Skip to main content
. 2019 Mar 16;36(5):997–1010. doi: 10.1007/s12325-019-00920-x

Fig. 2.

Fig. 2

Process of conducting the interviews using the secure mobile application