-
Advances in Laboratory Medicine Jun 2024The metaverse is a virtual world that is being developed to allow people to interact with each other and with digital objects in a more immersive way. It involves... (Review)
Review
The metaverse is a virtual world that is being developed to allow people to interact with each other and with digital objects in a more immersive way. It involves the convergence of three major technological trends: telepresence, the digital twin, and blockchain. Telepresence is the ability of people to "be together" in a virtual way while not being close to each other. The digital twin is a virtual, digital equivalent of a patient, a medical device or even a hospital. Blockchain can be used by patients to keep their personal medical records secure. In medicine and healthcare, the metaverse could be used in several ways: (1) virtual medical consultations; (2) medical education and training; (3) patient education; (4) medical research; (5) drug development; (6) therapy and support; (7) laboratory medicine. The metaverse has the potential to enable more personalized, efficient, and accessible healthcare, improving patient outcomes and reducing healthcare costs. However, the implementation of the metaverse in medicine and healthcare will require careful consideration of ethical and privacy concerns, as well as social, technical and regulatory challenges. Overall, the future of the metaverse in healthcare looks bright, but new metaverse-specific laws should be created to help overcome any potential downsides.
PubMed: 38939198
DOI: 10.1515/almed-2023-0124 -
JAMIA Open Jul 2024Absolute risk models estimate an individual's future disease risk over a specified time interval. Applications utilizing server-side risk tooling, the R-based iCARE...
OBJECTIVES
Absolute risk models estimate an individual's future disease risk over a specified time interval. Applications utilizing server-side risk tooling, the R-based iCARE (R-iCARE), to build, validate, and apply absolute risk models, face limitations in portability and privacy due to their need for circulating user data in remote servers for operation. We overcome this by porting iCARE to the web platform.
MATERIALS AND METHODS
We refactored R-iCARE into a Python package (Py-iCARE) and then compiled it to WebAssembly (Wasm-iCARE)-a portable web module, which operates within the privacy of the user's device.
RESULTS
We showcase the portability and privacy of Wasm-iCARE through 2 applications: for researchers to statistically validate risk models and to deliver them to end-users. Both applications run entirely on the client side, requiring no downloads or installations, and keep user data on-device during risk calculation.
CONCLUSIONS
Wasm-iCARE fosters accessible and privacy-preserving risk tools, accelerating their validation and delivery.
PubMed: 38938691
DOI: 10.1093/jamiaopen/ooae055 -
Kidney Medicine Jul 2024In the wake of the coronavirus disease 2019 (COVID-19) pandemic, the United States federal government expanded originating telemedicine sites to include outpatient...
RATIONALE & OBJECTIVE
In the wake of the coronavirus disease 2019 (COVID-19) pandemic, the United States federal government expanded originating telemedicine sites to include outpatient dialysis units. For the first time, nephrology practitioners across the United States could replace face-to-face visits with telemedicine for patients receiving in-center hemodialysis. This study describes patients' perspectives on the use of telemedicine during in-center hemodialysis.
STUDY DESIGN
A qualitative study.
SETTING & PARTICIPANTS
Thirty-two patients from underserved populations (older, less educated, unemployed, persons of color) receiving in-center hemodialysis who used telemedicine with their nephrologist during the COVID-19 pandemic.
ANALYTICAL APPROACH
Telephone semistructured interviews were conducted in English or Spanish. Transcripts were thematically analyzed.
RESULTS
We identified 6 themes with subthemes: adapting to telemedicine (gaining familiarity and confidence, overcoming and resolving technical difficulties, and relying on staff for communication); ensuring availability of the physician (enabling an immediate response to urgent medical needs, providing peace of mind, addressing patient needs adequately, and enhanced attention and contact from physicians); safeguarding against infection (limiting COVID-19 exposures and decreasing use); straining communication and physical interactions (loss of personalized touch, limited physical examination, and unable to reapproach physicians about forgotten issues); maintaining privacy (enhancing privacy and projecting voice enables others to hear); and supporting confidence in telemedicine (requiring established rapport with physicians, clinical stabilty of health, and ability to have in-person visits when necessary).
LIMITATIONS
Interviews were conducted later in the pandemic when some nephrology care providers were using telemedicine infrequently.
CONCLUSIONS
Patients receiving in-center hemodialysis adapted to telemedicine visits by their nephrologists in the context of the COVID-19 pandemic and observed its benefits. However, further considerations regarding communication, privacy, and physical assessments are necessary. Integrating telemedicine into future in-center hemodialysis care using a hybrid approach could potentially build trust, optimize communication, and augment care.
PubMed: 38938646
DOI: 10.1016/j.xkme.2024.100848 -
JACC. Advances Oct 2023Mobile health (mHealth) interventions are increasingly being used for cardiovascular research and physical activity promotion.
BACKGROUND
Mobile health (mHealth) interventions are increasingly being used for cardiovascular research and physical activity promotion.
OBJECTIVES
As a result, the authors aimed to evaluate which features facilitate and impede routine engagement with mobile fitness applications.
METHODS
We distributed a pan-Canadian online questionnaire via the behavioral research platform Prolific.co to evaluate what features are associated with the use and routine engagement (ie, daily or weekly use) of mHealth fitness applications and attitudes about data sharing. Binary logistic regression was used to quantify the association between these endpoints and exploratory factors such as the perceived utility of various mHealth application features.
RESULTS
The survey received 694 responses. Most people were women (62%), the median age was 28 years (range: 18-78 years), and most people reported current use of an mHealth fitness application (48%). The perceived importance of personal health (OR: 2.40; 95% CI: 1.34-4.50) was the factor most associated with the current use of an mHealth fitness application. The feature most associated with routine engagement was the ability to track progress toward a goal (OR: 5.10; 95% CI: 2.73-9.61) while the most significant barrier was the absence of goal customization features (OR: 0.44; 95% CI: 0.25-0.81). The acceptance of sharing health data for research was high (56%), and privacy concerns did not significantly affect routine engagement (OR: 0.81; 95% CI: 0.40-1.77). Results were consistent across race and gender.
CONCLUSIONS
mHealth interventions have the potential to be scaled across populations. Optimizing applications to improve self-monitoring and personalization could increase routine engagement and, thus, user retention and intervention effectiveness.
PubMed: 38938369
DOI: 10.1016/j.jacadv.2023.100613 -
Harm Reduction Journal Jun 2024Patients with opioid use disorder (OUD) experience various forms of stigma at the individual, public, and structural levels that can affect how they access and engage...
BACKGROUND
Patients with opioid use disorder (OUD) experience various forms of stigma at the individual, public, and structural levels that can affect how they access and engage with healthcare, particularly with medications for OUD treatment. Telehealth is a relatively new form of care delivery for OUD treatment. As reducing stigma surrounding OUD treatment is critical to address ongoing gaps in care, the aim of this study was to explore how telehealth impacts patient experiences of stigma.
METHODS
In this qualitative study, we interviewed patients with OUD at a single urban academic medical center consisting of multiple primary care and addiction clinics in Oregon, USA. Participants were eligible if they had (1) at least one virtual visit for OUD between March 2020 and December 2021, and (2) a prescription for buprenorphine not exclusively used for chronic pain. We conducted phone interviews between October and December 2022, then recorded, transcribed, dual-coded, and analyzed using reflexive thematic analysis.
RESULTS
The mean age of participants (n = 30) was 40.5 years (range 20-63); 14 were women, 15 were men, and two were transgender, non-binary, or gender-diverse. Participants were 77% white, and 33% had experienced homelessness in the prior six months. We identified four themes regarding how telehealth for OUD treatment shaped patient perceptions of and experiences with stigma at the individual (1), public (2-3), and structural levels (4): (1) Telehealth offers wanted space and improved control over treatment setting; (2) Public stigma and privacy concerns can impact both telehealth and in-person encounters, depending on clinical and personal circumstances; (3) The social distance of telehealth could mitigate or exacerbate perceptions of clinician stigma, depending on both patient and clinician expectations; (4) The increased flexibility of telehealth translated to perceptions of increased clinician trust and respect.
CONCLUSIONS
The forms of stigma experienced by individuals with OUD are complex and multifaceted, as are the ways in which those experiences interact with telehealth-based care. The mixed results of this study support policies allowing for a more individualized, patient-centered approach to care delivery that allows patients a choice over how they receive OUD treatment services.
Topics: Humans; Female; Male; Telemedicine; Adult; Middle Aged; Social Stigma; Opioid-Related Disorders; Young Adult; Qualitative Research; Oregon; Buprenorphine; Opiate Substitution Treatment
PubMed: 38937779
DOI: 10.1186/s12954-024-01043-5 -
Reproductive Health Jun 2024Cervical cancer is the fourth most frequent cancer among women, with 90% of cervical cancer-related deaths occurring in low- and middle-income countries like Cameroon....
BACKGROUND
Cervical cancer is the fourth most frequent cancer among women, with 90% of cervical cancer-related deaths occurring in low- and middle-income countries like Cameroon. Visual inspection with acetic acid is often used in low-resource settings to screen for cervical cancer; however, its accuracy can be limited. To address this issue, the Swiss Federal Institute of Technology Lausanne and the University Hospitals of Geneva are collaborating to develop an automated smartphone-based image classifier that serves as a computer aided diagnosis tool for cancerous lesions. The primary objective of this study is to explore the acceptability and perspectives of women in Dschang regarding the usage of a screening tool for cervical cancer relying on artificial intelligence. A secondary objective is to understand the preferred form and type of information women would like to receive regarding this artificial intelligence-based screening tool.
METHODS
A qualitative methodology was employed to gain better insight into the women's perspectives. Participants, aged between 30 and 49 were invited from both rural and urban regions and semi-structured interviews using a pre-tested interview guide were conducted. The focus groups were divided on the basis of level of education, as well as HPV status. The interviews were audio-recorded, transcribed, and coded using the ATLAS.ti software.
RESULTS
A total of 32 participants took part in the six focus groups, and 38% of participants had a primary level of education. The perspectives identified were classified using an adapted version of the Technology Acceptance Model. Key factors influencing the acceptability of artificial intelligence include privacy concerns, perceived usefulness, and trust in the competence of providers, accuracy of the tool as well as the potential negative impact of smartphones.
CONCLUSION
The results suggest that an artificial intelligence-based screening tool for cervical cancer is mostly acceptable to the women in Dschang. By ensuring patient confidentiality and by providing clear explanations, acceptance can be fostered in the community and uptake of cervical cancer screening can be improved.
TRIAL REGISTRATION
Ethical Cantonal Board of Geneva, Switzerland (CCER, N°2017-0110 and CER-amendment n°4) and Cameroonian National Ethics Committee for Human Health Research (N°2022/12/1518/CE/CNERSH/SP). NCT: 03757299.
Topics: Humans; Female; Uterine Cervical Neoplasms; Cameroon; Artificial Intelligence; Early Detection of Cancer; Adult; Middle Aged; Qualitative Research; Patient Acceptance of Health Care; Focus Groups
PubMed: 38937771
DOI: 10.1186/s12978-024-01828-8 -
Journal of Biomedical Informatics Jun 2024Linear and logistic regression are widely used statistical techniques in population genetics for analyzing genetic data and uncovering patterns and associations in large...
OBJECTIVE
Linear and logistic regression are widely used statistical techniques in population genetics for analyzing genetic data and uncovering patterns and associations in large genetic datasets, such as identifying genetic variations linked to specific diseases or traits. However, obtaining statistically significant results from these studies requires large amounts of sensitive genotype and phenotype information from thousands of patients, which raises privacy concerns. Although cryptographic techniques such as homomorphic encryption offers a potential solution to the privacy concerns as it allows computations on encrypted data, previous methods leveraging homomorphic encryption have not addressed the confidentiality of shared models, which can leak information about the training data.
METHODS
In this work, we present a secure model evaluation method for linear and logistic regression using homomorphic encryption for six prediction tasks, where input genotypes, output phenotypes, and model parameters are all encrypted.
RESULTS
Our method ensures no private information leakage during inference and achieves high accuracy (≥93% for all outcomes) with each inference taking less than ten seconds for ∼200 genomes.
CONCLUSION
Our study demonstrates that it is possible to perform linear and logistic regression model evaluation while protecting patient confidentiality with theoretical security guarantees. Our implementation and test data are available at https://github.com/G2Lab/privateML/.
PubMed: 38936565
DOI: 10.1016/j.jbi.2024.104678 -
Journal of Medical Internet Research Jun 2024The US health care delivery system does not systematically engage or support family or friend care partners. Meanwhile, the uptake and familiarity of portals to personal...
The US health care delivery system does not systematically engage or support family or friend care partners. Meanwhile, the uptake and familiarity of portals to personal health information are increasing among patients. Technology innovations, such as shared access to the portal, use separate identity credentials to differentiate between patients and care partners. Although not well-known, or commonly used, shared access allows patients to identify who they do and do not want to be involved in their care. However, the processes for patients to grant shared access to portals are often limited or so onerous that interested patients and care partners often circumvent the process entirely. As a result, the vast majority of care partners resort to accessing portals using a patient's identity credentials-a "do-it-yourself" solution in conflict with a health systems' legal responsibility to protect patient privacy and autonomy. The personal narratives in this viewpoint (shared by permission) elaborate on quantitative studies and provide first-person snapshots of challenges faced by patients and families as they attempt to gain or grant shared access during crucial moments in their lives. As digital modalities increase patient roles in health care interactions, so does the importance of making shared access work for all stakeholders involved-patients, clinicians, and care partners. Electronic health record vendors must recognize that both patients and care partners are important users of their products, and health care organizations must acknowledge and support the critical contributions of care partners as distinct from patients.
Topics: Humans; Patient Portals; Electronic Health Records; Caregivers; Patient Participation
PubMed: 38935963
DOI: 10.2196/49394 -
JMIR Bioinformatics and Biotechnology May 2024Genetic data are widely considered inherently identifiable. However, genetic data sets come in many shapes and sizes, and the feasibility of privacy attacks depends on... (Review)
Review
BACKGROUND
Genetic data are widely considered inherently identifiable. However, genetic data sets come in many shapes and sizes, and the feasibility of privacy attacks depends on their specific content. Assessing the reidentification risk of genetic data is complex, yet there is a lack of guidelines or recommendations that support data processors in performing such an evaluation.
OBJECTIVE
This study aims to gain a comprehensive understanding of the privacy vulnerabilities of genetic data and create a summary that can guide data processors in assessing the privacy risk of genetic data sets.
METHODS
We conducted a 2-step search, in which we first identified 21 reviews published between 2017 and 2023 on the topic of genomic privacy and then analyzed all references cited in the reviews (n=1645) to identify 42 unique original research studies that demonstrate a privacy attack on genetic data. We then evaluated the type and components of genetic data exploited for these attacks as well as the effort and resources needed for their implementation and their probability of success.
RESULTS
From our literature review, we derived 9 nonmutually exclusive features of genetic data that are both inherent to any genetic data set and informative about privacy risk: biological modality, experimental assay, data format or level of processing, germline versus somatic variation content, content of single nucleotide polymorphisms, short tandem repeats, aggregated sample measures, structural variants, and rare single nucleotide variants.
CONCLUSIONS
On the basis of our literature review, the evaluation of these 9 features covers the great majority of privacy-critical aspects of genetic data and thus provides a foundation and guidance for assessing genetic data risk.
PubMed: 38935957
DOI: 10.2196/54332 -
JMIR Bioinformatics and Biotechnology Jul 2023While genomic variations can provide valuable information for health care and ancestry, the privacy of individual genomic data must be protected. Thus, a secure...
BACKGROUND
While genomic variations can provide valuable information for health care and ancestry, the privacy of individual genomic data must be protected. Thus, a secure environment is desirable for a human DNA database such that the total data are queryable but not directly accessible to involved parties (eg, data hosts and hospitals) and that the query results are learned only by the user or authorized party.
OBJECTIVE
In this study, we provide efficient and secure computations on panels of single nucleotide polymorphisms (SNPs) from genomic sequences as computed under the following set operations: union, intersection, set difference, and symmetric difference.
METHODS
Using these operations, we can compute similarity metrics, such as the Jaccard similarity, which could allow querying a DNA database to find the same person and genetic relatives securely. We analyzed various security paradigms and show metrics for the protocols under several security assumptions, such as semihonest, malicious with honest majority, and malicious with a malicious majority.
RESULTS
We show that our methods can be used practically on realistically sized data. Specifically, we can compute the Jaccard similarity of two genomes when considering sets of SNPs, each with 400,000 SNPs, in 2.16 seconds with the assumption of a malicious adversary in an honest majority and 0.36 seconds under a semihonest model.
CONCLUSIONS
Our methods may help adopt trusted environments for hosting individual genomic data with end-to-end data security.
PubMed: 38935952
DOI: 10.2196/44700