2,030 research outputs found

    Asking the experts : developing and validating parental diaries to assess children's minor injuries

    Get PDF
    The methodological issues involved in parental reporting of events in children's everyday lives are discussed with reference to the development and validation of an incident diary, collecting concurrent data on minor injuries in a community study of children under eight years old. Eighty-two mothers participated in a comparison over nine days of daily telephone interviews and structured incident diaries. Telephone methods resulted in more missing data, and participants in both groups expressed a preference for the diary method. This diary was then validated on a sample of 56 preschool and school-aged children by comparing injury recording by a research health visitor with that of their mothers. Each failed to report some injuries, but there was good agreement overall, and in descriptive data on injuries reported by both. Parental diaries have the potential to provide rich data, of acceptable validity, on minor events in everyday life

    Decomposition of coarse woody debris in a long-term litter manipulation experiment: A focus on nutrient availability

    Get PDF
    The majority of above-ground carbon in tropical forests is stored in wood, which is returned to the atmosphere during decomposition of coarse woody debris. However, the factors controlling wood decomposition have not been experimentally manipulated over time scales comparable to the length of this process.We hypothesized that wood decomposition is limited by nutrient availability and tested this hypothesis in a long-term litter addition and removal experiment in a lowland tropical forest in Panama. Specifically, we quantified decomposition using a 15-year chronosequence of decaying boles, and measured respiration rates and nutrient limitation of wood decomposer communities.The long-term probability that a dead tree completely decomposed was decreased in plots where litter was removed, but did not differ between litter addition and control treatments. Similarly, respiration rates of wood decomposer communities were greater in control treatments relative to litter removal plots; litter addition treatments did not differ from either of the other treatments. Respiration rates increased in response to nutrient addition (nitrogen, phosphorus, and potassium) in the litter removal and addition treatments, but not in the controls.Established decreases in concentrations of soil nutrients in litter removal plots and increased respiration rates in response to nutrient addition suggest that reduced rates of wood decomposition after litter removal were caused by decreased nutrient availability. The effects of litter manipulations differed directionally from a previous short-term decomposition study in the same plots, and reduced rates of bole decomposition in litter removal plots did not emerge until after more than 6 years of decomposition. These differences suggest that litter-mediated effects on nutrient dynamics have complex interactions with decomposition over time

    A Study into Detecting Anomalous Behaviours within HealthCare Infrastructures

    Get PDF
    The theft of medical data, which is intrinsically valuable, can lead to loss of patient privacy and trust. With increasing requirements for valuable and accurate information, patients need to be confident that their data is being stored safely and securely. However, medical devices are vulnerable to attacks from the digital domain, with many devices transmitting data unencrypted wirelessly to electronic patient record systems. As such, it is now becoming more necessary to visualise data patterns and trends in order identify erratic and anomalous data behaviours. In this paper, a system design for modelling data flow within healthcare infrastructures is presented. The system assists information security officers within healthcare organisations to improve the situational awareness of cyber security risks. In addition, a visualisation of TCP Socket Connections using real-world network data is put forward, in order to demonstrate the framework and present an analysis of potential risks

    Securing Health Care Information Systems using Visualisation Techniques

    Get PDF
    Health care information systems form the backbone of health care infrastructures and are increasingly reliant on medical devices to capture and transmit data. These devices, however, are vulnerable to attacks from the digital domain. The number of differing medical devices and information systems interacting with one another in new and increasingly less secure and disparate ways creates new challenges in information systems security. This work-in-progress paper presents a system design and methodology for modelling data interactions and data flow within the health care infrastructure. The system will increase situational awareness for users of information systems and promote stronger cyber security best practices and policies within this rapidly evolving landscape

    The Birmingham Boron Neutron Capture Therapy (BNCT) project : developments towards selective internal particle therapy

    Get PDF
    This paper will review progress on two aspects of the Birmingham BNCT project. Firstly on evaluation of the effects of high and low LET radiations when delivered simultaneously, and secondly on attempts to optimise delivery of the boron carrier compound BPA through pharmacokinetic studies. Simultaneous or non-simultaneous irradiations of V79 cells with alpha-particle and X-ray irradiations were performed. Alpha doses of 2 and 2.5 Gy were chosen and the impact on survival when delivered separately or simultaneously with variable doses of X-rays was evaluated. The pharmacokinetics of the delivery of a new formulation of BPA (BPA-mannitol) are being investigated in brain tumour patients through a study with 2 × 2 design featuring intravenous and intracarotid artery infusion of BPA, with or without a mannitol bolus. On the combined effect of low and high LET radiations, a synergistic effect was observed when alpha and X-ray doses are delivered simultaneously. The effect is only present at the 2.5 Gy alpha dose and is a very substantial effect on both the shape of the survival curve and the level of cell killing. This indicates that the alpha component may have the effect of inhibiting the repair of damage from the low LET radiation dose delivered simultaneously. On the pharmacokinetics of BPA, data on the first three cohorts indicate that bioavailability of BPA in brain ECF is increased substantially through the addition of a mannitol bolus, as well as by the use of intracarotid artery route of infusion. In both cases, for some patients the levels after infusion approach those seen in blood, whereas the ECF levels for intravenous infusion without mannitol are typically less than 10% of the blood values

    Extreme managers, extreme workplaces: capitalism, organizations and corporate psychopaths

    Get PDF
    This paper reports on in-depth, qualitative research carried out in England in 2013 among five organizational directors and two senior managers who had worked with other senior directors or managers who were Corporate Psychopaths, as measured by a management psychopathy measure. The Corporate Psychopaths reported on in this research displayed remarkable consistency in their approach to management to the extent that they could be called “text book examples” of managerial psychopathy. They were seen as being organizational stars and as deserving of performance awards by those above them, while the Corporate Psychopaths simultaneously subjected those below them to extreme forms of behavior, including bullying, intimidation and coercion and also engaged in extreme forms of mismanagement; such as very poor levels of personnel management, directionless leadership, miss-management of resources and outright fraud

    Density-Based Outlier Detection for Safeguarding Electronic Patient Record Systems

    Get PDF
    This research concerns the detection of abnormal data usage and unauthorised access in large-scale critical networks, specifically healthcare infrastructures. Hospitals in the UK are now connecting their traditionally isolated equipment on a large scale to Internet-enabled networks to enable remote data access. This step-change makes sensitive data accessible to a broader spectrum of users. The focus of this research is on the safeguarding of Electronic Patient Record (EPR) systems in particular. With over 83% of hospitals adopting EPRs, access to this healthcare data needs to be proactively monitored for malicious activity. Hospitals must maintain patient trust and ensure that the information security principles of Integrity, Availability and Confidentiality are applied to EPR data. Access to EPR is often heavily audited within healthcare infrastructures. However, this data is regularly left untouched in a data silo and only ever accessed on an ad hoc basis. Without proactive monitoring of audit records, data breaches may go undetected. In addition, external threats, such as phishing or social engineering techniques to acquire a clinician’s logon credentials, need to be identified. Data behaviour within healthcare infrastructures therefore needs to be proactively monitored for malicious, erratic or unusual activity. This paper presents a system that employs a density-based local outlier detection model. The system is intended to add to the defence-in-depth of healthcare infrastructures. Patterns in EPR data are extracted to profile user behaviour and device interactions in order to detect and visualize anomalous activities. The system is able to detect 144 anomalous behaviours in an unlabelled dataset of 1,007,727 audit logs. This includes 0.66% of the users on the system, 0.17% of patient record accesses, 0.74% of routine accesses, and 0.53% of the devices used in a specialist Liverpool (UK) hospital
    corecore