33 research outputs found

    Duty, desire or indifference? A qualitative study of patient decisions about recruitment to an epilepsy treatment trial

    Get PDF
    BACKGROUND: Epilepsy is a common neurological condition, in which drugs are the mainstay of treatment and drugs trials are commonplace. Understanding why patients might or might not opt to participate in epilepsy drug trials is therefore of some importance, particularly at a time of rapid drug development and testing; and the findings may also have wider applicability. This study examined the role of patient perceptions in the decision-making process about recruitment to an RCT (the SANAD Trial) that compared different antiepileptic drug treatments for the management of new-onset seizures and epilepsy. METHODS: In-depth interviews with 23 patients recruited from four study centres. All interviews were tape-recorded and transcribed; the transcripts were analysed thematically using a qualitative data analysis package. RESULTS: Of the nineteen informants who agreed to participate in SANAD, none agreed for purely altruistic reasons. The four informants who declined all did so for very specific reasons of self-interest. Informants' perceptions of the nature of the trial, of the drugs subject to trial, and of their own involvement were all highly influential in their decision-making. Informants either perceived the trial as potentially beneficial or unlikely to be harmful, and so agreed to participate; or as potentially harmful or unlikely to be beneficial and so declined to participate. CONCLUSION: Most patients applied 'weak altruism', while maintaining self-interest. An emphasis on the safety and equivalence of treatments allowed some patients to be indifferent to the question of involvement. There was evidence that some participants were subject to 'therapeutic misconceptions'. The findings highlight the individual nature of trials but nonetheless raise some generic issues in relation to their design and conduct

    Violations of betweenness and choice shifts in groups

    Get PDF
    In decision theory, the betweenness axiom postulates that a decision maker who chooses an alternative A over another alternative B must also choose any probability mixture of A and B over B itself and can never choose a probability mixture of A and B over A itself. The betweenness axiom is a weaker version of the independence axiom of expected utility theory. Numerous empirical studies documented systematic violations of the betweenness axiom in revealed individual choice under uncertainty. This paper shows that these systematic violations can be linked to another behavioral regularity\u2014choice shifts in a group decision making. Choice shifts are observed if an individual faces the same decision problem but makes a different choice when deciding alone and in a group

    Measurements of differential cross-sections in top-quark pair events with a high transverse momentum top quark and limits on beyond the Standard Model contributions to top-quark pair production with the ATLAS detector at √s = 13 TeV

    Get PDF
    Cross-section measurements of top-quark pair production where the hadronically decaying top quark has transverse momentum greater than 355 GeV and the other top quark decays into â„“Îœb are presented using 139 fb−1 of data collected by the ATLAS experiment during proton-proton collisions at the LHC. The fiducial cross-section at s = 13 TeV is measured to be σ = 1.267 ± 0.005 ± 0.053 pb, where the uncertainties reflect the limited number of data events and the systematic uncertainties, giving a total uncertainty of 4.2%. The cross-section is measured differentially as a function of variables characterising the ttÂŻ system and additional radiation in the events. The results are compared with various Monte Carlo generators, including comparisons where the generators are reweighted to match a parton-level calculation at next-to-next-to-leading order. The reweighting improves the agreement between data and theory. The measured distribution of the top-quark transverse momentum is used to search for new physics in the context of the effective field theory framework. No significant deviation from the Standard Model is observed and limits are set on the Wilson coefficients of the dimension-six operators OtG and Otq(8), where the limits on the latter are the most stringent to date. [Figure not available: see fulltext.]

    Direct constraint on the Higgs–charm coupling from a search for Higgs boson decays into charm quarks with the ATLAS detector

    Get PDF
    A search for the Higgs boson decaying into a pair of charm quarks is presented. The analysis uses proton–proton collisions to target the production of a Higgs boson in association with a leptonically decaying W or Z boson. The dataset delivered by the LHC at a centre-of-mass energy of and recorded by the ATLAS detector corresponds to an integrated luminosity of 139 fb−1. Flavour-tagging algorithms are used to identify jets originating from the hadronisation of charm quarks. The analysis method is validated with the simultaneous measurement of WW, WZ and ZZ production, with observed (expected) significances of 2.6 (2.2) standard deviations above the background-only prediction for the (W/Z)Z(→ccÂŻ) process and 3.8 (4.6) standard deviations for the (W/Z)W(→cq) process. The (W/Z)H(→ccÂŻ) search yields an observed (expected) upper limit of 26 (31) times the predicted Standard Model cross-section times branching fraction for a Higgs boson with a mass of , corresponding to an observed (expected) constraint on the charm Yukawa coupling modifier |Îșc|<8.5 (12.4), at the 95% confidence level. A combination with the ATLAS (W/Z)H,H→bbÂŻ analysis is performed, allowing the ratio Îșc/Îșb to be constrained to less than 4.5 at the 95% confidence level, smaller than the ratio of the b- and c-quark masses, and therefore determines the Higgs-charm coupling to be weaker than the Higgs-bottom coupling at the 95% confidence level

    BotDet: A System for Real Time Botnet Command and Control Traffic Detection

    Get PDF
    Over the past decade, the digitization of services transformed the healthcare sector leading to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled with high value of patient records attracted the attention of hackers. Sophisticated advanced persistent threats and malware have significantly contributed to increasing risks to the health sector. Many recent attacks are attributed to the spread of malicious software, e.g., ransomware or bot malware. Machines infected with bot malware can be used as tools for remote attack or even cryptomining. This paper presents a novel approach, called BotDet, for botnet Command and Control (C&C) traffic detection to defend against malware attacks in critical ultrastructure systems. There are two stages in the development of the proposed sytsem: (i) we have developed four detection modules to detect different possible techniques used in botnet C&C communications; (ii) we have designed a correlation framework to reduce the rate of false alarms raised by individual detection modules. Evaluation results show that BotDet balances the true positive rate and the false positive rate with 82.3% and 13.6% respectively. Furthermore, it proves BotDet capability of real time detection

    Security Threats to Critical Infrastructure: The Human Factor

    Get PDF
    In the 21st century, globalisation made corporate boundaries invisible and difficult to manage. This new macroeconomic transformation caused by globalisation introduced new challenges for critical infrastructure management. By replacing manual tasks with automated decision making and sophisticated technology, no doubt we feel much more secure than half a century ago. As the technological advancement takes root, so does the maturity of security threats. It is common that today’s critical infrastructures are operated by non-computer experts, e.g., nurses in healthcare, soldiers in military or firefighters in emergency services. In such challenging applications, protecting against insider attacks is often neither feasible nor economically possible, but these threats can be managed using suitable risk management strategies. Security technologies, e.g., firewalls, help protect data assets and computer systems against unauthorised entry. However, one area which is often largely ignored is the human factor of system security. Through social engineering techniques, malicious attackers are able to breach organisational security via people interactions. This paper presents a security awareness training framework, which can be used to train operators of critical infrastructure, on various social engineering security threats such as spear phishing, baiting, pretexting, amongst others
    corecore