180 research outputs found
Peripheral neurological disturbances, autonomic dysfunction, and antineuronal antibodies in adult celiac disease before and after a gluten-free diet
Thirty-two consecutive adult celiac disease (CD) patients (pts), complaining of peripheral neuropathy (12 pts), autonomic dysfunction (17 pts), or both (3 pts), were evaluated to assess the presence of neurological damage (by clinical neurological evaluation and electrophysiological study) and antineuronal antibodies and to assess the effect of a gluten-free diet (GFD) on the course of the neurological symptoms and on antineuronal antibodies. At entry, 12 of 32 (38%) pts showed signs and symptoms of neurological damage: 7 of 12 (58%), peripheral neurological damage; 3 of 12 (25%), autonomic dysfunction; and 2 (17%), both peripheral neurological damage and autonomic dysfunction. The overall TNS score was 105 at entry. Anti-GM1 antibodies were present in 5 of 12 (42%) pts: 3 showed peripheral neurological damage and 2 showed both peripheral neurological damage and autonomic dysfunction. One year after the GFD was started, histological lesions were still present in only 10 of 12 (83%) pts. TNS score was 99, 98, 98, and 101 at the 3rd, 6th, 9th, and 12th month after the GFD was started, so it did not improve throughout the follow-up. None of the pts showed disappearance of antineuronal antibodies throughout the follow-up. We conclude that adult CD patients may show neurological damage and presence of antineuronal antibodies. Unfortunately, these findings do not disappear with a GFD
Recovery of gastric function in patients affected by chronic atrophic gastritis using L-cysteine (Acetium®): one year survey in comparison with a control group
Background and aim: Chronic Atrophic Gastritis (CAG) is a precancerous condition for gastric cancer (GC) as single risk factor, being a consequence of a previous Helicobacter pylori (Hp) infection or based on autoimmune mechanisms. Achlorhydria plays an important role towards the formation of a class I carcinogen, acetaldehyde, after food intake. L-cysteine has been claimed to be able to bind in a covalent way acetaldehyde when administered at meals. Methods: In this study we enrolled two CAG groups of patients, one treated whit 300 mg/daily of L-cysteine for one year, the other one untreated. We assessed gastric function lasting the one-year follow-up by using noninvasive surrogates, i.e. Pepsinogen I (PGI) and gastrin 17 (G17). Results: In the group of 77 CAG on therapy we found a statistically significant increase in PGI values and a decrease in G17 levels, in comparison with unchanged values in control group. Conclusions: L-cysteine seems able to provide a recovery in gastric function when administered in CAG patients and could be proposed as a possible therapy in such patients. (www.actabiomedica.it)
Tumors carrying BRAF-mutations over-express NAMPT that is genetically amplified and possesses oncogenic properties
Background: Nicotinamide phosphoribosyltransferase (NAMPT), the rate-limiting enzyme in nicotinamide adenine dinucleotide (NAD) biosynthesis, is up-regulated in several cancers, including metastatic melanoma (MM). The BRAF oncogene is mutated in different cancer types, among which MM and thyroid carcinoma (THCA) are prominent. Drugs targeting mutant BRAF are effective, especially in MM patients, even though resistance rapidly develops. Previous data have linked NAMPT over-expression to the acquisition of BRAF resistance, paving the way for therapeutic strategies targeting the two pathways. Methods: Exploiting the TCGA database and a collection of MM and THCA tissue microarrays we studied the association between BRAF mutations and NAMPT expression. BRAF wild-type (wt) cell lines were genetically engineered to over-express the BRAF V600E construct to demonstrate a direct relationship between over-activation of the BRAF pathway and NAMPT expression. Responses of different cell line models to NAMPT (i)nhibitors were studied using dose–response proliferation assays. Analysis of NAMPT copy number variation was performed in the TCGA dataset. Lastly, growth and colony forming assays were used to study the tumorigenic functions of NAMPT itself. Results: The first finding of this work is that tumor samples carrying BRAF-mutations over-express NAMPT, as demonstrated by analyzing the TCGA dataset, and MM and THC tissue microarrays. Importantly, BRAF wt MM and THCA cell lines modified to over-express the BRAF V600E construct up-regulated NAMPT, confirming a transcriptional regulation of NAMPT following BRAF oncogenic signaling activation. Treatment of BRAF-mutated cell lines with two different NAMPTi was followed by significant reduction of tumor growth, indicating NAMPT addiction in these cells. Lastly, we found that several tumors over-expressing the enzyme, display NAMPT gene amplification. Over-expression of NAMPT in BRAF wt MM cell line and in fibroblasts resulted in increased growth capacity, arguing in favor of oncogenic properties of NAMPT. Conclusions: Overall, the association between BRAF mutations and NAMPT expression identifies a subset of tumors more sensitive to NAMPT inhibition opening the way for novel combination therapies including NAMPTi with BRAFi/MEKi, to postpone and/or overcome drug resistance. Lastly, the over-expression of NAMPT in several tumors could be a key and broad event in tumorigenesis, substantiated by the finding of NAMPT gene amplification
Challenges of keyword-based location disclosure
A practical solution to location privacy should be incremen-tally deployable. We claim it should hence reconcile the eco-nomic value of location to aggregators, usually ignored by prior works, with a user’s control over her information. Loca-tion information indeed is being collected and used by many mobile services to improve revenues, and this gives rise to a heated debate: Privacy advocates ask for stricter regula-tion on information collection, while companies argue that it would jeopardize the thriving economy of the mobile web. We describe a system that gives users control over their information and does not degrade the data given to aggre-gators. Recognizing that the first challenge is to express lo-cations in a way that is meaningful for advertisers and users, we propose a keyword based design. Keywords characterize locations, let the users inform the system about their sen-sitivity to disclosure, and build information directly usable by an advertiser’s targeting campaign. Our work makes two main contributions: we design a market of location infor-mation based on keywords and we analyze its robustness to attacks using data from ad-networks, geo-located services, and cell networks. Categories and Subject Descriptors Security and Privacy [Human and societal aspects of security and privacy]: Usability in security and privac
Is Privacy Controllable?
One of the major views of privacy associates privacy with the control over
information. This gives rise to the question how controllable privacy actually
is. In this paper, we adapt certain formal methods of control theory and
investigate the implications of a control theoretic analysis of privacy. We
look at how control and feedback mechanisms have been studied in the privacy
literature. Relying on the control theoretic framework, we develop a simplistic
conceptual control model of privacy, formulate privacy controllability issues
and suggest directions for possible research.Comment: The final publication will be available at Springer via
http://dx.doi.org/ [in press
Socio-hydrological spaces in the Jamuna River floodplain in Bangladesh
Socio-hydrology aims to understand the dynamics and co-evolution
of coupled human–water systems, with research consisting of generic models as
well as specific case studies. In this paper, we propose a concept to help
bridge the gap between these two types of socio-hydrological studies:
socio-hydrological spaces (SHSs). A socio-hydrological space is a geographical
area in a landscape. Its particular combination of hydrological and social
features gives rise to the emergence of distinct interactions and dynamics
(patterns) between society and water. Socio-hydrological research on
human–flood interactions has found two generic responses, fight or
adapt. Distilling the patterns resulting from these responses in case
studies provides a promising way to relate contextual specificities to the
generic patterns described by conceptual models. Through the use of SHSs,
different cases can be compared globally without aspiring to capturing them
in a formal model. We illustrate the use of SHS for the Jamuna floodplain,
Bangladesh. We use narratives and experiences of local experts and
inhabitants to empirically describe and delimit SHS. We corroborated the
resulting classification through the statistical analysis of primary data
collected for the purpose (household surveys and focus group discussions) and
secondary data (statistics, maps etc.). Our example of the use of SHSs shows
that the concept draws attention to how historical patterns in the
co-evolution of social behaviour, natural processes and technological
interventions give rise to different landscapes, different styles of living
and different ways of organising livelihoods. This provides a texture to the
more generic patterns generated by socio-hydrological models, promising to
make the resulting analysis more directly useful for decision makers. We
propose that the usefulness of this concept in other floodplains, and for
other socio-hydrological systems than floodplains, should be explored.</p
Realising the right to data portability for the domestic Internet of Things
There is an increasing role for the IT design community to play in regulation
of emerging IT. Article 25 of the EU General Data Protection Regulation (GDPR)
2016 puts this on a strict legal basis by establishing the need for information
privacy by design and default (PbD) for personal data-driven technologies.
Against this backdrop, we examine legal, commercial and technical perspectives
around the newly created legal right to data portability (RTDP) in GDPR. We are
motivated by a pressing need to address regulatory challenges stemming from the
Internet of Things (IoT). We need to find channels to support the protection of
these new legal rights for users in practice. In Part I we introduce the
internet of things and information PbD in more detail. We briefly consider
regulatory challenges posed by the IoT and the nature and practical challenges
surrounding the regulatory response of information privacy by design. In Part
II, we look in depth at the legal nature of the RTDP, determining what it
requires from IT designers in practice but also limitations on the right and
how it relates to IoT. In Part III we focus on technical approaches that can
support the realisation of the right. We consider the state of the art in data
management architectures, tools and platforms that can provide portability,
increased transparency and user control over the data flows. In Part IV, we
bring our perspectives together to reflect on the technical, legal and business
barriers and opportunities that will shape the implementation of the RTDP in
practice, and how the relationships may shape emerging IoT innovation and
business models. We finish with brief conclusions about the future for the RTDP
and PbD in the IoT
Simple Nudges for Better Password Creation
Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudges in creating website-specific passwords: financial incentive (present vs absent), length instruction (long password vs no instruction) and stimulus (picture present vs not present). Mechanical Turk workers were asked to create a password in one of these conditions and the resulting passwords were evaluated based on character length, resistance to automated guessing attacks, and time taken to create the password. We found that users created longer passwords when asked to do so or when given a financial incentive and these longer passwords were harder to guess than passwords created with no instruction. Using a picture nudge to support password creation did not lead to passwords that were either longer or more resistant to attacks but did lead to account-specific passwords
COVID-19 and the Global Impact on Colorectal Practice and Surgery
Background: The novel severe acute respiratory syndrome coronavirus 2 virus that emerged in December 2019 causing coronavirus disease 2019 (COVID-19) has led to the sudden national reorganization of health care systems and changes in the delivery of health care globally. The purpose of our study was to use a survey to assess the global effects of COVID-19 on colorectal practice and surgery. Materials and Methods: A panel of International Society of University Colon and Rectal Surgeons (ISUCRS) selected 22 questions, which were included in the questionnaire. The questionnaire was distributed electronically to ISUCRS fellows and other surgeons included in the ISUCRS database and was advertised on social media sites. The questionnaire remained open from April 16 to 28, 2020. Results: A total of 287 surgeons completed the survey. Of the 287 respondents, 90% were colorectal specialists or general surgeons with an interest in colorectal disease. COVID-19 had affected the practice of 96% of the surgeons, and 52% were now using telemedicine. Also, 66% reported that elective colorectal cancer surgery could proceed but with perioperative precautions. Of the 287 respondents, 19.5% reported that the use of personal protective equipment was the most important perioperative precaution. However, personal protective equipment was only provided by 9.1% of hospitals. In addition, 64% of surgeons were offering minimally invasive surgery. However, 44% reported that enough information was not available regarding the safety of the loss of intra-abdominal carbon dioxide gas during the COVID-19 pandemic. Finally, 61% of the surgeons were prepared to defer elective colorectal cancer surgery, with 29% willing to defer for ≤ 8 weeks. Conclusion: The results from our survey have demonstrated that, globally, COVID-19 has affected the ability of colorectal surgeons to offer care to their patients. We have also discussed suggestions for various practical adaptation strategies for use during the recovery period. We have presented the results of a survey used to assess the global impact of coronavirus disease 2019 (COVID-19) on the delivery of colorectal surgery. Despite accessible guidance information, our results have demonstrated that COVID-19 has significantly affected the ability of colorectal surgeons to offer care to patients. We have also discussed practical adaptation strategies for use during the recovery phase
- …