Data to Analyse Human Interaction with the Environment

20120402092846!HCI_Undergraduate_Program.jpg

 

Officials in some U.S federal agencies are looking to the Internet of Things -- a term for a connected network of devices and sensors -- for new ways to analyze the relationship between humans and their environments. 
During a recent panel in Washington, Suzana Petanceska, a health scientist administrator at the National Institutes of Health's health National Institute on Aging, said "there's an increasing number of things we can measure" to determine how the environment interacts with a patient's genetic disposition to result in an increased or decreased risk for disease.  
In the near future, she predicted, sensors and wearable devices will "change how we do research." It's already done in instances like Apple's ResearchKit, which can take data -- such as weight or blood pressure -- from a user's Health app with the users' permission and analyze them in relation to certain health conditions such as heart disease. 
Wearable devices will also transform the process of obtaining consent, she added. 
During the same panel, NASA’s advanced technology lead for the NASA Center for Climate Simulations, Hoot Thompson, said his team had analyzed social media posts and their relation to climate models. For instance, they searched for tweets mentioning the word "tornado," and overlaid them on a Google-generated map. Unsurprisingly, he said, the map showed tornadoes in the tornado-prone regions of Oklahoma and Texas.  
"We're looking for Twitter data, we're looking for Facebook data -- anything that social media, people on the ground who are witnessing climatic events, [and] we lay that on top of our models," he said.
NextGov:  http://bit.ly/1NtNLTe
 

« Seasoned Cybersecurity Professionals : 3 - 5 months Contracts in the US
The Coming Cyberpeace »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

Allianz

Allianz

Allianz Cyber Protect is a comprehensive cyber insurance provided internationally and tailored to your company´s risk profile.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

Willis Towers Watson

Willis Towers Watson

Willis Towers Watson is a global risk management, insurance brokerage and advisory company. Services offered include Cyber Risks insurance.

European Business Reliance Centre (EBRC)

European Business Reliance Centre (EBRC)

EBRC is a leader in integrated Data Center, Cloud and Managed Services and a Centre of Excellence in Europe in the Management of Sensitive Information.

GuardSquare

GuardSquare

GuardSquare is the global reference in mobile application protection. We develop premium software for the protection of mobile applications against reverse engineering and hacking.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

GoCyber

GoCyber

GoCyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

PeckShield

PeckShield

PeckShield is a blockchain security company which aims to elevate the security, privacy, and usability of entire blockchain ecosystem by offering top-notch, industry-leading services and products.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

Wickr

Wickr

Wickr's mission is to secure the world's most critical communications. Wickr provides the highest standard of encryption trusted by millions worldwide.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.