scispace - formally typeset
Search or ask a question

Showing papers on "The Internet published in 2013"


Journal ArticleDOI
TL;DR: A practical guide to the analysis and visualization features of the cBioPortal for Cancer Genomics, which makes complex cancer genomics profiles accessible to researchers and clinicians without requiring bioinformatics expertise, thus facilitating biological discoveries.
Abstract: The cBioPortal for Cancer Genomics (http://cbioportal.org) provides a Web resource for exploring, visualizing, and analyzing multidimensional cancer genomics data. The portal reduces molecular profiling data from cancer tissues and cell lines into readily understandable genetic, epigenetic, gene expression, and proteomic events. The query interface combined with customized data storage enables researchers to interactively explore genetic alterations across samples, genes, and pathways and, when available in the underlying data, to link these to clinical outcomes. The portal provides graphical summaries of gene-level data from multiple platforms, network visualization and analysis, survival analysis, patient-centric queries, and software programmatic access. The intuitive Web interface of the portal makes complex cancer genomics profiles accessible to researchers and clinicians without requiring bioinformatics expertise, thus facilitating biological discoveries. Here, we provide a practical guide to the analysis and visualization features of the cBioPortal for Cancer Genomics.

10,947 citations


Journal ArticleDOI
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.

9,593 citations



Journal ArticleDOI
TL;DR: GENES as mentioned in this paper is a software package used for data analysis and processing with different biometric models and is essential in genetic studies applied to plant and animal breeding It allows parameter estimation to analyze biological phenomena and is fundamental for the decision-making process and predictions of success and viability of selection strategies.
Abstract: GENES is a software package used for data analysis and processing with different biometric models and is essential in genetic studies applied to plant and animal breeding It allows parameter estimation to analyze biological phenomena and is fundamental for the decision-making process and predictions of success and viability of selection strategies The program can be downloaded from the Internet (http://wwwufvbr/dbg/genes/geneshtm or http://wwwufvbr/dbg/biodatahtm) and is available in Portuguese, English and Spanish Specific literature (http://wwwlivrariaufvbr/) and a set of sample files are also provided, making GENES easy to use The software is integrated into the programs MS Word, MS Excel and Paint, ensuring simplicity and effectiveness in data import and export of results, figures and data It is also compatible with the free software R and Matlab, through the supply of useful scripts available for complementary analyses in different areas, including genome wide selection, prediction of breeding values and use of neural networks in genetic improvement

1,190 citations


Journal ArticleDOI
TL;DR: A survey of current research in the Virtual Network Embedding (VNE) area is presented and a taxonomy of current approaches to the VNE problem is provided and opportunities for further research are discussed.
Abstract: Network virtualization is recognized as an enabling technology for the future Internet. It aims to overcome the resistance of the current Internet to architectural change. Application of this technology relies on algorithms that can instantiate virtualized networks on a substrate infrastructure, optimizing the layout for service-relevant metrics. This class of algorithms is commonly known as "Virtual Network Embedding (VNE)" algorithms. This paper presents a survey of current research in the VNE area. Based upon a novel classification scheme for VNE algorithms a taxonomy of current approaches to the VNE problem is provided and opportunities for further research are discussed.

1,174 citations


Journal ArticleDOI
TL;DR: The history, current use, and future of opinion mining and sentiment analysis are discussed, along with relevant techniques and tools.
Abstract: The Web holds valuable, vast, and unstructured information about public opinion. Here, the history, current use, and future of opinion mining and sentiment analysis are discussed, along with relevant techniques and tools.

1,042 citations


Journal ArticleDOI
TL;DR: Although participants with psychiatric symptoms, specific risk factors, or rare demographic characteristics can be difficult to identify and recruit for participation in research, participants with... as discussed by the authors found that participants with...
Abstract: Although participants with psychiatric symptoms, specific risk factors, or rare demographic characteristics can be difficult to identify and recruit for participation in research, participants with...

1,042 citations


BookDOI
01 Jan 2013
TL;DR: In this article, the authors report authoritative insights into one of the most significant developments related to social interaction and offer an analytic framework for exploring these new sites, while underscoring the centrality of social interaction since the Internet's earliest days, such as through email.
Abstract: This chapter reports authoritative insights into one of the most significant developments related to social interaction – social network sites – and offers an analytic framework for exploring these new sites, while underscoring the centrality of social interaction since the Internet's earliest days, such as through email. Social network sites (SNSs) presented several characteristics that made it possible for individuals to easily update their profiles. The implicit role of communication and information sharing has become the driving motivator for participation. The concept of ‘Web 2.0’ was an industry-driven phenomenon, hyped by the news media and by business analysts alike. Social network sites emerged out of the Web 2.0 and social media phenomena, mixing new technologies and older computer-mediated communication practices infused by tech industry ideals. Server-level data offer a unique opportunity to access elaborated behavioural data about what people are doing on SNSs.

835 citations


Journal ArticleDOI
TL;DR: In this paper, Belitz et al. presented a survey of the state-of-the-art in condensed-matter physics, focusing on the following papers: Condensed Matter Physics (Theoretical) J. IGNACIO CIRAC, Max-Planck-Institut für Quantenoptik Quantum Information RAYMOND E. GOLDSTEIN, University of Cambridge Biological Physics ARTHUR F. HEBARD and DAVID D. KAMIEN.
Abstract: Associate DIETRICH BELITZ, University of Oregon Editors: Condensed Matter Physics (Theoretical) J. IGNACIO CIRAC, Max-Planck-Institut für Quantenoptik Quantum Information RAYMOND E. GOLDSTEIN, University of Cambridge Biological Physics ARTHUR F. HEBARD, University of Florida Condensed Matter Physics (Experimental) RANDALL D. KAMIEN, University of Pennsylvania Soft Condensed Matter DANIEL KLEPPNER, Massachusetts Institute of Technology Atomic, Molecular, and Optical Physics (Experimental) PAUL G. LANGACKER, Institute for Advanced Study, Princeton University Particle Physics (Theoretical) VERA LÜTH, Stanford University Particle Physics (Experimental) DAVID D. MEYERHOFER, University of Rochester Physics of Plasmas and Matter at High-Energy Density WITOLD NAZAREWICZ, University of Tennessee, Oak Ridge National Laboratory Nuclear Physics JOHN H. SCHWARZ, California Institute of Technology Mathematical Physics FRIEDRICH-KARL THIELEMANN, Universität Basel Astrophysics Senior Assistant Editor: DEBBIE BRODBAR, APS Editorial Office American Physical Society

774 citations


Journal ArticleDOI
TL;DR: It becomes critically important to study how the current approaches to standardization in this area can be improved, and better understand the opportunities for the research community to contribute to the IoT field.
Abstract: Technologies to support the Internet of Things are becoming more important as the need to better understand our environments and make them smart increases. As a result it is predicted that intelligent devices and networks, such as WSNs, will not be isolated, but connected and integrated, composing computer networks. So far, the IP-based Internet is the largest network in the world; therefore, there are great strides to connect WSNs with the Internet. To this end, the IETF has developed a suite of protocols and open standards for accessing applications and services for wireless resource constrained networks. However, many open challenges remain, mostly due to the complex deployment characteristics of such systems and the stringent requirements imposed by various services wishing to make use of such complex systems. Thus, it becomes critically important to study how the current approaches to standardization in this area can be improved, and at the same time better understand the opportunities for the research community to contribute to the IoT field. To this end, this article presents an overview of current standards and research activities in both industry and academia.

744 citations


Journal ArticleDOI
01 Nov 2013
TL;DR: This paper design, implement, and evaluate a novel intrusion detection system for the IoT that is primarily target routing attacks such as spoofed or altered information, sinkhole, and selective-forwarding, but can be extended to detect other attacks.
Abstract: In the Internet of Things (IoT), resource-constrained things are connected to the unreliable and untrusted Internet via IPv6 and 6LoWPAN networks. Even when they are secured with encryption and authentication, these things are exposed both to wireless attacks from inside the 6LoWPAN network and from the Internet. Since these attacks may succeed, Intrusion Detection Systems (IDS) are necessary. Currently, there are no IDSs that meet the requirements of the IPv6-connected IoT since the available approaches are either customized for Wireless Sensor Networks (WSN) or for the conventional Internet. In this paper we design, implement, and evaluate a novel intrusion detection system for the IoT that we call SVELTE. In our implementation and evaluation we primarily target routing attacks such as spoofed or altered information, sinkhole, and selective-forwarding. However, our approach can be extended to detect other attacks. We implement SVELTE in the Contiki OS and thoroughly evaluate it. Our evaluation shows that in the simulated scenarios, SVELTE detects all malicious nodes that launch our implemented sinkhole and/or selective forwarding attacks. However, the true positive rate is not 100%, i.e., we have some false alarms during the detection of malicious nodes. Also, SVELTE's overhead is small enough to deploy it on constrained nodes with limited energy and memory capacity.

Journal ArticleDOI
TL;DR: ConsensusPathDB has grown mainly due to the integration of 12 further databases; it now contains 215 541 unique interactions and 4601 pathways from overall 30 databases, and has re-implemented the graph visualization feature of Consensus pathDB using the Cytoscape.js library.
Abstract: Knowledge of the various interactions between molecules in the cell is crucial for understanding cellular processes in health and disease. Currently available interaction databases, being largely complementary to each other, must be integrated to obtain a comprehensive global map of the different types of interactions. We have previously reported the development of an integrative interaction database called ConsensusPathDB (http://ConsensusPathDB.org) that aims to fulfill this task. In this update article, we report its significant progress in terms of interaction content and web interface tools. ConsensusPathDB has grown mainly due to the integration of 12 further databases; it now contains 215 541 unique interactions and 4601 pathways from overall 30 databases. Binary protein interactions are scored with our confidence assessment tool, IntScore. The ConsensusPathDB web interface allows users to take advantage of these integrated interaction and pathway data in different contexts. Recent developments include pathway analysis of metabolite lists, visualization of functional gene/metabolite sets as overlap graphs, gene set analysis based on protein complexes and induced network modules analysis that connects a list of genes through various interaction types. To facilitate the interactive, visual interpretation of interaction and pathway data, we have re-implemented the graph visualization feature of ConsensusPathDB using the Cytoscape.js library.

Journal ArticleDOI
TL;DR: The wireless communications stack the industry believes to meet the important criteria of power-efficiency, reliability and Internet connectivity, and the protocol stack proposed in the present work converges towards the standardized notations of the ISO/OSI and TCP/IP stacks is proposed.
Abstract: We have witnessed the Fixed Internet emerging with virtually every computer being connected today; we are currently witnessing the emergence of the Mobile Internet with the exponential explosion of smart phones, tablets and net-books. However, both will be dwarfed by the anticipated emergence of the Internet of Things (IoT), in which everyday objects are able to connect to the Internet, tweet or be queried. Whilst the impact onto economies and societies around the world is undisputed, the technologies facilitating such a ubiquitous connectivity have struggled so far and only recently commenced to take shape. To this end, this paper introduces in a timely manner and for the first time the wireless communications stack the industry believes to meet the important criteria of power-efficiency, reliability and Internet connectivity. Industrial applications have been the early adopters of this stack, which has become the de-facto standard, thereby bootstrapping early IoT developments with already thousands of wireless nodes deployed. Corroborated throughout this paper and by emerging industry alliances, we believe that a standardized approach, using latest developments in the IEEE 802.15.4 and IETF working groups, is the only way forward. We introduce and relate key embodiments of the power-efficient IEEE 802.15.4-2006 PHY layer, the power-saving and reliable IEEE 802.15.4e MAC layer, the IETF 6LoWPAN adaptation layer enabling universal Internet connectivity, the IETF ROLL routing protocol enabling availability, and finally the IETF CoAP enabling seamless transport and support of Internet applications. The protocol stack proposed in the present work converges towards the standardized notations of the ISO/OSI and TCP/IP stacks. What thus seemed impossible some years back, i.e., building a clearly defined, standards-compliant and Internet-compliant stack given the extreme restrictions of IoT networks, is commencing to become reality.

Posted Content
TL;DR: The objective is to investigate the concept of sensing as a service model in technological, economical and social perspectives and identify the major open challenges and issues.
Abstract: The world population is growing at a rapid pace. Towns and cities are accommodating half of the world's population thereby creating tremendous pressure on every aspect of urban living. Cities are known to have large concentration of resources and facilities. Such environments attract people from rural areas. However, unprecedented attraction has now become an overwhelming issue for city governance and politics. The enormous pressure towards efficient city management has triggered various Smart City initiatives by both government and private sector businesses to invest in ICT to find sustainable solutions to the growing issues. The Internet of Things (IoT) has also gained significant attention over the past decade. IoT envisions to connect billions of sensors to the Internet and expects to use them for efficient and effective resource management in Smart Cities. Today infrastructure, platforms, and software applications are offered as services using cloud technologies. In this paper, we explore the concept of sensing as a service and how it fits with the Internet of Things. Our objective is to investigate the concept of sensing as a service model in technological, economical, and social perspectives and identify the major open challenges and issues.

Journal ArticleDOI
TL;DR: It is shown that not only are the search queries and the prices connected but there also exists a pronounced asymmetry between the effect of an increased interest in the currency while being above or below its trend value.
Abstract: Digital currencies have emerged as a new fascinating phenomenon in the financial markets. Recent events on the most popular of the digital currencies – BitCoin – have risen crucial questions about behavior of its exchange rates and they offer a field to study dynamics of the market which consists practically only of speculative traders with no fundamentalists as there is no fundamental value to the currency. In the paper, we connect two phenomena of the latest years – digital currencies, namely BitCoin, and search queries on Google Trends and Wikipedia – and study their relationship. We show that not only are the search queries and the prices connected but there also exists a pronounced asymmetry between the effect of an increased interest in the currency while being above or below its trend value.

Proceedings Article
14 Aug 2013
TL;DR: ZMap is introduced, a modular, open-source network scanner specifically architected to perform Internet-wide scans and capable of surveying the entire IPv4 address space in under 45 minutes from user space on a single machine, approaching the theoretical maximum speed of gigabit Ethernet.
Abstract: Internet-wide network scanning has numerous security applications, including exposing new vulnerabilities and tracking the adoption of defensive mechanisms, but probing the entire public address space with existing tools is both difficult and slow. We introduce ZMap, a modular, open-source network scanner specifically architected to perform Internet-wide scans and capable of surveying the entire IPv4 address space in under 45 minutes from user space on a single machine, approaching the theoretical maximum speed of gigabit Ethernet. We present the scanner architecture, experimentally characterize its performance and accuracy, and explore the security implications of high speed Internet-scale network surveys, both offensive and defensive. We also discuss best practices for good Internet citizenship when performing Internet-wide surveys, informed by our own experiences conducting a long-term research survey over the past year.

Journal ArticleDOI
TL;DR: An effective implementation for Internet of Things used for monitoring regular domestic conditions by means of low cost ubiquitous sensing system was reported, and reliability of sensing information transmission through the proposed integrated network architecture is 97%.
Abstract: In this paper, we have reported an effective implementation for Internet of Things used for monitoring regular domestic conditions by means of low cost ubiquitous sensing system. The description about the integrated network architecture and the interconnecting mechanisms for the reliable measurement of parameters by smart sensors and transmission of data via internet is being presented. The longitudinal learning system was able to provide a self-control mechanism for better operation of the devices in monitoring stage. The framework of the monitoring system is based on a combination of pervasive distributed sensing units, information system for data aggregation, and reasoning and context awareness. Results are encouraging as the reliability of sensing information transmission through the proposed integrated network architecture is 97%. The prototype was tested to generate real-time graphical information rather than a test bed scenario.

Journal ArticleDOI
TL;DR: This paper analyzed changes in Google query volumes for search terms related to finance and found patterns that may be interpreted as "early warning signs" of stock market moves, which can be used to predict stock market movements.
Abstract: Crises in financial markets affect humans worldwide. Detailed market data on trading decisions reflect some of the complex human behavior that has led to these crises. We suggest that massive new data sources resulting from human interaction with the Internet may offer a new perspective on the behavior of market participants in periods of large market movements. By analyzing changes in Google query volumes for search terms related to finance, we find patterns that may be interpreted as “early warning signs” of stock market moves. Our results illustrate the potential that combining extensive behavioral data sets offers for a better understanding of collective human behavior.

Proceedings ArticleDOI
Kai Zhao1, Lina Ge1
14 Dec 2013
TL;DR: This paper expounds several security issues of IoT that exist in the three-layer system structure, and comes up with solutions to the issues above coupled with key technologies involved.
Abstract: The security issues of the Internet of Things (IoT) are directly related to the wide application of its system. Beginning with introducing the architecture and features of IoT security, this paper expounds several security issues of IoT that exist in the three-layer system structure, and comes up with solutions to the issues above coupled with key technologies involved. Among these safety measures concerned, the ones about perception layer are particularly elaborated, including key management and algorithm, security routing protocol, data fusion technology, as well as authentication and access control, etc.

Book
04 Oct 2013
TL;DR: In this article, Limor Shifman investigates Internet memes and what they tell us about digital culture and proposes a novel definition of Internet memes: digital content units with common characteristics, created with awareness of each other, and circulated, imitated and transformed via the Internet by many users.
Abstract: In December 2012, the exuberant video "Gangnam Style" became the first YouTube clip to be viewed more than one billion times. Thousands of its viewers responded by creating and posting their own variations of the video--"Mitt Romney Style," "NASA Johnson Style," "Egyptian Style," and many others. "Gangnam Style" (and its attendant parodies, imitations, and derivations) is one of the most famous examples of an Internet meme: a piece of digital content that spreads quickly around the web in various iterations and becomes a shared cultural experience. In this book, Limor Shifman investigates Internet memes and what they tell us about digital culture. Shifman discusses a series of well-known Internet memes -- including "Leave Britney Alone," the pepper-spraying cop, LOLCats, Scumbag Steve, and Occupy Wall Street's "We Are the 99 Percent." She offers a novel definition of Internet memes: digital content units with common characteristics, created with awareness of each other, and circulated, imitated, and transformed via the Internet by many users. She differentiates memes from virals; analyzes what makes memes and virals successful; describes popular meme genres; discusses memes as new modes of political participation in democratic and nondemocratic regimes; and examines memes as agents of globalization. Memes, Shifman argues, encapsulate some of the most fundamental aspects of the Internet in general and of the participatory Web 2.0 culture in particular. Internet memes may be entertaining, but in this book Limor Shifman makes a compelling argument for taking them seriously.

Journal ArticleDOI
01 Aug 2013
TL;DR: In practice, this paper finds that MillWheel's unique combination of scalability, fault tolerance, and a versatile programming model lends itself to a wide variety of problems at Google.
Abstract: MillWheel is a framework for building low-latency data-processing applications that is widely used at Google. Users specify a directed computation graph and application code for individual nodes, and the system manages persistent state and the continuous flow of records, all within the envelope of the framework's fault-tolerance guarantees.This paper describes MillWheel's programming model as well as its implementation. The case study of a continuous anomaly detector in use at Google serves to motivate how many of MillWheel's features are used. MillWheel's programming model provides a notion of logical time, making it simple to write time-based aggregations. MillWheel was designed from the outset with fault tolerance and scalability in mind. In practice, we find that MillWheel's unique combination of scalability, fault tolerance, and a versatile programming model lends itself to a wide variety of problems at Google.

Journal ArticleDOI
TL;DR: In this paper, a conceptual framework is provided that extends our understanding of online brand communities and consumer engagement, and four key OBC dimensions (brand orientation, internet use, funding and governance) are identified and three antecedents (brand related, social and functional) are proposed of consumer-OBC engagement.
Abstract: Purpose – Given the dramatic technology‐led changes that continue to take place in the marketplace, researchers and practitioners alike are keen to understand the emergence and implications of online brand communities (OBCs). The purpose of this paper is to explore OBCs from both consumer and company perspectives.Design/methodology/approach – The study provides a synthesis of the extant OBC literature to further our understanding of OBCs, and also puts forth future priorities for OBC research.Findings – A conceptual framework is provided that extends our understanding of OBCs and consumer engagement. Four key OBC dimensions (brand orientation, internet‐use, funding and governance) are identified and three antecedents (brand‐related, social and functional) are proposed of consumer‐OBC engagement.Originality/value – This study is the first to explore key dimensions of OBCs, and the differing but related perspectives of the consumers and organizations involved.

Proceedings Article
02 Apr 2013
TL;DR: This paper introduces a real time policy checking tool called NetPlumber based on Header Space Analysis (HSA), which incrementally checks for compliance of state changes, using a novel set of conceptual tools that maintain a dependency graph between rules.
Abstract: Network state may change rapidly in response to customer demands, load conditions or configuration changes But the network must also ensure correctness conditions such as isolating tenants from each other and from critical services Existing policy checkers cannot verify compliance in real time because of the need to collect "state" from the entire network and the time it takes to analyze this state SDNs provide an opportunity in this respect as they provide a logically centralized view from which every proposed change can be checked for compliance with policy But there remains the need for a fast compliance checker Our paper introduces a real time policy checking tool called NetPlumber based on Header Space Analysis (HSA) [8] Unlike HSA, however, NetPlumber incrementally checks for compliance of state changes, using a novel set of conceptual tools that maintain a dependency graph between rules While NetPlumber is a natural fit for SDNs, its abstract intermediate form is conceptually applicable to conventional networks as well We have tested NetPlumber on Google's SDN, the Stanford backbone and Internet 2 With NetPlumber, checking the compliance of a typical rule update against a single policy on these networks takes 50-500µs on average

Journal ArticleDOI
TL;DR: How and why digitally networked communication environments alter traditional notions of trust are discussed, and research is presented that examines how information consumers make judgments about the credibility and accuracy of information they encounter online.

Journal ArticleDOI
TL;DR: This paper presents the functional design and implementation of a complete WSN platform that can be used for a range of long-term environmental monitoring IoT applications and considers low-effort platform reuse for a wide array of related monitoring applications.
Abstract: The Internet of Things (IoT) provides a virtual view, via the Internet Protocol, to a huge variety of real life objects, ranging from a car, to a teacup, to a building, to trees in a forest. Its appeal is the ubiquitous generalized access to the status and location of any “thing” we may be interested in. Wireless sensor networks (WSN) are well suited for long-term environmental data acquisition for IoT representation. This paper presents the functional design and implementation of a complete WSN platform that can be used for a range of long-term environmental monitoring IoT applications. The application requirements for low cost, high number of sensors, fast deployment, long lifetime, low maintenance, and high quality of service are considered in the specification and design of the platform and of all its components. Low-effort platform reuse is also considered starting from the specifications and at all design levels for a wide array of related monitoring applications.

Journal ArticleDOI
TL;DR: Five factors influencing the cloud usage by this business community, whose needs and business requirements are very different from large enterprises are presented; ease of use and convenience is the biggest favorable factor followed by security and privacy and then comes the cost reduction.

Proceedings ArticleDOI
16 Aug 2013
TL;DR: This work presents Mobile Fog, a high level programming model for the future Internet applications that are geospatially distributed, large-scale, and latency-sensitive, and analyzes use cases for the programming model with camera network and connected vehicle applications to show the efficacy of Mobile Fog.
Abstract: The ubiquitous deployment of mobile and sensor devices is creating a new environment, namely the Internet of Things(IoT), that enables a wide range of future Internet applications. In this work, we present Mobile Fog, a high level programming model for the future Internet applications that are geospatially distributed, large-scale, and latency-sensitive. We analyze use cases for the programming model with camera network and connected vehicle applications to show the efficacy of Mobile Fog. We also evaluate application performance through simulation.

Journal ArticleDOI
TL;DR: Internet use patterns, reasons for discontinued use, eHealth literacy, and attitudes toward computer/Internet use among low-income homebound individuals aged 60 and older in comparison to their younger counterparts—homebound adults under age 60 are examined.
Abstract: Background: Internet technology can provide a diverse array of online resources for low-income disabled and homebound older adults to manage their health and mental health problems and maintain social connections. Despite many previous studies of older adults’ Internet use, none focused on these most vulnerable older adults. Objective: This study examined Internet use patterns, reasons for discontinued use, eHealth literacy, and attitudes toward computer/Internet use among low-income homebound individuals aged 60 and older in comparison to their younger counterparts—homebound adults under age 60. Methods: Face-to-face or telephone surveys were conducted with 980 recipients of home-delivered meals in central Texas (78% were age 60 years and older and 22% under age 60). The eHealth Literacy Scale (eHEALS) and the efficacy and interest subscales of the Attitudes Toward Computer/Internet Questionnaire (ATC/IQ) were used to measure the respective constructs. Age groups were compared with chi-square tests and t tests. Correlates of Internet use were analyzed with multinomial logistic regression, and correlates of eHEALS and ATC/IQ scores were analyzed with OLS regression models. Results: Only 34% of the under-60 group and 17% of the 60 years and older group currently used the Internet, and 35% and 16% of the respective group members reported discontinuing Internet use due to cost and disability. In addition to being older, never users were more likely to be black (OR 4.41; 95% CI 2.82-6.91, P <.001) or Hispanic (OR 4.69; 95% CI 2.61-8.44, P <.001), and to have lower incomes (OR 0.36; 95% CI 0.27-0.49, P <.001). Discontinued users were also more likely to be black or Hispanic and to have lower incomes. Among both age groups, approximately three-fourths of the current users used the Internet every day or every few days, and their eHEALS scores were negatively associated with age and positively associated with frequency of use. Among the 60 and older group, a depression diagnosis was also negatively associated with eHEALS scores. ATC/IQ efficacy among never users of all ages and among older adults was positively associated with living alone, income, and the number of medical conditions and inversely associated with age, Hispanic ethnicity, and Spanish as the primary language. Although ATC/IQ interest among older adults was also inversely associated with age, it was not associated with Hispanic ethnicity and Spanish as the primary language. Conclusions: This study is the first to describe in detail low-income disabled and homebound adults’ and older adults’ Internet use. It shows very low rates of Internet use compared to the US population, either due to lack of exposure to computer/Internet technology; lack of financial resources to obtain computers and technology; or medical conditions, disabilities, and associated pain that restrict use. Recommendations to reduce the digital divide among these individuals are provided. [J Med Internet Res 2013;15(5):e93]

Journal ArticleDOI
29 May 2013-PLOS ONE
TL;DR: The results show how social media may potentially be used to estimate real-time levels and changes in population-scale measures such as obesity rates.
Abstract: We conduct a detailed investigation of correlations between real-time expressions of individuals made across the United States and a wide range of emotional, geographic, demographic, and health characteristics. We do so by combining (1) a massive, geo-tagged data set comprising over 80 million words generated in 2011 on the social network service Twitter and (2) annually-surveyed characteristics of all 50 states and close to 400 urban populations. Among many results, we generate taxonomies of states and cities based on their similarities in word use; estimate the happiness levels of states and cities; correlate highly-resolved demographic characteristics with happiness levels; and connect word choice and message length with urban characteristics such as education levels and obesity rates. Our results show how social media may potentially be used to estimate real-time levels and changes in population-scale measures such as obesity rates.

Journal ArticleDOI
TL;DR: In this paper, the intersection of consumer behavior and digital media by clearly defining consumer power and empowerment in Internet and social media contexts and by presenting a theoretical framework of four distinct consumer power sources: demand-, information-, network-, and crowd-based power.