scholarly journals Trust in Centralized Large-Scale Data Repository: A Qualitative Analysis

2019 ◽  
Vol 15 (4) ◽  
pp. 365-378 ◽  
Author(s):  
Reinder Broekstra ◽  
Judith Aris-Meijer ◽  
Els Maeckelberghe ◽  
Ronald Stolk ◽  
Sabine Otten

Exponential increases in digital data and calls for participation in human research raise questions about when and why individuals voluntarily provide personal data. We conducted 36 in-depth interviews with ex-participants, participants, and nonparticipants in a biobank to identify key factors influencing trust in centralized large-scale data repository for human research. Our findings indicated that trust depends strongly on whether such data repository benefits the public, the interests of data collectors, the characteristics of the collected data, and application of informed consent for retaining control over personal data. Concerns about the aims and range of data repository appeared to influence withdrawal of participation. Our findings underscore ethical and practical issues relating to data collection and consent procedures in human research.

Neurology ◽  
2021 ◽  
pp. 10.1212/WNL.0000000000012884
Author(s):  
Hugo Vrenken ◽  
Mark Jenkinson ◽  
Dzung Pham ◽  
Charles R.G. Guttmann ◽  
Deborah Pareto ◽  
...  

Multiple sclerosis (MS) patients have heterogeneous clinical presentations, symptoms and progression over time, making MS difficult to assess and comprehend in vivo. The combination of large-scale data-sharing and artificial intelligence creates new opportunities for monitoring and understanding MS using magnetic resonance imaging (MRI).First, development of validated MS-specific image analysis methods can be boosted by verified reference, test and benchmark imaging data. Using detailed expert annotations, artificial intelligence algorithms can be trained on such MS-specific data. Second, understanding disease processes could be greatly advanced through shared data of large MS cohorts with clinical, demographic and treatment information. Relevant patterns in such data that may be imperceptible to a human observer could be detected through artificial intelligence techniques. This applies from image analysis (lesions, atrophy or functional network changes) to large multi-domain datasets (imaging, cognition, clinical disability, genetics, etc.).After reviewing data-sharing and artificial intelligence, this paper highlights three areas that offer strong opportunities for making advances in the next few years: crowdsourcing, personal data protection, and organized analysis challenges. Difficulties as well as specific recommendations to overcome them are discussed, in order to best leverage data sharing and artificial intelligence to improve image analysis, imaging and the understanding of MS.


Author(s):  
Andrew Clark ◽  
Sarah Fléche ◽  
Richard Layard ◽  
Nattavudh Powdthavee ◽  
George Ward

What makes people happy? This book seeks to revolutionize how we think about human priorities and to promote public policy changes that are based on what really matters to people. Drawing on a range of evidence using large-scale data from various countries, the authors consider the key factors that affect human well-being, including income, education, employment, family conflict, health, childcare, and crime. The book offers a new perspective on life satisfaction and well-being over the life course and a new vision for how we might become more healthy, happy, and whole.


2020 ◽  
Author(s):  
Jifan Yu ◽  
Gan Luo ◽  
Tong Xiao ◽  
Qingyang Zhong ◽  
Yuquan Wang ◽  
...  

2011 ◽  
Vol 6 (1) ◽  
pp. 58-69 ◽  
Author(s):  
Ixchel M. Faniel ◽  
Ann Zimmerman

There is almost universal agreement that scientific data should be shared for use beyond the purposes for which they were initially collected. Access to data enables system-level science, expands the instruments and products of research to new communities, and advances solutions to complex human problems. While demands for data are not new, the vision of open access to data is increasingly ambitious. The aim is to make data accessible and usable to anyone, anytime, anywhere, and for any purpose. Until recently, scholarly investigations related to data sharing and reuse were sparse. They have become more common as technology and instrumentation have advanced, policies that mandate sharing have been implemented, and research has become more interdisciplinary. Each of these factors has contributed to what is commonly referred to as the "data deluge". Most discussions about increases in the scale of sharing and reuse have focused on growing amounts of data. There are other issues related to open access to data that also concern scale which have not been as widely discussed: broader participation in data sharing and reuse, increases in the number and types of intermediaries, and more digital data products. The purpose of this paper is to develop a research agenda for scientific data sharing and reuse that considers these three areas.


Author(s):  
Ronald M. Baecker

Throughout history, humanity has invented valuable technologies and ways to organize society. These innovations are typically accompanied by risks. Fire cooks food, and also provides heat on cold nights. Yet, when left unchecked, fire can cause huge damage as well as loss of life. Cities enabled new forms of community and commerce. However, they brought us more thievery, and made it easier for epidemics to spread. The automobile allowed a separation of locales for work and residence; trucks allowed goods to be shipped long distances. But vehicular accidents have caused far greater injury and loss of life than did mishaps with horses and mules. Information technology, like other technologies, has potential for good and for harm. In the first six chapters, we introduced aspects of human activity, such as education, medicine, and government, in which IT has been transformative and mostly positive. The next three chapters examine areas in which the negatives of IT are dominant, in which risks seem everywhere. This chapter focuses on security. IT security flaws are exploited by outsiders for personal or political gain. In Chapter 8 we shall look at safety, where the risks are often injury or loss of life. In Chapter 9, we shall look at privacy, where the risks are exposure of private, confidential, and even sensitive information. Security is the attribute of a computer system that ensures that it can continue to function properly after an attack. Attacks against computer systems happen routinely now, are in the news almost every week, and are accelerating in numbers and in impact. Damage to both individuals and organizations—financial losses, chaos, and deteriorating morale— is severe. We shall provide a primer on the multitude of ways computer systems, from large networks to mobile phones, can be ‘hacked’ so that they no longer function properly. We shall define the most common kinds of destructive software, often called malware. We will discuss large-scale data breaches, which now happen frequently and expose the personal data of millions to billions of people. The word hackers refers to individuals who disrupt digital technologies and thereby damage the functioning of an institution or a society.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Michael J Lee ◽  
Kaylee A Byers ◽  
Susan M Cox ◽  
Craig Stephen ◽  
David M Patrick ◽  
...  

Abstract Rats evoke public health and economic concern in cities globally. Rapid urbanization exacerbates pre-existing rat problems, requiring the development and adoption of more effective methods of prevention, monitoring and mitigation. While previous studies have indicated that city-wide municipal management approaches often fail, such outcomes are often left without specific explanation. To determine how municipalities could more effectively develop and implement large-scale approaches, we interviewed stakeholders in municipal rat management programs to document their opinions, recommendations and the challenges they face. Using a thematic framework method, this study collates and analyzes in-depth interviews with 39 stakeholders from seven cities across the United States. Overall, stakeholders’ recommendations for municipal rat management aligned with many conceptual attributes of effective management reported in the literature. Specifically, stakeholders highlighted the need to prioritize the reduction of resources available to sustain rat infestations (e.g. food, water and harborage), to focus on proactive (vs. reactive) measures, and to implement large-scale data collection to increase the efficiency of cross-city rat control. Stakeholders also suggested novel approaches to management, such as mitigating rat-associated risks for vulnerable populations specifically and developing tailored initiatives based on the specific needs and desires of residents. We synthesize these recommendations in light of reported barriers, such as resource limitations, and consider several opportunities that may help municipalities reconceptualize their approaches to city-wide rat management.


Author(s):  
Jack Hile

The increasing prevalence of large-scale data breaches prompted Australia to strengthen the Privacy Act by enacting the Privacy Amendment (Notifiable Data Breaches) Act to regulate the behaviour of entities entrusted with personal data. However, this paper argues that these legislative instruments are ineffective when dealing with data breaches and their associated problems. In supporting this conclusion, this paper first develops a criterion for effective data breach law, and then evaluates the Australian framework against this criterion to determine its operational effectiveness. In addition, this paper analyses practical developments in the area of data-breach law to garner insights as to how the Australian framework can be made more effective. Ultimately, this paper concludes that the Australian framework is ineffective when dealing with large-scale data breaches, and recommends future legislative amendment as a means of bolstering its effectiveness.


2009 ◽  
Vol 28 (11) ◽  
pp. 2737-2740
Author(s):  
Xiao ZHANG ◽  
Shan WANG ◽  
Na LIAN

Sign in / Sign up

Export Citation Format

Share Document