720 research outputs found

    The content of whistleblowing procedures: a critical review of recent official guidelines

    Get PDF
    There is an increasing recognition of the need to provide ways for people to raise concerns about suspected wrongdoing by promoting internal policies and procedures which offer proper safeguards to actual and potential whistleblowers. Many organisations in both the public and private sectors now have such measures and these display a wide variety of operating modalities: in-house or outsourced, anonymous/confidential/identified, multi or single tiered, specified or open subject matter, etc. As a result of this development, a number of guidelines and policy documents have been produced by authoritative bodies. This article reviews the following five documents from a management perspective, the first two deal with the principles upon which legislation might be based and the others describing good management practice: the Council of Europe Resolution 1729 (COER); Transparency International ‘Recommended Principles for Whistleblowing Legislation’ (TI); European Union Article 29 Data Protection Working Party Opinion (EUWP); International Chamber of Commerce ‘Guidelines on Whistleblowing’ (ICC); and the British Standards Institute ‘Whistleblowing arrangements Code of Practice 2008 (BSI)

    Introduction

    Get PDF

    Trade unions and the whistleblowing process in the UK: an opportunity for strategic expansion?

    Get PDF
    Historically, whistleblowing research has predominantly focused on psychological and organisational conditions of raising concerns about alleged wrongdoing. Today, however, policy makers increasingly start to look at institutional frameworks for protecting whistleblowers and responding to their concerns. This article focuses on the latter by exploring the roles that trade unions might adopt in order to improve responsiveness in the whistleblowing process. Research has consistently demonstrated that the two main reasons that deter people from reporting perceived wrongdoing are fear of retaliation and a belief that the wrongdoing is unlikely to be rectified. In this article we argue that trade unions have an important part to play in dealing with both these inhibiting factors but this requires them to be appropriately engaged in the whistleblowing process and willing to take a more proactive approach to negotiations. We use Vandekerckhove’s 3-tiered whistleblowing model and Kaine’s model of union voice level to structure our speculative analysis of the various ways in which trade unions can interact with whistleblowers and organisations they raise concerns about alleged wrongdoing in, as well as agents at a regulatory level. Our articulation of specific roles trade unions can play in the whistleblowing process uses examples from the UK as to how these trade union roles are currently linked to and embedded in employment law and whistleblowing regulation

    A trypsin-like serine protease is involved in pseudorabies virus invasion through the basement membrane barrier of porcine nasal respiratory mucosa

    Get PDF
    Several alphaherpesviruses breach the basement membrane during mucosal invasion. In the present study, the role of proteases in this process was examined. The serine protease-specific inhibitor AEBSF inhibited penetration of the basement membrane by the porcine alphaherpesvirus pseudorabies virus (PRV) by 88.1% without affecting lateral spread. Inhibitors of aspartic-, cysteine-, and metalloproteases did not inhibit viral penetration of the basement membrane. Further analysis using the Soybean Type I-S trypsin inhibitor for the serine protease subcategory of trypsin-like serine proteases resulted in a 96.9% reduction in plaque depth underneath the basement membrane. These data reveal a role of a trypsin-like serine protease in PRV penetration of the basement membrane

    Is sexual risk behaviour associated with an increased risk of transfusion-transmissible infections in blood donors from Western and Pacific countries? A systematic review and meta-analysis

    Get PDF
    Background and Objectives The donor medical questionnaire is designed to aid blood establishments in supporting a safe blood supply. According to blood donor deferral policies, sexual risk behaviour (SRB) leads to a (temporary) deferral from blood donation. This systematic review aimed to scientifically underpin these policies by identifying the best available evidence on the association between SRB and the risk of transfusion transmissible infections (TTIs). Materials & Methods Studies from three databases investigating the link between SRB (excluding men who have sex with men (MSM)) and TTIs (HBV, HCV, HIV, Treponema pallidum) in donors from Western and Pacific countries were obtained and assessed on eligibility by two reviewers independently. The association between SRB and TTIs was expressed by calculating pooled effect measures via meta-analyses. The GRADE methodology (Grades of Recommendation, Assessment, Development and Evaluation) was used to assess the quality of evidence. Results We identified 3750 references and finally included 15 observational studies. Meta-analyses showed that there is a significant (P < 0 center dot 05) positive association between the following SRB and HBV and/or HCV infection: having sex with an intravenous drug user (high-certainty evidence), receiving money or goods for sex (moderate-high certainty evidence), having a sex partner with hepatitis/HIV (moderate-certainty evidence) and paid for sex or anal sex (low-certainty evidence). Conclusion Sexual risk behaviour (including having sex with an intravenous drug user, receiving money or goods for sex or having a sex partner with hepatitis/HIV) is probably associated with an increased risk of HBV/HCV infection in blood donors from Western and Pacific countries

    Quantitative Measurement of Cyber Resilience: Modeling and Experimentation

    Full text link
    Cyber resilience is the ability of a system to resist and recover from a cyber attack, thereby restoring the system's functionality. Effective design and development of a cyber resilient system requires experimental methods and tools for quantitative measuring of cyber resilience. This paper describes an experimental method and test bed for obtaining resilience-relevant data as a system (in our case -- a truck) traverses its route, in repeatable, systematic experiments. We model a truck equipped with an autonomous cyber-defense system and which also includes inherent physical resilience features. When attacked by malware, this ensemble of cyber-physical features (i.e., "bonware") strives to resist and recover from the performance degradation caused by the malware's attack. We propose parsimonious mathematical models to aid in quantifying systems' resilience to cyber attacks. Using the models, we identify quantitative characteristics obtainable from experimental data, and show that these characteristics can serve as useful quantitative measures of cyber resilience.Comment: arXiv admin note: text overlap with arXiv:2302.04413, arXiv:2302.0794

    An Experimentation Infrastructure for Quantitative Measurements of Cyber Resilience

    Full text link
    The vulnerability of cyber-physical systems to cyber attack is well known, and the requirement to build cyber resilience into these systems has been firmly established. The key challenge this paper addresses is that maturing this discipline requires the development of techniques, tools, and processes for objectively, rigorously, and quantitatively measuring the attributes of cyber resilience. Researchers and program managers need to be able to determine if the implementation of a resilience solution actually increases the resilience of the system. In previous work, a table top exercise was conducted using a notional heavy vehicle on a fictitious military mission while under a cyber attack. While this exercise provided some useful data, more and higher fidelity data is required to refine the measurement methodology. This paper details the efforts made to construct a cost-effective experimentation infrastructure to provide such data. It also presents a case study using some of the data generated by the infrastructure.Comment: 6 pages, 2022 IEEE Military Communications Conference, pp. 855-86

    Differential expression of lncRNAs during the HIV replication cycle: an underestimated layer in the HIV-host interplay.

    Get PDF
    Studying the effects of HIV infection on the host transcriptome has typically focused on protein-coding genes. However, recent advances in the field of RNA sequencing revealed that long non-coding RNAs (lncRNAs) add an extensive additional layer to the cell's molecular network. Here, we performed transcriptome profiling throughout a primary HIV infection in vitro to investigate lncRNA expression at the different HIV replication cycle processes (reverse transcription, integration and particle production). Subsequently, guilt-by-association, transcription factor and co-expression analysis were performed to infer biological roles for the lncRNAs identified in the HIV-host interplay. Many lncRNAs were suggested to play a role in mechanisms relying on proteasomal and ubiquitination pathways, apoptosis, DNA damage responses and cell cycle regulation. Through transcription factor binding analysis, we found that lncRNAs display a distinct transcriptional regulation profile as compared to protein coding mRNAs, suggesting that mRNAs and lncRNAs are independently modulated. In addition, we identified five differentially expressed lncRNA-mRNA pairs with mRNA involvement in HIV pathogenesis with possible cis regulatory lncRNAs that control nearby mRNA expression and function. Altogether, the present study demonstrates that lncRNAs add a new dimension to the HIV-host interplay and should be further investigated as they may represent targets for controlling HIV replication
    • 

    corecore