Abstract Managing adverse drug reactions (ADRs) is a challenge, especially because most healthcare professionals are insufficiently trained for this task. Since context-based clinical pharmacovigilance training has proven effective, we assessed the feasibility and effect of a creating a team of Junior-Adverse Drug Event Managers (J-ADEMs). The J-ADEM team consisted of medical students (1st–6th year) tasked with managing and reporting ADRs in hospitalized patients. Feasibility was evaluated using questionnaires. Student competence in reporting ADRs was evaluated using a case-control design and questionnaires before and after J-ADEM program participation. From Augustus 2018 to Augustus 2019, 41 students participated in a J-ADEM team and screened 136 patients and submitted 65 ADRs reports to the Netherlands Pharmacovigilance Center Lareb. Almost all patients (n = 61) found it important that “their” ADR was reported, and all (n = 62) patients felt they were taken seriously by the J-ADEM team. Although attending physicians agreed that the ADRs should have been reported, they did not do so themselves mainly because of a “lack of knowledge and attitudes” (50%) and “excuses made by healthcare professionals” (49%). J-ADEM team students were significantly more competent than control students in managing ADRs and correctly applying all steps for diagnosing ADRs (control group 38.5% vs. intervention group 83.3%, p < 0.001). The J-ADEM team is a feasible approach for detecting and managing ADRs in hospital. Patients were satisfied with the care provided, physicians were supported in their ADR reporting obligations, and students acquired relevant basic and clinical pharmacovigilance skills and knowledge, making it a win-win-win intervention.
MULTIFILE
Abstract Aims: Medical case vignettes play a crucial role in medical education, yet they often fail to authentically represent diverse patients. Moreover, these vignettes tend to oversimplify the complex relationship between patient characteristics and medical conditions, leading to biased and potentially harmful perspectives among students. Displaying aspects of patient diversity, such as ethnicity, in written cases proves challenging. Additionally, creating these cases places a significant burden on teachers in terms of labour and time. Our objective is to explore the potential of artificial intelligence (AI)-assisted computer-generated clinical cases to expedite case creation and enhance diversity, along with AI-generated patient photographs for more lifelike portrayal. Methods: In this study, we employed ChatGPT (OpenAI, GPT 3.5) to develop diverse and inclusive medical case vignettes. We evaluated various approaches and identified a set of eight consecutive prompts that can be readily customized to accommodate local contexts and specific assignments. To enhance visual representation, we utilized Adobe Firefly beta for image generation. Results: Using the described prompts, we consistently generated cases for various assignments, producing sets of 30 cases at a time. We ensured the inclusion of mandatory checks and formatting, completing the process within approximately 60 min per set. Conclusions: Our approach significantly accelerated case creation and improved diversity, although prioritizing maximum diversity compromised representativeness to some extent. While the optimized prompts are easily reusable, the process itself demands computer skills not all educators possess. To address this, we aim to share all created patients as open educational resources, empowering educators to create cases independently.
A substantial part of graduate education in veterinary medicine is spent in clinical practice. During the clinical experiential phase, it is difficult to monitor students' actual knowledge development: they build individual records of experiences based on the cases they have to deal with, while mainly focusing on knowledge that is of direct, clinical relevance to them. As a result, students' knowledge bases may differ to such a degree that a single test alone may not be able to provide an adequate reflection of progress made. In these circumstances, progress testing, which is a method of longitudinal assessment independent of the curricular structure, may offer a viable solution. The purpose of this study, therefore, was to determine the extent to which progress tests (PT) can be used to monitor progress in knowledge development at a graduate level in veterinary medical education. With a 6-month interval, we administered two tests to students based on the Maastricht Progress Test format that covered a large variety of veterinary topics. Consequently, we analyzed students' progress in knowledge development. Based on a substantive appraisal of the questions and analysis of the test results, we concluded that the tests met the measurement criteria. They appeared sensitive enough to gauge the progress made and were appreciated by the students. Hence, in spite of the differences within the whole graduate group, the PT format can be used to monitor students' knowledge development.
The modern economy is largely data-driven and relies on the processing and sharing of data across organizations as a key contributor to its success. At the same time, the value, amount, and sensitivity of processed data is steadily increasing, making it a major target of cyber-attacks. A large fraction of the many reported data breaches happened in the healthcare sector, mostly affecting privacy-sensitive data such as medical records and other patient data. This puts data security technologies as a priority item on the agenda of many healthcare organizations, such as of the Dutch health insurance company Centraal Ziekenfonds (CZ). In particular when it comes to sharing data securely, practical data protection technologies are lacking as they mostly focus on securing the link between two organizations while being completely oblivious of what is happening with the data after sharing. For CZ, searchable encryption (SE) technologies that allow to share data in encrypted form, while enabling the private search on this encrypted data without the need to decrypt, are of particular interest. Unfortunately, existing efficient SE schemes completely leak the access pattern (= pattern of encrypted search results, e.g. identifiers of retrieved items) and the search pattern (= pattern of search queries, e.g. frequency of same queries), making them susceptible to leakage-abuse attacks that exploit this leakage to recover what has been queried for and/or (parts of) the shared data itself. The SHARE project will investigate ways to reduce the leakage in searchable encryption in order to mitigate the impact of leakage-abuse attacks while keeping the performance-level high enough for practical use. Concretely, we propose the construction of SE schemes that allow the leakage to be modeled as a statistic released on the queries and shared dataset in terms of ε-differential privacy, a well-established notion that informally says that, after observing the statistic, you learn approximately (determined by the ε-parameter) the same amount of information about an individual data item or query as if the item was not present in the dataset or the query has not been performed. Naturally, such an approach will produce false positives and negatives in the querying process, affecting the scheme’s performance. By calibrating the ε-parameter, we can achieve various leakage-performance trade-offs tailored to the needs of specific applications. SHARE will explore the idea of differentially-private leakage on different parts of SE with different search capabilities, starting with exact-keyword-match SE schemes with differentially-private leakage on the access pattern only, up to schemes with differentially-private leakage on the access and search pattern as well as on the shared dataset itself, allowing for more expressive query types like fuzzy match, range, or substring queries. SHARE comes with an attack lab in which we investigate existing and new types of leakage-abuse attacks to assess the mitigation-potential of our proposed combination of differential privacy with cryptographic guarantees in searchable encryption. To stimulate commercial exploitation of SHARE-results, our consortium partners CZ and TNO will take the lead on applying and evaluating our envisioned technologies in various healthcare use-cases.
The goal of UPIN is to develop and evaluate a scalable distributed system that enables users to cryptographically verify and easily control the paths through which their data travels through an inter-domain network like the Internet, both in terms of router-to-router hops as well as in terms of router attributes (e.g., their location, operator, security level, and manufacturer). UPIN will thus provide the solution to a very relevant and current problem, namely that it is becoming increasingly opaque for users on the Internet who processes their data (e.g., in terms of service providers their data passes through as well as what jurisdictions apply) and that they have no control over how it is being routed. This is a risk for people’s privacy (e.g., a malicious network compromising a user’s data) as well as for their safety (e.g., an untrusted network disrupting a remote surgery). Motivating examples in which (sensitive) user data typically travels across the Internet without user awareness or control are: - Internet of Things for consumers: sensors such as sleep trackers and light switches that collect information about a user’s physical environment and send it across the Internet to remote services for analysis. - Medical records: health care providers requiring medical information (e.g., health records of patients or remote surgery telemetry) to travel between medical institutions according to specified agreements. - Intelligent transport systems: communication plays a crucial role in future autonomous transportation systems, for instance to avoid freight drones colliding or to ensure smooth passing of trucks through busy urban areas. The UPIN project is novel in three ways: 1. UPIN gives users the ability to control and verify the path that their data takes through the network all the way to the destination endpoint, both in terms of hops and attributes of routers traversed. UPIN accomplishes this by adding and improving remote attestation techniques for on-path routers to existing path verification mechanisms, and by adopting and further developing in-packet path selection directives for control. 2. We develop and simulate data and control plane protocols and router extensions to include the UPIN system in inter-domain networking systems such as IP (e.g., using BGP and segment routing) and emerging systems such as SCION and RINA. 3. We evaluate the scalability and performance of the UPIN system using a multi-site testbed of open programmable P4 routers, which is necessary because UPIN requires novel packet processing functions in the data plane. We validate the system using the earlier motivating examples as use cases. The impact we target is: - Increased trust from users (individuals and organizations) in network services because they are able to verify how their data travels through the network to the destination endpoint and because the UPIN APIs enable novel applications that use these network functions. - More empowered users because they are able to control how their data travels through inter-domain networks, which increases self-determination, both at the level of individual users as well as at the societal level.