92 research outputs found

    Evolving Challenges In Information Security Compliance

    Get PDF
    With the proliferation of computer-driven organizations and internet-based business information systems, the need for security has increased significantly. In addition, information security compliance is becoming a controversial issue among IT professionals. This paper aims to address the concerns arising from compatibility of security standards, compliance cost, certification approval and human involvement that affect compliance management. A unified approach to information security compliance is suggested for organizations seeking to build strong relationships across business and IT departments, improving in that way a company’s security value

    Identifying potentially flawed items in the context of small sample IRT analysis

    Get PDF
    Although Classical Test Theory has been used by the measurement community for almost a century, Item Response Theory has become commonplace for educational assessment development, evaluation and refinement in recent decades. Its potential for improving test items as well as eliminating the ambiguous or misleading ones is substantial. However, in order to estimate its parameters and produce reliable results, IRT requires a large sample size of examinees, thus limiting its use to large-scale testing programs. Nevertheless, the accuracy of parameter estimates becomes of lesser importance when trying to detect items whose parameters exceed a threshold value. Under this consideration, the present study investigates the application of IRT-based assessment evaluation to small sample sizes through a series of simulations. Additionally, it introduces a set of quality indices, which exhibit the success rate of identifying potentially flawed items in a way that test developers without a significant statistical background can easily comprehend and utilize

    Delayed Intraventricular Hemorrhage following a Ventriculoperitoneal Shunt Placement: Exploring the Surgical Anatomy of a Rare Complication

    Get PDF
    Ventriculoperitoneal shunt (VPS) placement is one of the commoner neurosurgical procedures worldwide. The purpose of this article is to report a case of delayed intraventricular hemorrhage (IVH) following a VPS and to review the literature regarding anatomic factors that could potentially explain this rare complication. A 78-year-old man with normal pressure hydrocephalus, who underwent an uneventful right VPS placement, suffered from a catastrophic isolated IVH five days later. The reported cases of delayed intracerebral hemorrhage (ICH) following VPS are rare and those with IVH are even rarer. Potential factors of surgical anatomy that could cause delayed ICH/IVH following a VPS procedure include erosion of vasculature by catheter cannulation, multiple attempts at perforation, puncture of the choroid plexus, improper placement of the tubing within the brain parenchyma, VPS system revision, venous infarction, vascular malformations, head trauma, and brain tumors. Other causes include generalized convulsion, VPS system malfunction, increased intracranial or blood pressure, sudden intracranial hypotension, and bleeding disorders. According to the current literature, our case is the first reported delayed isolated IVH after a VPS placement so far. Neurosurgeons should be aware of the delayed ICH/IVH as a rare, potentially fatal complication of VPS, as well as of its risk factors

    Access Control in Industrial Internet of Things

    Get PDF
    The Industrial Internet of Things (IIoT) is an ecosystem that consists of - among others - various networked sensors and actuators, achieving mainly advancements related with lowering production costs and providing workflow flexibility. Introducing access control in such environments is considered to be challenging, mainly due to the variety of technologies and protocols in IIoT devices and networks. Thus, various access control models and mechanisms should be examined, as well as the additional access control requirements posed by these industrial environments. To achieve these aims, we elaborate on existing state-of-the-art access control models and architectures and investigate access control requirements in IIoT, respectively. These steps provide valuable indications on what type of an access control model and architecture may be beneficial for application in the IIoT. We describe an access control architecture capable of achieving access control in IIoT using a layered approach and based on existing virtualization concepts (e.g., the cloud). Furthermore, we provide information on the functionality of the individual access control related components, as well as where these should be placed in the overall architecture. Considering this research area to be challenging, we finally discuss open issues and anticipate these directions to provide interesting multi-disciplinary insights in both industry and academia

    Extending LMS to Support IRT-Based Assessment Test Calibration

    Get PDF
    Developing unambiguous and challenging assessment material for measuring educational attainment is a time-consuming, labor-intensive process. As a result Computer Aided Assessment (CAA) tools are becoming widely adopted in academic environments in an effort to improve the assessment quality and deliver reliable results of examinee performance. This paper introduces a methodological and architectural framework which embeds a CAA tool in a Learning Management System (LMS) so as to assist test developers in refining items to constitute assessment tests. An Item Response Theory (IRT) based analysis is applied to a dynamic assessment profile provided by the LMS. Test developers define a set of validity rules for the statistical indices given by the IRT analysis. By applying those rules, the LMS can detect items with various discrepancies which are then flagged for review of their content. Repeatedly executing the aforementioned procedure can improve the overall efficiency of the testing process

    What are we eating? Consumer information requirement within a workplace canteen

    Get PDF
    The workplace is a captive environment where the overall contribution of the meal served could be an important element of the overall diet. Despite growing demand little information is available to aid healthy dish selection. This study identifies information valued by consumers in the UK, Greece, Denmark and France using best-worst scaling. Value for Money, Nutrition and Naturalness are key elements of information that consumers require to be able to make a conscious decision about dish selection in all four countries. Latent class analysis shows that consumers align to one of five cluster groups, i.e., Value Driven, Conventionalists, Socially Responsible, Health Conscious and Locavores. Understanding key information needs can allow food operators to align their service with consumer preferences across different market segments

    Oncology and complications.

    Get PDF
    This collection of cases describes some unusual urological tumors and complications related to urological tumors and their treatment. Case 1: A case of uretero-arterial fistula in a patient with long-term ureteral stenting for ureteral oncological stricture and a second case associated to retroperitoneal fibrosis were described. Abdominal CT, pyelography, cystoscopy were useful to show the origin of the bleeding. Angiography is useful for confirming the diagnosis and for subsequent positioning of an endovascular prosthesis which represents a safe approach with reduced post-procedural complications. Case 2: A case of patient who suffered from interstitial pneumonitis during a cycle of intravesical BCG instillations for urothelial cancer. The patient was hospitalized for more than two weeks in a COVID ward for a suspected of COVID-19 pneumonia, but he did not show any evidence of SARS-CoV-2 infection during his hospital stay. Case 3: A case of a young man with a functional urinary bladder paraganglioma who was successfully managed with complete removal of the tumor, leaving the urinary bladder intact. Case 4: A case of a 61 year old male suffering from muscle invasive bladder cancer who was admitted for a radical cystectomy and on the eighth postoperative day developed microangiopathic hemolytic anemia and thrombocytopenia, which clinically defines thrombotic microangiopathy

    Enhanced catecholamine transporter binding in the locus coeruleus of patients with early Parkinson disease

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Studies in animals suggest that the noradrenergic system arising from the locus coeruleus (LC) and dopaminergic pathways mutually influence each other. Little is known however, about the functional state of the LC in patients with Parkinson disease (PD).</p> <p>Methods</p> <p>We retrospectively reviewed clinical and imaging data of 94 subjects with PD at an early clinical stage (Hoehn and Yahr stage 1-2) who underwent single photon computed tomography imaging with FP-CIT ([<sup>123</sup>I] N-ω-fluoropropyl-2β-carbomethoxy-3β-(4-iodophenyl) tropane). FP-CIT binding values from the patients were compared with 15 healthy subjects: using both a voxel-based whole brain analysis and a volume of interest analysis of <it>a priori </it>defined brain regions.</p> <p>Results</p> <p>Average FP-CIT binding in the putamen and caudate nucleus was significantly reduced in PD subjects (43% and 57% on average, respectively; p < 0.001). In contrast, subjects with PD showed an increased binding in the LC (166% on average; p < 0.001) in both analyses. LC-binding correlated negatively with striatal FP-CIT binding values (caudate: contralateral, ρ = -0.28, p < 0.01 and ipsilateral ρ = -0.26, p < 0.01; putamen: contralateral, ρ = -0.29, p < 0.01 and ipsilateral ρ = -0.29, p < 0.01).</p> <p>Conclusions</p> <p>These findings are consistent with an up-regulation of noradrenaline reuptake in the LC area of patients with early stage PD, compatible with enhanced noradrenaline release, and a compensating activity for degeneration of dopaminergic nigrostriatal projections.</p

    Stereotactically Standard Areas: Applied Mathematics in the Service of Brain Targeting in Deep Brain Stimulation

    No full text
    The concept of stereotactically standard areas (SSAs) within human brain nuclei belongs to the knowledge of the modern field of stereotactic brain microanatomy. These are areas resisting the individual variability of the nuclear location in stereotactic space. This paper summarizes the current knowledge regarding SSAs. A mathematical formula of SSAs was recently invented, allowing for their robust, reproducible, and accurate application to laboratory studies and clinical practice. Thus, SSAs open new doors for the application of stereotactic microanatomy to highly accurate brain targeting, which is mainly useful for minimally invasive neurosurgical procedures, such as deep brain stimulation
    corecore