39,919 research outputs found

    Cancer Stem Cells as a Result of a Reprogramming-Like Mechanism

    Get PDF
    Open Access: under CC BY-NCSA 3.0 license.Research in our groups is partially supported by FEDER and by MICINN (SAF2009-08803 to ISG), by Junta de Castilla y LeĂłn (Proyecto Biomedicina 2009-2010 to ISG, and Proyecto Biomedicina 2010-2011 to CVD), by MEC OncoBIO Consolider-Ingenio 2010 (Ref. CSD2007- 0017) to ISG, by NIH grant (R01 CA109335-04A1) to ISG, by Sandra Ibarra Foundation to ISG, and by Group of Excellence Grant (GR15) from Junta de Castilla y Leon to ISG and JJC.Peer reviewe

    EXPERT OPINIONS ON INFORMATION SECURITY GOVERNANCE FACTORS: AN EXPLORATORY STUDY

    Get PDF
    Information Security Governance (ISG) is an important discipline that addresses information security at a strategic level providing strategic direction, optimized use of information resources and proper security incident management. ISG and the impact of poor security incident management have attracted much attention in the literature but unfortunately there is little empirical evidence regarding the explicit link between ISG and its effectiveness in terms of reducing negative impacts on business objectives from security incidents. Consequently, little exploration of ISG factors and their impact on the above mentioned measure of effectiveness exists. Further, to direct endeavors the crucial question is if there exist any differences in how effective these factors are in attaining this target. Currently, there is a lack in research considering this question. The research presented in this article explores the ISG domain further by empirically examine 30 ISG factors and their ability of reducing negative impacts on business objectives from security incidents. Data has been collected by surveying ISG experts. Ten factors were identified to have significant different means in relation to other factors according to a one-way ANOVA analysis that was conducted. The results give an indication on what ISG factors that have an effect, providing both support for further academic research and also decision support for implementing ISG

    Diagnosis/Classification Criteria for Behcet's Disease

    Get PDF
    Historical Background. The ISG criteria for Behcet's, created in 1990, have excellent specificity, but lack sensitivity. The International Criteria for Behcet's Disease (ICBD) was created in 2006, as replacement to ISG. The aim of this study was to compare their performance. ISG and ICBD Criteria. For ISG oral aphthosis is mandatory. The presence of any two of the following (genital aphthosis, skin lesions, eye lesions, and positive pathergy test) will diagnose/classify the patient as BD. For ICBD, vascular lesions were added, while oral aphthosis is no more mandatory. Getting 3 or more points diagnose/classify the patient as BD (genital aphthosis 2 points, eye lesions 2 points, and the remaining each one point). Performance and Comparison of ISG and ICBD. Their sensitivity, specificity, and accuracy (percent agreement), were tested in three independent cohort of patients from Far-East (China), Middle-East (Iran), and Europe (Germany). The sensitivity for ISG was respectively 65.4%, 78.1%, 83.7% and for ICBD 87%, 98.2%, and 96.5%. The specificity for ISG was 99.2%, 98.8%, 89.5% and for ICBD 94.1%, 95.6%, and 73.7%. The accuracy for ISG was 74.2%, 85.5%, 85.5% and for ICBD 88.9%, 97.3%, and 89.5%. Conclusion. ICBD has better sensitivity, and accuracy than ISG

    Information Systems Governance as a System of Rules: Hierarchical and Heterarchical Implementation

    Get PDF
    Information Systems Governance (ISG) can be defined as a set of rules allowing executives and skateholders to determine how they will decide on the Information System management. The first objective of this paper is to propose a set of meta-rules addressing different aspects of ISG, which are instantiated in each company setting. The second objective is to propose two constrasting models of ISG, which instantiate differently the set of rules. Conventional view of ISG includes hierarchical and centralized control with little flexibility to support rapidly changing organizations. Heterarchical forms are more and more frequently observed in ISG practices (agility, transversality, decentralization...). However, if uncontrolled, heterarchy can lead to the emergence of anarchic phenomena, such as instability, increased conflicts, and waste of resources. Approaching ISG through rules implementation can help controlling heterarchical forms. In the first part of our paper, we describe an ISG as a set of the rules, based on Elinor Ostrom’s work and her IAD (Institutional Analysis and Development) framework. In a second part, we develop each type of rule first according to a hierarchical view, then to a heterarchical one. Beyond theoretical contribution, the proposed set of rules can help CIOs involved in improving ISG. It can also be used to make an organizational analysis of heterarchical practices of a company’s ISG

    Information Security Governance: Investigating Diversity in Critical Infrastructure Organizations

    Get PDF
    The aim of this paper is to report on how information security governance (ISG) arrangements are framed and shaped in practice. Our objective is to examine the extent to which the similarities and differences in institutional environments can subject organizations to multiple, competing and even contradictory arrangements for ISG. Using an interpretive case based research strategy we investigate how ISG arrangements are framed and shaped in fourteen critical infrastructure organizations in Australia. We explicitly recognize the socio-technical nature of ISG and draw insights from institutional theory. Our findings illustrate the heterogeneity and malleability of ISG across different organizations and highlight the need for an information centric view

    A process model for implementing information systems security governance

    Get PDF
    Purpose; ; ; ; ; The frequent and increasingly potent cyber-attacks because of lack of an optimal mix of technical as well as non-technical IT controls has led to increased adoption of security governance controls by organizations. The purpose of this paper, thus, is to construct and empirically validate an information security governance (ISG) process model through the plan “do “check “act (PDCA) cycle model of Deming.; ; ; ; ; Design/methodology/approach; ; ; ; ; This descriptive research using an interpretive paradigm follows a qualitative methodology using expert interviews of five respondents working in the ISG domain in United Arab Emirates (UAE) to validate the theoretical model.; ; ; ; ; Findings; ; ; ; ; The findings of this paper suggest the primacy of the PDCA Deming cycle for initiating ISG through a risk-based approach assisted by industry-wide best practices in ISG. Regarding selection of ISG frameworks, respondents preferred to have ISO 27K supported by NIST as the core framework with other relevant ISG frameworks/standards forming the peripheral layer. The implementation focus of the ISG model is on mapping ISO 27K/NIST IT controls relevant IT controls selected from ISG frameworks from a horizontal and vertical perspective. Respondents asserted the automation of measurement and control mechanism through automation to assist in the feedback loop of the PDCA cycle.; ; ; ; ; Originality/value; ; ; ; ; The validated model helps academics and practitioners gain insight into the methodology of the phased implementation of an information systems governance process through the PDCA model, as well as the positioning of ITG and ITG frameworks in ISG. Practitioners can glean valuable insights from the empirical section of the research where experts detail the success factors, the sequential steps and justification of these factors in the ISG implementation process
    • 

    corecore