25 research outputs found
In-the-wild residual data research and privacy
As the world becomes increasingly dependent on technology, researchers endeavor to understand how technology is used, the impact it has on everyday life and the life-cycle and span of digital information. In doing so, researchers are
increasingly gathering `real-world' or `in the wild' residual data, obtained from a variety of sources without the explicit consent of the original owners.
This data gathering raises significant concerns regarding privacy, ethics and legislation, as well as practical considerations concerning investigator training, data storage, overall security and disposal. This paper surveys recent studies of residual data gathered in the wild and analyses the challenges that were faced. Taking these insights, the paper presents a compendium of practices
for addressing the issues that arise in in the wild residual data research. The practices presented in this paper can be used to critique current projects and assess the feasibility of proposed future research
Cold and heterogeneous T cell repertoire is associated with copy number aberrations and loss of immune genes in small-cell lung cancer
Small-cell lung cancer (SCLC) is speculated to harbor complex genomic intratumor heterogeneity (ITH) associated with high recurrence rate and suboptimal response to immunotherapy. Here, using multi-region whole exome/T cell receptor (TCR) sequencing as well as immunohistochemistry, we reveal a rather homogeneous mutational landscape but extremely cold and heterogeneous TCR repertoire in limited-stage SCLC tumors (LS-SCLCs). Compared to localized non-small cell lung cancers, LS-SCLCs have similar predicted neoantigen burden and genomic ITH, but significantly colder and more heterogeneous TCR repertoire associated with higher chromosomal copy number aberration (CNA) burden. Furthermore, copy number loss of IFN-Îł pathway genes is frequently observed and positively correlates with CNA burden. Higher mutational burden, higher T cell infiltration and positive PD-L1 expression are associated with longer overall survival (OS), while higher CNA burden is associated with shorter OS in patients with LS-SCLC
Assessment of variation in the alberta context tool: the contribution of unit level contextual factors and specialty in Canadian pediatric acute care settings
Background: There are few validated measures of organizational context and none that we located are
parsimonious and address modifiable characteristics of context. The Alberta Context Tool (ACT) was developed to
meet this need. The instrument assesses 8 dimensions of context, which comprise 10 concepts. The purpose of
this paper is to report evidence to further the validity argument for ACT. The specific objectives of this paper are
to: (1) examine the extent to which the 10 ACT concepts discriminate between patient care units and (2) identify
variables that significantly contribute to between-unit variation for each of the 10 concepts.
Methods: 859 professional nurses (844 valid responses) working in medical, surgical and critical care units of 8
Canadian pediatric hospitals completed the ACT. A random intercept, fixed effects hierarchical linear modeling
(HLM) strategy was used to quantify and explain variance in the 10 ACT concepts to establish the ACTâs ability to
discriminate between units. We ran 40 models (a series of 4 models for each of the 10 concepts) in which we
systematically assessed the unique contribution (i.e., error variance reduction) of different variables to between-unit
variation. First, we constructed a null model in which we quantified the variance overall, in each of the concepts.
Then we controlled for the contribution of individual level variables (Model 1). In Model 2, we assessed the
contribution of practice specialty (medical, surgical, critical care) to variation since it was central to construction of
the sampling frame for the study. Finally, we assessed the contribution of additional unit level variables (Model 3).
Results: The null model (unadjusted baseline HLM model) established that there was significant variation between
units in each of the 10 ACT concepts (i.e., discrimination between units). When we controlled for individual
characteristics, significant variation in the 10 concepts remained. Assessment of the contribution of specialty to
between-unit variation enabled us to explain more variance (1.19% to 16.73%) in 6 of the 10 ACT concepts. Finally,
when we assessed the unique contribution of the unit level variables available to us, we were able to explain
additional variance (15.91% to 73.25%) in 7 of the 10 ACT concepts.
Conclusion: The findings reported here represent the third published argument for validity of the ACT and adds
to the evidence supporting its use to discriminate patient care units by all 10 contextual factors. We found
evidence of relationships between a variety of individual and unit-level variables that explained much of this
between-unit variation for each of the 10 ACT concepts. Future research will include examination of the
relationships between the ACTâs contextual factors and research utilization by nurses and ultimately the
relationships between context, research utilization, and outcomes for patients
Are public officials really less satisfied than private sector workers?A comparative study in Brazil
Investigating Information Security Risks of Mobile Device Use within Organizations
Mobile devices, such as phones, tablets and laptops, expose businesses and governments to a multitude of information security risks. While Information Systems research has focused on the security and privacy aspects from the end-user perspective regarding mobile devices, very little research has been conducted within corporate environments. In this work, thirty-two mobile devices were returned by employees in a global Fortune 500 company. In the empirical analysis, a number of significant security risks were uncovered which may have led to leakage of valuable intellectual property or exposed the organization to future legal conflicts. The research contribution is an initial empirical report highlighting examples of corporate policy breaches by users along with providing a foundation for future research on the security risks of the pervasive presence of mobile devices in corporate environments
Cloud Security Challenges: Investigating Policies, Standards, And Guidelines In A Fortune 500 Organization
Cloud computing is quickly becoming pervasive in todayâs globally integrated networks. The cloud offers organizations opportunities to potentially deploy software and data solutions that are accessible through numerous mechanisms, in a multitude of settings, at a reduced cost with increased reliability and scalability. The increasingly pervasive and ubiquitous nature of the cloud creates an environment that is potentially conducive to security risks. While previous discussions have focused on security and privacy issues in the cloud from the end-users perspective, minimal empirical research has been conducted from the perspective of a corporate environment case study. This paper presents the results of an initial case study identifying real-world information security documentation issues for a Global Fortune 500 organization, should the organization decide to implement cloud computing services in the future. The paper demonstrates the importance of auditing policies, standards and guidelines applicable to cloud computing environments along with highlighting potential corporate concerns. Furthermore, the paper provides a foundation for future analysis and research regarding implementation concerns for corporate cloud computing applications and services