8 research outputs found

    Investigation into the Application of Personality Insights and Language Tone Analysis in Spam Classification

    Get PDF
    Due to its persistence spam remains as one of the biggest problems facing users and suppliers of email communication services. Machine learning techniques have been very successful at preventing many spam mails from arriving in user mailboxes, however they still account for over 50% of all emails sent. Despite this relative success the economic cost of spam has been estimated as high as 50billionin2005andmorerecentlyat50 billion in 2005 and more recently at 20 billion so spam can still be considered a considerable problem. In essence a spam email is a commercial communication trying to entice the receiver to take some positive action. This project uses the text from emails and creates personality insight and language tone scores through the use of IBM Watsons’ Tone Analyzer API. Those scores are used to investigate whether the language used in emails can be transformed into useful features that can be used to correctly classify them as spam or genuine emails. And during the course of this investigation a range of machine learning techniques are applied. Results from this experiment found that where just the personality insight and language tone features are used in the model some promising results with one dataset were shown. However over all datasets results were inconclusive with this model. Furthermore it was found that in a model where these features were used in combination with a normalised term-frequency feature-set no real improvement in the classification performance was shown

    Clinical information quality of digital health technologies: protocol for an international eDelphi study

    Get PDF
    INTRODUCTION: Digital health technologies (DHTs) such as electronic health records, clinical decision support systems and electronic prescribing systems are widely used in healthcare. While adoption of DHTs can improve healthcare delivery, information quality (IQ) problems associated with DHTs can compromise quality and safety of care. The clinical information quality (CLIQ) framework for digital health is a novel approach to assessing the quality of clinical information from DHTs. This study aims to appraise the CLIQ framework by exploring clinicians’ perspectives on the relevance, definition and assessment of IQ dimensions as defined in the framework. This study will adapt the CLIQ framework to the needs of clinical information users—the clinicians. The contextualised CLIQ framework will offer a pragmatic approach to assessing clinical information from DHTs and may help to forestall IQ problems that can compromise quality and safety of care. METHODS AND ANALYSIS: The electronic Delphi (eDelphi) approach will be used to engage a heterogeneous group of clinicians with patient-facing and/or information governance roles recruited through purposive and snowball sampling techniques. A semi-structured online questionnaire will be used to explore clinicians’ perspectives on relevance, definition and assessment of IQ dimensions in the CLIQ framework. Survey responses on the relevance of dimensions will be summarised using descriptive statistics to inform decisions on retention of dimensions and termination of the study, based on pre-specified rules. Analysis of the free-text responses will be used to revise definition and assessment of dimensions. ETHICS AND DISSEMINATION: Ethics approval has been obtained from the Imperial College Research Governance and Integrity Team (Imperial College Research Ethics Committee (ICREC) Reference number: 20IC6396). The results of the study will be published in a peer-reviewed journal and presented at scientific conferences

    The Effects of a Natural Mutation Found in Peas and Pea-Related Products on Glycaemic Index (GI) and Postprandial Glycaemia in Healthy Humans

    Get PDF
    Imperial Users onl

    Implementing the Information Technology Information Library (Itil) Framework

    Get PDF
    This project proposes the implementation of the Information Technology Infrastructure Library (ITIL) framework for a mid-sized Real Estate Investment Trust (REIT) specializing in commercial warehouses. Due to rapid growth, lack of process and lack of business visibility, the Information Technology (IT) department struggles to provide highly reliable business systems that meet the requirements for the business. The gap in business relationships results in a negative image for the IT department and causes situations where individual business groups contract directly with outsourced IT providers. After developing the IT solution, the business group contacts the internal IT department for involvement with the deployment. The IT department must ensure the outsourced solution will work with internal IT systems or networks regardless of the technology stack or support model. Often, the costs associated with this last minute support are not captured or reported within the overall outsourced IT project. The IT department consulted with Forrester research and Capgemini to review the overall IT environment and process maturity. After performing the review and analyzing the findings, IT management determined that process improvement was required to improve overall IT services and IT service delivery speed. Rather than focus on what led to the decision to implement ITIL, this project will discuss how ITIL provided the foundation to ensure timely, consistent and reliable delivery of IT Services. ITIL also helped improve the IT departments\u27 image with the business by assisting in higher quality implementations and consistency resulting in less IT downtime and more controlled IT systems. When asked about the benefit of ITIL, Carie Zoellner-Buell, a VP of Global Infrastructure and Operations said, ITIL has taken the organization to a whole new level of operation that we were never able to attain in the past. Using ITIL based processes has allowed us to be much more effective in managing IT by adding structure and efficiency

    Raising the information security awareness level in Saudi Arabian organizations through an effective, culturally aware information security framework

    Get PDF
    The focus of the research is to improve the security of information systems in Saudi Arabian knowledge-intensive organisations by raising the awareness level among all types of information system users. This is achieved by developing a culturally aware information security framework that requires the involvement of all types of information system user. Saudi Arabia has a unique culture that affects the security of information systems and, hence, the development of this information security framework. The research uses Princess Nora bint Abdul Rahman University (PNU), the largest all female university in Saudi Arabia, as a case study. The level of information security awareness among employees at Saudi Arabia Universities was tested. Surveys and interviews were conducted to gather data related to the information security system and its uses. It was found that most employees in Saudi Arabian organisations and universities are not involved in the development of any information security policy and, therefore, they are not fully aware of the importance of the security of information. The purpose of this study is to develop a cultural aware information security framework that does involve all types of employees contributing to the development of information security policy. The framework, consists of nine steps that were adapted, modified and arranged differently from the international best practice standard ISO 27K framework to fit the unique culture in Saudi Arabia. An additional step has been added to the framework to define and gather knowledge about the organisations population to justify its fit into the segregated working environment of many Saudi Arabian institutions. Part of the research objective is to educate employees to use this information security framework in order to help them recognise and report threats and risks they may encounter during their work, and therefore improve the overall level of information security awareness. The developed information security framework is a collection of ISO 27k best practice steps, re-ordered, and with the addition of one new step to enable the framework to fit the situation in Saudi Arabian segregation working environments. A before-assessment methodology was applied before the application of the culturally aware information security policy framework between two universities, Imam University which has ISO27K accreditation and PNU, the case study, to measure and compare their users information security awareness level. Then, an after-assessment methodology is used to demonstrate the framework effectiveness by comparing the level of awareness before the application of the culturally aware information security policy framework with the level of the awareness knowledge gained after the application

    Crohn\u27s Disease Patients More Frequently Utilize the Emergency Department and Physician Offices than Ulcerative Colitis Patients

    No full text
    Background: Though there are many overlapping features of clinical presentations among Inflammatory Bowel Disease (IBD) patients, there are key differences between Crohn’s disease (CD) and Ulcerative Colitis (UC) that make CD more prone to severe symptomatology. CD can affect any part of the gastrointestinal tract, the full thickness of the bowel wall, and have skip lesions, whereas UC is limited to the colon, affects only the mucosa, and manifests as continuous colonic inflammation. CD patients have been observed to have a significantly decreased health-related quality of life compared to UC patients, and their quality of life is directly correlated with disease activity. Our study aim was to evaluate health care utilization between CD and UC patients. Methods: Using electronic health records, we performed a retrospective review of IBD patients at an academic medical center over six months to evaluate the health care utilization between CD and UC patients. All IBD patients were under the care of faculty gastroenterologists. Data regarding demographics, IBD subtype, ER visits, physician office visits, phone calls, and email communications were compiled into a database while maintaining subject confidentiality. Statistical analysis was conducted using a two-tailed Fisher’s Exact Test with a significance set at p\u3c 0.05. Results: Out of 831 health care utilizations, 452 (54%) were from CD patients. CD patients had 35 (8%) ER visits, while UC patients had 11 (3%) ER visits (p=0.0022). CD patients had 251 (56%) physician office visits, while UC patients had 178 (47%) physician office visits (p=0.0148). UC patients had 134 (35%) email communications, while CD patients had 108 (24%) email communications (p=0.0003). There were no statistically significant differences in phone calls between CD and UC patients. Conclusion: Our data indicate that CD patients utilize significantly more in-person health services (i.e. ER visits and physician office visits) compared to UC patients. This finding supports the severe symptomatology experienced by CD patients as they likely seek more immediate medical attention than other IBD patients. We also observed that UC patients, however, utilize more email communication services. This further supports a less urgent need for medical attention among UC patients as they may experience less severe symptoms. It is also possible that UC patients have earlier recognition of their symptoms or a heightened awareness of their disease process. Our study emphasizes the need for improved anticipation of the health care needs of CD patients to ultimately reduce costs related to IBD treatment
    corecore