10 research outputs found

    Genetic investigation of Nordic patients with complement-mediated kidney diseases

    Get PDF
    BackgroundComplement activation in atypical hemolytic uremic syndrome (aHUS), C3 glomerulonephropathy (C3G) and immune complex-mediated membranoproliferative glomerulonephritis (IC-MPGN) may be associated with rare genetic variants. Here we describe gene variants in the Swedish and Norwegian populations.MethodsPatients with these diagnoses (N=141) were referred for genetic screening. Sanger or next-generation sequencing were performed to identify genetic variants in 16 genes associated with these conditions. Nonsynonymous genetic variants are described when they have a minor allele frequency of <1% or were previously reported as being disease-associated.ResultsIn patients with aHUS (n=94, one also had IC-MPGN) 68 different genetic variants or deletions were identified in 60 patients, of which 18 were novel. Thirty-two patients had more than one genetic variant. In patients with C3G (n=40) 29 genetic variants, deletions or duplications were identified in 15 patients, of which 9 were novel. Eight patients had more than one variant. In patients with IC-MPGN (n=7) five genetic variants were identified in five patients. Factor H variants were the most frequent in aHUS and C3 variants in C3G. Seventeen variants occurred in more than one condition.ConclusionGenetic screening of patients with aHUS, C3G and IC-MPGN is of paramount importance for diagnostics and treatment. In this study, we describe genetic assessment of Nordic patients in which 26 novel variants were found

    The dynamics of the relationship between managers and consultants - Exploring the aspects of time, power and ambiguities

    Get PDF
    This article studies what aspects affect the relationship between managers and consultants and what the consequences are. Drawing on interviews with consultants and managers from various sectors, we analysed their relationship by combining principal-agent theory with other theories within client-consultant literature which enabled a deeper understanding of the aspects and interests which shape the relationship. We have identified three aspects; time, power, and ambiguities, which we argue affect the relationship between managers and consultants. Our findings also suggest that the manager-consultant relationship is to be recognized as an agent-agent relationship - where both actors are striving to remain in control. When managers engage in extensive monitoring and controlling of consultants, the manager remains in power as he or she controls what the consultant does and when he or she does it, while also making sure that the client organisation remain its’ independence from consultants. For consultants, finding ways to apply their wide range of knowledge within the client organisation is crucial to gain and maintain power over the manager. By combining the notion of an agent-agent relationship between managers and consultants with the aspects of time, power and ambiguities, we shed light on complexities often neglected within the relationship.MSc in Managemen

    Teutonic mythology

    No full text
    En verso de port.: The Aberdeen University Pres

    Singoalla /

    No full text
    Mode of access: Internet

    Services in connected vehicles: Security risks and countermeasures

    No full text
    Smart vehicles have introduced many services which can be categorized by their functionality (infotainment, comfort, ADAS, OEM services). Introducing new services increases the risk of compromising security. A mobile app used by drivers to connect the vehicle could be infected with malware and spread to the vehicle. Forging remote starting signals enables an attacker to start the vehicle without a key. Security implications of these services should be investigated and addressed thoroughly. This chapter investigates such problems and provides an overview of vulnerabilities, attacks, and mitigations related to these services along with findings including software bugs and insecure protocols. The mitigations for these attacks include strengthening the security protocol of the vehicle CAN bus and incorporating security protocols such as TLS and IPsec. It is hard to say that all connected vehicles are secured. In conclusion, security cannot be neglected, and best practices like sufficient logging (e.g., IDS), reviewing, security testing, and updating of software and hardware should be used
    corecore