684 research outputs found

    Tonsillectomy: A reappraisal of its role in the prophylaxis of first attacks of rheumatic fever and acute glomerular nephritis

    Get PDF
    A survey was carried out to investigate the role of tonsillectomy in the prevention of  first attacks of rheumatic fever and acute glomerular nephritis. The conclusion is that tonsillectomy carried out after giving due consideration to age, family history and  history of recurrent tonsillitis, may provide an effective method for the prevention of  first attacks of rheumatic fever

    Influencia del Anticiclón del Atlántico Norte en la pluviosidad de la brisa marina en Carolina del Norte, Estados Unidos

    Get PDF
    The sea-breeze (SB) is an important source of summertime precipitation in North Carolina (NC, southeast United States). However, not all SB events produce precipitation. A climatology of wet and dry SB events in NC is used to investigate the conditions that are conducive to precipitation associated with the sea breeze. Radar imagery was used to detect 88 SB events that occurred along the NC coast between May-September of 2009-2012. The majority (85%) of SB events occurred during offshore flow (53%) or during flow that was parallel to the coast (22%). SB events were separated into dry (53%) and wet (47%) events and differences in the dynamic and thermodynamic parameters of the environment in which they formed were analyzed. Significant differences in dynamic and thermodynamic conditions were found. SB dry events occurred under stronger winds (6.00 ± 2.36 ms-1) than SB wet events (4.02 ± 2.16 ms-1). Moreover, during SB wet events larger values of convective available potential energy and lower values of convective inhibition were present, conditions that favor precipitation. Overall, the SB wet events accounted for 20-30% of the May-September precipitation along the NC coastal region. The position of the North Atlantic Subtropical High (NASH) controls both moisture availability and winds along the NC coast, thus providing a synoptic-scale control mechanism for SB precipitation. In particular, it was shown that when the NASH western ridge is located along the southeast coast of the United States, it causes a moist southwesterly flow along the NC coast that may favor the occurrence of SB wet events.La brisa marina (BM) es una importante fuente de precipitación de verano en Carolina del Norte (NC en su sigla en inglés), sudeste de Estados Unidos. Sin embargo, no todos los eventos de BM producen precipitación. En este trabajo se utiliza una climatología de eventos de BM lluviosos y secos en NC para investigar las condiciones que conducen a la precipitación. Se utilizaron imágenes de radar para detectar 88 eventos de BM ocurridos a lo largo de la costa NC entre mayo y septiembre de 2009 a 2012. La mayoría (85%) de los eventos de BM ocurrieron durante períodos de viento hacia el mar (53%) o viento paralelo a la costa (22%). Los eventos BM se separaron en eventos secos (53%) y lluviosos (47%) y se analizaron las diferencias en los parámetros dinámicos y termodinámicos del entorno en el que se formaron. Se encontraron diferencias significativas en las condiciones dinámicas y termodinámicas. Eventos de BM secos ocurrieron bajo vientos más fuertes (6,00 ± 2,36 ms-1) que los eventos de BM lluviosos (4,02 ± 2,16 ms-1). Las BM lluviosas ocurrieron bajo valores de energía potencial convectiva disponible más altos y valores del parámetro de inhibición convectiva más bajos, condiciones que favorecen la lluvia. En general, los eventos de BM lluviosos representaron el 20-30% de la precipitación a lo largo de la región costera de NC de mayo a septiembre. La posición de la Alta Subtropical del Atlántico Norte (ASAN) controla la disponibilidad de humedad y los vientos a lo largo de la costa de NC, proporcionando así un mecanismo de control de escala sinóptica para la precipitación de la BM. En particular, cuando la cresta occidental de la ASAN se localiza a lo largo de la costa sureste de los Estados Unidos, se produce un flujo de sudoeste húmedo a lo largo de la costa NC que puede favorecer la ocurrencia de eventos de BM lluviosos.This project was partially funded by the Climate and Large-Scale Dynamics and the Physical and Dynamic Meteorology programs of the National Science Foundation’s Division of Atmospheric and Geospatial Sciences, Award AGS-1118141

    Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse

    Get PDF
    Privacy is a concept with real life ties and implications. Privacy infringement has the potential to lead to serious consequences for the stakeholders involved, hence researchers and organisations have developed various privacy enhancing techniques and tools. However, there is no solution that fits all, and there are instances where privacy solutions could be misused, for example to hide nefarious activities. Therefore, it is important to provide suitable measures and to make necessary design tradeoffs in order to avoid such misuse. This short paper aims to make a case for the need of careful consideration when designing a privacy solution, such that the design effectively addresses the user requirements while at the same time minimises the risk of inadvertently assisting potential offenders. In other words, this paper strives to promote “sensible privacy” design, which deals with the complex challenges in balancing privacy, usability and accountability. We illustrate this idea through a case study involving the design of privacy solutions for domestic violence survivors. This is the main contribution of the paper. The case study presents specific user requirements and operating conditions, which coupled with the attacker model, provide a complex yet interesting scenario to explore. One example of our solutions is described in detail to demonstrate the feasibility of our approach

    A qualitative study of stakeholders' perspectives on the social network service environment

    Get PDF
    Over two billion people are using the Internet at present, assisted by the mediating activities of software agents which deal with the diversity and complexity of information. There are, however, ethical issues due to the monitoring-and-surveillance, data mining and autonomous nature of software agents. Considering the context, this study aims to comprehend stakeholders' perspectives on the social network service environment in order to identify the main considerations for the design of software agents in social network services in the near future. Twenty-one stakeholders, belonging to three key stakeholder groups, were recruited using a purposive sampling strategy for unstandardised semi-structured e-mail interviews. The interview data were analysed using a qualitative content analysis method. It was possible to identify three main considerations for the design of software agents in social network services, which were classified into the following categories: comprehensive understanding of users' perception of privacy, user type recognition algorithms for software agent development and existing software agents enhancement

    Transepithelial Transport of Fc-Targeted Nanoparticles by the Neonatal Fc Receptor for Oral Delivery

    Get PDF
    Nanoparticles are poised to have a tremendous impact on the treatment of many diseases, but their broad application is limited because currently they can only be administered by parenteral methods. Oral administration of nanoparticles is preferred but remains a challenge because transport across the intestinal epithelium is limited. We show that nanoparticles targeted to the neonatal Fc receptor (FcRn), which mediates the transport of immunoglobulin G antibodies across epithelial barriers, are efficiently transported across the intestinal epithelium using both in vitro and in vivo models. In mice, orally administered FcRn-targeted nanoparticles crossed the intestinal epithelium and reached systemic circulation with a mean absorption efficiency of 13.7%*hour compared with only 1.2%*hour for nontargeted nanoparticles. In addition, targeted nanoparticles containing insulin as a model nanoparticle-based therapy for diabetes were orally administered at a clinically relevant insulin dose of 1.1 U/kg and elicited a prolonged hypoglycemic response in wild-type mice. This effect was abolished in FcRn knockout mice, indicating that the enhanced nanoparticle transport was specifically due to FcRn. FcRn-targeted nanoparticles may have a major impact on the treatment of many diseases by enabling drugs currently limited by low bioavailability to be efficiently delivered though oral administration.Prostate Cancer Foundation (Award in Nanotherapeutics)National Cancer Institute (U.S.) (Center for Cancer Nanotechnology Excellence U54-CA151884)National Heart, Lung, and Blood Institute (Program of Excellence in Nanotechnology Award Contract HHSN268201000045C)National Institutes of Health (U.S.) (Grant EB000244)National Institutes of Health (U.S.) (R01 Grant EB015419-01)American Society for Engineering Education. National Defense Science and Engineering Graduate FellowshipNational Cancer Institute (U.S.) (Center for Cancer Nanotechnology Excellence Graduate Research Fellowship 5 U54 CA151884-02

    Distilling Privacy Requirements for Mobile Applications

    Get PDF
    As mobile computing applications have become commonplace, it is increasingly important for them to address end-users’ privacy requirements. Privacy requirements depend on a number of contextual socio-cultural factors to which mobility adds another level of contextual variation. However, traditional requirements elicitation methods do not sufficiently account for contextual factors and therefore cannot be used effectively to represent and analyse the privacy requirements of mobile end users. On the other hand, methods that do investigate contextual factors tend to produce data that does not lend itself to the process of requirements extraction. To address this problem we have developed a Privacy Requirements Distillation approach that employs a problem analysis framework to extract and refine privacy requirements for mobile applications from raw data gathered through empirical studies involving end users. Our approach introduces privacy facets that capture patterns of privacy concerns which are matched against the raw data. We demonstrate and evaluate our approach using qualitative data from an empirical study of a mobile social networking application

    Electronic data safes as an infrastructure for transformational government? A case study

    Full text link
    This article introduces and explores the potential of an active electronic data safe (AEDS) serving as an infrastructure to achieve transformational government. An AEDS connects individuals and organizations from the private and the public sector to exchange information items related to business processes following the user-managed access paradigm. To realize the transformational government’s vision of user-centricity, fundamental changes in the service provision and collaboration of public and private sector organizations are needed. Findings of a user study with a prototype of an AEDS are used to identify four barriers for the adoption of an AEDS in the light of transformational government: (1.) offering citizens unfamiliar services having the character of experience-goods; (2.) failing to fulfill common service expectations of the customers; (3.) failing to establish contextual integrity for data sharing, and, (4.) failing to establish and run an AEDS as a multi-sided platform providing an attractive business model

    Evaluating 'Prefer not to say' Around Sensitive Disclosures

    Get PDF
    As people's offline and online lives become increasingly entwined, the sensitivity of personal information disclosed online is increasing. Disclosures often occur through structured disclosure fields (e.g., drop-down lists). Prior research suggests these fields may limit privacy, with non-disclosing users being presumed to be hiding undesirable information. We investigated this around HIV status disclosure in online dating apps used by men who have sex with men. Our online study asked participants (N=183) to rate profiles where HIV status was either disclosed or undisclosed. We tested three designs for displaying undisclosed fields. Visibility of undisclosed fields had a significant effect on the way profiles were rated, and other profile information (e.g., ethnicity) could affect inferences that develop around undisclosed information. Our research highlights complexities around designing for non-disclosure and questions the voluntary nature of these fields. Further work is outlined to ensure disclosure control is appropriately implemented around online sensitive information disclosures

    Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles

    Full text link
    Online dating is an increasingly thriving business which boasts billion-dollar revenues and attracts users in the tens of millions. Notwithstanding its popularity, online dating is not impervious to worrisome trust and privacy concerns raised by the disclosure of potentially sensitive data as well as the exposure to self-reported (and thus potentially misrepresented) information. Nonetheless, little research has, thus far, focused on how to enhance privacy and trustworthiness. In this paper, we report on a series of semi-structured interviews involving 20 participants, and show that users are significantly concerned with the veracity of online dating profiles. To address some of these concerns, we present the user-centered design of an interface, called Certifeye, which aims to bootstrap trust in online dating profiles using existing social network data. Certifeye verifies that the information users report on their online dating profile (e.g., age, relationship status, and/or photos) matches that displayed on their own Facebook profile. Finally, we present the results of a 161-user Mechanical Turk study assessing whether our veracity-enhancing interface successfully reduced concerns in online dating users and find a statistically significant trust increase.Comment: In Proceedings of Financial Cryptography and Data Security (FC) Workshop on Usable Security (USEC), 201
    corecore