9 research outputs found

    Community-Based Participatory Obesity Prevention Interventions in Rural Communities: A Scoping Review

    Get PDF
    Child obesity is a worldwide public health concern. In America, children from rural areas have greater odds of obesity in comparison to those from urban areas. Community-engaged research is important for all communities, particularly under-represented communities. This paper reports the results of a scoping review investigating community-engaged research in obesity prevention programs tested with school-aged children in rural America. A literature search of Medline Ovid was conducted to identify interventions reporting the results of obesity prevention interventions that promoted a healthy diet or physical activity (PA) behaviors to school-age children in rural communities of the United States (US). After title and abstract review, potentially relevant citations were further examined by assessing the full text. Each stage of review was conducted by two independent reviewers. Twelve studies met the inclusionary criteria and are included in this review. Most of the studies focused on elementary school participants (n = 7) and improving both diet and PA (n = 9). Out of the twelve studies, only five included the target audience in intervention development or implementation. The most popular type of community engagement was community participation (n = 4). This review revealed that community-engaged research is under-utilized in obesity prevention interventions tested with school-aged children in rural US communities

    Reversible control of protein corona formation on gold nanoparticles using host-guest interactions

    Get PDF
    When nanoparticles (NPs) are exposed to biological media, proteins are adsorbed, forming a so-called protein corona (PC). This cloud of protein aggregates hampers the targeting and transport capabilities of the NPs, thereby compromising their biomedical applications. Therefore, there is a high interest in the development of technologies that allow control over PC formation, as this would provide a handle to manipulate NPs in biological fluids. We present a strategy that enables the reversible disruption of the PC using external stimuli, thereby allowing a precise regulation of NP cellular uptake. The approach, demonstrated for gold nanoparticles (AuNPs), is based on a biorthogonal, supramolecular host-guest interactions between an anionic dye bound to the AuNP surface and a positively charged macromolecular cage. This supramolecular complex effectively behaves as a zwitterionic NP ligand, which is able not only to prevent PC formation but also to disrupt a previously formed hard corona. With this supramolecular stimulus, the cellular internalization of AuNPs can be enhanced by up to 30-fold in some cases, and even NP cellular uptake in phagocytic cells can be regulated. Additionally, we demonstrate that the conditional cell uptake of purposely designed gold nanorods can be used to selectively enhance photothermal cell death

    On the security of consumer wearable devices in the Internet of Things

    Get PDF
    Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands

    The security of the speech interface: a modelling framework and proposals for new defence mechanisms

    No full text
    This paper presents an attack and defence modelling framework for conceptualising the security of the speech interface. The modelling framework is based on the Observe-Orient-Decide-Act (OODA) loop model, which has been used to analyse adversarial interactions in a number of other areas. We map the different types of attacks that may be executed via the speech interface to the modelling framework, and present a critical analysis of the currently available defences for countering such attacks, with reference to the modelling framework. The paper then presents proposals for the development of new defence mechanisms that are grounded in the critical analysis of current defences. These proposals envisage a defence capability that would enable voice-controlled systems to detect potential attacks as part of their dialogue management functionality. In accordance with this high-level defence concept, the paper presents two specific proposals for defence mechanisms to be implemented as part of dialogue management functionality to counter attacks that exploit unintended functionality in speech recognition functionality and natural language understanding functionality. These defence mechanisms are based on the novel application of two existing technologies for security purposes. The specific proposals include the results of two feasibility tests that investigate the effectiveness of the proposed mechanisms in defending against the relevant type of attack

    The Use of Online Crime Markets by Cybercriminal Networks: A View From Within

    No full text
    In this article, we study the various functions of online cybercriminal meeting places from a unique perspective: We do not take the criminal meeting place as a starting point, but the users—the criminal networks. This allows not only for a view of what is happening on online meeting places, but it also places online meeting places into perspective. Our data consisted of detailed case descriptions of 40 cybercriminal networks active in the Netherlands (18), Germany (3), the United Kingdom (9), and the United States (10). Reconstructions were made based on analysis of police files and/or interviews with case officers and public prosecutors. Online meeting places play a role in the majority of our cases: to meet co-offenders, to buy tools, or to sell data. However, from a crime script perspective, the role of forums is much more modest. Forums, for example, can be used to find suitable co-offenders, but in the majority of our cases the core members did not meet at forums. Offline meeting places still play a..
    corecore