Matthew Fleming

ORCID: 0000-0002-6344-2119
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Information and Cyber Security
  • Liver Disease Diagnosis and Treatment
  • Trauma and Emergency Care Studies
  • Liver Disease and Transplantation
  • Gallbladder and Bile Duct Disorders
  • Global Health and Surgery
  • Appendicitis Diagnosis and Management
  • COVID-19 Clinical Research Studies
  • Network Security and Intrusion Detection
  • Long-Term Effects of COVID-19
  • HIV/AIDS Impact and Responses
  • Cybersecurity and Cyber Warfare Studies
  • Cancer-related cognitive impairment studies
  • Reflective Practices in Education
  • Global Public Health Policies and Epidemiology
  • Law, Rights, and Freedoms
  • Cancer Treatment and Pharmacology
  • Diversity and Career in Medicine
  • Legal and Constitutional Studies
  • Intelligence, Security, War Strategy
  • Emergency and Acute Care Studies
  • Data Quality and Management
  • Balance, Gait, and Falls Prevention
  • Gastric Cancer Management and Outcomes
  • Economic and Financial Impacts of Cancer

Yale University
2017-2020

Camelot Biomedical Systems (Italy)
2020

University of Michigan–Dearborn
2018

Yale New Haven Hospital
2017

Georgetown University
2012-2014

United States Department of Homeland Security
2012-2014

Bucknell University
2000

Importance: Socially Responsible Surgery (SRS) integrates surgery and public health, providing a framework for research, advocacy, education clinical practice to address the social barriers of health that decrease surgical access worsen outcomes in underserved patient populations. These patients face disparities both healthcare, which can be effectively addressed by surgeons collaboration with allied professionals. Objective: We reviewed current state populations American rural communities,...

10.3389/fsurg.2017.00011 article EN cc-by Frontiers in Surgery 2017-04-05

Efforts to secure and defend public- private-sector cyber systems rely in part on information sharing. Information sharing strengthens the nation’s cybersecurity posture by allowing participating entities have broadest possible understanding of tactics, techniques, procedures threat actors vulnerabilities systems. Armed with this understanding, defenders can better deter, prevent, disrupt, recover from malicious activity. Cybersecurity occurs various fora public private sectors. Within...

10.2139/ssrn.2201033 article EN SSRN Electronic Journal 2012-01-01

Patients in isolated rural communities typically lack access to surgical care. It is not feasible for most first-level hospitals provide a full suite of specialty services. Comprehensive care thus depends on referral systems. There minimal literature, however, the functioning such systems.We undertook prospective case study and coordination process cardiac, orthopedic, plastic, gynecologic, general conditions at district hospital Nepal from 2012 2014. We assessed using World Health...

10.1186/s12913-017-2624-2 article EN cc-by BMC Health Services Research 2017-09-25

Regret, a negative assessment of an action committed or path not taken, is common biographical experience. However, it difficult concept to study in social science research. Participants are likely enact protective barriers avoid confronting personal responsibility for 'bad' decisions. Drawing on examples from in-depth interview postsecondary educational experiences, we examine technique and set questions that can move beyond these research roadblocks. We argue highly structured...

10.1080/21582041.2018.1448938 article EN Contemporary Social Science 2018-04-08

The Department of Homeland Security (DHS) facilitates cybersecurity information sharing among federal government departments and agencies critical infrastructure owners operators to promote their security. Information is deemed importance accomplish the department’s mission; indeed, one central planks Executive Order 13636: Improving Critical Infrastructure Cybersecurity, which calls for greater between — not least DHS private sector. But while in intuitive that relevant, timely, accurate...

10.2139/ssrn.2418357 article EN SSRN Electronic Journal 2014-01-01

92 Background: To address identified gaps in knowledge and confidence of US-based healthcare professionals (HCPs) when using cyclin-dependent kinase 4/6 inhibitors (CDK 4/6i) to treat metastatic breast cancer (mBC), an adaptive learning program (ALP) was deployed review guideline recommendations evidence from randomized clinical trials (RCTs) real-world data (RWD). Methods: The ALP consisted reading materials (guideline excerpts, RCTs, RWD, cases) with a virtual tutor that taught. continued...

10.1200/op.2024.20.10_suppl.92 article EN JCO Oncology Practice 2024-09-30

10.4271/2000-01-3106 article EN SAE technical papers on CD-ROM/SAE technical paper series 2000-08-21

The Department of Homeland Security (DHS) has a central role to play in the cybersecurity United States. However, authorities governing and supporting this appear lack sufficient clarity. As result, it remains difficult judge their adequacy — and, more importantly, fundamental nature extent department’s securing U.S. cyberspace. In an attempt provide clarity national community, staff from Studies Analysis Institute conducted research determine: what are primary supporting/governing DHS...

10.2139/ssrn.2182675 article EN SSRN Electronic Journal 2012-01-01

82 Background: Gastric/colorectal cancer (G&CRC) are among the most prevalent cancers. Efforts ongoing to better assess their clinical/genomic factors. HER2 (human epidermal growth factor receptor 2) testing is strongly recommended in clinical practice guide treatment. An accredited education program (GetSMART) was launched online (January 2021–April 2022) equip healthcare providers (HCPs) with knowledge, skills, and confidence accurately assess/apply molecular therapy options for...

10.1200/jco.2023.41.4_suppl.82 article EN Journal of Clinical Oncology 2023-01-24

Current approaches to critical infrastructure identification/prioritization/assessment may not fully account for the widespread use of information and communications technology (ICT). ICT is used — largely yield efficiency gains connect "systems assets" (or subsystems sub-assets) in new novel sometimes nonobvious ways. also introduce intra- interdependencies vulnerabilities. Further, itself provide services. Therefore, it be more challenging identify/prioritize/assess understand elements...

10.2139/ssrn.2519887 article EN SSRN Electronic Journal 2014-01-01
Coming Soon ...