Data to Analyse Human Interaction with the Environment

20120402092846!HCI_Undergraduate_Program.jpg

 

Officials in some U.S federal agencies are looking to the Internet of Things -- a term for a connected network of devices and sensors -- for new ways to analyze the relationship between humans and their environments. 
During a recent panel in Washington, Suzana Petanceska, a health scientist administrator at the National Institutes of Health's health National Institute on Aging, said "there's an increasing number of things we can measure" to determine how the environment interacts with a patient's genetic disposition to result in an increased or decreased risk for disease.  
In the near future, she predicted, sensors and wearable devices will "change how we do research." It's already done in instances like Apple's ResearchKit, which can take data -- such as weight or blood pressure -- from a user's Health app with the users' permission and analyze them in relation to certain health conditions such as heart disease. 
Wearable devices will also transform the process of obtaining consent, she added. 
During the same panel, NASA’s advanced technology lead for the NASA Center for Climate Simulations, Hoot Thompson, said his team had analyzed social media posts and their relation to climate models. For instance, they searched for tweets mentioning the word "tornado," and overlaid them on a Google-generated map. Unsurprisingly, he said, the map showed tornadoes in the tornado-prone regions of Oklahoma and Texas.  
"We're looking for Twitter data, we're looking for Facebook data -- anything that social media, people on the ground who are witnessing climatic events, [and] we lay that on top of our models," he said.
NextGov:  http://bit.ly/1NtNLTe
 

« Seasoned Cybersecurity Professionals : 3 - 5 months Contracts in the US
The Coming Cyberpeace »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Lacuna Talent

Lacuna Talent

Lacuna Talent delivers the combined power of Via Resource, the international Cyber Security recruiter, and Lacuna Talent, the Specialist AI/Data recruiter.

Synovum

Synovum

Synovum was formed with the intention to provide high quality advice, consultancy, training and project management services to clients in all sectors of industry.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

Awen Collective

Awen Collective

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation.

ZenMate

ZenMate

ZenMate is a Virtual Private Network services provider offering secure encrypted access to the internet.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

ENAC

ENAC

ENAC is the national accreditation body for Spain. The directory of members provides details of organisations offering certification services for ISO 27001.

OCM Business Systems

OCM Business Systems

OCM are experts in the safe, secure and responsible disposal of IT & EPoS assets.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

Blu Venture Investors (BVI)

Blu Venture Investors (BVI)

Blu Venture Investors is a venture capital firm that supports early stage companies with a focus on technology in diverse domains including cybersecurity, IoT, defense and homeland security.

Sierra Ventures

Sierra Ventures

Sierra Ventures is an early-stage venture firm investing globally with a focus on Next Generation Enterprise and Emerging Technologies.

Laminar

Laminar

Laminar provides the only Public Cloud Data Protection solution that provides full visibility and enforcement capabilities across your entire public cloud infrastructure.

South West Cyber Resilience Centre (SWCRC)

South West Cyber Resilience Centre (SWCRC)

The South West Cyber Resilience Centre (SWCRC) is led by serving police officers, as part of a not-for-profit partnership with business and academia.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Actelis Networks

Actelis Networks

Actelis Networks is a market leader in cyber-hardened, rapid deployment networking solutions for wide-area IoT applications.