79 research outputs found

    Expression Of Mir-34a In T-cells Infected By Human T-lymphotropic Virus 1

    Get PDF
    Human T-lymphotropic virus 1 (HTLV-1) immortalizes T-cells and is the causative agent of adult T-cell leukemia/lymphoma (ATLL). HTLV-1 replication and transformation are governed by multiple interactions between viral regulatory proteins and host cell factors that remain to be fully elucidated. The present study investigated the impact of HTLV-1 infection on the expression of miR-34a, a microRNA whose expression is downregulated in many types of cancer. Results of RT-PCR assays showed that five out of six HTLV-1-positive cell lines expressed higher levels of miR-34a compared to normal PBMC or purified CD4+ T-cells. ATLL cell line ED, which did not express miR-34a, showed methylation of the miR-34a promoter. Newly infected PBMC and samples from 10 ATLL patients also showed a prominent increase in miR-34a expression compared to PBMC controls. The primary miR-34a transcript expressed in infected cell line C91PL contained binding motifs for NF-kappa B and p53. Pharmacological inhibition of NF-kappa B with Bay 11-7082 indicated that this pathway contributes to sustain miR-34a levels in infected cells. Treatment of infected cell lines with the p53 activator nutlin-3a resulted in a further increase in miR-34a levels, thus confirming it as a transcriptional target of p53. Nutlin-3a-treated cells showed downregulation of known miR-34a targets including the deacetylase SIRT1, which was accompanied by increased acetylation of p53, a substrate of SIRT1. Transfection of C91PL cells with a miR-34a mimic also led to downregulation of mRNA targets including SIRT1 as well as the pro-apoptotic factor BAX. Unlike nutlin-3a, the miR-34a mimic did not cause cell cycle arrest or reduce cell viability. On the other hand, sequestration of miR-34a with a sponge construct resulted in an increase in death of C91PL cells. These findings provide evidence for a functional role for miR-34a in fine-tuning the expression of target genes that influence the turnover of HTLV-1-infected cells

    Mitochondrial Alterations Induced by the p13II Protein of Human T-cell Leukemia Virus Type 1 CRITICAL ROLE OF ARGININE RESIDUES

    Get PDF
    Abstract Human T-cell leukemia virus type 1 encodes a number of "accessory" proteins of unclear function; one of these proteins, p13II, is targeted to mitochondria and disrupts mitochondrial morphology. The present study was undertaken to unravel the function of p13II through (i) determination of its submitochondrial localization and sequences required to alter mitochondrial morphology and (ii) an assessment of the biophysical and biological properties of synthetic peptides spanning residues 9–41 (p139–41), which include the amphipathic mitochondrial-targeting sequence of the protein. p139–41 folded into an α helix in micellar environments. Fractionation and immunogold labeling indicated that full-length p13II accumulates in the inner mitochondrial membrane. p139–41 induced energy-dependent swelling of isolated mitochondria by increasing inner membrane permeability to small cations (Na+, K+) and released Ca2+ from Ca2+-preloaded mitochondria. These effects as well as the ability of full-length p13II to alter mitochondrial morphology in cells required the presence of four arginines, forming the charged face of the targeting signal. The mitochondrial effects of p139–41 were insensitive to cyclosporin A, suggesting that full-length p13II might alter mitochondrial permeability through a permeability transition pore-independent mechanism, thus distinguishing it from the mitochondrial proteins Vpr and X of human immunodeficiency virus type 1 and hepatitis B virus, respectively

    “<i>I do it because they do it</i>”:social-neutralisation in information security practices of Saudi medical interns

    Get PDF
    Successful implementation of information security policies (ISP) and IT controls play an important role in safeguarding patient privacy in healthcare organizations. Our study investigates the factors that lead to healthcare practitioners' neutralisation of ISPs, leading to non-compliance. The study adopted a qualitative approach and conducted a series of semi-structured interviews with medical interns and hospital IT department managers and staff in an academic hospital in Saudi Arabia. The study's findings revealed that the MIs imitate their peers' actions and employ similar justifications when violating ISP dictates. Moreover, MI team superiors' (seniors) ISP non-compliance influence MIs tendency to invoke neutralisation techniques. We found that the trust between the medical team members is an essential social facilitator that motivates MIs to invoke neutralisation techniques to justify violating ISP policies and controls. These findings add new insights that help us to understand the relationship between the social context and neutralisation theory in triggering ISP non-compliance

    Mechanisms of HTLV-1 persistence and transformation

    Get PDF
    Adult T-cell leukaemia (ATL) is caused by the human T-cell lymphotropic virus type 1 (HTLV-1). HTLV-1 has elaborated strategies to persist and replicate in the presence of a strong immune response. In this review, we summarise these mechanisms and their contribution to T-cell transformation and ATL development

    Conference highlights of the 15th international conference on human retrovirology: HTLV and related retroviruses, 4-8 june 2011, Leuven, Gembloux, Belgium

    Get PDF
    The June 2011 15th International Conference on Human Retrovirology: HTLV and Related Viruses marks approximately 30 years since the discovery of HTLV-1. As anticipated, a large number of abstracts were submitted and presented by scientists, new and old to the field of retrovirology, from all five continents. The aim of this review is to distribute the scientific highlights of the presentations as analysed and represented by experts in specific fields of epidemiology, clinical research, immunology, animal models, molecular and cellular biology, and virology

    Shedding Light on Shadow IT: Definition, Related Concepts, and Consequences

    Get PDF
    The use of Information Technology (IT) without the approval and support of the IT department, called shadow IT, has challenged organizations to rethink ways to manage IT resources to cope with the use of unauthorized technologies within organizations. We review the literature on shadow IT to shed light on this phenomenon, discussing the conceptual definition and types, the related concepts, and its consequences. This study, then, is an effort to better understand the phenomenon based on the extant literature. We provide contributions by enhancing the emerging body of knowledge on shadow IT, as well as by suggesting research gaps to be addressed in future research in order to advance on the topic
    • …
    corecore