The ALPHA Network (Analysing Longitudinal Population-based HIV/AIDS data on Africa) is working on a project to produce a sharable set of harmonised data that combines both population-based and clinic data from the partner studies with funding from the Wellcome Trust. Whilst community-based cohorts and demographic surveillance systems provide a rich source of data, use of the data is often limited because successful analysis requires detailed knowledge of the study's contemporary and historical procedures and of data management practices. To date the ALPHA Network has successfully extracted and harmonised 10 standard data tables from the partner studies. However, these data are still complex and require considerable prior knowledge to use effectively, which in practice means the data can only be used in collaboration with one of the ALPHA staff.
This data collection contains qualitative data collected as part of scoping work to establish domain experts’ perspectives on the functionality that a user-friendly metadata browser for ALPHA datasets should provide. It contains transcripts of 10 semi-structured Skype interviews conducted with individual researchers and data managers affiliated to the ALPHA network and the Cohort & Longitudinal Studies Enhancement Resources (CLOSER) project. Interviews explored proposed features of the metadata browser, including: provision for viewing all tasks performed in the process of creating a dataset, browsing the steps in each task, task purpose, related concepts, related code scripts, association between a sub-task and its input data and outputs and provision for viewing data structure.
Winning entry to the Student Voice 2019. The article focuses on a personal encounter that I had as a medical student when I was sent off to 'study' a patient with a rare disease who had been admitted to hospital.
Abstract: Lake Bolshie Toroki is located in Novosibirsk Region (55.39350 N, 80.61860E), Russia. It is an undrained lake with an area of 9.57 km2 and a depth of about 1m, with weakly alkaline and weakly mineralized (845 mg/l) water. Aquatic vegetation is predominantly represented by pondgrass (Potamogeton) and watermilfoil (Myriophyllum). The surrounding onland vegetation consists of agricultural lands with birch groves and marshy lowlands.
Boreholes were drilled in the summer of 2012 in the middle of Lake Bolshie Toroki.
Source: Not Available
Supplemental Information: Not Availble
Coverage: Not Available
Contributors:Ferlini, A, Montanari, A, Mascolo, Cecilia, Harle, Robert
Contributors:Mavaddat, Nasim, Antoniou, Antonis C, Mooij, Thea M, Hooning, Maartje J, Heemskerk-Gerritsen, Bernadette A, Noguès, Catherine, Gauthier-Villars, Marion, Caron, Olivier, Gesta, Paul, Pujol, Pascal, Lortholary, Alain, Barrowdale, Daniel, Frost, Debra, Evans, D Gareth, Izatt, Louise, Adlard, Julian, Eeles, Ros, Brewer, Carole, Tischkowitz, Marc, Henderson, Alex, Cook, Jackie, Eccles, Diana, van Engelen, Klaartje, Mourits, Marian J E, Ausems, Margreet G E M, Koppert, Linetta B, Hopper, John L, John, Esther M, Chung, Wendy K, Andrulis, Irene L, Daly, Mary B, Buys, Saundra S, Benitez, Javier, Caldes, Trinidad, Jakubowska, Anna, Simard, Jacques, Singer, Christian F, Tan, Yen, Olah, Edith, Navratilova, Marie, Foretova, Lenka, Gerdes, Anne-Marie, Roos-Blom, Marie-José, Van Leeuwen, Flora E, Arver, Brita, Olsson, Håkan, Schmutzler, Rita K, Engel, Christoph, Kast, Karin, Phillips, Kelly-Anne, Terry, Mary Beth, Milne, Roger L, Goldgar, David E, Rookus, Matti A, Andrieu, Nadine, Easton, Douglas F
After publication of the original article , we were notified that columns in Table 2 were erroneously displayed.
Contributors:Ahmed, Mansoor, Anderson, Ross, Halatova, Darija, Shumailov, Ilia
One of the most critical security protocol problems for humans is when you are betraying a trust, perhaps for some higher purpose, and the world can turn against you if you're caught. In this short paper, we report on efforts to enable whistleblowers to leak sensitive documents to journalists more safely. Following a survey of cases where whistleblowers were discovered due to operational or technological issues, we propose a game-theoretic model capturing the power dynamics involved in whistleblowing. We find that the whistleblower is often at the mercy of motivations and abilities of others. We identify specific areas where technology may be used to mitigate the whistleblower's risk. However we warn against technical solutionism: the main constraints are often institutional.