skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Designing for Researcher Access in the U.S. Mortality Data Ecosystem
Access to mortality data is critical for researchers for various reasons, including the development of life-saving medical interventions. However, high-quality mortality data is typically unavailable for researchers to access in a timely manner due to bottlenecks and inefficiencies in the coordination of managing mortality data across a vast information ecosystem. To identify opportunities to improve access to mortality data, we conducted a qualitative interview study with 20 experts with direct knowledge and experience with mortality data systems. From these interviews, we mapped the mortality data ecosystem and found that policy constraints are the main underlying cause of bottlenecks and inefficiencies. We argue that policy intervention is required to optimize the coordination of mortality data between databases and between organizations. To support researcher access to mortality data, we present guiding principles for designers seeking to improve the mortality data ecosystem. These principles contribute to CSCW scholarship focused on the challenges of coordination across large information ecosystems and the tradeoffs between technology and policy when designing such systems.  more » « less
Award ID(s):
2048244
PAR ID:
10623824
Author(s) / Creator(s):
; ; ;
Publisher / Repository:
ACM
Date Published:
Journal Name:
Proceedings of the ACM on Human-Computer Interaction
Volume:
8
Issue:
CSCW2
ISSN:
2573-0142
Page Range / eLocation ID:
1 to 31
Subject(s) / Keyword(s):
end-of-life support, data and accounts, policy, law, legislation, regulation, CDC
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract To fulfill their conservation potential and provide safeguards for biodiversity, marine protected areas (MPAs) need coordinated research and monitoring for informed management through effective evaluation of ecosystem dynamics. However, coordination is challenging, often due to knowledge gaps caused by inadequate access to data and resources, compounded by insufficient communication between scientists and managers. We propose to use the world's largest MPA in the Ross Sea, Antarctica as a model system to create a comprehensive framework for an interdisciplinary network supporting research and monitoring that could be implemented in other remote large‐scale international MPAs. Our proposed framework has three key components: (i) policy engagement, including delineation of policy needs and ecosystem metrics to assess MPA effectiveness; (ii) community partner engagement to elevate diverse voices, build trust, and share resources; and (iii) integrated science comprising three themes. These themes are: advancement of data science and cyberinfrastructure to facilitate data synthesis and sharing; biophysical modeling towards understanding ecosystem changes and uncertainties; and execution of observational and process studies to address uncertainties and evaluate ecosystem metrics. This proposed framework can improve MPA implementation by generating policy‐relevant science through this coordinated network, which can in turn improve MPA effectiveness in the Ross Sea and beyond. 
    more » « less
  2. Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources. It assumes no implicit trust is granted to assets or user accounts based solely on their physical or network location. We have billions of devices in IoT ecosystems connected to enable smart environments, and these devices are scattered around different locations, sometimes multiple cities or even multiple countries. Moreover, the deployment of resource-constrained devices motivates the integration of IoT and cloud services. This adoption of a plethora of technologies expands the attack surface and positions the IoT ecosystem as a target for many potential security threats. This complexity has outstripped legacy perimeter-based security methods as there is no single, easily identified perimeter for different use cases in IoT. Hence, we believe that the need arises to incorporate ZT guiding principles in workflows, systems design, and operations that can be used to improve the security posture of IoT applications. This paper motivates the need to implement ZT principles when developing access control models for smart IoT systems. It first provides a structured mapping between the ZT basic tenets and the PEI framework when designing and implementing a ZT authorization system. It proposes the ZT authorization requirements framework (ZT-ARF), which provides a structured approach to authorization policy models in ZT systems. Moreover, it analyzes the requirements of access control models in IoT within the proposed ZT-ARF and presents the vision and need for a ZT score-based authorization framework (ZT-SAF) that is capable of maintaining the access control requirements for ZT IoT connected systems. 
    more » « less
  3. Amdahl’s law implies that even small sequential bottlenecks can seriously limit the scalability of multi-threaded programs. To achieve scalability, developers must painstakingly identify sequential bottlenecks in their program and eliminate these bottlenecks by either changing synchronization strategies or rearchitecting and rewriting any code with sequential bot- tlenecks. This can require significant effort by the developer to find and understand how to fix sequential bottlenecks. To address the issue, we bring a new tool, information flow, to the problem of understanding sequential bottlenecks. In- formation flow can help developers understand whether a bottleneck is fundamental to the computation, or merely an artifact of the implementation. First, our strategy tracks memory access conflicts to find over-synchronized applications where redesigning the syn- chronization strategy on the existing implementation can improve performance. Then, information flow analysis finds optimization opportunities where changing the existing im- plementation can improve performance of applications that have bottlenecks due to unnecessary memory access con- flicts. We implemented this in FlowProf. We have evaluated FlowProf on a set of multi-threaded Java applications where the generated optimization insights achieve performance gains of up to 58%. 
    more » « less
  4. In seeking to understand how to protect the public information sphere from corruption, researchers understandably focus on dysfunction. However, parts of the public information ecosystem function very well, and understanding this as well will help in protecting and developing existing strengths. Here, we address this gap, focusing on public engagement with high-quality science-based information, consensus reports of the National Academies of Science, Engineering, and Medicine (NASEM). Attending to public use is important to justify public investment in producing and making freely available high-quality, scientifically based reports. We deploy Bidirectional Encoder Representations from Transformers (BERT), a high-performing, supervised machine learning model, to classify 1.6 million comments left by US downloaders of National Academies reports responding to a prompt asking how they intended to use the report. The results provide detailed, nationwide evidence of how the public uses open access scientifically based information. We find half of reported use to be academic—research, teaching, or studying. The other half reveals adults across the country seeking the highest-quality information to improve how they do their job, to help family members, to satisfy their curiosity, and to learn. Our results establish the existence of demand for high-quality information by the public and that such knowledge is widely deployed to improve provision of services. Knowing the importance of such information, policy makers can be encouraged to protect it. 
    more » « less
  5. The K–12 broadening participation in computing (BPC) effort re- quires access to comprehensive state and national K–12 data from which stronger strategies for systems change can be developed. The Expanding Computing Education Pathways (ECEP) Alliance Com- mon Metrics Project (CMP) engages state teams that include state and local education agencies, researchers, and other BPC advocates addressing K–12 computer science (CS) inequities in access and participation at the systems level. The CMP promotes collaboration and knowledge sharing, with teams reporting how CMP enhances BPC policy, pathways, and practices to improve student access and participation in computing. This experience report shares how the CMP advances data as a key tool for driving BPC strategies in state advocacy and policy efforts. 
    more » « less