1,258 research outputs found

    Perceptions of Retirement Savings Relative to Peers

    Get PDF
    Do individuals’ perceptions of how much others save for retirement influence their own long-range financial saving decisions? In this study, social comparison theory was used as a theoretical touchstone for understanding the impact of interpersonal perceptions on saving behavior. Respondents (N = 224) reported not only the amount they had saved for retirement during the previous year, but they also reported perceptions of the magnitude of their savings relative to peers and completed 6 psychological scales related to retirement planning. A 2-stage ordinary least squares (OLS) regression approach was used to examine: (a) the extent to which nine demographic indicators were predictive of individuals’ retirement savings practices, and (b) whether unexplained savings from the initial regression model could be hierarchically predicted using the 6 psychological scales and perceptions of one’s savings relative to peers. The findings suggest that social comparisons do account for savings practices over and above demographic and psychological indicators. Results are discussed in terms of how individuals’ implicit social comparisons might shape not only their perceptions, but also their saving behavior

    Viral Takeover of the Host Ubiquitin System

    Get PDF
    Like the other more well-characterized post-translational modifications (phosphorylation, methylation, acetylation, acylation, etc.), the attachment of the 76 amino acid ubiquitin (Ub) protein to substrates has been shown to govern countless cellular processes. As obligate intracellular parasites, viruses have evolved the capability to commandeer many host processes in order to maximize their own survival, whether it be to increase viral production or to ensure the long-term survival of latently infected host cells. The first evidence that viruses could usurp the Ub system came from the DNA tumor viruses and Adenoviruses, each of which use Ub to dysregulate the host cell cycle (Scheffner et al., 1990; Querido et al., 2001). Today, the list of viruses that utilize Ub includes members from almost every viral class, encompassing both RNA and DNA viruses. Among these, there are examples of Ub usage at every stage of the viral life cycle, involving both ubiquitination and de-ubiquitination. In addition to viruses that merely modify the host Ub system, many of the large DNA viruses encode their own Ub modifying machinery. In this review, we highlight the latest discoveries regarding the myriad ways that viruses utilize Ub to their advantage

    The Great Escape: Viral Strategies to Counter BST-2/Tetherin

    Get PDF
    The interferon-induced BST-2 protein has the unique ability to restrict the egress of HIV-1, Kaposi's sarcoma–associated herpesvirus (KSHV), Ebola virus, and other enveloped viruses. The observation that virions remain attached to the surface of BST-2-expressing cells led to the renaming of BST-2 as “tetherin”. However, viral proteins such as HIV-1 Vpu, simian immunodeficiency virus Nef, and KSHV K5 counteract BST-2, thereby allowing mature virions to readily escape from infected cells. Since the anti-viral function of BST-2 was discovered, there has been an explosion of research into several aspects of this intriguing interplay between host and virus. This review focuses on recent work addressing the molecular mechanisms involved in BST-2 restriction of viral egress and the species-specific countermeasures employed by various viruses

    Randomized controlled trials: who fails run-in?

    Get PDF
    Background: Early identification of participants at risk of run-in failure (RIF) may present opportunities to improve trial efficiency and generalizability. Methods: We conducted a partial factorial-design, randomized, controlled trial of calcium and vitamin D to prevent colorectal adenoma recurrence at 11 centers in the United States. At baseline, participants completed two self-administered questionnaires (SAQs) and a questionnaire administered by staff. Participants in the full factorial randomization (calcium, vitamin D, both, or neither) received a placebo during a 3-month single-blinded run-in; women electing to take calcium enrolled in a two-group randomization (calcium with vitamin D, or calcium alone) and received calcium during the run-in. Using logistic regression models, we examined baseline factors associated with RIF in three subgroups: men (N = 1606) and women (N = 301) in the full factorial randomization and women in the two-group randomization (N = 666). Results: Overall, 314/2573 (12 %) participants failed run-in; 211 (67 %) took fewer than 80 % of their tablets (poor adherence), and 103 (33 %) withdrew or were uncooperative. In multivariable models, 8- to 13-fold variation was seen by study center in odds of RIF risk in the two largest groups. In men, RIF decreased with age (adjusted odds ratio [OR] per 5 years 0.85 [95 % confidence interval, CI; 0.76-0.96]) and was associated with being single (OR 1.65 [95 % CI; 1.10-2.47]), not graduating from high school (OR 2.77 [95 % CI; 1.58-4.85]), and missing SAQ data (OR 1.97 [1.40-2.76]). Among women, RIF was associated primarily with health-related factors; RIF risk was lower with higher physical health score (OR 0.73 [95 % CI; 0.62-0.86]) and baseline multivitamin use (OR 0.44 [95 % CI; 0.26-0.75]). Women in the 5-year colonoscopy surveillance interval were at greater risk of RIF than those with 3-year follow-up (OR 1.91 [95 % CI; 1.08-3. 37]), and the number of prescription medicines taken was also positively correlated with RIF (p = 0.03). Perceived toxicities during run-in were associated with 12- to 29-fold significantly increased odds of RIF. Conclusions: There were few common baseline predictors of run-in failure in the three randomization groups. However, heterogeneity in run-in failure associated with study center, and missing SAQ data reflect potential opportunities for intervention to improve trial efficiency and retention

    P for Politics D for Dialogue: Reflections on Participatory Design with Children and Animals

    Get PDF
    Participatory Design strives to open up the decision-making process and empower all those who may be affected by design. This is opposed to Design as a non-participatory process, in which the power to make decisions is vested in the hands of one group to the possible detriment of others. In this paper we interrogate the nature, possibilities and limitations of Participatory Design through the perspective of Child Computer Interaction (CCI) and Animal Computer Interaction (ACI). Due to the cognitive and communication characteristics, and to the social and legal status of their participants, researchers in these communities have to contend with and challenge existing notions of participation and design. Thus, their theories and practices provide a lens through which the nature and goals of Participatory Design can be examined with a view to facilitating the development of more inclusive participatory models and practices

    “You think you’re going to get better”:a creative-relational inquiry into Long Covid and physical activity

    Get PDF
    This creative-relational inquiry explores the lived experience of people suffering from Long Covid. Responding to calls for a publicly oriented qualitative inquiry, we collaborate across an extended project team to develop and share an accessible and engaging performance text which advocates for and supports those who live precariously as a result of contracting Long Covid. We offer our performance text as a resource to inform and guide personal, professional, public, and policy responses to Long Covid. We propose that creative-relational inquiries such as this beneficially extend understanding beyond what is possible through traditional evidence-based medicine alone

    Modeling cellular deformations using the level set formalism

    Get PDF
    BACKGROUND: Many cellular processes involve substantial shape changes. Traditional simulations of these cell shape changes require that grids and boundaries be moved as the cell's shape evolves. Here we demonstrate that accurate cell shape changes can be recreated using level set methods (LSM), in which the cellular shape is defined implicitly, thereby eschewing the need for updating boundaries. RESULTS: We obtain a viscoelastic model of Dictyostelium cells using micropipette aspiration and show how this viscoelastic model can be incorporated into LSM simulations to recreate the observed protrusion of cells into the micropipette faithfully. We also demonstrate the use of our techniques by simulating the cell shape changes elicited by the chemotactic response to an external chemoattractant gradient. CONCLUSION: Our results provide a simple but effective means of incorporating cellular deformations into mathematical simulations of cell signaling. Such methods will be useful for simulating important cellular events such as chemotaxis and cytokinesis

    The Chandra Source Catalog

    Get PDF
    The Chandra Source Catalog (CSC) is a general purpose virtual X-ray astrophysics facility that provides access to a carefully selected set of generally useful quantities for individual X-ray sources, and is designed to satisfy the needs of a broad-based group of scientists, including those who may be less familiar with astronomical data analysis in the X-ray regime. The first release of the CSC includes information about 94,676 distinct X-ray sources detected in a subset of public ACIS imaging observations from roughly the first eight years of the Chandra mission. This release of the catalog includes point and compact sources with observed spatial extents <~ 30''. The catalog (1) provides access to the best estimates of the X-ray source properties for detected sources, with good scientific fidelity, and directly supports scientific analysis using the individual source data; (2) facilitates analysis of a wide range of statistical properties for classes of X-ray sources; and (3) provides efficient access to calibrated observational data and ancillary data products for individual X-ray sources, so that users can perform detailed further analysis using existing tools. The catalog includes real X-ray sources detected with flux estimates that are at least 3 times their estimated 1 sigma uncertainties in at least one energy band, while maintaining the number of spurious sources at a level of <~ 1 false source per field for a 100 ks observation. For each detected source, the CSC provides commonly tabulated quantities, including source position, extent, multi-band fluxes, hardness ratios, and variability statistics, derived from the observations in which the source is detected. In addition to these traditional catalog elements, for each X-ray source the CSC includes an extensive set of file-based data products that can be manipulated interactively.Comment: To appear in The Astrophysical Journal Supplement Series, 53 pages, 27 figure
    corecore