511 research outputs found

    The Social Sharing of Hallucinations

    Get PDF
    Abstract In this dissertation, I explore the social sharing of hallucinations and address the primary question of the lived-experience of this phenomenon from multiple perspectives. What is it like to speak about and hear about hallucinated experience outside of professional contexts? I interviewed 23 individuals regarding their experience sharing hallucinations with others (Experiencers) or hearing about hallucinations from individuals who experienced them (Listeners). Data were gathered from community as well as clinical samples. A wide variety of hallucination contexts were present, ranging from sleep paralysis, post-partum psychosis, drug-ingestion, mental illnesses, medically-related conditions (stroke, fever), healing, religious visions, as well as encounters with ghosts, archetypes, and deities. I analyzed these data using a hermeneutic-phenomenological perspective and process, following Max van Manen’s style of using this methodology. Through analysis, four Facets were recognized: Care, Sense-Making, Dual-Processing, and Ontological Cross-Bleed. Care Facet represents the explicit and hidden experiences and expressions of care that Listeners and Experiences share or withhold. For Experiencers, the Sense-Making Facet represents experiences of sense-making related to determinations of whether hallucinations are real, why they occur, and what they mean. Listener experiences of sense-making include shock, confusion, and processes of curiosity and determination regarding the hallucination. Dual-Processing Facet explores the dual experiential response many Listeners described when hearing about a hallucination. This response often involves interior thoughts and reactions that are masked from exterior representation. Finally, the Ontological Cross-Bleed Facet explores the transition that occurs during social sharing in which the hallucination transfers from being an object of consciousness only for the individual having the hallucination, to an object of consciousness for a Listener as well. Results of this study can help clinical psychologists tailor treatments and recommendations to individuals who are involved in related conversations and can also provide useful knowledge to community members who themselves are involved in the sharing, either from Experiencer or Listener standpoints

    Engineering nano-drug biointerface to overcome biological barriers toward precision drug delivery

    Get PDF
    The rapid advancement of nanomedicine and nanoparticle (NP) materials presents novel solutions potentially capable of revolutionizing health care by improving efficacy, bioavailability, drug targeting, and safety. NPs are intriguing when considering medical applications because of their essential and unique qualities, including a significantly higher surface to mass ratio, quantum properties, and the potential to adsorb and transport drugs and other compounds. However, NPs must overcome or navigate several biological barriers of the human body to successfully deliver drugs at precise locations. Engineering the drug carrier biointerface can help overcome the main biological barriers and optimize the drug delivery in a more personalized manner. This review discusses the significant heterogeneous biological delivery barriers and how biointerface engineering can promote drug carriers to prevail over hurdles and navigate in a more personalized manner, thus ushering in the era of Precision Medicine. We also summarize the nanomedicines' current advantages and disadvantages in drug administration, from natural/synthetic sources to clinical applications. Additionally, we explore the innovative NP designs used in both non-personalized and customized applications as well as how they can attain a precise therapeutic strategy

    Artificial Intelligence in Brain Tumour Surgery—An Emerging Paradigm

    Get PDF
    Artificial intelligence (AI) platforms have the potential to cause a paradigm shift in brain tumour surgery. Brain tumour surgery augmented with AI can result in safer and more effective treatment. In this review article, we explore the current and future role of AI in patients undergoing brain tumour surgery, including aiding diagnosis, optimising the surgical plan, providing support during the operation, and better predicting the prognosis. Finally, we discuss barriers to the successful clinical implementation, the ethical concerns, and we provide our perspective on how the field could be advanced

    Special Libraries, Winter 1986

    Get PDF
    Volume 77, Issue 1https://scholarworks.sjsu.edu/sla_sl_1986/1000/thumbnail.jp

    Big Data, Bigger Dilemmas: A Critical Review

    Get PDF
    The recent interest in Big Data has generated a broad range of new academic, corporate, and policy practices along with an evolving debate among its proponents, detractors, and skeptics. While the practices draw on a common set of tools, techniques, and technologies, most contributions to the debate come either from a particular disciplinary perspective or with a focus on a domain-specific issue. A close examination of these contributions reveals a set of common problematics that arise in various guises and in different places. It also demonstrates the need for a critical synthesis of the conceptual and practical dilemmas surrounding Big Data. The purpose of this article is to provide such a synthesis by drawing on relevant writings in the sciences, humanities, policy, and trade literature. In bringing these diverse literatures together, we aim to shed light on the common underlying issues that concern and affect all of these areas. By contextualizing the phenomenon of Big Data within larger socioeconomic developments, we also seek to provide a broader understanding of its drivers, barriers, and challenges. This approach allows us to identify attributes of Big Data that require more attention—autonomy, opacity, generativity, disparity, and futurity—leading to questions and ideas for moving beyond dilemmas

    New Approaches to Software Security Metrics and Measurements

    Get PDF
    Meaningful metrics and methods for measuring software security would greatly improve the security of software ecosystems. Such means would make security an observable attribute, helping users make informed choices and allowing vendors to ‘charge’ for it—thus, providing strong incentives for more security investment. This dissertation presents three empirical measurement studies introducing new approaches to measuring aspects of software security, focusing on Free/Libre and Open Source Software (FLOSS). First, to revisit the fundamental question of whether software is maturing over time, we study the vulnerability rate of packages in stable releases of the Debian GNU/Linux software distribution. Measuring the vulnerability rate through the lens of Debian stable: (a) provides a natural time frame to test for maturing behavior, (b) reduces noise and bias in the data (only CVEs with a Debian Security Advisory), and (c) provides a best-case assessment of maturity (as the Debian release cycle is rather conservative). Overall, our results do not support the hypothesis that software in Debian is maturing over time, suggesting that vulnerability finding-and-fixing does not scale and more effort should be invested in significantly reducing the introduction rate of vulnerabilities, e.g. via ‘security by design’ approaches like memory-safe programming languages. Second, to gain insights beyond the number of reported vulnerabilities, we study how long vulnerabilities remain in the code of popular FLOSS projects (i.e. their lifetimes). We provide the first, to the best of our knowledge, method for automatically estimating the mean lifetime of a set of vulnerabilities based on information in vulnerability-fixing commits. Using this method, we study the lifetimes of ~6 000 CVEs in 11 popular FLOSS projects. Among a number of findings, we identify two quantities of particular interest for software security metrics: (a) the spread between mean vulnerability lifetime and mean code age at the time of fix, and (b) the rate of change of the aforementioned spread. Third, to gain insights into the important human aspect of the vulnerability finding process, we study the characteristics of vulnerability reporters for 4 popular FLOSS projects. We provide the first, to the best of our knowledge, method to create a large dataset of vulnerability reporters (>2 000 reporters for >4 500 CVEs) by combining information from a number of publicly available online sources. We proceed to analyze the dataset and identify a number of quantities that, suitably combined, can provide indications regarding the health of a project’s vulnerability finding ecosystem. Overall, we showed that measurement studies carefully designed to target crucial aspects of the software security ecosystem can provide valuable insights and indications regarding the ‘quality of security’ of software. However, the road to good security metrics is still long. New approaches covering other important aspects of the process are needed, while the approaches introduced in this dissertation should be further developed and improved

    The Web Engineering Security (WES) methodology

    Get PDF
    The World Wide Web has had a significant impact on basic operational economical components in global information rich civilizations. This impact is forcing organizations to provide justification for security from a business case perspective and to focus on security from a web application development environment perspective. This increased focus on security was the basis of a business case discussion and led to the acquisition of empirical evidence gathered from a high level Web survey and more detailed industry surveys to analyse security in the Web application development environment. Along with this information, a collection of evidence from relevant literature was also gathered. Individual aspects of the data gathered in the previously mentioned activities contributed to the proposal of the Essential Elements (EE) and the Security Criteria for Web Application Development (SCWAD). The Essential Elements present the idea that there are essential, basic organizational elements that need to be identified, defined and addressed before examining security aspects of a Web Engineering Development process. The Security Criteria for Web Application Development identifies criteria that need to be addressed by a secure Web Engineering process. Both the EE and SCWAD are presented in detail along with relevant justification of these two elements to Web Engineering. SCWAD is utilized as a framework to evaluate the security of a representative selection of recognized software engineering processes used in Web Engineering application development. The software engineering processes appraised by SCWAD include: the Waterfall Model, the Unified Software Development Process (USD), Dynamic Systems Development Method (DSDM) and eXtreme Programming (XP). SCWAD is also used to assess existing security methodologies which are comprised of the Orion Strategy; Survivable / Viable IS approaches; Comprehensive Lightweight Application Security Process (CLASP) and Microsoft’s Trust Worthy Computing Security Development Lifecycle. The synthesis of information provided by both the EE and SCWAD were used to develop the Web Engineering Security (WES) methodology. WES is a proactive, flexible, process neutral security methodology with customizable components that is based on empirical evidence and used to explicitly integrate security throughout an organization’s chosen application development process. In order to evaluate the practical application of the EE, SCWAD and the WES methodology, two case studies were conducted during the course of this research. The first case study describes the application of both the EE and SCWAD to the Hunterian Museum and Art Gallery’s Online Photo Library (HOPL) Internet application project. The second case study presents the commercial implementation of the WES methodology within a Global Fortune 500 financial service sector organization. The assessment of the WES methodology within the organization consisted of an initial survey establishing current security practices, a follow-up survey after changes were implemented and an overall analysis of the security conditions assigned to projects throughout the life of the case study

    Fairness and Unfairness in Television Product Advertising

    Get PDF
    The first section of this Note explores the impact of television product advertising on viewer attitudes. The next two sections set forth the statutory basis on which the Federal Communications Commission and the Federal Trade Commission could provide for the effective presentation of contrasting points of view on controversial issues implicitly or explicitly raised by television product advertising, could ensure that the implicit messages of such advertisements are delivered fairly and without deception, and could counter the adverse effects of such advertising. The purpose of these sections is not to predict actual regulatory behavior, for in fact the FCC and FTC have shown a reluctance to take any action in these areas. The final section considers the constitutional limits on any governmental response to television advertising in light of the Supreme Court\u27s traditional differentiation between broadcasting and the print media and of the Court\u27s recent abandonment of the doctrine that commercial speech enjoys no first amendment protection
    • …
    corecore