Matching Items (29)

137243-Thumbnail Image.png

A Review of Emerging Technologies and Entrepreneurship in Healthcare: Digital Health, Synthetic Biology, and Venture Capital Investment

Description

The focus shift towards Silicon Valley and similar ecosystems in the past decade, the recent boom in startups and entrepreneurship, and the resurgence of venture capital funding is fueling rapid

The focus shift towards Silicon Valley and similar ecosystems in the past decade, the recent boom in startups and entrepreneurship, and the resurgence of venture capital funding is fueling rapid advancement of modern technologies, such as software, biotechnology, and renewable energy. One facet of the growing entrepreneurial landscape features healthcare technology—a field of research centered upon various technical advances in medicine, software, and hardware. Trends in healthcare technology commercialization represent a promising opportunity for disruption in the healthcare industry. The integration of rapidly iterating software with medical research, timed perfectly with the passage of the Affordable Care Act and the boom of venture capital investment in both Big Data and mobile technology, has the healthcare technology primed for explosive growth over the next decade. Investment data indicates that strong public market activity in the past year will continue to fuel venture capital growth in both the biotechnology and digital health sectors, with the potential for multiple large exits by life sciences companies, more than even software, in the coming year.

Contributors

Agent

Created

Date Created
  • 2014-05

137262-Thumbnail Image.png

Analysis of Regulations on the Landing and Take-off of Commercial Aircraft

Description

The thesis is an investigation on current regulations of commercial aircraft landing and take-off procedures and an analysis of potential weaknesses within the regulatory system for commercial aerospace. To determine

The thesis is an investigation on current regulations of commercial aircraft landing and take-off procedures and an analysis of potential weaknesses within the regulatory system for commercial aerospace. To determine such flaws, an area of worse-case scenarios with regard to the aforementioned flight operations was researched. The events selected to best-depict these scenarios where incidents of aircraft overrunning the runway, referred to as runway excursions. A case-study conducted of 44 federal investigations of runway excursions produced data indicating four influential factors within these incidents: weather, pilot error, instrument malfunction, and runway condition. Upon examination, all but pilot error appeared to have federal enforcement to diminish the occurrence of future incidents. This is a direct result of the broad possibilities that make up this factor. The study then searched for a consistent fault within the incidents with the results indicating an indirect relationship of thrust reversers, a technique utilized by pilots to provide additional braking, to these excursions. In cases of thrust reverser failure, pilots' over-reliance on the system lead to time being lost from the confusion produced by the malfunction, ultimately resulting in several different runway excursions. The legal implication with the situation is that current regulations are ambiguous on the subject of thrust reversers and thus do not properly model the usage of the technique. Thus, to observe the scope of danger this ambiguity presents to the industry, the relationship of the technique to commercial aerospace needed to be determined. Interviews were set-up with former commercial pilots to gather data related to the flight crew perspective. This data indicated that thrust reversers were actively utilized by pilots within the industry for landing operations. The problem with the current regulations was revealed that the lack of details on thrust reverser reflected a failure of regulations to model current industry flight operations. To improve safety within the industry, new data related to thrust reverser deployment must be developed and enforced to determine appropriate windows to utilize the technique, thus decreasing time lost in confusion that results from thrust reversers malfunction. Future work would be based on producing simulations to determine said data as well as proposing the policy suggestions produced by this thesis.

Contributors

Created

Date Created
  • 2014-05

136837-Thumbnail Image.png

The Bioethics of Cell Free Fetal DNA Testing

Description

Noninvasive prenatal testing using cell-free fetal DNA (CffDNA) testing is a rapidly developing area in prenatal diagnosis. Fetal genetic testing can occur with a simple maternal blood sample, since CffDNA

Noninvasive prenatal testing using cell-free fetal DNA (CffDNA) testing is a rapidly developing area in prenatal diagnosis. Fetal genetic testing can occur with a simple maternal blood sample, since CffDNA can be found in maternal plasma. Thus, no harm is caused to mother or fetus to obtain this genetic information, providing significant benefits for those users. How the test should be integrated in existing prenatal programs has yet to be seen. CffDNA testing is an exciting technology and has attracted attention from many stakeholders, yet the lack of regulation and guidance has left legal, ethical, and social questions unanswered. This paper outlines a number of those issues expressed in the present literature on the matter.

Contributors

Agent

Created

Date Created
  • 2014-05

137810-Thumbnail Image.png

The Hwang Woo-Suk Scandal and the Development of Bioethics in South Korea

Description

In 2004, the South Korean geneticist Woo-Suk Hwang published what was widely regarded as the most important research result in biotechnology of the year. In the prestigious American journal Science,

In 2004, the South Korean geneticist Woo-Suk Hwang published what was widely regarded as the most important research result in biotechnology of the year. In the prestigious American journal Science, he claimed that he had succeeded in cloning a human blastocyst, an embryo in its early stages (Hwang et al. 2004). A year later, in a second Science article, he made the earth-shattering announcement that he had derived eleven embryonic stem cell lines using his cloning technique (Hwang et al. 2005). The international scientific community was stunned. American scientists publicly fretted that President George W. Bush‘s 2001 executive order limiting federal funding for stem-cell research in the United States had put American bioscience behind the Koreans‘ (Paarlberg 2005). These breakthroughs offered potential solutions to immune system rejection of transplanted organs and possible cures for diseases such as rheumatoid arthritis, Parkinson‘s, Down‘s syndrome, and paralysis (Svenaeus 2007). However, within a year, Hwang was exposed as a fraud who had faked his results and pressured his female colleagues to donate eggs without informed consent. Despite protests against his methods from Korean religious and nongovernmental organizations, Hwang had used his prestige to ignore his ethical obligations. The Korean government, too, was slow to investigate Hwang and to subject his work to appropriate regulation.

Contributors

Agent

Created

Date Created
  • 2012-12

137443-Thumbnail Image.png

INNOVATION SPACE: A STUDY ON THE LEGAL IMPLICATIONS OF DEVELOPING A NANOTECHNOLOGY-BASED PRODUCT

Description

I will be redacting my thesis on a project I will be a party of over the next two semesters through Innovation Space. This program is a joint venture between

I will be redacting my thesis on a project I will be a party of over the next two semesters through Innovation Space. This program is a joint venture between the Herberger Institute for Design and the Arts, Ira A. Fulton School of Engineering and W.P. Carey School of Business in which we form an interdisciplinary team to work on and develop products that create market value all the while serving societal needs and minimizing environmental impacts. In short we are an entrepreneurial venture that will go through every facet of bringing a project from the imagination to market. My role in this project will be to conduct research while brainstorming potential applications of my results. I will be in addition sharing and exercising my expertise in the field of Supply Chain management and business in general to support the other disciplines on my team. Furthermore, as a business student I will be personally responsible for developing a strategic plan once we have determined a potential product, I will analyze any sort of market forecast applicable to my topic and ideate any sort of customer relations to follow through with our product. To add to these tasks, I will also ensure a positive cash flow for the project in general. As the thesis specific part of the project I will be writing about the legal implications involved in the development of an idea into a marketable and financially viable product. I will be analyzing various aspects of patent law as well as potentially private international law in regards to sourcing.

Contributors

Agent

Created

Date Created
  • 2013-05

137208-Thumbnail Image.png

Conflict of Interest and Medical Devices: Investigating the Relationship between Physicians and the Medical Device Industry

Description

In a world in which technologies proliferate at a rapid rate, it is no surprise that the medical device industry has grown in leaps and bounds. This surge in medical

In a world in which technologies proliferate at a rapid rate, it is no surprise that the medical device industry has grown in leaps and bounds. This surge in medical technology, especially implantable medical technology, has altered the modern operating room, transforming surgery from a technique-driven activity into a technology-driven profession. This reliance upon technologies has fostered close ties between physicians and the medical device industry and within this relationship, medical device representatives play an integral role. This paper will investigate the relationship that exists between physicians and the medical device industry along with the potential conflicts of interest that may result due to this relationship. I will focus in particular on orthopedic medical devices due to media attention as a result of a 2007 Department of Justice settlement involving the leading orthopedic companies. This case proved instrumental in highlighting previously unknown instances in which conflicts of interest were occurring in the medical device industry.

Contributors

Agent

Created

Date Created
  • 2014-05

132443-Thumbnail Image.png

The Data Arms Race: Reimagining Data Transparency, Ethics and Regulations

Description

Data has quickly become a cornerstone of society. Across our daily lives, industry, policy, and more, we are experiencing what can only be called a “data revolution” igniting ferociously. While

Data has quickly become a cornerstone of society. Across our daily lives, industry, policy, and more, we are experiencing what can only be called a “data revolution” igniting ferociously. While data is gaining more and more importance, consumers do not fully understand the extent of its use and subsequent capitalization by companies. This paper explores the current climate relating to data security and data privacy. It aims to start a conversation regarding the culture around the sharing and collection of data. We explore aspects of data privacy in four tiers: the current cultural and social perception of data privacy, its relevance in our daily lives, its importance in society’s dialogue. Next, we look at current policy and legislature in place today, focusing primarily on Europe’s established GDPR and the incoming California Consumer Privacy Act, to see what measures are already in place and what measures need to be adopted to mold more of a culture of transparency. Next, we analyze current data privacy regulations and power of regulators like the FTC and SEC to see what tools they have at their disposal to ensure accountability in the tech industry when it comes to how our data is used. Lastly, we look at the potential act of treating and viewing data as an asset, and the implications of doing so in the scope of possible valuation and depreciation techniques. The goal of this paper is to outline initial steps to better understand and regulate data privacy and collection practices. Our goal is to bring this issue to the forefront of conversation in society, so that we may start the first step in the metaphorical marathon of data privacy, with the goal of establishing better data privacy controls and become a more data-conscious society.

Contributors

Agent

Created

Date Created
  • 2019-05

133736-Thumbnail Image.png

An Introduction into the New GMO Labeling Law and its Possible Implications for U.S. Laws and Corporate Transparency

Description

This paper details the regulations and the history behind the new federal mandatory GMO labeling law that was enacted in the United States on July 29, 2016. In addition, it

This paper details the regulations and the history behind the new federal mandatory GMO labeling law that was enacted in the United States on July 29, 2016. In addition, it will analyze a similar bill, House of Representatives Bill 1599, that was in committee (in the House and Senate) around the same time as this new law. Furthermore, this paper will discuss the reasons this new GMO labeling law is controversial, highlighting both the opposing and supporting arguments for the bill, and in turn analyzing the arguments behind both. This article will go into depth about the regulations of each of these bills, and will highlight the stark differences between the two, as well as analyze the possible affects we may see occur in U.S. law and corporate transparency as a result. Using foreign precedent as well as U.S. precedent, this paper will discuss whether the new GMO labeling law might be challenged in Court, and if so, whether or not the Courts would validate the law or hold it unconstitutional based on the Supremacy Clause, First Amendment Protection of Commercial Speech and the Commerce Clause.

Contributors

Agent

Created

Date Created
  • 2018-05

149668-Thumbnail Image.png

Privacy preserving service discovery and ranking for multiple user QoS requirements in service-based software systems

Description

Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other

Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different entities and physically distributed across the Internet. Compared with traditional software system components which are usually specifically designed for the target systems and bound tightly, the interfaces of services and their communication protocols are standardized, which allow SBS systems to support late binding, provide better interoperability, better flexibility in dynamic business logics, and higher fault tolerance. The development process of SBS systems can be divided to three major phases: 1) SBS specification, 2) service discovery and matching, and 3) service composition and workflow execution. This dissertation focuses on the second phase, and presents a privacy preserving service discovery and ranking approach for multiple user QoS requirements. This approach helps service providers to register services and service users to search services through public, but untrusted service directories with the protection of their privacy against the service directories. The service directories can match the registered services with service requests, but do not learn any information about them. Our approach also enforces access control on services during the matching process, which prevents unauthorized users from discovering services. After the service directories match a set of services that satisfy the service users' functionality requirements, the service discovery approach presented in this dissertation further considers service users' QoS requirements in two steps. First, this approach optimizes services' QoS by making tradeoff among various QoS aspects with users' QoS requirements and preferences. Second, this approach ranks services based on how well they satisfy users' QoS requirements to help service users select the most suitable service to develop their SBSs.

Contributors

Agent

Created

Date Created
  • 2011

149803-Thumbnail Image.png

Systematic policy analysis and management

Description

With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks,

With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of these policies is an extremely important task in order to avoid unintended security leakages via illegal accesses, while maintaining proper access to services for legitimate users. Managing and maintaining access control policies manually over long period of time is an error prone task due to their inherent complex nature. Existing tools and mechanisms for policy management use different approaches for different types of policies. This research thesis represents a generic framework to provide an unified approach for policy analysis and management of different types of policies. Generic approach captures the common semantics and structure of different access control policies with the notion of policy ontology. Policy ontology representation is then utilized for effectively analyzing and managing the policies. This thesis also discusses a proof-of-concept implementation of the proposed generic framework and demonstrates how efficiently this unified approach can be used for analysis and management of different types of access control policies.

Contributors

Agent

Created

Date Created
  • 2011