Difference between revisions of "Template:Article of the week"

From LIMSWiki
Jump to navigationJump to search
(Updated article of the week text)
(Updated article of the week text)
(110 intermediate revisions by the same user not shown)
Line 1: Line 1:
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig4 Jofre ApplSci2021 11-15.png|240px]]</div>
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig2 Berezin PLoSCompBio23 19-12.png|240px]]</div>
'''"[[Journal:Cybersecurity and privacy risk assessment of point-of-care systems in healthcare: A use case approach|Cybersecurity and privacy risk assessment of point-of-care systems in healthcare: A use case approach]]"'''
'''"[[Journal:Ten simple rules for managing laboratory information|Ten simple rules for managing laboratory information]]"'''
 
[[Information]] is the cornerstone of [[research]], from experimental data/[[metadata]] and computational processes to complex inventories of reagents and equipment. These 10 simple rules discuss best practices for leveraging [[laboratory information management system]]s (LIMS) to transform this large information load into useful scientific findings. The development of [[mathematical model]]s that can predict the properties of biological systems is the holy grail of [[computational biology]]. Such models can be used to test biological hypotheses, guide the development of biomanufactured products, engineer new systems meeting user-defined specifications, and much more ... ('''[[Journal:Ten simple rules for managing laboratory information|Full article...]]''')<br />


[[Point-of-care testing|Point-of-care]] (POC) systems are generally used in healthcare to respond rapidly and prevent critical health conditions. Hence, POC systems often handle personal [[Health informatics|health information]], and, consequently, their [[cybersecurity]] and [[Information privacy|privacy]] requirements are of crucial importance. However, assessing these requirements is a significant task. In this work, we propose a use-case approach to assess specifications of cybersecurity and privacy requirements of POC systems in a structured and self-contained form. Such an approach is appropriate since use cases are one of the most common means adopted by developers to derive requirements. As a result, we detail a use case approach in the framework of a real-based healthcare IT infrastructure that includes a [[Health information technology|health information system]], [[Message broker|integration engines]], application servers, web services, [[medical device]]s, smartphone apps, and medical modalities (all data simulated) together with the interaction with participants. Since our use case also sustains the analysis of cybersecurity and privacy risks in different threat scenarios, it also supports decision making and the analysis of compliance considerations. ('''[[Journal:Cybersecurity and privacy risk assessment of point-of-care systems in healthcare: A use case approach|Full article...]]''')<br />
<br />
''Recently featured'':
''Recently featured'':
{{flowlist |
{{flowlist |
* [[Journal:Fostering reproducibility, reusability, and technology transfer in health informatics|Fostering reproducibility, reusability, and technology transfer in health informatics]]
* [[Journal:Hierarchical AI enables global interpretation of culture plates in the era of digital microbiology|Hierarchical AI enables global interpretation of culture plates in the era of digital microbiology]]
* [[Journal:Development of a core competency framework for clinical informatics|Development of a core competency framework for clinical informatics]]
* [[Journal:Critical analysis of the impact of AI on the patient–physician relationship: A multi-stakeholder qualitative study|Critical analysis of the impact of AI on the patient–physician relationship: A multi-stakeholder qualitative study]]
* [[Journal:Strategies for laboratory professionals to drive laboratory stewardship|Strategies for laboratory professionals to drive laboratory stewardship]]
* [[Journal:Judgements of research co-created by generative AI: Experimental evidence|Judgements of research co-created by generative AI: Experimental evidence]]
}}
}}

Revision as of 18:03, 10 June 2024

Fig2 Berezin PLoSCompBio23 19-12.png

"Ten simple rules for managing laboratory information"

Information is the cornerstone of research, from experimental data/metadata and computational processes to complex inventories of reagents and equipment. These 10 simple rules discuss best practices for leveraging laboratory information management systems (LIMS) to transform this large information load into useful scientific findings. The development of mathematical models that can predict the properties of biological systems is the holy grail of computational biology. Such models can be used to test biological hypotheses, guide the development of biomanufactured products, engineer new systems meeting user-defined specifications, and much more ... (Full article...)

Recently featured: