recommended reading

Study: Google Searches Reveal Mental Health Patterns

Mark Lennihan/AP File Photo

PROBLEM: Google overhyped the flu this year, which seemed to be a blow to the company's claim that it can track disease in real-time. Not to mention, the CDC was doing a fine job monitoring the virus's spread without the help of Google's search-based analysis. Traditional epidemiological surveillance techniques are less reliable, though, when it comes to mental illness, which remains complex and stigmatized enough that there's reason to believe people may be more comfortable consulting the Internet than their doctors. 

METHODOLOGY: Public health experts at San Diego State looked at every mental health query made on Google between 2006 and 2010 in the U.S. and Australia. They identified searches that used "language suggestive of mental health matters,"  which usually involved people either attempting to self-diagnose or treat themselves, or looking up information on behalf of a friend or family member.

The researchers specifically analyzed this data in terms of seasonal changes: shorter, darker days are known to increase symptoms of depression, but little is known about possible patterns for other mental illnesses. They adjusted for big news stories, to avoid the effects of media hype like that which caused Google to suggest that the flu was more widespread than it actually was.

Read more at The Atlantic

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.