9,401 research outputs found

    Management strategies and contributory factors for resistance exercise-induced muscle damage: an exploration of dietary protein, exercise load, and sex

    Get PDF
    The World Health Organisation recommends that resistance exercise be performed at least twice per week to benefit general health and wellbeing. However, resistance exercise is associated with acute muscle damage that potentially can dampen muscle adaptations promoted by chronic resistance training. The extent to which muscle is damaged by exercise is influenced by various factors, including age, training status, exercise type, and – notable to this thesis – sex. To this end, establishing sex-specific management strategies for exercise-induced muscle damage (EIMD) is important to optimise the benefits of exercise. Two EIMD management strategies were focussed on in this thesis: dietary protein supplementation and exercise load manipulation. It was identified in this thesis that research into the impact both of protein supplementation and exercise load on EIMD heavily underrepresent female populations (chapters 3 and 5), despite well-documented sex differences in EIMD responses. Therefore, future research priority should be placed on bridging the sex data gap by conducting high-quality studies centralising around female-focussed and sex-comparative methodological designs. Both peri-exercise protein supplementation and exercise load manipulation in favour of lighter loads were revealed to be effective management strategies for resistance EIMD in males through systematic and scoping review of the current literature (chapters 3 and 5, respectively). Due to a lack of data from females, it is only appropriate for these strategies to be recommended for males at present. To decipher whether protein supplementation and lower exercise loads are beneficial for managing EIMD in females, a randomised controlled trial (RCT) (chapter 4) and a protocol for an RCT (chapter 6) involving male and female participants are presented in this thesis. The incorporation of ecologically-valid resistance exercise in the RCT in chapter 4 highlighted that even mild muscle damage is attenuated in females, reflected in diminished increases in post-exercise creatine kinase concentration and muscle soreness compared with males; however, the reason for this difference requires further investigation. This study, while supporting sex differences, contrasted previous studies, as neither males nor females experienced an attenuation of EIMD during milk protein supplementation. This difference likely owed to the lower severity of muscle damage induced in the current study relative to previous studies, and accordingly, future research should seek to discover alternative management strategies for mild EIMD. A protocol for an RCT examining the impact of exercise load on EIMD in untrained males and females is described in Chapter 6 of this thesis and may be used as guidance for researchers developing similar, sex-comparative studies. It was hypothesised that females will experience attenuated muscle damage relative to males and low-load exercise will induce less muscle damage than high-load exercise in both sexes. A lack of methodological consistency among EIMD studies was a recurring finding throughout this thesis, which posed an issue when attempting to compare between-study outcomes and reach a consensus. Achieving greater uniformity in study designs by adopting comparable methods relating to EIMD markers and time-points of assessment would help improve understanding of the factors influencing the magnitude of EIMD and effective management strategies. While there are limitations with several EIMD markers – for example the variability of biomarkers and subjectivity of perceptual assessments – once the optimal markers are determined, these should be consistently used moving forward. Overall, this thesis has contributed to the current body of knowledge by demonstrating that milk protein ingestion is not an effective management strategy for muscle damage following ecologically-valid resistance exercise; therefore, alternative strategies to mitigate mild muscle damage should be investigated. Further, this work supported previous reports of sex differences in EIMD and indicated that the attenuation of EIMD in females relative to males was not attributed to sex differences in body composition; thus, the aetiology of such differences necessitates further exploration by means of high-quality sex comparative research. Finally, this thesis reached the consensus recommendation that lower exercise loads can be utilised to reduce muscle damage in males; nonetheless, supporting evidence for the application of this recommendation to females is required

    A Secure Open-Source Intelligence Framework For Cyberbullying Investigation

    Full text link
    Cyberbullying has become a pervasive issue based on the rise of cell phones and internet usage affecting individuals worldwide. This paper proposes an open-source intelligence pipeline using data from Twitter to track keywords relevant to cyberbullying in social media to build dashboards for law enforcement agents. We discuss the prevalence of cyberbullying on social media, factors that compel individuals to indulge in cyberbullying, and the legal implications of cyberbullying in different countries also highlight the lack of direction, resources, training, and support that law enforcement officers face in investigating cyberbullying cases. The proposed interventions for cyberbullying involve collective efforts from various stakeholders, including parents, law enforcement, social media platforms, educational institutions, educators, and researchers. Our research provides a framework for cyberbullying and provides a comprehensive view of the digital landscape for investigators to track and identify cyberbullies, their tactics, and patterns. An OSINT dashboard with real-time monitoring empowers law enforcement to swiftly take action, protect victims, and make significant strides toward creating a safer online environment.Comment: 8 pages, 5 figure, under revie

    Understanding the Potential of Sport for Promoting Physical Activity and Psychological Well-Being in Middle-Aged and Older Adults

    Get PDF
    Insufficient physical activity is considered a global public health challenge. This thesis highlights that, for middle-aged and older adults, sport participation is associated with a wide range of psychosocial benefits. Then, the thesis offers insight into the potential of walking sport programmes to promote health-enhancing physical activity in middle-aged and older adults. Recommendations are provided to promote the appeal, feasibility, and sustainability of walking sport programmes in community-based settings

    History, Features, Challenges, and Critical Success Factors of Enterprise Resource Planning (ERP) in The Era of Industry 4.0

    Get PDF
    ERP has been adopting newer features over the last several decades and shaping global businesses with the advent of newer technologies. This research article uses a state-of-the-art review method with the purpose to review and synthesize the latest information on the possible integration of potential Industry 4.0 technologies into the future development of ERP. Different software that contributed to the development of the existing ERP is found to be Material Requirement Planning (MRP), Manufacturing Resource Planning (MRPII), and Computer Integrated Manufacturing (CIM). Potential disruptive Industry 4.0 technologies that are featured to be integrated into future ERP are artificial intelligence, business intelligence, the internet of things, big data, blockchain technology, and omnichannel strategy. Notable Critical Success Factors of ERP have been reported to be top management support, project team, IT infrastructure, communication, skilled staff, training & education, and monitoring & evaluation. Moreover, cybersecurity has been found to be the most challenging issue to overcome in future versions of ERP. This review article could help future ERP researchers and respective stakeholders contribute to integrating newer features in future versions of ERP

    Orientation of Public Audit Missions to the IT Activity Carried Out within the State Authorities/Entities

    Get PDF
    The exercise of public audit in Romania is the responsibility of the Supreme Audit Institution (the Court of Accounts, which exercises external public audit) and the special internal audit structures found in central and local public authorities/entities. With the present paper we bring to the reader's attention some aspects derived from the orientation of the public audit activity on the IT-related activity carried out by these authorities/entities. The authors refer to the information from the activity reports of the internal audit structures at the level of central and local public authorities/entities, submitted to the Supreme Audit Institution, as well as to some of its own findings, resulting from the assessment of the managerial internal control systems (including internal audit) carried out in the framework of the audit actions carried out at public authorities/entities

    Making friends with failure in STS

    Get PDF

    Cyberbullying in educational context

    Get PDF
    Kustenmacher and Seiwert (2004) explain a man’s inclination to resort to technology in his interaction with the environment and society. Thus, the solution to the negative consequences of Cyberbullying in a technologically dominated society is represented by technology as part of the technological paradox (Tugui, 2009), in which man has a dual role, both slave and master, in the interaction with it. In this respect, it is noted that, notably after 2010, there have been many attempts to involve artificial intelligence (AI) to recognize, identify, limit or avoid the manifestation of aggressive behaviours of the CBB type. For an overview of the use of artificial intelligence in solving various problems related to CBB, we extracted works from the Scopus database that respond to the criterion of the existence of the words “cyberbullying” and “artificial intelligence” in the Title, Keywords and Abstract. These articles were the subject of the content analysis of the title and, subsequently, only those that are identified as a solution in the process of recognizing, identifying, limiting or avoiding the manifestation of CBB were kept in the following Table where we have these data synthesized and organized by years

    An Adversarial Dance: Toward an Understanding of Insiders’ Responses to Organizational Information Security Measures

    Get PDF
    Despite the increased focus on organizational security policies and programs, some employees continue to engage in maladaptive responses to security measures (i.e., behaviors other than those recommended, intended, or prescribed). To help shed light on insiders’ adaptive and maladaptive responses to IS security measures, we conducted a case study of an organization at the forefront of security policy initiatives. Drawing on the beliefs-actions-outcomes (BAO) model to analyze our case data, we uncover a potentially nonvirtuous cycle consisting of security-related beliefs, actions, and outcomes, which we refer to as an “adversarial dance.” Explaining our results, we describe a novel belief framework that identifies four security belief profiles and uncovers an underexplored outcome of IS security: insiders’ lived security experiences. We find that individuals’ unfavorable lived security experiences produce counterproductive security-related beliefs that, in turn, lead to maladaptive behaviors. Maladaptive behaviors create new potential for security risk, leading to increased organizational security measures to counter them. Thus, the adversarial dance continues, as the new security measures have the potential to reinforce counterproductive security-related beliefs about the importance and risk of IS security and lead to new maladaptive behaviors. To help situate our findings within the current security literature, we integrate the results with prior research based on extant theories. While this paper is not the first to suggest that security measures can elicit maladaptive behaviors, the emergent belief framework and expanded BAO model of IS security constitute an important contribution to the behavioral IS security literature

    Raising the Standard of Maritime Voyage Data Recorder Security

    Get PDF
    Voyage Data Recorders (VDRs), often referred to as the ‘black boxes’ of the shipping industry, collect and store vital data from key sensors and locations around the ship. This data plays a pivotal role in incident investigation, as was seen in the grounding of the Costa Concordia in 2012, and the sinking of the El Faro in 2015. With such an important role to play, the International Maritime Organization (IMO) has mandated that all SOLAS registered ships carry a VDR, which can demonstrate compliance with internationally agreed standards. Without a VDR compliant with these standards a ship cannot sail. However, the rise in the number, and sophistication, of digital devices are making the sector increasingly vulnerable to cyber-attacks. This paper will demonstrate a number of high-risk VDR cyber security vulnerabilities and review the current international technical standards covering all VDR devices being manufactured and used today, drawing attention to the minimum security requirements. The paper will go on to discuss how these standards fail to promote the necessary levels of cyber security needed to protect VDRs from today’s cyber risks, amidst increased demands for digital connectivity for remote and autonomous operations. The paper will conclude by proposing several amendments (technical and non-technical) to the current standards which, if adopted, will help increase the minimum level of security of VDRs. Industry opinions were gathered on this topic, and their beliefs have been included across this paper
    • …
    corecore