98 research outputs found

    Perceived privacy violations through information sharing with external parties – Diving into user perceptions and reactions

    Get PDF
    We see more and more incidents where user information collected by digital services is shared with external parties. Users becoming aware of such information (mis-)uses may perceive a privacy violation. In this study, we want to understand when, why, and how the sharing of information with external parties is perceived as a privacy violation and what consequences such a perception entails. Employing the Critical Incident Technique (CIT) as a methodology, we inductively derive characteristics of real-world incidents of perceived privacy violations due to the sharing of information with external parties and users’ perceptions and reactions thereto. We present preliminary results of our first qualitative data analysis as well subsequent steps to advance this research in progress

    Unraveling User Perceptions of Interorganizational Information Sharing

    Get PDF
    Collecting large amounts of user information is becoming an increasingly important source of value for businesses. Such data sets may be expanded through engaging in value co-creation with other organizations. Sharing user information across organizations, however, might evoke users’ privacy concerns. Existing mechanisms and concepts developed in prior information privacy research on sharing information between one user and one organization may no longer apply as multiple organizations become involved. This creates the necessity to understand more granularly how users perceive privacy situations that involve sharing their information across organizations – and how their concerns may be alleviated through control mechanisms. Employing the lens of Communication Privacy Management (CPM) theory, we conceptualize this phenomenon as Interorganizational Information Sharing (IIS) and theorize on perceived uncertainty and control to unravel user perceptions in IIS. We present our ideas for a research model, as well as our planned methodology for empirical validation

    PERCEIVED PRIVACY VIOLATIONS THROUGH UNAUTHORIZED SECONDARY USE – DIVING INTO USERS’ PERCEPTIONS AND RESPONSES

    Get PDF
    We see more and more incidents where users’ information collected by digital services is shared with external parties. Users becoming aware of such information (mis-)uses may perceive a privacy violation. In this study, we want to understand when, why, and how such external unauthorized secondary use (EUSU) is perceived as a privacy violation and what consequences such a perception entails. Employing the Critical Incident Technique (CIT), we inductively derive characteristics of real-world incidents of perceived privacy violations through EUSU and users’ perceptions and responses thereto. We present preliminary results of our qualitative data analysis as well as potential contributions of this research-in-progress study. As a next step, we plan to relate characteristics with responses through Qualitative Comparative Analysis (QCA)

    An occurrence of apnea, bradycardia, and desaturation events resulting in a delay of discharge in late preterm and full term infants

    Get PDF
    In a 5-year retrospective study, we identified a population of late preterm and full term infants with apnea, bradycardia, and oxygen desaturation (ABD) events as the last discharge-delaying diagnosis

    Spielerische Kompetenzentwicklung zur Vermittlung des Industrie 4.0 Gedanken an weiterbildungsferne Mitarbeiter

    Get PDF
    Industrie 4.0 bedeutet nicht nur einen Wandel der technischen Möglichkeiten und Arbeitsbedingungen, sondern auch einen Bedarf an neuen, sich kontinuierlich weiterentwickelnden Kompetenzen und die Bereitschaft der Beschäftigten, Veränderungen mitzugestalten. Spielerische Ansätze der Kompetenzentwicklung können v.a. bei weiterbildungsfernen Mitarbeitern hilfreich sein, um das komplexe Thema verständlich zu vermitteln. Der Beitrag beschreibt ein Seminarkonzept mit integriertem Brettspiel, mit dem Teilnehmer anhand eines fiktiven Unternehmens (Müller GmbH) die Transformation eines Unternehmens in die Industrie 4.0 spielerisch nachvollziehen. Dieses Konzept erweist sich in einer ersten Evaluation als durchaus vielversprechend

    Integrated multiomic approach for identification of novel immunotherapeutic targets in AML

    Get PDF
    Background Immunotherapy of acute myeloid leukemia has experienced considerable advances, however novel target antigens continue to be sought after. To this end, unbiased approaches for surface protein detection are limited and integration with other data types, such as gene expression and somatic mutational burden, are poorly utilized. The Cell Surface Capture technology provides an unbiased, discovery-driven approach to map the surface proteins on cells of interest. Yet, direct utilization of primary patient samples has been limited by the considerable number of viable cells needed. Methods Here, we optimized the Cell Surface Capture protocol to enable direct interrogation of primary patient samples and applied our optimized protocol to a set of samples from patients with acute myeloid leukemia (AML) to generate the AML surfaceome. We then further curated this AML surfaceome to exclude antigens expressed on healthy tissues and integrated mutational burden data from hematologic cancers to further enrich for targets which are likely to be essential to leukemia biology. Finally, we validated our findings in a separate cohort of AML patient samples. Results Our protocol modifications allowed us to double the yield in identified proteins and increased the specificity from 54 to 80.4% compared to previous approaches. Using primary AML patient samples, we were able to identify a total of 621 surface proteins comprising the AML surfaceome. We integrated this data with gene expression and mutational burden data to curate a set of robust putative target antigens. Seventy-six proteins were selected as potential candidates for further investigation of which we validated the most promising novel candidate markers, and identified CD148, ITGA4 and Integrin beta-7 as promising targets in AML. Integrin beta-7 showed the most promising combination of expression in patient AML samples, and low or absent expression on healthy hematopoietic tissue. Conclusion Taken together, we demonstrate the feasibility of a highly optimized surfaceome detection method to interrogate the entire AML surfaceome directly from primary patient samples and integrate this data with gene expression and mutational burden data to achieve a robust, multiomic target identification platform. This approach has the potential to accelerate the unbiased target identification for immunotherapy of AML
    • …
    corecore