25 research outputs found

    Burnout: exploring the differences between U.S. and international medical graduates.

    Get PDF
    Background: International medical graduates (IMGs) have less burnout than U. S. medical school graduates (USMGs) during residency training. This study evaluates possible correlates of differences in burnout rates between USMGs and IMGs. Methods: We surveyed 375 first-year residents at orientation in June/July 2017. We assessed burnout using the Copenhagen Burnout Inventory (CBI) and used validated scales to measure stress, quality of life (QoL), mastery, and spirituality. We collected data on gender, place of graduation, language fluency, and specialty. We compared CBI scores between USMGs and IMGs, performed a multivariate linear regression analysis of relationships between covariates and CBI subscales, and logistic regression analysis for our categorical definition of burnout. Results: Two hundred twenty-two residents responded for a response rate of 59%. Personal, work or patient- related burnout was common among residents, particularly among USMGs. The most common form of burnout was work-related. Forty nine percent of USMGs have work burnout compared to 26% of IMGs (p \u3c 0.01). In multivariate analysis, being an IMG reduced odds of work-related and of total burnout by 50% (OR 0.5 C.I 0.25-0.99). Perceived mastery was associated with reductions in all subscales of burnout (p \u3c 0.05). Stress and low QoL related to personal and work burnout scores (p \u3c 0.01). Conclusion: Work-related burnout is more common among USMGs than in IMGs. Although mastery, QoL and stress were correlates of burnout among all residents, these factors did not explain the difference. Future studies should evaluate the role of medical school structure and curriculum on differences in burnout rates between the two groups

    Isolated virtualised clusters: testbeds for high-risk security experimentation and training

    Get PDF
    International audienceAdequate testbeds for conducting security experiments and test under controlled, safe, repeatable and asrealistic- as-possible conditions, are a key element for the research and development of adequate security solutions and the training of security personnel and researchers. In this paper, we report on the construction and operations of isolated virtualised testbeds used in two separate security research labs in Canada and France, as part of a joint collaborative effort. The main idea was to use mid- to large-scale isolated computing clusters to obtain high levels of scale, manageability and safety by heavily leveraging virtualisation technology, open-source cluster management tools and a network architecture separating experiment and control traffic. Both facilities have been used for conducting different types of security research experiments, including in-lab reconstructions of botnets, denial-of-service attacks, and virus detection experimentation. They have also been used for teaching and training students in experimental security methods. We describe these facilities and the criteria that we used to design them, the research and training activities that were conducted, and close by discussing the lessons learned and the pros and cons of this approach

    The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet

    Get PDF
    International audienceBotnets constitute a serious security problem. A lot of effort has been invested towards understanding them better, while developing and learning how to deploy effective counter-measures against them. Their study via various analysis, modelling and experimental methods are integral parts of the development cycle of any such botnet mitigation schemes. It also constitutes a vital part of the process of understanding present threats and predicting future ones. Currently, the most popular of these techniques are “in-the-wild” botnet studies, where researchers interact directly with real-world botnets. This approach is less than ideal, for many reasons that we discuss in this paper, including scientific validity, ethical and legal issues. Consequently, we present an alternative approach employing “in the lab” experiments involving at-scale emulated botnets. We discuss the advantages of such an approach over reverse engineering, analytical modelling, simulation and in-the-wild studies. Moreover, we discuss the requirements that facilities supporting them must have. We then describe an experiment in which we emulated a close to 3000-node, fully-featured version of the Waledac botnet, complete with a reproduced command and control (C&C) infrastructure. By observing the load characteristics and yield (rate of spamming) of such a botnet, we can draw interesting conclusions about its real-world operations and design decisions made by its creators. Furthermore, we conducted experiments where we launched sybil attacks against the botnet. We were able to verify that such an attack is, in the case of Waledac, viable. However, we were able to determine that mounting such an attack is not so simple: high resource consumption can cause havoc and partially neutralise the attack. Finally, we were able to repeat the attack with varying parameters, in an attempt to optimise it. The merits of this experimental approach is underlined by the fact that it is very difficult to obtain these results by employing other methods
    corecore