180 research outputs found

    Peripheral neurological disturbances, autonomic dysfunction, and antineuronal antibodies in adult celiac disease before and after a gluten-free diet

    Get PDF
    Thirty-two consecutive adult celiac disease (CD) patients (pts), complaining of peripheral neuropathy (12 pts), autonomic dysfunction (17 pts), or both (3 pts), were evaluated to assess the presence of neurological damage (by clinical neurological evaluation and electrophysiological study) and antineuronal antibodies and to assess the effect of a gluten-free diet (GFD) on the course of the neurological symptoms and on antineuronal antibodies. At entry, 12 of 32 (38%) pts showed signs and symptoms of neurological damage: 7 of 12 (58%), peripheral neurological damage; 3 of 12 (25%), autonomic dysfunction; and 2 (17%), both peripheral neurological damage and autonomic dysfunction. The overall TNS score was 105 at entry. Anti-GM1 antibodies were present in 5 of 12 (42%) pts: 3 showed peripheral neurological damage and 2 showed both peripheral neurological damage and autonomic dysfunction. One year after the GFD was started, histological lesions were still present in only 10 of 12 (83%) pts. TNS score was 99, 98, 98, and 101 at the 3rd, 6th, 9th, and 12th month after the GFD was started, so it did not improve throughout the follow-up. None of the pts showed disappearance of antineuronal antibodies throughout the follow-up. We conclude that adult CD patients may show neurological damage and presence of antineuronal antibodies. Unfortunately, these findings do not disappear with a GFD

    Recovery of gastric function in patients affected by chronic atrophic gastritis using L-cysteine (Acetium®): one year survey in comparison with a control group

    Get PDF
    Background and aim: Chronic Atrophic Gastritis (CAG) is a precancerous condition for gastric cancer (GC) as single risk factor, being a consequence of a previous Helicobacter pylori (Hp) infection or based on autoimmune mechanisms. Achlorhydria plays an important role towards the formation of a class I carcinogen, acetaldehyde, after food intake. L-cysteine has been claimed to be able to bind in a covalent way acetaldehyde when administered at meals. Methods: In this study we enrolled two CAG groups of patients, one treated whit 300 mg/daily of L-cysteine for one year, the other one untreated. We assessed gastric function lasting the one-year follow-up by using noninvasive surrogates, i.e. Pepsinogen I (PGI) and gastrin 17 (G17). Results: In the group of 77 CAG on therapy we found a statistically significant increase in PGI values and a decrease in G17 levels, in comparison with unchanged values in control group. Conclusions: L-cysteine seems able to provide a recovery in gastric function when administered in CAG patients and could be proposed as a possible therapy in such patients. (www.actabiomedica.it)

    Tumors carrying BRAF-mutations over-express NAMPT that is genetically amplified and possesses oncogenic properties

    Get PDF
    Background: Nicotinamide phosphoribosyltransferase (NAMPT), the rate-limiting enzyme in nicotinamide adenine dinucleotide (NAD) biosynthesis, is up-regulated in several cancers, including metastatic melanoma (MM). The BRAF oncogene is mutated in different cancer types, among which MM and thyroid carcinoma (THCA) are prominent. Drugs targeting mutant BRAF are effective, especially in MM patients, even though resistance rapidly develops. Previous data have linked NAMPT over-expression to the acquisition of BRAF resistance, paving the way for therapeutic strategies targeting the two pathways. Methods: Exploiting the TCGA database and a collection of MM and THCA tissue microarrays we studied the association between BRAF mutations and NAMPT expression. BRAF wild-type (wt) cell lines were genetically engineered to over-express the BRAF V600E construct to demonstrate a direct relationship between over-activation of the BRAF pathway and NAMPT expression. Responses of different cell line models to NAMPT (i)nhibitors were studied using dose–response proliferation assays. Analysis of NAMPT copy number variation was performed in the TCGA dataset. Lastly, growth and colony forming assays were used to study the tumorigenic functions of NAMPT itself. Results: The first finding of this work is that tumor samples carrying BRAF-mutations over-express NAMPT, as demonstrated by analyzing the TCGA dataset, and MM and THC tissue microarrays. Importantly, BRAF wt MM and THCA cell lines modified to over-express the BRAF V600E construct up-regulated NAMPT, confirming a transcriptional regulation of NAMPT following BRAF oncogenic signaling activation. Treatment of BRAF-mutated cell lines with two different NAMPTi was followed by significant reduction of tumor growth, indicating NAMPT addiction in these cells. Lastly, we found that several tumors over-expressing the enzyme, display NAMPT gene amplification. Over-expression of NAMPT in BRAF wt MM cell line and in fibroblasts resulted in increased growth capacity, arguing in favor of oncogenic properties of NAMPT. Conclusions: Overall, the association between BRAF mutations and NAMPT expression identifies a subset of tumors more sensitive to NAMPT inhibition opening the way for novel combination therapies including NAMPTi with BRAFi/MEKi, to postpone and/or overcome drug resistance. Lastly, the over-expression of NAMPT in several tumors could be a key and broad event in tumorigenesis, substantiated by the finding of NAMPT gene amplification

    Challenges of keyword-based location disclosure

    Full text link
    A practical solution to location privacy should be incremen-tally deployable. We claim it should hence reconcile the eco-nomic value of location to aggregators, usually ignored by prior works, with a user’s control over her information. Loca-tion information indeed is being collected and used by many mobile services to improve revenues, and this gives rise to a heated debate: Privacy advocates ask for stricter regula-tion on information collection, while companies argue that it would jeopardize the thriving economy of the mobile web. We describe a system that gives users control over their information and does not degrade the data given to aggre-gators. Recognizing that the first challenge is to express lo-cations in a way that is meaningful for advertisers and users, we propose a keyword based design. Keywords characterize locations, let the users inform the system about their sen-sitivity to disclosure, and build information directly usable by an advertiser’s targeting campaign. Our work makes two main contributions: we design a market of location infor-mation based on keywords and we analyze its robustness to attacks using data from ad-networks, geo-located services, and cell networks. Categories and Subject Descriptors Security and Privacy [Human and societal aspects of security and privacy]: Usability in security and privac

    Is Privacy Controllable?

    Full text link
    One of the major views of privacy associates privacy with the control over information. This gives rise to the question how controllable privacy actually is. In this paper, we adapt certain formal methods of control theory and investigate the implications of a control theoretic analysis of privacy. We look at how control and feedback mechanisms have been studied in the privacy literature. Relying on the control theoretic framework, we develop a simplistic conceptual control model of privacy, formulate privacy controllability issues and suggest directions for possible research.Comment: The final publication will be available at Springer via http://dx.doi.org/ [in press

    Socio-hydrological spaces in the Jamuna River floodplain in Bangladesh

    Get PDF
    Socio-hydrology aims to understand the dynamics and co-evolution of coupled human–water systems, with research consisting of generic models as well as specific case studies. In this paper, we propose a concept to help bridge the gap between these two types of socio-hydrological studies: socio-hydrological spaces (SHSs). A socio-hydrological space is a geographical area in a landscape. Its particular combination of hydrological and social features gives rise to the emergence of distinct interactions and dynamics (patterns) between society and water. Socio-hydrological research on human–flood interactions has found two generic responses, fight or adapt. Distilling the patterns resulting from these responses in case studies provides a promising way to relate contextual specificities to the generic patterns described by conceptual models. Through the use of SHSs, different cases can be compared globally without aspiring to capturing them in a formal model. We illustrate the use of SHS for the Jamuna floodplain, Bangladesh. We use narratives and experiences of local experts and inhabitants to empirically describe and delimit SHS. We corroborated the resulting classification through the statistical analysis of primary data collected for the purpose (household surveys and focus group discussions) and secondary data (statistics, maps etc.). Our example of the use of SHSs shows that the concept draws attention to how historical patterns in the co-evolution of social behaviour, natural processes and technological interventions give rise to different landscapes, different styles of living and different ways of organising livelihoods. This provides a texture to the more generic patterns generated by socio-hydrological models, promising to make the resulting analysis more directly useful for decision makers. We propose that the usefulness of this concept in other floodplains, and for other socio-hydrological systems than floodplains, should be explored.</p

    Realising the right to data portability for the domestic Internet of Things

    Get PDF
    There is an increasing role for the IT design community to play in regulation of emerging IT. Article 25 of the EU General Data Protection Regulation (GDPR) 2016 puts this on a strict legal basis by establishing the need for information privacy by design and default (PbD) for personal data-driven technologies. Against this backdrop, we examine legal, commercial and technical perspectives around the newly created legal right to data portability (RTDP) in GDPR. We are motivated by a pressing need to address regulatory challenges stemming from the Internet of Things (IoT). We need to find channels to support the protection of these new legal rights for users in practice. In Part I we introduce the internet of things and information PbD in more detail. We briefly consider regulatory challenges posed by the IoT and the nature and practical challenges surrounding the regulatory response of information privacy by design. In Part II, we look in depth at the legal nature of the RTDP, determining what it requires from IT designers in practice but also limitations on the right and how it relates to IoT. In Part III we focus on technical approaches that can support the realisation of the right. We consider the state of the art in data management architectures, tools and platforms that can provide portability, increased transparency and user control over the data flows. In Part IV, we bring our perspectives together to reflect on the technical, legal and business barriers and opportunities that will shape the implementation of the RTDP in practice, and how the relationships may shape emerging IoT innovation and business models. We finish with brief conclusions about the future for the RTDP and PbD in the IoT

    Simple Nudges for Better Password Creation

    Get PDF
    Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudges in creating website-specific passwords: financial incentive (present vs absent), length instruction (long password vs no instruction) and stimulus (picture present vs not present). Mechanical Turk workers were asked to create a password in one of these conditions and the resulting passwords were evaluated based on character length, resistance to automated guessing attacks, and time taken to create the password. We found that users created longer passwords when asked to do so or when given a financial incentive and these longer passwords were harder to guess than passwords created with no instruction. Using a picture nudge to support password creation did not lead to passwords that were either longer or more resistant to attacks but did lead to account-specific passwords

    COVID-19 and the Global Impact on Colorectal Practice and Surgery

    Get PDF
    Background: The novel severe acute respiratory syndrome coronavirus 2 virus that emerged in December 2019 causing coronavirus disease 2019 (COVID-19) has led to the sudden national reorganization of health care systems and changes in the delivery of health care globally. The purpose of our study was to use a survey to assess the global effects of COVID-19 on colorectal practice and surgery. Materials and Methods: A panel of International Society of University Colon and Rectal Surgeons (ISUCRS) selected 22 questions, which were included in the questionnaire. The questionnaire was distributed electronically to ISUCRS fellows and other surgeons included in the ISUCRS database and was advertised on social media sites. The questionnaire remained open from April 16 to 28, 2020. Results: A total of 287 surgeons completed the survey. Of the 287 respondents, 90% were colorectal specialists or general surgeons with an interest in colorectal disease. COVID-19 had affected the practice of 96% of the surgeons, and 52% were now using telemedicine. Also, 66% reported that elective colorectal cancer surgery could proceed but with perioperative precautions. Of the 287 respondents, 19.5% reported that the use of personal protective equipment was the most important perioperative precaution. However, personal protective equipment was only provided by 9.1% of hospitals. In addition, 64% of surgeons were offering minimally invasive surgery. However, 44% reported that enough information was not available regarding the safety of the loss of intra-abdominal carbon dioxide gas during the COVID-19 pandemic. Finally, 61% of the surgeons were prepared to defer elective colorectal cancer surgery, with 29% willing to defer for ≤ 8 weeks. Conclusion: The results from our survey have demonstrated that, globally, COVID-19 has affected the ability of colorectal surgeons to offer care to their patients. We have also discussed suggestions for various practical adaptation strategies for use during the recovery period. We have presented the results of a survey used to assess the global impact of coronavirus disease 2019 (COVID-19) on the delivery of colorectal surgery. Despite accessible guidance information, our results have demonstrated that COVID-19 has significantly affected the ability of colorectal surgeons to offer care to patients. We have also discussed practical adaptation strategies for use during the recovery phase
    • …
    corecore