2,708 research outputs found

    TOAST PASTRY STUDIO: Bakery Brand and Pastry Packaging Concept

    Get PDF
    TOAST PASTRY STUDIO is a fictitious bakery branding concept made to host an innovative pastry packaging system. The aim of the conceptualized package is to offer additional functionality to bakery consumers by implementing a perforated knife unit directly into the box. The overall idea of the project stems from a long-term appreciation toward bakery culture/aesthetic as well as clever packaging design

    Molecular biology of amitraz resistance in cattle ticks of the genus Rhipicephalus

    Get PDF
    Amitraz is an important product for the control of cattle ticks around the world. In comparison with other products for the control of ticks, it is quite affordable and it has a rapid knock-down effect. It binds with and activates adrenergic neuro-receptors of animals and it inhibits the action of monoamine oxidases (MAO). Resistance to amitraz has been documented in Rhipicephalus microplus, R. decoloratus and R. appendiculatus. Four mechanisms of resistance have been proposed, each of which is supported by evidence but none of which has been definitively confirmed as the cause of resistance in the field. The proposed mechanisms include genetic target site insensitivity in two G protein-coupled receptors, the beta-adrenergic octopamine receptor (BAOR) and the octopamine/tyramine receptor (OCT/Tyr), increased expression or activity of monoamine oxidases and increased expression or activity of the ATP binding cassette transporter

    Users’ privacy perceptions in interorganizational information sharing

    Get PDF
    Existing privacy theories shed light on the mechanisms at work when users decide to share information with an organization – yet do not sufficiently encompass the common practice of sharing user information across organizations. This research study introduces the concept of Interorganizational Information Sharing (IIS) and theorizes on boundary uncertainty and boundary control to develop a model of privacy perceptions in IIS. To empirically validate this model, we collect data through an online survey in the context of smart fitness devices. Our research aims at advancing and articulating the concept of IIS, conceptualizing privacy perceptions based on that understanding, and subsequently relating those perceptions to behavioral intentions to protect privacy in IIS. We thereby contribute to IS privacy literature, considering the complexity of information sharing relationships in a granular manner

    Comparative sub-cellular proteome analyses reveals metabolic differentiation and production of effector-like molecules in the dieback phytopathogen Phytophthora cinnamomi.

    Get PDF
    Phytopathogenic oomycetes pose a significant threat to global biodiversity and food security. The proteomes of these oomycetes likely contain important factors that contribute to their pathogenic success, making their discovery crucial for elucidating pathogenicity. Phytophthora cinnamomi is a root pathogen that causes dieback in a wide variety of crops and native vegetation world-wide. Virulence proteins produced by P. cinnamomi are not well defined and a large-scale approach to understand the biochemistry of this pathogen has not been documented. Soluble mycelial, zoospore and secreted proteomes were obtained and label-free quantitative proteomics was used to compare the composition of the three sub-proteomes. A total of 4635 proteins were identified, validating 17.7% of the predicted gene set. The mycelia were abundant in transporters for nutrient acquisition, metabolism and cellular proliferation. The zoospores had less metabolic related ontologies but were abundant in energy generating, motility and signalling associated proteins. Virulence-associated proteins were identified in the secretome such as candidate effector and effector-like proteins, which interfere with the host immune system. These include hydrolases, cell wall degrading enzymes, putative necrosis-inducing proteins and elicitins. The secretome elicited a hypersensitive response on the roots of a model host and thus suggests evidence of effector activity

    Perceived privacy violations through information sharing with external parties – Diving into user perceptions and reactions

    Get PDF
    We see more and more incidents where user information collected by digital services is shared with external parties. Users becoming aware of such information (mis-)uses may perceive a privacy violation. In this study, we want to understand when, why, and how the sharing of information with external parties is perceived as a privacy violation and what consequences such a perception entails. Employing the Critical Incident Technique (CIT) as a methodology, we inductively derive characteristics of real-world incidents of perceived privacy violations due to the sharing of information with external parties and users’ perceptions and reactions thereto. We present preliminary results of our first qualitative data analysis as well subsequent steps to advance this research in progress

    Unraveling User Perceptions of Interorganizational Information Sharing

    Get PDF
    Collecting large amounts of user information is becoming an increasingly important source of value for businesses. Such data sets may be expanded through engaging in value co-creation with other organizations. Sharing user information across organizations, however, might evoke users’ privacy concerns. Existing mechanisms and concepts developed in prior information privacy research on sharing information between one user and one organization may no longer apply as multiple organizations become involved. This creates the necessity to understand more granularly how users perceive privacy situations that involve sharing their information across organizations – and how their concerns may be alleviated through control mechanisms. Employing the lens of Communication Privacy Management (CPM) theory, we conceptualize this phenomenon as Interorganizational Information Sharing (IIS) and theorize on perceived uncertainty and control to unravel user perceptions in IIS. We present our ideas for a research model, as well as our planned methodology for empirical validation

    A glimpse into the genomic outlook of the long-tailed macaque (Macaca fascicularis)

    Get PDF
    The long-tailed macaque (Macaca fascicularis) is commonly used for biomedical researches. However, genetic variation within a population or among populations can significantly affect phenotypical outcomes of treatments tested on model organisms. As such, it is important for studies involving model organisms originating from different, or even the same geographical locations to have sufficient genomic and transcriptomic background of the model organisms that is used. This paper summarises the utilisation of next-generation sequencing (NGS) technology to sequence genomes and transcriptomes of long-tailed macaques from various geographical populations in general and the Malaysian long-tailed macaque in particular, and its importance in the context of population genetic studies

    Perceived privacy violations through unauthorized secondary use - diving into user's perceptions and responses

    Get PDF
    We see more and more incidents where users’ information collected by digital services is shared with external parties. Users becoming aware of such information (mis-)uses may perceive a privacy violation. In this study, we want to understand when, why, and how such external unauthorized secondary use (EUSU) is perceived as a privacy violation and what consequences such a perception entails. Employing the Critical Incident Technique (CIT), we inductively derive characteristics of real-world incidents of perceived privacy violations through EUSU and users’ perceptions and responses thereto. We present preliminary results of our qualitative data analysis as well as potential contributions of this research-in-progress study. As a next step, we plan to relate characteristics with responses through Qualitative Comparative Analysis (QCA)
    corecore