Difference between revisions of "Main Page/Featured article of the week/2022"

From LIMSWiki
Jump to navigationJump to search
(Added last week's article of the week)
(Added last week's article of the week)
Line 17: Line 17:


<!-- Below this line begin pasting previous news -->
<!-- Below this line begin pasting previous news -->
<h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: August 01-07:</h2>
<h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: August 08–14:</h2>
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig3 Krantz FrontPlantSci2021 12.jpg|240px]]</div>
'''"[[Journal:Data management and modeling in plant biology|Data management and modeling in plant biology]]"'''
 
The study of plant-environment interactions is a multidisciplinary research field. With the emergence of quantitative large-scale and high-throughput techniques, the amount and dimensionality of experimental data have strongly increased. Appropriate strategies for data storage, [[Information management|management]], and [[Data analysis|evaluation]] are needed to make efficient use of experimental findings. Computational approaches to [[data mining]] are essential for deriving statistical trends and signatures contained in data matrices. Although, current biology is challenged by high data dimensionality in general, this is particularly true for plant biology. As sessile organisms, plants have to cope with environmental fluctuations ... ('''[[Journal:Data management and modeling in plant biology|Full article...]]''')<br />
|-
|<br /><h2 style="font-size:105%; font-weight:bold; text-align:left; color:#000; padding:0.2em 0.4em; width:50%;">Featured article of the week: August 01-07:</h2>
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Damerow DataSciJourn21 20-1.png|240px]]</div>
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig1 Damerow DataSciJourn21 20-1.png|240px]]</div>
'''"[[Journal:Sample identifiers and metadata to support data management and reuse in multidisciplinary ecosystem sciences|Sample identifiers and metadata to support data management and reuse in multidisciplinary ecosystem sciences]]"'''
'''"[[Journal:Sample identifiers and metadata to support data management and reuse in multidisciplinary ecosystem sciences|Sample identifiers and metadata to support data management and reuse in multidisciplinary ecosystem sciences]]"'''

Revision as of 16:58, 15 August 2022

Featured article of the week archive - 2022

Welcome to the LIMSwiki 2022 archive for the Featured Article of the Week.

Featured article of the week: August 08–14:

Fig3 Krantz FrontPlantSci2021 12.jpg

"Data management and modeling in plant biology"

The study of plant-environment interactions is a multidisciplinary research field. With the emergence of quantitative large-scale and high-throughput techniques, the amount and dimensionality of experimental data have strongly increased. Appropriate strategies for data storage, management, and evaluation are needed to make efficient use of experimental findings. Computational approaches to data mining are essential for deriving statistical trends and signatures contained in data matrices. Although, current biology is challenged by high data dimensionality in general, this is particularly true for plant biology. As sessile organisms, plants have to cope with environmental fluctuations ... (Full article...)


Featured article of the week: August 01-07:

Fig1 Damerow DataSciJourn21 20-1.png

"Sample identifiers and metadata to support data management and reuse in multidisciplinary ecosystem sciences"

Physical samples are foundational entities for research across the biological, Earth, and environmental sciences. Data generated from sample-based analyses are not only the basis of individual studies, but can also be integrated with other data to answer new and broader-scale questions. Ecosystem studies increasingly rely on multidisciplinary team-based science to study climate and environmental changes. While there are widely adopted conventions within certain domains to describe sample data, these have gaps when applied in a multidisciplinary context. In this study, we reviewed existing practices for identifying, characterizing, and linking related environmental samples. We then tested practicalities of assigning persistent identifiers to samples, with standardized metadata, in a pilot field test involving eight United States Department of Energy projects. ... (Full article...)


Featured article of the week: July 25–31:

Fig1 Fraggetta Diagnostics21 11-11.png

"Best practice recommendations for the implementation of a digital pathology workflow in the anatomic pathology laboratory by the European Society of Digital and Integrative Pathology (ESDIP)"

The interest in implementing digital pathology (DP) workflows to obtain whole slide image (WSI) files for diagnostic purposes has increased in the last few years. The increasing performance of technical components and the Food and Drug Administration (FDA) approval of systems for primary diagnosis led to increased interest in applying DP workflows. However, despite this revolutionary transition, real-world data suggest that a fully digital approach to histological workflow has been implemented in only a minority of pathology laboratories. The objective of this study is to facilitate the implementation of DP workflows in pathology laboratories, helping those involved in this process of transformation with: (a) how to identify the scope and the boundaries of the DP transformation; (b) how to introduce automation to reduce errors; (c) how to introduce appropriate quality control to guarantee the safety of the process; and (d) addressing the hardware and software needed to implement DP systems inside the pathology laboratory. ... (Full article...)


Featured article of the week: July 18–24:

Fig1 Liscouski DirectLabSysOnePerPersp21.png

"Directions in Laboratory Systems: One Person's Perspective"

The purpose of this work is to provide one person's perspective on planning for the use of computer systems in the laboratory, and with it a means of developing a direction for the future. Rather than concentrating on “science first, support systems second,” it reverses that order, recommending the construction of a solid support structure before populating the lab with systems and processes that produce knowledge, information, and data (K/I/D). This material is intended for those working in laboratories of all types. The biggest benefit will come to those working in startup labs since they have a clean slate to work with, as well as those freshly entering into scientific work as it will help them understand the roles of various systems. Those working in existing labs will also benefit by seeing a different perspective than they may be used to, giving them an alternative path for evaluating their current structure and how they might adjust it to improve operations ... (Full article...)


Featured article of the week: July 11–17:

Fig3 Arifin JofMedBio21 40.png

"Error evaluation in the laboratory testing process and laboratory information systems"

The laboratory testing process consists of five analysis phases, featuring the total testing process (TTP) framework. Activities in laboratory processing, including those of testing, are error-prone and affect the use of laboratory information systems (LIS). This study seeks to identify error factors related to system use, as well as the first and last phases of the laboratory testing process, using a proposed framework known as the "total testing process for laboratory information systems" (TTP-LIS). We conducted a qualitative case study evaluation in two private hospitals and a medical laboratory. We collected data using interviews, observations, and document analysis methods involving physicians, nurses, an information technology officer, and the laboratory staff... (Full article...)


Featured article of the week: July 3–10:

Fig1 Mrazek Diagnostics21 11-7.png

"Laboratory demand management strategies: An overview"

Inappropriate laboratory test selection in the form of overutilization as well as underutilization, frequently occurs despite available guidelines. There is broad approval among laboratory specialists and clinicians that demand management (DM) strategies are useful tools to avoid this issue. Most of these tools are based on automated algorithms or other types of machine learning. This review summarizes the available DM strategies that may be adopted to local settings. We believe that artificial intelligence (AI) may help to further improve these available tools. (Full article...)


Featured article of the week: June 27—July 3:

Fig1 Ismail Sensors21 21-11.png

"A scoping review of integrated blockchain-cloud architecture for healthcare: Applications, challenges, and solutions"

Blockchain is a disruptive technology for shaping the next era of healthcare systems striving for efficient and effective patient care. This is thanks to its peer-to-peer, secure, and transparent characteristics. On the other hand, cloud computing made its way into the healthcare system thanks to its elasticity and cost-effective nature. However, cloud-based systems fail to provide a secured and private patient-centric cohesive view to multiple healthcare stakeholders. In this situation, blockchain provides solutions to address security and privacy concerns of the cloud because of its decentralization feature combined with data security and privacy, while cloud provides solutions to the blockchain scalability and efficiency challenges. Therefore a novel paradigm of blockchain-cloud integration (BcC) emerges for the domain of healthcare ... (Full article...)


Featured article of the week: June 20—26:

Fig1 Sun JBiosafetyBiosecurity2021 3-1.jpg

"Laboratory information management system for the biosafety laboratory: Safety and efficiency"

The laboratory information management system (LIMS) has been widely used to facilitate laboratory activities. However, the current LIMS does not contain functions to improve the safety of laboratory work, which is a major concern of biosafety laboratories (BSLs). With significant biosafety information needing to be managed and an increasing number of biosafety-related research projects underway, it is worthy of expanding the current framework of LIMS and building a system that is more suitable for BSL usage. Such a system should carefully trade off between the safety and efficiency of regular lab activities, allowing laboratory staff to conduct their research as freely as possible while also ensuring their and the environment’s safety. In order to achieve this goal, relevant information on the type of research, laboratory personnel, experimental materials, and experimental equipment must be collected and fully utilized by a centralized system and its databases. (Full article...)


Featured article of the week: June 13—19:

Fig2 Starks JPathInfo2021 12.jpg

"Use of middleware data to dissect and optimize hematology autoverification"

Hematology analysis comprises some of the highest volume tests run in clinical laboratories. Autoverification of hematology results using computer-based rules reduces turnaround time for many specimens, while strategically targeting specimen review by technologist or pathologist. Autoverification rules had been developed over a decade at an 800-bed tertiary/quarternary care academic medical central laboratory serving both adult and pediatric populations. In the process of migrating to newer hematology instruments, we analyzed the rates of the autoverification rules/flags most commonly associated with triggering manual review. We were particularly interested in rules that on their own often led to manual review in the absence of other flags. Prior to the study, autoverification rates were 87.8% (out of 16,073 orders) for complete blood count (CBC) if ordered as a panel and 85.8% (out of 1,940 orders) for CBC components ordered individually (not as the panel). (Full article...)


Featured article of the week: June 6—12:

Fig2 Gonzalez-Granadillo Sensors21 21-16.png

"Automated cyber and privacy risk management toolkit"

Addressing cyber and privacy risks has never been more critical for organizations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic approach that combines several appropriate risk sources as input to risk mitigation tools. In addition, cyber risk assessment primarily investigates cyber risks as the consequence of vulnerabilities and threats that threaten assets of the investigated infrastructure. In fact, cyber risk assessment is decoupled from privacy impact assessment, which aims to detect privacy-specific threats and assess the degree of compliance with data protection legislation. Furthermore, a privacy impact assessment (PIA) is conducted in a proactive manner during the design phase of a system, combining processing activities and their inter-dependencies with assets, vulnerabilities, real-time threats and personally identifiable information (PII) that may occur during the dynamic lifecycle of systems. (Full article...)


Featured article of the week: May 30–June 5:

Fig4 Demelo Information21 12-8.png

"Design of generalized search interfaces for health informatics"

In this paper, we investigate ontology-supported interfaces for health informatics search tasks involving large document sets. We begin by providing background on health informatics, machine learning, and ontologies. We review leading research on health informatics search tasks to help formulate high-level design criteria. We then use these criteria to examine traditional design strategies for search interfaces. To demonstrate the utility of the criteria, we apply them to the design of the ONTology-supported Search Interface (ONTSI), a demonstrative, prototype system. ONTSI allows users to plug-and-play document sets and expert-defined domain ontologies through a generalized search interface. ONTSI’s goal is to help align users’ common vocabulary with the domain-specific vocabulary of the plug-and-play document set. We describe the functioning and utility of ONTSI in health informatics search tasks through a workflow and a scenario. We conclude with a summary of ongoing evaluations, limitations, and future research. (Full article...)


Featured article of the week: May 23–29:

Fig4 Jofre ApplSci2021 11-15.png

"Cybersecurity and privacy risk assessment of point-of-care systems in healthcare: A use case approach"

Point-of-care (POC) systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal health information, and, consequently, their cybersecurity and privacy requirements are of crucial importance. However, assessing these requirements is a significant task. In this work, we propose a use-case approach to assess specifications of cybersecurity and privacy requirements of POC systems in a structured and self-contained form. Such an approach is appropriate since use cases are one of the most common means adopted by developers to derive requirements. As a result, we detail a use case approach in the framework of a real-based healthcare IT infrastructure that includes a health information system, integration engines, application servers, web services, medical devices, smartphone apps, and medical modalities (all data simulated) together with the interaction with participants. Since our use case also sustains the analysis of cybersecurity and privacy risks in different threat scenarios, it also supports decision making and the analysis of compliance considerations. (Full article...)


Featured article of the week: May 16–22:

Abst1 Hauschild iScience2021 24-7.jpg

"Fostering reproducibility, reusability, and technology transfer in health informatics"

Computational methods can transform healthcare. In particular, health informatics combined with artificial intelligence (AI) has shown tremendous potential when applied in various fields of medical research and has opened a new era for precision medicine. The development of reusable biomedical software for research or clinical practice is time-consuming and requires rigorous compliance with quality requirements as defined by international standards. However, research projects rarely implement such measures, hindering smooth technology transfer to the research community or manufacturers, as well as reproducibility and reusability. Here, we present a guideline for quality management systems (QMS) for academic organizations incorporating the essential components, while confining the requirements to an easily manageable effort. It provides a starting point to effortlessly implement a QMS tailored to specific needs and greatly facilitates technology transfer in a controlled manner, thereby supporting reproducibility and reusability. (Full article...)


Featured article of the week: May 09–15:

Fig4 Davies BMJHealthCareInfo2021 28-1.jpg

"Development of a core competency framework for clinical informatics"

Up to this point, there has not been a national core competency framework for clinical informatics in the U.K. Here we report on the final two iterations of work carried out towards the formation of a national core competency framework. This follows an initial systematic literature review of existing skills and competencies and a job listing analysis. An iterative approach was applied to framework development. Using a mixed-methods design, we carried out semi-structured interviews with participants involved in informatics (n = 15). The framework was updated based on the interview findings and was subsequently distributed as part of a bespoke online digital survey for wider participation (n = 87). The final version of the framework is based on the findings of the survey.(Full article...)


Featured article of the week: May 02–08:

Fig1 White PractLabMed2021 26.jpg

"Strategies for laboratory professionals to drive laboratory stewardship"

Appropriate laboratory testing is critical in today's healthcare environment that aims to improve patient care while reducing cost. In recent years, laboratory stewardship has emerged as a strategy for assuring quality in laboratory medicine with the goal of providing the right test for the right patient at the right time. Implementing a laboratory stewardship program now presents a valuable opportunity for laboratory professionals to exercise leadership within health systems and to drive change toward realizing aims in healthcare. The proposed framework for program implementation includes five key elements: 1) a clear vision and organizational alignment; 2) appropriate skills for program execution and management; 3) resources to support the program; 4) incentives to motivate participation; and, 5) a plan of action that articulates program objectives and metrics. This framework builds upon principles of change management, with emphasis on engagement with clinical and administrative stakeholders and the use of clinical data as the basis for change. These strategies enable laboratory professionals to cultivate organizational support for improving laboratory use and take a leading role in providing high-quality patient care. (Full article...)


Featured article of the week: April 25–May 01:

Industry 4.0.png

"Cybersecurity impacts for artificial intelligence use within Industry 4.0"

In today’s modern digital manufacturing landscape, new and emerging technologies can shape how an organization can compete, while others will view those technologies as a necessity to survive, as manufacturing has been identified as a critical infrastructure. Universities struggle to hire university professors that are adequately trained or willing to enter academia due to competitive salary offers in the industry. Meanwhile, the demand for people knowledgeable in fields such as artificial intelligence, data science, and cybersecurity continuously rises, with no foreseeable drop in demand in the next several years. This results in organizations deploying technologies with a staff that inadequately understands what new cybersecurity risks they are introducing into the company. This work examines how organizations can potentially mitigate some of the risk associated with integrating these new technologies and developing their workforce to be better prepared for looming changes in technological skill need. (Full article...)


Featured article of the week: April 18–24:

Tab1 Li RivItal21 3-1.png

"Cross-border data transfer regulation in China"

With the growing participation of emerging countries in global data governance, the traditional legislative paradigm dominated by the European Union and the United States is constantly being analyzed and reshaped. It is of particular importance for China to establish the regulatory framework of cross-border data transfer, for not only does it involve the rights of Chinese citizens and entities, but also the concepts of cyber-sovereignty and national security, as well as the framing of global cyberspace rules. China continues to leverage data sovereignty to persuade lawmakers to support the development of critical technology in digital domains and infrastructure construction. This paper aims to systematically and chronologically describe Chinese regulations for cross-border data exchange. Enacted and draft provisions—as well as binding and non-binding regulatory rules—are studied, and various positive dynamic developments in the framing of China’s cross-border data regulation are shown ... (Full article...)


Featured article of the week: April 11–17:

Fig1 Carriço FrontWater2021 3.jpg

"Data and information systems management for urban water infrastructure condition assessment"

Most of the urban water infrastructure around the world was built several decades ago and nowadays they are deteriorated. As such, the assets that constitute these infrastructures need to be updated or replaced. Since most of the assets are buried, water utilities face the challenge of deciding where, when, and how to update or replace those assets. Condition assessment is a vital component of any planned update and replacement activities and is mostly based on the data collected from the managed networks. This collected data needs to be organized and managed in order to be transformed into useful information. Nonetheless, the large amount of assets and data involved makes data and information management a challenging task for water utilities, especially those with as lower digital maturity level. This paper highlights the importance of data and information systems' management for urban water infrastructure condition assessment based on the authors' experiences. (Full article...)


Featured article of the week: April 04–10:

Fig1 Georgiou FrontDigHlth2021 3.jpg

"Diagnostic informatics: The role of digital health in diagnostic stewardship and the achievement of excellence, safety, and value"

Diagnostic investigations (i.e., pathology laboratory analysis and medical imaging) aim to increase the certainty of the presence of or absence of disease by supporting the process of differential diagnosis, support clinical management, and monitor a patient's trajectory (e.g., disease progression or response to treatment). Digital health—defined as the collection, storage, retrieval, transmission, and utilization of data, information, and knowledge to support healthcare—has become an essential component of the diagnostic investigational process, helping to facilitate the accuracy and timeliness of information transfer and enhance the effectiveness of decision-making processes. Digital health is also important to diagnostic stewardship, which involves coordinated guidance and interventions to ensure the appropriate utilization of diagnostic tests for therapeutic decision-making. (Full article...)


Featured article of the week: March 28–April 03:

Fig1 Jin BMCMedInfoDecMak21 21.png

"Development and implementation of an LIS-based validation system for autoverification toward zero defects in the automated reporting of laboratory test results"

For laboratory informatics applications, validation of the autoverification function is one of the critical steps to confirm its effectiveness before use. It is crucial to verify whether the programmed algorithm follows the expected logic and produces the expected results. This process has always relied on the assessment of human–machine consistency and is mostly a manually recorded and time-consuming activity with inherent subjectivity and arbitrariness that cannot guarantee a comprehensive, timely, and continuous effectiveness evaluation of the autoverification function. To overcome these inherent limitations, we independently developed and implemented a laboratory information system (LIS)-based validation system for autoverification. We developed a correctness verification and integrity validation method (hereinafter referred to as the "new method") in the form of a human–machine dialog ... (Full article...)


Featured article of the week: March 21–27:

Fig8 Spanakis FrontDigHlth2021 3.jpg

"Emerging and established trends to support secure health information exchange"

This work aims to provide information, guidelines, established practices and standards, and an extensive evaluation on new and promising technologies for the implementation of a secure information sharing platform for health-related data. We focus strictly on the technical aspects and specifically on the sharing of health information, studying innovative techniques for secure information sharing within the healthcare domain, and we describe our solution and evaluate the use of blockchain methodologically for integrating within our implementation. To do so, we analyze health information sharing within the concept of the PANACEA project, which facilitates the design, implementation, and deployment of a relevant platform. The research presented in this paper provides evidence and argumentation toward advanced and novel implementation strategies for a state-of-the-art information sharing environment; a description of high-level requirements for the national and cross-border transfer of data between different healthcare organizations ... (Full article...)


Featured article of the week: March 14–20:

Fig2 Sivan Symmetry21 13-5.png

"Security and privacy in cloud-based eHealth systems"

Cloud-based healthcare computing has changed the face of healthcare in many ways. The main advantages of cloud computing in healthcare are scalability of the required service and the provision to upscale or downsize the data storge, particularly in conjunction with approaches to artificial intelligence (AI) and machine learning. This paper examines various research studies to explore the utilization of intelligent techniques in health systems and mainly focuses on the security and privacy issues in the current technologies. Despite the various benefits related to cloud computing applications for healthcare, there are different types of management, technology handling, security measures, and legal issues to be considered and addressed. The key focus of this paper is to address the increased demand for cloud computing and its definition, technologies widely used in healthcare, their problems and possibilities, and the way protection mechanisms are organized and prepared when the company chooses to implement the latest evolving service model. (Full article...)


Featured article of the week: March 7–13:

Fig11 Davies PLOSCompBio20 16-11.png

"Using interactive digital notebooks for bioscience and informatics education"

Interactive digital notebooks provide an opportunity for researchers and educators to carry out data analysis and report results in a single digital format. Further to just being digital, the format allows for rich content to be created in order to interact with the code and data contained in such a notebook to form an educational narrative. This primer introduces some of the fundamental aspects involved in using Jupyter Notebook in an educational setting for teaching in the bioinformatics and health informatics disciplines. We also provide two case studies that detail 1. how we used Jupyter Notebooks to teach non-coders programming skills on a blended master’s degree module for a health informatics program, and 2. a fully online distance learning unit on programming for a postgraduate certificate (PG Cert) in clinical bioinformatics, with a more technical audience. (Full article...)


Featured article of the week: February 28–March 6:

Fig1 Liscouski AppInfoSciWork21.png

"The Application of Informatics to Scientific Work: Laboratory Informatics for Newbies"

The purpose of this piece is to introduce people who are not intimately familiar with laboratory work to the basics of laboratory operations and the role that informatics can play in assisting scientists, engineers, and technicians in their efforts. The concepts are important because they provide a functional foundation for understanding lab work and how that work is done in the early part of the twenty-first century (things will change, just wait for it). This material is intended for anyone who is interested in seeing how modern informatics tools can help those doing scientific work. It will provide an orientation to scientific and laboratory work, as well as the systems that have been developed to make that work more productive. (Full article...)


Featured article of the week: February 21–27:

Fig4 Celesti Sensors20 20-9.png

"Blockchain-based healthcare workflow for IoT-connected laboratories in federated hospital clouds"

In a pandemic-related situation such as that caused by the SARS-CoV-2 virus, the need for telemedicine and other distanced services becomes dramatically fundamental to reducing the movement of patients, and by extension reducing the risk of infection in healthcare settings. One potential avenue for achieving this is through leveraging cloud computing and internet of things (IoT) technologies. This paper proposes an IoT-connected laboratory service where clinical exams are performed on patients directly in a hospital by technicians through the use of IoT medical diagnostic devices, with results automatically being sent via the hospital's cloud to doctors of federated hospitals for validation and/or consultation. In particular, we discuss a distributed scenario where nurses, technicians, and medical doctors belonging to different hospitals cooperate through their federated hospital clouds ... (Full article...)


Featured article of the week: February 14–20:

Fig2 Seifert JAMIAOpen20 3.png

"Informatics-driven quality improvement in the modern histology lab"

Laboratory information systems (LISs) and data visualization techniques have untapped potential in anatomic pathology laboratories. The pre-built functionalities of an LIS do not address all the needs of a modern histology laboratory. For instance, “go live” is not the end of LIS customization, only the beginning. After closely evaluating various histology lab workflows, we implemented several custom data analytics dashboards and additional LIS functionalities to monitor and address weaknesses. Herein, we present our experience with LIS and data-tracking solutions that improved trainee education, slide logistics, staffing and instrumentation lobbying, and task tracking. The latter was addressed through the creation of a novel “status board” akin to those seen in inpatient wards. These use-cases can benefit other histology laboratories. (Full article...)


Featured article of the week: February 07–13:

Fig1 Xie BMCBioinfo21 22.png

"Popularity and performance of bioinformatics software: The case of gene set analysis"

Gene set analysis (GSA) is arguably the method of choice for the functional interpretation of omics results. This work explores the popularity and the performance of all the GSA methodologies and software published during the 20 years since its inception. "Popularity" is estimated according to each paper's citation counts, while "performance" is based on a comprehensive evaluation of the validation strategies used by papers in the field, as well as the consolidated results from the existing benchmark studies. Regarding popularity, data is collected into an online open database ("GSARefDB") which allows browsing bibliographic and method-descriptive information from 503 GSA paper references; regarding performance, we introduce a repository of Jupyter Notebook workflows and Shiny apps for automated benchmarking of GSA methods (“GSA-BenchmarKING”). After comparing popularity versus performance, results show discrepancies between the most popular and the best performing GSA methods. (Full article...)


Featured article of the week: January 31–February 06:

Fig3 Chong ITMWebConf21 36.png

"Privacy-preserving healthcare informatics: A review"

The electronic health record (EHR) is the key to an efficient healthcare service delivery system. The publication of healthcare data is highly beneficial to healthcare industries and government institutions to support a variety of medical and census research. However, healthcare data contains sensitive information of patients, and the publication of such data could lead to unintended privacy disclosures. In this paper, we present a comprehensive survey of the state-of-the-art privacy-enhancing methods that ensure a secure healthcare data sharing environment. We focus on the recently proposed schemes based on data anonymization and differential privacy approaches in the protection of healthcare data privacy. We highlight the strengths and limitations of the two approaches and discuss some promising future research directions in this area. (Full article...)


Featured article of the week: January 24–30:

Fig5 Jebali JofInfoTelec2020 5-1.jpg

"Secure data outsourcing in presence of the inference problem: Issues and directions"

With the emergence of the cloud computing paradigms, secure data outsourcing—moving some or most data to a third-party provider of secure data management services—has become one of the crucial challenges of modern computing. Data owners place their data among cloud service providers (CSPs) in order to increase flexibility, optimize storage, enhance data manipulation, and decrease processing time. Nevertheless, from a security point of view, access control proves to be a major concern in this situation seeing that the security policy of the data owner must be preserved when data is moved to the cloud. The lack of a comprehensive and systematic review on this topic in the available literature motivated us to review this research problem. Here, we discuss current and emerging research on privacy and confidentiality concerns in cloud-based data outsourcing and pinpoint potential issues that are still unresolved. (Full article...)


Featured article of the week: January 17–23:

Fig2 Casey ForensicSciInt2020 316.jpg

"Digital transformation risk management in forensic science laboratories"

Technological advances are changing how forensic laboratories operate in all forensic disciplines, not only digital. Computers support workflow management and enable evidence analysis (physical and digital), while new technology enables previously unavailable forensic capabilities. Used properly, the integration of digital systems supports greater efficiency and reproducibility, and drives digital transformation of forensic laboratories. However, without the necessary preparations, these digital transformations can undermine the core principles and processes of forensic laboratories. Forensic preparedness concentrating on digital data reduces the cost and operational disruption of responding to various kinds of problems, including misplaced exhibits, allegations of employee misconduct, disclosure requirements, and information security breaches ... (Full article...)


Featured article of the week: January 10–16:

Fig6 Ogle FrontBigData2021 4.jpg

"Named data networking for genomics data management and integrated workflows"

Advanced imaging and DNA sequencing technologies now enable the diverse biology community to routinely generate and analyze terabytes of high-resolution biological data. The community is rapidly heading toward the petascale in single-investigator laboratory settings. As evidence, the National Center for Biotechnology Information (NCBI) Sequence Read Archive (SRA) central DNA sequence repository alone contains over 45 petabytes of biological data. Given the geometric growth of this and other genomics repositories, an exabyte of mineable biological data is imminent. The challenges of effectively utilizing these datasets are enormous, as they are not only large in size but also stored in various geographically distributed repositories such as those hosted by the NCBI, as well as in the DNA Data Bank of Japan (DDBJ), European Bioinformatics Institute (EBI), and NASA’s GeneLab. (Full article...)


Featured article of the week: January 3–9:

Fig8 Lee Sustain20 13-1.png

"Implement an international interoperable PHR by FHIR: A Taiwan innovative application"

Personal health records (PHRs) have many benefits for things such as health surveillance, epidemiological surveillance, self-control, links to various services, public health and health management, and international surveillance. The implementation of an international standard for interoperability is essential to accessing PHRs. In Taiwan, the nationwide exchange platform for electronic medical records (EMRs) has been in use for many years. The Health Level Seven International (HL7) Clinical Document Architecture (CDA) was used as the standard for those EMRs. However, the complication of implementing CDA became a barrier for many hospitals to realizing standard EMRs. In this study, we implemented a Fast Healthcare Interoperability Resources (FHIR)-based PHR transformation process, including a user interface module to review the contents of PHRs. (Full article...)