2025
The Arborist: A Collective Bloom Through Physiological Data in Mixed Reality
Wei S, Lee B, Gancz M, Marks A, Hieftje K. The Arborist: A Collective Bloom Through Physiological Data in Mixed Reality. 2025, 364-367. DOI: 10.1145/3706370.3731714.Peer-Reviewed Original Research
2018
Feasibility, Acceptability, and Adoption of Digital Fingerprinting During Contact Investigation for Tuberculosis in Kampala, Uganda: A Parallel-Convergent Mixed-Methods Analysis
White EB, Meyer AJ, Ggita JM, Babirye D, Mark D, Ayakaka I, Haberer JE, Katamba A, Armstrong-Hough M, Davis JL. Feasibility, Acceptability, and Adoption of Digital Fingerprinting During Contact Investigation for Tuberculosis in Kampala, Uganda: A Parallel-Convergent Mixed-Methods Analysis. Journal Of Medical Internet Research 2018, 20: e11541. PMID: 30442637, PMCID: PMC6265600, DOI: 10.2196/11541.Peer-Reviewed Original ResearchConceptsTechnology Acceptance Model 2Digital fingerprintingDigital fingerprintUnique patient identificationData integrityFingerprint captureSoftware leadFingerprint scannerPatient identificationHardware failureDigital technologiesBiometricsModest clusteringClusteringSocial imageTechnologyHousehold tuberculosis contact investigationRobust covariance estimatorPotential solutionsActual useGuide improvementFrameworkHardwareIndividual identificationTemporal characteristics
2013
Genomes in the cloud: balancing privacy rights and the public good.
Ohno-Machado L, Farcas C, Kim J, Wang S, Jiang X. Genomes in the cloud: balancing privacy rights and the public good. AMIA Joint Summits On Translational Science Proceedings 2013, 2013: 128. PMID: 24303320.Peer-Reviewed Original Research
2012
Privacy-preserving Biometric System for Secure Fingerprint Authentication
Wang S, Jiang X, Ohno-Machado L, Cui L, Cheng S, Xiong H. Privacy-preserving Biometric System for Secure Fingerprint Authentication. 2012, 1: 128-128. DOI: 10.1109/hisb.2012.53.Peer-Reviewed Original ResearchSecure Fingerprint AuthenticationBiometric systemsFingerprint authenticationElectronic health recordsPrivacy-preserving mannerSecure biometric systemsHigh authentication accuracySlepian-Wolf codesRe-identify individualsAuthentication systemSensitive informationAuthentication accuracyBiometric featuresMobile devicesResearch Data RepositoryPersonal privacyBiometricsData repositoryAuthenticationHealth recordsPrivacyExperimental resultsSuch informationImportant concernAttacker
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply