7,634 research outputs found

    Image Sharing Technologies and Reduction of Imaging Utilization: A Systematic Review and Meta-analysis

    Get PDF
    INTRODUCTION: Image sharing technologies may reduce unneeded imaging by improving provider access to imaging information. A systematic review and meta-analysis were conducted to summarize the impact of image sharing technologies on patient imaging utilization. METHODS: Quantitative evaluations of the effects of PACS, regional image exchange networks, interoperable electronic heath records, tools for importing physical media, and health information exchange systems on utilization were identified through a systematic review of the published and gray English-language literature (2004-2014). Outcomes, standard effect sizes (ESs), settings, technology, populations, and risk of bias were abstracted from each study. The impact of image sharing technologies was summarized with random-effects meta-analysis and meta-regression models. RESULTS: A total of 17 articles were included in the review, with a total of 42 different studies. Image sharing technology was associated with a significant decrease in repeat imaging (pooled effect size [ES] = -0.17; 95% confidence interval [CI] = [-0.25, -0.09]; P < .001). However, image sharing technology was associated with a significant increase in any imaging utilization (pooled ES = 0.20; 95% CI = [0.07, 0.32]; P = .002). For all outcomes combined, image sharing technology was not associated with utilization. Most studies were at risk for bias. CONCLUSIONS: Image sharing technology was associated with reductions in repeat and unnecessary imaging, in both the overall literature and the most-rigorous studies. Stronger evidence is needed to further explore the role of specific technologies and their potential impact on various modalities, patient populations, and settings

    Customs, Immigration, and Rights: Constitutional Limits on Electronic Border Searches

    Get PDF
    The warrantless search of travelers’ electronic devices as they enter and exit the United States is rapidly increasing. While the Supreme Court has long recognized a border-search exception to the Fourth Amendment’s warrant requirement, it applies to only two interests: promoting the duty regime and preventing contraband from entering the country; and ensuring that individuals are legally admitted. The government’s recent use of the exception goes substantially beyond these matters. U.S. Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) are using it to search electronic devices, and at times the cloud, for evidence of any criminal activity, bypassing the warrant requirement altogether. Searches of these devices implicate privacy concerns well beyond those of the home, which has long been protected even for customs and immigration purposes. This Essay traces the evolution of the border exception, noting the effect of recent Supreme Court decisions, to argue that CBP and ICE are operating outside constitutional constraints. The Essay considers two objections grounded in the legitimate interests of CBP and ICE. It responds, first, that inspection of digital devices differs from the examination of a traveler’s purse or luggage: the level of intrusion and the amount of information obtained changes the quality of the search, triggering Fourth Amendment protections. Second, as an immigration matter, as soon as citizens are identified, absent probable cause, the government does not have the constitutional authority to search their devices at all. Foreigners lacking a substantial connection to the country, however, do not enjoy the same Fourth Amendment protections. It concludes by observing that because of the substance and complexity of the issue, Congress has an important role to play in determining what types of searches are justified

    Blockchain vehicles for efficient Medical Record management

    Get PDF
    The lack of interoperability in Britain’s medical records systems precludes the realisation of benefits generated by increased spending elsewhere in healthcare. Growing concerns regarding the security of online medical data following breaches, and regarding regulations governing data ownership, mandate strict parameters in the development of efficient methods to administrate medical records. Furthermore, consideration must be placed on the rise of connected devices, which vastly increase the amount of data that can be collected in order to improve a patient’s long-term health outcomes. Increasing numbers of healthcare systems are developing Blockchain-based systems to manage medical data. A Blockchain is a decentralised, continuously growing online ledger of records, validated by members of the network. Traditionally used to manage cryptocurrency records, distributed ledger technology can be applied to various aspects of healthcare. In this manuscript, we focus on how Electronic Medical Records in particular can be managed by Blockchain, and how the introduction of this novel technology can create a more efficient and interoperable infrastructure to manage records that leads to improved healthcare outcomes, while maintaining patient data ownership and without compromising privacy or security of sensitive data

    Guidelines for the use of cell lines in biomedical research

    Get PDF
    Cell-line misidentification and contamination with microorganisms, such as mycoplasma, together with instability, both genetic and phenotypic, are among the problems that continue to affect cell culture. Many of these problems are avoidable with the necessary foresight, and these Guidelines have been prepared to provide those new to the field and others engaged in teaching and instruction with the information necessary to increase their awareness of the problems and to enable them to deal with them effectively. The Guidelines cover areas such as development, acquisition, authentication, cryopreservation, transfer of cell lines between laboratories, microbial contamination, characterisation, instability and misidentification. Advice is also given on complying with current legal and ethical requirements when deriving cell lines from human and animal tissues, the selection and maintenance of equipment and how to deal with problems that may arise

    Asian Roboticism: Connecting Mechanized Labor to the Automation of Work

    Get PDF
    Abstract This article reconsiders the present-day automation of work and its transformation of who we are as humans. What has been missing from this important conversation are the social meanings surrounding Asian roboticism or how Asians have already been rendered as “robotic” subjects and labor. Through this racial gendered trope, I assess whether industrial automation will lessen, complicate, or exacerbate this modern archetype. By looking at corporate organizational practices and public media discourse, I believe that Asian roboticism will not simply vanish, but potentially continue to affect the ways such subjects are rendered as exploitable alienated robots without human rights or status
    • 

    corecore