secondary usage
Recently Published Documents


TOTAL DOCUMENTS

26
(FIVE YEARS 6)

H-INDEX

4
(FIVE YEARS 1)

2021 ◽  
Vol 5 (3) ◽  
pp. 298
Author(s):  
Mohammad Aljanabi ◽  
Shams N. Abd-Alwahab ◽  
RD Rohmat Saedudin ◽  
Hind Raad Ebraheem ◽  
- Defni ◽  
...  

Cloud computing represents a kind of computing that is based on the sharing of computing resources instead of possessing personal devices or local servers for handling several applications and tasks. This kind of computing includes three distinguished kinds of services provided remotely for clients that can be accessed by using the Internet. Typically, clients work on paying annual or monthly service fees for suppliers, in order to gain access to systems that work on delivering infrastructure as a service, platforms as a service, and software as a service for any subscriber. In this paper, the usefulness and the abuse of the cloud computing are briefly discussed and presented by highlighting the influences of cloud computing in different areas. Moreover, this paper also presents the kinds and services of cloud. In addition, the security issues that cover the cloud security solution requirements, and the cloud security issues, which is one of the biggest issues in recent years in cloud computing were presented in this paper. The security requirement that needs by the cloud computing covers privacy, lack of user control, unauthorized secondary usage, and finally data proliferation and data flow. Meanwhile, the security issues cover including ownership of device, the trust issue and legel aspects. To overcome the security issues, this paper also presents the solution at the end of this paper.


Author(s):  
E. A. C. P. Karunarathne ◽  
W. A. P. Madhushan

Most Sri Lankan Industries discharge or dispose of many waste materials in large quantities in solid, liquid, and gaseous forms. Due to the high cost of treatment, many industries dispose of wastes either to dumpsites or lowlands through third-party contractors. The haphazard disposal of untreated waste is growing into a significant problem in the country. As a result, this study was conducted to identify the application options to treat or reuse the valuable waste generated by some selected industries by implementing the industrial symbiosis process in an industrial zone. Personal interviews and questionnaires were used as the methodological tools of the study to collect firm-related waste. Material properties and feasibility facts were mainly considered concerning industrial symbiosis application potential with respect to the waste receivers' and doners' perspectives. Through the study, potential secondary usage of waste was identified, avoiding direct discharge into the environment. The result from the evaluation indicates some support to the theories that industrial symbiosis can have benefits both from an economic and environmental point of view.


10.2196/27591 ◽  
2021 ◽  
Author(s):  
Christophe Gaudet-Blavignac ◽  
Jean Louis Raisaro ◽  
Vasundra Touré ◽  
Sabine Österle ◽  
Katrin Crameri ◽  
...  

2020 ◽  
Author(s):  
Christophe Gaudet-Blavignac ◽  
Vasiliki Foufi ◽  
Mina Bjelogrlic ◽  
Christian Lovis

BACKGROUND Interoperability and secondary usage of data is a challenge in healthcare. Specifically, reuse of clinical free-text is an unresolved problem. SNOMED CT is growing into the universal language of healthcare and presents characteristics similar to a natural language. Its usage to represent clinical free-text could constitute a solution to improve interoperability. OBJECTIVE Although the usage of SNOMED and SNOMED CT has already been subject of review, its specific usage to process and represent unstructured data such as clinical free-text has not been the focus of an evaluation. This work aims at better understanding the use of SNOMED CT for NLP in medicine by reviewing its usage on clinical free-text. METHODS A scoping review has been performed on the topic, by searching on MedLine, Embase and Web of Science for publications featuring free-text processing and SNOMED CT. A recursive reference review was made to broaden the scope of the research. The review covered the type of data processed; the language targeted; the goal of the mapping to SNOMED CT; the method used; and finally, the specific software used. RESULTS A final set of 76 publications was selected for extensive study. The most frequent types of document are complementary exam reports (23.68%) and narrative notes (21.05%). The language focus is English in 90.79% of publications. The mapping to SNOMED CT is the final goal of the research in 21.05% of publications, part of the final goal in 32.89% and a step toward another goal in 46.05%.The main targets of the mapping to SNOMED CT are information extraction (38.94%), feature in a classification task (23.01%) and data normalization (20.35%). The method used for the mapping is rule-based in 69.74% of publications, manual in 14.47%, hybrid in 10.53%, and machine learning in 5.26%. 12 different software have been used to map text to SNOMED CT concepts, the most frequent being Medtex, MCVS and MTERMS. Full terminology was used in 64.47% of publications while only a subset of it was used in 30.26% publications. Post-coordination was proposed in 17.11% of publications and only 5.26% of publications mentioned specifically the usage of the SNOMED CT compositional grammar. CONCLUSIONS SNOMED CT has been largely used to process free-text data, most frequently with rule-based approaches, in English. However, to this date there is no easy solution for mapping free-text in to SNOMED CT concepts especially on languages different than English or if post-coordination is needed. Most of the solutions conceive SNOMED CT as a simple terminology rather than as a compositional bag of ontologies. Since 2012, the number of publications on this subject by year is decreasing. However, the need for formal semantic representation of free-text in healthcare is high and automatic encoding into a compositional ontology could be a way to achieve interoperability.


2019 ◽  
Vol 70 (3) ◽  
pp. 212-218 ◽  
Author(s):  
Rasha Mahmoud ◽  
Alan R. Moody ◽  
Moran Foster ◽  
Natasha Girdharry ◽  
Loreta Sinn ◽  
...  

Purpose Secondary usage of patient data has recently become of increasing interest for the development and application of computer analytic techniques. Strict oversight of these data is required and the individual patients themselves are integral to providing guidance. We sought to understand patients' attitudes to sharing their imaging data for research purposes. These images could provide a great wealth of information for researchers. Methods Patients from the Greater Toronto Area attending Sunnybrook Health Sciences Centre for imaging (magnetic resonance imagining, computed tomography, or ultrasound) examination areas were invited to participate in an electronic survey. Results Of the 1083 patients who were approached (computed tomography 609, ultrasound 314, and magnetic resonance imaging 160), 798 (74%) agreed to take the survey. Overall median age was 60 (interquartile range = 18, Q1 = 52, Q3 = 70), 52% were women, 42% had a university degree, and 7% had no high school diploma. In terms of willingness to share de-identified medical images for research, 76% were willing (agreed and strongly agreed), while 7% refused. Most participants gave their family physicians (73%) and other physicians (57%) unconditional data access. Participants chose hospitals/research institutions to regulate electronic images databases (70%), 89% wanted safeguards against unauthorized access to their data, and over 70% wanted control over who will be permitted, for how long, and the ability to revoke that permission. Conclusions Our study found that people are willing to share their clinically acquired de-identified medical images for research studies provided that they have control over permissions and duration of access.


Author(s):  
Barry T. Radler ◽  
Gayle D. Love

The complexities of managing the data collection and data products in multidisciplinary, population-based longitudinal research on health are not readily apparent to those who use publicly available data. This chapter explores the behind-the-scenes details involved in conducting the Midlife in the United States (MIDUS) study. The objective is to explicate how such a complex investigation involving comprehensive biopsychosocial assessments, obtained on the same individuals followed repeatedly over time, is carried out. The MIDUS study includes multiple data collection projects, covering different domains of science. Such extensive data collection must be carefully sequenced and distributed across different data collection sites, while recognizing that the longitudinal research data life cycle is iterative in nature. The overarching goals are to ensure the integrity of the data collection process while generating data products that are discoverable, understandable, and well documented to promote robust primary and secondary usage of publicly available datasets.


2018 ◽  
Vol 118 (6) ◽  
pp. 1209-1228 ◽  
Author(s):  
Alex Koohang ◽  
Joanna Paliszkiewicz ◽  
Jerzy Goluchowski

Purpose The purpose of this paper is to build a research model that examines social media privacy concerns (SMPC) in relation to users’ trusting beliefs and risk beliefs. Design/methodology/approach An instrument with eight constructs (SMPC: collection, SMPC: secondary usage, SMPC: errors, SMPC: improper access, SMPC: control, SMPC: awareness, trusting beliefs and risk beliefs) was developed and administered to subjects from a mid-sized university in the USA. Collected data were analyzed using partial least square structural equation modeling. Findings The results showed that three of the six SMPC (i.e. secondary usage, improper access and awareness) were negatively and significantly associated with users’ trusting beliefs. In addition, three of the six SMPC (i.e. collection, errors and improper access) were positively and significantly associated with users’ risk beliefs. Practical implications Practical implications were aimed at the social media sites to design simple and straightforward privacy policy statements that are easy to understand; to safeguard users’ online privacy behaviors; and to develop mechanisms to protect personal information. Originality/value This study enhances the literature by contributing to a generalized knowledge of SMPC of users as they relate to their trusting beliefs and risk beliefs.


2017 ◽  
Vol 5 (1) ◽  
pp. 14-26
Author(s):  
Alex Koohang

This study attempts to empirically validate a social media sites privacy concerns instrument with six constructs (collection, secondary usage, errors, improper access, control, & awareness). Each construct includes three designated items/variables. Data were collected from 157 participants and analyzed using exploratory factor analysis. The results indicated that all six constructs of the instrument were reliable to measure social media sites privacy concerns of users. Recommendations for future research are provided.


Sign in / Sign up

Export Citation Format

Share Document