351 research outputs found

    Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles

    Full text link
    Web personalization is an elegant and flexible process of making a web site responsive to the unique needs of each individual user. Data that reflects user prefe-rences and likings, comprising therefore a user profile, are gathered to an adaptive web site in a non transpa-rent manner. This situation however raises serious privacy concerns to the end user. When browsing a web site, users are not aware of several important pri-vacy parameters i.e., which behavior will be monitored and logged, how it will be processed, how long it will be kept, and with whom it will be shared in the long run. In this paper we propose an abstract architecture that enhances user privacy during interaction with adaptive web sites. This architecture enables users to create and update their personal privacy preferences for the adaptive web sites they visit by holding their (user) profiles in the client side instead of the server side. By doing so users will be able to self-confine the personalization experience the adaptive sites offer, thus enhancing privacy

    Core Outcomes and Common Data Elements in Chronic Subdural Hematoma: A Systematic Review of the Literature Focusing on Reported Outcomes.

    Get PDF
    The plethora of studies in chronic subdural hematoma (CSDH) has not resulted in the development of an evidence-based treatment strategy, largely due to heterogeneous outcome measures that preclude cross-study comparisons and guideline development. This study aimed to identify and quantify the heterogeneity of outcome measures reported in the CSDH literature and to build a case for the development of a consensus-based core outcome set. This systematic review adhered to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) statement and was registered with the PROSPERO international prospective register of systematic reviews (CRD42014007266). All full-text English language studies with >10 patients (prospective) or >100 patients (retrospective) published after 1990 examining clinical outcomes in CSDH were eligible for inclusion. One hundred two eligible studies were found. There were 14 (13.7%) randomized controlled trials, one single arm trial (1.0%), 25 (24.5%) cohort comparison studies, and 62 (60.8%) prospective or retrospective cohort studies. Outcome domains reported by the studies included mortality (63.8% of included studies), recurrence (94.1%), complications (48.0%), functional outcomes (40.2%), and radiological (38.2%) outcomes. There was significant heterogeneity in the definitions of the outcome measures, as evidenced by the seven different definitions of the term "recurrence," with no definition given in 19 studies. The time-points of assessment for all the outcome domains varied greatly from inpatient/hospital discharge to 18 months. This study establishes and quantifies the heterogeneity of outcome measure reporting in CSDH and builds the case for the development of a robust consensus-based core outcome set for future studies to adhere to as part of the Core Outcomes and Common Data Elements in CSDH (CODE-CSDH) project.PJH is supported by a National Institute for Health Research (NIHR) Research Professorship and the NIHR Cambridge Biomedical Research Centre

    Antilizer: run time self-healing security for wireless sensor networks

    Get PDF
    Wireless Sensor Network (WSN) applications range from domestic Internet of Things systems like temperature monitoring of homes to the monitoring and control of large-scale critical infrastructures. The greatest risk with the use of WSNs in critical infrastructure is their vulnerability to malicious network level attacks. Their radio communication network can be disrupted, causing them to lose or delay data which will compromise system functionality. This paper presents Antilizer, a lightweight, fully-distributed solution to enable WSNs to detect and recover from common network level attack scenarios. In Antilizer each sensor node builds a self-referenced trust model of its neighbourhood using network overhearing. The node uses the trust model to autonomously adapt its communication decisions. In the case of a network attack, a node can make neighbour collaboration routing decisions to avoid affected regions of the network. Mobile agents further bound the damage caused by attacks. These agents enable a simple notification scheme which propagates collaborative decisions from the nodes to the base station. A filtering mechanism at the base station further validates the authenticity of the information shared by mobile agents. We evaluate Antilizer in simulation against several routing attacks. Our results show that Antilizer reduces data loss down to 1% (4% on average), with operational overheads of less than 1% and provides fast network-wide convergence

    Neurotrauma clinicians' perspectives on the contextual challenges associated with long-term follow-up following traumatic brain injury in low-income and middle-income countries: a qualitative study protocol.

    Get PDF
    INTRODUCTION: Traumatic brain injury (TBI) is a global public health concern; however, low/middle-income countries (LMICs) face the greatest burden. The WHO recognises the significant differences between patient outcomes following injuries in high-income countries versus those in LMICs. Outcome data are not reliably recorded in LMICs and despite improved injury surveillance data, data on disability and long-term functional outcomes remain poorly recorded. Therefore, the full picture of outcome post-TBI in LMICs is largely unknown. METHODS AND ANALYSIS: This is a cross-sectional pragmatic qualitative study using individual semistructured interviews with clinicians who have experience of neurotrauma in LMICs. The aim of this study is to understand the contextual challenges associated with long-term follow-up of patients following TBI in LMICs. For the purpose of the study, we define 'long-term' as any data collected following discharge from hospital. We aim to conduct individual semistructured interviews with 24-48 neurosurgeons, beginning February 2020. Interviews will be recorded and transcribed verbatim. A reflexive thematic analysis will be conducted supported by NVivo software. ETHICS AND DISSEMINATION: The University of Cambridge Psychology Research Ethics Committee approved this study in February 2020. Ethical issues within this study include consent, confidentiality and anonymity, and data protection. Participants will provide informed consent and their contributions will be kept confidential. Participants will be free to withdraw at any time without penalty; however, their interview data can only be withdrawn up to 1 week after data collection. Findings generated from the study will be shared with relevant stakeholders such as the World Federation of Neurosurgical Societies and disseminated in conference presentations and journal publications

    Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing

    Full text link
    The factories of the future require efficient interconnection of their physical machines into the cyber space to cope with the emerging need of an increased uptime of machines, higher performance rates, an improved level of productivity and a collective collaboration along the supply chain. With the rapid growth of the Internet of Things (IoT), and its application in industrial areas, the so called Industrial Internet of Things (IIoT)/Industry 4.0 emerged. However, further to the rapid growth of IoT/IIoT systems, cyber attacks are an emerging threat and simple manual security testing can often not cope with the scale of large IoT/IIoT networks. In this paper, we suggest to extract metadata from commonly used diagrams and models in a typical software development process, to automate the process of threat modelling, security analysis and penetration testing, without detailed prior security knowledge. In that context, we present requirements and recommendations for metadata in IoT/IIoT models that are needed as necessary input parameters of security assurance tools.Comment: 8 pages, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES 2019) (ARES '19), August 26-29, 2019, Canterbury, United Kingdo

    Statistical analysis plan for the Dex-CSDH trial: a randomised, double-blind, placebo-controlled trial of a 2-week course of dexamethasone for adult patients with a symptomatic chronic subdural haematoma

    Get PDF
    Abstract Background The incidence of chronic subdural haematoma (CSDH) is increasing. Although surgery remains the mainstay of management for symptomatic patients, uncertainty remains regarding the role of steroids. Hence, the Dex-CSDH trial was launched in the UK in 2015 aiming to determine whether, compared to placebo, dexamethasone can improve the 6-month functional outcome of patients with symptomatic CSDH by reducing the rate of surgical intervention and recurrence rate. Methods and design Dex-CSDH is a multi-centre, pragmatic, parallel group, double-blind, randomised trial assessing the clinical utility of a 2-week course of dexamethasone following a CSDH. Seven hundred fifty patients were randomised to either dexamethasone or placebo. The primary outcome is the modified Rankin Scale at 6 months which is dichotomised to favourable (a score of 0–3) versus unfavourable (a score of 4–6). Conclusions This paper and the accompanying additional material describe the statistical analysis plan for the trial. Trial registration ISRCTN, ISRCTN80782810. Registered on 7 November 2014. http://www.isrctn.com/ISRCTN80782810. EudraCT, 2014-004948-35. Registered on 20 March 2015. </jats:sec

    Academic requirements for Certificate of Completion of Training in surgical training: Consensus recommendations from the Association of Surgeons in Training/National Research Collaborative Consensus Group.

    Get PDF
    BACKGROUND: Surgical trainees are expected to demonstrate academic achievement in order to obtain their certificate of completion of training (CCT). These standards are set by the Joint Committee on Surgical Training (JCST) and specialty advisory committees (SAC). The standards are not equivalent across all surgical specialties and recognise different achievements as evidence. They do not recognise changes in models of research and focus on outcomes rather than process. The Association of Surgeons in Training (ASiT) and National Research Collaborative (NRC) set out to develop progressive, consistent and flexible evidence set for academic requirements at CCT. METHODS: A modified-Delphi approach was used. An expert group consisting of representatives from the ASiT and the NRC undertook iterative review of a document proposing changes to requirements. This was circulated amongst wider stakeholders. After ten iterations, an open meeting was held to discuss these proposals. Voting on statements was performed using a 5-point Likert Scale. Each statement was voted on twice, with ≥80% of votes in agreement meaning the statement was approved. The results of this vote were used to propose core and optional academic requirements for CCT. RESULTS: Online discussion concluded after ten rounds. At the consensus meeting, statements were voted on by 25 delegates from across surgical specialties and training-grades. The group strongly favoured acquisition of 'Good Clinical Practice' training and research methodology training as CCT requirements. The group agreed that higher degrees, publications in any author position (including collaborative authorship), recruiting patients to a study or multicentre audit and presentation at a national or international meeting could be used as evidence for the purpose of CCT. The group agreed on two essential 'core' requirements (GCP and methodology training) and two of a menu of four 'additional' requirements (publication with any authorship position, presentation, recruitment of patients to a multicentre study and completion of a higher degree), which should be completed in order to attain CCT. CONCLUSION: This approach has engaged stakeholders to produce a progressive set of academic requirements for CCT, which are applicable across surgical specialties. Flexibility in requirements whilst retaining a high standard of evidence is desirable

    The IDEAL framework in neurosurgery: a bibliometric analysis

    Get PDF
    Funder: University of CambridgeAbstract: Background: The Idea, Development, Exploration, Assessment and Long-term study (IDEAL) framework was created to provide a structured way for assessing and evaluating novel surgical techniques and devices. Objectives: The aim of this paper was to investigate the utilization of the IDEAL framework within neurosurgery, and to identify factors influencing implementation. Methods: A bibliometric analysis of the 7 key IDEAL papers on Scopus, PubMed, Embase, Web of Science, and Google Scholar databases (2009–2019) was performed. A second journal-specific search then identified additional papers citing the IDEAL framework. Publications identified were screened by two independent reviewers to select neurosurgery-specific articles. Results: The citation search identified 1336 articles. The journal search identified another 16 articles. Following deduplication and review, 51 relevant articles remained; 14 primary papers (27%) and 37 secondary papers (73%). Of the primary papers, 5 (36%) papers applied the IDEAL framework to their research correctly; two were aligned to the pre-IDEAL stage, one to the Idea and Development stages, and two to the Exploration stage. Of the secondary papers, 21 (57%) explicitly discussed the IDEAL framework. Eighteen (86%) of these were supportive of implementing the framework, while one was not, and two were neutral. Conclusion: The adoption of the IDEAL framework in neurosurgery has been slow, particularly for early-stage neurosurgical techniques and inventions. However, the largely positive reviews in secondary literature suggest potential for increased use that may be achieved with education and publicity
    • …
    corecore