id-type="doi">10.3390/app122312415</pub-id></nlm-citation></ref><ref id="ref38"><label>38</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jang</surname><given-names>H</given-names> </name><name name-style="western"><surname>Han</surname><given-names>SH</given-names> </name></person-group><article-title>User experience framework for understanding user experience in blockchain services</article-title><source>Int J Hum Comput Stud</source><year>2022</year><month>02</month><volume>158</volume><fpage>102733</fpage><pub-id pub-id-type="doi">10.1016/j.ijhcs.2021.102733</pub-id></nlm-citation></ref></ref-list><app-group><supplementary-material id="app1"><label>Multimedia Appendix 1</label><p>C4 model component diagram.</p><media xlink:href="rehab_v13i1e79553_app1.png" xlink:title="PNG File, 134 KB"/></supplementary-material></app-group></back></article>