689 research outputs found

    Monitoring regulation of DNA repair activities of cultured cells in-gel using the comet assay

    Get PDF
    Base excision repair (BER) is the predominant cellular mechanism by which human cells repair DNA base damage, sites of base loss and DNA single strand breaks of various complexity, that are generated in their thousands in every human cell per day as a consequence of cellular metabolism and exogenous agents, including ionising radiation. Over the last three decades the comet assay has been employed in scientific research to examine the cellular response to these types of DNA damage in cultured cells, therefore revealing the efficiency and capacity of BER. We have recently pioneered new research demonstrating an important role for post-translational modifications (particularly ubiquitylation) in the regulation of cellular levels of BER proteins, and that subtle changes (~20-50 %) in protein levels following siRNA knockdown of E3 ubiquitin ligases or deubiquitylation enzymes can manifest in significant changes in DNA repair capacity monitored using the comet assay. For example, we have shown that the E3 ubiquitin ligase Mule, the tumour suppressor protein ARF and the deubiquitylation enzyme USP47 modulate DNA repair by controlling cellular levels of DNA polymerase β, and also that polynucleotide kinase phosphatase levels are controlled by ATM-dependant phosphorylation and Cul4A-DDB1-STRAP-dependent ubiquitylation. In these studies we employed a modification of the comet assay whereby cultured cells, following DNA damage treatment, are embedded in agarose and allowed to repair in-gel prior to lysis and electrophoresis. Whilst this method does have its limitations, it avoids the extensive cell culture-based processing associated with the traditional approach using attached cells and also allows for the examination of much more precise DNA repair kinetics. In this review we will describe, using this modified comet assay, our accumulating evidence that ubiquitylation-dependant regulation of BER proteins has important consequences for overall cellular DNA repair capacity

    Significance of Semantic Reconciliation in Digital Forensics

    Get PDF
    Digital forensics (DF) is a growing field that is gaining popularity among many computer professionals, law enforcement agencies and other stakeholders who must always cooperate in this profession. Unfortunately, this has created an environment replete with semantic disparities within the domain that needs to be resolved and/or eliminated. For the purpose of this study, semantic disparity refers to disagreements about the meaning, interpretation, descriptions and the intended use of the same or related data and terminologies. If semantic disparity is not detected and resolved, it may lead to misunderstandings. Even worse, since the people involved may not be from the same neighbourhood, they may not be aware of the existence of the semantic disparities, and probably might not easily realize it. The aim of this paper, therefore, is to discuss semantic disparity in DF and further elaborates on how to manage it. In addition, this paper also presents the significance of semantic reconciliation in DF. Semantic reconciliation refers to reconciling the meaning (including the interpretations and descriptions) of terminologies and data used in digital forensics. Managing semantic disparities and the significance of semantic reconciliation in digital forensics constitutes the main contributions of this paper. Keywords: Digital forensics, semantic disparity, managing semantic disparity, semantic reconciliation, significance of semantic reconciliatio

    The Changing Role of the State in Development

    Get PDF

    Leaders and Recruiters from the Next Generation: A Phenomenological Study

    Get PDF
    Studies involving student ambassadors have demonstrated their significance in recruiting prospective students to universities and colleges but they have not included the perceptions of the student ambassadors themselves. The purpose of this phenomenological study was to describe the perceptions and experiences of students who served as student ambassadors for their educational institution. Fifteen student ambassadors provided individual descriptions of their perceptions of being an ambassador. Four themes provided a description of ambassadors’ perceptions: (a) belonging, (b) personal growth, (c) diversity, and (d) recruitment. A discussion of the benefits of student ambassadors as leaders are presented in terms of their ability to recruit for the university and college as well as the impact being a leader has on the ambassadors themselves

    Social foundations of the mathematics curriculum: a rationale for change

    Get PDF
    The nature of educational aims as criteria for worthwhile curriculum\ud practice is explored and a cross-section of aims for mathematics education\ud is discussed. An aim for mathematics education which emphasises\ud the social aspect of the subject in its being, its conduct and its\ud applications is identified and epistemological foundations for such a\ud view of the nature of the subject are explored. It is argued that such\ud an epistemological perspective of mathematics would be reflected in the\ud social context of the mathematics classroom, arising from a methodology\ud in which the subject would become more problematic and open to change,\ud investigation and hypothesis.\ud The aims of two major mathematics curriculum development projects\ud (the Nuffield Mathematics Project and the School Mathematics Project)\ud are examined to determine the extent to which their aims may take the\ud 'social' nature of mathematics into account. The probable social\ud context of mathematics classrooms using their materials is postulated in\ud an attempt to characterise the nature of the subject as it is reflected\ud in these materials. A view of the nature of mathematics held by\ud practising teachers and by pupils is then established by drawing upon,\ud and extrapolating from, evidence relating to the social context of\ud mathematics classrooms at primary and secondary level.\ud Conclusions follow, which suggest that fundamental change in mathematics\ud education requires, as a first step, the adoption of a new epistemological\ud perspective of the subject in order that the pursuit of the\ud aim which emphasises the social nature of mathematics is achieved. It\ud is suggested that this, in turn, ultimately could lead to the desired\ud balance in the mathematics curriculum which hitherto has been lacking

    Real-time monitoring as a supplementary security component of vigilantism in modern network environments

    Get PDF
    © 2020, The Author(s). The phenomenon of network vigilantism is autonomously attributed to how anomalies and obscure activities from adversaries can be tracked in real-time. Needless to say, in today’s dynamic, virtualized, and complex network environments, it has become undeniably necessary for network administrators, analysts as well as engineers to practice network vigilantism, on traffic as well as other network events in real-time. The reason is to understand the exact security posture of an organization’s network environment at any given time. This is driven by the fact that modern network environments do, not only present new opportunities to organizations but also a different set of new and complex cybersecurity challenges that need to be resolved daily. The growing size, scope, complexity, and volume of networked devices in our modern network environments also makes it hard even for the most experienced network administrators to independently provide the breadth and depth of knowledge needed to oversee or diagnose complex network problems. Besides, with the growing number of Cyber Security Threats (CSTs) in the world today, many organisations have been forced to change the way they plan, develop and implement cybersecurity strategies as a way to reinforce their ability to respond to cybersecurity incidents. This paper, therefore, examines the relevance of Real-Time Monitoring (RTM) as a supplementary security component of vigilantism in modern network environments, more especially for proper planning, preparedness, and mitigation in case of a cybersecurity incident. Additionally, this paper also investigates some of the key issues and challenges surrounding the implementation of RTM for security vigilantism in our modern network environments

    Curated Collections for Educators: Five Key Papers on Clinical Teaching

    Get PDF
    The ability to teach in the clinical setting is of paramount importance. Clinical teaching is at the heart of medical education, irrespective of the learner’s level of training. Learners desire and need effective, competent, and thoughtful clinical teaching from their instructors. However, many clinician-educators lack formal training on this important skill and thus may provide a variable experience to their learners. Although formal training of clinician-educators is standard and required in many other countries, the United States has yet to follow suit, leaving many faculty members to fend for themselves to learn these important skills. In September 2018, the Academic Life in Emergency Medicine (ALiEM) 2018-2019 Faculty Incubator program discussed the topic of clinical teaching techniques. We gathered the titles of papers that were cited, shared, and recommended within our online discussion forum and compiled the articles pertaining to the topic of clinical teaching techniques. To augment the list, the authors did a formal literature search using the search terms “teaching techniques", "clinical teaching", "medical education", "medical students", and "residents” on Google Scholar and PubMed. Finally, we posted a call for important papers on the topic of clinical teaching techniques on Twitter. Through this process, we identified 48 core articles on the topic of clinical teaching. We conducted a modified Delphi methodology to identify the key papers on the topic. In this paper, we present the five highest-rated articles based on the relevance to junior faculty and faculty developers. This article will review and summarize the articles we found to be the most impactful to improve one’s clinical teaching skills

    Adding Digital Forensic Readiness as a Security Component to the IoT Domain

    Get PDF
    The unique identities of remote sensing, monitoring, self-actuating, self–adapting and self-configuring “things” in Internet of Things (IoT) has come out as fundamental building blocks for the development of “smart environments”. This experience has begun to be felt across different IoT-based domains like healthcare, surveillance, energy systems, home appliances, industrial machines, smart grids and smart cities. These developments have, however, brought about a more complex and heterogeneous environment which is slowly becoming a home to cyber attackers. Digital Forensic Readiness (DFR) though can be employed as a mechanism for maximizing the potential use of digital evidence while minimizing the cost of conducting a digital forensic investigation process in IoT environments in case of an incidence. The problem addressed in this paper, therefore, is that at the time of writing this paper, there still exist no IoT architectures that have a DFR capability that is able to attain incident preparedness across IoT environments as a mechanism of preparing for post-event response process. It is on this premise, that the authors are proposing an architecture for incorporating DFR to IoT domain for proper planning and preparing in the case of security incidents. It is paramount to note that the DFR mechanism in IoT discussed in this paper complies with ISO/IEC 27043: 2015, 27030:2012 and 27017: 2015 international standards. It is the authors’ opinion that the architecture is holistic and very significant in IoT forensics

    Labour supply and skills demands in fashion retailing

    Get PDF
    If, as Adam Smith once famously suggested, Britain was a nation of shopkeepers then it is now a nation of shopworkers. Retail is now a significant part of the UK economy, accounting for ÂŁ256 billion in sales and one-third of all consumer spending (Skillsmart, 2007). It is the largest private sector employer in the UK, employing 3m workers, or 1 in 10 of the working population. For future job creation in the UK economy retail is also similarly prominent and the sector is expected to create a further 250,000 jobs to 2014 (Skillsmart, 2007). The centrality of retail to economic success and job creation is apparent in other advanced economies. For example, within the US, retail sales is the occupation with the largest projected job growth in the period 2004-2014 (Gatta et al., 2009) and in Australia retail accounts for 1 in 6 workers (Buchanan et al., 2003). Within the UK these workers are employed in approximately 290,000 businesses, encompassing large and small organizations and also a number of sub-sectors. This variance suggests that retail should not be regarded as homogenous in its labour demands. Hart et al. (2007) note how skill requirements and the types of workers employed may differ across the sector. This chapter further opens up this point, providing an analysis of the labour supply and skills demands for the sub-sectors of clothing, footwear and leather goods, which are described by Skillsmart (2007: 48) as being 'significant categories in UK retailing'

    The Politics of Service Delivery Reform

    Get PDF
    This article identifies the leaders, the supporters and the resisters of public service reform. It adopts a principal–agent framework, comparing reality with an ‘ideal’ situation in which citizens are the principals over political policy-makers as their agents, and policy-makers are the principals over public service officials as their agents. Reform in most developing countries is complicated by an additional set of external actors — international financial institutions and donors. In practice, international agencies and core government officials usually act as the ‘principals’ in the determination of reforms. The analysis identifies the interests involved in reform, indicating how the balance between them is affected by institutional and sectoral factors. Organizational reforms, particularly in the social sectors, present greater difficulties than first generation economic policy reforms
    • …
    corecore