304 research outputs found

    Death from the Perspective of Luhmann’s System Theory

    Get PDF
    The aim of this article is to address the topic of death from a Luhmannian perspective. First, the article will introduce the general theory of Luhmann to provide a background for the way he is tackling sociological and philosophical problems and then will describe its application to religion and deduce various implications for the topic of death. For the discussion of death, we will refer to some of Hegel’s insights, as they motivated central parts of Luhmann’s theory, though he replaced the Hegelian notions with system theoretical ones. Even if it might seem like a further abstraction and mechanization, we assume that it significantly facilitates the combination of outside and inside perspectives on death. In contrast to philosophical existentialism, the system-oriented approach of Luhmann does not emphasize the situated character of human reason and its gaining authenticity by facing death and finitude. Instead, it points to the entanglement of society and consciousness, focusing on the former while providing hints to the otherness of consciousness. Here, authenticity is not achieved by writing about existential topics, but rather through some sort of parallax view

    Challenges and Legal Gaps of Genetic Profiling in the Era of Big Data

    Get PDF
    Profiling of individuals based on inborn, acquired, and assigned characteristics is central for decision making in health care. In the era of omics and big smart data, it becomes urgent to differentiate between different data governance affordances for different profiling activities. Typically, diagnostic profiling is in the focus of researchers and physicians, and other types are regarded as undesired side-effects; for example, in the connection of health care insurance risk calculations. Profiling in a legal sense is addressed, for example, by the EU data protection law. It is defined in the General Data Protection Regulation as automated decision making. This term does not correspond fully with profiling in biomedical research and healthcare, and the impact on privacy has hardly ever been examined. But profiling is also an issue concerning the fundamental right of non-discrimination, whenever profiles are used in a way that has a discriminatory effect on individuals. Here, we will focus on genetic profiling, define related notions as legal and subject-matter definitions frequently differ, and discuss the ethical and legal challenges

    Discriminant Function Analysis Based on Principal Components for Rapid Discrimination of Metabolic Capabilities of New Isolates

    Get PDF
    The growing need for new microorganisms with novel metabolic capabilities has urged scientists to searchfor life in extreme environments. With the rapid progress in experimental methods, it is possible to isolate new microorganisms at high speeds but the bottleneck in this process is the biochemical characterization due to time and financial limitations. Inferential hierarchical clustering of new isolates may help to overcome this problem. In this work, discriminant function analysis, used in conjunction with principal component analysis (PCA) was able to rapidly discriminate eight new isolates using metabolic footprints (spectral data from electrospray injection mass spectrometry) and the results were compared with clustering based on the Euclidean distances computed both in the domain of original data and in the domain of PCA-transformed data. The presence of the replicates on the adjacent leaf nodes of dendrograms obtained by hierarchical cluster analysis confirmed the reliability of the method. This attractive tool is applicable to a chemical/biological system, which involves complex samples that can be analyzed by high-throughput instruments

    A systematic overview on methods to protect sensitive data provided for various analyses

    Get PDF
    In view of the various methodological developments regarding the protection of sensitive data, especially with respect to privacy-preserving computation and federated learning, a conceptual categorization and comparison between various methods stemming from different fields is often desired. More concretely, it is important to provide guidance for the practice, which lacks an overview over suitable approaches for certain scenarios, whether it is differential privacy for interactive queries, k-anonymity methods and synthetic data generation for data publishing, or secure federated analysis for multiparty computation without sharing the data itself. Here, we provide an overview based on central criteria describing a context for privacy-preserving data handling, which allows informed decisions in view of the many alternatives. Besides guiding the practice, this categorization of concepts and methods is destined as a step towards a comprehensive ontology for anonymization. We emphasize throughout the paper that there is no panacea and that context matters

    Exploring nanobodies interrupting the interaction between p53 and MDM4

    Get PDF
    The p53 protein is considered as the guardian of the genome thanks to its important tumor suppressor roles such as cell-cycle arrest, apoptosis and senescence. Because these roles are extremely vital, the p53 pathway is strictly regulated. During unstressed conditions, p53 protein levels are kept in control by both ubiquitination of the p53 protein and inhibition of its transcriptional activity through the MDM2 and MDM4 proteins, respectively. Although MDM2 is the main modulator of p53 activity, there is a collaboration between MDM2 and MDM4 proteins to enable the control of p53. Thus, MDM4 is as important as MDM2 in this mechanism. In most human cancers, there is either a mutation in the Tp53 gene or an overexpression of its negative regulators. Thus, targeting the p53-MDM2-MDM4 interplay is one of the main aims of cancer therapeutics. Also, in some cancers, where there is overexpression of negative regulators, the use of inhibitors for only MDM2 is not enough to activate the p53 protein. For this reason, exploring inhibitors for MDM4 are vital for therapy. In this study, we aimed to optimize the purification of in silico designed nanobodies targeting the MDM4-p53 interaction and test their affinity and effectiveness by surface plasmon resonance (SPR) and a fluorescent two-hybrid (F2H) assay

    Embedding Risk-Based Anonymization into Data Access Control for Providing Individual-Level Health Data in a Secure Way

    Get PDF
    Especially in biomedical research, individual-level data must be protected due to the sensitivity of the data that is associated with patients. The broad goal of scientific data re-use is to allow many researchers to derive new hypotheses and insights from the data while preserving privacy. Data usage control (DUC) as an attribute-based access mechanism promises to overcome the limitations of traditional access control models achieving that goal. Park and Sandhu provided the usage control (UCON) model as an instance of DUC, which defines policies that evaluate certain attributes. Here, we present an UCON-based architecture, which is augmented with risk-based anonymization as provided by the R package sdcMicro and an extensible Access Control Markup Language (XACML) environment with a core policy decision point as implemented by authzforce

    Medical Informatics in a Tension Between Black-Box AI and Trust

    Get PDF
    For medical informaticians, it became more and more crucial to assess the benefits and disadvantages of AI-based solutions as promising alternatives for many traditional tools. Besides quantitative criteria such as accuracy and processing time, healthcare providers are often interested in qualitative explanations of the solutions. Explainable AI provides methods and tools, which are interpretable enough that it affords different stakeholders a qualitative understanding of its solutions. Its main purpose is to provide insights into the black-box mechanism of machine learning programs. Our goal here is to advance the problem of qualitatively assessing AI from the perspective of medical informaticians by providing insights into the central notions, namely: explainability, interpretability, understanding, trust, and confidence

    Reconsidering Anonymization-Related Concepts and the Term "Identification" Against the Backdrop of the European Legal Framework

    Get PDF
    Sharing data in biomedical contexts has become increasingly relevant, but privacy concerns set constraints for free sharing of individual-level data. Data protection law protects only data relating to an identifiable individual, whereas "anonymous" data are free to be used by everybody. Usage of many terms related to anonymization is often not consistent among different domains such as statistics and law. The crucial term "identification" seems especially hard to define, since its definition presupposes the existence of identifying characteristics, leading to some circularity. In this article, we present a discussion of important terms based on a legal perspective that it is outlined before we present issues related to the usage of terms such as unique "identifiers," "quasi-identifiers," and "sensitive attributes." Based on these terms, we have tried to circumvent a circular definition for the term "identification" by making two decisions: first, deciding which (natural) identifier should stand for the individual; second, deciding how to recognize the individual. In addition, we provide an overview of anonymization techniques/methods for preventing re-identification. The discussion of basic notions related to anonymization shows that there is some work to be done in order to achieve a mutual understanding between legal and technical experts concerning some of these notions. Using a dialectical definition process in order to merge technical and legal perspectives on terms seems important for enhancing mutual understanding

    Explaining Contextualized Word Embeddings in Biomedical Research – A Qualitative Investigation

    Get PDF
    Contextualized word embeddings proved to be highly successful quantitative representations of words that allow to efficiently solve various tasks such as clinical entity normalization in unstructured texts. In this paper, we investigate how the Saussurean sign theory can be used as a qualitative explainable AI method for word embeddings. Our assumption is that the main goal of XAI is to produce confidence and/or trust, which can be gained through quantitative as well as quantitative approaches. One important result is related to the fact that the differential structure of language as explained by Saussure corresponds to the possibility of adding and subtracting word embeddings. On the other hand, these mathematical structures provide insights into the inner workings of natural language

    The Sortal Concept in the Context of Biomedical Record Linkage

    Get PDF
    Biomedical Record Linkage is especially designed for linking data of patients in different data repositories. An important question in this context is whether singling-out is sufficient for identifying a patient, and if not, what is in general required for identification. To provide hints for an answer, we will extend previous works on the concept of identity and extend the sortal concept, stemming from analytical philosophy and upper-level ontologies. A sortal is a concept that is associated with an identity criterion. For example, the concept "set" has the identity criterion "having the same members". Based on a description of a record linkage setting, we operationalize the sortal concept by providing a distinction between the digital representation of a person (d-sortal) and the person in flesh (b-sortal)
    corecore