Flow chemistry has recently opened new chemistry windows thanks to the safer use of hazardous and sensitive reagents. Furthermore, flow procedures usually outperform their batch counterparts due to ...improved mass and heat transfer, offering a good opportunity for industrial application. Herein, a rapid Simmons‐Smith cyclopropanation flow process is presented. Taking advantage of the in situ production of the zinc carbenoid species, several olefins bearing aromatic rings of different electronic nature, aliphatic chains or heterocycles were smoothly cyclopropanated with a residence time of just 15 minutes. In addition, industrial applicability of the protocol is assured thanks to a successful 12‐mmol scale experiment, which represents a 3.59 grams per hour production of a selected example, and to the satisfactory synthesis of pharmaceutical drugs.
The release of smartphones and tablets, which offer more advanced communication and computing capabilities, has led to the strong emergence of mHealth on the market. mHealth systems are being used to ...improve patients’ lives and their health, in addition to facilitating communication between doctors and patients. Researchers are now proposing mHealth applications for many health conditions such as dementia, autism, dysarthria, Parkinson’s disease, and so on. Usability becomes a key factor in the adoption of these applications, which are often used by people who have problems when using mobile devices and who have a limited experience of technology. The aim of this paper is to investigate the empirical usability evaluation processes described in a total of 22 selected studies related to mHealth applications by means of a Systematic Literature Review. Our results show that the empirical evaluation methods employed as regards usability could be improved by the adoption of automated mechanisms. The evaluation processes should also be revised to combine more than one method. This paper will help researchers and developers to create more usable applications. Our study demonstrates the importance of adapting health applications to users’ need.
Several obstacles prevent the adoption and use of personal health record (PHR) systems, including users' concerns regarding the privacy and security of their personal health information.
To analyze ...the privacy and security characteristics of PHR privacy policies. It is hoped that identification of the strengths and weaknesses of the PHR systems will be useful for PHR users, health care professionals, decision makers, and designers.
We conducted a systematic review using the principal databases related to health and computer science to discover the Web-based and free PHR systems mentioned in published articles. The privacy policy of each PHR system selected was reviewed to extract its main privacy and security characteristics.
The search of databases and the myPHR website provided a total of 52 PHR systems, of which 24 met our inclusion criteria. Of these, 17 (71%) allowed users to manage their data and to control access to their health care information. Only 9 (38%) PHR systems permitted users to check who had accessed their data. The majority of PHR systems used information related to the users' accesses to monitor and analyze system use, 12 (50%) of them aggregated user information to publish trends, and 20 (83%) used diverse types of security measures. Finally, 15 (63%) PHR systems were based on regulations or principles such as the US Health Insurance Portability and Accountability Act (HIPAA) and the Health on the Net Foundation Code of Conduct (HONcode).
Most privacy policies of PHR systems do not provide an in-depth description of the security measures that they use. Moreover, compliance with standards and regulations in PHR systems is still low.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, UILJ, UKNU, UL, UM, UPUK
The area of remote sensing techniques in agriculture has reached a significant degree of development and maturity, with numerous journals, conferences, and organizations specialized in it. Moreover, ...many review papers are available in the literature. The present work describes a literature review that adopts the form of a systematic mapping study, following a formal methodology. Eight mapping questions were defined, analyzing the main types of research, techniques, platforms, topics, and spectral information. A predefined search string was applied in the Scopus database, obtaining 1590 candidate papers. Afterwards, the most relevant 106 papers were selected, considering those with more than six citations per year. These are analyzed in more detail, answering the mapping questions for each paper. In this way, the current trends and new opportunities are discovered. As a result, increasing interest in the area has been observed since 2000; the most frequently addressed problems are those related to parameter estimation, growth vigor, and water usage, using classification techniques, that are mostly applied on RGB and hyperspectral images, captured from drones and satellites. A general recommendation that emerges from this study is to build on existing resources, such as agricultural image datasets, public satellite imagery, and deep learning toolkits.
Display omitted
► The preferred access control model in EHR systems is RBAC. ► Asymmetric and symmetric key encryption are equally used to encrypt data in EHRs. ► Communications in EHRs are securely ...encrypted using SSL and TSL. ► Login/password is the most common authentication mechanism found in EHRs.
To report the results of a systematic literature review concerning the security and privacy of electronic health record (EHR) systems.
Original articles written in English found in MEDLINE, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database.
Only those articles dealing with the security and privacy of EHR systems.
The extraction of 775 articles using a predefined search string, the outcome of which was reviewed by three authors and checked by a fourth.
A total of 49 articles were selected, of which 26 used standards or regulations related to the privacy and security of EHR data. The most widely used regulations are the Health Insurance Portability and Accountability Act (HIPAA) and the European Data Protection Directive 95/46/EC. We found 23 articles that used symmetric key and/or asymmetric key schemes and 13 articles that employed the pseudo anonymity technique in EHR systems. A total of 11 articles propose the use of a digital signature scheme based on PKI (Public Key Infrastructure) and 13 articles propose a login/password (seven of them combined with a digital certificate or PIN) for authentication. The preferred access control model appears to be Role-Based Access Control (RBAC), since it is used in 27 studies. Ten of these studies discuss who should define the EHR systems’ roles. Eleven studies discuss who should provide access to EHR data: patients or health entities. Sixteen of the articles reviewed indicate that it is necessary to override defined access policies in the case of an emergency. In 25 articles an audit-log of the system is produced. Only four studies mention that system users and/or health staff should be trained in security and privacy.
Recent years have witnessed the design of standards and the promulgation of directives concerning security and privacy in EHR systems. However, more work should be done to adopt these regulations and to deploy secure EHR systems.
Relying solely on altruistic appeals may fail to fulfil the increasing demand for blood supplies. Current research has largely been attempted to determine and understand motives that serve as blood ...donation drivers. The Trans-Theoretical Model of behaviour change (TTM) can be used to conceptualise the process of intentional blood donation behaviour.
A cross sectional survey of Spanish adults was conducted. The final sample consisted of 504 individuals who were administered a self-report questionnaire including the measures of demographic characteristics, Stages of Change, Processes of Change, Self-efficacy and Decisional Balance. Data were analysed by frequency analysis, MANOVA/ANOVA and correlation analysis.
Findings indicated that most of the behavioural and cognitive processes of change, self-efficacy and physical cons differentiated participants across the stages of change of blood donation. In contrast, eligibility cons and pros were less influential in stage transitions. Furthermore, significant correlations were observed between TTM constructs except for the physical cons and the processes of change.
The present study extensively supports and replicates the applicability of the TTM to blood donation behaviour change and offers important implications for the development of effective stage-matched interventions to increase blood donation.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
A systematic review of gamification in e-Health Sardi, Lamyae; Idri, Ali; Fernández-Alemán, José Luis
Journal of biomedical informatics,
July 2017, 2017-Jul, 2017-07-00, 20170701, Letnik:
71
Journal Article
Recenzirano
Odprti dostop
Display omitted
•An analysis of the gamified solutions and serious games related to e-Health in the literature is presented.•Chronic disease management and physical activity are the most studied ...health topics.•The most recurrently employed game mechanics in eHealth are rewards and feedback.•There is a lack of thorough empirical evaluations of the gamified solutions in eHealth.•Gamification and serious gaming help people induce positive health behavioural change.
Gamification is a relatively new trend that focuses on applying game mechanics to non-game contexts in order to engage audiences and to inject a little fun into mundane activities besides generating motivational and cognitive benefits. While many fields such as Business, Marketing and e-Learning have taken advantage of the potential of gamification, the digital healthcare domain has also started to exploit this emerging trend. This paper aims to summarize the current knowledge regarding gamified e-Health applications. A systematic literature review was therefore conducted to explore the various gamification strategies employed in e-Health and to address the benefits and the pitfalls of this emerging discipline. A total of 46 studies from multiple sources were then considered and thoroughly investigated. The results show that the majority of the papers selected reported gamification and serious gaming in health and wellness contexts related specifically to chronic disease rehabilitation, physical activity and mental health. Although gamification in e-Health has attracted a great deal of attention during the last few years, there is still a dearth of valid empirical evidence in this field. Moreover, most of the e-Health applications and serious games investigated have been proven to yield solely short-term engagement through extrinsic rewards. For gamification to reach its full potential, it is therefore necessary to build e-Health solutions on well-founded theories that exploit the core experience and psychological effects of game mechanics.
Abstract Herein, the direct covalent functionalization of single‐walled carbon nanotubes (SWNT) is presented with an amino‐decorated phenyl‐phenothiazine (PTH‐NH 2 ) organophotocatalyst through the ...diazonium chemistry protocol. Three different SWNT‐PTH hybrids are prepared by varying the amount of PTH‐NH 2 and diazonium agent and are fully characterized. These hybrids differ not only in the degree of functionalization, but also in the chemical structure and the photophysical properties. The study shows that these features affect the photoredox activity of the materials in the photo‐debromination of aromatic halides. Thus, sample SWNT‐PTH‐5, a functionalized nanotube with a 5% wt loading of PTH, surpasses the catalytic performance of homogeneous PTH in 11 different substrates, finishing the reaction in shorter times, in a recyclable manner and without catalyst leaching. This study demonstrates the importance of controlling the functionalization degree of SWNT with photocatalysts to prepare photocatalytic materials with even higher catalytic activity than that presented by the homogeneous PTH catalyst.
The excavations undertaken at the Campo de Hockey site in 2008 led to the identification of a major Neolithic necropolis in the former Island of San Fernando (Bay of Cádiz). This work presents the ...results of the latest studies, which indicate that the site stands as one of the oldest megalithic necropolises in the Iberian Peninsula. The main aim of this work is to present with precision the chronology of this necropolis through a Bayesian statistical model that confirms that the necropolis was in use from c. 4300 to 3800 cal BC. The presence of prestige grave goods in the earliest and most monumental graves suggest that the Megalithism phenomenon emerged in relation to maritime routes linked to the distribution of exotic products. We also aim to examine funerary practices in these early megalithic communities, and especially their way of life and the social reproduction system. As such, in addition to the chronological information and the Bayesian statistics, we provide the results of a comprehensive interdisciplinary study, including anthropological, archaeometric and genetic data.
This paper presents a novel approach of computer-assisted learning for nursing education in university undergraduate courses.
The most innovative aspect of the proposal is the design of nursing ...assignments as on-line competitions. The effects of competitive e-learning versus conventional teaching methods on the acquisition and retention of knowledge were compared in a course on medical–surgical nursing.
A total of 116 students of mixed gender, age, computer experience and educational background in a second-year course on medical–surgical nursing participated in the study. Data were collected from nursing students at four time points. The on-line activities were carried out using a web-based automatic evaluation system.
The study revealed that the competitive e-learning method produced significant cognitive gains for the experimental group students in the immediate follow-up test. Nevertheless, both teaching methods resulted in similar knowledge retention in the 10-week follow-up test.
Significant benefits were found following our approach. The work of the students could be evaluated along the course, the workload of instructors was reduced and students received immediate feedback by the on-line judge, which promoted both independent learning and reflective thinking. The approach is applicable to any other nursing educational institution.