Opening the Black Box of Electronic Health: Collecting, Analyzing, and Interpreting Log Data

نویسندگان

  • Floor Sieverink
  • Saskia Kelders
  • Mannes Poel
  • Lisette van Gemert-Pijnen
چکیده

In electronic health (eHealth) research, limited insight has been obtained on process outcomes or how the use of technology has contributed to the users' ability to have a healthier life, improved well-being, or activate new attitudes in their daily tasks. As a result, eHealth is often perceived as a black box. To open this black box of eHealth, methodologies must extend beyond the classic effect evaluations. The analyses of log data (anonymous records of real-time actions performed by each user) can provide continuous and objective insights into the actual usage of the technology. However, the possibilities of log data in eHealth research have not been exploited to their fullest extent. The aim of this paper is to describe how log data can be used to improve the evaluation and understand the use of eHealth technology with a broader approach than only descriptive statistics. This paper serves as a starting point for using log data analysis in eHealth research. Here, we describe what log data is and provide an overview of research questions to evaluate the system, the context, the users of a technology, as well as the underpinning theoretical constructs. We also explain the requirements for log data, the starting points for the data preparation, and methods for data collection. Finally, we describe methods for data analysis and draw a conclusion regarding the importance of the results for both scientific and practical applications. The analysis of log data can be of great value for opening the black box of eHealth. A deliberate log data analysis can give new insights into how the usage of the technology contributes to found effects and can thereby help to improve the persuasiveness and effectiveness of eHealth technology and the underpinning behavioral models.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modifying Without a Trace: General Audit Guidelines are Inadequate for Electronic Health Record Audit Mechanisms

Without adequate audit mechanisms, electronic health record (EHR) systems remain vulnerable to undetected misuse. Users could modify or delete protected health information without these actions being traceable. The objective of this paper is to assess electronic health record audit mechanisms to determine the current degree of auditing for non-repudiation and to assess whether general audit gui...

متن کامل

Opening the Black Box : How Data

Opening the Black Box: How Data Mining Works with examples for Social Scientists in Higher Education Research Terrence Willett © 200

متن کامل

(Nearly) round-optimal black-box constructions of commitments secure against selective opening attacks

Selective opening attacks against commitment schemes occur when the commitment scheme is repeated in parallel (or concurrently) and an adversary can choose depending on the commit-phase transcript to see the values and openings to some subset of the committed bits. Commitments are secure under such attacks if one can prove that the remaining, unopened commitments stay secret. We prove the follo...

متن کامل

Memory-Restricted Black-Box Complexity

We show that the black-box complexity with memory restriction one of the n-dimensional OneMax function class is at most 2n. This disproves the Θ(n log n) conjecture of Droste, Jansen, and Wegener (Theory of Computing Systems 39 (2006) 525–544).

متن کامل

Beyond the Black Box Approach to Ethics!; Comment on “Expanded HTA: Enhancing Fairness and Legitimacy”

In the editorial published in this journal, Daniels and colleagues argue that his and Sabin’s accountability for reasonableness (A4R) framework should be used to handle ethical issues in the health technology assessment (HTA)-process, especially concerning fairness. In contrast to this suggestion, it is argued that such an approach risks suffering from the irrrelevance or insufficiency they war...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2017