Leaner and greener analysis of cannabinoids

This 2017 paper by Mudge et al. proposes a means for analyzing the Cannabis plant and its flowers in such a way so as to reduce the use of chlorinated solvents and provide a safer work environment for laboratorians. The authors test methanol as a greener alternative and present the results of their tests, concluding the method as "a significant improvement over previous methods that can be used in a variety of settings and has the potential to be expanded for inclusion of new cannabinoids as required." Along with being greener and improving lab safety, the authors also suggest a reduction in material cost as a benefit of the method.

Laboratory information management software for engineered mini-protein therapeutic workflow

Many laboratorians and researchers who have investigated open-source laboratory information management systems (LIMS) have run across LabKey Server. LabKey has been especially useful to those working with high-throughput assays, flow cytometry, genotyping/sequencing, proteomics, specimen tracking, and observational study data management. It's also an extensible LIMS, and as can be seen in this 2019 journal article by Brusniak et al., where they describe the process of updating LabKey to handle "generalized engineered protein compounds workflow that tracks entities and assays from creation to preclinical experiments." Noting rapid advances in protein therapeutics, the authors developed LabKey into Optide-Hunter to handle optimized peptides (thus, optides) and their production. After discussing its inner workings, the authors conclude that their open-source Optide-Hunter solution fits the bill for a "cost-effective and flexible LIMS for early-stage experimental pipeline development for engineered protein therapeutics development."

Defending our public biological databases as a global critical infrastructure

In this brief perspective article by Caswell et al,, of various U.S. Department of Energy Laboratories, the topic of mitigating the risks—expected and unexpected—associated with public biological databases is briefly presented, pointing out "several existing research areas that can be leveraged to protect against accidental and intentional modifications and misuse." The authors provide background on the data integrity and vulnerability concerns of these databases, including sources of errors and exploitation of weaknesses in the systems inadvertently or by bad-faith actors. Then they suggest a wide variety of tools, methodologies, and other approaches that are available to gatekeepers of this type of data. They close by comparing these databases to the creation of the internet and its "wide penetration of open functionality" but initial lack of having "integrity and security in mind," stating that now is the time to focus on mitigating risks to the integrity of public biological databases.

Determining the hospital information system (HIS) success rate: Development of a new instrument and case study

Hospital information systems (HIS) represent an important information and function management system for hospitals, providing assistance with diagnosis, management, and education functions for improved service and practice. But how effective are they at what they're designed to do? This work by Ebnehoseini et al. offers a mechanism for gauging HIS effectiveness through statistics and the information systems success model (ISSM). The authors applied their methodology to the Ibn-e Sina and Dr. Hejazi Psychiatry Hospital in Mashhad, Iran and determined a 65% success rate for the hospital's HIS. They conclude that their methodology "can be adopted for HIS evaluation in future studies" by others and that their results provide a clearer picture into "the viewpoints of HIS users in a developing country."

Smart information systems in cybersecurity: An ethical analysis

With a growing number of big data and artificial intelligence (AI) implementations (referred to as "smart information systems" or SIS) in enterprises, important ethical questions related to cybersecurity must be asked. Has proper informed consent been given? Have discovered vulnerabilities been handled in such a way as to limit potential harm to users? How is trust and transparency handled? These and other questions are asked by Macnish et al. in this 2019 research report published in ORBIT Journal. Noting that technical and ethical issues both underpin the tenants of cybersecurity, the authors discuss the ethical issues of using SIS in cybersecurity and provide their own case study of a major U.K. business using SIS in their cybersecurity practices. After providing their ethical implications of the case study, they conclude "that ethical concerns regarding SIS in cybersecurity go further than mere privacy issues" and "claim that there is a need to improve the ethics of research in SIS."

Chemometric analysis of cannabinoids: Chemotaxonomy and domestication syndrome

In this 2018 paper published in Scientific Reports, Mudge et al. of the University of British Columbia attempt to demonstrate how a growing loss of biodiversity is occurring across strains of Cannabis due to cultivation practices. The authors introduce current research on the "understanding of metabolite commonality and diversity within plant species" and hypothesize that simply measuring cannabinoid potency (Δ9-tetrahydrocannabinol or THC) and cannabidiol (CBD) content is not sufficient in painting a proper picture of cannabinoid composition and the resulting impact of breeding programs. The authors then get into the results of their analytical research, discuss their findings, and conclude that, at least in Canada, " evaluating single metabolite classes [of available Cannabis strains] does not provide sufficient information to understand the phytochemical diversity available."

National and transnational security implications of asymmetric access to and use of biological data

We take another look at the security of biological data, this time through the eyes of Berger and Schneck, and the discussion of major players such as China. The authors first introduce advances in biotechnology and benefits and challenges that arise from it today, including exploitation of the resulting data "by state actors, malicious nonstate actors, and hackers." They then discuss common approaches used to protect this soft of data, as well as the various vulnerabilities that come from (or from the lack of) those approaches. The authors close their paper by offering four specific strategies "toward protecting biological data from unauthorized acquisition and use, enhancing efforts to preserve data integrity and provenance, and enabling future benefit of biotechnological advances."

Developing workforce capacity in public health informatics: Core competencies and curriculum design

In this 2019 paper published in Frontiers in Public Health, Wholey et al. propose a curriculum for an effective and modern public health informatics (PHI) higher education program. Drawing competencies from computer, information, and organizational sciences, the researchers provide program design objectives, competencies, and challenges involved in implementing such a curriculum focused on the professional role of the informatician. Based on the information systems program of Carnegie Mellon, the authors report that their proposed curriculum has already seen success with its implementation at the School of Public Health at the University of Minnesota. They conclude that the proposed curriculum "is a starting point," keeping in mind that practices, knowledge, and technology change often, requiring program vigilance for improvement to best ensure "an effective and relevant workforce that can navigate the changing trends of public health to improve population health."

Assessing cyberbiosecurity vulnerabilities and infrastructure resilience

Here is one more journal article on the topic of cyberbiosecurity, this time discussing related vulnerabilities and the need for a resilient infrastructure to limit them. Schabacker et al. of the Argonne National Laboratory present a base "assessment framework for cyberbiosecurity, accounting for both security and resilience factors in the physical and cyber domains." They first discuss the differences between "emerging" and "converging" technologies and how they contribute to vulnerabilities, and then they lead into risk mitigation strategies. The authors also provide clear definitions of associated terminology for common understanding, including the topics of dependency and interdependency. Then they discuss the basic framework, keeping vulnerabilities in mind. They close with a roadmap for a common vulnerability assessment framework, encouraging the application of "lessons learned from parallel efforts in related fields," and reflection on "the complex multidisciplinary cyberbiosecurity environment."

What is the meaning of sharing: Informing, being informed or information overload?

From software development companies to pharmaceutical manufacturers, businesses, governments, and non-profit entities alike are beginning to adopt tools meant to improve communication, information sharing, and productivity. In some cases, this takes the form of an enterprise social media platform (ESMP) with chat rooms, discussion boards, and file repositories. But while this can be beneficial, adding a focused attempt at sharing to work culture can create its own share of problems, argues Norwegian University of Science and Technology's Halvdan Haugsbakken, particularly due to varying definitions and expectations of what information "sharing" actually is. Using a case study of regional government in Norway, Haugsbakken found "when the end-users attempted to translate sharing into a manageable practice—as the basis for participation in a knowledge formation process—they interpreted sharing as a complicated work practice, with the larger consequence of producing disengaged users." This result "suggests a continued need for the application of theoretical lenses that emphasize interpretation and practice in the implementation of new digital technologies in organizations."

Cyberbiosecurity: An emerging new discipline to help safeguard the bioeconomy

Following up on the cyberbiosecurity article posted a few weeks ago, this one by Murch et al. steps away from the strong agriculture focus of the prior and examines cyberbiosecurity from a more broad perspective. Not only do the authors provide background into the convergence of cybersecurity, cyber-physical security, and biosecurity, but they also provide a look at how it extends to biomanufacturing facilities. They conclude that cyberbiosecurity could be applied to various domains—from personalized genomics and medical device manufacturing to food production and environmental monitoring— though continued "[d]irect and ordered engagements of the pertinent sectors of the life sciences, biosecurity, and cyber-cybersecurity communities," as well as tangentially within academia and government, must continue to occur in order "to harmonize the emerging enterprise and foster measurable value, success, and sustainability."

The cannabinoid content of legal cannabis in Washington State varies systematically across testing facilities and popular consumer products

In 2017, Washington State's cannabis testing laboratories were going through a mini-crisis, with questions of credibility being raised about certain laboratories' testing methodologies and practices. How much were differences in tested samples based on differences in methodologies? What more can be done by laboratories in the industry? This 2018 paper by Jikomes and Zoorob answer these questions and more, using "a large dataset from Washington State’s seed-to-sale traceability system." Their analyses of this dataset showed "systematic differences in the results obtained by different testing facilities in Washington," leading to "cannabinoid inflation" in certain labs. The authors conclude that despite the difficulties of having cannabis illegal at the federal level, efforts to standardize testing protocols etc. must continue to be made in order to protect consumers and increase confidence in the testing system.

Cyberbiosecurity: A new perspective on protecting U.S. food and agricultural system

We know that the research process creates data, and data is increasingly valuable. But can we visualize all the nooks and crannies that data is coming from in a more technologically connected society? Take for instance the food and agriculture sectors, influencing more than 20 percent of the U.S. economy. Herd data records for the dairy industry, pedigree information for the food animal industry, and soil and machine condition data from row crop farmers are only a few examples of data sources in the sectors. But what of the security of that data? Duncan et al. take a brief look at these sectors and provide insight into the ways that cybersecurity, biosecurity, and their intersections are increasingly important. The conclude by making suggestions for "[w]orkforce development, effective communication strategies, and cooperation across sectors and industries" to better "increase support and compliance, reducing the risks and providing increased protection for the U.S. bioeconomy."

DAQUA-MASS: An ISO 8000-61-based data quality management methodology for sensor data

In this 2018 paper published in Sensors, Perez-Castillo et al. present DAQUA-MASS, their own take on the ISO 8000-61 data quality standard but updated for the world of the internet of things and smart, connected products (SCPs), in particular sensor networks. While recognizing that data quality has been studied significantly over the decades, little work has gone into the formal policies for SCP and sensor data quality. After presenting data challenges in SCP environments, related work, their model, and their methodology, the authors conclude that their "data quality model, along with the methodology, offers a unique framework to enable designers of IoT projects—including sensor networks and practitioners in charge of exploiting IoT systems—to assure that the business processes working over these systems can manage data with adequate levels of quality."

Security architecture and protocol for trust verifications regarding the integrity of files stored in cloud services

Have you considered the security of your files hosted in the cloud? Of course you have, and reputable providers provide a solid guarantee of safety. But what if you could monitor the status of your files as well as the behavior of your cloud service provider? In this 2018 paper published by Pinheiro et al., such a proposition is proven as practical. The authors demonstrate just that using architecture that includes a "protocol based on trust and encryption concepts to ensure cloud data integrity without compromising confidentiality and without overloading storage services." They conclude that not only is such monitoring able to be done efficiently and rapidly, but also the "architecture proved to be quite robust during the tests, satisfactorily responding to the fault simulations," including unplanned server shutdown.

What Is health information quality? Ethical dimension and perception by users

For information technology professionals and informaticists alike, when handling data, the idea of "garbage in, garbage out" remains a popular refrain. Collecting data isn't enough; its quality for future analysis, sharing, and use is also important. Similarly, with the growth of the internet, the amount of health-related information being pumped online increases, but its quality isn't always attended to. In this 2018 paper by Al-Jefri et al., the topic of online health information quality (IQ) gets addressed in the form of a developed framework "that can be applied to websites and defines which IQ criteria are important for a website to be trustworthy and meet users' expectations." The authors conclude with various observations, including differences in how education, gender, and linguistic background affects users' ability to gauge information quality, and how there seems to be an overall lack of caring about the ethical trustworthiness of online health information by the public at large.

SCADA system testbed for cybersecurity research using machine learning approach

In this 2018 article published in Future Internet, Teixeira et al. test five machine learning algorithms in a supervisory control and data acquisition (SCADA) system testbed to determine whether or not machine learning is useful in cybersecurity research. Given the increasing number and sophistication of network-based attacks on industrial and research sensor networks (among others), the authors assessed the prior research of others in the field and integrated their findings into their own SCADA testbed dedicated to controlling a water storage tank. After training the algorithms and testing the system with attacks, they concluded that the Random Forest and Decision Tree algorithms were best suited for the task, showing " the feasibility of detecting reconnaissance attacks in [industrial control system] environments."

Semantics for an integrative and immersive pipeline combining visualization and analysis of molecular data

The field of bioinformatics has really taken off over the past decade, and so with it has the number of data sources and the need for improved visualization tools, including in the realm of three-dimensional visualization of molecular data. As such, Trellet et al. have developed the infrastructure for "an integrated pipeline especially designed for immersive environments, promoting direct interactions on semantically linked 2D and 3D heterogeneous data, displayed in a common working space." The group discusses in detail bioinformatics ontologies and semantic representation of bioinformatics knowledge, as well as vocal-based query management with such a detailed system. They conclude their efforts towards their "pipeline might be a solid base for immersive analytics studies applied to structural biology," including the ability to propose "contextualized analysis choices to the user" during interactive sessions.

A view of programming scalable data analysis: From clouds to exascale

From bioinformatics applications to social media research, the volume and velocity of data to manage continues to grow. Analysis of this massive faucet of data requires new ways of thinking, including new software, hardware, and programming tools. In this 2019 paper published in Journal of Cloud Computing, Domenico Talia of the University of Calabria in Italy presents a detailed look at exascale computing systems as a way to manage and analyze this river of data, including the use of cloud computing platforms and exascale programming systems. After a thorough discussion, the author concludes that while "[c]loud-based solutions for big data analysis tools and systems are in an advanced phase both on the research and the commercial sides," more work remains in the form of finding solutions to a number of design challenges, including on the data mining side of algorithms.

Transferring exome sequencing data from clinical laboratories to healthcare providers: Lessons learned at a pediatric hospital

We go back in time a year for this brief paper published by Swaminathan et al. of Nationwide Children's Hospital in Ohio. The researchers present their experiences handling the nuances of transferring large genomic data files of individual patients to a sequencing lab, all while handling the security and privacy protections surrounding the data. Handling only 19 patients' genomic files, at least initially, presented a number of workflow and protocol challenges for both hospital and laboratory. They conclude with barriers (file size and workflow management consistency) and suggestions (EHR-based alerts, blockchain) about what could be improved with such data transfers in the future to better realize the "massive potential to leverage genomic data to advance human health overall."