946 research outputs found

    Background information about Avian Infl uenza and hints for ornithologists

    Get PDF
    Wildvögel, v.a. WassergeflĂŒgel, sind Reservoir fĂŒr alle Influenzaviren. Von wirtschaftlicher Bedeutung sind die Subtypen H5 und H7, wĂ€hrend H1, H2 und H3 Erreger der Humangrippe sind. Diese niedrig pathogenen Vogelgrippeviren verursachen normalerweise bei infi zierten Vögeln keine klinischen Symptome. Nach Transfer niedrig pathogener Vogelgrippeviren in GeflĂŒgelhaltungen mit den daraus resultierenden, rasch aufeinander folgenden Virenzyklen durch rasche Vogelpassagen und sofortige Neuinfektion kann sich ein solches niedrig pathogenes Virus jedoch in ein hoch pathogenes Vogelgrippevirus (HPAI-Virus) umwandeln. Diese hoch pathogenen Viren können dann sowohl wieder ĂŒber Wildvögel, als auch ĂŒber Transport kontaminierter Vögel, Gefl ĂŒgelprodukte und Materialien sowie ĂŒber Wasser weiterverbreitet werden. Der aktuelle, große Ausbruch der Gefl ĂŒgelgrippe geht auf den HPAI-Virus H5N1 zurĂŒck, der vermutlich in den spĂ€ten 1990er Jahren in Hausenten in SĂŒdchina entstanden ist. Im Jahr 2005 begann diese Krankheit, sich von SĂŒdostasien aus westwĂ€rts zu verbreiten und trat damit als direkte Bedrohung fĂŒr europĂ€ische GeflĂŒgelbestĂ€nde in Erscheinung. Außerdem wurden einige wenige menschliche FĂ€lle einer HPAI H5N1-Erkrankung aus SĂŒdostasien gemeldet. Alle diese menschlichen Erkrankungen standen mit sehr engen Kontakten zu oder Verspeisen von infizierten Tieren (vor allem HĂŒhner, Enten und Schweine) in Verbindung und eine mögliche Mensch-zu-Mensch-Übertragung wird noch kontrovers diskutiert. Obwohl die Vogelgrippe nach wie vor eine GeflĂŒgelkrankheit ist, besteht die Möglichkeit, dass sich das Virus in seiner genetischen Struktur – z.B. durch Vermischung mit einem Humangrippevirus – so verĂ€ndern kann, dass es leicht zwischen Menschen ĂŒbertragen werden kann und bei diesen auf ein weitgehend unvorbereitetes Immunsystem trifft. Obwohl sich die Wahrscheinlichkeit einer solchen VerĂ€nderung nicht abschĂ€tzen lĂ€sst, liefern drei Pandemien im 20 Jahrhundert, die alle auf mutierte Vogelgrippeviren zurĂŒckzufĂŒhren sind, genug Anlass zur sorgfĂ€ltigen Beobachtung der momentanen Lage.Waterfowl are known to be the major reservoir for all 16 H- and 9 N- Subtypes of low pathogenic avian infl uenza viruses (LPAIV), including the subtypes H5 and H7 being a serious economic threat to the poultry industry as well as H1, H2, H3 that are the main source for human infl uenza. LPAI neither cause any signs of disease in the infected wild birds nor in poultry. However, low pathogenic avian infl uenza virus of the subtypes H5 and H7 can be introduced into poultry holdings. Especially in industrial holdings with large numbers of highly susceptible animals, the previously stable viruses of low pathogenicity begin to evolve rapidly and may mutate into highly pathogenic avian infl uenza (HPAI) (known as fowl plague and also called „bird flu“) causing up to 100% mortatlity in infected birds. Aft erwards, infections of HPAI are usually spread by movement of stock, infectious feces, contaminated water or bird products. Free fl ying birds are usually also blamed to spread the disease, but this could be never proven to have happened. Since 1959 none of the outbreaks of HPAI has approached the size of the ongoing epizootic in Southeast Asia, which most probably originated in the late 1990 ies presumbly in captured ducks in Southern China and is caused by a new HPAI virus of the subtype H5N1. In 2005 the disease started to spread westwards and appears to be a threat for European poultry. Th e asian H5N1 cause serious public health concern for at least three reasons. Th ese AIV isolates can cause heavy economic losses in the poultry industry and through loss of poultry may exaggerate to human food protein defi cits in the developing world. In addition, they have the potential to cross the species barriers and cause human disease and death though only when connected to very close contacts with infected animals or raw consumption of infected birds (chicken, ducks). Last but not least there is the potential of the virus to change it‘s genetic structure – most probably by mixing with a human infl uenza virus (H1, H2, H3) that may achieve human-to-human spread by meeting the unprepared immune system of men resulting in a new human pandemia. Th ree pandemias during the 20 th century – all originating from HPAI viruses- emphasise the danger of the probability of H5N1 becoming the next pandemia virus

    The CAMP-binding Ectoprotein from Saccharomyces cereuisiae Is Membrane-anchored by Glycosyl-Phosphatidylinositol

    Get PDF
    Saccharomyces cerevisiae contains an amphiphilic CAMP-binding glycoprotein at the outer face of the plasma membrane (M, = 54,000). It is converted to a hydrophilic form byt reatment withg lycosyl-phosphatidylinositol- specific phospholipases C and D (GPIPLC/ D), suggesting membrane anchorage by a covalently bound glycolipid. Determination of the constituents of the purified anchor by gas-liquid chromatography and amino acid analysis reveals the presence of glycerol, myo-inositol, glucosamine, galactose, mannose, ethanolamine, and asparagine (as the carboxylterminal amino acido f the Pronase-digested proteitno which the anchor is attached). Complementary results are obtained by metabolic labeling, indicating that fatty acids and phosphorus are additional anchor constituents. The phosphoruiss resistant to alkalinep hosphatase, whereas approximately half is lost from the protein after treatment with GPI-PLD or nitroaucisd , and all is removed by aqueous HF indicating the presence of two phosphodiester bonds. Inhibition of Nglycosylation by tunicamycin or removal of proteinbound glycan chains by N-glycanase or Pronase does not abolish radiolabeling of the anchor structure by any of the above compounds. Analysis of the products obtained after sequential enzymic and chemical degradation of the anchor agrees with the arrangemoefn t constitutents in GPIs from higher eucaryotes. Evidence for anchorage of the yeast CAMP-binding protein by a GPI anchoris strengthened additionallyb y the reactivity of the GPI-PLC-cleaved anchor with antibodies directed against the cross-reacting determinoaf nttr ypanosomal variant surface glycoproteins

    A novel type of meso-diaminopimelic acid-based peptidoglycan and novel poly(erythritol phosphate) teichoic acids in cell walls of two coryneform isolates from the surface flora of French cooked cheeses

    Get PDF
    The primary structure of the peptidoglycan and the teichoic acids of two coryneform isolates from the surface flora of French cooked cheeses, CNRZ 925 and CNRZ 926, have been determined. In the peptidoglycan, meso-diaminopimelic acid was localized in position three of the peptide subunit. It contained an D-glutamyl-D-aspartyl interpeptide bridge, connecting meso-diaminopimelic acid and D-alanine residues of adjacent peptide subunits. The Alpha-carboxyl group of D-glutamic acid in position two of peptide subunits was substituted with glycine amide. The teichoic acid pattern and composition differed between the strains: both contained an erythritol teichoic acid and strain CNRZ 925 also contained an N-acetylglucosaminylphosphate polymer. The erythritol teichoic acids differed in terms of the quality and quantity of substituents, but they both had N,N'-diacetyl-2,3-diamino-2,3-dideoxyglucuronic acid in common

    How Do They Differ? Analyzing the Motivations of Posters and Lurkers for Participation in Enterprise Social Networks

    Get PDF
    Organizations have increasingly begun to implement enterprise social networks (ESNs) due to their potential to afford enterprise-wide collaboration, knowledge sharing, and interaction. Despite their proliferation, many companies still struggle to motivate a sufficient number of employees to actively participate in these collaborative networks. Consequently, many ESNs fail due to a lack of contributions. While most employees only read and consume content (lurking), few actively create content (posting). Little research has examined the differences between posters and lurkers and their underlying motivations, particularly in the ESN context. Building on social exchange theory (SET), we identify and test a set of motivational factors that researchers have scarcely studied in corporate social networks: reputation, common identity, common bond, social interaction, and community commitment. By investigating a rich data set of 4,892 respondents in a large knowledge-intensive multinational company, we provide evidence that posters and lurkers significantly differ in why they participate in ESNs. Further, we introduce a nuanced classification of participant roles to distinguish five user groups (super frequent posters, frequent posters, infrequent posters, frequent lurkers, and infrequent lurkers) with super frequent posters showing significantly higher mean values for all motivational factors to use an ESN compared to the other user groups. Our findings yield important theoretical and practical implications regarding different usage behaviors and on how to enhance participation in ESNs

    What Do I Do in a World of Artificial Intelligence? Investigating the Impact of Substitutive Decision-Making AI Systems on Employees’ Professional Role Identity

    Get PDF
    Artificial intelligence (AI) systems in the workplace increasingly substitute for employees’ tasks, responsibilities, and decision-making. Consequently, employees must relinquish core activities of their work processes without the ability to interact with the AI system (e.g., to influence decision-making processes or adapt or overrule decision-making outcomes). To deepen our understanding of how substitutive decision-making AI systems affect employees’ professional role identity and how employees adapt their identity in response to the system, we conducted an in-depth case study of a company in the area of loan consulting. We qualitatively analyzed more than 60 interviews with employees and managers. Our research contributes to the literature on IS and identity by disclosing mechanisms through which employees strengthen and protect their professional role identity despite being unable to directly interact with the AI system. Further, we highlight the boundary conditions for introducing an AI system and contribute to the body of empirical research on the potential downsides of AI

    Algorithmic Technologies as Threat to Who We Are: The Effect an IT Identity Threat has on Employees\u27 Work Engagement

    Get PDF
    Organizations’ introduction of algorithmic technologies fundamentally affects employees’ work processes, tasks, and responsibilities in organizations. Employees often find their professional identities threatened by the introduction of IT (a phenomenon labeled as IT Identity Threat). While prior studies have examined which mechanisms employees use to deal with such a perceived threat, it remains unclear how an IT Identity Threat affects employees’ work attitude in response to advanced IT such as algorithmic technologies. Employees’ work attitude is a recognized antecedent to workers’ well-being or performance. Based on a mixed-method study in the banking industry, our study reveals that an IT Identity Threat negatively affects employees’ work engagement. Further, our study uncovers how this effect comes about by showing that an IT Identity Threat decreases employees’ perceived autonomy and experienced responsibility for their work outcomes. Overall, both factors contribute to a negative relationship between an IT Identity Threat and employees’ work engagement

    A Social Network Approach to Blogs: Improving Digital Collaborative Learning

    Get PDF
    Blogs as digital collaboration tools are promising resources in higher education to impart knowledge, enhance collaboration and social interaction among students and thus, to increase their success. Despite the widespread use of blogs, little is known about blogs’ impact on students’ social networks and its effect on learning success. Therefore, based on a social network perspective, we empirically assess the change in the social network of 51 blog users. We are among the first to investigate the influence of the social network’s characteristics on students\u27 subjectively perceived performance and access to knowledge within a blog-learning environment. We find evidence that blogs significantly increase the students\u27 social networks, but are primarily a medium for reinforcing what the student has learned rather than influencing performance related outcomes. Our results yield important practical and theoretical recommendations on how blogs can be used to enhance students’ social networks and in turn increase their success

    Increasing user engagement on blockchain applications through persuasive design

    Get PDF
    Blockchain gives rise to many new applications and use cases and has already markedly changed several industries, such as financial services, energy and utilities, or healthcare. Although blockchain could potentially be used disruptively for end-user applications as well, utilizing it remains poor. It appears that the unconvincing design of many end-user blockchain applications leads to insufficient user engagement. To investigate the influence of design aspects on users’ engagement of blockchain end-user applications, we developed a blockchain application for the creative industries based on the principles of persuasive design. Hereby, we aim to contribute to research in the blockchain context on how end-user applications need to be designed to increase user engagement. By using a design science research process, we can ultimately provide a total of seven recommendations for developing persuasive blockchain applications for end-users

    Advancing Digital Collaboration: Barriers to Enterprise Social Media Adoption and how to Overcome them

    Get PDF
    Advancing digital collaboration and fostering effective communication among a widespread workforce continues to be a perpetual challenge for companies. Organizations are progressively turning to Enterprise Social Media (ESM) because they promise new avenues for collaborative working. However, most ESMs fail to reach a wider adoption by the workforce, owing to an underutilization by the employees. To enhance the understanding of the underutilization phenomenon, we use affordance actualization theory as our theoretical lens to critically study the challenges employees face in their attempt to actualize respective ESM affordances. By analyzing comments from 992 frequent, infrequent, and discontinued ESM users from a large multinational company, we uncover four major challenges. By enhancing our understanding of ESM affordances and by incorporating the full spectrum from problem identification to solution, we provide practical advice for digital leaders and meaningful theoretical implications for the IS community
    • 

    corecore