To see the other types of publications on this topic, follow the link: Primary User Privacy.

Journal articles on the topic 'Primary User Privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Primary User Privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Clark, Matthew, and Konstantinos Psounis. "Optimizing Primary User Privacy in Spectrum Sharing Systems." IEEE/ACM Transactions on Networking 28, no. 2 (April 2020): 533–46. http://dx.doi.org/10.1109/tnet.2020.2967776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jagwani, Priti, and Saroj Kaushik. "Entropy-Based Quantification of Privacy Attained Through User Profile Similarity." International Journal of Information Security and Privacy 15, no. 3 (July 2021): 19–32. http://dx.doi.org/10.4018/ijisp.2021070102.

Full text
Abstract:
Location-based services refer to services that use location as primary input. But accessing user's location by an adversary invites issues of privacy breach. Instead of specific location coordinates, its surrounding area known as cloaking region is revealed in order to get the service. K anonymity technique of location privacy ensures that at least K-1 users should be included within a specific cloaked region. Researches have established that on combining K anonymity with the idea of including similar users together in a cloaked region provides stringent privacy (especially from background and heterogeneity attacks). This work quantifies the amount of privacy gain attained through, opting-for users with similar profiles instead of random users. The quantification is done by using KL divergence. Values of KL divergence of user profiles have been calculated for different cloaking regions containing similar and random users. Low KL divergence values depict privacy gains up to 33% for users with similar profiles.
APA, Harvard, Vancouver, ISO, and other styles
3

Ullah, Mohib, Muhammad Arshad Islam, Rafiullah Khan, Muhammad Aleem, and Muhammad Azhar Iqbal. "ObSecure Logging (OSLo): A Framework to Protect and Evaluate the Web Search Privacy in Health Care Domain." Journal of Medical Imaging and Health Informatics 9, no. 6 (August 1, 2019): 1181–90. http://dx.doi.org/10.1166/jmihi.2019.2708.

Full text
Abstract:
Users around the world send queries to the Web Search Engine (WSE) to retrieve data from the Internet. Users usually take primary assistance relating to medical information from WSE via search queries. The search queries relating to diseases and treatment is contemplated to be the most personal facts about the user. The search queries often contain identifiable information that can be linked back to the originator, which can compromise the privacy of a user. In this work, we are proposing a distributed privacy-preserving protocol (OSLo) that eliminates limitation in the existing distributed privacy-preserving protocols and a framework, which evaluates the privacy of a user. The OSLo framework asses the local privacy relative to the group of users involved in forwarding query to the WSE and the profile privacy against the profiling of WSE. The privacy analysis shows that the local privacy of a user directly depends on the size of the group and inversely on the number of compromised users. We have performed experiments to evaluate the profile privacy of a user using a privacy metric Profile Exposure Level. The OSLo is simulated with a subset of 1000 users of the AOL query log. The results show that OSLo performs better than the benchmark privacy-preserving protocol on the basis of privacy and delay. Additionally, results depict that the privacy of a user depends on the size of the group.
APA, Harvard, Vancouver, ISO, and other styles
4

Jaiswal, Mimansa, and Emily Mower Provost. "Privacy Enhanced Multimodal Neural Representations for Emotion Recognition." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (April 3, 2020): 7985–93. http://dx.doi.org/10.1609/aaai.v34i05.6307.

Full text
Abstract:
Many mobile applications and virtual conversational agents now aim to recognize and adapt to emotions. To enable this, data are transmitted from users' devices and stored on central servers. Yet, these data contain sensitive information that could be used by mobile applications without user's consent or, maliciously, by an eavesdropping adversary. In this work, we show how multimodal representations trained for a primary task, here emotion recognition, can unintentionally leak demographic information, which could override a selected opt-out option by the user. We analyze how this leakage differs in representations obtained from textual, acoustic, and multimodal data. We use an adversarial learning paradigm to unlearn the private information present in a representation and investigate the effect of varying the strength of the adversarial component on the primary task and on the privacy metric, defined here as the inability of an attacker to predict specific demographic information. We evaluate this paradigm on multiple datasets and show that we can improve the privacy metric while not significantly impacting the performance on the primary task. To the best of our knowledge, this is the first work to analyze how the privacy metric differs across modalities and how multiple privacy concerns can be tackled while still maintaining performance on emotion recognition.
APA, Harvard, Vancouver, ISO, and other styles
5

AlMarzooqi, Fatima Mohamed, Immanuel Azaad Moonesar, and Raeda AlQutob. "Healthcare Professional and User Perceptions of eHealth Data and Record Privacy in Dubai." Information 11, no. 9 (August 28, 2020): 415. http://dx.doi.org/10.3390/info11090415.

Full text
Abstract:
Introduction: Dubai city made a significant leap forward, which aligns with the vision of leadership, in the region’s eHealth services by adopting a unified electronic medical record system across the country. Electronic medical records provide a better, more efficient standard of care and a vital database that will streamline the administrative process and promote better outcomes with less utilization of resources. Medical records form an essential part in patient management and include a variety of patient data information that might be sensitive. Therefore, the primary challenge is to maintain data privacy of the electronic medical records. Objective: Current studies to measure the user and health provider perceptions of electronic medical records data privacy are limited in the region. We aimed to investigate the perceptions of healthcare professionals and healthcare users toward electronic medical records and data privacy in eHealthcare facilities in Dubai. Methods: In this quantitative descriptive study, we explored the perceptions towards electronic medical records and data privacy using an online survey as a data collection tool. The dependent variables were the user and provider perceptions, while the independent variables included gender, nationality, income and age. A random sample of 201 eHealthcare facilities professionals and users was included. Results: The findings of the study revealed that most healthcare professionals and users agreed on the presence of good eHealth data protection practices and privacy principles in Dubai. There was a statistical correlation between the surveyed privacy practice perceptions and gender, nationality and income. However, age had no statistically significant association. Conclusions: These research findings can influence policymakers and stakeholders when developing electronic medical records and data privacy policies and guidelines across the United Arab Emirates’ healthcare facilities, in particular, during the implementation of unified electronic medical records. Future research could investigate the effect of the specific demographic variables on the perception of privacy among eHealthcare facility users that might influence electronic medical records and data privacy.
APA, Harvard, Vancouver, ISO, and other styles
6

S. Jahromi, Mohammad N., Pau Buch-Cardona, Egils Avots, Kamal Nasrollahi, Sergio Escalera, Thomas B. Moeslund, and Gholamreza Anbarjafari. "Privacy-Constrained Biometric System for Non-Cooperative Users." Entropy 21, no. 11 (October 24, 2019): 1033. http://dx.doi.org/10.3390/e21111033.

Full text
Abstract:
With the consolidation of the new data protection regulation paradigm for each individual within the European Union (EU), major biometric technologies are now confronted with many concerns related to user privacy in biometric deployments. When individual biometrics are disclosed, the sensitive information about his/her personal data such as financial or health are at high risk of being misused or compromised. This issue can be escalated considerably over scenarios of non-cooperative users, such as elderly people residing in care homes, with their inability to interact conveniently and securely with the biometric system. The primary goal of this study is to design a novel database to investigate the problem of automatic people recognition under privacy constraints. To do so, the collected data-set contains the subject’s hand and foot traits and excludes the face biometrics of individuals in order to protect their privacy. We carried out extensive simulations using different baseline methods, including deep learning. Simulation results show that, with the spatial features extracted from the subject sequence in both individual hand or foot videos, state-of-the-art deep models provide promising recognition performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Ghosh, Isha, and Vivek Singh. "Phones, privacy, and predictions." Online Information Review 44, no. 2 (October 23, 2018): 483–502. http://dx.doi.org/10.1108/oir-03-2018-0112.

Full text
Abstract:
Purpose Mobile phones have become one of the most favored devices to maintain social connections as well as logging digital information about personal lives. The privacy of the metadata being generated in this process has been a topic of intense debate over the last few years, but most of the debate has been focused on stonewalling such data. At the same time, such metadata is already being used to automatically infer a user’s preferences for commercial products, media, or political agencies. The purpose of this paper is to understand the predictive power of phone usage features on individual privacy attitudes. Design/methodology/approach The present study uses a mixed-method approach, involving analysis of mobile phone metadata, self-reported survey on privacy attitudes and semi-structured interviews. This paper analyzes the interconnections between user’s social and behavioral data as obtained via their phone with their self-reported privacy attitudes and interprets them based on the semi-structured interviews. Findings The findings from the study suggest that an analysis of mobile phone metadata reveals vital clues to a person’s privacy attitudes. This study finds that multiple phone signals have significant predictive power on an individual’s privacy attitudes. The results motivate a newer direction of automatically inferring a user’s privacy attitudes by leveraging their phone usage information. Practical implications An ability to automatically infer a user’s privacy attitudes could allow users to utilize their own phone metadata to get automatic recommendations for privacy settings appropriate for them. This study offers information scientists, government agencies and mobile app developers, an understanding of user privacy needs, helping them create apps that take these traits into account. Originality/value The primary value of this paper lies in providing a better understanding of the predictive power of phone usage features on individual privacy attitudes.
APA, Harvard, Vancouver, ISO, and other styles
8

Deni Ardiansyah and Lies Handrijaningsih. "The Impact Of E-Service Quality To Wards Customre Satisfaction On The User Of Internet Banking In PT. Bank Rakyat Indonesia Tbk (Persero)." International Journal of Science, Technology & Management 2, no. 4 (July 25, 2021): 1415–22. http://dx.doi.org/10.46729/ijstm.v2i4.254.

Full text
Abstract:
This research aims to analyze the impact of electronic service quality which consists of efficiency, fulfillment, reliability, privacy, responsiveness, contact, and compensation towards the customer satisfaction on the user of internet banking in PT Bank Rakyat Indonesia, Persero. Customer satisfaction is an urgent matter in banking and is one of the company duty to create that satisfaction out of every single service provided. The sample used in this research are respondents which are customers who use internet banking service from BRI. The data used in this research is primary data collected by conducting online questionnaires to 150 respondents. Analyzing technique used is validity, reliability, classical assumption, multiple linear regression, t, F, and the coefficient of determination test. The result shows that simultaneously, electronic service quality which consists of efficiency, fulfillment, reliability, privacy, responsiveness, contact, and compensation do have an impact towards customer satisfaction on the user of internet banking service of BRI. The finding on partial test shows that efficiency, fulfillment, contact and compensation has an impact towards customer satisfaction whereas reliability, privacy, and responsiveness do not.
APA, Harvard, Vancouver, ISO, and other styles
9

Cohn, Ellen R., and Jana Cason. "Editors' Note." International Journal of Telerehabilitation 9, no. 1 (June 29, 2017): 1–2. http://dx.doi.org/10.5195/ijt.2017.6221.

Full text
Abstract:
The current issue of the International Journal of Telerehabilitation (IJT) contains original work that explores the feasibility of telerehabilitation for a diversity of purposes: a health and wellness program for caregivers; a phonological awareness program for children with hearing loss; telepractice in a school setting for at-risk youth; occupational therapy home visits employing mHealth to facilitate discharge from the acute admission back to the community, and speech and language intervention for primary school-aged children. The issue’s lead article, “Privacy and Security in Multi-User Health Kiosks” offers an audit protocol that can be used to assess whether a multi-user health kiosk is meeting privacy and security regulations such as HIPAA and HITECH.
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Dhruti P., and Devesh C. Jinwala. "Aggregate Searchable Encryption With Result Privacy." International Journal of Information Security and Privacy 14, no. 2 (April 2020): 62–82. http://dx.doi.org/10.4018/ijisp.2020040104.

Full text
Abstract:
With searchable encryption (SE), the user is allowed to extract partial data from stored ciphertexts from the storage server, based on a chosen query of keywords. A majority of the existing SE schemes support SQL search query, i.e. 'Select * where (list of keywords).' However, applications for encrypted data analysis often need to count data matched with a query, instead of data extraction. For such applications, the execution of SQL aggregate query, i.e. 'Count * where (list of keywords)' at server is essential. Additionally, in case of semi-honest server, privacy of aggregate result is of primary concern. In this article, the authors propose an aggregate searchable encryption with result privacy (ASE-RP) that includes ASearch() algorithm. The proposed ASearch() performs aggregate operation (i.e. Count *) on the implicitly searched ciphertexts (for the conjunctive query) and outputs an encrypted result. The server, due to encrypted form of aggregate result, would not be able to get actual count unless having a decryption key and hence ASearch() offers result privacy.
APA, Harvard, Vancouver, ISO, and other styles
11

Brandtzaeg, Petter Bae, Antoine Pultier, and Gro Mette Moen. "Losing Control to Data-Hungry Apps: A Mixed-Methods Approach to Mobile App Privacy." Social Science Computer Review 37, no. 4 (May 31, 2018): 466–88. http://dx.doi.org/10.1177/0894439318777706.

Full text
Abstract:
Personal data from mobile apps are increasingly impacting users’ lives and privacy perceptions. However, there is a scarcity of research addressing the combination of (1) individual perceptions of mobile app privacy, (2) actual dataflows in apps, and (3) how such perceptions and dataflows relate to actual privacy policies and terms of use in mobile apps. To address these limitations, we conducted an innovative mixed-methods study including a representative user survey in Norway, an analysis of personal dataflows in apps, and content analysis of privacy policies of 21 popular, free Android mobile apps. Our findings show that more than half the respondents in the user survey repeatedly had refrained from downloading or using apps to avoid sharing personal data. Our analysis of dataflows applied a novel methodology measuring activity in the apps over time (48 hr). The investigation showed that 19 of the 21 apps investigated transmitted personal data to a total of approximately 600 different primary and third-party domains. From an European perspective, it is particularly noteworthy that most of these domains were associated with tech companies in the United States, where privacy laws are less strict than companies operating from Europe. The investigation further revealed that some apps by default track and share user data continuously, even when the app is not in use. For some of these, the terms of use provided with the apps did not inform the users about the actual tracking practice. A comparison of terms of use as provided in the studied apps with actual person dataflows as identified in the analysis disclosed that three of the apps shared data in violation with their provided terms of use. A possible solution for the mobile app industry, to strengthen user trust, is privacy by design through opt-in data sharing with the service and third parties and more granular information on personal data sharing practices. Also, based on the findings from this study, we suggest specific visualizations to enhance transparency of personal dataflows in mobile apps. A methodological contribution is that a mixed-methods approach strengthens our understanding of the complexity of privacy issues in mobile apps.
APA, Harvard, Vancouver, ISO, and other styles
12

Chiasson, Sonia, Heather Crawford, Serge Egelman, and Pourang Irani. "Reflections on U-PriSM 2." International Journal of Mobile Human Computer Interaction 6, no. 2 (April 2014): 73–78. http://dx.doi.org/10.4018/ijmhci.2014040106.

Full text
Abstract:
The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI'13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or even novice users, regularly making important decisions while their main focus is on other primary tasks. This is especially true for mobile devices where users can quickly and easily install apps, where user interfaces are minimal due to space constraints, and where users are often distracted by their environment. Likewise, mobile devices present unique privacy and security risks because they allow third-party applications access to personal information and sensor data. The amount and sensitivity of such personally identifying information is likely to increase as device functionality increases. The convergence of these factors means that improvements to security and privacy provisions on mobile devices are becoming increasingly important. Workshop participants had a chance to explore mobile device usage and the unique usable security and privacy challenges that arise, discuss proposed systems and ideas that address these needs, and work towards the development of design principles to inform future development in the area.
APA, Harvard, Vancouver, ISO, and other styles
13

Et. al., Sarita Motghare,. "IMPLEMENTATION OF PRIVACY PRESERVING AND DYNAMIC SEARCHING MECHANISM WITH BIOMETRIC AUTHENTICATION IN CLOUD STORAGE." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (April 10, 2021): 894–912. http://dx.doi.org/10.17762/itii.v9i2.427.

Full text
Abstract:
In the recent times, cloud storage tends to be a primary storage means for external data. Cloud defense of the data against attacks is the main challenge. Private or semi-private information growth has rapidly expanded over the information network; privacy safeguards have failed to address the search mechanisms. In the field of information networks, privacy protection is an important factor in carrying out various data mining operations with encrypted data stored in different storage systems. A tolerance and protection against data corruption mechanism should be developed which is difficult to achieve. Furthermore, as there is no adequate audit mechanism, the integrity of the stored data become questionable. In addition to this, the user authentication is another challenge. The current solution provides only a remote audit mechanism. It requires data owners to always remain online so that the auditing process is manually handled, which is sometimes unworkable. In this paper, we propose a new, regenerative, public audit methodology accompanied by third-party audits. The existing data search system provides one solution that can be used to maintain the confidentiality of indexing. Documents are stored on a private server in plain word form, which compromise the protection of privacy. So that this system is improved to make the document more secure and efficient, we first store the documents in encrypted form on server, and use the Key Distribution Center (KDC). To generate keys the KDC uses the user's biometric feature. In order to improve the search experience, we also implement TF-IDF, which provides an efficient evaluation of the results. Lastly, we carry out comprehensive data set experiments to evaluate our proposed system performance. Experimental results demonstrate that in terms of safeguarding the privacy, efficient and safe search for encrypted distributed documents the proposed system is better than existing. The methodology suggested also includes an auditing mechanism by third parties to ensure data integrity.
APA, Harvard, Vancouver, ISO, and other styles
14

West, Sarah Myers. "Data Capitalism: Redefining the Logics of Surveillance and Privacy." Business & Society 58, no. 1 (July 5, 2017): 20–41. http://dx.doi.org/10.1177/0007650317718185.

Full text
Abstract:
This article provides a history of private sector tracking technologies, examining how the advent of commercial surveillance centered around a logic of data capitalism. Data capitalism is a system in which the commoditization of our data enables an asymmetric redistribution of power that is weighted toward the actors who have access and the capability to make sense of information. It is enacted through capitalism and justified by the association of networked technologies with the political and social benefits of online community, drawing upon narratives that foreground the social and political benefits of networked technologies. I examine its origins in the wake of the dotcom bubble, when technology makers sought to develop a new business model to support online commerce. By leveraging user data for advertising purposes, they contributed to an information environment in which every action leaves behind traces collected by companies for commercial purposes. Through analysis of primary source materials produced by technology makers, journalists, and business analysts, I examine the emergence of data capitalism between the mid-1990s and mid-2000s and its central role in the contemporary information economy.
APA, Harvard, Vancouver, ISO, and other styles
15

Hailemeskal, Meklit Berhan, Yuliia Sereda, Alisher Latypov, Tetiana Kiriazova, and Nata Avaliani. "Perceived quality of HIV care and client satisfaction across different service providers in Ukraine." European Journal of Public Health 30, no. 1 (July 3, 2019): 23–30. http://dx.doi.org/10.1093/eurpub/ckz124.

Full text
Abstract:
Abstract Background Prior studies have shown that high client satisfaction and quality of services are important drivers of uptake and retention in human immunodeficiency virus (HIV) care. Study objectives were to assess the perceived quality of HIV services, satisfaction and associated factors across different types of health facilities in Ukraine. Methods We conducted a cross-sectional study among 649 individuals receiving HIV services across 47 health facilities in three regions of Ukraine. Primary outcomes were satisfaction and perceived quality of services measured along five dimensions: accessibility, user-friendliness, privacy and confidentiality, comprehensiveness (separately for testing and treatment services). Quality dimensions were constructed by confirmatory factor analysis. Links between quality dimensions, satisfaction and related factors were measured by structural equation modelling. Results Median scores for accessibility, user-friendliness, privacy and confidentiality, comprehensiveness of services and overall satisfaction ranged from 0.75 to 1 out of 1. User-friendliness was the main determinant associated with satisfaction (total effect: β = 0.515, P < 0.001). Satisfaction was higher at primary healthcare centres (direct effect: β = 0.145, P < 0.001; indirect effect through accessibility: β = 0.060, P < 0.001), narcological/tuberculosis dispensaries (direct effect: β = 0.105, P = 0.006; indirect effect through accessibility: β = 0.060, P < 0.001) and hospitals (indirect effects through user-friendliness and accessibility: β = 0.180, P < 0.001) when compared to acquired immune deficiency syndrome centres. Conclusions User-friendliness is a key driver of client satisfaction with HIV services in Ukraine. Decentralization of services, together with improved training and supervision for provider–client interactions may provide important levers to improve client satisfaction with HIV services and enrolment and retention in the cascade of HIV services.
APA, Harvard, Vancouver, ISO, and other styles
16

Hernández-Ramírez, Rodrigo. "On False Augmented Agency and What Surveillance Capitalism and User-Centered Design Have to Do With It." Journal of Science and Technology of the Arts 11, no. 2 (December 29, 2019): 18–27. http://dx.doi.org/10.7559/citarj.v11i2.667.

Full text
Abstract:
In the last years, there has been a surge in AI-powered products. Often marketed as "free", these services operate as hooks to lure unsuspecting users into voluntarily giving up data about every aspect of their life. Their data is the primary fuel of surveillance capitalism, a new economic system that exclusively benefits so-called Big Tech organisations at the expense of personal privacy and freedom of choice. This paper argues the ways these AI-powered products are being imagined and designed is further generalising a kind of, "enframing" that encourages a bureaucratic relationship with the world disguised as (a false sense of) augmented agency. This paper shows that technologically informed philosophical reflections can contribute to getting ourselves back into the feedback loop of technological mediation by helping us recognise our "becoming" with technologies as a design process.
APA, Harvard, Vancouver, ISO, and other styles
17

Caplan, Susan, Angelina Sosa Lovera, Esther Veloz Comas, and Jonas Attilus. "A Mobile App to Prevent Depression Among Low-Income Primary Care Patients in the Dominican Republic: Sociocultural Adaptations." Journal of Transcultural Nursing 31, no. 4 (March 19, 2020): 413–24. http://dx.doi.org/10.1177/1043659620912315.

Full text
Abstract:
Introduction: Mental health mobile apps (MHapps) can provide depression treatment to people worldwide who do not have access to care, but few apps are culturally targeted to the population. In this series of studies, we described sociocultural considerations of MHapp development, and we explored participants’ perceptions of acceptability, usability, and cultural relevance of the MHapp. Method: Individual interviews were conducted in three separate primary care sites in the Dominican Republic among convenience samples of staff and patients ( n = 23, 18, and 21, respectively), using mixed methods of data collection. Results: Modifications were made during the iterative design process to reflect user preferences, which included a female gendered voice, the addition of animations, and changes to the psychoeducational content. Discussion: Primary care patients reported strong interest in MHapps due to its convenience, privacy, and affordability. Our findings support the necessity of detailed examination of user preferences to develop culturally congruent MHapp psychoeducation.
APA, Harvard, Vancouver, ISO, and other styles
18

Praveen Kumar, K., and M. Anitha. "A survey on privacy preserving and content protecting location based queries." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 185. http://dx.doi.org/10.14419/ijet.v7i1.5.9144.

Full text
Abstract:
This paper presents a solution to one of the situation-based totally question problems. This downside is printed as follows: (i) a user desires to question a data of area records, referred to as factors Of interest (POI), and doesn't want to reveal his/her vicinity to the server way to privacy concerns; (ii) the proprietor of the state of affairs data, that is, the place server, would not wish to effortlessly distribute its statistics to any or all users. The scenario server needs to personal a few control over its data, since the data is its fine. A location based question resolution that employs 2 protocols that allows a person to privately verify and acquire vicinity statistics. The primary step is for a consumer to in private verify his/her region victimization oblivious switch on a public grid. Oblivious switch accustomed supply the goods a more secure resolution for every parties. the second one step involves a personal information retrieval interplay that retrieves the report with high communication performance. the answer this is gift is economical and realistic in numerous conditions. This paper consists of the effects of a operating example as an example the potency of our protocol.
APA, Harvard, Vancouver, ISO, and other styles
19

Cheishvili, Sophio. "The Development of and the Effect of Electronic Speaking Portfolios on Learners’ Academic Performance in English as a Foreign Language Classes in Primary School." Journal of Education in Black Sea Region 4, no. 1 (December 9, 2018): 53–66. http://dx.doi.org/10.31578/jebs.v4i1.154.

Full text
Abstract:
Technologies enhance interactivity amongst students and educators. It can be utilized as a tool for offering feedback or following learners’ progress. Another benefit of implementing educational technologies may comprise group or peer work. While dealing with implementing different technologies educators are supposed to take into consideration user-friendliness, user interface, speed, support and training. Although software programs and technology devices are not always easy to use. While applying educational technologies, teacher is supposed to make sure that it is assessable for students in the class. However, the issue of security and privacy should be taken into consideration while using technology in the class. Portfolios can be utilized for different purposes but the most important reasons are to demonstrate knowledge, present and reflect upon learners’ works.
APA, Harvard, Vancouver, ISO, and other styles
20

Hoang, Nguyen Phong, Arian Akhavan Niaki, Phillipa Gill, and Michalis Polychronakis. "Domain name encryption is not enough: privacy leakage via IP-based website fingerprinting." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (July 23, 2021): 420–40. http://dx.doi.org/10.2478/popets-2021-0078.

Full text
Abstract:
Abstract Although the security benefits of domain name encryption technologies such as DNS over TLS (DoT), DNS over HTTPS (DoH), and Encrypted Client Hello (ECH) are clear, their positive impact on user privacy is weakened by—the still exposed—IP address information. However, content delivery networks, DNS-based load balancing, co-hosting of different websites on the same server, and IP address churn, all contribute towards making domain–IP mappings unstable, and prevent straightforward IP-based browsing tracking. In this paper, we show that this instability is not a roadblock (assuming a universal DoT/DoH and ECH deployment), by introducing an IP-based website finger-printing technique that allows a network-level observer to identify at scale the website a user visits. Our technique exploits the complex structure of most websites, which load resources from several domains besides their primary one. Using the generated fingerprints of more than 200K websites studied, we could successfully identify 84% of them when observing solely destination IP addresses. The accuracy rate increases to 92% for popular websites, and 95% for popular and sensitive web-sites. We also evaluated the robustness of the generated fingerprints over time, and demonstrate that they are still effective at successfully identifying about 70% of the tested websites after two months. We conclude by discussing strategies for website owners and hosting providers towards hindering IP-based website fingerprinting and maximizing the privacy benefits offered by DoT/DoH and ECH.
APA, Harvard, Vancouver, ISO, and other styles
21

Mirshekari, Abbas, Ramin Ghasemi, and Alireza Fattahi. "DIGITAL ACCOUNTS AFTER DEATH: A CASE STUDY IN IRAN LAW." UUM Journal of Legal Studies 11 (July 31, 2020): 153–82. http://dx.doi.org/10.32890/uumjls.11.2.2020.7505.

Full text
Abstract:
In recent times, cyberspace is being widely used so that everyone has a digital account. It naturally entails its own legal issues. Undoubtedly, one of the main issues is that what fate awaits the account and its content upon the account holder’s death? This issue has been neglected not only by the primary creators of digital accounts but also by many legal systems in the world, including Iran. To answer this question, we first need to distinguish between the account and the information contained therein. The account belongs to the company that creates it and allows the user to use it only. Hence, following the death of the account holder, the account will be lost but the information will remain because it was created by him/her and thus belongs to him/her. However, does this mean that the information will be inherited by the user’s heirs after his/her death? Can the user exercise his/her right to transfer account content to a devisee through a testament? Comparing digital information with corporeal property, some commentators believe that the property will be inherited like corporeal property. This is a wrong deduction because the corporeal property can disclose the privacy of the owner and third parties less than the one in cyberspace. This paper aims to show what happens to a digital account after its user passes away and examine the subject using the content analysis method in various legal systems in the world, especially in Iran as a case study. The required information is collected from law books, articles, doctrines, case laws, and relevant laws and regulations of different countries. To protect the privacy interests of the deceased and others, it is concluded that the financially valuable information published by the account holder before his/her death can be transferred to successors. As a rule, the information that may violate privacy by divulging should be removed. However, given that this information may be a valuable source in the future to know about the present, legislators are suggested to make digital information, which may no longer lead to the invasion of the decedent’s privacy, available to the public after a long time.
APA, Harvard, Vancouver, ISO, and other styles
22

Shrestha, Ajay K., Julita Vassileva, Sandhya Joshi, and Jennifer Just. "Augmenting the technology acceptance model with trust model for the initial adoption of a blockchain-based system." PeerJ Computer Science 7 (May 21, 2021): e502. http://dx.doi.org/10.7717/peerj-cs.502.

Full text
Abstract:
Background In the collaborative business environment, blockchain coupled with smart contract removes the reliance on a central system and offers data integrity which is crucial when the transacting parties rely on the shared data. The acceptance of such blockchain-based systems is necessary for the continued use of the services. Despite many extensive studies evaluating the performance of blockchain-based systems, few have focused on users’ acceptance of real-life applications. Objective The main objective of this research is to evaluate the user acceptance of a real-life blockchain-based system (BBS) by observing various latent variables affecting the development of users’ attitudes and intention to use the system. It also aims to uncover the dimensions and role of trust, security and privacy alongside the primary Technology Acceptance Model (TAM)-based predictors and their causal relationship with the users’ behavior to adopt such BBS. Methods We tested the augmented TAM with Trust Model on a BBS that comprises two subsystems: a Shopping Cart System (SCS), a system oriented towards end-users and a Data Sharing System (DSS), a system oriented towards system administrators. We set research questions and hypotheses, and conducted online surveys by requesting each participant to respond to the questionnaire after using the respective system. The main study comprises two separate sub-studies: the first study was performed on SCS and the second on DSS. Furthermore, each study data comprises initial pre-test and post-test data scores. We analyzed the research model with partial least square structural equation modelling. Results The empirical study validates our research model and supports most of the research hypotheses. Based on our findings, we deduce that TAM-based predictors and trust constructs cannot be applied uniformly to BBS. Depending on the specifics of the BBS, the relationships between perceived trust antecedents and attitudes towards the system might change. For SCS, trust is the strongest determinant of attitudes towards system, while DSS has perceived privacy as the strongest determinant of attitudes towards system. Quality of system shows the strongest total effect on intention to use SCS, while perceived usefulness has the strongest total effect on intention to use DSS. Trust has a positive significant effect on users’ attitudes towards both BSS, while security does not have any significant effect on users’ attitudes toward BBS. In SCS, privacy positively affects trust, but security has no significant effect on trust, whereas, in DSS, both privacy and security have significant effects on trust. In both BBS, trust has a moderating effect on privacy that correlates with attitudes towards BBS, whereas security does not have any mediating role between privacy and attitudes towards BBS. Hence, we recommend that while developing BBS, particular attention should be paid to increasing user trust and perceived privacy.
APA, Harvard, Vancouver, ISO, and other styles
23

Denham, Megan E., Yousef Bushehri, and Lisa Lim. "Through the Eyes of the User: Evaluating Neonatal Intensive Care Unit Design." HERD: Health Environments Research & Design Journal 11, no. 3 (March 4, 2018): 49–65. http://dx.doi.org/10.1177/1937586718761017.

Full text
Abstract:
Objective: This article presents a pilot study that employed a user-centered methodology for evaluating and quantifying neonatal intensive care unit (NICU) designs based on the needs of the primary users. Background: The design of NICUs has begun to shift from open-bay to single-family rooms. Both designs present unique advantages and challenges that impact babies, families, and caregivers. Methods: One NICU design was analyzed using the functional scenario (FS) analysis method. For the FS, users’ needs were determined through literature review, interviews with NICU providers and parents, and a review of published design guidelines. Quantitative metrics were developed for each FS, so that characteristics of the NICU design could be analyzed to determine how successful they were in meeting the users’ needs. The results were graphically represented to visualize the success and considerations of the design. Results: A total of 23 FSs and 61 spatial metrics were developed. FSs for babies focused on infection prevention, minimizing exposure to environmental stimuli, and supporting enriching care activities. FSs for family members focused on direct access to the baby, and privacy and adequate space for daily activities. FSs for providers and caregivers focused on infection prevention, care activities, care zones, and visibility. Conclusion: Using an FS approach highlights design characteristics in the NICU that need to be addressed during the design process to more successfully meet the needs of the different users. Additionally, using this approach can inform design professionals’ decision-making by presenting them with the design characteristics that impact the needs of the user groups.
APA, Harvard, Vancouver, ISO, and other styles
24

Durresi, Arjan, Mimoza Durresi, and Leonard Barolli. "Secure Authentication in Heterogeneous Wireless Networks." Mobile Information Systems 4, no. 2 (2008): 119–30. http://dx.doi.org/10.1155/2008/135848.

Full text
Abstract:
The convergence of cellular and IP technologies has pushed the integration of 3G and WLAN networks to the forefront. Gaining secure access to 3G services from 802.11 WLANs is a primary challenge for this new integrated wireless technology. Successful execution of 3G security algorithms can be limited to a specified area by encrypting a user's authentication challenge with spatial data defining his visited WLAN. With limited capacity to determine a user's location only to within a current cell and restrictions on accessing users' location due to privacy, 3G operators must rely on spatial data sent from visited WLANs to implement spatial authentication control. A potential risk is presented to 3G operators since no prior relationship or trust may exist with a WLAN owner. Algorithms to quantify the trust between all parties of 3G-WLAN integrated networks are presented to further secure user authentication. Ad-hoc serving networks and the trust relationships established between mobile users are explored to define stronger algorithms for 3G – WLAN user authentication.
APA, Harvard, Vancouver, ISO, and other styles
25

Rossmaier, Leon. "Commercial Mhealth Apps and Exploitative Value Trade-Offs." Studia Universitatis Babeş-Bolyai Bioethica 66, Special Issue (September 9, 2021): 148. http://dx.doi.org/10.24193/subbbioethica.2021.spiss.98.

Full text
Abstract:
"Mobile health (mHealth) apps are becoming progressively important for primary care, disease prevention, and public health interventions. They promise to empower its users by offering them more independence, better access to health services, and more insight into their health status resulting in better informed medical decision-making and lifestyle changes. Disadvantages of mHealth apps often include a lack of privacy protection, a decrease in personal attachment, and the acceptance of a normative conception of health challenging the user’s self-determination. Privacy, attachment, and self-determination are, alongside health, linked to fundamental dimensions of human well-being. Users of mHealth apps can either accept those disadvantages or abstain from using this technology entirely. Users, therefore, have to trade-off fundamental dimensions of well-being to gain a certain health benefit if they want to use commercial mHealth apps. This presentation will clarify the values most relevant in this context, focusing on privacy, self-determination, and attachment. I claim that these values imply fundamental conditions of well-being that should not be undermined, especially in the context of health care. I will argue that the value trade-offs users must engage in are an instance of mutually advantageous agreements by which the provider of the app takes unfair advantage of the user. This renders such agreements exploitative. I will discuss the notion of exploitation that I think applies in this case and explain under what circumstances exploitative agreements that come with the use of commercial mHealth apps oppose the empowerment narrative. "
APA, Harvard, Vancouver, ISO, and other styles
26

Chandel, Sonali, Geng Yang, and Sumit Chakravarty. "RSA-CP-IDABE: A Secure Framework for Multi-User and Multi-Owner Cloud Environment." Information 11, no. 8 (July 29, 2020): 382. http://dx.doi.org/10.3390/info11080382.

Full text
Abstract:
Cloud has become one of the most widely used technologies to store data due to its availability, flexibility, and low cost. At the same time, the security, integrity, and privacy of data that needs to be stored on the cloud is the primary threat for cloud deployment. However, the increase in cloud utilization often results in the creation of a multi-user cloud environment, which requires its owners to manage and monitor the data more effectively. The security of information faces an additional threat, which is related to the increasing number of users and owners who deal with the data stored on the cloud. Many researchers have developed several frameworks and algorithms to address the security issues of the cloud environment. In the present work, a novel algorithm is proposed with the integration of Ciphertext Policy-Identity Attribute-based Encryption (CP-IDABE) and the Rivest–Shamir–Adelman (RSA) algorithm for securing the cloud. Both the owners and users are provided with the public and distinct secret keys that are generated by the Automated Certificate Authority (ACA). The attribute policy differentiates between the user and owner for accessing the cloud data. The proposed RSA-CP-IDABE algorithm also prevents the Man in the Middle (MITM) attack effectively. The performance of the proposed algorithm is evaluated for its time used for encryption, decryption, and execution for varying sizes of data. The obtained results are compared with the existing framework to show its effectiveness. The proposed algorithm can be enhanced with the revocation of privileges in the future.
APA, Harvard, Vancouver, ISO, and other styles
27

Parakh, Santosh, Prakash Ukhalkar, and Leena Sanu. "Digital Wallet and Mobile Banking Adoption Among Rural Bank Customer." International Research Journal of Business Studies 13, no. 3 (December 20, 2020): 215–26. http://dx.doi.org/10.21632/irjbs.13.3.215-226.

Full text
Abstract:
This study provides a rural viewpoint to the global research and literature on adoption of digital wallet and mobile banking among rural customer. It empirically examines the most influencing factors that stimulating to digital wallet and mobile banking user for service adoption. Primary and secondary data sources are used. A sample of 300 customers was surveyed from the rural areas of Maharashtra state, INDIA. A Simple Random Sampling method is used for selections of area from Maharashtra state and Chi-square testing was used in stated hypothesis. The study concludes that Security-Privacy, Trust and Familiarity has significant impact on Mobile banking adoption. And qualitative factors such has Prestige, Speed, Trust, Safety & Security, Easiness and Familiarity has major influence on rural customer for the adopting of Digital Wallet and Mobile banking services offered from financial institution.
APA, Harvard, Vancouver, ISO, and other styles
28

van Hoof, J., E. J. M. Wouters, H. R. Marston, B. Vanrumste, and R. A. Overdiep. "Ambient Assisted Living and Care in The Netherlands." International Journal of Ambient Computing and Intelligence 3, no. 4 (October 2011): 25–40. http://dx.doi.org/10.4018/jaci.2011100103.

Full text
Abstract:
Technology can assist older adults to remain living in the community. Within the realm of information and communication technologies, smart homes are drifting toward the concept of ambient assisted living (AAL). AAL-systems are more responsive to user needs and patterns of living, fostering physical activity for a healthier lifestyle, and capturing behaviours for prevention and future assistance. This study provides an overview of the design-requirements and expectations towards AAL-technologies that are formulated by the end-users, their relatives and health care workers, with a primary focus on health care in The Netherlands. The results concern the motivation for use of technology, requirements to the design, implementation, privacy and ethics. More research is required in terms of the actual needs of older users without dementia and their carers, and on AAL in general as some of the work included concerns less sophisticated smart home technology.
APA, Harvard, Vancouver, ISO, and other styles
29

Poss-Doering, Regina, Aline Kunz, Sabrina Pohlmann, Helene Hofmann, Marion Kiel, Eva C. Winkler, Dominik Ose, and Joachim Szecsenyi. "Utilizing a Prototype Patient-Controlled Electronic Health Record in Germany: Qualitative Analysis of User-Reported Perceptions and Perspectives." JMIR Formative Research 2, no. 2 (August 3, 2018): e10411. http://dx.doi.org/10.2196/10411.

Full text
Abstract:
Background Personal electronic health records (PHR) are considered instrumental in improving health care quality and efficiency, enhancing communication between all parties involved and strengthening the patient’s role. Technical architectures, data privacy, and applicability issues have been discussed for many years. Nevertheless, nationwide implementation of a PHR is still pending in Germany despite legal regulations provided by the eHealth Act passed in 2015. Within the information technology for patient-oriented care project funded by the Federal Ministry of Education and Research (2012-2017), a Web-based personal electronic health record prototype (PEPA) was developed enabling patient-controlled information exchange across different care settings. Gastrointestinal cancer patients and general practitioners utilized PEPA during a 3-month trial period. Both patients and physicians authorized by them could view PEPA content online and upload or download files. Objective This paper aims to outline findings of the posttrial qualitative study carried out to evaluate user-reported experiences, perceptions, and perspectives, focusing on their interpretation of PEPA beyond technical usability and views on a future nationwide implementation. Methods Data were collected through semistructured guide-based interviews with 11 patients and 3 physicians (N=14). Participants were asked to share experiences, views of perceived implications, and perspectives towards nationwide implementation. Further data were generated through free-text fields in a subsequent study-specific patient questionnaire and researcher’s notes. Data were pseudonymized, audiotaped, and transcribed verbatim. Content analysis was performed through the Framework Analysis approach. All qualitative data were systemized by using MAXQDA Analytics PRO 12 (Rel.12.3.1). Additionally, participant characteristics were analyzed descriptively using IBM SPSS Statistics Version 24. Results Users interpreted PEPA as a central medium containing digital chronological health-related documentation that simplifies information sharing across care settings. While patients consider the implementation of PEPA in Germany in the near future, physicians are more hesitant. Both groups believe in PEPA’s concept, but share awareness of concerns about data privacy and older or impaired people’s abilities to manage online records. Patients perceive benefits for involvement in treatment processes and continuity of care but worry about financing and the implementation of functionally reduced versions. Physicians consider integration into primary systems critical for interoperability but anticipate technical challenges, as well as resistance from older patients and colleagues. They omit clear positioning regarding PEPA’s potential incremental value for health care organizations or the provider-patient relationship. Conclusions Digitalization in German health care will continue to bring change, both organizational and in the physician-patient relationship. Patients endorse and expect a nationwide PEPA implementation, anticipating various benefits. Decision makers and providers need to contribute to closing modernization gaps by committing to new concepts and by invigorating transformed roles.
APA, Harvard, Vancouver, ISO, and other styles
30

Angeletti, Fabio, Ioannis Chatzigiannakis, and Andrea Vitaletti. "Towards an Architecture to Guarantee Both Data Privacy and Utility in the First Phases of Digital Clinical Trials." Sensors 18, no. 12 (November 28, 2018): 4175. http://dx.doi.org/10.3390/s18124175.

Full text
Abstract:
In the era of the Internet of Things (IoT), drug developers can potentially access a wealth of real-world, participant-generated data that enable better insights and streamlined clinical trial processes. Protection of confidential data is of primary interest when it comes to health data, as medical condition influences daily, professional, and social life. Current approaches in digital trials entail that private user data are provisioned to the trial investigator that is considered a trusted party. The aim of this paper is to present the technical requirements and the research challenges to secure the flow and control of personal data and to protect the interests of all the involved parties during the first phases of a clinical trial, namely the characterization of the potential patients and their possible recruitment. The proposed architecture will let the individuals keep their data private during these phases while providing a useful sketch of their data to the investigator. Proof-of-concept implementations are evaluated in terms of performances achieved in real-world environments.
APA, Harvard, Vancouver, ISO, and other styles
31

Fadrique, Laura X., Dia Rahman, Hélène Vaillancourt, Paul Boissonneault, Tania Donovska, and Plinio P. Morita. "Overview of Policies, Guidelines, and Standards for Active Assisted Living Data Exchange: Thematic Analysis." JMIR mHealth and uHealth 8, no. 6 (June 22, 2020): e15923. http://dx.doi.org/10.2196/15923.

Full text
Abstract:
Background A primary concern for governments and health care systems is the rapid growth of the aging population. To provide a better quality of life for the elderly, researchers have explored the use of wearables, sensors, actuators, and mobile health technologies. The term AAL can be referred to as active assisted living or ambient assisted living, with both sometimes used interchangeably. AAL technologies describes systems designed to improve the quality of life, aid in independence, and create healthier lifestyles for those who need assistance at any stage of their lives. Objective The aim of this study was to understand the standards and policy guidelines that companies use in the creation of AAL technologies and to highlight the gap between available technologies, standards, and policies and what should be available for use. Methods A literature review was conducted to identify critical standards and frameworks related to AAL. Interviews with 15 different stakeholders across Canada were carried out to complement this review. The results from interviews were coded using a thematic analysis and then presented in two workshops about standards, policies, and governance to identify future steps and opportunities regarding AAL. Results Our study showed that the base technology, standards, and policies necessary for the creation of AAL technology are not the primary problem causing disparity between existing and accessible technologies; instead nontechnical issues and integration between existing technologies present the most significant issue. A total of five themes have been identified for further analysis: (1) end user and purpose; (2) accessibility; (3) interoperability; (4) data sharing; and (5) privacy and security. Conclusions Interoperability is currently the biggest challenge for the future of data sharing related to AAL technology. Additionally, the majority of stakeholders consider privacy and security to be the main concerns related to data sharing in the AAL scope. Further research is necessary to explore each identified gap in detail.
APA, Harvard, Vancouver, ISO, and other styles
32

Helm, Jim E. "Distributed Internet voting architecture: A thin client approach to Internet voting." Journal of Information Technology 36, no. 2 (February 15, 2021): 128–53. http://dx.doi.org/10.1177/0268396220978983.

Full text
Abstract:
Principles required for secure electronic voting using the Internet are known and published. Although the Internet voting functionalities and technologies are well-defined, none of the existing state-sponsored Internet voting approaches in use incorporate a total Internet-based system approach that includes voter registration, the voting process, and vote counting. The distributed Internet voting architecture concept discussed in this article uses a novel thin client approach to Internet voting. The architecture uses existing technologies and knowledge to create a viable whole system approach to Internet voting. This article describes various aspects and processes necessary to support an integrated approach. The application programming interface software for many of the critical functions was developed in Python and functionality tested. A virtual network, including a cloud-based functionality, was created and used to evaluate the various conceptual aspects of the proposed architecture. This included the concepts associated with programming and accessing smart cards, capturing and saving fingerprint data, structuring virtual private networks using tunneling and Internet Protocol Security, encrypting ballots using asymmetric encryption, using symmetric encryption for secret cookies, thin client interaction, and creating hash functions to be used within a blockchain structure in a Merkle tree architecture. The systems’ primary user targets are individuals remotely located from their home voting precincts and senior citizens who have limited mobility and mostly reside in assisted living facilities. The research supports the contention that a cybersecure Internet voting system that significantly reduces the opportunity for mail-in voter fraud, helps to ensure privacy for the voter, including nonrepudiation, nonattribution, receipt freeness, and vote acknowledgment can be created using existing technology.
APA, Harvard, Vancouver, ISO, and other styles
33

Nadhamuni, Sunita, Oommen John, Mallari Kulkarni, Eshan Nanda, Sethuraman Venkatraman, Devesh Varma, Satchit Balsari, et al. "Driving digital transformation of comprehensive primary health services at scale in India: an enterprise architecture framework." BMJ Global Health 6, Suppl 5 (July 2021): e005242. http://dx.doi.org/10.1136/bmjgh-2021-005242.

Full text
Abstract:
In its commitment towards Sustainable Development Goals, India envisages comprehensive primary health services as a key pillar in achieving universal health coverage. Embedded in siloed vertical programmes, their lack of interoperability and standardisation limits sustainability and hence their benefits have not been realised yet. We propose an enterprise architecture framework that overcomes these challenges and outline a robust futuristic digital health infrastructure for delivery of efficient and effective comprehensive primary healthcare. Core principles of an enterprise platform architecture covering four platform levers to facilitate seamless service delivery, monitor programmatic performance and facilitate research in the context of primary healthcare are listed. A federated architecture supports the custom needs of states and health programmes through standardisation and decentralisation techniques. Interoperability design principles enable integration between disparate information technology systems to ensure continuum of care across referral pathways. A responsive data architecture meets high volume and quality requirements of data accessibility in compliance with regulatory requirements. Security and privacy by design underscore the importance of building trust through role-based access, strong user authentication mechanisms, robust data management practices and consent. The proposed framework will empower programme managers with a ready reference toolkit for designing, implementing and evaluating primary care platforms for large-scale deployment. In the context of health and wellness centres, building a responsive, resilient and reliable enterprise architecture would be a fundamental path towards strengthening health systems leveraging digital health interventions. An enterprise architecture for primary care is the foundational building block for an efficient national digital health ecosystem. As citizens take ownership of their health, futuristic digital infrastructure at the primary care level will determine the health-seeking behaviour and utilisation trajectory of the nation.
APA, Harvard, Vancouver, ISO, and other styles
34

Witzel, T. Charles, Andy Guise, Will Nutland, and Adam Bourne. "It Starts With Me: Privacy concerns and stigma in the evaluation of a Facebook health promotion intervention." Sexual Health 13, no. 3 (2016): 228. http://dx.doi.org/10.1071/sh15231.

Full text
Abstract:
Background As efforts continue to increase rates of HIV testing and condom use among at-risk communities in England, organisations have sought use social media for health promotion interventions. As part of a wider evaluation of It Starts With Me (ISWM), a sexual health promotion intervention in England targeting gay and bisexual men and African people through Facebook, this study sought to explore how the online environment shapes end user engagement with sexual health interventions. A primary objective was to explore how privacy concerns can act as a barrier to engagement for the audience of ISWM. Methods: A purposive sample of 40 individuals were recruited, who were targeted by the intervention for in-depth interviews. Data collection was in two phases. In the first phase, individuals were sampled based on engagement with online health interventions in general, while in the second phase, all individuals were sampled on the basis of engagement with the intervention. Results: Privacy concerns related to the ecology of social networking sites, issues with implied disclosure and discrimination, as well as uncertainty over control of data. These concerns limited the organic reach of the intervention by confining the intervention to those who already held the norms diffused through it, and by discouraging participants from sharing and commenting on content. Conclusions: Care should be taken to address concerns when designing interventions delivered through social media. Gated interventions may be more beneficial for marginalised communities, while large-scale interventions such as ISWM may provide a useful backdrop for face-to-face interventions.
APA, Harvard, Vancouver, ISO, and other styles
35

Kocaballi, Ahmet Baki, Shlomo Berkovsky, Juan C. Quiroz, Liliana Laranjo, Huong Ly Tong, Dana Rezazadegan, Agustina Briatore, and Enrico Coiera. "The Personalization of Conversational Agents in Health Care: Systematic Review." Journal of Medical Internet Research 21, no. 11 (November 7, 2019): e15360. http://dx.doi.org/10.2196/15360.

Full text
Abstract:
Background The personalization of conversational agents with natural language user interfaces is seeing increasing use in health care applications, shaping the content, structure, or purpose of the dialogue between humans and conversational agents. Objective The goal of this systematic review was to understand the ways in which personalization has been used with conversational agents in health care and characterize the methods of its implementation. Methods We searched on PubMed, Embase, CINAHL, PsycInfo, and ACM Digital Library using a predefined search strategy. The studies were included if they: (1) were primary research studies that focused on consumers, caregivers, or health care professionals; (2) involved a conversational agent with an unconstrained natural language interface; (3) tested the system with human subjects; and (4) implemented personalization features. Results The search found 1958 publications. After abstract and full-text screening, 13 studies were included in the review. Common examples of personalized content included feedback, daily health reports, alerts, warnings, and recommendations. The personalization features were implemented without a theoretical framework of customization and with limited evaluation of its impact. While conversational agents with personalization features were reported to improve user satisfaction, user engagement and dialogue quality, the role of personalization in improving health outcomes was not assessed directly. Conclusions Most of the studies in our review implemented the personalization features without theoretical or evidence-based support for them and did not leverage the recent developments in other domains of personalization. Future research could incorporate personalization as a distinct design factor with a more careful consideration of its impact on health outcomes and its implications on patient safety, privacy, and decision-making.
APA, Harvard, Vancouver, ISO, and other styles
36

Rizkyantha, Okky. "The Roles of Archive Institution on Indonesia Public Information Disclosure In Digital Era." Pustabiblia: Journal of Library and Information Science 1, no. 2 (February 27, 2018): 139. http://dx.doi.org/10.18326/pustabiblia.v1i2.139-154.

Full text
Abstract:
Disclosure of Public Information Policy is a form of government awareness regarding the importance of information in determining policy. Disclosure of this information is intended to provide openness for people to take part and supervise the government and institutional policy. Archives institution is known as one of the managers of information which has primary task is to store various important recordings to be used appropriately. This paper aims to analyze the role of archive institution in public information disclosure in Indonesia, and its conduct regarding it. To bridge the needs of the user and archival institutions, it must preset fast and efficient archive service. Act no. 43 of 2007 on Archive is one proof of the role of archive institutions in the digital era. Many laws govern the freedom of information of a person, in terms of security, privacy, and information dissemination. Electronic archive service It is expected to facilitate accesses, and it is also a form of the archive’s participation in the Public Information. Although in implementation, there are many issues that archives should face in opening access and disseminating information to the public.
APA, Harvard, Vancouver, ISO, and other styles
37

Rizkyantha, Okky. "The Roles of Archive Institution on Indonesia Public Information Disclosure In Digital Era." Pustabiblia: Journal of Library and Information Science 1, no. 2 (December 16, 2017): 19. http://dx.doi.org/10.18326/pustabiblia.v1i2.19-34.

Full text
Abstract:
Disclosure of Public Information Policy is a form of government awareness regarding the importance of information in determining policy. Disclosure of this information is intended to provide openness for people to take part and supervise the government and institutional policy. Archives institution is known as one of the managers of information which has primary task is to store various important recordings to be used appropriately. This paper aims to analyze the role of archive institution in public information disclosure in Indonesia, and its conduct regarding it. To bridge the needs of the user and archival institutions, it must preset fast and efficient archive service. Act no. 43 of 2007 on Archive is one proof of the role of archive institutions in the digital era. Many laws govern the freedom of information of a person, in terms of security, privacy, and information dissemination. Electronic archive service It is expected to facilitate accesses, and it is also a form of the archive’s participation in the Public Information. Although in implementation, there are many issues that archives should face in opening access and disseminating information to the public.
APA, Harvard, Vancouver, ISO, and other styles
38

Panchal, Marcus, Sukhpreet Singh, and Esther Rodriguez-Villegas. "Analysis of the factors affecting the adoption and compliance of the NHS COVID-19 mobile application: a national cross-sectional survey in England." BMJ Open 11, no. 8 (August 2021): e053395. http://dx.doi.org/10.1136/bmjopen-2021-053395.

Full text
Abstract:
ObjectivesTo conduct an independent study investigating how adults perceive the usability and functionality of the ‘National Health Service (NHS) COVID-19’ application (app). This study aims to highlight strengths and provide recommendations to improve adoption of future contact tracing developments.DesignA 60-item, anonymous online questionnaire, disseminated through social media outlets and email lists by a team from Imperial College London.SettingEngland.ParticipantsConvenience sample of 1036 responses, from participants aged 18 years and above, between December 2020 and January 2021.Primary outcome measuresEvaluate the compliance and public attitude towards the ‘NHS COVID-19’ app regarding its functionality and features. This included whether participants’ expectations were met, and their thoughts on the app privacy and security. Furthermore, to distinguish how usability, perception, and adoption differed with varying demographics and user values.ResultsFair compliance with the app features was identified, meeting expectations of the 62.1% of participants who stated they downloaded it after weighted analysis. However, participants finding the interface challenging were less likely to read information in the app and had a lesser understanding of its functionality. Furthermore, little understanding regarding the app’s functionality and privacy concerns was a possible reason why users did not download it. A readability analysis of the text revealed information within the app was conveyed at a level that may be too complex for up to 43% of the UK population. The study highlighted issues related to the potential of false positives caused by the design choices in the ‘Check-In’ feature.ConclusionThis study showed that while the ‘NHS COVID-19’ app was viewed positively, there remained issues regarding participants’ perceived knowledge of app functionality, potentially affecting compliance. Therefore, we recommended improvements regarding the delivery and presentation of the app’s information, and highlighted the potential need for the ability to check out of venues to reduce the number of false positive contacts.
APA, Harvard, Vancouver, ISO, and other styles
39

Kim, Ho Heon, Bora Kim, Segyeong Joo, Soo-Yong Shin, Hyo Soung Cha, and Yu Rang Park. "Why Do Data Users Say Health Care Data Are Difficult to Use? A Cross-Sectional Survey Study." Journal of Medical Internet Research 21, no. 8 (August 6, 2019): e14126. http://dx.doi.org/10.2196/14126.

Full text
Abstract:
Background There has been significant effort in attempting to use health care data. However, laws that protect patients’ privacy have restricted data use because health care data contain sensitive information. Thus, discussions on privacy laws now focus on the active use of health care data beyond protection. However, current literature does not clarify the obstacles that make data usage and deidentification processes difficult or elaborate on users’ needs for data linking from practical perspectives. Objective The objective of this study is to investigate (1) the current status of data use in each medical area, (2) institutional efforts and difficulties in deidentification processes, and (3) users’ data linking needs. Methods We conducted a cross-sectional online survey. To recruit people who have used health care data, we publicized the promotion campaign and sent official documents to an academic society encouraging participation in the online survey. Results In total, 128 participants responded to the online survey; 10 participants were excluded for either inconsistent responses or lack of demand for health care data. Finally, 118 participants’ responses were analyzed. The majority of participants worked in general hospitals or universities (62/118, 52.5% and 51/118, 43.2%, respectively, multiple-choice answers). More than half of participants responded that they have a need for clinical data (82/118, 69.5%) and public data (76/118, 64.4%). Furthermore, 85.6% (101/118) of respondents conducted deidentification measures when using data, and they considered rigid social culture as an obstacle for deidentification (28/101, 27.7%). In addition, they required data linking (98/118, 83.1%), and they noted deregulation and data standardization to allow access to health care data linking (33/98, 33.7% and 38/98, 38.8%, respectively). There were no significant differences in the proportion of responded data needs and linking in groups that used health care data for either public purposes or commercial purposes. Conclusions This study provides a cross-sectional view from a practical, user-oriented perspective on the kinds of data users want to utilize, efforts and difficulties in deidentification processes, and the needs for data linking. Most users want to use clinical and public data, and most participants conduct deidentification processes and express a desire to conduct data linking. Our study confirmed that they noted regulation as a primary obstacle whether their purpose is commercial or public. A legal system based on both data utilization and data protection needs is required.
APA, Harvard, Vancouver, ISO, and other styles
40

Resnick, Marc, William Albert, and Yunzhi Huang. "The Attention Grabbing Salience of Viscerally Engaging Images." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 745–49. http://dx.doi.org/10.1177/1541931213601171.

Full text
Abstract:
Banner ads remain a core component of the marketing mix for companies in both the analog and digital domains. Consumers spend much of their time on websites, whether through mobile or desktop devices, and marketers need to target them where they are. Unfortunately, inattention blindness is a serious impediment to the effectiveness of banner advertising; consumers have become proficient at ignoring banners when they appear in areas predictably associated with advertising. Research has uncovered some strategies to overcome banner blindness, but many of these require customer analytics and can evoke privacy concerns. Others degrade the user experience by interfering with the user’s task. One possible alternative is to use innately salient advertising content, but there is a dearth of research investigating the effectiveness of this approach. The current study fills this gap with an empirical investigation using established, innately salient images in banner ads and a primary task that involved reading text articles that were either intrinsically interesting or boring. Eye-tracking was used to assess the impact on participants’ visual scan patterns and visual attention. The results were mixed. Participants’ visual attention was drawn to banner ads that contained sexually suggestive content, but not for other innately salient categories. The effect of the intrinsic salience of the content was complicated and requires further research to resolve.
APA, Harvard, Vancouver, ISO, and other styles
41

Walonoski, Jason, Mark Kramer, Joseph Nichols, Andre Quina, Chris Moesel, Dylan Hall, Carlton Duffett, Kudakwashe Dube, Thomas Gallagher, and Scott McLachlan. "Synthea: An approach, method, and software mechanism for generating synthetic patients and the synthetic electronic health care record." Journal of the American Medical Informatics Association 25, no. 3 (August 30, 2017): 230–38. http://dx.doi.org/10.1093/jamia/ocx079.

Full text
Abstract:
Abstract Objective Our objective is to create a source of synthetic electronic health records that is readily available; suited to industrial, innovation, research, and educational uses; and free of legal, privacy, security, and intellectual property restrictions. Materials and Methods We developed Synthea, an open-source software package that simulates the lifespans of synthetic patients, modeling the 10 most frequent reasons for primary care encounters and the 10 chronic conditions with the highest morbidity in the United States. Results Synthea adheres to a previously developed conceptual framework, scales via open-source deployment on the Internet, and may be extended with additional disease and treatment modules developed by its user community. One million synthetic patient records are now freely available online, encoded in standard formats (eg, Health Level-7 [HL7] Fast Healthcare Interoperability Resources [FHIR] and Consolidated-Clinical Document Architecture), and accessible through an HL7 FHIR application program interface. Discussion Health care lags other industries in information technology, data exchange, and interoperability. The lack of freely distributable health records has long hindered innovation in health care. Approaches and tools are available to inexpensively generate synthetic health records at scale without accidental disclosure risk, lowering current barriers to entry for promising early-stage developments. By engaging a growing community of users, the synthetic data generated will become increasingly comprehensive, detailed, and realistic over time. Conclusion Synthetic patients can be simulated with models of disease progression and corresponding standards of care to produce risk-free realistic synthetic health care records at scale.
APA, Harvard, Vancouver, ISO, and other styles
42

Dexheimer, Judith W., Mary V. Greiner, Sarah J. Beal, Darius Johnson, Andrea Kachelmeyer, and Lisa M. Vaughn. "Sharing personal health record data elements in protective custody: youth and stakeholder perspectives." Journal of the American Medical Informatics Association 26, no. 8-9 (July 31, 2019): 714–21. http://dx.doi.org/10.1093/jamia/ocz067.

Full text
Abstract:
Abstract Objective The study sought to develop the necessary elements for a personalized health record (PHR) for youth emancipating from child protective custody (eg, foster care) by collecting thoughts and ideas from current and former foster youth and community stakeholders who have a significant amount of experience working with emancipating young people. Materials and Methods We employed a mixed methods, participatory research design using concept mapping to identify key features for PHR across stakeholders. Results In the clusters, common themes for necessary elements for a PHR included health education, health tips, medication instructions, diagnoses including severity, and website resources that could be trusted to provide reliable information, and addressed data privacy issues such as the primary user being able to choose what diagnoses to share with their trusted adult and the ability to assign a trusted adult to view a part of the record. Discussion By directly involving youth in the design of the PHR, we are able to ensure we included the necessary health and life skills elements that they require. As a PHR is created for foster youth, it is important to consider the multiple uses that the data may have for emancipated youth. Conclusion A PHR for foster youth needs to include an appropriate combination of information and education for a vulnerable population. In addition to providing some of their basic health and custody information, a PHR provides an opportunity to give them information that can be trusted to explain common diagnoses, medications, and family health history risks.
APA, Harvard, Vancouver, ISO, and other styles
43

Lazarou, Ioulietta, Thanos G. Stavropoulos, Lampros Mpaltadoros, Spiros Nikolopoulos, George Koumanakos, Magda Tsolaki, and Ioannis (Yiannis) Kompatsiaris. "Human Factors and Requirements of People with Cognitive Impairment, Their Caregivers, and Healthcare Professionals for mHealth Apps Including Reminders, Games, and Geolocation Tracking: A Survey-Questionnaire Study." Journal of Alzheimer's Disease Reports 5, no. 1 (June 11, 2021): 497–513. http://dx.doi.org/10.3233/adr-201001.

Full text
Abstract:
Background: Mobile Health (mHealth) apps can delay the cognitive decline of people with dementia (PwD), by providing both objective assessment and cognitive enhancement. Objective: This patient involvement survey aims to explore human factors, needs and requirements of PwD, their caregivers, and Healthcare Professionals (HCPs) with respect to supportive and interactive mHealth apps, such as brain games, medication reminders, and geolocation trackers through a constructive questionnaire. Methods: Following the principles of user-centered design to involve end-users in design we constructed a questionnaire, containing both open-ended and closed-ended questions as well as multiple choice and Likert scale, in order to investigate the specific requirements and preferences for mHealth apps. We recruited 48 participants including people with cognitive impairment (n = 15), caregivers (n = 16), and HCPs (n = 17) and administered the questionnaire. Results: All participants are likely to use mHealth apps, with the primary desired features being the improvement of memory and cognition, assistance on medication treatment, and perceived ease to use. HCPs, caregivers, and PwD consider brain games as an important technology-based, non-pharmaceutical intervention. Both caregivers and patients are willing to use a medication reminder app frequently. Finally, caregivers are worried about the patient wandering. Therefore, global positioning system tracking would be particularly important to them. On the other hand, patients are concerned about their privacy, but are still willing to use a geolocation app for cases of emergency. Conclusion: This research contributes to mHealth app design and potential adoption. All three groups agree that mHealth services could facilitate care and ameliorate behavioral and cognitive disturbances of patients.
APA, Harvard, Vancouver, ISO, and other styles
44

H.L., Meghana, Asish Oommen Mathew, and Lewlyn L. R. Rodrigues. "Prioritizing the factors affecting cloud ERP adoption – an analytic hierarchy process approach." International Journal of Emerging Markets 13, no. 6 (November 29, 2018): 1559–77. http://dx.doi.org/10.1108/ijoem-10-2017-0404.

Full text
Abstract:
Purpose In today’s competitive world, the adoption of cloud enterprise resource planning (ERP) has become one of the critical criteria for running a successful business. In this regard, knowing the factors that influence cloud ERP adoption plays a significant role. The purpose of this paper is to rank the factors influencing the cloud ERP adoption in multi-national companies (MNCs) in India. This research would enable the cloud ERP vendors to identify the expectations of MNC customers and develop suitable strategies. Design/methodology/approach The research is being conducted among the cloud ERP consultants of designation middle managers and above from 29 different ERP consulting firms located in India. Analytical hierarchical processing approach was used to rank the factors influencing the cloud ERP adoption in MNCs located in India. The primary factors considered for this study are usability, assurance, agility, security and privacy, and vendor-related factors. Findings The three most preferred criteria were usability, assurance and agility. The five most preferred sub-criteria were data accessibility, availability, user friendliness, scalability, and data backup and recovery. Research limitations/implications The study is limited to the perspective of cloud ERP consultants in India. Practical implications The outcome of this research provides cloud ERP vendors with a better understanding of factors that influence the adoption of cloud ERP in MNCs so that they can develop a focused strategy. From the MNCs point of view, the study provides a guideline on what factors they should consider while going for a cloud ERP implementation. Originality/value The research model is developed based on the cloud ERP literature, and the research results and findings would add value to the body of knowledge.
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Jingyi, Sai Mounika Errapotu, Yanmin Gong, Lijun Qian, Riku Jantti, Miao Pan, and Zhu Han. "Data-Driven Optimization Based Primary Users’ Operational Privacy Preservation." IEEE Transactions on Cognitive Communications and Networking 4, no. 2 (June 2018): 357–67. http://dx.doi.org/10.1109/tccn.2018.2837876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Jess, Mia, Helle Timm, and Karin B. Dieperink. "Video consultations in palliative care: A systematic integrative review." Palliative Medicine 33, no. 8 (June 12, 2019): 942–58. http://dx.doi.org/10.1177/0269216319854938.

Full text
Abstract:
Background: There is extensive need for palliative care worldwide, but access to care remains inadequate, especially for non-cancer patients. Video consultations are a promising tool in the provision of home-based palliative care, but an overview of evidence solely on video consultations in palliative care is lacking. Aim: To review and synthesize current evidence regarding the use of video consultations in general and specialized palliative care to various patient groups. Design: A systematic integrative review with a narrative synthesis was undertaken in accordance with PRISMA (2009) guidelines. PROSPERO #: CRD42018095383 Data sources: PubMed, Embase, CINAHL, and PsychINFO were searched for primary research articles published between 2005 and 2018. In addition, reference lists of included articles were hand searched. Results: The search resulted in 813 articles; 39 articles were included in the review, consisting of mixed methods ( n = 14), qualitative ( n = 10), quantitative ( n = 10), and case studies ( n = 5). The studies mainly focused on specialized palliative care to adult patients with cancer in high income countries. Through data analysis, six themes addressing advantages/disadvantages and facilitators/barriers were identified: (1) Redesign of care, (2) Communication, (3) User perceptions, (4) Technology, (5) Privacy issues, and (6) Economic implications. Conclusion: Using video technology in palliative care has both advantages and disadvantages. However, evidence beyond the focus on specialized palliative care and patients with cancer is limited. Future research should focus on how and when video consultations might replace in-person specialized palliative care and video consultations in general palliative care, in low and middle income countries; and involve patients with a non-cancer diagnosis.
APA, Harvard, Vancouver, ISO, and other styles
47

Aldholay, Adnan, Zaini Abdullah, Osama Isaac, and Ahmed M. Mutahar. "Perspective of Yemeni students on use of online learning." Information Technology & People 33, no. 1 (April 30, 2019): 106–28. http://dx.doi.org/10.1108/itp-02-2018-0095.

Full text
Abstract:
Purpose Online learning has evolved into a necessary means of learning because of its capability to enhance the education quality with minimum resources and infrastructure. Nevertheless, while academics have studied the espousal and use of online learning in various settings, the effect of compatibility and transformational leadership (TL) still remains to be seen, with regards to the Yemeni context. The purpose of this paper is to forward the Delone and Mclean Information System (IS) success Model by integrating compatibility and TL constructs as precursors to user contentment and actual use for estimating performance of students. Design/methodology/approach The questionnaire technique was utilised for gathering primary data from 448 students in nine state-funded Yemeni universities. The six variables in the recommended framework were gauged utilising current scales. Data analysis was done by deploying structural equation modelling through SmartPLS 3.0. Findings The outcomes encompassed three key results: overall quality (data, system and service quality), compatibility and TL have a favourable effect on user satisfaction and actual use; actual use considerably estimates user satisfaction; and user satisfaction and actual use have a favourable effect on performance of students. Research limitations/implications Because the research populace comprised students from nine state-funded universities, it did not include administrative and academic staff. Furthermore, as the study was cross-sectional, it studied the variables at a single point of time. Attaining experience in utilising online learning would transform the convictions of students, and this cannot be traced through a cross-sectional scrutiny. Moreover, the research relies upon self-testified measures for ascertaining the recommended research model. The reason behind this is that obtaining objective information regarding performance was not likely because of the privacy concern. Practical implications Despite the fact that Yemen is a low-income emerging nation with inadequate resources (World Development Indicators, 2017), it can capitalise on online-based learning that provides the advantage of excellent education and that too with limited supplies (Dokhan and Akkoyunlu, 2016; Yang et al., 2016). Additionally, online learning can enhance administration and communication, empower learning anywhere and anytime, and endorse fairness of education. Originality/value This study supplements the existing studies on information systems by blending overall quality, compatibility, TL, actual use and client satisfaction for estimating the effect of online learning among students from nine state-funded Yemeni universities. Moreover, the recommended model’s predictive prowess has a higher capability to elucidate and estimate the performance effect as against those acquired from few of the previous studies.
APA, Harvard, Vancouver, ISO, and other styles
48

Carini, Elettra, Leonardo Villani, Angelo Maria Pezzullo, Andrea Gentili, Andrea Barbara, Walter Ricciardi, and Stefania Boccia. "The Impact of Digital Patient Portals on Health Outcomes, System Efficiency, and Patient Attitudes: Updated Systematic Literature Review." Journal of Medical Internet Research 23, no. 9 (September 8, 2021): e26189. http://dx.doi.org/10.2196/26189.

Full text
Abstract:
Background Patient portals are becoming increasingly popular worldwide even though their impact on individual health and health system efficiency is still unclear. Objective The aim of this systematic review was to summarize evidence on the impact of patient portals on health outcomes and health care efficiency, and to examine user characteristics, attitudes, and satisfaction. Methods We searched the PubMed and Web of Science databases for articles published from January 1, 2013, to October 31, 2019. Eligible studies were primary studies reporting on the impact of patient portal adoption in relation to health outcomes, health care efficiency, and patient attitudes and satisfaction. We excluded studies where portals were not accessible for patients and pilot studies, with the exception of articles evaluating patient attitudes. Results Overall, 3456 records were screened, and 47 articles were included. Among them, 11 studies addressed health outcomes reporting positive results, such as better monitoring of health status, improved patient-doctor interaction, and improved quality of care. Fifteen studies evaluated the impact of digital patient portals on the utilization of health services with mixed results. Patient characteristics were described in 32 studies, and it was reported that the utilization rate usually increases with age and female gender. Finally, 30 studies described attitudes and defined the main barriers (concerns about privacy and data security, and lack of time) and facilitators (access to clinical data and laboratory results) to the use of a portal. Conclusions Evidence regarding health outcomes is generally favorable, and patient portals have the potential to enhance the doctor-patient relationship, improve health status awareness, and increase adherence to therapy. It is still unclear whether the use of patient portals improves health service utilization and efficiency.
APA, Harvard, Vancouver, ISO, and other styles
49

McDonnell, Karen Kane, Otis L. Owens, Jenay M. Beer, Kasey Smith, Taylor Kennedy, Dane Acena, and David Gallerani. "Empowering lung cancer survivors and family members to “breathe easier”: Adaptation and evaluation of a m-health intervention." Journal of Clinical Oncology 37, no. 15_suppl (May 20, 2019): e23046-e23046. http://dx.doi.org/10.1200/jco.2019.37.15_suppl.e23046.

Full text
Abstract:
e23046 Background: Survivors of lung cancer often experience a myriad of symptoms that have devastating effects on their physical and psychological functioning such as dyspnea, fatigue, and stress. To combat these symptoms, the American College of Chest Physicians has recommended the use of complementary therapies. Mindfulness-based Cancer Recovery (MBCR) can empower survivors, and caregivers who often cope with their own health problems and the stress related to caring for a survivor. Our goal is to deliver a tailored, culturally sensitive, MBCR intervention to survivors and family members via a mHealth app. Methods: This research was comprised of four phases. Phase I was the development and testing of an 8-week in-person intervention called Breathe Easier with survivors and family members (dyads). Phase II adapted Breathe Easier into a mHealth app prototype utilizing user-centered design. Phase III was a focus-group evaluation of the usability and acceptance of the mHealth app prototype by survivors and family members. Phase IV was comprised of additional interviews with an African-American subset of survivors and family members to assess the cultural sensitivity of the mHealth app. Results: Findings from the in-person intervention (n = 62) showed that all agreed the intervention materials were acceptable, different levels of yoga, breathing exercises, and meditations helped them, and involving a family member was important. Preliminary analyses showed survivors had less dyspnea and perceived stress over time (T1 vs T2). Both groups had improved fatigue and sleep scores. Findings from the mHealth app design and acceptance evaluation were organized into two primary categories: usefulness and ease of use. User-friendly design recommendations included aesthetic appeal, navigation layout, and display of content. Furthermore, potential health outcomes, privacy concerns, and comparison to in-person interventions also influenced app usefulness and acceptance. Lastly, findings from our cultural sensitivity assessment demonstrated that the mHealth app was culturally sensitive for African-Americans, but some changes were recommended. Conclusions: MBCR interventions hold great promise for improving the lives of racially diverse survivors of lung cancer and family members. An mHealth app will increase accessibility. However, special consideration of app design is needed to ensure future acceptance and longer-term usage.
APA, Harvard, Vancouver, ISO, and other styles
50

Shepley, Andrew, Greg Falzon, Christopher Lawson, Paul Meek, and Paul Kwan. "U-Infuse: Democratization of Customizable Deep Learning for Object Detection." Sensors 21, no. 8 (April 8, 2021): 2611. http://dx.doi.org/10.3390/s21082611.

Full text
Abstract:
Image data is one of the primary sources of ecological data used in biodiversity conservation and management worldwide. However, classifying and interpreting large numbers of images is time and resource expensive, particularly in the context of camera trapping. Deep learning models have been used to achieve this task but are often not suited to specific applications due to their inability to generalise to new environments and inconsistent performance. Models need to be developed for specific species cohorts and environments, but the technical skills required to achieve this are a key barrier to the accessibility of this technology to ecologists. Thus, there is a strong need to democratize access to deep learning technologies by providing an easy-to-use software application allowing non-technical users to train custom object detectors. U-Infuse addresses this issue by providing ecologists with the ability to train customised models using publicly available images and/or their own images without specific technical expertise. Auto-annotation and annotation editing functionalities minimize the constraints of manually annotating and pre-processing large numbers of images. U-Infuse is a free and open-source software solution that supports both multiclass and single class training and object detection, allowing ecologists to access deep learning technologies usually only available to computer scientists, on their own device, customised for their application, without sharing intellectual property or sensitive data. It provides ecological practitioners with the ability to (i) easily achieve object detection within a user-friendly GUI, generating a species distribution report, and other useful statistics, (ii) custom train deep learning models using publicly available and custom training data, (iii) achieve supervised auto-annotation of images for further training, with the benefit of editing annotations to ensure quality datasets. Broad adoption of U-Infuse by ecological practitioners will improve ecological image analysis and processing by allowing significantly more image data to be processed with minimal expenditure of time and resources, particularly for camera trap images. Ease of training and use of transfer learning means domain-specific models can be trained rapidly, and frequently updated without the need for computer science expertise, or data sharing, protecting intellectual property and privacy.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography