Search Articles

View query in Help articles search

Search Results (1 to 5 of 5 Results)

Download search results: CSV END BibTex RIS


Effective Recruitment or Bot Attack? The Challenge of Internet-Based Research Surveys and Recommendations to Reduce Risk and Improve Robustness

Effective Recruitment or Bot Attack? The Challenge of Internet-Based Research Surveys and Recommendations to Reduce Risk and Improve Robustness

Further, commercial tools for identity verification from public records may also be used depending on the location of the study, ethics committee approval, and the researcher’s ability to access these. However, these tools rely on up-to-date public records and prevent anonymous participation, which again may create barriers.

Liesje Donkin, Nathan Henry, Amy Kercher, Mangor Pedersen, Holly Wilson, Amy Hai Yan Chan

Interact J Med Res 2025;14:e60548

Using EpiCore to Enable Rapid Verification of Potential Health Threats: Illustrated Use Cases and Summary Statistics

Using EpiCore to Enable Rapid Verification of Potential Health Threats: Illustrated Use Cases and Summary Statistics

This risk of false alarms underscores the crucial role of human input for data curation and signal verification. Delays in the effective response to a genuine health threat are often the result of the time to verification of a health event—determining if an unofficial reported threat is real so an appropriate response can ensue.

Nomita Divi, Jaś Mantero, Marlo Libel, Onicio Leal Neto, Marinanicole Schultheiss, Kara Sewalk, John Brownstein, Mark Smolinski

JMIR Public Health Surveill 2024;10:e52093

Design of a Vaccine Passport Validation System Using Blockchain-based Architecture: Development Study

Design of a Vaccine Passport Validation System Using Blockchain-based Architecture: Development Study

The blockchain's public verification is utilized for passport verification, while smart contracts (SCs) with various purposes verify that a user's VP is valid. Finally, the public chain technique can be used to save building costs and create a worldwide VP chain. The architectural design application is divided into 2 parts: entity architecture and blockchain architecture. Basically, the system is an architecture of multientities interacting with each other using SCs built on the blockchain.

Hsiu An Lee, Wei-Chen Wu, Hsin-Hua Kung, Jai Ganesh Udayasankaran, Yu-Chih Wei, Boonchai Kijsanayotin, Alvin B Marcelo, Chien-Yeh Hsu

JMIR Public Health Surveill 2022;8(4):e32411

Fingerprint Biometric System Hygiene and the Risk of COVID-19 Transmission

Fingerprint Biometric System Hygiene and the Risk of COVID-19 Transmission

The primary purpose of fingerprint recognition or identification systems is to provide trustworthy verification of users to control access to resources such as computers as well as to critical facilities such as offices and hospitals.

Kenneth Okereafor, Iniobong Ekong, Ini Okon Markson, Kingsley Enwere

JMIR Biomed Eng 2020;5(1):e19623

How Best to Obtain Valid, Verifiable Data Online From Male Couples? Lessons Learned From an eHealth HIV Prevention Intervention for HIV-Negative Male Couples

How Best to Obtain Valid, Verifiable Data Online From Male Couples? Lessons Learned From an eHealth HIV Prevention Intervention for HIV-Negative Male Couples

Moreover, the majority of HIV-preventive interventions for MSM have focused on behavior change at the individual level [30-33], thereby emphasizing the need to not only develop e Health HIV-preventive interventions for male couples, but to also develop methods to maximize recruitment efforts and verification of valid data from both members of the couple (ie, dyadic data) online.

Jason William Mitchell, Ji-Young Lee, Rob Stephenson

JMIR Public Health Surveill 2016;2(2):e152