43 research outputs found

    Stability and change in screen-based sedentary behaviours and associated factors among Norwegian children in the transition between childhood and adolescence

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>In order to inform interventions to prevent sedentariness, more longitudinal studies are needed focusing on stability and change over time in multiple sedentary behaviours. This paper investigates patterns of stability and change in TV/DVD use, computer/electronic game use and total screen time (TST) and factors associated with these patterns among Norwegian children in the transition between childhood and adolescence.</p> <p>Methods</p> <p>The baseline of this longitudinal study took place in September 2007 and included 975 students from 25 control schools of an intervention study, the HEalth In Adolescents (HEIA) study. The first follow-up took place in May 2008 and the second follow-up in May 2009, with 885 students participating at all time points (average age at baseline = 11.2, standard deviation ± 0.3). Time used for/spent on TV/DVD and computer/electronic games was self-reported, and a TST variable (hours/week) was computed. Tracking analyses based on absolute and rank measures, as well as regression analyses to assess factors associated with change in TST and with tracking high TST were conducted.</p> <p>Results</p> <p>Time spent on all sedentary behaviours investigated increased in both genders. Findings based on absolute and rank measures revealed a fair to moderate level of tracking over the 2 year period. High parental education was inversely related to an increase in TST among females. In males, self-efficacy related to barriers to physical activity and living with married or cohabitating parents were inversely related to an increase in TST. Factors associated with tracking high vs. low TST in the multinomial regression analyses were low self-efficacy and being of an ethnic minority background among females, and low self-efficacy, being overweight/obese and not living with married or cohabitating parents among males.</p> <p>Conclusions</p> <p>Use of TV/DVD and computer/electronic games increased with age and tracked over time in this group of 11-13 year old Norwegian children. Interventions targeting these sedentary behaviours should thus be introduced early. The identified modifiable and non-modifiable factors associated with change in TST and tracking of high TST should be taken into consideration when planning such interventions.</p

    Inefficient Toll-Like Receptor-4 Stimulation Enables Bordetella parapertussis to Avoid Host Immunity

    Get PDF
    The recognition of bacterial lipopolysaccharide (LPS) by host Toll-like receptor (TLR)4 is a crucial step in developing protective immunity against several gram negative bacterial pathogens. Bordetella bronchiseptica and B. pertussis stimulate robust TLR4 responses that are required to control the infection, but a close relative, B. parapertussis, poorly stimulates this receptor, and TLR4 deficiency does not affect its course of infection. This led us to hypothesize that inefficient TLR4 stimulation enables B. parapertussis to evade host immunity. In a mouse model of infection, B. parapertussis grew rapidly in the lungs, but no measurable increase in TLR4-mediated cytokine, chemokine, or leukocyte responses were observed over the first few days of infection. Delivery of a TLR4 stimulant in the inoculum resulted in a robust inflammatory response and a 10- to 100-fold reduction of B. parapertussis numbers. As we have previously shown, B. parapertussis grows efficiently during the first week of infection even in animals passively immunized with antibodies. We show that this evasion of antibody-mediated clearance is dependent on the lack of TLR4 stimulation by B. parapertussis as co-inoculation with a TLR4 agonist resulted in 10,000-fold lower B. parapertussis numbers on day 3 in antibody-treated wild type, but not TLR4-deficient, mice. Together, these results indicate that inefficient TLR4 stimulation by B. parapertussis enables it to avoid host immunity and grow to high numbers in the respiratory tract of naïve and immunized hosts

    The dominant Anopheles vectors of human malaria in the Asia-Pacific region: occurrence data, distribution maps and bionomic précis

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The final article in a series of three publications examining the global distribution of 41 dominant vector species (DVS) of malaria is presented here. The first publication examined the DVS from the Americas, with the second covering those species present in Africa, Europe and the Middle East. Here we discuss the 19 DVS of the Asian-Pacific region. This region experiences a high diversity of vector species, many occurring sympatrically, which, combined with the occurrence of a high number of species complexes and suspected species complexes, and behavioural plasticity of many of these major vectors, adds a level of entomological complexity not comparable elsewhere globally. To try and untangle the intricacy of the vectors of this region and to increase the effectiveness of vector control interventions, an understanding of the contemporary distribution of each species, combined with a synthesis of the current knowledge of their behaviour and ecology is needed.</p> <p>Results</p> <p>Expert opinion (EO) range maps, created with the most up-to-date expert knowledge of each DVS distribution, were combined with a contemporary database of occurrence data and a suite of open access, environmental and climatic variables. Using the Boosted Regression Tree (BRT) modelling method, distribution maps of each DVS were produced. The occurrence data were abstracted from the formal, published literature, plus other relevant sources, resulting in the collation of DVS occurrence at 10116 locations across 31 countries, of which 8853 were successfully geo-referenced and 7430 were resolved to spatial areas that could be included in the BRT model. A detailed summary of the information on the bionomics of each species and species complex is also presented.</p> <p>Conclusions</p> <p>This article concludes a project aimed to establish the contemporary global distribution of the DVS of malaria. The three articles produced are intended as a detailed reference for scientists continuing research into the aspects of taxonomy, biology and ecology relevant to species-specific vector control. This research is particularly relevant to help unravel the complicated taxonomic status, ecology and epidemiology of the vectors of the Asia-Pacific region. All the occurrence data, predictive maps and EO-shape files generated during the production of these publications will be made available in the public domain. We hope that this will encourage data sharing to improve future iterations of the distribution maps.</p

    Managing customer expectations: a study of two four-star hotels in Malaysia and Singapore

    No full text
    Successful management of customer expectations is an extremely important factor in achieving customer satisfaction. A hospitable culture and user-friendly technology are required to meet customers' expectations. While technology can have a major impact on customer satisfaction, the various cultural backgrounds of guests also have a significant influence. In the paper, the hotel guests’ cultural backgrounds were studied to understand this aspect's influence on their expectations and satisfaction. Three major cultural factors, namely brand identity (domestic vs. foreign), customers’ native language, and their country of residence, were observed and analyzed to determine guests' expectations. The research study used a qualitative design to analyze the data, collected from field observations at two hotels: a Singapore hotel and another in Malaysia. Reviews were also collected from hotel booking websites, in order to understand how the hotels satisfy guest expectations

    The persuasion and security awareness experiment: reducing the success of social engineering attacks

    No full text
    Objectives:\ud The aim of the current study is to explore to what extent an intervention reduces the effects of social engineering (e.g. the obtaining of access by persuasion) in an office environment. In particular, we study the effect of authority during a `social engineering' attack.\ud \ud Methods:\ud 31 different `offenders' visited the offices of 118 employees and on the basis of a script, asked them to hand over their office keys. Authority, one of the six principles of persuasion, was used by half of the offenders to persuade a target to comply with his/her request. Prior to the visit, an intervention was randomly administered to half of the targets to increase their resilience against attempts by others to obtain their credentials.\ud \ud Results:\ud 37.0% of the employees who were exposed to the intervention surrendered their keys whilst 62.5% of those who were not exposed to it handed it over. The intervention has a significant effect on compliance but the same was not the case for authority.\ud \ud Conclusions:\ud Awareness-raising about the dangers, characteristics and countermeasures associated with social engineering proved to have a significant positive effect on neutralizing the attacker
    corecore