Background: With an increasing number of digital health apps available in app stores, it is important to assess these technologies reliably regarding their quality. This is done to mitigate the risks associated with their use. There are many different guidelines, methods, and metrics available to assess digital health apps with regard to their quality.
View Article and Find Full Text PDFObjective: To analyse the relationship between health app quality with user ratings and the number of downloads of corresponding health apps.
Materials And Methods: Utilising a dataset of 881 Android-based health apps, assessed via the 300-point objective Organisation for the Review of Care and Health Applications (ORCHA) assessment tool, we explored whether subjective user-level indicators of quality (user ratings and downloads) correlate with objective quality scores in the domains of user experience, data privacy and professional/clinical assurance. For this purpose, we applied spearman correlation and multiple linear regression models.
The systemic shock of coronavirus (COVID-19) and its impact on the global economy has been unprecedented with grocery shopper behaviour changing dramatically through various stages of the pandemic. COVID-19 has caused unusual market conditions, with significant changes to grocery shopper behaviour that need to be understood to allow for appreciation of shopper behaviour change and retail planning implications during future systemic shocks. The aim of this study was therefore to understand grocery-shopping behaviour during COVID-19.
View Article and Find Full Text PDFInternet of Things (IoT) technology is increasingly pervasive in all aspects of our life and its usage is anticipated to significantly increase in future Smart Cities to support their myriad of revolutionary applications. This paper introduces a new architecture that can support several IoT-enabled smart home use cases, with a specified level of security and privacy preservation. The security threats that may target such an architecture are highlighted along with the cryptographic algorithms that can prevent them.
View Article and Find Full Text PDF