68 research outputs found

    The environmental security debate and its significance for climate change

    Get PDF
    Policymakers, military strategists and academics all increasingly hail climate change as a security issue. This article revisits the (comparatively) long-standing “environmental security debate” and asks what lessons that earlier debate holds for the push towards making climate change a security issue. Two important claims are made. First, the emerging climate security debate is in many ways a re-run of the earlier dispute. It features many of the same proponents and many of the same disagreements. These disagreements concern, amongst other things, the nature of the threat, the referent object of security and the appropriate policy responses. Second, given its many different interpretations, from an environmentalist perspective, securitisation of the climate is not necessarily a positive development

    Differential modulation of corticospinal excitability during haptic sensing of 2-D patterns vs. textures

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Recently, we showed a selective enhancement in corticospinal excitability when participants actively discriminated raised 2-D symbols with the index finger. This extra-facilitation likely reflected activation in the premotor and dorsal prefrontal cortices modulating motor cortical activity during attention to haptic sensing. However, this parieto-frontal network appears to be finely modulated depending upon whether haptic sensing is directed towards material or geometric properties. To examine this issue, we contrasted changes in corticospinal excitability when young adults (n = 18) were engaged in either a roughness discrimination on two gratings with different spatial periods, or a 2-D pattern discrimination of the relative offset in the alignment of a row of small circles in the upward or downward direction.</p> <p>Results</p> <p>A significant effect of task conditions was detected on motor evoked potential amplitudes, reflecting the observation that corticospinal facilitation was, on average, ~18% greater in the pattern discrimination than in the roughness discrimination.</p> <p>Conclusions</p> <p>This differential modulation of corticospinal excitability during haptic sensing of 2-D patterns vs. roughness is consistent with the existence of preferred activation of a visuo-haptic cortical dorsal stream network including frontal motor areas during spatial vs. intensive processing of surface properties in the haptic system.</p

    Endoscopic diagnosis of acute intestinal GVHD following allogeneic hematopoietic SCT: a retrospective analysis in 175 patients

    Get PDF
    Diagnosis of acute intestinal GVHD (aGVHD) following allogeneic hematopoietic cell transplantation is based on clinical symptoms and histological lesions. This retrospective analysis aimed to validate the ‘Freiburg Criteria' for the endoscopic grading of intestinal aGVHD. Grade 1: no clear-cut criteria; grade 2: spotted erythema; grade 3: aphthous lesions; and grade 4: confluent defects, ulcers, denudation of the mucosa. Having excluded patients with infectious diarrhea, we evaluated 175 consecutive patients between January 2001 and June 2009. Setting a cutoff between grade 1 (no change in therapy) and grade 2 (intensification of immunosuppression), macroscopy had a sensitivity of 89.2% (95% confidence interval (CI): 80.4–94.9%), a specificity of 79.4% (95% CI: 69.6–87.1%), a positive-predictive value of 79.6% (95% CI: 70.0–87.2%) and a negative-predictive value of 89.0% (95% CI: 80.2–94.9%). In all, 20% of patients with aGVHD in the lower gastrointestinal tract (GIT) had lesions only in the terminal ileum. In all patients with aGVHD ⩾2 of the upper GIT, typical lesions were also found in the lower GIT. Ileo-colonoscopy showed the highest diagnostic yield for aGVHD. In conclusion, the ‘Freiburg Criteria' for macroscopic diagnosis of intestinal aGVHD provide high accuracy for identifying aGVHD ⩾2

    Barriers to Pharmacy-Based Syringe Purchase Among Injection Drug Users in Tijuana, Mexico: A Mixed Methods Study

    Get PDF
    Injection drug users (IDUs) may be denied purchase of sterile syringes even where purchase without a prescription is legal. This study examined barriers to over-the-counter (OTC) syringe purchase among IDUs in Tijuana, Mexico. A quantitative survey and subsequent focus groups were used to quantify barriers to purchase, identify their correlates and provide in-depth exploration of syringe purchase experiences. Of 627 IDUs, 81% purchased a syringe in the past 6 months and 16% were refused or overcharged. Factors independently associated with refusal/overcharging were homelessness, receptive syringe sharing, >5 uses per syringe, and number of lifetime abscesses. Few pharmacies sold syringes to IDUs, who adapted by limiting purchase attempts to pharmacies known to sell syringes consistently. Failed purchases occurred when drug withdrawal required purchase at unusual times or locations, often following release from jail. IDUs reported syringe sharing, syringe reuse, and searching through unsecured medical waste for syringes in response to failed purchase attempts. Interventions to expand OTC syringe sales to IDUs, particularly near detention facilities, will facilitate safer injection practices

    Aplicabilidade do indice adiposidade corporal na estimativa do percentual de gordura de jovens mulheres brasileiras

    Get PDF
    INTRODUÇÃO: A estimativa da composição corporal é um campo de estudo importante no prognóstico e diagnóstico de enfermidades degenerativas. OBJETIVO: Analisar a aplicabilidade do Índice de adiposidade corporal (IAC) e o método de dobras cutâneas. MÉTODOS: A amostra foi constituída por 19 adultas jovens com média de idade 24,53 ± 2,65 anos, submetidas à avaliação antropométrica (circunferências e dobras cutâneas) e absorsiometria por dupla emissão de raio X (DXA). Os valores estimados foram comparados ao valor de referência por meio do teste t pareado e pela análise do nível de associação entre os métodos pela correlação de Pearson; o nível de significância foi p 0,05) com nível de associação forte (r = 0,879). CONCLUSÃO: Embora o IAC não apresente diferença para os valores estimados, fica evidente a necessidade de mais estudos sobre a aplicabilidade do método na população brasileira

    Honey, a Gift from Nature to Health and Beauty: A Review

    Get PDF
    Benefits of honey are contributed by the composition of its elements such as glucose, fructose, glucose oxidase, vitamins and phenolic compounds. For health, honey can be used to treat wounds due to the antibacterial activity conferred by the hydrogen peroxide produced by glucose oxidase in honey. Anti-inflammatory, anti-oxidant, deodorizing and tissue regeneration activities in honey also help in the wound healing process. It can also be an alternative sweetener for diabetic patients to ensure compliance to a healthy diet. Moreover, honey exerts several effects such as lowering low density lipids and increasing high density lipids, thus reducing risk of atherosclerosis. In terms of beauty, honey can be used on skin and hair. It moisturizes skin through its natural humectant properties contributed by high contents of fructose and glucose. Honey treats acne on the skin due to its antibacterial activity, anti-inflammatory action and tissue repair. The hair can benefit from honey in such a way that the hair has abundance, and becomes easier to comb. However, there have not been as many studies regarding the use of honey in skin in comparison to its use for health. Therefore, future studies on honey could research its use, action and benefits in both cosmetics and dermatology

    Tracking GhostNet: investigating a cyber espionage network

    No full text
    Cyber espionage is an issue whose time has come. In this second report from the Information Warfare Monitor, we lay out the findings of a 10-month investigation of alleged Chinese cyber spying against Tibetan institutions.The investigation, consisting of fieldwork, technical scouting, and laboratory analysis, discovered a lot more.The investigation ultimately uncovered a network of over 1,295 infected hosts in 103 countries.Up to 30% of the infected hosts are considered high-value targets and include computers located at ministries of foreign affairs, embassies, international organizations, news media, and NGOs. The Tibetan computer systems we manually investigated, and from which our investigations began,were conclusively compromised by multiple infections that gave attackers unprecedented access to potentially sensitive information.But the study clearly raises more questions than it answers.From the evidence at hand, it is not clear whether the attacker(s) really knew what they had penetrated, or if the information was ever exploited for commercial or intelligence value. Some may conclude that what we lay out here points defnitively to China as the culprit. Certainly Chinese cyber-espionage is a major global concern. Chinese authorities have made it clear that they consider cyberspace a strategic domain, one which helps redress the military imbalance between China and the rest of the world (particularly the United States). They have correctly identifed cyberspace as the strategic fulcrum upon which U.S. military and economic dominance depends. But attributing all Chinese malware to deliberate or targeted intelligence gathering operations by the Chinese state is wrong and misleading. Numbers can tell a different story. China is presently the world’s largest Internet population. The sheer number of young digital natives online can more than account for the increase in Chinese malware. With more creative people using computers, it’s expected that China (and Chinese individuals) will account for a larger proportion of cybercrime.Likewise, the threshold for engaging in cyber espionage is falling. Cybercrime kits are now available online, and their use is clearly on the rise, in some cases by organized crime and other private actors. Socially engineered malware is the most common and potent; it introduces Trojans onto a system, and then exploits social contacts and files to propagate infections further. Furthermore, the Internet was never built with security in mind. As institutions ranging from governments through to businesses and individuals depend on 24-hour Internet connectivity, the opportunities for exploiting these systems increases. This report serves as a wake-up call. At the very least, a large percentage of high-value targets compromised by this network demonstrate the relative ease with which a technically unsophisticated approach can quickly be harnessed to create a very effective spynet. These are major disruptive capabilities that the professional information security community, as well as policymakers, need to come to terms with rapidly.These are major disruptive capabilities that the professional information security community, as well as policymakers, need to come to terms with rapidly

    Tracking GhostNet: investigating a cyber espionage network

    No full text
    Cyber espionage is an issue whose time has come. In this second report from the Information Warfare Monitor, we lay out the findings of a 10-month investigation of alleged Chinese cyber spying against Tibetan institutions.The investigation, consisting of fieldwork, technical scouting, and laboratory analysis, discovered a lot more.The investigation ultimately uncovered a network of over 1,295 infected hosts in 103 countries.Up to 30% of the infected hosts are considered high-value targets and include computers located at ministries of foreign affairs, embassies, international organizations, news media, and NGOs. The Tibetan computer systems we manually investigated, and from which our investigations began,were conclusively compromised by multiple infections that gave attackers unprecedented access to potentially sensitive information.But the study clearly raises more questions than it answers.From the evidence at hand, it is not clear whether the attacker(s) really knew what they had penetrated, or if the information was ever exploited for commercial or intelligence value. Some may conclude that what we lay out here points defnitively to China as the culprit. Certainly Chinese cyber-espionage is a major global concern. Chinese authorities have made it clear that they consider cyberspace a strategic domain, one which helps redress the military imbalance between China and the rest of the world (particularly the United States). They have correctly identifed cyberspace as the strategic fulcrum upon which U.S. military and economic dominance depends. But attributing all Chinese malware to deliberate or targeted intelligence gathering operations by the Chinese state is wrong and misleading. Numbers can tell a different story. China is presently the world’s largest Internet population. The sheer number of young digital natives online can more than account for the increase in Chinese malware. With more creative people using computers, it’s expected that China (and Chinese individuals) will account for a larger proportion of cybercrime.Likewise, the threshold for engaging in cyber espionage is falling. Cybercrime kits are now available online, and their use is clearly on the rise, in some cases by organized crime and other private actors. Socially engineered malware is the most common and potent; it introduces Trojans onto a system, and then exploits social contacts and files to propagate infections further. Furthermore, the Internet was never built with security in mind. As institutions ranging from governments through to businesses and individuals depend on 24-hour Internet connectivity, the opportunities for exploiting these systems increases. This report serves as a wake-up call. At the very least, a large percentage of high-value targets compromised by this network demonstrate the relative ease with which a technically unsophisticated approach can quickly be harnessed to create a very effective spynet. These are major disruptive capabilities that the professional information security community, as well as policymakers, need to come to terms with rapidly.These are major disruptive capabilities that the professional information security community, as well as policymakers, need to come to terms with rapidly
    corecore