44 research outputs found

    Assessing the accuracy of legal implementation readiness decisions

    Get PDF
    Abstract-Software engineers regularly build systems that are required to comply with laws and regulations. To this end, software engineers must determine which requirements have met or exceeded their legal obligations and which requirements have not. Requirements that have met or exceeded their legal obligations are legally implementation ready, whereas requirements that have not met or exceeded their legal obligations need further refinement. Research is needed to better understand how to support software engineers in making these determinations. In this paper, we describe a case study in which we asked graduate-level software engineering students to assess whether a set of software requirements for an electronic health record system met or exceeded their corresponding legal obligations as expressed in regulations created pursuant to the U.S. Health Insurance Portability and Accountability Act (HIPAA). We compare the assessment made by graduate students with an assessment made by HIPAA compliance subject matter experts. Additionally, we contrast these results with those generated by a legal requirements triage algorithm. Our findings suggest that the average graduatelevel software engineering student is ill-prepared to write legally compliant software with any confidence and that domain experts are an absolute necessity. Our findings also indicate the potential utility of legal requirements metrics in aiding software engineers as they make legal compliance decisions

    Defining the Internet of Devices: Privacy and Security Implications

    Get PDF
    Presented at the 2014 Privacy Law Scholars Conference, hosted by the George Washington University Law School in Washington, DC, June 2014.What observers have called the Internet of Things (IoT) presents privacy and security challenges for contemporary society. The conceptual model of the IoT evolved rapidly from technologies used to track parts in industrial supply chain management to a diverse set of smart technologies. This rapid evolution has merged several conceptually distinct technologies into a single, difficult-to-define concept. A key difficulty is defining what constitutes a “thing.” The term has been used to refer both to the things sensed, such as a star or the contents of a refrigerator, and to the things that do the sensing (devices). We argue that the Internet of Things is better conceptualized as an Internet of Devices (IoD) because devices, not things, act in a digital form and connect to the Internet. Along with the other requirements of an effective IoD, technologists and policy makers must develop standards, network protocols, identity management solutions, and governance for the IoD to address privacy and security challenges a priori rather than retrofitted after the fact. Privacy and security cannot easily be added to a system that is already deployed and established. In this paper, we define the IoT and the IoD and summarize the independent technologies from which they have evolved. We provide a five-stage general policy framework for evaluating privacy and security concerns in the IoD. Our framework seeks to provide a consistent approach to evaluating privacy and security concerns across all IoD technologies while remaining flexible enough to adapt to new technical developments

    All the way from … authenticity and distance in world music production

    Get PDF
    World music and the narratives it produces are at the very centre of a formerly transnational production and consumption process. However, the shortened distance between the sites of production and consumption of this good, brought on by migration and greater participation, has created a dilemma for the UK-based artists who perform it: how to maintain authenticity without the added value of ‘distance’. Therefore, the aim of this article is to examine the ways in which musicians and other participants attempt to overcome this problem and in doing so (re)-construct particular aspects of their identity. Rather than being just another critique on authenticity, this article uses distance as an organizing concept in understanding the challenges facing world music production in the UK

    'To live and die [for] Dixie': Irish civilians and the Confederate States of America

    Get PDF
    Around 20,000 Irishmen served in the Confederate army in the Civil War. As a result, they left behind, in various Southern towns and cities, large numbers of friends, family, and community leaders. As with native-born Confederates, Irish civilian support was crucial to Irish participation in the Confederate military effort. Also, Irish civilians served in various supporting roles: in factories and hospitals, on railroads and diplomatic missions, and as boosters for the cause. They also, however, suffered in bombardments, sieges, and the blockade. Usually poorer than their native neighbours, they could not afford to become 'refugees' and move away from the centres of conflict. This essay, based on research from manuscript collections, contemporary newspapers, British Consular records, and Federal military records, will examine the role of Irish civilians in the Confederacy, and assess the role this activity had on their integration into Southern communities. It will also look at Irish civilians in the defeat of the Confederacy, particularly when they came under Union occupation. Initial research shows that Irish civilians were not as upset as other whites in the South about Union victory. They welcomed a return to normalcy, and often 'collaborated' with Union authorities. Also, Irish desertion rates in the Confederate army were particularly high, and I will attempt to gauge whether Irish civilians played a role in this. All of the research in this paper will thus be put in the context of the Drew Gilpin Faust/Gary Gallagher debate on the influence of the Confederate homefront on military performance. By studying the Irish civilian experience one can assess how strong the Confederate national experiment was. Was it a nation without a nationalism

    The Transcriptome of Trichuris suis – First Molecular Insights into a Parasite with Curative Properties for Key Immune Diseases of Humans

    Get PDF
    Iatrogenic infection of humans with Trichuris suis (a parasitic nematode of swine) is being evaluated or promoted as a biological, curative treatment of immune diseases, such as inflammatory bowel disease (IBD) and ulcerative colitis, in humans. Although it is understood that short-term T. suis infection in people with such diseases usually induces a modified Th2-immune response, nothing is known about the molecules in the parasite that induce this response.As a first step toward filling the gaps in our knowledge of the molecular biology of T. suis, we characterised the transcriptome of the adult stage of this nematode employing next-generation sequencing and bioinformatic techniques. A total of ∼65,000,000 reads were generated and assembled into ∼20,000 contiguous sequences ( = contigs); ∼17,000 peptides were predicted and classified based on homology searches, protein motifs and gene ontology and biological pathway mapping.These analyses provided interesting insights into a number of molecular groups, particularly predicted excreted/secreted molecules (n = 1,288), likely to be involved in the parasite-host interactions, and also various molecules (n = 120) linked to chemokine, T-cell receptor and TGF-β signalling as well as leukocyte transendothelial migration and natural killer cell-mediated cytotoxicity, which are likely to be immuno-regulatory or -modulatory in the infected host. This information provides a conceptual framework within which to test the immunobiological basis for the curative effect of T. suis infection in humans against some immune diseases. Importantly, the T. suis transcriptome characterised herein provides a curated resource for detailed studies of the immuno-molecular biology of this parasite, and will underpin future genomic and proteomic explorations

    Precision gestational diabetes treatment: a systematic review and meta-analyses

    Get PDF

    Genotype-stratified treatment for monogenic insulin resistance: a systematic review

    Get PDF

    Evolution of pathogenicity and sexual reproduction in eight Candida genomes

    Get PDF
    Candida species are the most common cause of opportunistic fungal infection worldwide. Here we report the genome sequences of six Candida species and compare these and related pathogens and non-pathogens. There are significant expansions of cell wall, secreted and transporter gene families in pathogenic species, suggesting adaptations associated with virulence. Large genomic tracts are homozygous in three diploid species, possibly resulting from recent recombination events. Surprisingly, key components of the mating and meiosis pathways are missing from several species. These include major differences at the mating-type loci (MTL); Lodderomyces elongisporus lacks MTL, and components of the a1/2 cell identity determinant were lost in other species, raising questions about how mating and cell types are controlled. Analysis of the CUG leucine-to-serine genetic-code change reveals that 99% of ancestral CUG codons were erased and new ones arose elsewhere. Lastly, we revise the Candida albicans gene catalogue, identifying many new genes.publishe

    Finishing the euchromatic sequence of the human genome

    Get PDF
    The sequence of the human genome encodes the genetic instructions for human physiology, as well as rich information about human evolution. In 2001, the International Human Genome Sequencing Consortium reported a draft sequence of the euchromatic portion of the human genome. Since then, the international collaboration has worked to convert this draft into a genome sequence with high accuracy and nearly complete coverage. Here, we report the result of this finishing process. The current genome sequence (Build 35) contains 2.85 billion nucleotides interrupted by only 341 gaps. It covers ∼99% of the euchromatic genome and is accurate to an error rate of ∼1 event per 100,000 bases. Many of the remaining euchromatic gaps are associated with segmental duplications and will require focused work with new methods. The near-complete sequence, the first for a vertebrate, greatly improves the precision of biological analyses of the human genome including studies of gene number, birth and death. Notably, the human enome seems to encode only 20,000-25,000 protein-coding genes. The genome sequence reported here should serve as a firm foundation for biomedical research in the decades ahead
    corecore