97,955 research outputs found

    Health Savings Account - Eligible High Deductible Health Plans: Updating the Definition of Prevention

    Get PDF
    High-deductible health plans (HDHPs) are an important and growing part of the health insurance landscape. By some estimates, as many as 80 percent of large employers may offer an HDHP in 2014. In 2013, more than 15 million Americans received health coverage through an HDHP, a more than a threefold increase since 2007.As outlined by the U.S. Treasury Department, individuals with an HSA-eligible HDHP are required to pay the full cost of most medications and services -- in theory utilizing pre-tax HSA funds -- until deductibles are met. However, the 2003 authorizing legislation and further guidance include a safe harbor allowing plans to cover primary preventive services, those typically deemed to prevent the onset of disease, before the deductible is satisfied.Services or benefits meant to treat "an existing illness, injury or condition," are excluded from first-dollar coverage in HSA-eligible HDHPs, which encompasses most secondary preventive services. For example, plans are prohibited from providing first dollar coverage of disease management services such as insulin, eye and foot exams, and glucose monitoring supplies for patients with diabetes.As chronic disease conditions currently make up 75 percent of total U.S. health spending, appropriate chronic disease management is an important tool to lower long-term health care costs. As the market for HDHPs grow, it is important that they maintain the flexibility to allow for effective health management of all beneficiaries. This report addresses the strict definition of prevention that an HDHP must follow for it to include a pre-tax health savings account (HSA), and how this restriction limits the effectiveness of current plans. A potential solution - allowing HSA-eligible HDHPs to provide first-dollar coverage for targeted, evidence-based, secondary preventive services that prevent chronic disease progression and related complications - can improve patient-centered outcomes, add efficiency to medical spending, and enhance HDHP attractiveness.A multi-disciplinary research team from the University of Michigan's Center for Value-Based Insurance Design, Harvard Medical School, and the University of Minnesota conducted a multi-part project to investigate the impact of updatingthe definition of prevention for HDHPs to include selected secondary preventive services that are frequently used as health plan quality metrics and included as elements of pay-for-performance programs. Specifically, the project aimed to: 1) determine the premium effect, actuarial value, and estimated market uptake of the novel HDHP plan that covers these evidence-based services outside the deductible, and 2) explore through interviews whether insurance industry experts found coverage of secondary preventive services a worthwhile endeavor

    Detection of advanced persistent threat using machine-learning correlation analysis

    Get PDF
    As one of the most serious types of cyber attack, Advanced Persistent Threats (APT) have caused major concerns on a global scale. APT refers to a persistent, multi-stage attack with the intention to compromise the system and gain information from the targeted system, which has the potential to cause significant damage and substantial financial loss. The accurate detection and prediction of APT is an ongoing challenge. This work proposes a novel machine learning-based system entitled MLAPT, which can accurately and rapidly detect and predict APT attacks in a systematic way. The MLAPT runs through three main phases: (1) Threat detection, in which eight methods have been developed to detect different techniques used during the various APT steps. The implementation and validation of these methods with real traffic is a significant contribution to the current body of research; (2) Alert correlation, in which a correlation framework is designed to link the outputs of the detection methods, aims to identify alerts that could be related and belong to a single APT scenario; and (3) Attack prediction, in which a machine learning-based prediction module is proposed based on the correlation framework output, to be used by the network security team to determine the probability of the early alerts to develop a complete APT attack. MLAPT is experimentally evaluated and the presented sy

    Genomic instability in human cancer: molecular insights and opportunities for therapeutic attack and prevention through diet and nutrition

    Get PDF
    Genomic instability can initiate cancer, augment progression, and influence the overall prognosis of the affected patient. Genomic instability arises from many different pathways, such as telomere damage, centrosome amplification, epigenetic modifications, and DNA damage from endogenous and exogenous sources, and can be perpetuating, or limiting, through the induction of mutations or aneuploidy, both enabling and catastrophic. Many cancer treatments induce DNA damage to impair cell division on a global scale but it is accepted that personalized treatments, those that are tailored to the particular patient and type of cancer, must also be developed. In this review, we detail the mechanisms from which genomic instability arises and can lead to cancer, as well as treatments and measures that prevent genomic instability or take advantage of the cellular defects caused by genomic instability. In particular, we identify and discuss five priority targets against genomic instability: (1) prevention of DNA damage; (2) enhancement of DNA repair; (3) targeting deficient DNA repair; (4) impairing centrosome clustering; and, (5) inhibition of telomerase activity. Moreover, we highlight vitamin D and B, selenium, carotenoids, PARP inhibitors, resveratrol, and isothiocyanates as priority approaches against genomic instability. The prioritized target sites and approaches were cross validated to identify potential synergistic effects on a number of important areas of cancer biology

    Lawrence O. Gostin on Biosecurity Policy: Are We Safer Today?

    Get PDF
    World-acclaimed authority Lawrence O. Gostin analyzes biosecurity policy since 9/11. He begins with the question: Are we safer now? Then comes a review of biosecurity legislation, followed by discussion of planning to deal with specific diseases and the problems with such an approach, and then an explanation of what the right approach is. He concludes by covering the Model State Emergency Health Powers Act and related civil liberties questions

    Tiresias: Predicting Security Events Through Deep Learning

    Full text link
    With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack. However this is still an open research problem, and previous research in predicting malicious events only looked at binary outcomes (e.g., whether an attack would happen or not), but not at the specific steps that an attacker would undertake. To fill this gap we present Tiresias, a system that leverages Recurrent Neural Networks (RNNs) to predict future events on a machine, based on previous observations. We test Tiresias on a dataset of 3.4 billion security events collected from a commercial intrusion prevention system, and show that our approach is effective in predicting the next event that will occur on a machine with a precision of up to 0.93. We also show that the models learned by Tiresias are reasonably stable over time, and provide a mechanism that can identify sudden drops in precision and trigger a retraining of the system. Finally, we show that the long-term memory typical of RNNs is key in performing event prediction, rendering simpler methods not up to the task

    Shrinking the Malaria Map: A Prospectus on Malaria Elimination

    Get PDF
    \ud Thirty-nine countries across the world are making progress toward malaria elimination. Some are committed to nationwide elimination, while others are pursuing spatially progressive elimination within their borders. Influential donor and multilateral organizations are supporting their goals of achieving malaria-free status. With elimination back on the global agenda, countries face a myriad of questions. Should they change their programs to eliminate rather than control malaria? What tools are available? What policies need to be put into place? How will they benefit from elimination? Unfortunately, answers to these questions, and resources for agencies and country program managers considering or pursuing elimination, are scarce. The 39 eliminating countries are all positioned along the endemic margins of the disease, yet they naturally experience a variety of country characteristics and epidemiologies that make their malaria situations different from one another. The Malaria Elimination Group (MEG) and this Prospectus recognize\ud that there is no single solution, strategy, or time line that will be appropriate for every country, and each is encouraged to initiate a comprehensive evaluation of its readiness and strategy for elimination. The Prospectus is designed to guide countries in conducting these assessments. The Prospectus provides detailed and informed discussion on the practical means of achieving and sustaining zero transmission. It is designed as a road map, providing direction and options from which to choose an appropriate path. As on all maps, the destination is clearly marked, but the possible routes to reach it are numerous. The Prospectus is divided into two sections: Section 1 Eliminating Malaria comprises four chapters covering the strategic components important to the periods before, during, and after an elimination program. Section 2 Tools for the Job, comprises six chapters that outline basic information about how interventions in an elimination program will be different from those in a control setting. Chapter 1, Making the Decision, evaluates the issues that a country should consider when deciding whether or not to eliminate malaria. The chapter begins with a discussion about the quantitative and qualitative benefits that a country could expect from eliminating malaria and then recommends a thorough feasibility assessment. The feasibility assessment is based on three major components: operational, technical, and financial feasibility. Cross-border and regional collaboration is a key subject in this chapter. Chapter 2, Getting to Zero, describes changes that programs must consider when moving from sustained control to an elimination goal. The key strategic issues that must be addressed are considered, including supply chains, surveillance systems, intersectoral collaboration, political will, and legislative framework. Cross-border collaboration is again a key component in Getting to Zero. Chapter 3, Holding the Line, provides recommendations on how to conduct an assessment of two key factors that will affect preventing the reemergence of malaria once transmission is interrupted: outbreak risk and importation risk. The chapter emphasizes the need for a strong surveillance system in order to prevent and, if necessary, respond to imported cases. Chapter 4, Financing Elimination, reviews the cost-effectiveness of elimination as compared with sustained control and then presents the costs of selected elimination programs as examples. It evaluates four innovative financing mechanisms that must support elimination, emphasizing the need for predictable and stable financing. Case studies from Swaziland and two provinces in China are provided. Chapter 5, Understanding Malaria, considers malaria from the point of view of elimination and provides a concise overview of the current burden of the disease, malaria transmission, and the available interventions that can be used in an elimination program. Chapter 6, Learning from History, extracts important lessons from the Global Malaria Eradication Program and analyzes some elimination efforts that were successful and some that were unsuccessful. The chapter also reviews how the malaria map has been shrinking since 1900. xiv A Prosp ectus on Mala ria Elimi natio n\ud Chapter 7, Measuring Malaria for Elimination, provides a precise language for discussing malaria and gives the elimination discussion a quantitative structure. The chapter also describes the role of epidemiological theory and mathematical modeling in defining and updating an elimination agenda for malaria. Chapter 8, Killing the Parasite, outlines the importance of case detection and management in an elimination setting. Options for diagnosis, the hidden challenge of Plasmodium vivax in an elimination setting, and the impact of immunity are all discussed. Chapter 9, Suppressing the Vector, explores vector control, a necessary element of any malaria program. It considers optimal methods available to interrupt transmission and discusses potential changes, such as insecticide resistance, that may affect elimination efforts. Chapter 10, Identifying the Gaps — What We Need to Know, reviews the gaps in our understanding of what is required for elimination. The chapter outlines a short-term research agenda with a focus on the operational needs that countries are facing today. The Prospectus reviews the operational, technical, and financial feasibility for those working on the front lines and considers whether, when, and how to eliminate malaria. A companion document, A Guide on Malaria Elimination for Policy Makers, is provided for those countries or agencies whose responsibility is primarily to make the policy decisions on whether to pursue or support a malaria elimination strategy. The Guide is available at www.malaria eliminationgroup.org

    Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences

    Full text link
    In this survey, we first briefly review the current state of cyber attacks, highlighting significant recent changes in how and why such attacks are performed. We then investigate the mechanics of malware command and control (C2) establishment: we provide a comprehensive review of the techniques used by attackers to set up such a channel and to hide its presence from the attacked parties and the security tools they use. We then switch to the defensive side of the problem, and review approaches that have been proposed for the detection and disruption of C2 channels. We also map such techniques to widely-adopted security controls, emphasizing gaps or limitations (and success stories) in current best practices.Comment: Work commissioned by CPNI, available at c2report.org. 38 pages. Listing abstract compressed from version appearing in repor
    • …
    corecore