Difference between revisions of "Main Page/Featured article of the week/2019"
Shawndouglas (talk | contribs) (Added last week's article of the week) |
Shawndouglas (talk | contribs) (Added last week's article of the week) |
||
(16 intermediate revisions by the same user not shown) | |||
Line 17: | Line 17: | ||
<!-- Below this line begin pasting previous news --> | <!-- Below this line begin pasting previous news --> | ||
<h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: May 20–26:</h2> | <h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: September 9–15:</h2> | ||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig2 Oyashi GeospatialHlth2019 14-1.png|240px]]</div> | |||
'''"[[Journal:Smart grids and ethics: A case study|Smart grids and ethics: A case study]]"''' | |||
This case study explores the principal ethical issues that occur in the use of smart information systems (SIS) in smart grids and offers suggestions as to how they might be addressed. Key issues highlighted in the literature are reviewed. The empirical case study describes one of the largest distribution system operators (DSOs) in the Netherlands. The aim of this case study is to identify which ethical issues arise from the use of SIS in smart grids, the current efforts of the organization to address them, and whether practitioners are facing additional issues not addressed in current literature. The literature review highlights mainly ethical issues around health and safety, privacy and informed consent, cyber-risks and energy security, affordability, equity, and sustainability. The key topics raised by interviewees revolved around privacy and to some extent [[cybersecurity]]. ('''[[Journal:Smart grids and ethics: A case study|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: September 2–8:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Hatzakis ORBITJ2019 2-2.png|240px]]</div> | |||
'''"[[Journal:Japan Aerospace Exploration Agency’s public-health monitoring and analysis platform: A satellite-derived environmental information system supporting epidemiological study|Japan Aerospace Exploration Agency’s public-health monitoring and analysis platform: A satellite-derived environmental information system supporting epidemiological study]]"''' | |||
Since the 1970s, Earth-observing satellites collect increasingly detailed [[Environmental monitoring|environmental information]] on land cover, meteorological conditions, environmental variables, and air pollutants. This [[information]] spans the entire globe, and its acquisition plays an important role in epidemiological analysis when ''in situ'' data are unavailable or spatially and/or temporally sparse. In this paper, we present the development of the Japan Aerospace Exploration Agency’s (JAXA) Public-health Monitoring and Analysis Platform, a user-friendly, web-based system providing environmental data on shortwave radiation, rainfall, soil moisture, the normalized difference vegetation index, aerosol optical thickness, land surface temperature and altitude. ('''[[Journal:Japan Aerospace Exploration Agency’s public-health monitoring and analysis platform: A satellite-derived environmental information system supporting epidemiological study|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: August 26–September 1:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Anwar PLOSMed2019 16-5.png|240px]]</div> | |||
'''"[[Journal:Heart failure and healthcare informatics|Heart failure and healthcare informatics]]"''' | |||
As biomedical research expands our armory of effective, evidence-based therapies, there is a corresponding need for high-quality implementation science—the study of strategies to integrate and embed research advances into [[Health care|clinical practice]]. Large-scale collection and analysis of routinely collected healthcare data may facilitate this in three main ways. Firstly, evaluation of key healthcare metrics can help to identify the areas of practice that differ most from guideline recommendations. Secondly, with sufficiently granular data, it may be possible to detect the underlying drivers of deficiencies in practice. Thirdly, longitudinal data collection should enable us to evaluate large-scale policy initiatives and compare the effectiveness of differing strategies on process and patient outcomes. ('''[[Journal:Heart failure and healthcare informatics|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: August 19–25:</h2> | |||
'''"[[Journal:Cyberbiosecurity for biopharmaceutical products|Cyberbiosecurity for biopharmaceutical products]]"''' | |||
Cyberbiosecurity is an emerging discipline that addresses the unique vulnerabilities and threats that occur at the intersection of cyberspace and [[biotechnology]]. Advances in technology and manufacturing are increasing the relevance of cyberbiosecurity to the biopharmaceutical manufacturing community in the United States. Threats may be associated with the biopharmaceutical product itself or with the digital thread of manufacturing of biopharmaceuticals, including those that relate to supply chain and cyberphysical systems. Here, we offer an initial examination of these cyberbiosecurity threats as they stand today, as well as introductory steps toward paths for mitigation of cyberbiosecurity risk for a safer, more secure future. ('''[[Journal:Cyberbiosecurity for biopharmaceutical products|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: August 12–18:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig2 Matielo Publications2018 6-4.png|240px]]</div> | |||
'''"[[Journal:A bibliometric analysis of Cannabis publications: Six decades of research and a gap on studies with the plant|A bibliometric analysis of ''Cannabis'' publications: Six decades of research and a gap on studies with the plant]]"''' | |||
In this study we performed a bibliometric analysis focusing on the general patterns of scientific publications about ''[[wikipedia:Cannabis|Cannabis]]'', revealing their trends and limitations. Publications related to ''Cannabis'', released from 1960 to 2017, were retrieved from the Scopus database using six search terms. The search term “[[wikipedia:Genetics|Genetics]]” returned 53.4% of publications, while “forensic genetics” and “[[wikipedia:Traceability|traceability]]” represented 2.3% and 0.1% of the publications, respectively. However, 43.1% of the studies were not directly related to ''Cannabis'' and, in some cases, ''Cannabis'' was just used as an example in the text. A significant increase in publications was observed after 2001, with most of the publications coming from Europe, followed by North America. Although the term "''Cannabis''" was found in the title, abstract, or keywords of 1284 publications, we detected a historical gap in studies on the plant. ('''[[Journal:A bibliometric analysis of Cannabis publications: Six decades of research and a gap on studies with the plant|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: August 5–11:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Mudge AnalBioChem2017 409-12.gif|240px]]</div> | |||
'''"[[Journal:Leaner and greener analysis of cannabinoids|Leaner and greener analysis of cannabinoids]]"''' | |||
There is an explosion in the number of [[Laboratory|labs]] analyzing [[wikipedia:Cannabinoid|cannabinoids]] in marijuana ([[wikipedia:Cannabis|''Cannabis sativa'' L.]], Cannabaceae); however, existing methods are inefficient, require expert analysts, and use large volumes of potentially environmentally damaging [[wikipedia:Solvent|solvents]]. The objective of this work was to develop and validate an accurate method for analyzing cannabinoids in cannabis raw materials and finished products that is more efficient and uses fewer toxic solvents. A method using [[high-performance liquid chromatography]] (HPLC) with [[Chromatography detector|diode-array detection]] (DAD) was developed for eight cannabinoids in ''Cannabis'' flowers and oils using a statistically guided optimization plan based on the principles of green chemistry. A single-laboratory validation determined the linearity, selectivity, accuracy, repeatability, intermediate precision, limit of detection, and limit of quantitation of the method. Amounts of individual cannabinoids above the limit of quantitation in the flowers ranged from 0.02 to 14.9% concentration (w/w), with repeatability ranging from 0.78 to 10.08% relative standard deviation. ('''[[Journal:Leaner and greener analysis of cannabinoids|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: July 29–August 4:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Brusniak BMCBioinformatics2019 20.png|240px]]</div> | |||
'''"[[Journal:Laboratory information management software for engineered mini-protein therapeutic workflow|Laboratory information management software for engineered mini-protein therapeutic workflow]]"''' | |||
Protein-based therapeutics are one of the fastest growing classes of novel medical interventions in areas such as cancer, infectious disease, and inflammation. Protein engineering plays an important role in the optimization of desired therapeutic properties such as reducing immunogenicity, increasing stability for storage, increasing target specificity, etc. One category of protein therapeutics is nature-inspired bioengineered cystine-dense peptides (CDPs) for various biological targets. These engineered proteins are often further modified by synthetic chemistry. For example, candidate mini-proteins can be conjugated into active small molecule drugs. We refer to modified mini-proteins as "optides" (optimized peptides). To efficiently serve the multidisciplinary lab scientists with varied therapeutic portfolio research goals in a non-commercial setting, a cost-effective, extendable [[laboratory information management system]] (LIMS) is/was needed. ('''[[Journal:Laboratory information management software for engineered mini-protein therapeutic workflow|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: July 22–28:</h2> | |||
'''"[[Journal:Defending our public biological databases as a global critical infrastructure|Defending our public biological databases as a global critical infrastructure]]"''' | |||
Progress in modern biology is being driven, in part, by the large amounts of freely available data in public resources such as the International Nucleotide Sequence Database Collaboration (INSDC), the world's primary database of biological sequence (and related) [[information]]. INSDC and similar databases have dramatically increased the pace of fundamental biological discovery and enabled a host of innovative therapeutic, diagnostic, and forensic applications. However, as high-value, openly shared resources with a high degree of assumed trust, these repositories share compelling similarities to the early days of the internet. Consequently, as public biological databases continue to increase in size and importance, we expect that they will face the same threats as undefended cyberspace. There is a unique opportunity, before a significant breach and loss of trust occurs, to ensure they evolve with quality and security as a design philosophy rather than costly “retrofitted” mitigations. This perspective article surveys some potential quality assurance and security weaknesses in existing open [[Genomics|genomic]] and [[Proteomics|proteomic]] repositories, describes methods to mitigate the likelihood of both intentional and unintentional errors, and offers recommendations for risk mitigation based on lessons learned from [[cybersecurity]]. ('''[[Journal:Defending our public biological databases as a global critical infrastructure|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: July 15–21:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig4 Ebnehoseini OAccessMacJofMedSci2019 7-9.png|240px]]</div> | |||
'''"[[Journal:Determining the hospital information system (HIS) success rate: Development of a new instrument and case study|Determining the hospital information system (HIS) success rate: Development of a new instrument and case study]]"''' | |||
A [[hospital information system]] (HIS) is a type of health information system which is widely used in clinical settings. Determining the success rate of a HIS is an ongoing area of research since its implications are of interest for researchers, physicians, and managers. In the present study, we develop a novel instrument to measure HIS success rate based on users’ viewpoints in a teaching [[hospital]]. The study was conducted in Ibn-e Sina and Dr. Hejazi Psychiatry Hospital and education center in Mashhad, Iran. The instrument for data collection was a self-administered structured questionnaire based on the information systems success model (ISSM), covering seven dimensions, which includes system quality, [[information]] quality, service quality, system use, usefulness, satisfaction, and net benefits. The verification of content validity was carried out by an expert panel. The internal consistency of dimensions was measured by Cronbach’s alpha. Pearson’s correlation coefficient was calculated to evaluate the significance of associations between dimensions. The HIS success rate on users’ viewpoints was determined. ('''[[Journal:Determining the hospital information system (HIS) success rate: Development of a new instrument and case study|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: July 08–14:</h2> | |||
'''"[[Journal:Smart information systems in cybersecurity: An ethical analysis|Smart information systems in cybersecurity: An ethical analysis]]"''' | |||
This report provides an overview of the current implementation of smart information systems (SIS) in the field of [[cybersecurity]]. It also identifies the positive and negative aspects of using SIS in cybersecurity, including ethical issues which could arise while using SIS in this area. One company working in the industry of telecommunications (Company A) is analysed in this report. Further specific ethical issues that arise when using SIS technologies in Company A are critically evaluated. Finally, conclusions are drawn on the case study, and areas for improvement are suggested. Increasing numbers of items are becoming connected to the internet. Cisco—a global leader in information technology, networking, and [[cybersecurity]]—estimates that more than 8.7 billion devices were connected to the internet by the end of 2012, a number that will likely rise to over 40 billion in 2020. ('''[[Journal:Smart information systems in cybersecurity: An ethical analysis|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: July 01–07:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig3 Mudge ScientificReports2018 8.png|240px]]</div> | |||
'''"[[Journal:Chemometric analysis of cannabinoids: Chemotaxonomy and domestication syndrome|Chemometric analysis of cannabinoids: Chemotaxonomy and domestication syndrome]]"''' | |||
''[[wikipedia:Cannabis|Cannabis]]'' is an interesting domesticated crop with a long history of cultivation and use. [[wikipedia:Cannabis strains|Strains]] have been selected through informal breeding programs with undisclosed parentage and criteria. The term “strain” refers to minor morphological differences and grower branding rather than distinct cultivated varieties. We hypothesized that strains sold by different licensed producers are chemotaxonomically indistinguishable and that the commercial practice of identifying strains by the ratio of total Δ9-[[wikipedia:Tetrahydrocannabinol|tetrahydrocannabinol]] (THC) and [[wikipedia:Cannabidiol|cannabidiol]] (CBD) is insufficient to account for the reported human health outcomes. We used targeted [[wikipedia:Metabolomics|metabolomics]] to analyze 11 known [[wikipedia:Cannabinoid|cannabinoid]]s and an untargeted metabolomics approach to identify 21 unknown cannabinoids. Five clusters of chemotaxonomically indistinguishable strains were identified from the 33 commercial products. Only three of the clusters produce cannabidiolic acid (CBDA) in significant quantities, while the other two clusters redirect metabolic resources toward the [[wikipedia:Tetrahydrocannabinolic acid|tetrahydrocannabinolic acid]] (THCA) production pathways. ('''[[Journal:Chemometric analysis of cannabinoids: Chemotaxonomy and domestication syndrome|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: June 24–30:</h2> | |||
'''"[[Journal:National and transnational security implications of asymmetric access to and use of biological data|National and transnational security implications of asymmetric access to and use of biological data]]"''' | |||
Biology and [[biotechnology]] have changed dramatically during the past 20 years, in part because of increases in computational capabilities and use of engineering principles to study biology. The advances in supercomputing, data storage capacity, and [[Cloud computing|cloud platforms]] enable scientists throughout the world to generate, analyze, share, and store vast amounts of data, some of which are biological and much of which may be used to understand the human condition, agricultural systems, evolution, and environmental ecosystems. These advances and applications have enabled: (1) the emergence of data science, which involves the development of new algorithms to analyze and [[Data visualization|visualize data]]; and (2) the use of engineering approaches to manipulate or create new biological organisms that have specific functions, such as production of industrial chemical precursors and development of environmental bio-based sensors. Several biological sciences fields harness the capabilities of computer, data, and engineering sciences, including synthetic biology, precision medicine, precision agriculture, and systems biology. These advances and applications are not limited to one country. This capability has economic and physical consequences but is vulnerable to unauthorized intervention. ('''[[Journal:National and transnational security implications of asymmetric access to and use of biological data|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: June 17–23:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Tab4 Wholey FrontPubHealth2019 6.jpg|240px]]</div> | |||
'''"[[Journal:Developing workforce capacity in public health informatics: Core competencies and curriculum design|Developing workforce capacity in public health informatics: Core competencies and curriculum design]]"''' | |||
We describe a master’s level [[public health informatics]] (PHI) curriculum to support workforce development. Public health decision-making requires intensive [[information management]] to organize responses to health threats and develop effective health education and promotion. PHI competencies prepare the public health workforce to design and implement these information systems. The objective for a master's and certificate in PHI is to prepare public health informaticians with the competencies to work collaboratively with colleagues in public health and other health professions to design and develop information systems that support population health improvement. The PHI competencies are drawn from computer, information, and organizational sciences. A curriculum is proposed to deliver the competencies, and the results of a pilot PHI program are presented. Since the public health workforce needs to use information technology effectively to improve population health, it is essential for public health academic institutions to develop and implement PHI workforce training programs. ('''[[Journal:Developing workforce capacity in public health informatics: Core competencies and curriculum design|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: June 10–16:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Schabacker FrontBioengBiotech2019 7.jpg|240px]]</div> | |||
'''"[[Journal:Assessing cyberbiosecurity vulnerabilities and infrastructure resilience|Assessing cyberbiosecurity vulnerabilities and infrastructure resilience]]"''' | |||
The convergence of advances in [[biotechnology]] with [[laboratory automation]], access to data, and computational biology has democratized biotechnology and accelerated the development of new therapeutics. However, increased access to biotechnology in the digital age has also introduced additional security concerns and ultimately spawned the new discipline of cyberbiosecurity, which encompasses [[cybersecurity]], cyber-physical security, and biosecurity considerations. With the emergence of this new discipline comes the need for a logical, repeatable, and shared approach for evaluating facility and system vulnerabilities to cyberbiosecurity threats. In this paper, we outline the foundation of an assessment framework for cyberbiosecurity, accounting for both security and resilience factors in the physical and cyber domains. This is a unique problem set, yet despite the complexity of the cyberbiosecurity field in terms of operations and governance, previous experience developing and implementing physical and cyber assessments applicable to a wide spectrum of critical infrastructure sectors provides a validated point of departure for a cyberbiosecurity assessment framework. ('''[[Journal:Assessing cyberbiosecurity vulnerabilities and infrastructure resilience|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: June 3–9:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Tab2 Haugsbakken NordicJOfSciTechStud2018 6-1.png|240px]]</div> | |||
'''"[[Journal:What is the meaning of sharing: Informing, being informed or information overload?|What is the meaning of sharing: Informing, being informed or information overload?]]"''' | |||
In recent years, several Norwegian public organizations have introduced enterprise social media platforms (ESMPs). The rationale for their implementation pertains to a goal of improving internal communications and work processes in organizational life. Such objectives can be attained on the condition that employees adopt the platform and embrace the practice of sharing. Although sharing work on ESMPs can bring benefits, making sense of the practice of sharing constitutes a challenge. In this regard, the paper performs an analysis on a case whereby an ESMP was introduced in a Norwegian public organization. The analytical focus is on the challenges and experiences of making sense of the practice of sharing. The research results show that users faced challenges in making sense of sharing. ('''[[Journal:What is the meaning of sharing: Informing, being informed or information overload?|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: May 27–June 2:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Murch FrontBioengBiotech2019 6.jpg|240px]]</div> | |||
'''"[[Journal:Cyberbiosecurity: An emerging new discipline to help safeguard the bioeconomy|Cyberbiosecurity: An emerging new discipline to help safeguard the bioeconomy]]"''' | |||
Cyberbiosecurity is being proposed as a formal new enterprise which encompasses cybersecurity, cyber-physical security, and biosecurity as applied to biological and biomedical-based systems. In recent years, an array of important meetings and public discussions, commentaries, and publications have occurred that highlight numerous vulnerabilities. While necessary first steps, they do not provide a systematized structure for effectively promoting communication, education and training, elucidation, and prioritization for analysis, research, development, testing and evaluation, and implementation of scientific and technological standards of practice, policy, or regulatory or legal considerations for protecting the bioeconomy. Further, experts in biosecurity and cybersecurity are generally not aware of each other's domains, expertise, perspectives, priorities, or where mutually supported opportunities exist for which positive outcomes could result. ('''[[Journal:Cyberbiosecurity: An emerging new discipline to help safeguard the bioeconomy|Full article...]]''')<br /> | |||
|- | |||
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: May 20–26:</h2> | |||
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Duncan FrontBioengBiotech2019 7.jpg|240px]]</div> | <div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Duncan FrontBioengBiotech2019 7.jpg|240px]]</div> | ||
'''"[[Journal:Cyberbiosecurity: A new perspective on protecting U.S. food and agricultural system|Cyberbiosecurity: A new perspective on protecting U.S. food and agricultural system]]"''' | '''"[[Journal:Cyberbiosecurity: A new perspective on protecting U.S. food and agricultural system|Cyberbiosecurity: A new perspective on protecting U.S. food and agricultural system]]"''' |
Revision as of 14:19, 16 September 2019
If you're looking for other "Article of the Week" archives: 2014 - 2015 - 2016 - 2017 - 2018 - 2019 |
Featured article of the week archive - 2019
Welcome to the LIMSwiki 2019 archive for the Featured Article of the Week.
Featured article of the week: September 9–15:"Smart grids and ethics: A case study" This case study explores the principal ethical issues that occur in the use of smart information systems (SIS) in smart grids and offers suggestions as to how they might be addressed. Key issues highlighted in the literature are reviewed. The empirical case study describes one of the largest distribution system operators (DSOs) in the Netherlands. The aim of this case study is to identify which ethical issues arise from the use of SIS in smart grids, the current efforts of the organization to address them, and whether practitioners are facing additional issues not addressed in current literature. The literature review highlights mainly ethical issues around health and safety, privacy and informed consent, cyber-risks and energy security, affordability, equity, and sustainability. The key topics raised by interviewees revolved around privacy and to some extent cybersecurity. (Full article...)
|