1,680 research outputs found

    Privacy and Security Concerns Associated with mHealth Technologies: A Computational Social Science Approach

    Get PDF
    mHealth technologies seek to improve personal wellness; however, there are still significant privacy and security challenges. The purpose of this study is to analyze tweets through social media mining to understand user-reported concerns associated with mHealth devices. Triangulation was conducted on a representative sample to confirm the results of the topic modeling using manual coding. The results of the emotion analysis showed 67% of the posts were largely associated with anger and fear, while 71% revealed an overall negative sentiment. The findings demonstrate the viability of leveraging computational techniques to understand the social phenomenon in question and confirm concerns such as accessibility of data, lack of data protection, surveillance, misuse of data, and unclear policies. Further, the results extend existing findings by highlighting critical concerns such as users’ distrust of these mHealth hosting companies and the inherent lack of data control

    Privacy and Online Social Networks: A Systematic Literature Review of Concerns, Preservation, and Policies

    Get PDF
    Background: Social media usage is one of the most popular online activities, but with it comes privacy concerns due to how personal data are handled by these social networking sites. Prior literature aimed at identifying users’ privacy concerns as well as user behavior associated with privacy mitigation strategies and policies. However, OSN users continue to divulge private information online and privacy remains an issue. Accordingly, this review aims to present extant research on this topic, and to highlight any potential research gaps. Method: The paper presents a systematic literature review for the period 2006 - 2021, in which 33 full papers that explored privacy concerns in online social networks (OSN), users’ behavior associated with privacy preservation strategies and OSN privacy policies were examined. Results: The findings indicate that users are concerned about their identity being stolen, the disclosure of sensitive information by third-party applications and through data leakage and the degree of control users have over their data. Strategies such as encryption, authentication, and privacy settings configuration, can be used to address users’ concerns. Users generally do not leverage privacy settings available to them, or read the privacy policies, but will opt to share information based on the benefits to be derived from OSNs. Conclusion: OSN users have specific privacy concerns due primarily to the inherent way in which personal data are handled. Different preservation strategies are available to be used by OSN users. Policies are provided to inform users, however, these policies at times are difficult to read and understand, but studies show that there is no direct effect on the behavior of OSN users. Further research is needed to elucidate the correlation between the relative effectiveness of different privacy preservation strategies and the privacy concerns exhibited by users. Extending the research to comparatively assess different social media sites could help with better awareness of the true influence of privacy policies on user behavior

    Genetic and Modifiable Risk Factors Contributing to Cisplatin-Induced Toxicities

    Get PDF
    Effective administration of traditional cytotoxic chemotherapy is often limited by off-target toxicities. This clinical dilemma is epitomized by cisplatin, a platinating agent that has potent antineoplastic activity due to its affinity for DNA and other intracellular nucleophiles. Despite its efficacy against many adult-onset and pediatric malignancies, cisplatin elicits multiple off-target toxicities that can not only severely impact a patient’s quality of life, but also lead to dose reductions or the selection of alternative therapies that can ultimately affect outcomes. Without an effective therapeutic measure by which to successfully mitigate many of these symptoms, there have been attempts to identify a priori those individuals who are more susceptible to developing these sequelae through studies of genetic and nongenetic risk factors. Older age is associated with cisplatin induced ototoxicity, neurotoxicity and nephrotoxicity. Traditional genome-wide association studies have identified single nucleotide polymorphisms in ACYP2 and WFS1 associated with cisplatin-induced hearing loss. However, validating associations between specific genotypes and cisplatin-induced toxicities with enough stringency to warrant clinical application remains challenging. This review summarizes the current state of knowledge with regard to specific adverse sequelae following cisplatin-based therapy with a focus on ototoxicity, neurotoxicity, nephrotoxicity, myelosuppression and nausea/emesis. We discuss variables (genetic and nongenetic) contributing to these detrimental toxicities, and currently available means to prevent or treat their occurrence

    Digital Divide in Rural Native American Homes: A Student Perspective

    Get PDF
    Native American homes located in rural western North Dakota have seen increased availability of broadband and fiber optic Internet but continue to have low access numbers. Native American homes in the region located outside population centers continue to have difficulty accessing the Internet. Many households continue to struggle with economic factors compounded by the cost of a device to access the Internet for personal, educational, or employment use. A qualitative study with semi-structured interviews and the grounded theory method investigated the Native American home environment. Interviews were conducted with Native American students attending a state university with insight into diverse digital environments. The cost of access and technical knowledge continue to be issues in the home. This research deepens the understanding of digital divide factors in Native American households, emphasizing the perspective of Native American students

    Assessing Information System Design Theory in Perspective: How Useful Was our 1992 Initial Rendition?

    Get PDF
    More than a decade has passed since the publication of the first article on building information systems design theories (ISDT) that appeared in Information Systems Research (Walls, Widmeyer, and El Sawy, 1992). Using the context of designing vigilant executive information systems, it articulated how to construct and test an ISDT that could prescriptively guide the design of a particular class of information system. The paper argued that successful construction of ISDTs would create an endogenous base for theory in the IS discipline, and could be used by scholars to prescribe design products and processes for different classes of information systems as they emerged. This paper reviews ISDT and assesses how it has been used by IS scholars since that 1992 publication. It attempts to determine how useful the Walls et. al. ISDT has been in guiding design and helping theoretical development. The paper assesses the extent and practicality of its use as a theory building framework, and draws on samples of the various IS scholars have taken advantage of it in 26 papers to-date. The paper diagnoses the reasons for the limited use of ISDT and makes recommendations for enhancing its usability and adoption in the IS research community

    A rewriting view of simple typing

    Get PDF
    This paper shows how a recently developed view of typing as small-step abstract reduction, due to Kuan, MacQueen, and Findler, can be used to recast the development of simple type theory from a rewriting perspective. We show how standard meta-theoretic results can be proved in a completely new way, using the rewriting view of simple typing. These meta-theoretic results include standard type preservation and progress properties for simply typed lambda calculus, as well as generalized versions where typing is taken to include both abstract and concrete reduction. We show how automated analysis tools developed in the term-rewriting community can be used to help automate the proofs for this meta-theory. Finally, we show how to adapt a standard proof of normalization of simply typed lambda calculus, for the rewriting approach to typing

    Lorentz Beams

    Full text link
    A new kind of tridimensional scalar optical beams is introduced. These beams are called Lorentz beams because the form of their transverse pattern in the source plane is the product of two independent Lorentz functions. Closed-form expression of free-space propagation under paraxial limit is derived and pseudo non-diffracting features pointed out. Moreover, as the slowly varying part of these fields fulfils the scalar paraxial wave equation, it follows that there exist also Lorentz-Gauss beams, i.e. beams obtained by multipying the original Lorentz beam to a Gaussian apodization function. Although the existence of Lorentz-Gauss beams can be shown by using two different and independent ways obtained recently from Kiselev [Opt. Spectr. 96, 4 (2004)] and Gutierrez-Vega et al. [JOSA A 22, 289-298, (2005)], here we have followed a third different approach, which makes use of Lie's group theory, and which possesses the merit to put into evidence the symmetries present in paraxial Optics.Comment: 11 pages, 1 figure, submitted to Journal of Optics

    1-[(Cyclo­propyl­meth­oxy)meth­yl]-5-ethyl-6-(4-methyl­benzyl)-1,2,3,4-tetra­hydro­pyrimidine-2,4-dione

    Get PDF
    The pyrimidine ring in the title compound, C19H24N2O3, is nearly planar (r.m.s. deviation = 0.008 Å); the C atom at the 5-position deviates by 0.054 (3) Å from the mean plane and the C atom at the 6-position by 0.006 (3) Å in the opposite direction. The benzene ring is approximately perpendicular to the pyrimidine ring [dihedral angle = 83.90 (10)°]. The amino group is hydrogen-bond donor to the exocyclic O atom at the 2-position of an adjacent mol­ecule, the hydrogen bond generating an inversion dimer. The cyclo­propyl ring is disordered over two sets of sites with the major component having 71.5 (4)% occupancy

    Biotechnological applications of polymeric nanofiber platforms loaded with diverse bioactive materials

    Get PDF
    This review article highlights the critical research and formative works relating to nanofiber composites loaded with bioactive materials for diverse applications, and discusses the recent research on the use of electrospun nanofiber incorporating bioactive compounds such as essential oils, herbal bioactive components, plant extracts, and metallic nanoparticles. Inevitably, with the common advantages of bioactive components and polymer nanofibers, electrospun nanofibers containing bioactive components have attracted intense interests for their applications in biomedicine and cancer treatment. Many studies have only concentrated on the production and performance of electrospun nanofiber loaded with bioactive components; in this regard, the features of different types of electrospun nanofiber incorporating a wide variety of bioactive compounds and their developing trends are summarized and assessed in the present article, as is the feasible use of nanofiber technology to produce products on an industrial scale in different applications
    corecore