5,015 research outputs found

    Factors associated with the decision to obtain an HIV test among Chinese/Chinese American community college women in Northern California

    Get PDF
    HIV testing and counseling is the cornerstone of a comprehensive approach to HIV prevention and education. This article examines reasons for and barriers to obtaining an HIV test among 230 Chinese/Chinese American college students. Using Health Belief Model constructs, a cross-sectional study was administered at four California community college campuses. The self-report survey results indicated that 30% of respondents have obtained HIV testing. The most common reasons for testing were “just to find out” (73%), “having had unprotected sexual intercourse” (63%), and “having had sex with a new partner” (57%). Among those who were never tested, low levels of perceived susceptibility (66%) and lack of knowledge on testing sites (36%) were the most common barriers. Multiple unconditional logistic regression analyses revealed age, ethnic identity, lack of condom use during last intercourse, lower perceived barriers, and higher self-efficacy as significant predictors of HIV testing history. Emphasizing these factors in HIV education campaigns will likely increase testing rates within this population

    Are native bees and Apis mellifera equally efficient pollinators of the rupestrian grassland daisy Aspilia jolyana (Asteraceae)?

    Get PDF
    Most angiosperms rely on animals for pollination, and insects, especially bees, are the most frequent pollinators. Many native Neotropical plants are frequently visited by the invasive honeybee (Apis mellifera), but its role in the pollination of these plants has been little investigated. We assessed the contribution of various floral visitors, including native bees and the honeybee, on the pollination of a generalist rupestrian grassland daisy, Aspilia jolyana (Asteraceae), in Serra do Cipó, Espinhaço Mountain Range, Brazil. We recorded floral visitors and measured the seed set resulting from one single visitation. We observed a total of 442 visits, mostly by bees, with Bombus pauloensis and Apis mellifera being the most common floral visitors. Other visitors included many other species of bees, flies, hummingbirds, wasps and butterflies. Pollinators significantly increased seed set in comparison to non-visited (bagged) capitula. Moreover, there was no difference among bee species/groups in their contribution to seed set. Thus, A. jolyana benefits from its generalized pollination strategy, and frequent bee visitors, including several native species and the invasive honeybee, are equally effective pollinators for this generalist daisy of rupestrian grassland

    eduGraph: A Dashboard for Personalised Feedback in Massive Open Online Courses

    Get PDF
    Learning Analytics is concerned with the design and implementation of tools and processes for collecting, analysing, and communicating information about teaching and learning. It is enabled by data, but not driven by it, rather it tries to empower human judgements by presenting meaningful facts. This thesis explores the data generated in Open edX courses to understand how it can be analysed and used to impact learners' motivation in online courses. It is carried out using Design Science, a research methodology aiming to produce artefacts that can improve the interaction with problems. In this thesis I present the eduGraph dashboard, a dashboard that uses Learning Analytics to present meaningful insights about learners' learning process in Massive Open Online Courses (MOOCs). Results indicate that learners perceive the dashboard as useful and effective at motivating them to take part in online courses, and that it enables them to keep track of their progress in the courses. I posit that the biggest problem facing Learning Analytics today are the lack of accessible data, and that it is possible for reasearchers to create more accurate learner models by using Learning Anaytics theories and methods in combination with the iterative and technical process of Information Systems development.Masteroppgave i informasjonsvitenskapINFO390MASV-INF

    Assessment of active pharmaceutical ingredients in drug registration procedures in Pakistan : implications for the future

    Get PDF
    Introduction: There are concerns over the quality of generic medicines in Pakistan. This is due to perceived non-compliance with good manufacturing practice (GMP), whereby the quality of the raw materials is not being assessed. If not addressed, this will impact on the potential for generics exports from Pakistan, as well as on patient care. Consequently, there is a need to assess the current assessment and regulatory situation in Pakistan and to recommend a way forward that ensures the future quality of products. Objective: To assess the quality of the raw materials that are either imported to, or manufactured in Pakistan, that are then used to produce a leading analgesic (ibuprofen). As part of the assessment, the presence and levels of impurities will be determined. Subsequently, the findings will be used to recommend potential regulatory changes to improve patient care. Methods: The quality of 27 sourced raw materials and the reference product were assessed using a variety of quality assessment methodologies, including assay tests, and infrared spectroscopy and UV-spectrophotometry. The calculated values were then compared to values documented in the Certificate of Analysis (CoA), and high performance liquid chromatography (HPLC). Results: All but one sample passed the spectroscopy identification tests. However, 81.5% of samples failed to comply with pharmacopoeia assay limits. There were also concerns with the use of HPLC methods used to assess the quality of raw materials, and over the fact that assay values obtained were not the same as those listed in the CoA. In addition, where manufacturers had concerns over the amount of ibuprofen in the raw material, rather than rejecting the product, they typically used higher quantities to make up any shortfall. Conclusions: The results of this study demonstrate that there is an urgent need to improve the registration process for generic products in Pakistan. This should include implementing Common Technical Documents (CTDs) based on international standards. In this way, we will see generics being produced that result in improved patient care and that have potential for export from Pakistan

    Sexually Transmitted Infection Risk Reduction for College Students

    Get PDF
    University students have been assessed through many sexual health lenses, but there is a paucity of research on the sexual health of community college students. This population may provide good access to at-risk youth, and opportunity to reverse steep climbs in sexually transmitted infection (STI) rates. This research project pilot tests a theory-based intervention employing social facilitation to reduce STI risk among college students. Fifty students were recruited from Human Sexuality courses to participate in a 60-minute workshop. Pre- and post-testing measured for change in STI knowledge, attitude towards safer sex, and self-efficacy for engaging in safer sex practices. A two-tailed paired t-test showed a significant increase in knowledge from pre-test to post-test ( t(49) = 5.43, p \u3c 0.001). Attitudes towards safer sex changed significantly between pre- and post-test on both subscales: advantages of safer sex ( t(47) = 3.21, p \u3c 0.05), and disadvantages of safer sex ( t(47) = 2.02, p \u3c 0.05). No significant change in self-efficacy scores was demonstrated between pre- and post-testing. Study replication with more time focused on self-regulation skill and ability may improve self-efficacy scores. The intervention could eventually be implemented on each of the 110 California Community College campuses, and adapted for use in other settings

    BlogForever: D2.5 Weblog Spam Filtering Report and Associated Methodology

    Get PDF
    This report is written as a first attempt to define the BlogForever spam detection strategy. It comprises a survey of weblog spam technology and approaches to their detection. While the report was written to help identify possible approaches to spam detection as a component within the BlogForver software, the discussion has been extended to include observations related to the historical, social and practical value of spam, and proposals of other ways of dealing with spam within the repository without necessarily removing them. It contains a general overview of spam types, ready-made anti-spam APIs available for weblogs, possible methods that have been suggested for preventing the introduction of spam into a blog, and research related to spam focusing on those that appear in the weblog context, concluding in a proposal for a spam detection workflow that might form the basis for the spam detection component of the BlogForever software

    Comparison of veterinary drugs and veterinary homeopathy: part 1

    Get PDF
    For many years after its invention around 1796, homeopathy was widely used in people and later in animals. Over the intervening period (1796-2016) pharmacology emerged as a science from Materia Medica (medicinal materials) to become the mainstay of veterinary therapeutics. There remains today a much smaller, but significant, use of homeopathy by veterinary surgeons. Homeopathic products are sometimes administered when conventional drug therapies have not succeeded, but are also used as alternatives to scientifically based therapies and licensed products. The principles underlying the veterinary use of drug-based and homeopathic products are polar opposites; this provides the basis for comparison between them. This two-part review compares and contrasts the two treatment forms in respect of history, constituents, methods of preparation, known or postulated mechanisms underlying responses, the legal basis for use and scientific credibility in the 21st century. Part 1 begins with a consideration of why therapeutic products actually work or appear to do so

    The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps

    Get PDF
    Third party apps that work on top of personal cloud services such as Google Drive and Dropbox, require access to the user's data in order to provide some functionality. Through detailed analysis of a hundred popular Google Drive apps from Google's Chrome store, we discover that the existing permission model is quite often misused: around two thirds of analyzed apps are over-privileged, i.e., they access more data than is needed for them to function. In this work, we analyze three different permission models that aim to discourage users from installing over-privileged apps. In experiments with 210 real users, we discover that the most successful permission model is our novel ensemble method that we call Far-reaching Insights. Far-reaching Insights inform the users about the data-driven insights that apps can make about them (e.g., their topics of interest, collaboration and activity patterns etc.) Thus, they seek to bridge the gap between what third parties can actually know about users and users perception of their privacy leakage. The efficacy of Far-reaching Insights in bridging this gap is demonstrated by our results, as Far-reaching Insights prove to be, on average, twice as effective as the current model in discouraging users from installing over-privileged apps. In an effort for promoting general privacy awareness, we deploy a publicly available privacy oriented app store that uses Far-reaching Insights. Based on the knowledge extracted from data of the store's users (over 115 gigabytes of Google Drive data from 1440 users with 662 installed apps), we also delineate the ecosystem for third-party cloud apps from the standpoint of developers and cloud providers. Finally, we present several general recommendations that can guide other future works in the area of privacy for the cloud

    Complying with BYOD Security Policies: A Moderation Model Based on Protection Motivation Theory

    Get PDF
    As security concerns have become critical to organizations’ Bring Your Own Device (BYOD) strategy, it is important for employees to comply with organization’s security measures and policies. Based on the protection motivation theory, this study develops a theoretical model to identify the key factors that affect an employee’s intention to comply with organization’s BYOD security policies. This model also enriches general Protection Motivation Theory (PMT) by investigating how unique BYOD features may play moderating roles on the relationships between employee’s security perceptions and compliance intention. A survey of organization employees who were using their own devices in their workplace was conducted. The research model was tested using the partial least squares (PLS) approach. The results suggest that employees’ threat appraisal and coping appraisal affect their intention to comply with BYOD security policies. Further, mixed usage of device and company surveillance visibility are verified moderators. This study contributes to both academics and management practice
    • 

    corecore