1,442 research outputs found

    The Effect of Stress on Undergraduate College Students in Relation to Eating Out Behaviors and Weight Status

    Get PDF
    Abstract Objective: The aims of the current descriptive study were to determine if greater levels of perceived stress in college students relates to the frequency in which this population participates in eating out or ordering food for delivery and how this potential association influences weight status. Methods: Secondary analysis was conducted using an existing data set obtained from the Young Adults Eating and Active for Health study. Demographic questions, The Cohen 14-item Perceived Stress Scale, anthropometrics, the NCI Fruit and Vegetable Screener, and the Food Delivery Questionnaire were used to measure the main variables under examination. Non-parametric statistics, Chi-square T-tests, and ANOVA were used to analyze data. Data was analyzed using SPSS software and tested for a P value \u3c 0.05 as statistically significant. Participants: The participants consisted of 973 students from 13 college campuses across the U.S. who had participated in the 15-month YEAH study. Of the sample population, 287 participants were male and 685 were female. Results: Female college students were shown to exhibit greater levels of perceived stress than males (23.96±7.75 versus 21.74±7.54; t (932) = -4.02, p =0.00). Male participants demonstrated more frequent ordering of food delivery behavior than females (U = 76213.0, p = 0.005) but no association was found between levels of stress compared to eating out frequency, the rate of food delivered to a participant’s residence, or to BMI status. Females showed an association for using websites such as campusfood.com more frequently when very high levels of stress were experienced (χ2 (12) = 22.2, p = 0.035). Conclusion: The study did not present conclusive results but trends suggest at high levels of stress certain health related consumption behaviors may be influenced in a negative manner. The study provides a foundation for future research on stress and its potential influence on unhealthy eating out behaviors within the collegiate population

    Remediation of Pulp and Paper Mill Biosolids using Vermiculture

    Get PDF
    Historical wastewater treatment systems at a New Zealand pulp and paper mill, resulted in a biosolid mass in the K-basin at Kinleith mill. Products extracted during the pulping process include resin acids, which are further transformed in the K-basin by microbial activity into recalcitrant end products retene and fichtelite. These products are toxic to fish due to bioaccumulation and subsequent endocrine disruption. Traditional methods for diverting these toxins from waterways were deposition into landfills and incineration, neither of which are considered environmentally sound. The aim of this study was to investigate the viability of vermicomposting as a method for bioremediation of recalcitrant resin acid derivatives from biosolids. Vermicomposting is a cost-effective option for not only reducing toxicity but also reducing biomass. It was hypothesised that earthworms can degrade organic extractives, principally resin acids and derivatives, through microbial, enzymatic, and oxidative mechanisms. A series of vermicomposting experiments were set up, to test the ability of Eisenia fetida (the tiger worm) to reduce both the amount of resin acids and overall biomass in a range of substrates. These included the original biosolid collected from K-basin, a simulated biosolid containing potting mix with and without additional extractive resins, as well as sterilised and unsterilised controls. Five samples were taken from each experimental composter over 28 days and extracted into dichloromethane after removal of excess water followed by mechanical blending. Samples were concentrated and the amount of each extractive group was determined using gas chromatography mass spectroscopy. The overall biomass in each composter as well as the depurated earthworm mass was measured at the start and cessation of the experiment. A slight reduction in biomass was observed in two out of the three substrates. This reduction was slightly enhanced by the presence of earthworms in the composter, however, it was not significant. The use of methyl bromide to sterilise the substrate was also not a significant factor in biomass reduction. The overall weight of the earthworms decreased in all cases indicating the unsuitability of any of the substrates as a desirable food source. The addition of supplements such as yeast or manure to the biosolid composter may increase its appeal. There was a significant reduction in extractive content in all substrates over the 28 day period however no significant difference attributable to the presence or absence of worms was observed. It was hypothesised that the rigorous sampling process encouraged oxidative breakdown of the extractives due to increased exposure to both air and light. This was evident when the extractive content of K-basin measured in 1993 was compared to the samples used in this study collected in 2006. Whilst vermicomposting does not appear to be an effective treatment for removing resin acids from biosolid mass, the sampling processes used in this study highlighted the effect that rigorous stirring and increased exposure to air and light can have on the natural breakdown of these products. An effective treatment for the removal of resin acids from K-basin may be as simple as regular ploughing

    Successful Fusion Of Information Systems Concepts With Complementary Technical Skill

    Get PDF
    This paper addresses the integration of technical skills with information systems concepts required in an introductory MIS course, specifically focusing on the laptop inclusion initiative at our university.  We will show the working relationship between the concepts and application segment of MIS, and how a laptop inclusion program combined with the use of e-Learning methodologies successfully combine the two

    A Selective Emotional Decision-Making Bias Elicited by Facial Expressions

    Get PDF
    Emotional and social information can sway otherwise rational decisions. For example, when participants decide between two faces that are probabilistically rewarded, they make biased choices that favor smiling relative to angry faces. This bias may arise because facial expressions evoke positive and negative emotional responses, which in turn may motivate social approach and avoidance. We tested a wide range of pictures that evoke emotions or convey social information, including animals, words, foods, a variety of scenes, and faces differing in trustworthiness or attractiveness, but we found only facial expressions biased decisions. Our results extend brain imaging and pharmacological findings, which suggest that a brain mechanism supporting social interaction may be involved. Facial expressions appear to exert special influence over this social interaction mechanism, one capable of biasing otherwise rational choices. These results illustrate that only specific types of emotional experiences can best sway our choices

    Cybersecurity: mapping the ethical terrain

    Get PDF
    This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others. Foreword Governments and society are increasingly reliant on cyber systems. Yet the more reliant we are upon cyber systems, the more vulnerable we are to serious harm should these systems be attacked or used in an attack. This problem of reliance and vulnerability is driving a concern with securing cyberspace. For example, a ‘cybersecurity’ team now forms part of the US Secret Service. Its job is to respond to cyber-attacks in specific environments such as elevators in a building that hosts politically vulnerable individuals, for example, state representatives. Cybersecurity aims to protect cyberinfrastructure from cyber-attacks; the concerning aspect of the threat from cyber-attack is the potential for serious harm that damage to cyber-infrastructure presents to resources and people. These types of threats to cybersecurity might simply target information and communication systems: a distributed denial of service (DDoS) attack on a government website does not harm a website in any direct way, but prevents its normal use by stifling the ability of users to connect to the site. Alternatively, cyber-attacks might disrupt physical devices or resources, such as the Stuxnet virus, which caused the malfunction and destruction of Iranian nuclear centrifuges. Cyber-attacks might also enhance activities that are enabled through cyberspace, such as the use of online media by extremists to recruit members and promote radicalisation. Cyber-attacks are diverse: as a result, cybersecurity requires a comparable diversity of approaches. Cyber-attacks can have powerful impacts on people’s lives, and so—in liberal democratic societies at least—governments have a duty to ensure cybersecurity in order to protect the inhabitants within their own jurisdiction and, arguably, the people of other nations. But, as recent events following the revelations of Edward Snowden have demonstrated, there is a risk that the governmental pursuit of cybersecurity might overstep the mark and subvert fundamental privacy rights. Popular comment on these episodes advocates transparency of government processes, yet given that cybersecurity risks represent major challenges to national security, it is unlikely that simple transparency will suffice. Managing the risks of cybersecurity involves trade-offs: between security and privacy; individual rights and the good of a society; and types of burdens placed on particular groups in order to protect others. These trade-offs are often ethical trade-offs, involving questions of how we act, what values we should aim to promote, and what means of anticipating and responding to the risks are reasonably—and publicly—justifiable. This Occasional Paper (prepared for the National Security College) provides a brief conceptual analysis of cybersecurity, demonstrates the relevance of ethics to cybersecurity and outlines various ways in which to approach ethical decision-making when responding to cyber-attacks

    Discrete nuclear structures in actively growing neuroblastoma cells are revealed by antibodies raised against phosphorylated neurofilament proteins

    Get PDF
    BACKGROUND: Nuclear objects that have in common the property of being recognized by monoclonal antibodies specific for phosphoprotein epitopes and cytoplasmic intermediate filaments (in particular, SMI-31 and RT-97) have been reported in glial and neuronal cells, in situ and in vitro. Since neurofilament and glial filaments are generally considered to be restricted to the cytoplasm, we were interested in exploring the identity of the structures labeled in the nucleus as well as the conditions under which they could be found there. RESULTS: Using confocal microscopy and western analysis techniques, we determined 1) the immunolabeled structures are truly within the nucleus; 2) the phosphoepitope labeled by SMI-31 and RT-97 is not specific to neurofilaments (NFs) and it can be identified on other intermediate filament proteins (IFs) in other cell types; and 3) there is a close relationship between DNA synthesis and the amount of nuclear staining by these antibodies thought to be specific for cytoplasmic proteins. Searches of protein data bases for putative phosphorylation motifs revealed that lamins, NF-H, and GFAP each contain a single tyrosine phosphorylation motif with nearly identical amino acid sequence. CONCLUSION: We therefore suggest that this sequence may be the epitope recognized by SMI-31 and RT-97 mABs, and that the nuclear structures previously reported and shown here are likely phosphorylated lamin intermediate filaments, while the cytoplasmic labeling revealed by the same mABs indicates phosphorylated NFs in neurons or GFAP in glia

    A qualitative examination of severe disciplinary incidents in men’s soccer

    Get PDF
    The purpose of this study was to examine the number of severe disciplinary incidents involving referees in senior men’s soccer, as well as contributing factors. Such incidents include, but are not limited to, abusive remarks, threats, and deliberate violent conduct. Competition in senior men’s soccer takes place between teams within a tiered structure where players are at least 18 years old. Data collection entailed documentary analysis of disciplinary reports (n = 98) provided by a provincial soccer association. After recording annual frequency, offender’s team, level of competition, and length of suspension, descriptive statistics were calculated. Disciplinary reports showed an increase in frequency of incidents from 4 in 2010 to 27 in 2015. These disciplinary incidents occurred across 80 different teams, with 61.1% of them emerging from lower tiers (ie., tier 3 or lower). Suspensions ranged from 0 to 134 games (M = 18.5, SD = 22.6). These results highlight the distribution pattern and increase in severe disciplinary incidents in men’s soccer. The next phase of the study involves conducting interviews to obtain player perceptions of disciplinary incidents involving referees. Approximately 10 players will be recruited across a range of tiers in a provincial soccer league, and share their experiences based on their direct involvement or as a witness to severe disciplinary incidents. Interviews will explore the antecedents of these disciplinary incidents, which may identify strategies to improve players’ and officials’ well-being through the influence of contextual factors. *Indicates faculty mentor

    Parents’ Perceptions of the College Experiences of Twice-Exceptional Students with Autism Spectrum Disorder

    Get PDF
    Students with Autism Spectrum Disorder are accessing college in increasing numbers, and within this group, there is a cohort of academically talented students who can be considered twice-exceptional, or 2e-ASD. While research about college students with ASD is increasing, there is a relative dearth of literature about 2e-ASD college students, and their secondary transition and college experiences. The current study presents the results of individual interviews that were conducted with 10 parents of 2e-ASD college students to explore their perceptions of their children’s experiences, including what things went well and what were problematic areas. Parents described clear and early expectations that the student would attend college and that college provided the student with independence and the chance to be with people who shared similar interests. They described factors that were considered during the college search including the size of the campus and distance from home, and the importance of letting the student take increased responsibility, and if necessary, make and learn from mistakes. The need to focus on executive functioning and social skills was also noted. Implications for families, secondary transition personnel, and vocational rehabilitation counselors are presented
    • 

    corecore