Background: Rehabilitation using extended reality (XR) technologies can be used to address the growing shortage of health care staff, but the adoption level remains low. The current literature has given some first insights into what drives patients and clinicians to (not yet) adopt XR-rehabilitation tools. However, it does not sufficiently take into account that these […]
Remepy’s hybrid Parkinson’s therapy poised for phase 3
Remepy’s Hybridopa therapy for Parkinson’s, which combines an app with levodopa therapy, has shown efficacy in a phase 2 pilot study.
Development of a Validated Lay Checklist (Info Without Side Effects) for Assessing Health Information on Websites: Mixed Methods Study
Background: The internet has become a major source of health information; yet, the quality of health information on websites varies considerably. Users’ ability to evaluate either the factual accuracy or the trustworthiness of health information on websites is limited, as around half of the European people have limited health literacy. Existing checklists and tools are […]
Women’s Engagement With Different Internet-Enabled Technologies to Access Digital Menopause Information: Mixed Methods, Multiphase Sequential Study
Background: Information on menopause can come from a variety of sources, from friends and family to health care professionals, but increasingly, digital information has become a significant source. Digital information can be accessed online, through websites, social media, podcasts, and online groups or forums. The extent to which digital information on menopause is accessed and […]
I&I biotech cAMPfield attracts top-tier investors in $180M Series A
The money continues to flow for drug development startups that are working on inflammatory and immunology medicines licensed from other companies. A new San Diego biotech called cAMPfield Therapeutics is the latest to secure backing …
Adapting to the digital age in psychiatry: evaluating change in emergency department nurses and psychiatrists’ views toward telepsychiatry for involuntary hospitalization
IntroductionImplementing change in organizations is challenging, and a key factor in success is the perception of the implementers. While many studies report on implementers’ perceptions as barriers or facilitators for implementing innovations, they often do not examine how these perceptions change over time. We aimed to evaluate changes in perceptions among nurses and psychiatrists in […]
Pfizer takes 25-valent Prevnar follow-up into phase 3
Pfizer has upped the ante in the increasingly competitive market for pneumococcal vaccines with new data on a 25-valent candidate.
The next big pharma company will come from China
Last week at our biopharma and healthcare summit with the Financial Times, I was asked during one of our breaks when we’ll see the first truly multinational Chinese pharma company. “Five years, and it’ll be …
Processes and Culture Top Reasons Behind Data Breaches
Government leaders revealed that, in spite of state laws meant to improve cyber hygiene, an analysis of incidents showed issues persist and visibility falls short.
Driven by GLP-1s, pharma’s relationship with consumers is starting to change
Pharmaceutical companies’ ability to interact with the patients taking their medications has changed over the last few years. The rise of direct-to-consumer channels, driven largely by consumer willingness to pay for GLP-1s for weight loss …
Health Information Adoption Among Patients With Chronic Disease in China: Qualitative Interview Study of Patient–Platform Coshaping
Background: Chronic disease management increasingly relies on digital health information. Traditional adoption models conceptualize adoption as an individual decision determined by cognitive evaluations. However, in contemporary platform environments, health information exposure and interaction are shaped by algorithmic curation and platform governance. Understanding how patients with chronic disease engage with these platform-mediated spaces requires examining adoption […]
Patch Now: Critical Flaw in OT Robot OS Gives Attackers Control
An unauthenticated attacker can exploit the command injection vulnerability to gain remote access to robotic systems, causing significant disruption to the environment.