-
The International Journal of Behavioral... Jul 2018Social media has been widely adopted by young adults, consequently health researchers are looking for ways to leverage this engagement with social media for the delivery...
BACKGROUND
Social media has been widely adopted by young adults, consequently health researchers are looking for ways to leverage this engagement with social media for the delivery of interventions and health promotion campaigns. Weight gain and sub-optimal dietary choices are common in young adults, and social media may be a potential tool to facilitate and support healthier choices.
METHODS
We conducted a mixed-methods systematic review of studies examining social media use for nutrition-related outcomes in young adults. Seven databases [EBscohost, ERIC, ProQuest Central, PubMed, Ovid, Scopus, and Emerald] were systematically searched; 1225 abstracts were screened, and 47 full-text articles were assessed for eligibility. Study designs included both quantitative, such as experimental and observational studies, and qualitative, such as focus groups and interviews, approaches. Quality was assessed using the Mixed Methods Appraisal Tool. Quantitative and qualitative results were examined separately, and then synthesized.
RESULTS
Twenty-one studies were included although their use of social media was highly variable. The main purpose of social media was to provide information and social support to participants. In the nine randomized controlled trials, social media was used as one aspect of a multi-faceted intervention. Interventions had a positive statistically significant impact on nutritional outcomes in 1/9 trials. Engagement with the social media component of interventions varied, from 3 to 69%. Young adults appear to be open to receiving healthy eating and recipe tips through social media, however, they are reluctant to share personal weight-related information on their online social networks.
CONCLUSIONS
Information-dissemination is now an acceptable use of social media by young adults. Using social media effectively for social support, either via private groups or public pages, requires careful evaluation as its effectiveness is yet to be demonstrated in experimental designs. Concerns about public social media use may be a contributing factor to poor engagement with social media in research intervention studies aimed at influencing weight. Future research should consider how to best engage with young adults using social media, how to more effectively use social media to support young adults and to facilitate social and peer-to-peer support in making healthier choices.
Topics: Adult; Body Weight; Diet; Feeding Behavior; Health Behavior; Health Promotion; Humans; Information Dissemination; Male; Obesity; Privacy; Social Media; Social Support; Young Adult
PubMed: 30041699
DOI: 10.1186/s12966-018-0696-y -
The Cochrane Database of Systematic... Mar 2019Labour companionship refers to support provided to a woman during labour and childbirth, and may be provided by a partner, family member, friend, doula or healthcare... (Meta-Analysis)
Meta-Analysis
BACKGROUND
Labour companionship refers to support provided to a woman during labour and childbirth, and may be provided by a partner, family member, friend, doula or healthcare professional. A Cochrane systematic review of interventions by Bohren and colleagues, concluded that having a labour companion improves outcomes for women and babies. The presence of a labour companion is therefore regarded as an important aspect of improving quality of care during labour and childbirth; however implementation of the intervention is not universal. Implementation of labour companionship may be hampered by limited understanding of factors affecting successful implementation across contexts.
OBJECTIVES
The objectives of the review were to describe and explore the perceptions and experiences of women, partners, community members, healthcare providers and administrators, and other key stakeholders regarding labour companionship; to identify factors affecting successful implementation and sustainability of labour companionship; and to explore how the findings of this review can enhance understanding of the related Cochrane systematic review of interventions.
SEARCH METHODS
We searched MEDLINE, CINAHL, and POPLINE K4Health databases for eligible studies from inception to 9 September 2018. There were no language, date or geographic restrictions.
SELECTION CRITERIA
We included studies that used qualitative methods for data collection and analysis; focused on women's, partners', family members', doulas', providers', or other relevant stakeholders' perceptions and experiences of labour companionship; and were from any type of health facility in any setting globally.
DATA COLLECTION AND ANALYSIS
We used a thematic analysis approach for data extraction and synthesis, and assessed the confidence in the findings using the GRADE-CERQual approach. We used two approaches to integrate qualitative findings with the intervention review findings. We used a logic model to theorise links between elements of the intervention and health and well-being outcomes. We also used a matrix model to compare features of labour companionship identified as important in the qualitative evidence synthesis with the interventions included in the intervention review.
MAIN RESULTS
We found 51 studies (52 papers), mostly from high-income countries and mostly describing women's perspectives. We assessed our level of confidence in each finding using the GRADE-CERQual approach. We had high or moderate confidence in many of our findings. Where we only had low or very low confidence in a finding, we have indicated this.Labour companions supported women in four different ways. Companions gave informational support by providing information about childbirth, bridging communication gaps between health workers and women, and facilitating non-pharmacological pain relief. Companions were advocates, which means they spoke up in support of the woman. Companions provided practical support, including encouraging women to move around, providing massage, and holding her hand. Finally, companions gave emotional support, using praise and reassurance to help women feel in control and confident, and providing a continuous physical presence.Women who wanted a companion present during labour and childbirth needed this person to be compassionate and trustworthy. Companionship helped women to have a positive birth experience. Women without a companion could perceive this as a negative birth experience. Women had mixed perspectives about wanting to have a male partner present (low confidence). Generally, men who were labour companions felt that their presence made a positive impact on both themselves (low confidence) and on the relationship with their partner and baby (low confidence), although some felt anxious witnessing labour pain (low confidence). Some male partners felt that they were not well integrated into the care team or decision-making.Doulas often met with women before birth to build rapport and manage expectations. Women could develop close bonds with their doulas (low confidence). Foreign-born women in high-income settings may appreciate support from community-based doulas to receive culturally-competent care (low confidence).Factors affecting implementation included health workers and women not recognising the benefits of companionship, lack of space and privacy, and fearing increased risk of infection (low confidence). Changing policies to allow companionship and addressing gaps between policy and practice were thought to be important (low confidence). Some providers were resistant to or not well trained on how to use companions, and this could lead to conflict. Lay companions were often not integrated into antenatal care, which may cause frustration (low confidence).We compared our findings from this synthesis to the companionship programmes/approaches assessed in Bohren's review of effectiveness. We found that most of these programmes did not appear to address these key features of labour companionship.
AUTHORS' CONCLUSIONS
We have high or moderate confidence in the evidence contributing to several of these review findings. Further research, especially in low- and middle-income settings and with different cadres of healthcare providers, could strengthen the evidence for low- or very low-confidence findings. Ahead of implementation of labour companionship, researchers and programmers should consider factors that may affect implementation, including training content and timing for providers, women and companions; physical structure of the labour ward; specifying clear roles for companions and providers; integration of companions; and measuring the impact of companionship on women's experiences of care. Implementation research or studies conducted on labour companionship should include a qualitative component to evaluate the process and context of implementation, in order to better interpret results and share findings across contexts.
Topics: Culturally Competent Care; Doulas; Emigrants and Immigrants; Evaluation Studies as Topic; Family; Female; Friends; Humans; Labor Pain; Labor, Obstetric; Male; Medical Chaperones; Parturition; Patient Advocacy; Patient Preference; Perinatal Care; Pregnancy; Sex Factors; Spouses
PubMed: 30883666
DOI: 10.1002/14651858.CD012449.pub2 -
PloS One 2021On psychiatric wards, aggressive behaviour displayed by patients is common and problematic. Understanding factors associated with the development of aggression offers...
INTRODUCTION
On psychiatric wards, aggressive behaviour displayed by patients is common and problematic. Understanding factors associated with the development of aggression offers possibilities for prevention and targeted interventions. This review discusses factors that contribute to the development of aggression on psychiatric wards.
METHOD
In Pubmed and Embase, a search was performed aimed at: prevalence data, ward characteristics, patient and staff factors that are associated with aggressive behaviour and from this search 146 studies were included.
RESULTS
The prevalence of aggressive behaviour on psychiatric wards varied (8-76%). Explanatory factors of aggressive behaviour were subdivided into patient, staff and ward factors. Patient risk factors were diagnosis of psychotic disorder or bipolar disorder, substance abuse, a history of aggression, younger age. Staff risk factors included male gender, unqualified or temporary staff, job strain, dissatisfaction with the job or management, burn-out and quality of the interaction between patients and staff. Staff protective factors were a good functioning team, good leadership and being involved in treatment decisions. Significant ward risk factors were a higher bed occupancy, busy places on the ward, walking rounds, an unsafe environment, a restrictive environment, lack of structure in the day, smoking and lack of privacy.
CONCLUSION
Despite a lack of prospective quantitative data, results did show that aggression arises from a combination of patient factors, staff factors and ward factors. Patient factors were studied most often, however, besides treatment, offering the least possibilities in prevention of aggression development. Future studies should focus more on the earlier stages of aggression such as agitation and on factors that are better suited for preventing aggression such as ward and staff factors. Management and clinicians could adapt staffing and ward in line with these results.
Topics: Aggression; Bed Occupancy; Female; Health Personnel; Humans; Male; Mental Health; Prevalence; Psychiatric Department, Hospital; Risk Factors; Substance-Related Disorders; Time Factors; Violence
PubMed: 34624057
DOI: 10.1371/journal.pone.0258346 -
Sensors (Basel, Switzerland) Oct 2022Intelligent transportation systems will play a key role in the smart cities of the future. In particular, railway transportation is gaining attention as a promising... (Review)
Review
Intelligent transportation systems will play a key role in the smart cities of the future. In particular, railway transportation is gaining attention as a promising solution to cope with the mobility challenges in large urban areas. Thanks to the miniaturisation of sensors and the deployment of fast data networks, the railway industry is being augmented with contextual, real-time information that opens the door to novel and personalised services. Despite the benefits of this digitalisation, the high complexity of railway transportation entails a number of challenges, particularly from security and privacy perspectives. Since railway assets are attractive targets for terrorism, coping with strong security and privacy requirements such as cryptography and privacy-preserving methods is of utmost importance. This article provides a thorough systematic literature review on information security and privacy within railway transportation systems, following the well-known methodology proposed by vom Brocke et al. We sketch out the most relevant studies and outline the main focuses, challenges and solutions described in the literature, considering technical, societal, regulatory and ethical approaches. Additionally, we discuss the remaining open issues and suggest several research lines that will gain relevance in the years to come.
Topics: Privacy; Computer Security; Transportation
PubMed: 36298049
DOI: 10.3390/s22207698 -
Healthcare Analytics (New York, N.Y.) Nov 2023The unexpected and rapid spread of the COVID-19 pandemic has amplified the acceptance of remote healthcare systems such as telemedicine. Telemedicine effectively... (Review)
Review
The unexpected and rapid spread of the COVID-19 pandemic has amplified the acceptance of remote healthcare systems such as telemedicine. Telemedicine effectively provides remote communication, better treatment recommendation, and personalized treatment on demand. It has emerged as the possible future of medicine. From a privacy perspective, secure storage, preservation, and controlled access to health data with consent are the main challenges to the effective deployment of telemedicine. It is paramount to fully overcome these challenges to integrate the telemedicine system into healthcare. In this regard, emerging technologies such as blockchain and federated learning have enormous potential to strengthen the telemedicine system. These technologies help enhance the overall healthcare standard when applied in an integrated way. The primary aim of this study is to perform a systematic literature review of previous research on privacy-preserving methods deployed with blockchain and federated learning for telemedicine. This study provides an in-depth qualitative analysis of relevant studies based on the architecture, privacy mechanisms, and machine learning methods used for data storage, access, and analytics. The survey allows the integration of blockchain and federated learning technologies with suitable privacy techniques to design a secure, trustworthy, and accurate telemedicine model with a privacy guarantee.
PubMed: 37223223
DOI: 10.1016/j.health.2023.100192 -
Multimedia Tools and Applications Feb 2023In today's world, health and medicine play an undeniable role in human life. Traditional and current Electronic Health Records (EHR) systems that are used to exchange...
In today's world, health and medicine play an undeniable role in human life. Traditional and current Electronic Health Records (EHR) systems that are used to exchange information between medical stakeholders (patients, physicians, insurance companies, pharmaceuticals, medical researchers, etc.) suffer weaknesses in terms of security and privacy due to having centralized architecture. Blockchain technology ensures the privacy and security of EHR systems thanks to the use of encryption. Moreover, due to its decentralized nature, this technology prevents central failure and central attack points. In this paper, a systematic literature review (SLR) is proposed to analyze the existing Blockchain-based approaches for improving privacy and security in electronic health systems. The research methodology, paper selection process, and the search query are explained. 51 papers returned from our search criteria published between 2018 and Dec 2022 are reviewed. The main ideas, type of Blockchain, evaluation metrics, and used tools of each selected paper are discussed in detail. Finally, future research directions, open challenges, and some issues are discussed.
PubMed: 36811000
DOI: 10.1007/s11042-023-14488-w -
Sensors (Basel, Switzerland) Jun 2021In the course of the digitization of production facilities, tracking and tracing of assets in the supply chain is becoming increasingly relevant for the manufacturing... (Review)
Review
In the course of the digitization of production facilities, tracking and tracing of assets in the supply chain is becoming increasingly relevant for the manufacturing industry. The collection and use of real-time position data of logistics, tools and load carriers are already standard procedure in entire branches of the industry today. In addition to asset tracking, the technologies used also offer new possibilities for collecting and evaluating position and biometric data of employees. Thus, these technologies can be used for monitoring performance or for tracking worker behaviour, which can lead to additional burdens and stress for employees. In this context, the collection and evaluation of employee data can influence the workplace of the affected employee in the company to his or her disadvantage. The approach of Privacy by Design can help to benefit from all the advantages of these systems, while ensuring that the impact on employee privacy is kept to a minimum. Currently, there is no survey available that reviews tracking and tracing systems supporting this important and emerging field. This work provides a systematic overview from the perspective of the impact on employee privacy. Additionally, this paper identifies and evaluates the techniques used with regard to employee privacy in industrial tracking and tracing systems. This helps to reveal new privacy preserving techniques that are currently underrepresented, therefore enabling new research opportunities in the industrial community.
Topics: Female; Humans; Male; Privacy; Technology; Workplace
PubMed: 34209327
DOI: 10.3390/s21134501 -
Journal of Biomedical Informatics Jun 2013To report the results of a systematic literature review concerning the security and privacy of electronic health record (EHR) systems. (Review)
Review
OBJECTIVE
To report the results of a systematic literature review concerning the security and privacy of electronic health record (EHR) systems.
DATA SOURCES
Original articles written in English found in MEDLINE, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database.
STUDY SELECTION
Only those articles dealing with the security and privacy of EHR systems.
DATA EXTRACTION
The extraction of 775 articles using a predefined search string, the outcome of which was reviewed by three authors and checked by a fourth.
RESULTS
A total of 49 articles were selected, of which 26 used standards or regulations related to the privacy and security of EHR data. The most widely used regulations are the Health Insurance Portability and Accountability Act (HIPAA) and the European Data Protection Directive 95/46/EC. We found 23 articles that used symmetric key and/or asymmetric key schemes and 13 articles that employed the pseudo anonymity technique in EHR systems. A total of 11 articles propose the use of a digital signature scheme based on PKI (Public Key Infrastructure) and 13 articles propose a login/password (seven of them combined with a digital certificate or PIN) for authentication. The preferred access control model appears to be Role-Based Access Control (RBAC), since it is used in 27 studies. Ten of these studies discuss who should define the EHR systems' roles. Eleven studies discuss who should provide access to EHR data: patients or health entities. Sixteen of the articles reviewed indicate that it is necessary to override defined access policies in the case of an emergency. In 25 articles an audit-log of the system is produced. Only four studies mention that system users and/or health staff should be trained in security and privacy.
CONCLUSIONS
Recent years have witnessed the design of standards and the promulgation of directives concerning security and privacy in EHR systems. However, more work should be done to adopt these regulations and to deploy secure EHR systems.
Topics: Computer Security; Electronic Health Records; Europe; Health Insurance Portability and Accountability Act; Privacy; United States
PubMed: 23305810
DOI: 10.1016/j.jbi.2012.12.003 -
Perspectives in Health Information... 2023The objective of the study is to identify challenges and associated factors for privacy and security related to telehealth visits during the COVID-19 pandemic. The...
The objective of the study is to identify challenges and associated factors for privacy and security related to telehealth visits during the COVID-19 pandemic. The systematic search strategy used the databases of PubMed, ScienceDirect, ProQuest, Embase, CINAHL, and COCHRANE, with the search terms of telehealth/telemedicine, privacy, security, and confidentiality. Reviews included peer-reviewed empirical studies conducted from January 2020 to February 2022. Studies conducted outside of the US, non-empirical, and non-telehealth related were excluded. Eighteen studies were included in the final analysis. Three risk factors associated with privacy and security in telehealth practice included: environmental factors (lack of private space for vulnerable populations, difficulty sharing sensitive health information remotely), technology factors (data security issues, limited access to the internet, and technology), and operational factors (reimbursement, payer denials, technology accessibility, training, and education). Findings from this study can assist governments, policymakers, and healthcare organizations in developing best practices in telehealth privacy and security strategies.
Topics: Humans; Privacy; Pandemics; COVID-19; Confidentiality; Risk Factors; Telemedicine
PubMed: 37215337
DOI: No ID Found -
Sensors (Basel, Switzerland) Dec 2021Owing to the hasty growth of communication technologies in the Underwater Internet of Things (UIoT), many researchers and industries focus on enhancing the existing... (Review)
Review
Owing to the hasty growth of communication technologies in the Underwater Internet of Things (UIoT), many researchers and industries focus on enhancing the existing technologies of UIoT systems for developing numerous applications such as oceanography, diver networks monitoring, deep-sea exploration and early warning systems. In a constrained UIoT environment, communication media such as acoustic, infrared (IR), visible light, radiofrequency (RF) and magnet induction (MI) are generally used to transmit information via digitally linked underwater devices. However, each medium has its technical limitations: for example, the acoustic medium has challenges such as narrow-channel bandwidth, low data rate, high cost, etc., and optical medium has challenges such as high absorption, scattering, long-distance data transmission, etc. Moreover, the malicious node can steal the underwater data by employing blackhole attacks, routing attacks, Sybil attacks, etc. Furthermore, due to heavyweight, the existing privacy and security mechanism of the terrestrial internet of things (IoT) cannot be applied directly to UIoT environment. Hence, this paper aims to provide a systematic review of recent trends, applications, communication technologies, challenges, security threats and privacy issues of UIoT system. Additionally, this paper highlights the methods of preventing the technical challenges and security attacks of the UIoT environment. Finally, this systematic review contributes much to the profit of researchers to analyze and improve the performance of services in UIoT applications.
Topics: Acoustics; Computer Security; Internet of Things; Privacy; Technology
PubMed: 34960366
DOI: 10.3390/s21248262