40,651 research outputs found
Recommended from our members
Circadian control of interferon-sensitive gene expression in murine skin.
The circadian clock coordinates a variety of immune responses with signals from the external environment to promote survival. We investigated the potential reciprocal relationship between the circadian clock and skin inflammation. We treated mice topically with the Toll-like receptor 7 (TLR7) agonist imiquimod (IMQ) to activate IFN-sensitive gene (ISG) pathways and induce psoriasiform inflammation. IMQ transiently altered core clock gene expression, an effect mirrored in human patient psoriatic lesions. In mouse skin 1 d after IMQ treatment, ISGs, including the key ISG transcription factor IFN regulatory factor 7 (Irf7), were more highly induced after treatment during the day than the night. Nuclear localization of phosphorylated-IRF7 was most prominently time-of-day dependent in epidermal leukocytes, suggesting that these cell types play an important role in the diurnal ISG response to IMQ. Mice lacking Bmal1 systemically had exacerbated and arrhythmic ISG/Irf7 expression after IMQ. Furthermore, daytime-restricted feeding, which affects the phase of the skin circadian clock, reverses the diurnal rhythm of IMQ-induced ISG expression in the skin. These results suggest a role for the circadian clock, driven by BMAL1, as a negative regulator of the ISG response, and highlight the finding that feeding time can modulate the skin immune response. Since the IFN response is essential for the antiviral and antitumor effects of TLR activation, these findings are consistent with the time-of-day-dependent variability in the ability to fight microbial pathogens and tumor initiation and offer support for the use of chronotherapy for their treatment
Cancer Stem Cells as a Result of a Reprogramming-Like Mechanism
Open Access: under CC BY-NCSA 3.0 license.Research in our groups is partially supported by FEDER and by MICINN (SAF2009-08803 to
ISG), by Junta de Castilla y LeĂłn (Proyecto Biomedicina 2009-2010 to ISG, and Proyecto
Biomedicina 2010-2011 to CVD), by MEC OncoBIO Consolider-Ingenio 2010 (Ref. CSD2007-
0017) to ISG, by NIH grant (R01 CA109335-04A1) to ISG, by Sandra Ibarra Foundation to
ISG, and by Group of Excellence Grant (GR15) from Junta de Castilla y Leon to ISG and JJC.Peer reviewe
EXPERT OPINIONS ON INFORMATION SECURITY GOVERNANCE FACTORS: AN EXPLORATORY STUDY
Information Security Governance (ISG) is an important discipline that addresses information security at a strategic level providing strategic direction, optimized use of information resources and proper security incident management. ISG and the impact of poor security incident management have attracted much attention in the literature but unfortunately there is little empirical evidence regarding the explicit link between ISG and its effectiveness in terms of reducing negative impacts on business objectives from security incidents. Consequently, little exploration of ISG factors and their impact on the above mentioned measure of effectiveness exists. Further, to direct endeavors the crucial question is if there exist any differences in how effective these factors are in attaining this target. Currently, there is a lack in research considering this question. The research presented in this article explores the ISG domain further by empirically examine 30 ISG factors and their ability of reducing negative impacts on business objectives from security incidents. Data has been collected by surveying ISG experts. Ten factors were identified to have significant different means in relation to other factors according to a one-way ANOVA analysis that was conducted. The results give an indication on what ISG factors that have an effect, providing both support for further academic research and also decision support for implementing ISG
Diagnosis/Classification Criteria for Behcet's Disease
Historical Background. The ISG criteria for Behcet's, created in 1990, have excellent specificity, but lack sensitivity. The International Criteria for Behcet's Disease (ICBD) was created in 2006, as replacement to ISG. The aim of this study was to compare their performance.
ISG and ICBD Criteria. For ISG oral aphthosis is mandatory. The presence of any two of the following (genital aphthosis, skin lesions, eye lesions, and positive pathergy test) will diagnose/classify the patient as BD. For ICBD, vascular lesions were added, while oral aphthosis is no more mandatory. Getting 3 or more points diagnose/classify the patient as BD (genital aphthosis 2 points, eye lesions 2 points, and the remaining each one point).
Performance and Comparison of ISG and ICBD. Their sensitivity, specificity, and accuracy (percent agreement), were tested in three independent cohort of patients from Far-East (China), Middle-East (Iran), and Europe (Germany). The sensitivity for ISG was respectively 65.4%, 78.1%, 83.7% and for ICBD 87%, 98.2%, and 96.5%. The specificity for ISG was 99.2%, 98.8%, 89.5% and for ICBD 94.1%, 95.6%, and 73.7%. The accuracy for ISG was 74.2%, 85.5%, 85.5% and for ICBD 88.9%, 97.3%, and 89.5%.
Conclusion. ICBD has better sensitivity, and accuracy than ISG
Information Systems Governance as a System of Rules: Hierarchical and Heterarchical Implementation
Information Systems Governance (ISG) can be defined as a set of rules allowing executives and skateholders to determine how they will decide on the Information System management. The first objective of this paper is to propose a set of meta-rules addressing different aspects of ISG, which are instantiated in each company setting. The second objective is to propose two constrasting models of ISG, which instantiate differently the set of rules. Conventional view of ISG includes hierarchical and centralized control with little flexibility to support rapidly changing organizations. Heterarchical forms are more and more frequently observed in ISG practices (agility, transversality, decentralization...). However, if uncontrolled, heterarchy can lead to the emergence of anarchic phenomena, such as instability, increased conflicts, and waste of resources. Approaching ISG through rules implementation can help controlling heterarchical forms. In the first part of our paper, we describe an ISG as a set of the rules, based on Elinor Ostromâs work and her IAD (Institutional Analysis and Development) framework. In a second part, we develop each type of rule first according to a hierarchical view, then to a heterarchical one. Beyond theoretical contribution, the proposed set of rules can help CIOs involved in improving ISG. It can also be used to make an organizational analysis of heterarchical practices of a companyâs ISG
The Ising Spin Glass in dimension four
The critical behaviors of the bimodal and Gaussian Ising spin glass (ISG)
models in dimension four are studied through extensive numerical simulations,
and from an analysis of high temperature series expansion (HTSE) data of Klein
{\it et al.} (1991). The simulations include standard finite size scaling
measurements, thermodynamic limit regime measurements, and analyses which
provide estimates of critical exponents without any consideration of the
critical temperature. The higher order HTSE series for the bimodal model
provide accurate estimates of the critical temperature and critical exponents.
These estimates are independent of and fully consistent with the simulation
values. Comparisons between ISG models in dimension four show that the critical
exponents and the critical constants for dimensionless observables depend on
the form of the interaction distribution of the model.Comment: 10 pages, 15 figure
Information Security Governance: Investigating Diversity in Critical Infrastructure Organizations
The aim of this paper is to report on how information security governance (ISG) arrangements are framed and shaped in practice. Our objective is to examine the extent to which the similarities and differences in institutional environments can subject organizations to multiple, competing and even contradictory arrangements for ISG. Using an interpretive case based research strategy we investigate how ISG arrangements are framed and shaped in fourteen critical infrastructure organizations in Australia. We explicitly recognize the socio-technical nature of ISG and draw insights from institutional theory. Our findings illustrate the heterogeneity and malleability of ISG across different organizations and highlight the need for an information centric view
A process model for implementing information systems security governance
Purpose; ; ; ; ; The frequent and increasingly potent cyber-attacks because of lack of an optimal mix of technical as well as non-technical IT controls has led to increased adoption of security governance controls by organizations. The purpose of this paper, thus, is to construct and empirically validate an information security governance (ISG) process model through the plan âdo âcheck âact (PDCA) cycle model of Deming.; ; ; ; ; Design/methodology/approach; ; ; ; ; This descriptive research using an interpretive paradigm follows a qualitative methodology using expert interviews of five respondents working in the ISG domain in United Arab Emirates (UAE) to validate the theoretical model.; ; ; ; ; Findings; ; ; ; ; The findings of this paper suggest the primacy of the PDCA Deming cycle for initiating ISG through a risk-based approach assisted by industry-wide best practices in ISG. Regarding selection of ISG frameworks, respondents preferred to have ISO 27K supported by NIST as the core framework with other relevant ISG frameworks/standards forming the peripheral layer. The implementation focus of the ISG model is on mapping ISO 27K/NIST IT controls relevant IT controls selected from ISG frameworks from a horizontal and vertical perspective. Respondents asserted the automation of measurement and control mechanism through automation to assist in the feedback loop of the PDCA cycle.; ; ; ; ; Originality/value; ; ; ; ; The validated model helps academics and practitioners gain insight into the methodology of the phased implementation of an information systems governance process through the PDCA model, as well as the positioning of ITG and ITG frameworks in ISG. Practitioners can glean valuable insights from the empirical section of the research where experts detail the success factors, the sequential steps and justification of these factors in the ISG implementation process
- âŠ