Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 20 de 100
Filtrar
1.
BMC Med Inform Decis Mak ; 24(1): 162, 2024 Jun 12.
Artigo em Inglês | MEDLINE | ID: mdl-38915012

RESUMO

Many state-of-the-art results in natural language processing (NLP) rely on large pre-trained language models (PLMs). These models consist of large amounts of parameters that are tuned using vast amounts of training data. These factors cause the models to memorize parts of their training data, making them vulnerable to various privacy attacks. This is cause for concern, especially when these models are applied in the clinical domain, where data are very sensitive. Training data pseudonymization is a privacy-preserving technique that aims to mitigate these problems. This technique automatically identifies and replaces sensitive entities with realistic but non-sensitive surrogates. Pseudonymization has yielded promising results in previous studies. However, no previous study has applied pseudonymization to both the pre-training data of PLMs and the fine-tuning data used to solve clinical NLP tasks. This study evaluates the effects on the predictive performance of end-to-end pseudonymization of Swedish clinical BERT models fine-tuned for five clinical NLP tasks. A large number of statistical tests are performed, revealing minimal harm to performance when using pseudonymized fine-tuning data. The results also find no deterioration from end-to-end pseudonymization of pre-training and fine-tuning data. These results demonstrate that pseudonymizing training data to reduce privacy risks can be done without harming data utility for training PLMs.


Assuntos
Processamento de Linguagem Natural , Humanos , Privacidade , Suécia , Anônimos e Pseudônimos , Segurança Computacional/normas , Confidencialidade/normas , Registros Eletrônicos de Saúde/normas
2.
PLoS One ; 18(8): e0290319, 2023.
Artigo em Inglês | MEDLINE | ID: mdl-37651353

RESUMO

Urinary flow measurement and colorimetry are vital medical indicators for critically ill patients in intensive care units. However, there is a clinical need for low-cost, continuous urinary flow monitoring devices that can automatically and in real-time measure urine flow. This need led to the development of a non-invasive device that is easy to use and does not require proprietary disposables. The device operates by detecting urine flow using an infrared barrier that returns an unequivocal pattern, and it is capable of measuring the volume of liquid in real-time, storing the history with a precise date, and returning alarms to detect critical trends. The device also has the ability to detect the color of urine, allowing for extended data and detecting problems in catheterized patients such as hematuria. The device is proposed as an automated clinical decision support system that utilizes the concept of the Internet of Medical Things. It works by using a LoRa communication method with the LoRaWAN protocol to maximize the distance to access points, reducing infrastructure costs in massive deployments. The device can send data wirelessly for remote monitoring and allows for the collection of data on a dashboard in a pseudonymous way. Tests conducted on the device using a gold standard medical grade infusion pump and fluid densities within the 1.005 g/ml to 1.030 g/ml urine density range showed that droplets were satisfactorily captured in the range of flows from less than 1 ml/h to 500 ml/h, which are acceptable ranges for urinary flow. Errors ranged below 15%, when compared to the values obtained by the hospital infusion pump used as gold standard. Such values are clinically adequate to detect changes in diuresis patterns, specially at low urine output ranges, related to renal disfunction. Additionally, tests carried out with different color patterns indicate that it detects different colors of urine with a precision in detecting RGB values <5%. In conclusion, the results suggest that the device can be useful in automatically monitoring diuresis and colorimetry in real-time, which can facilitate the work of nursing and provide automatic decision-making support to intensive care physicians.


Assuntos
Líquidos Corporais , Fluxômetros , Humanos , Anônimos e Pseudônimos , Colorimetria , Diurese
3.
Sensors (Basel) ; 23(11)2023 May 31.
Artigo em Inglês | MEDLINE | ID: mdl-37299944

RESUMO

The Internet of vehicles (IoVs) is an innovative paradigm which ensures a safe journey by communicating with other vehicles. It involves a basic safety message (BSM) that contains sensitive information in a plain text that can be subverted by an adversary. To reduce such attacks, a pool of pseudonyms is allotted which are changed regularly in different zones or contexts. In base schemes, the BSM is sent to neighbors just by considering their speed. However, this parameter is not enough because network topology is very dynamic and vehicles can change their route at any time. This problem increases pseudonym consumption which ultimately increases communication overhead, increases traceability and has high BSM loss. This paper presents an efficient pseudonym consumption protocol (EPCP) which considers the vehicles in the same direction, and similar estimated location. The BSM is shared only to these relevant vehicles. The performance of the purposed scheme in contrast to base schemes is validated via extensive simulations. The results prove that the proposed EPCP technique outperformed compared to its counterparts in terms of pseudonym consumption, BSM loss rate and achieved traceability.


Assuntos
Anônimos e Pseudônimos , Segurança Computacional , Internet , Comunicação
4.
Psicol. ciênc. prof ; 43: e249440, 2023. tab, graf
Artigo em Português | LILACS, Index Psicologia - Periódicos | ID: biblio-1431134

RESUMO

Este estudo tem como objetivo analisar traços da mentalidade potencialmente autoritária a partir do discurso de usuários do Facebook vinculados a páginas de cunho político autodeclarado de direita e de esquerda no Brasil. A Netnografia é utilizada como aporte metodológico para imersão on-line nas páginas "Eu era Direita e não sabia" e "Jovens de Esquerda", selecionadas por meio do Facebook Audience Insights, ferramenta disponibilizada pelo Facebook. Delas, foram extraídas oito postagens com maior engajamento (número de comentários, curtidas e compartilhamentos), identificadas pelo Netvizz. Foram coletados 3.489 comentários, os quais foram organizados em um corpus textual submetido ao software IRAMUTEQ e analisados sob a perspectiva da análise crítica imanente da teoria crítica. Como resultado, apresenta-se a forma como o pensamento autoritário se manifesta na racionalização da sociedade contemporânea e nas práticas discursivas em redes sociais on-line, enraizada no âmbito sociopolítico brasileiro, ameaçando o processo democrático e a construção de uma sociedade plural e liberta.(AU)


This study aims to analyze traits of the potentially authoritarian mentality from the speech of Facebook users linked to political pages self-declared as rightist and leftist in Brazil. Netnography is used as a methodological contribution for online immersion in the pages "Eu era Direita e não sabia" and "Jovens de Esquerda" selected via Facebook Audience Insights, a tool provided by Facebook. From these, eight posts with greater engagement (number of comments, likes and shares), identified by Netvizz, were extracted. We collected 3,489 comments, which were organized in a textual corpus submitted to IRAMUTEQ software and analyzed from the perspective of immanent critical analysis of Critical Theory. As a result, we present the way in which authoritarian thinking manifests itself in the rationalization of contemporary society and in discursive practices in online social networks, rooted in the Brazilian socio-political sphere, threatening the democratic process and the construction of a plural and free society.(AU)


Este estudio tiene como objetivo analizar las huellas de la mentalidad potencialmente autoritaria a partir de los discursos de usuarios en Facebook vinculados a páginas políticas autodeclaradas de derecha y de izquierda en Brasil. La netnografía se utiliza como marco metodológico para la inmersión en línea en las páginas "Eu era Direita e não sabia" y "Jovens de Esquerda", seleccionadas por Facebook Audience Insights, herramienta proporcionada por Facebook. Se extrajeron las ocho publicaciones con mayor compromiso (número de comentarios, gustos y compartidas), identificadas por Netvizz. Se recogieron 3.489 comentarios, los cuales fueron organizados en un corpus textual sometido al software IRAMUTEQ y analizado bajo la perspectiva del análisis crítico inmanente de la teoría crítica. Los resultados presentan la forma en que el pensamiento autoritario se manifiesta en la racionalización de la sociedad contemporánea y en prácticas discursivas en redes sociales en línea, arraigada en el ámbito sociopolítico brasileño, que amenazan el proceso democrático y la construcción de una sociedad plural y liberada.(AU)


Assuntos
Humanos , Masculino , Feminino , Política , Autoritarismo , Rede Social , Permissividade , Comunicação Persuasiva , Formulação de Políticas , Preconceito , Psicologia , Bode Expiatório , Comportamento Social , Mudança Social , Conformidade Social , Desejabilidade Social , Distância Psicológica , Predomínio Social , Identificação Social , Isolamento Social , Justiça Social , Problemas Sociais , Apoio Social , Seguridade Social , Fatores Socioeconômicos , Sociologia , Estereotipagem , Desemprego , Políticas de Controle Social , Atitude , Caráter , Conflito de Interesses , Congresso , Direitos Civis , Civilização , Segurança Computacional , Comportamento Competitivo , Participação da Comunidade , Diversidade Cultural , Feminismo , Internet , Jornalismo , Modernização do Setor Público , Crime , Cibernética , Poder Legislativo , Democracia , Denúncia de Irregularidades , Desumanização , Dissidências e Disputas , Agressão , Grupos Raciais , Economia , Avaliação de Políticas de Pesquisa , Indicadores de Sociedade da Informação , Ética , Altruísmo , Mídias Sociais , Sexismo , Discriminação Social , Dívida Externa , Habilidades Sociais , Autocontrole , Diplomacia , Difamação , Censura Científica , Governança em Saúde , Assédio não Sexual , Incivilidade , Ativismo Político , Direitos Culturais , Liberdade , Desenvolvimento Sustentável , Cyberbullying , Egocentrismo , Corrupção , Sociedade Civil , Empoderamento , Evolução Social , Derrota Social , Representação Social , Desinformação , Enquadramento Interseccional , Coesão Social , Cidadania , Bem-Estar Psicológico , Governo , Ódio , Direitos Humanos , Relações Interpessoais , Manobras Políticas , Enganação , Comportamento de Massa , Meios de Comunicação de Massa , Anônimos e Pseudônimos , Negativismo
5.
Sensors (Basel) ; 22(5)2022 Feb 22.
Artigo em Inglês | MEDLINE | ID: mdl-35270843

RESUMO

Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication and are vulnerable to insider attacks. Achieving rapid message signing and verification for authentication is challenging due to complex operations, such as bilinear pairs. This paper proposes a secure pseudonym-based conditional privacy-persevering authentication scheme for communication security in VANETs. The Elliptic Curve Cryptography (ECC) and secure hash cryptographic function were used in the proposed scheme for signing and verifying messages. After a vehicle receives a significant amount of pseudo-IDs and the corresponding signature key from the Trusted Authority (TA), it uses them to sign a message during the broadcasting process. Thus, the proposed scheme requires each vehicle to check all the broadcasting messages received. Besides, in the proposed scheme, the TA can revoke misbehaving vehicles from continuously broadcasting signed messages, thus preventing insider attacks. The security analysis proved that the proposed scheme fulfilled the security requirements, including identity privacy-preservation, message integrity and authenticity, unlinkability, and traceability. The proposed scheme also withstood common security attacks such as man-in-the-middle, impersonation, modification, and replay attacks. Besides, our scheme was resistant against an adaptive chosen-message attack under the random oracle model. Furthermore, our scheme did not employ bilinear pairing operations; therefore, the performance analysis and comparison showed a lower resulting overhead than other identity-based schemes. The computation costs of the message signing, individual signature authentication, and batch signature authentication were reduced by 49%, 33.3%, and 90.2%, respectively.


Assuntos
Anônimos e Pseudônimos , Privacidade , Comunicação , Segurança Computacional , Humanos
6.
J Parkinsons Dis ; 11(s1): S19-S25, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-34092652

RESUMO

This paper describes an advanced form of pseudonymisation in a large cohort study on Parkinson's disease, called Personalized Parkinson Project (PPP). The study collects various forms of biomedical data of study participants, including data from wearable devices with multiple sensors. The participants are all from the Netherlands, but the data will be usable by research groups worldwide on the basis of a suitable data use agreement. The data are pseudonymised, as required by Europe's General Data Protection Regulation (GDPR). The form of pseudonymisation that is used in this Parkinson project is based on cryptographic techniques and is 'polymorphic': it gives each participating research group its own 'local' pseudonyms. Still, the system is globally consistent, in the sense that if one research group adds data to PPP under its own local pseudonyms, the data become available for other groups under their pseudonyms. The paper gives an overview how this works, without going into the cryptographic details.


Assuntos
Anônimos e Pseudônimos , Segurança Computacional , Doença de Parkinson , Estudos de Coortes , Humanos , Países Baixos , Doença de Parkinson/terapia
8.
Br J Sociol ; 71(3): 572-589, 2020 Jun.
Artigo em Inglês | MEDLINE | ID: mdl-32314353

RESUMO

Name-altering practices are common in many creative fields-pen names in literature, stage names in the performing arts, and aliases in music. More than just reflecting artistic habits or responding to the need for distinctive brands, these practices can also serve as test devices to probe, validate, and guide the artists' active participation in a cultural movement. At the same time, they constitute a powerful probe to negotiate the boundaries of a subculture, especially when its features are threatened by appropriation from the mass-oriented culture. Drawing evidence from electronic music, a field where name-altering practices proliferate, we outline dynamics of pseudonymity, polyonymy, and anonymity that surround the use of aliases. We argue that name-altering practices are both a tool that artists use to probe the creative environment and a device to recursively put one's creative participation to the test. In the context of creative subcultures, name-altering practices constitute a subtle but effective form of underground testing.


Assuntos
Anônimos e Pseudônimos , Eletrônica , Música , Criatividade , Feminino , Humanos , Masculino
9.
Rev. colomb. psiquiatr ; 48(4): 198-207, oct.-dic. 2019. tab
Artigo em Espanhol | LILACS, COLNAL | ID: biblio-1098944

RESUMO

RESUMEN Objetivo: Estimar la asociación entre la adicción a internet (AI) y el rendimiento académico de los estudiantes de Odontología de la Universidad de Cartagena. Material y métodos: Estudio de corte transversal en 402 estudiantes, seleccionados de modo no probabilístico, que respondieron a un cuestionario anónimo autoaplicado que incluía variables sociodemográficas, rendimiento académico (promedio acumulado del último semestre), presencia de AI (test de Young) y variables relacionadas con la AI en función del rendimiento académico. Los datos se analizaron a partir de proporciones, relaciones entre variables con test de la X 2, y la asociación se obtuvo por razones de disparidad (OR) a través de regresión logística nominal. Resultados: El 75,3% de los estudiantes mostraban AI; el 24,63% utilizaba internet mucho menos que la población promedio; el 73,13% mostraba una AI leve; el 2,24%, una AI moderada y no hubo casos de AI grave; el 5,2% tenía bajo rendimiento académico. En el análisis multivariable, el modelo que mejor explica la AI en relación con el rendimiento académico fue: estudiar en semestres inferiores (OR = 0,54; IC95%, 0,32-0,91), estudiar en lugar distinto de la casa (OR = 3,38; IC95%, 1,71-6,68), usar elemento no portátil para estudiar (OR = 0,41; IC95%, 0,19-0,89), chatear por celular (OR = 2,43; IC95%, 1,45-3,06) y demorar más de 18 min (OR = 3,20; IC95%, 1,71-5,99) mientras se estudia. Conclusiones: El rendimiento académico no se asocia con la AI. Sin embargo, estudiar en semestres inferiores, en un lugar distinto de la casa, emplear elementos no portátiles para estudiar e invertir más de 18 min en contestar el celular y chatear mientras se estudia son covariables estadísticamente asociadas con la AI.


ABSTRACT Objective: To determine the association between Internet addiction (IA) and academic performance in dental students at the University of Cartagena. Material and methods: A cross-sectional study was conducted in 402 students included through non-probabilistic sampling who answered an anonymous and self-reporting questionnaire that included socio-demographic variables, academic performance (last semester overall grade), presence of IA (Young's Test) and covariates related to IA based on academic performance. Data were analysed by means of proportions, relationships between variables with the X 2 test and strength of association was estimated with odds ratios (OR) using nominal logistic regression. Results: Approximately 24.63% of the students used the Internet much less than the average population, but 75.3% had IA; 73.13% of cases were considered mild and 2.24% moderate. There were no severe cases. Around 5.2% had poor academic performance. In multivariate analysis, the model that best explained IA in relation to academic performance was: studying in lower-level courses (OR=0.54; 95% CI, 0.32-0.91); studying in a different places of the house (OR=3.38; 95% CI, 1.71-6.68); not using laptop for studying (OR=0.41; 95% CI, 0.19-0.89), chatting on mobile phone (OR=2.43; 95% CI, 1.45-3.06); and spending more than 18 minutes on mobile phone while studying (OR=3.20; 95% CI, 1.71-5.99). Conclusions: Academic performance was not associated with AI. However, studying in lower-level courses, in a different place of the house, not using laptop to study, and spending more than 18 minutes answering their mobile phone and chatting on mobile phone while studying were covariates statistically associated with IA.


Assuntos
Humanos , Masculino , Feminino , Adulto , Estudantes de Odontologia , Internet , Desempenho Acadêmico , Universidades , Razão de Chances , Estudos Transversais , Análise Multivariada , Telefone Celular , Ego , Anônimos e Pseudônimos
10.
BMC Med Inform Decis Mak ; 19(1): 178, 2019 09 04.
Artigo em Inglês | MEDLINE | ID: mdl-31484555

RESUMO

BACKGROUND: The collection of data and biospecimens which characterize patients and probands in-depth is a core element of modern biomedical research. Relevant data must be considered highly sensitive and it needs to be protected from unauthorized use and re-identification. In this context, laws, regulations, guidelines and best-practices often recommend or mandate pseudonymization, which means that directly identifying data of subjects (e.g. names and addresses) is stored separately from data which is primarily needed for scientific analyses. DISCUSSION: When (authorized) re-identification of subjects is not an exceptional but a common procedure, e.g. due to longitudinal data collection, implementing pseudonymization can significantly increase the complexity of software solutions. For example, data stored in distributed databases, need to be dynamically combined with each other, which requires additional interfaces for communicating between the various subsystems. This increased complexity may lead to new attack vectors for intruders. Obviously, this is in contrast to the objective of improving data protection. What is lacking is a standardized process of evaluating and reporting risks, threats and countermeasures, which can be used to test whether integrating pseudonymization methods into data collection systems actually improves upon the degree of protection provided by system designs that simply follow common IT security best practices and implement fine-grained role-based access control models. To demonstrate that the methods used to describe systems employing pseudonymized data management are currently heterogeneous and ad-hoc, we examined the extent to which twelve recent studies address each of the six basic security properties defined by the International Organization for Standardization (ISO) standard 27,000. We show inconsistencies across the studies, with most of them failing to mention one or more security properties. CONCLUSION: We discuss the degree of privacy protection provided by implementing pseudonymization into research data collection processes. We conclude that (1) more research is needed on the interplay of pseudonymity, information security and data protection, (2) problem-specific guidelines for evaluating and reporting risks, threats and countermeasures should be developed and that (3) future work on pseudonymized research data collection should include the results of such structured and integrated analyses.


Assuntos
Anônimos e Pseudônimos , Pesquisa Biomédica , Confidencialidade , Redes de Comunicação de Computadores , Segurança Computacional/normas , Humanos
11.
PLoS One ; 14(8): e0221213, 2019.
Artigo em Inglês | MEDLINE | ID: mdl-31437260

RESUMO

Intelligent Transport System (ITS) uses the IEEE 802.11P standard for the wireless communication among vehicles. A wireless ad hoc network of vehicles is established to improve road safety, comfort, security, and traffic efficiency. Wireless communication in ITS leads to many security and privacy challenges. Security and privacy of ITS are important issues that demand incorporation of confidentiality, privacy, authentication, integrity, non-repudiation, and restrictive obscurity. In order to ensure the privacy of vehicles during communication, it is required that the real identity of vehicles should not be revealed. There must be robust and efficient security and privacy mechanisms for the establishment of a reliable and trustworthy network. Therefore, we propose Advanced Strong Pseudonym based Authentication (ASPA), which is a distributed framework to handle the security and privacy issues of vehicle communications in ITS. ASPA only allows vehicles with valid pseudonyms to communicate in ITS. Pseudonyms are assigned to vehicles in a secure manner. The pseudonym mappings of vehicles are stored at different locations to avoid any chance of vehicle pseudonyms certificates linkability. In addition, the most recent communication pseudonyms of a malicious vehicle are revoked and are stored in the Certificate Revocation List (CRL) that results in small size of the CRL. Therefore, the CRL size does not increase exponentially. The distributed framework of ASPA guarantees, the vehicles privacy preservation in the real identities mapping and revocation phase. The empirical results prove that ASPA is robust and efficient with low computational cost, overhead ratio, average latency, and an increased delivery ratio.


Assuntos
Acidentes de Trânsito/prevenção & controle , Anônimos e Pseudônimos , Meios de Transporte/ética , Tecnologia sem Fio/ética , Automóveis/legislação & jurisprudência , Segurança Computacional , Humanos , Privacidade
12.
Med Sci (Paris) ; 35(4): 356-363, 2019 Apr.
Artigo em Francês | MEDLINE | ID: mdl-31038114

RESUMO

This contribution aims at analysing and presenting a comparative dimension concerning the issues raised for the upcoming French Bioethics law revision in the field of assisted reproductive technologies (ART) : access of female same-sex couples and single women to ART ; the authorization of post-mortem procreation ; enlarging eligibility criteria for oocyte self-conservation ; and lifting the anonymity of gamete donation. These questions touch at the very heart of the French bioethics model conceived in 1994, and their revision would constitute a conceptual upheaval.


Assuntos
Temas Bioéticos , Técnicas de Reprodução Assistida/ética , Técnicas de Reprodução Assistida/legislação & jurisprudência , Anônimos e Pseudônimos , Bioética/tendências , Feminino , Preservação da Fertilidade/ética , Preservação da Fertilidade/legislação & jurisprudência , Humanos , Infertilidade Feminina/psicologia , Infertilidade Feminina/terapia , Casamento , Doação de Oócitos/ética , Doação de Oócitos/legislação & jurisprudência , Concepção Póstuma/ética , Concepção Póstuma/legislação & jurisprudência , Técnicas de Reprodução Assistida/normas , Técnicas de Reprodução Assistida/tendências , Minorias Sexuais e de Gênero/legislação & jurisprudência , Pessoa Solteira/legislação & jurisprudência
13.
PLoS One ; 13(11): e0207679, 2018.
Artigo em Inglês | MEDLINE | ID: mdl-30462718

RESUMO

While the importance of social networks for health behaviors is well-recognized, relatively little is known regarding the accuracy of anonymous online communication and its impact on health behavior. In 2012, we conducted a laboratory experiment in Boston, Massachusetts with 679 individuals to understand how anonymous online communication affects individual prevention decisions. Participants had to opt for or against investing in prevention over three sessions, each consisting of 15 experimental rounds. In the third session only, participants could share their experiences with a group of 1-3 other anonymous participants after each round. Groups exchanged an average of 16 messages over the 15 rounds of the third session. 70% of messages contained information about the subject's prevention decision and the resulting health outcome. Participants were more likely to communicate when they prevented than when they did not, with prevention failures resulting in the highest probability of sending a message. Nonetheless, receiving an additional message reporting prevention increased the odds a subject would prevent by 32 percent. We find that participants tend to adopt the prevention behavior reported by others, with less weight given to the reported outcomes of prevention, suggesting that social networks may influence behaviors through more than just information provision.


Assuntos
Comportamentos Relacionados com a Saúde , Redes Sociais Online , Adulto , Algoritmos , Anônimos e Pseudônimos , Feminino , Comportamentos Relacionados com a Saúde/etnologia , Sistemas de Informação em Saúde , Estilo de Vida Saudável , Humanos , Masculino , Grupo Associado
15.
Early Hum Dev ; 124: 52-53, 2018 09.
Artigo em Inglês | MEDLINE | ID: mdl-29731263

RESUMO

The recruitment of patients must occur in accordance with approved standards. Speaking to a patient during a routine clinical consultation and offering to participate in a research, even if consented to, can only be an introduction to the recruitment process. The potential participant must then be referred to a competent person who explains the reasons for the research, why the patient is a good candidate, what the requirements from the participant will be, such as any additional visits and blood samples to be taken, how long the research will last, any compensation and what type of research is to be undertaken, such as a double blind-controlled trial and what it means. Participants must be given due time to reflect, discuss with friends or relatives, and have a contact person and number to be free to ask any questions. Their rights during the research have to be explicitly described and the extent to which the data is anonymised and protected must be explained realistically. Compensation moreover must be fair and not too enticing that it will cloud the judgement of the participant to volunteer. As the name implies the participant must remain a volunteer.


Assuntos
Pesquisa Biomédica/métodos , Seleção de Pacientes , Acesso à Informação , Anônimos e Pseudônimos , Pesquisa Biomédica/normas , Anonimização de Dados , União Europeia , Humanos
16.
Sci Eng Ethics ; 23(6): 1807-1810, 2017 12.
Artigo em Inglês | MEDLINE | ID: mdl-27830481

RESUMO

The blogosphere is full of personalities with masks, or pseudonyms. Although not a desired state of public communication, one could excuse the use of pseudonyms in blogs and social media, which are generally unregulated or weakly regulated. However, in science publishing, there are increasingly strict rules regarding the use of false identities for authors, the lack of institutional or contact details, and the lack of conflicts of interest, and such instances are generally considered to be misconduct. This is because these violations of publishing protocol decrease trust and confidence in science and bring disrepute to those scientists who conform to the rules set out by journals and publishers and abide by them. Thus, when cases are encountered where trust and protocol in publishing are breached, these deserve to be highlighted. In this letter, I focus on Neuroskeptic, a highly prominent science critic, primarily on the blogosphere and in social media, highlighting the dangers associated with the use of pseudonyms in academic publishing.


Assuntos
Anônimos e Pseudônimos , Autoria , Comunicação , Revelação , Obrigações Morais , Editoração/ética , Ciência/ética , Blogging , Humanos , Princípios Morais , Má Conduta Científica , Mídias Sociais , Confiança
17.
Science ; 351(6280): 1406, 2016 Mar 25.
Artigo em Inglês | MEDLINE | ID: mdl-27013722
19.
Med Biol Eng Comput ; 54(2-3): 371-83, 2016 Mar.
Artigo em Inglês | MEDLINE | ID: mdl-26040587

RESUMO

Health records rank among the most sensitive personal information existing today. An unwanted disclosure to unauthorised parties usually results in significant negative consequences for an individual. Therefore, health records must be adequately protected in order to ensure the individual's privacy. However, health records are also valuable resources for clinical studies and research activities. In order to make the records available for privacy-preserving secondary use, thorough de-personalisation is a crucial prerequisite to prevent re-identification. This paper introduces MEDSEC, a system which automatically converts paper-based health records into de-personalised and pseudonymised documents which can be accessed by secondary users without compromising the patients' privacy. The system converts the paper-based records into a standardised structure that facilitates automated processing and the search for useful information.


Assuntos
Anônimos e Pseudônimos , Registros Eletrônicos de Saúde , Reconhecimento Automatizado de Padrão , Humanos
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA