Published on in Vol 19, No 7 (2017): July

Using Digital Technologies in Clinical HIV Research: Real-World Applications and Considerations for Future Work

Using Digital Technologies in Clinical HIV Research: Real-World Applications and Considerations for Future Work

Using Digital Technologies in Clinical HIV Research: Real-World Applications and Considerations for Future Work

Original Paper

1Fred Hutchinson Cancer Research Center, Seattle, WA, United States

2Colorado School of Public Health, Denver, CO, United States

3Perinatal HIV Research Unit (PHRU), Faculty of Health Sciences, University of the Witwatersrand, Soweto, South Africa

4Massachusetts General Hospital/Harvard Medical School, Boston, MA, United States

5University of Alabama at Birmingham, Birmingham, AL, United States

6Global HIV Vaccine Enterprise, New York, NY, United States

7Emory University, Atlanta, GA, United States

8Research Data & Communications Technologies Corp., Garrett Park, MD, United States

9International AIDS Vaccine Initiative, New York, NY, United States

Corresponding Author:

Jessica Andriesen, PhD

Fred Hutchinson Cancer Research Center

1100 Fairview Ave. N., Mail Stop E3-129

Seattle, WA, 98109

United States

Phone: 1 206 667 5812

Email: jandries@fredhutch.org


Background: Digital technologies, especially if used in novel ways, provide a number of potential advantages to clinical research in trials related to human immunodeficiency virus (HIV) and acquired immune deficiency syndrome (AIDS) and may greatly facilitate operations as well as data collection and analysis. These technologies may even allow answering questions that are not answerable with older technologies. However, they come with a variety of potential concerns for both the participants and the trial sponsors. The exact challenges and means for alleviation depend on the technology and on the population in which it is deployed, and the rapidly changing landscape of digital technologies presents a challenge for creating future-proof guidelines for technology application.

Objective: The aim of this study was to identify and summarize some common themes that are frequently encountered by researchers in this context and highlight those that should be carefully considered before making a decision to include these technologies in their research.

Methods: In April 2016, the Global HIV Vaccine Enterprise surveyed the field for research groups with recent experience in novel applications of digital technologies in HIV clinical research and convened these groups for a 1-day meeting. Real-world uses of various technologies were presented and discussed by 46 attendees, most of whom were researchers involved in the design and conduct of clinical trials of biomedical HIV prevention and treatment approaches. After the meeting, a small group of organizers reviewed the presentations and feedback obtained during the meeting and categorized various lessons-learned to identify common themes. A group of 9 experts developed a draft summary of the findings that was circulated via email to all 46 attendees for review. Taking into account the feedback received, the group finalized the considerations that are presented here.

Results: Meeting presenters and attendees discussed the many successful applications of digital technologies to improve research outcomes, such as those for recruitment and enrollment, participant identification, informed consent, data collection, data quality, and protocol or treatment adherence. These discussions also revealed unintended consequence of technology usage, including risks to study participants and risks to study integrity.

Conclusions: Key lessons learned from these discussions included the need to thoroughly evaluate systems to be used, the idea that early success may not be sustained throughout the study, that some failures will occur, and considerations for study-provided devices. Additionally, taking these key lessons into account, the group generated recommendations on how to move forward with the use of technology in HIV vaccine and biomedical prevention trials.

J Med Internet Res 2017;19(7):e274

doi:10.2196/jmir.7513

Keywords



Those who sponsor, conduct, and analyze data from clinical trials actively seek new digital tools and technologies that could reduce costs or timelines; potentially improve clinical operational efficiencies; facilitate recruitment and retention of volunteers; and improve data collection, quality, and analysis [1]. However, deployment of such tools is not always straightforward and may have implications for regulatory approval, ethics reviews, statistical analysis, study design, and other aspects of clinical trial conduct. Moreover, practical experience with a given technology often uncovers benefits and pitfalls that were not anticipated at the planning stage. The use of such technologies in trials related to human immunodeficiency virus (HIV) and acquired immune deficiency syndrome (AIDS) poses unique challenges due to stigmatization of HIV in many communities [2], which may decrease participants’ willingness to share information with study staff. Therefore, it is critical to review past experiences and to discuss innovative uses of digital technologies that could be adopted in future clinical trials.


In April 2016, the Global HIV Vaccine Enterprise surveyed the field for research groups with recent experience in novel applications of digital technologies in HIV clinical research and convened these groups for a 1-day meeting. Real-world uses of various technologies were presented and discussed by 46 attendees, most of whom were researchers involved in the design and conduct of clinical trials of biomedical HIV prevention and treatment approaches. After the meeting, a small group of organizers reviewed the presentations and feedback obtained during the meeting and categorized various lessons-learned to identify common themes. A group of 9 experts developed a draft summary of the findings that was circulated via email to all 46 attendees for review. Taking into account the feedback received, the group finalized the considerations that are presented here.

Many of the listed considerations are not specific to HIV and AIDS research but potentially can be applied to clinical studies of other diseases. However, due to the group’s focus on HIV and AIDS, we aimed to highlight unique aspects of dealing with this disease and did not fully evaluate the relevance of these considerations to other diseases.

The rapidly changing landscape of digital technologies presents a challenge for creating future-proof guidelines for technology application. To address this concern, the group included experts with many years of experience in applying digital technologies to clinical research, who were able to point to long-term trends in the industry and identify concerns, summarized below, that are likely to persist in the foreseeable future.


Successful Applications of Digital Technologies to Improve Research Outcomes

Recruitment and Enrollment

When conducting HIV-related research, it is critical to be able to recruit from populations that have been previously underrepresented in research. The advent of digital technologies offers new opportunities for the recruitment and enrollment of these populations. Technologies necessary for research surveillance and other forms of data collection are increasingly becoming common in low- and middle-income settings [3,4] and have facilitated recruitment and enrollment of diverse populations in the United States [5]. For example, use of mobile devices such as tablets and phones for data collection within and outside the clinic increases the convenience of participation in research studies and positively influences participant response rates [6]. Using algorithms to tailor recruitment messages to individuals (eg, by sending personalized letters, emails, or text messages [short message service, SMS]) also increases response rates [7]. Figure 1 shows examples of these digital technologies, including: (1) electronic systems embedded in pill bottles which allow recording of every instance of bottle opening, providing researchers with a verifiable record of adherence; (2) messages sent via cell phones, which can be used to improve adherence to drugs, encourage specific behaviors, or remind about appointments; (3) various biometric measures (fingerprints, palm prints, and iris scans being the most common) which can be used to identify participants; (4) cryptographic hash functions that allow for one-way matching of participants, protecting their privacy in situations when trial records may be compromised; (5) videos or interactive forms that can be used to improve participants’ understanding by providing more visual information by allowing self-pacing, or by ensuring comprehension before allowing progress to following sections; (6) scanning and electronic storage of documents such as informed consent forms to improve record keeping; (7) cell phones, which can be used to reduce the need for in-person visits or to gather information from participants in real time, reducing recall bias; and (8) some systems which integrate two or more of the digital technologies allowing more efficient project management and better data integration.

Figure 1. Examples of digital technologies.
View this figure
Participant Identification

Devices such as electronic fingerprinting technologies, retinal scans, or palm identification can be used to identify participant coenrollment in different trials within or across trial sites, as well as “fraudulent” participation (occurring when a nonenrolled individual appears for a trial visit, presumably to receive trial incentives)[8,9]. In the context of community-, clinic-, or other cluster-randomized trials, they can help identify and possibly prevent intervention contamination, which occurs when participants in one group or cluster migrate into another group and “share” the intervention in a control group. For example, in a community-randomized trial of safe sex messaging when people interact with members of a control community, they may share the messages they have heard. This would result in moving the evaluation measures of the two communities closer and masking the true effect size [10].

Assessing participant identification in a longitudinal fashion can be used to prevent such issues, which not only compromise study and data integrity but also may harm patients (eg, if coenrolled patients receive double doses of a vaccine or other experimental product or if noneligible participants receive a vaccine or other experimental product)[8,9,11]. When these issues cannot be prevented, biometric identification used in longitudinal fashion can help measure the magnitude of such contamination and mitigate this effect during analysis [12-14].

Several studies indicate that the use of biometric devices is feasible in an array of resource settings and acceptable among both research study staff and participants [15-17]; in the case of some stigmatized populations, there is even data suggesting that biometric identifiers may be preferred over providing one’s name or other identification during study visits [18].

Biometric tools, if integrated into the study with strong cryptography, can provide a means of protecting participant identity while providing even greater levels of identity assurance than the traditional tools [19]. For example, systems that use retina scans convert the unique image of the participant’s eye into digital information using a cryptographic hash (an algorithm that links data to a string of symbols that cannot be used to identify the original image). That key is only available to operators of the study making identification of a participant with only the image of their eye virtually impossible. This approach significantly reduces the potential for release of data to the wrong participant or if there is a compromise of the study data that would breach confidentiality. In addition, assurance of identity also reduces the risk that the participant is misidentified and therefore receives an incorrect regimen.

Informed Consent

Videos and interactive electronic systems can provide alternatives to traditional informed consent procedures. Whereas data are mixed on whether video-based informed consent offers improvement over the traditional paper documentation of informed consent, there are indications that people may experience greater comprehension of the research process with video-based consent [20]. This may be especially helpful in populations where literacy rates are a concern. Additionally, interactive programs or websites can offer user-centered approaches to informed consent that include simpler layouts and opportunities for self-pacing that can help to ensure participants comprehend study processes [20].

Data Collection

Digital technologies have made study conduct more efficient as well. Systems such as the Research Electronic Data Capture (RedCap) [15,16], Open Data Kit [17], and MagPi [21] offer researchers the capacity to streamline the workflow and collect data more efficiently. These systems combine storage of participant information, validation of informed consent, and in some cases reminder recalls and communication with participants in a single program, which simplifies project management and removes the need for posthoc integration of information from multiple sources [16,22]. This technology in turn improves the workflow so that research coordinators, and data collectors can use a single system to understand who has enrolled, who needs to complete informed consent, and who needs to complete assessments or return for follow up.

Data Quality

Digital data collection for psychosocial characteristics of participants offers important advantages. Automated skip patterns, also known as conditional branch logic, present the participant with questions that are customized based on their responses to previous questions. For example, if a participant indicates sexual encounters in the past week, more questions appear to gather additional details about those encounters, but these questions are omitted if the participant answers that there was no sexual activity [6,22]. Forced item response (when participants are required to answer a question before they can move to the next question)—offering a “don’t want to answer” option to avoid coercion—helps reduce or eliminate missing data, substantially contributing to data quality [6,23,24]. Advances in technologies for measurement of biomedical variables can help improve integration of biomedical measures with psychosocial measures in a single dataset [25].

Protocol or Treatment Adherence

Clinical trials are typically designed to determine the efficacy of a medication or other biomedical intervention. True biologic efficacy, however, can only be determined in the setting of high adherence [26]. Incomplete adherence reduces the trial’s power to determine if suboptimal efficacy is due to the intervention or to participants’ behavior. The importance of this relationship between adherence and efficacy has been highlighted in the recent clinical trials assessing pre-exposure prophylaxis (PrEP) against HIV infection [27].

Numerous methods exist for measuring adherence, including self-report, pill or product counts, pharmacy refill records, drug levels, and electronic adherence monitoring (eg, pill or product bottles that record openings). Each method has its pros and cons, and none is considered a gold standard [28]. For example, self-reported adherence is often an overestimate because of social desirability bias (ie, wanting to report high adherence to please a clinician or researcher regardless of the true adherence behavior) and recall bias (ie, not accurately remembering forgotten doses). Digital technologies can be used to help optimize these measures in several ways.

Cellular Phone–Based Adherence Support

Given the near ubiquity of cellular phones, even in low-income countries, multiple studies have explored the use of short message service (SMS) and interactive voice response to potentially improve upon self-reported data [29,30]. Some data suggest that the relative anonymity of a cellular phone (compared with an in-person interview) leads to reduced social desirability bias [31]. Moreover, the convenience of cellular-based data collection allows for more frequent data collection, thus reducing recall time. However, validation of cellular phone-based reporting is limited [32], and further research into this measurement approach is needed.

Real-Time Adherence Monitoring Devices

Electronic adherence monitors provide a day-to-day assessment of pill or product container openings, which can be a highly informative, objective measure of adherence behavior. Whereas this technology has existed for many years, wireless versions have become available in recent years, enabling the use of this type of adherence data in real-time in both resource-rich and resource-limited regions [33,34]. Real-time electronic monitoring devices can be used both for measurement and for intervention at the precise time when nonadherence is occurring. Three recent trials assessing real-time adherence linked to SMS reminders revealed improvements in adherence, although the extent of the impact was variable [35-37]. Real-time adherence monitoring has yet to be used in a large-scale HIV clinical trial but has great potential to improve adherence and increase the discrimination between biological and behavioral aspects of efficacy.

Unintended Consequences of the Use of Technology

Risks to Study Participants
Data Security as a Risk to Study Participants

For clinical trial participants, the data security practices of the researchers and their sponsors are critically important. For participants in HIV research trials, these practices are even more critical as breaches of confidentiality may negatively impact participants’ lives [38,39]. These negative impacts could include concerns around physical safety due to breach of location information or could result in social stigma of assumed infection status for participants and their family members.

Digital technologies used in clinical research offer opportunities to improve the data security whereas also introducing vulnerabilities for the breach of that data. Some examples of how the new technologies offer improvements for the security of the participant data include encryption for data within storage systems, encryption of the data transmission stream from one system to another, and the ability to use identity assurance tools such as biometrics that verify the participants’ identity without maintaining personally identifiable information in the study management systems [40].

Simultaneously, new technologies are providing unexpected ways that the data security can be breached. Location services on mobile phones record the location and use of apps and connected devices such as accelerometers and biosensors, which are already used in clinical protocols [41]. These location data can be shared inadvertently by other applications, in metadata of other files, or by the phone itself. Updates to applications or the phone operating system can change the way location data or storage is handled by the device without the knowledge of data managers or study managers.

Additionally, the use of wearable technologies, which often include new data gathering and transmission tools, presents new opportunities for unexpected data release [42]. Many of these systems are consumer- and vendor-optimized and not designed for use in clinical studies. Commercial companies often have an interest in collecting and monetizing personal information, not protecting it.

Social Impacts to Study Participants

As noted above, cellular technology and electronic adherence monitors have great potential for adherence measurement and intervention; however, ethical concerns may arise in using this technology, primarily around privacy [43].

Participants may be able to utilize mobile phones to capture sensitive behavioral data in real time and in a confidential manner; however, the use of a study-provided phone may pose a risk to those participants who do not disclose study participation to their partner, family members, or roommates. As participants may be requested to keep a study-provided phone with them at all times in order to submit the daily survey records, participants may inadvertently disclose their study participation. Moreover, the participant may be accused of cheating on a partner or hiding a secret if he or she is discovered to be using a secret “second” mobile phone.

Risks are also present when participants use their own phones for study communication. Cellular phones in developing countries are commonly shared by multiple people [44], and an SMS sent to a trial participant may be seen by others, disclosing HIV status or trial participation. Protections against such situations include the use of nondescript messages that only the intended recipient will recognize, a personal identification number (PIN) to trigger an SMS with trial-specific content, and flash SMS or unstructured supplementary service data (USSD) protocols (ie, the messages disappear once read). Although such protections may not be needed in all contexts and some individuals may prefer direct messages [45], privacy should be considered when designing the use of SMS in any clinical research.

Electronic adherence monitors may attract attention in some settings such as rural villages or in stigmatized populations such as injection drug users. This attention may lead to unintended disclosure of HIV status or trial participation. The degree of concern expressed by participants in research studies has ranged from low to moderate [46,47]. To protect against this situation, users of electronic adherence monitors should plan to store, carry, and use them in an inconspicuous manner. Device manufactures can make alerts for missed doses (eg, lights or audible notifications) optional. In the future, use of these devices in clinical care may reduce concerns about privacy; however, they are currently limited to the research context.

Implementation of these and other technologies requires a careful understanding of the specific population(s) using them and the concerns they may have. Participant counseling may also be used to reduce concerns of inadvertent information release (eg, encouraging HIV status disclosure when it is safe to do so). Interestingly, at least one study found that an electronic adherence monitor was used to start discussions of disclosure [48].

Risks to Study Integrity
Introduction of Bias

The use of skip patterns may have unintended consequences for data collection [49]. Bias in responses to digital questionnaires can occur because of the length of mobile or Web-based surveys conducted at specific time points in a study. For example, a recent study of adolescent male sexual behaviors used mobile phone daily diaries that varied in length based on the number of partners reported by the respondents [49]. Participants reporting no sexual partners answered a total of 38 questions, whereas those reporting the maximum of 5 partners could see a total of 748 items. As a result, there was a tendency among participants to report fewer partners than they actually had in order to reduce the amount of time spent completing the daily diaries.

One way to address this is to limit the number of highly detailed follow-up items triggered by a “yes” response to sexual behavior and to add alternative, general information items to “no” responses so that the entire diary has a smaller number of questions and that gaming the system by responding “no” does not shorten the length of the diary.

Participation Fatigue

As with any traditional data collection method, participation fatigue can occur with electronic data capture methods such as daily diaries or periodic surveys. Participants with children and a very busy working and school schedule may find it especially difficult to complete study procedures daily as part of their busy day schedules. Therefore, if daily participation is required, then a shorter duration of study participation is recommended. If the study duration is longer, then active engagement of participants would be recommended to sustain motivation, such as lotteries [50,51]. Alternatively, study procedures could be completed based on particular events or on an ad hoc basis to maintain the novelty of study participation.

The issue of participation fatigue presents a particular concern given the power of electronic and Web-based data capture. Investigators now have the capacity to collect nearly limitless amounts of highly specific and often sensitive data using these tools. This desire to “measure everything” needs to be mitigated with the understanding that patient fatigue issues have not been alleviated as compared with traditional data collection methods. Therefore, investigators need to be thoughtful about the questionnaire design including effective skip patterns and innovative incentives and thoroughly pilot test new instruments before final implementation. As with any type of behavioral data collection, the key is to focus on the necessary variables that aid accomplishment of the protocol objectives and not gather more data than one can or will analyze.


Key Lessons Learned From Early Technology Implementations

Systems Need to Be Thoroughly Evaluated
Staff Training

Thought and care need to be put into the setup and maintenance of the system to be used, including assessment of the need for training of site staff. For example, biometric identification technologies often require training to ensure high-quality capture of biometric measures, especially in limited resource settings [11]. This can be addressed by developing didactic and practical trainings, job aids, error logs, and scheduling intermittent refresher trainings.

System Testing

Additionally, the feasibility and use of proposed technology should be piloted on site prior to trial launch with study staff and potential participants. For example, technologies that are Internet-dependent will face issues when implemented in low-resource settings, particularly in rural areas. Whereas mobile Internet coverage is improving, pilot testing of all technologies will help to identify such implementation issues for troubleshooting.

Comparisons to In-Clinic Data

If data from more than one method of collection are going to be combined for analysis, then efforts should be made to harmonize across the data types. For instance, mobile phone versus in-clinic data variables should be comparable so that they can be compared at the stage of analyses, that is, they should have comparable questions, formats, and variables.

Participant Use

Iterative refinement of devices with user feedback on feasibility and acceptability is critical. Technologies will have variable participant acceptability depending on the setting and the type of technology. For example, use of an electronic fingerprinting technology to identify female sex workers in Zambia longitudinally within a mock HIV vaccine trial showed <50% uptake of the technology among women approached in the field (at their places of work) but >95% uptake within the clinic [11]. Pilot studies to assess technology acceptability by prospective participants before a trial are critical, as well as the understanding of what potentially modifiable barriers participants may face when taking up a technology. There may be particular concerns around confidentiality with the use of biometric devices.

Initial Successes May Not Be Sustained

Participation fatigue issues, described previously, can derail a study when initial success is not seen over the entire course of the study. Other issues that could result in the failure to maintain an early success include staff turnover, equipment failures (particularly when there is a lack of technical support), software upgrade issues that cause devices to become out of sync, or other changes to the overall system that affect the quality of the data to be collected.

Prepare for Some Percent of Failure

In designing a study, it is important to consider the effects of data that will be missed due to issues with the use of a chosen technology, especially when it is first implemented. Attempts to minimize the loss of data should be made throughout the study. Retraining during scheduled visits is very important. Identifying the challenges participants are experiencing in completing study procedures allows improvement of the user experience. Reminder strategies and plans to fit the mobile phone completion into the participant’s daily routine can be selected in consultation with the participant. Study staff should expect participants’ calls and provide support especially for those that default from study procedures. Regular check-ins (ie, telephonic contact and social networking applications) between study visits are important to keep the participants motivated for the daily survey submissions. It is also critical for a staff member to be trained to provide very technical information about mobile phone and Internet operation. For instance, users could unknowingly disable the Internet on their mobile phone and then not be able to enable it on their own.

Considerations for Study-Provided Devices
Devices May Be Manipulated by the Participants

In settings where mobile phone use may not be widespread, researchers may provide mobile phones as part of the participation in the study. Additionally, participants may be provided with the necessary airtime and data to perform study-related procedures. Providing a study phone can be advantageous. However, the disadvantage is that the user may misuse data and airtime provided for study purposes. To avoid participants using the study airtime for things unrelated to study, software can be installed to block data access to unrelated website that may affect the airtime for study purposes. Whereas safeguards can be put in place, technology-savvy people are often able to find a work-around.

For example, an app like “AppLock” can be used [52]. This App is password protected and Internet-enabled applications can be blocked by the data manager to ensure that uploaded data bundles are solely used for the project related application(s). Although participants may struggle to disable the blocking software, they would be able to reset the full phone, in which case the entire phone content would be erased. The phone would then have to be reset and the software reinstalled for study-related procedures to continue.

These problems can be addressed by providing sufficient data on a monthly basis for participants to meet both the research data collection and their personal needs. One concern for trials enrolling minors is that mobile data can be used by participants to access materials not desirable by their parents. Both the loss or damage concern and the data use issues can substantially impact budgets and need to be considered a priori.

Loss and Breakage Will Happen

Whereas researchers have found that provisioning mobile devices or data minutes is a successful recruitment strategy and method for incentivizing participants, it is important to remember that the devices will often be unintentionally lost or damaged by participants (5-10% replacement rate is common but may be as high as 30% depending on the study population; J Haberer, personal communication).

Better results can be achieved if participants take ownership in the research. One way to motivate safekeeping of the study phone is to let participants know upfront that they would keep the phone after study completion. This approach may not only increase the likelihood that the participants will give the study phone the extra care but may also increase their motivation to be adherent to all study procedures to the best of their abilities.

Data Integrity

As with any data-collection system, errors in the data will exist and need to be addressed by study staff. Technological solutions do offer some mechanisms to increase data quality such as automatic quality-control checks, which can be put in place to define the expected range for some data types. Additionally, participants may be shown a summary of their data before the data are officially submitted to the study, allowing them to catch obvious errors. However, technology can also introduce new data challenges. Duplicate data entries can be made in some systems, after which study staff need to establish which entry is valid for that particular day. Devices used to measure adherence, such as enhanced pill containers, could be opened by participants without medication consumption, leading to inaccurate data. Additionally, systems will respond differently to incomplete or partial data, such as when an Internet connection is lost mid-entry.

Conclusions

How to Move Forward in HIV Vaccine and Biomedical Prevention Trials

When considering how to move toward integration of digital technologies into HIV prevention clinical trials and observational studies, three guiding messages emerged at the meeting. Taken together, they can offer an informed and realistic approach to the challenges posed by new technologies: change is hard, things change rapidly, and support is critical. An approach that prepares for slower uptake and acceptance of new technology but includes flexibility to respond to rapid pace of change within technologies and addresses the support needed for both scenarios may be most successful.

Change is Hard

Regulatory authorities may be hesitant to accept new technology such as electronic source data due to concerns about security of source data, loss of data, and access by site. Change is also hard at the clinical research site level, which will carry much of the additional administrative burden of managing risks with new technology. For example, in the initial stages of introducing electronic case report forms, paper copies may need to be maintained as a backup to ensure regulatory compliance.

Technology Changes Rapidly

While dealing with potentially slow acceptance of change brought by new technologies, the HIV prevention field will at the same time need flexibility to respond to the rapid pace of change within technologies. Future-proofing is often impossible in this setting. Sponsors and research organizations should expect rapid obsolescence and continuing need for upgrading, refreshing, and tailoring as technology changes. For example, when using mobile data applications, offline solutions can quickly become obsolete because 4G cellular networks now have dense coverage in some countries [53].

New technologies do not obviate the need for responsible data processes, including continuing review of consent, privacy, security, ownership, and transparency. These practices are particularly important in changing legal environments. For example, if biometric information is collected in clinical trials, data security will need to be reassessed if the government develops national fingerprint or facial recognition databases, which would allow identification of participants.

Support is Critical

Infrastructure issues were noted as an expected key element for technology support. Despite the growth in reliable power and Internet systems globally, infrastructure weaknesses still complicate computer system use. Power outages, Internet connectivity, and local-area network (LAN) issues all require interventions to improve utilization and acceptance of digital technologies. In a study using cloud-based fingerprint biometric tracking, Internet connectivity frustrated site staff and led to a relatively high failure rate for fingerprint matching (N Kiwanuka, personal communication).

Technical support for staff can be challenging where staff are clinically trained but not fluent in technology. In one setting, the majority of clinically qualified staff trained to use a tablet technology had not worked with a touchscreen before [11]. Trial participants also require support for use of new technologies, particularly mobile health apps.

Whereas on-site support and partnering with local equipment vendors for on-site service can be useful, several investigators felt that specialized technologies were better suited to a central-help desk. As additional new technologies become available, often with different support requirements and a limited expertise-base, the ability to successfully provide technical support may be the limiting factor in expanded use of new clinical trial technologies, not regulatory authorities or user acceptance.

Summary

Digital technologies, especially if used in novel ways, provide a number of potential advantages to clinical research in trials related to HIV and AIDS and may greatly facilitate operations as well as data collection and analysis. These technologies may even allow answering questions that are not answerable with older technologies. However, they come with a variety of potential concerns for both the participants and the trial sponsors. The exact challenges and means for alleviation depend on the technology and on the population in which it is deployed. Nevertheless, in this guidance we aimed to summarize some common themes that are frequently encountered by researchers in this context and should be carefully considered before making a decision to include these technologies in their research. Finally, we encourage researchers to seek advice from organizations with past history and experience of applying digital technologies in HIV and AIDS clinical research.

Acknowledgments

The workshop and the follow-up discussions have been funded and organized by the Global HIV Vaccine Enterprise.

The following people contributed to the development of these considerations at the workshop and via electronic communication: Iyore Ayanru, Andrew Beyer, Trevor Crowell, Alix Dunn, Esther Estes, Patricia Fast, Mathew Ferguson, Michele Fong Lim, Huub Gelderblom, David Glidden, Shannon Grant, Peter Guarino, Scott Hammer, Stacey Hannah, Christina Harris, David Hilmer, Matthew Johnston, Sarah Joseph, Julie Jouguelet, Anatoli Kamali, Dagna Laufer, Bhavna Maharaj, Megan McBride, Stan Mierzwa, Matthew Moyer, Harriet Park, Philip Renzullo, Gabriella Scarlatti, Peter Simpson, William Snow, Lisa Sunner, Thania Thorne, Bargavi Thayagarajan, Michael van der Ven, Carl Verlinde, Steven Wakefield, and Sabrina Welsh.

Dr Andriesen is supported by the HIV Vaccine Trials Network SDMC grant: NIAID UM1 AI068635. Dr Haberer receives grant funding from the National Institutes of Health, Bill and Melinda Gates Foundation, and USAID. Dr Dietrich received a Thuthuka post PhD funding award (2014-2016) from the South African National Research Foundation (NRF). Any opinion, finding, and conclusion or recommendation expressed in this material is solely the responsibility of the authors and does not necessarily represent the official views of the NIAID, National Institutes of Health (NIH), or SA NRF.

This work was funded in part by IAVI and made possible by the support of many donors, including the Bill & Melinda Gates Foundation, the Ministry of Foreign Affairs of Denmark, Irish Aid, the Ministry of Finance of Japan in partnership with The World Bank, the Ministry of Foreign Affairs of the Netherlands, the Norwegian Agency for Development Cooperation (NORAD), the United Kingdom Department for International Development (DFID), and the United States Agency for International Development (USAID). The full list of IAVI donors is available at the IAVI website. The contents of this manuscript are the responsibility of IAVI and do not necessarily reflect the views of USAID or the US Government.

We also thank Adam Winters and Iris Corbasson for excellent technical assistance in preparation of the manuscript.

Conflicts of Interest

None declared.

  1. van Dam J, Omondi OK, Midamba B, Groosman N, Hooper N, Spector J, et al. Open-source mobile digital platform for clinical trial data collection in low-resource settings. BMJ Innov 2017 Feb;3(1):26-31 [FREE Full text] [CrossRef] [Medline]
  2. Chambers LA, Rueda S, Baker DN, Wilson MG, Deutsch R, Raeifar E, et al. Stigma, HIV and health: a qualitative synthesis. BMC Public Health 2015 Sep 03;15:848 [FREE Full text] [CrossRef] [Medline]
  3. White A, Thomas DS, Ezeanochie N, Bull S. Health worker mHealth utilization: a systematic review. Comput Inform Nurs 2016 Mar 7;34(5):240. [CrossRef] [Medline]
  4. King C, Hall J, Banda M, Beard J, Bird J, Kazembe P, et al. Electronic data capture in a rural African setting: evaluating experiences with different systems in Malawi. Glob Health Action 2014;7:25878 [FREE Full text] [Medline]
  5. Bull SS, Levine D, Schmiege S, Santelli J. Recruitment and retention of youth for research using social media: experiences from the Just/Us study. Vulnerable Child Youth Stud 2013 Jun;8(2):171-181. [CrossRef]
  6. Mulhern B, O'Gorman H, Rotherham N, Brazier J. Comparing the measurement equivalence of EQ-5D-5L across different modes of administration. Health Qual Life Outcomes 2015 Nov 26;13:191 [FREE Full text] [CrossRef] [Medline]
  7. Taljaard M, Chaudhry SH, Brehaut JC, Weijer C, Grimshaw JM. Mail merge can be used to create personalized questionnaires in complex surveys. BMC Res Notes 2015 Oct 16;8:574 [FREE Full text] [CrossRef] [Medline]
  8. Harichund C, Haripersad K, Ramjee R. Participant verification: prevention of co-enrolment in clinical trials in South Africa. S Afr Med J 2013 May 15;103(7):491-493. [Medline]
  9. Buyse M, George SL, Evans S, Geller NL, Ranstam J, Scherrer B, et al. The role of biostatistics in the prevention, detection and treatment of fraud in clinical trials. Stat Med 1999 Dec 30;18(24):3435-3451. [Medline]
  10. Simmons N, Donnell D, Ou S, Celentano DD, Aramrattana A, Davis-Vogel A, et al. Assessment of contamination and misclassification biases in a randomized controlled trial of a social network peer education intervention to reduce HIV risk behaviors among drug users and risk partners in Philadelphia, PA and Chiang Mai, Thailand. AIDS Behav 2015 Oct;19(10):1818-1827 [FREE Full text] [CrossRef] [Medline]
  11. Wall KM, Kilembe W, Inambao M, Chen YN, Mchoongo M, Kimaru L, et al. Implementation of an electronic fingerprint-linked data collection system: a feasibility and acceptability study among Zambian female sex workers. Global Health 2015 Jun 27;11:27 [FREE Full text] [CrossRef] [Medline]
  12. Corby PM, Schleyer T, Spallek H, Hart TC, Weyant RJ, Corby AL, et al. Using biometrics for participant identification in a research study: a case report. J Am Med Inform Assoc 2006;13(2):233-235 [FREE Full text] [CrossRef] [Medline]
  13. Serwaa-Bonsu A, Herbst AJ, Reniers G, Ijaa W, Clark B, Kabudula C, et al. First experiences in the implementation of biometric technology to link data from health and demographic surveillance systems with health facility data. Glob Health Action 2010 Feb 24;3:- [FREE Full text] [CrossRef] [Medline]
  14. Maltoni D, Jain A, Prabhakar S. Handbook of fingerprint recognition. 2nd edition. London: Springer; 2009.
  15. Projectredcap. REDCap internet   URL: https://projectredcap.org [accessed 2017-04-26] [WebCite Cache]
  16. Dunn WD, Cobb J, Levey AI, Gutman DA. REDLetr: Workflow and tools to support the migration of legacy clinical data capture systems to REDCap. Int J Med Inform 2016 Sep;93:103-110. [CrossRef] [Medline]
  17. Open Data Kit. Open data kit internet   URL: https://opendatakit.org/ [accessed 2017-04-26] [WebCite Cache]
  18. Desmond Tutu HIV Foundation. Desmond Tutu HIV Foundation. 2009. Annual Review 2009 Internet   URL: http://desmondtutuhivfoundation.org.za//wp-content/uploads/2014/12/DTHF-Annual-Review-2009.pdf [accessed 2017-04-26] [WebCite Cache]
  19. Nair J, Kumari R. A Review on Biometric Cryptosystems. Int J Latest Trends Eng Technol 2015 Sep;6(1):46-53 [FREE Full text]
  20. Rosser BR, Gurak L, Horvath KJ, Oakes JM, Konstan J, Danilenko GP. The challenges of ensuring participant consent in internet-based sex studies: a case study of the men's internet sex (MINTS-I and II) studies. J Comput Mediat Commun 2009 Apr;14(3):- [FREE Full text] [CrossRef] [Medline]
  21. MagPi. MagPi Internet   URL: http://www.magpi.org [accessed 2017-04-26] [WebCite Cache]
  22. Blumenberg C, Barros AJ. Electronic data collection in epidemiological research. The use of REDCap in the Pelotas birth cohorts. Appl Clin Inform 2016 Jul 13;7(3):672-681. [CrossRef] [Medline]
  23. Grey JA, Konstan J, Iantaffi A, Wilkerson JM, Galos D, Rosser BR. An updated protocol to detect invalid entries in an online survey of men who have sex with men (MSM): how do valid and invalid submissions compare? AIDS Behav 2015 Oct;19(10):1928-1937. [CrossRef] [Medline]
  24. Staziaki PV, Kim P, Vadvala HV, Ghoshhajra BB. Medical registry data collection efficiency: a crossover study comparing web-based electronic data capture and a standard spreadsheet. J Med Internet Res 2016 Jun 08;18(6):e141 [FREE Full text] [CrossRef] [Medline]
  25. Rajalakshmi R, Arulmalar S, Usha M, Prathiba V, Kareemuddin KS, Anjana RM, et al. Validation of smartphone based retinal photography for diabetic retinopathy screening. PLoS One 2015;10(9):e0138285 [FREE Full text] [CrossRef] [Medline]
  26. Weiss HA, Wasserheit JN, Barnabas RV, Hayes RJ, Abu-Raddad LJ. Persisting with prevention: the importance of adherence for HIV prevention. Emerg Themes Epidemiol 2008 Jul 11;5:8 [FREE Full text] [CrossRef] [Medline]
  27. Hendrix CW. Exploring concentration response in HIV pre-exposure prophylaxis to optimize clinical care and trial design. Cell 2013 Oct 24;155(3):515-518 [FREE Full text] [CrossRef] [Medline]
  28. Baeten JM, Haberer JE, Liu AY, Sista N. Preexposure prophylaxis for HIV prevention: where have we been and where are we going? J Acquir Immune Defic Syndr 2013 Jul;63(Suppl 2):S122-S129 [FREE Full text] [CrossRef] [Medline]
  29. Curran K, Mugo NR, Kurth A, Ngure K, Heffron R, Donnell D, et al. Daily short message service surveys to measure sexual behavior and pre-exposure prophylaxis use among Kenyan men and women. AIDS Behav 2013 Nov;17(9):2977-2985 [FREE Full text] [CrossRef] [Medline]
  30. Haberer J. Self-reported adherence to preexposure prophylaxis (PrEP) and sexual behavior by text messaging: preliminary findings from the Partners Mobile Adherence to PrEP study. 2014 Presented at: IAPAC International Conference on HIV Treatment and Prevention Adherence; 2014; Miami, FL.
  31. Adebajo S, Obianwu O, Eluwa G, Vu L, Oginni A, Tun W, et al. Comparison of audio computer assisted self-interview and face-to-face interview methods in eliciting HIV-related risks among men who have sex with men and men who inject drugs in Nigeria. PLoS One 2014;9(1):e81981 [FREE Full text] [CrossRef] [Medline]
  32. Haberer JE, Kiwanuka J, Nansera D, Muzoora C, Hunt PW, So J, et al. Realtime adherence monitoring of antiretroviral therapy among HIV-infected adults and children in rural Uganda. AIDS 2013 Aug 24;27(13):2166-2168 [FREE Full text] [CrossRef] [Medline]
  33. Haberer JE, Kahane J, Kigozi I, Emenyonu N, Hunt P, Martin J, et al. Real-time adherence monitoring for HIV antiretroviral therapy. AIDS Behav 2010 Dec;14(6):1340-1346 [FREE Full text] [CrossRef] [Medline]
  34. de Sumari-de Boer IM, van den Boogaard J, Ngowi KM, Semvua HH, Kiwango KW, Aarnoutse RE, et al. Feasibility of real time medication monitoring among HIV infected and TB patients in a resource-limited setting. AIDS Behav 2016 May;20(5):1097-1107. [CrossRef] [Medline]
  35. Orrell C, Cohen K, Mauff K, Bangsberg DR, Maartens G, Wood R. A randomized controlled trial of real-time electronic adherence monitoring with text message dosing reminders in people starting first-line antiretroviral therapy. J Acquir Immune Defic Syndr 2015 Dec 15;70(5):495-502. [CrossRef] [Medline]
  36. Haberer JE, Musiimenta A, Atukunda EC, Musinguzi N, Wyatt MA, Ware NC, et al. Short message service (SMS) reminders and real-time adherence monitoring improve antiretroviral therapy adherence in rural Uganda. AIDS 2016 May 15;30(8):1295-1300 [FREE Full text] [CrossRef] [Medline]
  37. Sabin LL, Bachman Desilva M, Gill CJ, Zhong L, Vian T, Xie W, et al. Improving adherence to antiretroviral therapy with triggered real-time text message reminders: the China adherence through technology study. J Acquir Immune Defic Syndr 2015 Aug 15;69(5):551-559 [FREE Full text] [CrossRef] [Medline]
  38. Schmidt C, Jaoko W, Omosa-Manyonyi G, Kaleebu P, Mpendo J, Nanvubya A, et al. Long-term follow-up of study participants from prophylactic HIV vaccine clinical trials in Africa. Hum Vaccin Immunother 2014;10(3):714-723 [FREE Full text] [Medline]
  39. Fuchs J, Durham M, McLellan-Lemal E, Vittinghoff E, Colfax G, Gurwith M, et al. Negative social impacts among volunteers in an HIV vaccine efficacy trial. J Acquir Immune Defic Syndr 2007 Nov 01;46(3):362-368. [CrossRef] [Medline]
  40. Ohmann C, Kuchinke W, Canham S, Lauritsen J, Salas N, Schade-Brittinger C, ECRIN Working Group on Data Centres. Standard requirements for GCP-compliant data management in multinational clinical trials. Trials 2011 Mar 22;12:85 [FREE Full text] [CrossRef] [Medline]
  41. Ajami S, Teimouri F. Features and application of wearable biosensors in medical care. J Res Med Sci 2015 Dec;20(12):1208-1215 [FREE Full text] [CrossRef] [Medline]
  42. Ccsinsight. Smartwatches and smart bands dominate fast-growing wearables market internet   URL: http:/​/www.​ccsinsight.com/​press/​company-news/​1944-smartwatches-and-smart-bands-dominate-fast-growingwearables-market [accessed 2017-04-26] [WebCite Cache]
  43. Campbell JI, Eyal N, Musiimenta A, Haberer JE. Ethical questions in medical electronic adherence monitoring. J Gen Intern Med 2016 Mar;31(3):338-342 [FREE Full text] [CrossRef] [Medline]
  44. Wesolowski A, Eagle N, Noor AM, Snow RW, Buckee CO. Heterogeneous mobile phone ownership and usage patterns in Kenya. PLoS One 2012;7(4):e35319 [FREE Full text] [CrossRef] [Medline]
  45. Siedner MJ, Santorino D, Haberer JE, Bangsberg DR. Know your audience: predictors of success for a patient-centered texting app to augment linkage to HIV care in rural Uganda. J Med Internet Res 2015;17(3):e78 [FREE Full text] [CrossRef] [Medline]
  46. Ware NC, Pisarski EE, Tam M, Wyatt MA, Atukunda E, Musiimenta A, et al. The Meanings in the messages: how SMS reminders and real-time adherence monitoring improve antiretroviral therapy adherence in rural Uganda. AIDS 2016 May 15;30(8):1287-1294 [FREE Full text] [CrossRef] [Medline]
  47. Bachman Desilva M, Gifford AL, Keyi X, Li Z, Feng C, Brooks M, et al. Feasibility and acceptability of a real-time adherence device among HIV-positive IDU patients in China. AIDS Res Treat 2013;2013:957862 [FREE Full text] [CrossRef] [Medline]
  48. Pisarski E. IAPAC. 2015. Experiences of wisepill-facilitated HIV disclosure in Rural Southwestern Uganda internet   URL: http://www.iapac.org/AdherenceConference/assets/Adherence2015_Program.pdf [accessed 2017-04-26] [WebCite Cache]
  49. Nelson DE, Dong Q, Van der Pol B, Toh E, Fan B, Katz BP, et al. Bacterial communities of the coronal sulcus and distal urethra of adolescent males. PLoS One 2012;7(5):e36298 [FREE Full text] [CrossRef] [Medline]
  50. Weihs M, Meyer-Weitz A. A lottery incentive system to facilitate dialogue and social support for workplace HIV counselling and testing: a qualitative inquiry. SAHARA J 2014;11:116-125. [CrossRef] [Medline]
  51. Kahneman D, Tversky A. Prospect theory: an analysis of decision under risk. Econometrica 1979 Mar;47(2):263. [CrossRef]
  52. Imtiaz Ahmed Qatzi. AppLock developer website internet   URL: http://imtiazqazi.com/ [accessed 2017-04-26] [WebCite Cache]
  53. OpenSignal. OpenSignal internet   URL: https://opensignal.com/reports/2017/02/global-state-of-the-mobile-network/ [WebCite Cache]


AIDS: acquired immune deficiency syndrome
HIV: human immunodeficiency virus
JMIR: Journal of Medical Internet Research
LAN: local area network
PIN: personal identification number
RCT: randomized controlled trial
SMS: short message service
USSD: unstructured supplementary service data


Edited by A Keepanasseril; submitted 15.02.17; peer-reviewed by I Montagni, J Zhang; comments to author 09.03.17; revised version received 26.04.17; accepted 29.04.17; published 31.07.17

Copyright

©Jessica Andriesen, Sheana Bull, Janan Dietrich, Jessica E Haberer, Barbara Van Der Pol, Yegor Voronin, Kristin M Wall, Christopher Whalen, Frances Priddy. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 31.07.2017.

This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.