349 research outputs found

    The effects of a compliance therapy programme on Chinese male patients with schizophrenia

    Get PDF
    Version of RecordPublishe

    Review of The Electronic Transaction Ordinance: Can The Personal Identification Number Replace The Digital Signature?

    Get PDF
    In a recent consultation document, the Information Technology and Broadcasting Bureau proposed that personal identification numbers (PINs) be accepted as a form of signature for the purposes of the Electronic Transactions Ordinance (ETO) (Cap 553). This article explains why this proposal is fundamentally flawed. The article identifies three basic requirements for a signature and examines whether they are satisfied by digital signatures and PINs. It concludes that while a digital signature has built into it all the elements necessary for compliance with the requirements, a PIN can only be used for the purpose of authorisation and cannot be elevated to the status of a signature as required by the ETO.published_or_final_versio

    Digital evidence search kit

    Get PDF
    With the rapid development of electronic commerce and Internet technology, cyber crimes have become more and more common. There is a great need for automated software systems that can assist law enforcement agencies in cyber crime evidence collection. This paper describes a cyber crime evidence collection tool called DESK (Digital Evidence Search Kit), which is the product of several years of cumulative efforts of our Center together with the Hong Kong Police Force and several other law enforcement agencies of the Hong Kong Special Administrative Region. We will use DESK to illustrate some of the desirable features of an effective cyber crime evidence collection tool. © 2005 IEEE.published_or_final_versio

    Identification of a novel bat papillomavirus by metagenomics

    Get PDF
    published_or_final_versio

    Separable and anonymous identity-based key issuing

    Get PDF
    In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is responsible for computing and sending the private keys to users and therefore, a secure channel is required. For privacy-oriented applications, it is important to keep in secret whether the private key corresponding to a certain identity has been requested. All of the existing ID-based key issuing schemes have not addressed this anonymity issue. Besides, the separation of duties of LRA and KGC has not been discussed as well. We propose a novel separable and anonymous ID-based key issuing scheme without secure channel. Our protocol supports the separation of duties between LRA and KGC. The private key computed by the KGC can be sent to the user in an encrypted form such that only the legitimate key requester authenticated by LRA can decrypt it, and any eavesdropper cannot know the identity corresponding to the secret key. © 2005 IEEE.published_or_final_versio

    Identification of novel porcine and bovine parvoviruses closely related to human parvovirus 4

    Get PDF
    Human parvovirus 4 (PARV4), a recently discovered parvovirus found exclusively in human plasma and liver tissue, was considered phylogenetically distinct from other parvoviruses. Here, we report the discovery of two novel parvoviruses closely related to PARV4, porcine hokovirus (PHoV) and bovine hokovirus (BHoV), from porcine and bovine samples in Hong Kong. Their nearly full-length sequences were also analysed. PARV4-like viruses were detected by PCR among 44.4% (148/333) of porcine samples (including lymph nodes, liver, serum, nasopharyngeal and faecal samples), 13% (4/32) of bovine spleen samples and 2% (7/362) of human serum samples that were sent for human immunodeficiency virus and hepatitis C virus antibody tests. Three distinct parvoviruses were identified, including two novel parvoviruses, PHoV and BHoV, from porcine and bovine samples and PARV4 from humans, respectively. Analysis of genome pequences from seven PHoV strains, from three BHoV strains and from one PARV4 strain showed that the two animal parvoviruses were most similar to PARV4 with 61.5-63% nt identities and, together with PARV4 (HHoV), formed a distinct cluster within the family Parvoviridae. The three parvoviruses also differed from other parvoviruses by their relatively large predicted VP1 protein and the presence of a small unique conserved putative protein. Based on these results, we propose a separate genus, Hokovirus, to describe these three parvoviruses. The co-detection of porcine reproductive and respiratory syndrome virus, the agent associated with the recent 'high fever' disease outbreaks in pigs in China, from our porcine samples warrants further investigation. © 2008 SGM.published_or_final_versio

    Family Financial Pressure in Childhood and Telomere Length in Early Adolescence: A Prospective Study

    Get PDF
    Much research on children in high-risk environments has focused on the biological consequences of maltreatment, adversity, and trauma. Whether other early-life stress sources such as family financial hardship are implicated in the cellular mechanism of disease development remains unclear. This study investigated the long-term effect of childhood exposure to family financial pressure on telomere length. It involved two waves of data collection occurring when participants reached Grade 3 (W1) and 7 (W2), respectively. In W1, parents reported family demographics and perceived financial stressors and pressure. In W2, participants provided buccal swab samples for measurement of their telomere length. Data from 92 participants (Mage in W2 = 13.2 years; 56.5% male) were analyzed. The main type of stressors reported by parents who perceived high family financial pressure in W1 were child-level stressors including affordability of their medical and educational expenses. Participants exposed to high parent-perceived family financial pressure in W1 had shorter telomeres in W2 when compared to those exposed to low parent-perceived family financial pressure (β = −0.61, p = 0.042). Subgroup analyses revealed stronger associations in girls than boys. These findings reveal an important spillover effect between parental financial perceptions and stress and children’s health at the cellular level

    Impact of COVID-19 pandemic on serum vitamin D level among infants and toddlers: An interrupted time series analysis and before-and-after comparison

    Get PDF
    Background: During the coronavirus disease 2019 (COVID-19) pandemic, the implementation of social distancing and home confinement measures may elevate the risk of vitamin D deficiency particularly for infants. This study aimed to quantify changes in vitamin D level among infants and toddlers in Hong Kong after the COVID-19 outbreak. Methods: We recruited 303 infants and toddlers aged 2–24 months by stratified random sampling from 1 June 2019 to November 30, 2020. Regression models were used to estimate the effect of time on infants’ serum 25-hydroxyvitamin D (25(OH)D) level overall and by age groups before and after the outbreak. Interrupted time series (ITS) analysis was performed to examine the sustained effect of COVID-19 on their serum 25(OH)D level. Results: The ITS results showed no immediate reduction in serum 25(OH)D level among infants, but a decreasing trend was observed in the subsequent months post-outbreak at a monthly decline rate of −6.32 nmol/L. When analyzed by age group, the magnitude of post-outbreak reduction in 25(OH)D was stronger among younger infants (aged 2–6 months). Conclusion: Guidelines and recommendations should be given to pregnant women and mothers to ensure sufficient vitamin D level in their infants during the COVID-19 period

    Intrusion detection routers: Design, implementation and evaluation using an experimental testbed

    Get PDF
    In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-service (DDoS) attack. The evaluation is conducted using an experimental testbed. The system, known as intrusion detection router (IDR), is deployed on network routers to perform online detection on any DDoS attack event, and then react with defense mechanisms to mitigate the attack. The testbed is built up by a cluster of sufficient number of Linux machines to mimic a portion of the Internet. Using the testbed, we conduct real experiments to evaluate the IDR system and demonstrate that IDR is effective in protecting the network from various DDoS attacks. © 2006 IEEE.published_or_final_versio
    corecore