Difference between revisions of "Template:Article of the week"

From LIMSWiki
Jump to navigationJump to search
(Updated article of the week text)
(Updated article of the week text)
Line 1: Line 1:
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig4 Demelo Information21 12-8.png|240px]]</div>
<div style="float: left; margin: 0.5em 0.9em 0.4em 0em;">[[File:Fig2 Gonzalez-Granadillo Sensors21 21-16.png|240px]]</div>
'''"[[Journal:Design of generalized search interfaces for health informatics|Design of generalized search interfaces for health informatics]]"'''
'''"[[Journal:Automated cyber and privacy risk management toolkit|Automated cyber and privacy risk management toolkit]]"'''


In this paper, we investigate [[Ontology (information science)|ontology]]-supported interfaces for [[health informatics]] search tasks involving large document sets. We begin by providing background on health informatics, [[machine learning]], and ontologies. We review leading research on health informatics search tasks to help formulate high-level design criteria. We then use these criteria to examine traditional design strategies for search interfaces. To demonstrate the utility of the criteria, we apply them to the design of the ONTology-supported Search Interface (ONTSI), a demonstrative, prototype system. ONTSI allows users to plug-and-play document sets and expert-defined domain ontologies through a generalized search interface. ONTSI’s goal is to help align users’ common vocabulary with the domain-specific vocabulary of the plug-and-play document set. We describe the functioning and utility of ONTSI in health informatics search tasks through a [[workflow]] and a scenario. We conclude with a summary of ongoing evaluations, limitations, and future research. ('''[[Journal:Design of generalized search interfaces for health informatics|Full article...]]''')<br />
Addressing [[Cybersecurity|cyber]] and [[Information privacy|privacy]] risks has never been more critical for organizations. While a number of [[risk assessment]] methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic approach that combines several appropriate risk sources as input to risk mitigation tools. In addition, cyber risk assessment primarily investigates cyber risks as the consequence of vulnerabilities and threats that threaten assets of the investigated infrastructure. In fact, cyber risk assessment is decoupled from privacy impact assessment, which aims to detect privacy-specific threats and assess the degree of compliance with data protection legislation. Furthermore, a privacy impact assessment (PIA) is conducted in a proactive manner during the design phase of a system, combining processing activities and their inter-dependencies with assets, vulnerabilities, real-time threats and personally identifiable information (PII) that may occur during the dynamic lifecycle of systems. ('''[[Journal:Automated cyber and privacy risk management toolkit|Full article...]]''')<br />
<br />
<br />
''Recently featured'':
''Recently featured'':
{{flowlist |
{{flowlist |
* [[Journal:Design of generalized search interfaces for health informatics|Design of generalized search interfaces for health informatics]]
* [[Journal:Cybersecurity and privacy risk assessment of point-of-care systems in healthcare: A use case approach|Cybersecurity and privacy risk assessment of point-of-care systems in healthcare: A use case approach]]
* [[Journal:Cybersecurity and privacy risk assessment of point-of-care systems in healthcare: A use case approach|Cybersecurity and privacy risk assessment of point-of-care systems in healthcare: A use case approach]]
* [[Journal:Fostering reproducibility, reusability, and technology transfer in health informatics|Fostering reproducibility, reusability, and technology transfer in health informatics]]
* [[Journal:Fostering reproducibility, reusability, and technology transfer in health informatics|Fostering reproducibility, reusability, and technology transfer in health informatics]]
* [[Journal:Development of a core competency framework for clinical informatics|Development of a core competency framework for clinical informatics]]
}}
}}

Revision as of 16:31, 7 June 2022

Fig2 Gonzalez-Granadillo Sensors21 21-16.png

"Automated cyber and privacy risk management toolkit"

Addressing cyber and privacy risks has never been more critical for organizations. While a number of risk assessment methodologies and software tools are available, it is most often the case that one must, at least, integrate them into a holistic approach that combines several appropriate risk sources as input to risk mitigation tools. In addition, cyber risk assessment primarily investigates cyber risks as the consequence of vulnerabilities and threats that threaten assets of the investigated infrastructure. In fact, cyber risk assessment is decoupled from privacy impact assessment, which aims to detect privacy-specific threats and assess the degree of compliance with data protection legislation. Furthermore, a privacy impact assessment (PIA) is conducted in a proactive manner during the design phase of a system, combining processing activities and their inter-dependencies with assets, vulnerabilities, real-time threats and personally identifiable information (PII) that may occur during the dynamic lifecycle of systems. (Full article...)

Recently featured: