51 research outputs found

    Enhancing reuse of data and biological material in medical research : from FAIR to FAIR-Health

    Get PDF
    The known challenge of underutilization of data and biological material from biorepositories as potential resources formedical research has been the focus of discussion for over a decade. Recently developed guidelines for improved data availability and reusability—entitled FAIR Principles (Findability, Accessibility, Interoperability, and Reusability)—are likely to address only parts of the problem. In this article,we argue that biologicalmaterial and data should be viewed as a unified resource. This approach would facilitate access to complete provenance information, which is a prerequisite for reproducibility and meaningful integration of the data. A unified view also allows for optimization of long-term storage strategies, as demonstrated in the case of biobanks.Wepropose an extension of the FAIR Principles to include the following additional components: (1) quality aspects related to research reproducibility and meaningful reuse of the data, (2) incentives to stimulate effective enrichment of data sets and biological material collections and its reuse on all levels, and (3) privacy-respecting approaches for working with the human material and data. These FAIR-Health principles should then be applied to both the biological material and data. We also propose the development of common guidelines for cloud architectures, due to the unprecedented growth of volume and breadth of medical data generation, as well as the associated need to process the data efficiently.peer-reviewe

    DOES PRIVACY THREAT MATTER IN MOBILE HEALTH SERVICE? FROM HEALTH BELIEF MODEL PERSPECTIVE

    Get PDF
    A lot of mobile health (mHealth) service apps have been launched in the market with advances in technology. When people decide to use these mHealth service apps, they have to provide their personal data or personal health data more or less to the service providers. However, the health data is more sensitive data than general personal data. In addition, the behaviour of using mHealth service apps includes technology use behaviour and health promotion behaviour. Therefore, we employed HBM to be the theory foundation to find out what factors will impact on the intention to upload personal health data via a mHealth service app. Online questionnaires were distributed and 133 valid questionnaires were returned. The results showed the perceived benefits is the only factor to influence an individual intention to upload personal health data. The specific information privacy concerns has no significant effect on the behaviour intention. That means people value the benefits that the mhealth service app can bring more than the threat of privacy they perceived. The construct, disposition to value privacy (DTVP), have strong effects on perceived vulnerability, perceived severity, and specific information privacy concerns. Future studies will be recommended

    Cloud Computing: A Qualitative Study and Conceptual Model

    Get PDF
    “Cloud computing” is the new buzz term in the IT industry. Many practitioners have already adopted the technology or are in the process of adopting it. Yet, there is no methodological research investigating the adoption process. This paper reviews articles and interviews published mostly in practitioner journals to develop a theoretical framework that help us to better understand the cloud computing phenomena. As such, the framework provides a stepping stone for future cloud computing studies

    A Decision Making Model for the Adoption of Cloud Computing in Jamaican Organizations

    Get PDF
    Cloud computing is the current technological silver bullet that has been proposed for solving a variety of Information Systems (IS) problems facing organizations in developing countries including bridging the digital divide. However, the large number of cloud options available can make determining the most applicable solution to an organization non-trivial. This paper looks at these options and the barriers to adoption facing Small/Medium Enterprises (SMEs) in Jamaica. A Simple Additive Weighting (SAW) model which can be used in the cloud adoption decision process is then developed and tested using an example

    Lightweight Modeling of User Context Combining Physical and Virtual Sensor Data

    Full text link
    The multitude of data generated by sensors available on users' mobile devices, combined with advances in machine learning techniques, support context-aware services in recognizing the current situation of a user (i.e., physical context) and optimizing the system's personalization features. However, context-awareness performances mainly depend on the accuracy of the context inference process, which is strictly tied to the availability of large-scale and labeled datasets. In this work, we present a framework developed to collect datasets containing heterogeneous sensing data derived from personal mobile devices. The framework has been used by 3 voluntary users for two weeks, generating a dataset with more than 36K samples and 1331 features. We also propose a lightweight approach to model the user context able to efficiently perform the entire reasoning process on the user mobile device. To this aim, we used six dimensionality reduction techniques in order to optimize the context classification. Experimental results on the generated dataset show that we achieve a 10x speed up and a feature reduction of more than 90% while keeping the accuracy loss less than 3%

    Library Services Platform Path to Cloud Computing Adoption in Nigerian Academic Libraries: A Review

    Get PDF
    The library and Information science (LIS) profession have evolved over time taking advantage of prevailing technology. The arrival of computers and other communication technologies led to major changes in the ways library services are rendered and the profession practiced. Library Management Systems (LMS) is one of such earlier areas where ICT have been applied to the operations of the library during the library computerization era. The arrival of the renascent Cloud Computing is generating new areas of research in relation to librarians’ uptake of this new technology. Cloud computing is being leveraged by developers of library systems to facilitate the envisaged move away from ILS/LMS to a more robust system that can handle some of the shortcomings of the ILS/LMS. These new systems are called Library services platforms (LSP). While both established and new library systems vendors are turning out different products, libraries have begun to shift away to these new platforms. This paper reviews cloud computing in libraries and projects LSPs as the reliable path to its adoption in Nigerian academic libraries. Recommendations were made based on the outcomes of this study

    Library Services Platform Path to Cloud Computing Adoption in Nigerian Academic Libraries: A Review

    Get PDF
    The library and Information science (LIS) profession have evolved over time taking advantage of prevailing technology. The arrival of computers and other communication technologies led to major changes in the ways library services are rendered and the profession practiced. Library Management Systems (LMS) is one of such earlier areas where ICT have been applied to the operations of the library during the library computerization era. The arrival of the renascent Cloud Computing is generating new areas of research in relation to librarians’ uptake of this new technology. Cloud computing is being leveraged by developers of library systems to facilitate the envisaged move away from ILS/LMS to a more robust system that can handle some of the shortcomings of the ILS/LMS. These new systems are called Library services platforms (LSP). While both established and new library systems vendors are turning out different products, libraries have begun to shift away to these new platforms. This paper reviews cloud computing in libraries and projects LSPs as the reliable path to its adoption in Nigerian academic libraries. Recommendations were made based on the outcomes of this study

    An Analytical Study Of Consumer Trust In Cloud Computing

    Get PDF
    The Internet has developed to such a point that many scholarly articles are calling it the 5th utility, behind water, power, sewage, and telephone. The usefulness of the fifth utility is undeniable and will certainly only grow. Soon, common internet users will be able to do more than just use it for entertainment and shopping. Emerging technologies have the ability to intelligently connect people to the data they need to improve their lives. For instance, heart rate monitors can be connected remotely to the internet and patients can live at home knowing that if there are any problems, help will be called even if they are alone and do not have the capacity to make the call themselves. The largest obstacle holding the average person back from using the internet in more meaningful ways is trust. The patient with the heart monitor must understand that his personal data, phone number, identification numbers, address, and other personal information is safe from those who might take advantage of a sickly person. It is difficult for the average internet user to trust that their personally identifiable information (PII) is safe on the internet. Almost weekly the American news media reports new, devastating breaches of personal data in big business. Rarely do they publish how well some companies protect their users. According to a 2010 survey conducted by the Fujitsu corporation, 88% of users, world-wide, are worried about who has access to their data and almost that much is worried about where their data is physically stored (Sato, 2010). We offer a survey and analysis to show that there is a consumer problem with trust and that there are ways for cloud service providers to gain that trust. The ultimate goal of the study is to educate users and CSPs of the problem that exists and suggest ways to overcome it
    • 

    corecore