114 research outputs found

    Improving the Information Security Model by using TFI

    Get PDF
    In the context of information systems and information technology, information security is a concept that is becoming widely used. The European Network of Excellence INTEROP classifies information security as a nonfunctional aspect of interoperability and as such it is an integral part of the design process for interoperable systems. In the last decade, academics and practitioners have shown their interest in information security, for example by developing security models for evaluating products and setting up security specifications in order to safeguard the confidentiality, integrity, availability and accountability of data. Earlier research has shown that measures to achieve information security in the administrative or organisational level are missing or inadequate. Therefore, there is a need to improve information security models by including vital elements of information security. In this paper, we introduce a holistic view of information security based on a Swedish model combined with a literature survey. Furthermore we suggest extending this model using concepts based on semiotic theory and adopting the view of an information system as constituted of the technical, formal and informal (TFI) parts. The aim is to increase the understanding of the information security domain in order to develop a well-founded theoretical framework, which can be used both in the analysis and the design phase of interoperable systems. Finally, we describe and apply the Information Security (InfoSec) model to the results of three different case studies in the healthcare domain. Limits of the model will be highlighted and an extension will be proposed.In the context of information systems and information technology, information security is a concept that is becoming widely used. The European Network of Excellence INTEROP classifies information security as a nonfunctional aspect of interoperability and as such it is an integral part of the design process for interoperable systems. In the last decade, academics and practitioners have shown their interest in information security, for example by developing security models for evaluating products and setting up security specifications in order to safeguard the confidentiality, integrity, availability and accountability of data. Earlier research has shown that measures to achieve information security in the administrative or organisational level are missing or inadequate. Therefore, there is a need to improve information security models by including vital elements of information security. In this paper, we introduce a holistic view of information security based on a Swedish model combined with a literature survey. Furthermore we suggest extending this model using concepts based on semiotic theory and adopting the view of an information system as constituted of the technical, formal and informal (TFI) parts. The aim is to increase the understanding of the information security domain in order to develop a well-founded theoretical framework, which can be used both in the analysis and the design phase of interoperable systems. Finally, we describe and apply the Information Security (InfoSec) model to the results of three different case studies in the healthcare domain. Limits of the model will be highlighted and an extension will be proposed.Monograph's chapter

    The use of complementary and alternative medicine products in preceding two days among Finnish parents - a population survey

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The use of complementary and alternative medicines (CAM) has been extensively studied globally among adult and paediatric populations. Parents, as a group, had not been studied to assess their knowledge and attitude to CAM and general medicine use. This study is necessary since parents' attitude to medicine use is known to influence their child's attitude to medicine use later in life. We therefore aim to assess the extent and types of CAM use among Finnish parents, and to determine the factors that promote the CAM use. Also, we aim to determine parents' attitude to general medicine use.</p> <p>Methods</p> <p>Children less than 12 years old, as of spring 2007, were identified from the database of the Finnish Population Register Centre and were selected by random sampling. The parents of these children were identified and a questionnaire was sent to them. Only the parent who regularly takes care of the child's medicine was requested to fill the questionnaire. Cross-tabulations and Chi-square test were used to determine the associations between categorical variables. CAMs were defined as natural products that are not registered as medicines, such as homeopathic preparations, dietary food supplements, and traditional medicinal products.</p> <p>Results</p> <p>The response rate of the survey was 67% (n = 4032). The use of CAM was 31% in the preceding two days. The most commonly used CAM products were vitamins and minerals, followed by fish oils and fatty acids. Prescription and OTC medicines were used concomitantly with CAM by one-third of the parents. CAM was frequently used by parents over 30 years (33%), female parents (32%), highly educated parents (35%), and parents with high monthly net income (3000-3999 euros, 34%). The users of CAM had more negative attitudes towards medicines than non-users of CAM.</p> <p>Conclusions</p> <p>Our findings are in accordance with those of previous studies that women over 30 years of age with a high education and income typically use CAMs. Finnish parents seem to use CAMs as complementary rather than alternative to medicines. Health care professionals should take into consideration both the concomitant use as well as the negative attitudes among CAM users in encounters with the parents.</p

    Effectiveness of photodynamic therapy for mammary and extra-mammary Paget's disease: a state of the science review

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Paget's disease is a rare skin disorder occurring in the breast (mammary) or in the groin, genital, peri-anal and axillary regions (extra-mammary). Typical treatment involves surgical excision, which in the case of extra-mammary Paget's disease, can lead to significant morbidity. Photodynamic therapy (PDT) which uses a topical or intravenous photosensitizing agent that is activated by a light source to ablate abnormal tissue, offers a minimally invasive alternative. The purpose of this study was to assess the effectiveness of photodynamic therapy in the treatment of Paget's disease.</p> <p>Methods</p> <p>Following Cochrane guidelines, a comprehensive systematic review of all clinical studies and reports examining the use of PDT for mammary and extra-mammary Paget's disease was conducted. Study quality was assessed using the Oxford Levels of Evidence Scale.</p> <p>Results</p> <p>21 retrospective and 2 prospective non-comparative studies were identified and included in the review: 9 case reports with 1-2 patients and 14 case series with 1-16 patients. These reports totalled 99 patients with 133 extra-mammary Paget's lesions and 3 patients (with 3 lesions) with mammary Paget's disease. Follow-up periods were typically one year or less, with 77/133 extra-mammary lesions exhibiting complete response to PDT. One recurrent mammary skin lesion and two mammary lesions treated concomitantly with surgery also exhibited complete responses.</p> <p>Conclusions</p> <p>Evidence of the effectiveness of PDT for Paget's disease is promising, but limited. This may, in part, be explained by the rarity of the condition, making controlled comparative clinical trials challenging.</p

    Comparative Structural Analysis of Lipid Binding START Domains

    Get PDF
    Steroidogenic acute regulatory (StAR) protein related lipid transfer (START) domains are small globular modules that form a cavity where lipids and lipid hormones bind. These domains can transport ligands to facilitate lipid exchange between biological membranes, and they have been postulated to modulate the activity of other domains of the protein in response to ligand binding. More than a dozen human genes encode START domains, and several of them are implicated in a disease.We report crystal structures of the human STARD1, STARD5, STARD13 and STARD14 lipid transfer domains. These represent four of the six functional classes of START domains.Sequence alignments based on these and previously reported crystal structures define the structural determinants of human START domains, both those related to structural framework and those involved in ligand specificity.This article can also be viewed as an enhanced version in which the text of the article is integrated with interactive 3D representations and animated transitions. Please note that a web plugin is required to access this enhanced functionality. Instructions for the installation and use of the web plugin are available in Text S1

    Deterrence in Cyberspace: An Interdisciplinary Review of the Empirical Literature

    Get PDF
    The popularity of the deterrence perspective across multiple scientific disciplines has sparked a lively debate regarding its relevance in influencing both offenders and targets in cyberspace. Unfortunately, due to the invisible borders between academic disciplines, most of the published literature on deterrence in cyberspace is confined within unique scientific disciplines. This chapter therefore provides an interdisciplinary review of the issue of deterrence in cyberspace. It begins with a short overview of the deterrence perspective, presenting the ongoing debates concerning the relevance of deterrence pillars in influencing cybercriminals’ and cyberattackers’ operations in cyberspace. It then reviews the existing scientific evidence assessing various aspects of deterrence in the context of several disciplines: criminology, law, information systems, and political science. This chapter ends with a few policy implications and proposed directions for future interdisciplinary academic research

    New insights into the genetic etiology of Alzheimer's disease and related dementias

    Get PDF
    Characterization of the genetic landscape of Alzheimer's disease (AD) and related dementias (ADD) provides a unique opportunity for a better understanding of the associated pathophysiological processes. We performed a two-stage genome-wide association study totaling 111,326 clinically diagnosed/'proxy' AD cases and 677,663 controls. We found 75 risk loci, of which 42 were new at the time of analysis. Pathway enrichment analyses confirmed the involvement of amyloid/tau pathways and highlighted microglia implication. Gene prioritization in the new loci identified 31 genes that were suggestive of new genetically associated processes, including the tumor necrosis factor alpha pathway through the linear ubiquitin chain assembly complex. We also built a new genetic risk score associated with the risk of future AD/dementia or progression from mild cognitive impairment to AD/dementia. The improvement in prediction led to a 1.6- to 1.9-fold increase in AD risk from the lowest to the highest decile, in addition to effects of age and the APOE Δ4 allele

    Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation

    No full text
    Part 9: Usable SecurityInternational audienceExisting research shows that the Information Systems Security policies’ (ISSPs) inability to reflect current practice is a perennial problem resulting in users’ non-compliant behaviors. While the existing compliance approaches are beneficial in many ways, they do not consider the complexity of Information Systems Security (ISS) management and practice where different actors adhere to different and sometimes conflicting values. The unsolved value conflicts often lead to unworkable ISS processes and users’ resistance. To address this shortcoming, this paper suggests a value conflicts analysis as a starting point for implementing work-friendly ISSPs. We show that the design and implementation of a work-friendly ISSP should involve the negotiation for different values held by the different actors within an organization

    A justification for software rights

    No full text
    • 

    corecore