Stage-oe-small.jpg

Neuigkeit162/en

Aus Aifbportal
Wechseln zu:Navigation, Suche
News of Januar 22, 2020


New Article Published in the Journal of Medical Internet Research (JMIR)


In cooperation with Prof. Kalle Lyytinen from the Case Western Reserve University, Prof. Jaehyeon Ahn from the Korea Advanced Institute of Science and Technology, and Dr. Jae-Hyeon Ju from McGill University, Scott Thiebes, Philipp Toussaint and Prof. Dr. Ali Sunyaev from the Research Group Critical Information Infrastructures have successfully published their article entitled “Valuable Genomes: Taxonomy and Archetypes of Business Models in Direct-to-Consumer Genetic Testing” in the Journal of Medical Internet Research (JMIR).

Abstract:
Recent progress in genome data collection and analysis technologies has led to a surge of direct-to-consumer (DTC) genetic testing services. Owing to the clinical value and sensitivity of genomic data, as well as uncertainty and hearsay surrounding business practices of DTC genetic testing service providers, DTC genetic testing has faced significant criticism by researchers and practitioners. Research in this area has centered on ethical and legal implications of providing genetic tests directly to consumers, but we still lack a more profound understanding of how businesses in the DTC genetic testing markets work and provide value to different stakeholders. With this study we address the lack of knowledge concerning business models of DTC genetic testing services by systematically identifying the salient properties of various DTC genetic testing service business models as well as discerning dominant business models in the market. In doing so, our analysis paints a much more complex business landscape in the DTC genetic testing market than previously anticipated. This calls for further research on business models and their effects that underlie DTC genetic testing services and invites specific regulatory interventions to protect consumers and level the playing field.

Read the article online: https://doi.org/10.2196/14890



From the research group Critical Information Infrastructures