WorldWideScience

Sample records for non-targeted malicious email

  1. Detecting and combating malicious email

    CERN Document Server

    Ryan, Julie JCH

    2014-01-01

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both perso...

  2. Detecting Targeted Malicious Email through Supervised Classification of Persistent Threat and Recipient Oriented Features

    Science.gov (United States)

    Amin, Rohan Mahesh

    2010-01-01

    Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…

  3. Awareness of Malicious Social Engineering among Facebook Users

    Science.gov (United States)

    Slonka, Kevin J.

    2014-01-01

    With the rapid growth of Facebook, the social networking website is becoming a lucrative target for malicious activity. Users of Facebook therefore should be aware of various malicious attacks and know how to identify them. This research analyzed Facebook users' level of understanding in the domain of malicious social engineering on Facebook. The…

  4. Defending Malicious Script Attacks Using Machine Learning Classifiers

    Directory of Open Access Journals (Sweden)

    Nayeem Khan

    2017-01-01

    Full Text Available The web application has become a primary target for cyber criminals by injecting malware especially JavaScript to perform malicious activities for impersonation. Thus, it becomes an imperative to detect such malicious code in real time before any malicious activity is performed. This study proposes an efficient method of detecting previously unknown malicious java scripts using an interceptor at the client side by classifying the key features of the malicious code. Feature subset was obtained by using wrapper method for dimensionality reduction. Supervised machine learning classifiers were used on the dataset for achieving high accuracy. Experimental results show that our method can efficiently classify malicious code from benign code with promising results.

  5. Abnormally Malicious Autonomous Systems and their Internet Connectivity

    Energy Technology Data Exchange (ETDEWEB)

    Shue, Craig A [ORNL; Kalafut, Prof. Andrew [Grand Valley State University (GVSU), Michigan; Gupta, Prof. Minaxi [Indiana University

    2011-01-01

    While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using ten popular blacklists, plus local spam data, and extensive DNS resolutions based on the contents of the blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted. Yet others account for large fractions of blacklisted IP addresses. Several ASes regularly peer with ASes associated with significant malicious activity. We also find that malicious ASes as a whole differ from benign ones in other properties not obviously related to their malicious activities, such as more frequent connectivity changes with their BGP peers. Overall, we conclude that examining malicious activity at AS granularity can unearth networks with lax security or those that harbor cybercrime.

  6. A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence

    NARCIS (Netherlands)

    M.S. Bargh; A. Padmos; R. Choenni; F. Jansen; N. Stembert

    2015-01-01

    Cyber criminals use phishing emails in high-volume and spear phishing emails in low volume to achieve their malicious objectives. Hereby they inflict financial, reputational, and emotional damages on individuals and organizations. These (spear) phishing attacks get steadily more sophisticated as

  7. Tumor Microenvironment Modulation via Gold Nanoparticles Targeting Malicious Exosomes: Implications for Cancer Diagnostics and Therapy

    Directory of Open Access Journals (Sweden)

    Catarina Roma-Rodrigues

    2017-01-01

    Full Text Available Exosomes are nanovesicles formed in the endosomal pathway with an important role in paracrine and autocrine cell communication. Exosomes secreted by cancer cells, malicious exosomes, have important roles in tumor microenvironment maturation and cancer progression. The knowledge of the role of exosomes in tumorigenesis prompted a new era in cancer diagnostics and therapy, taking advantage of the use of circulating exosomes as tumor biomarkers due to their stability in body fluids and targeting malignant exosomes’ release and/or uptake to inhibit or delay tumor development. In recent years, nanotechnology has paved the way for the development of a plethora of new diagnostic and therapeutic platforms, fostering theranostics. The unique physical and chemical properties of gold nanoparticles (AuNPs make them suitable vehicles to pursuit this goal. AuNPs’ properties such as ease of synthesis with the desired shape and size, high surface:volume ratio, and the possibility of engineering their surface as desired, potentiate AuNPs’ role in nanotheranostics, allowing the use of the same formulation for exosome detection and restraining the effect of malicious exosomes in cancer progression.

  8. Tumor Microenvironment Modulation via Gold Nanoparticles Targeting Malicious Exosomes: Implications for Cancer Diagnostics and Therapy.

    Science.gov (United States)

    Roma-Rodrigues, Catarina; Raposo, Luís R; Cabral, Rita; Paradinha, Fabiana; Baptista, Pedro V; Fernandes, Alexandra R

    2017-01-14

    Exosomes are nanovesicles formed in the endosomal pathway with an important role in paracrine and autocrine cell communication. Exosomes secreted by cancer cells, malicious exosomes, have important roles in tumor microenvironment maturation and cancer progression. The knowledge of the role of exosomes in tumorigenesis prompted a new era in cancer diagnostics and therapy, taking advantage of the use of circulating exosomes as tumor biomarkers due to their stability in body fluids and targeting malignant exosomes' release and/or uptake to inhibit or delay tumor development. In recent years, nanotechnology has paved the way for the development of a plethora of new diagnostic and therapeutic platforms, fostering theranostics. The unique physical and chemical properties of gold nanoparticles (AuNPs) make them suitable vehicles to pursuit this goal. AuNPs' properties such as ease of synthesis with the desired shape and size, high surface:volume ratio, and the possibility of engineering their surface as desired, potentiate AuNPs' role in nanotheranostics, allowing the use of the same formulation for exosome detection and restraining the effect of malicious exosomes in cancer progression.

  9. Detecting Malicious Content on Facebook

    OpenAIRE

    Dewan, Prateek; Kumaraguru, Ponnurangam

    2015-01-01

    Online Social Networks (OSNs) witness a rise in user activity whenever an event takes place. Malicious entities exploit this spur in user-engagement levels to spread malicious content that compromises system reputation and degrades user experience. It also generates revenue from advertisements, clicks, etc. for the malicious entities. Facebook, the world's biggest social network, is no exception and has recently been reported to face much abuse through scams and other type of malicious conten...

  10. Omen: identifying potential spear-phishing targets before the email is sent.

    Energy Technology Data Exchange (ETDEWEB)

    Wendt, Jeremy Daniel.

    2013-07-01

    We present the results of a two year project focused on a common social engineering attack method called "spear phishing". In a spear phishing attack, the user receives an email with information specifically focused on the user. This email contains either a malware-laced attachment or a link to download the malware that has been disguised as a useful program. Spear phishing attacks have been one of the most effective avenues for attackers to gain initial entry into a target network. This project focused on a proactive approach to spear phishing. To create an effective, user-specific spear phishing email, the attacker must research the intended recipient. We believe that much of the information used by the attacker is provided by the target organization's own external website. Thus when researching potential targets, the attacker leaves signs of his research in the webserver's logs. We created tools and visualizations to improve cybersecurity analysts' abilities to quickly understand a visitor's visit patterns and interests. Given these suspicious visitors and log-parsing tools, analysts can more quickly identify truly suspicious visitors, search for potential spear-phishing targeted users, and improve security around those users before the spear phishing email is sent.

  11. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment

    Directory of Open Access Journals (Sweden)

    Zoe M. King

    2018-02-01

    Full Text Available Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing in number and severity globally. To better predict system vulnerabilities, cybersecurity researchers are developing new and more holistic approaches to characterizing cybersecurity system risk. The process must include characterizing the human factors that contribute to cyber security vulnerabilities and risk. Rationality, expertise, and maliciousness are key human characteristics influencing cyber risk within this context, yet maliciousness is poorly characterized in the literature. There is a clear absence of literature pertaining to human factor maliciousness as it relates to cybersecurity and only limited literature relating to aspects of maliciousness in other disciplinary literatures, such as psychology, sociology, and law. In an attempt to characterize human factors as a contribution to cybersecurity risk, the Cybersecurity Collaborative Research Alliance (CSec-CRA has developed a Human Factors risk framework. This framework identifies the characteristics of an attacker, user, or defender, all of whom may be adding to or mitigating against cyber risk. The maliciousness literature and the proposed maliciousness assessment metrics are discussed within the context of the Human Factors Framework and Ontology. Maliciousness is defined as the intent to harm. Most maliciousness cyber research to date has focused on detecting malicious software but fails to analyze an individual’s intent to do harm to others by deploying malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates to cybersecurity, include analyzing motives driving insider threats as well as user profiling analyses. However, cyber-related maliciousness is neither well-studied nor is it well understood because individuals are not forced to expose their true selves to others while performing malicious attacks. Given the difficulty of

  12. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment.

    Science.gov (United States)

    King, Zoe M; Henshel, Diane S; Flora, Liberty; Cains, Mariana G; Hoffman, Blaine; Sample, Char

    2018-01-01

    Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing in number and severity globally. To better predict system vulnerabilities, cybersecurity researchers are developing new and more holistic approaches to characterizing cybersecurity system risk. The process must include characterizing the human factors that contribute to cyber security vulnerabilities and risk. Rationality, expertise, and maliciousness are key human characteristics influencing cyber risk within this context, yet maliciousness is poorly characterized in the literature. There is a clear absence of literature pertaining to human factor maliciousness as it relates to cybersecurity and only limited literature relating to aspects of maliciousness in other disciplinary literatures, such as psychology, sociology, and law. In an attempt to characterize human factors as a contribution to cybersecurity risk, the Cybersecurity Collaborative Research Alliance (CSec-CRA) has developed a Human Factors risk framework. This framework identifies the characteristics of an attacker, user, or defender, all of whom may be adding to or mitigating against cyber risk. The maliciousness literature and the proposed maliciousness assessment metrics are discussed within the context of the Human Factors Framework and Ontology. Maliciousness is defined as the intent to harm. Most maliciousness cyber research to date has focused on detecting malicious software but fails to analyze an individual's intent to do harm to others by deploying malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates to cybersecurity, include analyzing motives driving insider threats as well as user profiling analyses. However, cyber-related maliciousness is neither well-studied nor is it well understood because individuals are not forced to expose their true selves to others while performing malicious attacks. Given the difficulty of interviewing malicious

  13. Characterizing and Measuring Maliciousness for Cybersecurity Risk Assessment

    Science.gov (United States)

    King, Zoe M.; Henshel, Diane S.; Flora, Liberty; Cains, Mariana G.; Hoffman, Blaine; Sample, Char

    2018-01-01

    Cyber attacks have been increasingly detrimental to networks, systems, and users, and are increasing in number and severity globally. To better predict system vulnerabilities, cybersecurity researchers are developing new and more holistic approaches to characterizing cybersecurity system risk. The process must include characterizing the human factors that contribute to cyber security vulnerabilities and risk. Rationality, expertise, and maliciousness are key human characteristics influencing cyber risk within this context, yet maliciousness is poorly characterized in the literature. There is a clear absence of literature pertaining to human factor maliciousness as it relates to cybersecurity and only limited literature relating to aspects of maliciousness in other disciplinary literatures, such as psychology, sociology, and law. In an attempt to characterize human factors as a contribution to cybersecurity risk, the Cybersecurity Collaborative Research Alliance (CSec-CRA) has developed a Human Factors risk framework. This framework identifies the characteristics of an attacker, user, or defender, all of whom may be adding to or mitigating against cyber risk. The maliciousness literature and the proposed maliciousness assessment metrics are discussed within the context of the Human Factors Framework and Ontology. Maliciousness is defined as the intent to harm. Most maliciousness cyber research to date has focused on detecting malicious software but fails to analyze an individual’s intent to do harm to others by deploying malware or performing malicious attacks. Recent efforts to identify malicious human behavior as it relates to cybersecurity, include analyzing motives driving insider threats as well as user profiling analyses. However, cyber-related maliciousness is neither well-studied nor is it well understood because individuals are not forced to expose their true selves to others while performing malicious attacks. Given the difficulty of interviewing

  14. Indicators of Malicious SSL Connections

    NARCIS (Netherlands)

    Bortolameotti, Riccardo; Peter, Andreas; Everts, Maarten Hinderik; Bolzoni, D.

    2015-01-01

    Internet applications use SSL to provide data confidential- ity to communicating entities. The use of encryption in SSL makes it impossible to distinguish between benign and malicious connections as the content cannot be inspected. Therefore, we propose and evaluate a set of indicators for malicious

  15. Indicators of malicious SSL connections

    NARCIS (Netherlands)

    Bortolameotti, R.; Peter, A.; Everts, M.H.; Bolzoni, D.

    2015-01-01

    Internet applications use SSL to provide data confidentiality to communicating entities. The use of encryption in SSL makes it impossible to distinguish between benign and malicious connections as the content cannot be inspected. Therefore, we propose and evaluate a set of indicators for malicious

  16. A security approach based on honeypots: Protecting Online Social network from malicious profiles

    Directory of Open Access Journals (Sweden)

    Fatna Elmendili, Nisrine Maqran

    2017-04-01

    Full Text Available In the recent years, the fast development and the exponential utilization of social networks have prompted an expansion of social Computing. In social networks users are interconnected by edges or links, where Facebook, twitter, LinkedIn are most popular social networks websites. Due to the growing popularity of these sites they serve as a target for cyber criminality and attacks. It is mostly based on how users are using these sites like Twitter and others. Attackers can easily access and gather personal and sensitive user’s information. Users are less aware and least concerned about the security setting. And they easily become victim of identity breach. To detect malicious users or fake profiles different techniques have been proposed like our approach which is based on the use of social honeypots to discover malicious profiles in it. Inspired by security researchers who used honeypots to observe and analyze malicious activity in the networks, this method uses social honeypots to trap malicious users. The two key elements of the approach are: (1 The deployment of social honeypots for harvesting information of malicious profiles. (2 Analysis of the characteristics of these malicious profiles and those of deployed honeypots for creating classifiers that allow to filter the existing profiles and monitor the new profiles.

  17. Major Cyber threat on Nuclear Facility and Key Entry Points of Malicious Codes

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Ickhyun; Kwon, Kookheui [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2013-05-15

    Cyber security incident explicitly shows that the domestic intra net system which is not connected to the Internet can be compromised by the USB based mal ware which was developed by the state-sponsored group. It also tells that the actor for cyber-attack has been changed from script kiddies to state's governments and the target has been changed to nation's main infrastructures such as electricity, transportation and etc. Since the cyber sabotage on nuclear facility has been proven to be possible and can be replicated again with same method, the cyber security on nuclear facility must be strengthened. In this paper, it is explained why the malicious code is the one of the biggest cyber threat in nuclear facility's digital I and C(Instrumentation and Controls) system by analyzing recent cyber attacks and well-known malicious codes. And a feasible cyber attack scenario on nuclear facility's digital I and C system is suggested along with some security measures for prevention of malicious code. As experienced from the cyber sabotage on Iranian nuclear facility in 2010, cyber attack on nuclear facility can be replicated by infecting the computer network with malicious codes. One of the cyber attack scenario on nuclear digital I and C computer network with using malicious code was suggested to help security manager establishing cyber security plan for prevention of malicious code. And some security measures on prevention of malicious code are also provided for reference.

  18. Major Cyber threat on Nuclear Facility and Key Entry Points of Malicious Codes

    International Nuclear Information System (INIS)

    Shin, Ickhyun; Kwon, Kookheui

    2013-01-01

    Cyber security incident explicitly shows that the domestic intra net system which is not connected to the Internet can be compromised by the USB based mal ware which was developed by the state-sponsored group. It also tells that the actor for cyber-attack has been changed from script kiddies to state's governments and the target has been changed to nation's main infrastructures such as electricity, transportation and etc. Since the cyber sabotage on nuclear facility has been proven to be possible and can be replicated again with same method, the cyber security on nuclear facility must be strengthened. In this paper, it is explained why the malicious code is the one of the biggest cyber threat in nuclear facility's digital I and C(Instrumentation and Controls) system by analyzing recent cyber attacks and well-known malicious codes. And a feasible cyber attack scenario on nuclear facility's digital I and C system is suggested along with some security measures for prevention of malicious code. As experienced from the cyber sabotage on Iranian nuclear facility in 2010, cyber attack on nuclear facility can be replicated by infecting the computer network with malicious codes. One of the cyber attack scenario on nuclear digital I and C computer network with using malicious code was suggested to help security manager establishing cyber security plan for prevention of malicious code. And some security measures on prevention of malicious code are also provided for reference

  19. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  20. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection

    KAUST Repository

    Wang, Wei; Wang, Xing; Feng, Dawei; Liu, Jiqiang; Han, Zhen; Zhang, Xiangliang

    2014-01-01

    Android has been a major target of malicious applications (malapps). How to detect and keep the malapps out of the app markets is an ongoing challenge. One of the central design points of Android security mechanism is permission control

  1. Finding Malicious Cyber Discussions in Social Media

    Science.gov (United States)

    2016-02-02

    reverse engineering, security, malware , blackhat) were labeled as cyber and posts on non- cyber topics (e.g., astronomy, electronics, beer, biology, mu...firewall, hash, infect, inject, install, key, malicious, malware , network, obfuscate, overflow, packet, password, payload, request, risk, scan, script...cyber vulnerabilities (e.g., malware , overflow, attack). The keyword system lacked the keywords used in Heartbleed discussions, and thus suffered from

  2. Analysis of Malicious Traffic in Modbus/TCP Communications

    Science.gov (United States)

    Kobayashi, Tiago H.; Batista, Aguinaldo B.; Medeiros, João Paulo S.; Filho, José Macedo F.; Brito, Agostinho M.; Pires, Paulo S. Motta

    This paper presents the results of our analysis about the influence of Information Technology (IT) malicious traffic on an IP-based automation environment. We utilized a traffic generator, called MACE (Malicious trAffic Composition Environment), to inject malicious traffic in a Modbus/TCP communication system and a sniffer to capture and analyze network traffic. The realized tests show that malicious traffic represents a serious risk to critical information infrastructures. We show that this kind of traffic can increase latency of Modbus/TCP communication and that, in some cases, can put Modbus/TCP devices out of communication.

  3. Malicious Cognitive User Identification Algorithm in Centralized Spectrum Sensing System

    Directory of Open Access Journals (Sweden)

    Jingbo Zhang

    2017-11-01

    Full Text Available Collaborative spectral sensing can fuse the perceived results of multiple cognitive users, and thus will improve the accuracy of perceived results. However, the multi-source features of the perceived results result in security problems in the system. When there is a high probability of a malicious user attack, the traditional algorithm can correctly identify the malicious users. However, when the probability of attack by malicious users is reduced, it is almost impossible to use the traditional algorithm to correctly distinguish between honest users and malicious users, which greatly reduces the perceived performance. To address the problem above, based on the β function and the feedback iteration mathematical method, this paper proposes a malicious user identification algorithm under multi-channel cooperative conditions (β-MIAMC, which involves comprehensively assessing the cognitive user’s performance on multiple sub-channels to identify the malicious user. Simulation results show under the same attack probability, compared with the traditional algorithm, the β-MIAMC algorithm can more accurately identify the malicious users, reducing the false alarm probability of malicious users by more than 20%. When the attack probability is greater than 7%, the proposed algorithm can identify the malicious users with 100% certainty.

  4. Enhancement of Email Security in Nuclear Malaysia

    International Nuclear Information System (INIS)

    Mohd Fauzi Haris; Raja Murzaferi Raja Moktar; Saaidi Ismail; Mohd Dzul Aiman Aslan; Mohamad Safuan Sulaiman

    2013-01-01

    Task to protect network and data security is not simple and easy. The more advance ICT technology available in the market, the more dependability to the knowledge, skills and appropriate tools would be in order one to cater these threats. Cyber security threats can be considered almost impossible to be demolished or at least to be avoided totally and what we really need is technical capabilities that may include appropriate knowledge and tools to reduce the cyber threats in the organization. Email is one of the important today's application that is being used by many people all around the globe either they are in corporate organizations, government bodies, students and teachers. The total number of worldwide email accounts is expected to increase from 3.3 billion accounts in 2012 to over 4.3 billion accounts by year-end 2016. This represents an average annual growth rate of 6% over the next four years [1]. Parallel with the increment of the usage, number of abusive and misuse of the email is also reported either in the form of spamming, delivery of malicious file attachments, phishing and others. These show the importance to tighten up the security of the email. This paper will discuss and share actions that have been taken by IT Center to enhance the security of official email application. (author)

  5. Behavioral analysis of malicious code through network traffic and system call monitoring

    Science.gov (United States)

    Grégio, André R. A.; Fernandes Filho, Dario S.; Afonso, Vitor M.; Santos, Rafael D. C.; Jino, Mario; de Geus, Paulo L.

    2011-06-01

    Malicious code (malware) that spreads through the Internet-such as viruses, worms and trojans-is a major threat to information security nowadays and a profitable business for criminals. There are several approaches to analyze malware by monitoring its actions while it is running in a controlled environment, which helps to identify malicious behaviors. In this article we propose a tool to analyze malware behavior in a non-intrusive and effective way, extending the analysis possibilities to cover malware samples that bypass current approaches and also fixes some issues with these approaches.

  6. N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents

    Directory of Open Access Journals (Sweden)

    Pallavi Bagga

    2017-12-01

    Full Text Available From many past years, the detection of unknown malicious mobile agents before they invade the Mobile Agent Platform has been the subject of much challenging activity. The ever-growing threat of malicious agents calls for techniques for automated malicious agent detection. In this context, the machine learning (ML methods are acknowledged more effective than the Signature-based and Behavior-based detection methods. Therefore, in this paper, the prime contribution has been made to detect the unknown malicious mobile agents based on n-gram features and supervised ML approach, which has not been done so far in the sphere of the Mobile Agents System (MAS security. To carry out the study, the n-grams ranging from 3 to 9 are extracted from a dataset containing 40 malicious and 40 non-malicious mobile agents. Subsequently, the classification is performed using different classifiers. A nested 5-fold cross validation scheme is employed in order to avoid the biasing in the selection of optimal parameters of classifier. The observations of extensive experiments demonstrate that the work done in this paper is suitable for the task of unknown malicious mobile agent detection in a Mobile Agent Environment, and also adds the ML in the interest list of researchers dealing with MAS security.

  7. Fast and maliciously secure two-party computation using the GPU

    DEFF Research Database (Denmark)

    Frederiksen, Tore Kasper; Nielsen, Jesper Buus

    2013-01-01

    We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two-party compu......-party computation in a financially feasible and practical setting by using a consumer grade CPU and GPU. Our protocol further uses some novel constructions in order to combine garbled circuits and an OT extension in a parallel and maliciously secure setting.......We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two...

  8. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  9. On the requirements to establish a European radiological preparedness for malicious airborne dispersion scenarios

    DEFF Research Database (Denmark)

    Andersson, Kasper Grann; Astrup, Poul; Roos, Per

    2011-01-01

    European computerised decision support systems are currently targeted for large accidental atmospheric contaminant releases from nuclear installations. To make these systems applicable also for malicious dispersion events, such as ‘dirty bomb’ blasts, a series of modifications and extensions are ...

  10. Leveraging Client-Side DNS Failure Patterns to Identify Malicious Behaviors

    Science.gov (United States)

    2015-09-28

    malicious behavior found in our dataset and (ii) to create ground truth to evaluate the system proposed in Section V. We begin by removing those cases that...2011. [10] S. Hao, N. Feamster, and R. Pandrangi, “Monitoring the Initial DNS Behavior of Malicious Domains,” in ACM IMC , 2011. [11] R. Perdisci et...distribution is unlimited. Leveraging Client-Side DNS Failure Patterns to Identify Malicious Behaviors The views, opinions and/or findings contained in

  11. E-mail marketing

    OpenAIRE

    TŮMOVÁ, Kateřina

    2012-01-01

    The aim of this work is to specify the e-mail marketing and in the practical application to evaluate the pros and cons of e-mail marketing as a tool of targeted marketing communication.Based on personal interviews with representatives of the company was described their existing e-mail marketing.Through the survey it was found, how customers perceive the company's e-mail marketing.Based on the survey, changes were proposed at the end of the thesis.

  12. Computer Security: e-mail is broken and there is nothing we can do

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    Have you ever received an e-mail from a friend or someone you know and been surprised or appalled by its contents? Or, worse, have you have received a response to an e-mail that wasn’t written by you? Maybe with similarly surprising or appalling contents? If yes, welcome to the insecurity of the mail protocol, where nothing is as it seems…   No, this time we are not talking about “phishing” or malicious attachments but the very basics of the e-mail protocol. “SMTP” aka the “Simple Mail Transfer Protocol” is exactly what it says: very simple! In many respects, e-mails are identical to physical hand-written letters: you cannot deduce from the sender’s address nor from the message text whether it has really been sent by that person. Impersonation has never been as easy as with the SMTP protocol. Due to its simple design, I can pretend to be Mickey Mouse, Harry Potter or anyone else, and send you text messages...

  13. Research on Propagation Model of Malicious Programs in Ad Hoc Wireless Network

    Directory of Open Access Journals (Sweden)

    Weimin GAO

    2014-01-01

    Full Text Available Ad Hoc wireless network faces more security threats than traditional network due to its P2P system structure and the limited node resources. In recent years, malicious program has become one of the most important researches on international network security and information security. The research of malicious programs on wireless network has become a new research hotspot in the field of malicious programs. This paper first analyzed the Ad Hoc network system structure, security threats, the common classification of malicious programs and the bionic propagation model. Then starting from the differential equations of the SEIR virus propagation model, the question caused by introducing the SEIR virus propagation model in Ad Hoc wireless network was analyzed. This paper improved the malicious program propagation model through introducing the network topology features and concepts such as immunization delay, and designed an improved algorithm combined with the dynamic evolution of malware propagation process. Considering of the network virus propagation characteristics, network characteristics and immunization strategy to improve simulation model experiment analysis, the experimental results show that both the immunization strategy and the degrees of node can affect the propagation of malicious program.

  14. RECEIVING UNWANTED EMAIL?

    CERN Multimedia

    Denise Heagerty

    2002-01-01

    Unsolicited email, commonly known as SPAM, is a growing problem across the Internet at large. You are recommended to delete it. If the email looks suspicious, do not even open it (from Outlook you can delete email using the right button of your mouse to select the message and then selecting delete). Viruses are often hidden inside attachments, so do not open attachments in unsolicited email. SPAM and virus emails can be disguised to trick you into reading the email and/or performing an action. Here are examples of some techniques to help you recognise them: fake email addresses: emails can appear to be from people you know or even from yourself. Your own email address can appear in emails which you did not send, resulting in non-delivery messages or unexpected replies. Fake addresses may be used to send viruses. If the email looks suspicious then delete it and do not open the attachments. If you are unsure then check with the sender first. enticing subjects: the email subject uses words to make you curious...

  15. Detecting Malicious Code by Binary File Checking

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2014-01-01

    Full Text Available The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects. A direct content change is possible when the intruder knows the structural information of the binary file. The paper describes the structural properties of the binary object files, how the content can be controlled by a possible intruder and what the ways to identify malicious code in such kind of files. Because the object files are inputs in linking processes, early detection of the malicious content is crucial to avoid infection of the binary executable files.

  16. Dynamic detection technology of malicious code for Android system

    Directory of Open Access Journals (Sweden)

    Li Boya

    2017-02-01

    Full Text Available With the increasing popularization of mobile phones,people's dependence on them is rising,the security problems become more and more prominent.According to the calling of the APK file permission and the API function in Android system,this paper proposes a dynamic detecting method based on API interception technology to detect the malicious code.The experimental results show that this method can effectively detect the malicious code in Android system.

  17. Cisco Router and Switch Forensics Investigating and Analyzing Malicious Network Activity

    CERN Document Server

    Liu, Dale

    2009-01-01

    Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book current

  18. Detection of Malicious Flash Banner Advertisements

    Directory of Open Access Journals (Sweden)

    Kirill Alekseevich Samosadnyy

    2014-09-01

    Full Text Available The paper addresses the problem of detecting malicious flash advertisements. As a result, detection method based on dynamic analysis that modify flash application and execute it in Adobe Flash player is proposed and evaluated on synthetic and real world examples.

  19. Understanding the spread of malicious mobile-phone programs and their damage potential

    OpenAIRE

    Wang, Pu; Gonzalez, Marta C.; Menezes, Ronaldo; Barabási, Albert-László

    2013-01-01

    The fast growing market for smart phones coupled with their almost constant on-line presence makes these devices the new targets of malicious code (virus) writers. To aggravate the issue, the security level of these devices is far below the state-of-the art of what is used in personal computers. It has been recently found that the topological spread of multimedia message service (MMS) viruses is highly restricted by the underlying fragmentation of the call graph—the term topological here refe...

  20. Leveling up and down: the experiences of benign and malicious envy.

    Science.gov (United States)

    van de Ven, Niels; Zeelenberg, Marcel; Pieters, Rik

    2009-06-01

    Envy is the painful emotion caused by the good fortune of others. This research empirically supports the distinction between two qualitatively different types of envy, namely benign and malicious envy. It reveals that the experience of benign envy leads to a moving-up motivation aimed at improving one's own position, whereas the experience of malicious envy leads to a pulling-down motivation aimed at damaging the position of the superior other. Study 1 used guided recall of the two envy types in a culture (the Netherlands) that has separate words for benign and malicious envy. Analyses of the experiential content of these emotions found the predicted differences. Study 2 and 3 used one sample from the United States and one from Spain, respectively, where a single word exists for both envy types. A latent class analysis based on the experiential content of envy confirmed the existence of separate experiences of benign and malicious envy in both these cultures as well. The authors discuss the implications of distinguishing the two envy types for theories of cooperation, group performance, and Schadenfreude.

  1. Identification of Malicious Web Pages by Inductive Learning

    Science.gov (United States)

    Liu, Peishun; Wang, Xuefang

    Malicious web pages are an increasing threat to current computer systems in recent years. Traditional anti-virus techniques focus typically on detection of the static signatures of Malware and are ineffective against these new threats because they cannot deal with zero-day attacks. In this paper, a novel classification method for detecting malicious web pages is presented. This method is generalization and specialization of attack pattern based on inductive learning, which can be used for updating and expanding knowledge database. The attack pattern is established from an example and generalized by inductive learning, which can be used to detect unknown attacks whose behavior is similar to the example.

  2. The Impact of a Targeted Training Program on E-Mail System Processing Capabilities and Self-Perception of E-Mail Overload

    Science.gov (United States)

    Einstein, Michael M.

    2014-01-01

    As business e-mail volumes continue to grow and employees spend increasingly larger portions of their day processing e-mail, there is strong evidence of the negative impacts of e-mail processing, especially with respect to e-mail overload. This study sought to determine whether a training program focused on select e-mail features and processing…

  3. Dispositional envy revisited: unraveling the motivational dynamics of benign and malicious envy.

    Science.gov (United States)

    Lange, Jens; Crusius, Jan

    2015-02-01

    Previous research has conceptualized dispositional envy as a unitary construct. Recently however, episodic envy has been shown to emerge in two qualitatively different forms. Benign envy is related to the motivation to move upward, whereas malicious envy is related to pulling superior others down. In four studies (N = 1,094)--using the newly developed Benign and Malicious Envy Scale (BeMaS)--we show that dispositional envy is also characterized by two independent dimensions related to distinct motivational dynamics and behavioral consequences. Dispositional benign and malicious envy uniquely predict envious responding following upward social comparisons. Furthermore, they are differentially connected to hope for success and fear of failure. Corresponding to these links, dispositional benign envy predicted faster race performance of marathon runners mediated via higher goal setting. In contrast, dispositional malicious envy predicted race goal disengagement. The findings highlight that disentangling the two sides of envy opens up numerous research avenues. © 2014 by the Society for Personality and Social Psychology, Inc.

  4. Improving email strategies to target stress and productivity in clinical practice.

    Science.gov (United States)

    Armstrong, Melissa J

    2017-12-01

    Physician burnout is gaining increased attention in medicine and neurology and often relates to hours worked and insufficient time. One component of this is administrative burden, which relates to regulatory requirements and electronic health record tasks but may also involve increased time spent processing emails. Research in academic medical centers demonstrates that physicians face increasing inbox sizes related to mass distribution emails from various sources on top of emails required for patient care, research, and teaching. This commentary highlights the contribution of administrative tasks to physician burnout, research to date on email in medical contexts, and corporate strategies for reducing email burden that are applicable to neurology clinical practice. Increased productivity and decreased stress can be achieved by limiting the amount one accesses email, managing inbox size, and utilizing good email etiquette. Department and practice physician leaders have roles in decreasing email volume and modeling good practice.

  5. Hiding in Plain Sight: The Anatomy of Malicious Facebook Pages

    OpenAIRE

    Dewan, Prateek; Kumaraguru, Ponnurangam

    2015-01-01

    Facebook is the world's largest Online Social Network, having more than 1 billion users. Like most other social networks, Facebook is home to various categories of hostile entities who abuse the platform by posting malicious content. In this paper, we identify and characterize Facebook pages that engage in spreading URLs pointing to malicious domains. We used the Web of Trust API to determine domain reputations of URLs published by pages, and identified 627 pages publishing untrustworthy info...

  6. Effect of Gratitude on Benign and Malicious Envy: The Mediating Role of Social Support.

    Science.gov (United States)

    Xiang, Yanhui; Chao, Xiaomei; Ye, Yanyan

    2018-01-01

    Gratitude has been investigated in various areas in psychology. The present research showed that gratitude had some positive effects on some aspects of our life, such as subjective well-being, life satisfaction, and social relationships. It can also help us relieve negative emotions. However, the existing literature has not studied the influence of gratitude on envy. The present study used structural equation modeling to test the mediating role of social support between gratitude and two types of envy (malicious and benign). We recruited 426 Chinese undergraduates to complete the Gratitude Questionnaire, Malicious and Benign Envy Scales, and the Multi-Dimensional Scale of Perceived Social Support. Results showed that gratitude positively predicted benign envy and negatively predicted malicious envy. In addition, the indirect effect of gratitude on two types of envy via social support was significant. These results revealed the direct relationship between gratitude and malicious/benign envy, and the mediating effect of social support, which will contribute to find effective measures to inhibit malicious envy and promote benign envy from the perspective of cultivating gratitude and increasing individuals' social support.

  7. Effect of Gratitude on Benign and Malicious Envy: The Mediating Role of Social Support

    Science.gov (United States)

    Xiang, Yanhui; Chao, Xiaomei; Ye, Yanyan

    2018-01-01

    Gratitude has been investigated in various areas in psychology. The present research showed that gratitude had some positive effects on some aspects of our life, such as subjective well-being, life satisfaction, and social relationships. It can also help us relieve negative emotions. However, the existing literature has not studied the influence of gratitude on envy. The present study used structural equation modeling to test the mediating role of social support between gratitude and two types of envy (malicious and benign). We recruited 426 Chinese undergraduates to complete the Gratitude Questionnaire, Malicious and Benign Envy Scales, and the Multi-Dimensional Scale of Perceived Social Support. Results showed that gratitude positively predicted benign envy and negatively predicted malicious envy. In addition, the indirect effect of gratitude on two types of envy via social support was significant. These results revealed the direct relationship between gratitude and malicious/benign envy, and the mediating effect of social support, which will contribute to find effective measures to inhibit malicious envy and promote benign envy from the perspective of cultivating gratitude and increasing individuals' social support. PMID:29867595

  8. Effect of Gratitude on Benign and Malicious Envy: The Mediating Role of Social Support

    Directory of Open Access Journals (Sweden)

    Yanhui Xiang

    2018-05-01

    Full Text Available Gratitude has been investigated in various areas in psychology. The present research showed that gratitude had some positive effects on some aspects of our life, such as subjective well-being, life satisfaction, and social relationships. It can also help us relieve negative emotions. However, the existing literature has not studied the influence of gratitude on envy. The present study used structural equation modeling to test the mediating role of social support between gratitude and two types of envy (malicious and benign. We recruited 426 Chinese undergraduates to complete the Gratitude Questionnaire, Malicious and Benign Envy Scales, and the Multi-Dimensional Scale of Perceived Social Support. Results showed that gratitude positively predicted benign envy and negatively predicted malicious envy. In addition, the indirect effect of gratitude on two types of envy via social support was significant. These results revealed the direct relationship between gratitude and malicious/benign envy, and the mediating effect of social support, which will contribute to find effective measures to inhibit malicious envy and promote benign envy from the perspective of cultivating gratitude and increasing individuals' social support.

  9. A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment

    Science.gov (United States)

    Lee, Kijeong; Tolentino, Randy S.; Park, Gil-Cheol; Kim, Yong-Tae

    Recently, the interest and demands for mobile communications are growing so fast because of the increasing prevalence of smartphones around the world. In addition, the existing feature phones were replaced by smartphones and it has widely improved while using the explosive growth of Internet users using smartphones, e-commerce enabled Internet banking transactions and the importance of protecting personal information. Therefore, the development of smartphones antivirus products was developed and launched in order to prevent malicious code or virus infection. In this paper, we proposed a new scheme to protect the smartphone from malicious codes and malicious applications that are element of security threats in mobile environment and to prevent information leakage from malicious code infection. The proposed scheme is based on the white list smartphone application which only allows installing authorized applications and to prevent the installation of malicious and untrusted mobile applications which can possibly infect the applications and programs of smartphones.

  10. STUDENTS WRITING EMAILS TO FACULTY: AN EXAMINATION OF E-POLITENESS AMONG NATIVE AND NON-NATIVE SPEAKERS OF ENGLISH

    Directory of Open Access Journals (Sweden)

    Sigrun Biesenbach-Lucas

    2007-02-01

    Full Text Available This study combines interlanguage pragmatics and speech act research with computer-mediated communication and examines how native and non-native speakers of English formulate low- and high-imposition requests to faculty. While some research claims that email, due to absence of non-verbal cues, encourages informal language, other research has claimed the opposite. However, email technology also allows writers to plan and revise messages before sending them, thus affording the opportunity to edit not only for grammar and mechanics, but also for pragmatic clarity and politeness.The study examines email requests sent by native and non-native English speaking graduate students to faculty at a major American university over a period of several semesters and applies Blum-Kulka, House, and Kasper’s (1989 speech act analysis framework – quantitatively to distinguish levels of directness, i.e. pragmatic clarity; and qualitatively to compare syntactic and lexical politeness devices, the request perspectives, and the specific linguistic request realization patterns preferred by native and non-native speakers. Results show that far more requests are realized through direct strategies as well as hints than conventionally indirect strategies typically found in comparative speech act studies. Politeness conventions in email, a text-only medium with little guidance in the academic institutional hierarchy, appear to be a work in progress, and native speakers demonstrate greater resources in creating e-polite messages to their professors than non-native speakers. A possible avenue for pedagogical intervention with regard to instruction in and acquisition of politeness routines in hierarchically upward email communication is presented.

  11. Behavior Analysis Usage with Behavior Tures Adoption for Malicious Code Detection on JAVASCRIPT Scenarios Example

    Directory of Open Access Journals (Sweden)

    Y. M. Tumanov

    2010-03-01

    Full Text Available The article offers the method of malicious JavaScript code detection, based on behavior analysis. Conceptions of program behavior, program state, an algorithm of malicious code detection are described.

  12. Development of a Malicious Insider Composite Vulnerability Assessment Methodology

    National Research Council Canada - National Science Library

    King, William H

    2006-01-01

    .... There are very few vulnerability and impact models capable of providing information owners with the ability to comprehensively assess the effectiveness an organization's malicious insider mitigation strategies...

  13. Facework in Non-Face-Threatening Emails by Native and Non-Native English Speakers

    Directory of Open Access Journals (Sweden)

    - Зохре Ислами Р

    2015-12-01

    Full Text Available The aim of this research is to investigate the speech act of assignment submission and presence of facework in submission emails sent to faculty members by native and nonnative English speaking graduate students. Brown and Levinson’s politeness theory (1987 and Spencer-Oatey’s (2002, 2008 rapport management framework were utilized to analyze the emails. The corpus consisted of 105 emails from 40 NES and NNES students. Drawing on speech event analysis approach (Merrison, Wilson, Davies, & Haugh, 2012, we analyze both submission head act as well as optional elements like openings, small talk and closings in an email. Our exploratory study revealed that, contrary to the argument that CMC is a lean medium (Duthler, 2006 in which it is difficult to achieve interpersonal communication, through the employment of opening, small talk and closing strategies, students attended to relational goals in their email communication.

  14. The Enemy Within: The Emerging Threats to Healthcare from Malicious Mobile Devices

    OpenAIRE

    Zawoad, Shams; Hasan, Ragib

    2012-01-01

    With the proliferation of wireless networks, mobile devices and medical devices are increasingly being equipped with wireless interfaces, such as Bluetooth and WiFi to allow easy access to and control of the medical devices. Unfortunately, the very presence and usage of such interfaces also expose the medical devices to novel attacks from malicious parties. The emerging threat from malicious mobile devices is significant and severe, since attackers can steal confidential data from a patient's...

  15. Product Offerings in Malicious Hacker Markets

    OpenAIRE

    Marin, Ericsson; Diab, Ahmad; Shakarian, Paulo

    2016-01-01

    Marketplaces specializing in malicious hacking products - including malware and exploits - have recently become more prominent on the darkweb and deepweb. We scrape 17 such sites and collect information about such products in a unified database schema. Using a combination of manual labeling and unsupervised clustering, we examine a corpus of products in order to understand their various categories and how they become specialized with respect to vendor and marketplace. This initial study prese...

  16. System for Malicious Node Detection in IPv6-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kresimir Grgic

    2016-01-01

    Full Text Available The trend of implementing the IPv6 into wireless sensor networks (WSNs has recently occurred as a consequence of a tendency of their integration with other types of IP-based networks. The paper deals with the security aspects of these IPv6-based WSNs. A brief analysis of security threats and attacks which are present in the IPv6-based WSN is given. The solution to an adaptive distributed system for malicious node detection in the IPv6-based WSN is proposed. The proposed intrusion detection system is based on distributed algorithms and a collective decision-making process. It introduces an innovative concept of probability estimation for malicious behaviour of sensor nodes. The proposed system is implemented and tested through several different scenarios in three different network topologies. Finally, the performed analysis showed that the proposed system is energy efficient and has a good capability to detect malicious nodes.

  17. Quantitative modeling of responses to chronic ionizing radiation exposure using targeted and non-targeted effects.

    Directory of Open Access Journals (Sweden)

    Igor Shuryak

    Full Text Available The biological effects of chronic ionizing radiation exposure can be difficult to study, but important to understand in order to protect the health of occupationally-exposed persons and victims of radiological accidents or malicious events. They include targeted effects (TE caused by ionizations within/close to nuclear DNA, and non-targeted effects (NTE caused by damage to other cell structures and/or activation of stress-signaling pathways in distant cells. Data on radiation damage in animal populations exposed over multiple generations to wide ranges of dose rates after the Chernobyl nuclear-power-plant accident are very useful for enhancing our understanding of these processes. We used a mechanistically-motivated mathematical model which includes TE and NTE to analyze a large published data set on chromosomal aberrations in pond snail (Lymnaea stagnalis embryos collected over 16 years from water bodies contaminated by Chernobyl fallout, and from control locations. The fraction of embryo cells with aberrations increased dramatically (>10-fold and non-linearly over a dose rate range of 0.03-420 μGy/h (0.00026-3.7 Gy/year. NTE were very important for describing the non-linearity of this radiation response: the TE-only model (without NTE performed dramatically worse than the TE+NTE model. NTE were predicted to reach ½ of maximal intensity at 2.5 μGy/h (0.022 Gy/year and to contribute >90% to the radiation response slope at dose rates <11 μGy/h (0.1 Gy/year. Internally-incorporated 90Sr was possibly more effective per unit dose than other radionuclides. The radiation response shape for chromosomal aberrations in snail embryos was consistent with data for a different endpoint: the fraction of young amoebocytes in adult snail haemolymph. Therefore, radiation may affect different snail life stages by similar mechanisms. The importance of NTE in our model-based analysis suggests that the search for modulators of NTE-related signaling pathways

  18. Protect Heterogeneous Environment Distributed Computing from Malicious Code Assignment

    Directory of Open Access Journals (Sweden)

    V. S. Gorbatov

    2011-09-01

    Full Text Available The paper describes the practical implementation of the protection system of heterogeneous environment distributed computing from malicious code for the assignment. A choice of technologies, development of data structures, performance evaluation of the implemented system security are conducted.

  19. Accuracy comparison among different machine learning techniques for detecting malicious codes

    Science.gov (United States)

    Narang, Komal

    2016-03-01

    In this paper, a machine learning based model for malware detection is proposed. It can detect newly released malware i.e. zero day attack by analyzing operation codes on Android operating system. The accuracy of Naïve Bayes, Support Vector Machine (SVM) and Neural Network for detecting malicious code has been compared for the proposed model. In the experiment 400 benign files, 100 system files and 500 malicious files have been used to construct the model. The model yields the best accuracy 88.9% when neural network is used as classifier and achieved 95% and 82.8% accuracy for sensitivity and specificity respectively.

  20. WPMSD: A Malicious Script Detection Method Inspired by the Process of Immunoglobulin Secretion

    Directory of Open Access Journals (Sweden)

    Hui Zhao

    2011-10-01

    Full Text Available Inspired by the process of immunoglobulin secretion in biological body, we present a Web Page Malicious Script Detection Method (WPMSD. In this paper, Firstly, the basic definitions of artificial immune items are given. Secondly, according to the spreading range of malicious script, the immunoglobulin number is changed as the detector clone proliferation is stimulated by malicious scripts. Further more, the nonlinear dynamics of antibody number is discussed. Thirdly, we propose a probability approach to trigger alarms to inform that the detected scripts are harmful. Finally, the WPMSD collects the effective immunoglobulin set based on Hidden Markov Model (HMM to update the detector gene library. Compared with the traditional immune based detection methods, such as Negative Selection Algorithm (NSA, Dynamic Colonel Selection (DynamiCS, and Variable size Detector (Vdetector, the false alarm rate of WPMSD has been reduced by 18.09%, 12.6%, and 7.47% respectively.

  1. Android Malware Clustering through Malicious Payload Mining

    OpenAIRE

    Li, Yuping; Jang, Jiyong; Hu, Xin; Ou, Xinming

    2017-01-01

    Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party libraries in Android application development and the widespread use of repackaging in malware development. We design and implement an Android malware clustering system through iterative mining of malicious payload and checking whether malware s...

  2. Are blockchains immune to all malicious attacks?

    OpenAIRE

    Xu, Jennifer J.

    2016-01-01

    Background: In recent years, blockchain technology has attracted considerable attention. It records cryptographic transactions in a public ledger that is difficult to alter and compromise because of the distributed consensus. As a result, blockchain is believed to resist fraud and hacking. Results: This work explores the types of fraud and malicious activities that can be prevented by blockchain technology and identifies attacks to which blockchain remains vulnerable. Conclusions: This study ...

  3. Email-Set Visualization: Facilitating Re-Finding in Email Archives

    OpenAIRE

    Gorton, Douglas; Murthy, Uma; Vemuri, Naga Srinivas; Pérez-Quiñones, Manuel A.

    2007-01-01

    In this paper we describe ESVT – EmailSet Visualization Tool, an email archive tool that provides users a visualization to re-find and discover information in their email archive. ESVT is an end-to-end email archive tool that can be used from archiving a user’s email messages to visualizing queries on the email archive. We address email archiving by allowing import of email messages from an email server or from a standard existing email client. The central idea in ESVT’s visualization, an “em...

  4. EmailTime: visual analytics and statistics for temporal email

    Science.gov (United States)

    Erfani Joorabchi, Minoo; Yim, Ji-Dong; Shaw, Christopher D.

    2011-01-01

    Although the discovery and analysis of communication patterns in large and complex email datasets are difficult tasks, they can be a valuable source of information. We present EmailTime, a visual analysis tool of email correspondence patterns over the course of time that interactively portrays personal and interpersonal networks using the correspondence in the email dataset. Our approach is to put time as a primary variable of interest, and plot emails along a time line. EmailTime helps email dataset explorers interpret archived messages by providing zooming, panning, filtering and highlighting etc. To support analysis, it also measures and visualizes histograms, graph centrality and frequency on the communication graph that can be induced from the email collection. This paper describes EmailTime's capabilities, along with a large case study with Enron email dataset to explore the behaviors of email users within different organizational positions from January 2000 to December 2001. We defined email behavior as the email activity level of people regarding a series of measured metrics e.g. sent and received emails, numbers of email addresses, etc. These metrics were calculated through EmailTime. Results showed specific patterns in the use email within different organizational positions. We suggest that integrating both statistics and visualizations in order to display information about the email datasets may simplify its evaluation.

  5. Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Wang, Yu

    2017-01-01

    and healthcare personnel. The underlying network architecture to support such devices is also referred to as medical smartphone networks (MSNs). Similar to other networks, MSNs also suffer from various attacks like insider attacks (e.g., leakage of sensitive patient information by a malicious insider......). In this work, we focus on MSNs and design a trust-based intrusion detection approach through Euclidean distance-based behavioral profiling to detect malicious devices (or called nodes). In the evaluation, we collaborate with healthcare organizations and implement our approach in a real simulated MSN...

  6. Detecting android malicious apps and categorizing benign apps with ensemble of classifiers

    KAUST Repository

    Wang, Wei

    2017-01-17

    Android platform has dominated the markets of smart mobile devices in recent years. The number of Android applications (apps) has seen a massive surge. Unsurprisingly, Android platform has also become the primary target of attackers. The management of the explosively expansive app markets has thus become an important issue. On the one hand, it requires effectively detecting malicious applications (malapps) in order to keep the malapps out of the app market. On the other hand, it needs to automatically categorize a big number of benign apps so as to ease the management, such as correcting an app’s category falsely designated by the app developer. In this work, we propose a framework to effectively and efficiently manage a big app market in terms of detecting malapps and categorizing benign apps. We extract 11 types of static features from each app to characterize the behaviors of the app, and employ the ensemble of multiple classifiers, namely, Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Naive Bayes (NB), Classification and Regression Tree (CART) and Random Forest (RF), to detect malapps and to categorize benign apps. An alarm will be triggered if an app is identified as malicious. Otherwise, the benign app will be identified as a specific category. We evaluate the framework on a large app set consisting of 107,327 benign apps as well as 8,701 malapps. The experimental results show that our method achieves the accuracy of 99.39% in the detection of malapps and achieves the best accuracy of 82.93% in the categorization of benign apps.

  7. AppFA: A Novel Approach to Detect Malicious Android Applications on the Network

    Directory of Open Access Journals (Sweden)

    Gaofeng He

    2018-01-01

    Full Text Available We propose AppFA, an Application Flow Analysis approach, to detect malicious Android applications (simply apps on the network. Unlike most of the existing work, AppFA does not need to install programs on mobile devices or modify mobile operating systems to extract detection features. Besides, it is able to handle encrypted network traffic. Specifically, we propose a constrained clustering algorithm to classify apps network traffic, and use Kernel Principal Component Analysis to build their network behavior profiles. After that, peer group analysis is explored to detect malicious apps by comparing apps’ network behavior profiles with the historical data and the profiles of their selected peer groups. These steps can be repeated every several minutes to meet the requirement of online detection. We have implemented AppFA and tested it with a public dataset. The experimental results show that AppFA can cluster apps network traffic efficiently and detect malicious Android apps with high accuracy and low false positive rate. We have also tested the performance of AppFA from the computational time standpoint.

  8. Direct e-mail marketing: Case of Serbia

    Directory of Open Access Journals (Sweden)

    Končar Jelena A.

    2005-01-01

    Full Text Available Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc. The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers. Direct e-mail marketing is not aimed at momentary sale, but at boosting certain product preferences due to the engagement of numerous electronic media.

  9. Direct e-mail marketing: Case of Serbia

    OpenAIRE

    Končar Jelena A.; Vukmirović Goran; Katai Žita

    2005-01-01

    Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc). The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers....

  10. Voting-based Classification for E-mail Spam Detection

    Directory of Open Access Journals (Sweden)

    Bashar Awad Al-Shboul

    2016-06-01

    Full Text Available The problem of spam e-mail has gained a tremendous amount of attention. Although entities tend to use e-mail spam filter applications to filter out received spam e-mails, marketing companies still tend to send unsolicited e-mails in bulk and users still receive a reasonable amount of spam e-mail despite those filtering applications. This work proposes a new method for classifying e-mails into spam and non-spam. First, several e-mail content features are extracted and then those features are used for classifying each e-mail individually. The classification results of three different classifiers (i.e. Decision Trees, Random Forests and k-Nearest Neighbor are combined in various voting schemes (i.e. majority vote, average probability, product of probabilities, minimum probability and maximum probability for making the final decision. To validate our method, two different spam e-mail collections were used.

  11. Students Writing Emails to Faculty: An Examination of E-Politeness among Native and Non-Native Speakers of English

    Science.gov (United States)

    Biesenbach-Lucas, Sigrun

    2007-01-01

    This study combines interlanguage pragmatics and speech act research with computer-mediated communication and examines how native and non-native speakers of English formulate low- and high-imposition requests to faculty. While some research claims that email, due to absence of non-verbal cues, encourages informal language, other research has…

  12. On the ground truth problem of malicious DNS traffic analysis

    DEFF Research Database (Denmark)

    Stevanovic, Matija; Pedersen, Jens Myrup; D’Alconzo, Alessandro

    2015-01-01

    algorithms at their core. These methods require accurate ground truth of both malicious and benign DNS traffic for model training as well as for the performance evaluation. This paper elaborates on the problem of obtaining such a ground truth and evaluates practices employed by contemporary detection methods...

  13. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2010-01-01

    simulation in the presence of malicious, polynomial-time adversaries (assuming that ElGamal encryption is semantically secure) and exhibits computation and communication costs of O(n + m) in a constant round complexity. In addition to the above, we propose a collection of protocols for variations...

  14. A framework for detection of malicious software in Android handheld systems using machine learning techniques

    OpenAIRE

    Torregrosa García, Blas

    2015-01-01

    The present study aims at designing and developing new approaches to detect malicious applications in Android-based devices. More precisely, MaLDroide (Machine Learning-based Detector for Android malware), a framework for detection of Android malware based on machine learning techniques, is introduced here. It is devised to identify malicious applications. Este trabajo tiene como objetivo el diseño y el desarrollo de nuevas formas de detección de aplicaciones maliciosas en los dispositivos...

  15. Spoiled Onions: Exposing Malicious Tor Exit Relays

    OpenAIRE

    Winter, Philipp; Lindskog, Stefan

    2014-01-01

    Several hundred Tor exit relays together push more than 1 GiB/s of network traffic. However, it is easy for exit relays to snoop and tamper with anonymised network traffic and as all relays are run by independent volunteers, not all of them are innocuous. In this paper, we seek to expose malicious exit relays and document their actions. First, we monitored the Tor network after developing a fast and modular exit relay scanner. We implemented several scanning modules for detecting common attac...

  16. Combining textual and non-textual features for e-mail importance estimation

    NARCIS (Netherlands)

    Sappelli, M.; Verberne, S.; Kraaij, W.

    2013-01-01

    In this work, we present a binary classification problem in which we aim to identify those email messages that the receiver will reply to. The future goal is to develop a tool that informs a knowledge worker which emails are likely to need a reply. The Enron corpus was used to extract training

  17. New method for assessing risks of email

    Science.gov (United States)

    Raja, Seyyed H.; Afrooz, Farzad

    2013-03-01

    E-mail technology, has become one of the requirements of human lives for correspondence between individuals. Given this, the important point is that the messages, server and client of e-mail and correspondences that exchanged between different people have acceptable security, to make people sure to use of this technology. In the information age, many of financial and non financial transactions are done electronically, data exchange takes place via the internet and theft and manipulation of data can make exorbitant cost in terms of integrity, financial, political, economic and culture. E-mail correspondence in there is same and it is very important. With review took place, a method that will focus on email system for risks assessment is not provided. We are examining ways of assessing for other systems and their strengths and weaknesses, then we use Mr Convery method for assessing email risks which it is for assessing network risks. At the end of paper we have offered special table for email risk assessment.

  18. An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications

    Energy Technology Data Exchange (ETDEWEB)

    Beaver, Justin M [ORNL; Borges, Raymond Charles [ORNL; Buckner, Mark A [ORNL

    2013-01-01

    Critical infrastructure Supervisory Control and Data Acquisition (SCADA) systems were designed to operate on closed, proprietary networks where a malicious insider posed the greatest threat potential. The centralization of control and the movement towards open systems and standards has improved the efficiency of industrial control, but has also exposed legacy SCADA systems to security threats that they were not designed to mitigate. This work explores the viability of machine learning methods in detecting the new threat scenarios of command and data injection. Similar to network intrusion detection systems in the cyber security domain, the command and control communications in a critical infrastructure setting are monitored, and vetted against examples of benign and malicious command traffic, in order to identify potential attack events. Multiple learning methods are evaluated using a dataset of Remote Terminal Unit communications, which included both normal operations and instances of command and data injection attack scenarios.

  19. Email Updates

    Science.gov (United States)

    ... of this page: https://medlineplus.gov/listserv.html Email Updates To use the sharing features on this ... view your email history or unsubscribe. Prevent MedlinePlus emails from being marked as "spam" or "junk" To ...

  20. Elucidating the Dark Side of Envy: Distinctive Links of Benign and Malicious Envy With Dark Personalities

    Science.gov (United States)

    Lange, Jens; Paulhus, Delroy L.; Crusius, Jan

    2017-01-01

    Researchers have recently drawn a contrast between two forms of envy: benign and malicious envy. In three studies (total N = 3,123), we challenge the assumption that malicious envy is destructive, whereas benign envy is entirely constructive. Instead, both forms have links with the Dark Triad of personality. Benign envy is associated with Machiavellian behaviors, whereas malicious envy is associated with both Machiavellian and psychopathic behaviors. In Study 1, this pattern emerged from meta-analyzed trait correlations. In Study 2, a manipulation affecting the envy forms mediated an effect on antisocial behavioral intentions. Study 3 replicated these patterns by linking envy to specific antisocial behaviors and their impact on status in the workplace. Together, our correlational and experimental results suggest that the two forms of envy can both be malevolent. Instead of evaluating envy’s morality, we propose to focus on its functional value. PMID:29271287

  1. Non-targeted effects of ionising radiation (note). A new European integrated project, 2006-2010

    International Nuclear Information System (INIS)

    Salomaa, S.; Wright, E.G.; Hildebrandt, G.; Kadhim, M.; Little, M.P.; Prise, K.M.; Belyakov, O.V.

    2007-01-01

    Complete text of publication follows. The general objectives of the NOTE project are: (1) to investigate the mechanisms of nontargeted effects, in particular, bystander effects, genomic instability and adaptive response; (2) to investigate if and how non-targeted effects modulate the cancer risk in the low dose region, and whether they relate to protective or harmful functions; (3) to investigate if ionising radiation can cause non-cancer diseases or beneficial effects at low and intermediate doses; (4) to investigate individual susceptibility and other factors modifying non-targeted responses; (5) to assess the relevance of non-targeted effects for radiation protection and to set the scientific basis for a modern, more realistic, radiation safety system; (6) to contribute to the conceptualisation of a new paradigm in radiation biology that would cover both the classical direct (DNA-targeted) and non-targeted (indirect) effects. The NOTE brings together 19 major European and Canadian groups involved in the discovery, characterisation and mechanistic investigation of non-targeted effects of ionising radiation in cellular, tissue and animal models. The NOTE research activities are organised in six work packages. Four work packages (WPs 2-5) are problem-oriented, focussing on major questions relevant for the scientific basis of the system of radiation protection: WP2 Mechanisms of non-targeted effects, WP3 Non-cancer diseases, WP4 Factors modifying non-targeted responses, WP5 Modelling of non-targeted effects. The integration activities provided by WP6 strengthen the collaboration by supporting the access to infrastructures, mobility and training. WP7 provides dissemination and exploitation activities in the form of workshops and a public website. Managerial activities (WP1) ensure the organisation and structures for decision making, monitoring of progress, knowledge management and efficient flow of information and financing. Coordinator of the NOTE project is Prof

  2. Leveling up and down : The experiences of benign and malicious envy

    NARCIS (Netherlands)

    van de Ven, N.; Zeelenberg, M.; Pieters, R.

    2009-01-01

    Envy is the painful emotion caused by the good fortune of others. This research empirically supports the distinction between two qualitatively different types of envy, namely benign and malicious envy. It reveals that the experience of benign envy leads to a moving-up motivation aimed at improving

  3. SPAM: Beware of emails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and must never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake emails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake email message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, however future cases may still occur. Users need to be vigilant for any requests for passwords or personal data. Fake emails should be immediately deleted. In case of questions on this topic, you may contact helpdesk@cern.ch. CERN IT Department

  4. Perancangan Email Client Dengan Pengklasifikasian Email Menggunakan Algoritma Vector Space Model

    OpenAIRE

    Christian, Moses

    2015-01-01

    On today's age of technology, widely used email to send information throughout the world. During the classification of the email is still done manually and less objective. So in this study, the authors apply the method of Vector Space Model (VSM) to make an automatic email classification and more objective. With this method of email classification can be done automatically based on address, subject, and body of an email that allows users to email in the organization of every incoming email in...

  5. Assessing e-mail intent and tasks in e-mail messages

    NARCIS (Netherlands)

    Sappelli, M.; Pasi, G.; Verberne, S.; Boer, M. de; Kraaij, W.

    2016-01-01

    In this paper, we analyze corporate e-mail messages as a medium to convey work tasks. Research indicates that categorization of e-mail could alleviate the common problem of information overload. Although e-mail clients provide possibilities of e-mail categorization, not many users spend effort on

  6. bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection

    OpenAIRE

    Gupta, Neha; Aggarwal, Anupama; Kumaraguru, Ponnurangam

    2014-01-01

    Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained a lot of traction. URL shorteners take as input a long URL and output a short URL with the same landing page (as in the long URL) in return. With their immense popularity over time, URL shorteners have become a prime target for the attackers ...

  7. E-mail marketing

    OpenAIRE

    Jurnečková, Jana

    2014-01-01

    The thesis deals with e-mail marketing. It focuses on identifying factors that affect the behavior of users of e-mail and newsletter subscribers. It evaluates the role of e-mail marketing as a part of communication mix of companies and e-shops, current trends, e-mail campaigns, e-mail marketing software provider. To study the behavior of users of e-mail and newsletter subscribers a questionnaire survey was conducted on a sample of 610 respondents and in-depth interviews (n = 30). Content anal...

  8. Evil acts and malicious gossip: a multiagent model of the effects of gossip in socially distributed person perception.

    Science.gov (United States)

    Smith, Eliot R

    2014-11-01

    Although person perception is central to virtually all human social behavior, it is ordinarily studied in isolated individual perceivers. Conceptualizing it as a socially distributed process opens up a variety of novel issues, which have been addressed in scattered literatures mostly outside of social psychology. This article examines some of these issues using a series of multiagent models. Perceivers can use gossip (information from others about social targets) to improve their ability to detect targets who perform rare negative behaviors. The model suggests that they can simultaneously protect themselves against being influenced by malicious gossip intended to defame specific targets. They can balance these potentially conflicting goals by using specific strategies including disregarding gossip that differs from a personally obtained impression. Multiagent modeling demonstrates the outcomes produced by different combinations of assumptions about gossip, and suggests directions for further research and theoretical development. © 2014 by the Society for Personality and Social Psychology, Inc.

  9. Email shape analysis

    OpenAIRE

    Sroufe, Paul; Phithakkitnukoon, Santi; Dantu, Ram; Cangussu, João

    2010-01-01

    Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering, and social-context bas...

  10. Analysis of E-mail Transactions in Virtual Reference Services

    Directory of Open Access Journals (Sweden)

    Astutik Nur Qomariyah

    2018-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (refdesk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  11. SPAM: Beware of e-mails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake e-mails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake e-mail message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, but future cases may still occur. Users need to be vigilant regarding any requests for passwords or personal data. Fake e-mails should be immediately deleted. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN IT Department

  12. Using Insights from Email Users to Inform Organisational Email Management Policy

    Science.gov (United States)

    Ramsay, Judith; Renaud, Karen

    2012-01-01

    One would expect email substantially to increase organisational productivity and efficiency. There is little empirical evidence of this since email use is such a complex tool that it would be well nigh impossible to attribute efficiency increases solely to email. There is anecdotal evidence of the positive aspects of email (Phillips, S.R. and…

  13. Design and Implementation of Malicious Code Detection Platform for iOS System%iOS系统恶意代码检测平台设计与实现

    Institute of Scientific and Technical Information of China (English)

    田庆宜

    2013-01-01

    随着苹果手机日益普及,苹果终端已成为黑客重要的攻击目标。黑客利用恶意代码窃取个人信息及窃财犯罪层出不穷。但目前执法部门缺乏对苹果iOS移动平台恶意代码的检测平台。文章以iOS平台安全模型为基础,在分析国内外攻击方法的基础上,设计了苹果恶意代码检测框架,在此基础上构筑了对iOS的app应用恶意代码检测平台。经实际测试,本平台具备对iOS系统恶意代码通讯流量及文件改变的检测能力。本平台总体成本较低,有利于装备基层执法部门。%With the increasing popularity of Apple mobile phone, apple terminal has become the important target of hackers. The malicious hackers steal personal information and crime emerge in an endless stream. But the law enforcement departments lack of detection platform for Apple iOS mobile platform of malicious code. This paper is based on the iOS platform security model, designed the apple of malicious code detection framework, on the basis of iOS app application platform to build a malicious code detection. The actual test, the platform has the ability of detecting malicious code iOS system communication trafifc and ifle change. The overall cost of the platform is relatively low, in favor of equipment in the basic law enforcement.

  14. Targeted Attacks Using Vulnerability CVE-2013-3897

    Directory of Open Access Journals (Sweden)

    Anatoliy Petrovich Durakovskiy

    2014-09-01

    Full Text Available This article provides an overview of the malicious code creation and implementation techniques that were used by cyber criminals to conduct targeted attacks on PCs of residents of the Republic of South Korea in September and October 2013.

  15. The Security Email Based on Smart Card

    Science.gov (United States)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  16. CPSFS: A Credible Personalized Spam Filtering Scheme by Crowdsourcing

    Directory of Open Access Journals (Sweden)

    Xin Liu

    2017-01-01

    Full Text Available Email spam consumes a lot of network resources and threatens many systems because of its unwanted or malicious content. Most existing spam filters only target complete-spam but ignore semispam. This paper proposes a novel and comprehensive CPSFS scheme: Credible Personalized Spam Filtering Scheme, which classifies spam into two categories: complete-spam and semispam, and targets filtering both kinds of spam. Complete-spam is always spam for all users; semispam is an email identified as spam by some users and as regular email by other users. Most existing spam filters target complete-spam but ignore semispam. In CPSFS, Bayesian filtering is deployed at email servers to identify complete-spam, while semispam is identified at client side by crowdsourcing. An email user client can distinguish junk from legitimate emails according to spam reports from credible contacts with the similar interests. Social trust and interest similarity between users and their contacts are calculated so that spam reports are more accurately targeted to similar users. The experimental results show that the proposed CPSFS can improve the accuracy rate of distinguishing spam from legitimate emails compared with that of Bayesian filter alone.

  17. Identifying spam e-mail messages using an intelligence algorithm

    Directory of Open Access Journals (Sweden)

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  18. Uncovering the footprints of malicious traffic in cellular data networks

    OpenAIRE

    Raghuramu, A; Zang, H; Chuah, CN

    2015-01-01

    © Springer International Publishing Switzerland 2015. In this paper, we present a comprehensive characterization of malicious traffic generated by mobile devices using Deep Packet Inspection (DPI) records and security event logs from a large US based cellular provider network. Our analysis reveals that 0.17% of mobile devices in the cellular network are affected by security threats. This proportion, while small, is orders of magnitude higher than the last reported (in 2013) infection rate of ...

  19. Secure e-mail and Web browsing

    CERN Multimedia

    CERN. Geneva

    2009-01-01

    This is an entry-level 1.5-hour training course aimed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. Register at CTA

  20. DroidEnsemble: Detecting Android Malicious Applications with Ensemble of String and Structural Static Features

    KAUST Repository

    Wang, Wei; Gao, Zhenzhen; Zhao, Meichen; Li, Yidong; Liu, Jiqiang; Zhang, Xiangliang

    2018-01-01

    Android platform has dominated the Operating System of mobile devices. However, the dramatic increase of Android malicious applications (malapps) has caused serious software failures to Android system and posed a great threat to users. The effective

  1. Enter your email-address: how German internet users manage their email addresses

    NARCIS (Netherlands)

    Utz, S.

    2004-01-01

    Writing E-mail is the most popular Internet activity. Meanwhile, many people have more than one E-mail address. The question how people manage their E-mail addresses, more specifically, whether they use them deliberately for different purposes, is the central question of this paper. E-mail addresses

  2. Analysis of E-mail Transactions in Virtual Reference Services

    Directory of Open Access Journals (Sweden)

    Astutik Nur Qomariyah

    2016-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (ref-desk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  3. Non-targeted effects of ionising radiation

    International Nuclear Information System (INIS)

    Belyakov, O.V.

    2008-01-01

    The universality of the target theory of radiation-induced effects is challenged by observations on non-targeted effects such as bystander effects and genomic instability. Essential features of non-targeted effects are that they do not require direct nuclear exposure by radiation and they are particularly significant at low doses. This new evidence suggests a need for a new paradigm in radiation biology. The new paradigm would cover both the classical (targeted) and the non-targeted effects. New aspects include the role of cellular communication and tissue-level responses. A better understanding of non-targeted effects may have important consequences for health risk assessment and, consequently, on radiation protection. Non-targeted effects may contribute to the estimation of cancer risk from occupational, medical and environmental exposures. In particular, they may have implications for the applicability of the Linear-No-Threshold (LNT) model in extrapolating radiation risk data into the low-dose region. This also means that the adequacy of the concept of dose to estimate risk is challenged by these findings. Moreover, these effects may provide new mechanistic explanations for the development of non-cancer diseases. Further research is required to determine if these effects, typically measured in cell cultures, are applicable in tissue level, whole animals, and ultimately in humans. (orig.)

  4. Manipulating E-Mail Server Feedback for Spam Prevention

    Directory of Open Access Journals (Sweden)

    O. A. Okunade

    2017-08-01

    Full Text Available The cyber criminals who infect machines with bots are not the same as the spammers who rent botnets to distribute their messages. The activities of these spammers account for the majority of spam emails traffic on the internet. Once their botnets and campaigns are identified, it is not enough to keep on filtering the spam emails, it is necessary to deploy techniques that will carry the fight to their end. It is observed that spammers also take into account server feedback (for example to detect and remove non-existent recipients from email address lists. We can take advantage of this observation by returning fake information, thereby poisoning the server feedback on which the spammers rely. The results of this paper show that by sending misleading information to a spammer, it is possible to prevent recipients from receiving subsequent spam emails from that same spammer.

  5. Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

    Directory of Open Access Journals (Sweden)

    De Wang

    2014-05-01

    Full Text Available With the increasing dedication and sophistication of spammers, email spam is a persistent problem even today. Popular social network sites such as Facebook, Twitter, and Google+ are not exempt from email spam as they all interface with email systems. While some report predicts that email spam business is dying due to the decreasing volume of email spam. Whether email spam business is really dying is an interesting question. In this paper, we analyze email spam trends on Spam Archive dataset, which contains 5.5 million spam emails over 15 years (1998 – 2013. We statistically analyze emails contents including header information (e.g. content type and embedded items (e.g. URL links. Also, we investigate topic drift using topic modeling technique. Moreover, we perform network analysis on sender-to-receiver IP routing networks. Our study shows the dynamic nature of email spam over one and a half decades and demonstrate that the email spam business is not dying but more capricious.

  6. Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

    OpenAIRE

    De Wang; Danesh Irani; Calton Pu

    2014-01-01

    With the increasing dedication and sophistication of spammers, email spam is a persistent problem even today. Popular social network sites such as Facebook, Twitter, and Google+ are not exempt from email spam as they all interface with email systems. While some report predicts that email spam business is dying due to the decreasing volume of email spam. Whether email spam business is really dying is an interesting question. In this paper, we analyze email spam trends on Spam Archive dataset, ...

  7. Fluctuations in email size

    Science.gov (United States)

    Matsubara, Yoshitsugu; Musashi, Yasuo

    2017-12-01

    The purpose of this study is to explain fluctuations in email size. We have previously investigated the long-term correlations between email send requests and data flow in the system log of the primary staff email server at a university campus, finding that email size frequency follows a power-law distribution with two inflection points, and that the power-law property weakens the correlation of the data flow. However, the mechanism underlying this fluctuation is not completely understood. We collected new log data from both staff and students over six academic years and analyzed the frequency distribution thereof, focusing on the type of content contained in the emails. Furthermore, we obtained permission to collect "Content-Type" log data from the email headers. We therefore collected the staff log data from May 1, 2015 to July 31, 2015, creating two subdistributions. In this paper, we propose a model to explain these subdistributions, which follow log-normal-like distributions. In the log-normal-like model, email senders -consciously or unconsciously- regulate the size of new email sentences according to a normal distribution. The fitting of the model is acceptable for these subdistributions, and the model demonstrates power-law properties for large email sizes. An analysis of the length of new email sentences would be required for further discussion of our model; however, to protect user privacy at the participating organization, we left this analysis for future work. This study provides new knowledge on the properties of email sizes, and our model is expected to contribute to the decision on whether to establish upper size limits in the design of email services.

  8. THE DEVELOPMENT OF E-MAIL LITERACY: FROM WRITING TO PEERS TO WRITING TO AUTHORITY FIGURES

    Directory of Open Access Journals (Sweden)

    Chi-Fen Emily Chen

    2006-05-01

    Full Text Available Though e-mail has become a common interpersonal communication medium, it does not mean that this medium is used without difficulty. While people can write e-mails to peers in any manner they like, writing e-mails to authority figures requires higher pragmatic competence and critical language awareness of how discourse shapes and reflects power asymmetry in an institutional context. For L2 learners, the challenge of composing this type of e-mail can be greater due not only to their limited linguistic ability but also their unfamiliarity with the target culture's norms and values. To provide a deeper understanding of how an L2 learner develops e-mail literacy in the target language environment, this paper presents a longitudinal case study of a Taiwanese graduate student’s e-mail practice in English during her studies at a U.S. university for two and a half years. Using a critical discourse analysis approach, the study reveals the complexity of an L2 learner’s evolving e-mail practice and struggle for appropriateness, particularly in her e-mail communication with professors. Her development of e-mail literacy is discussed in relation to her evolving understanding of the e-mail medium, changing performance of student identity, increasing knowledge of student-professor interaction and realization of culture-specific politeness.

  9. E-mail: Outlook Express

    Directory of Open Access Journals (Sweden)

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu layanan Internet yang sangat penting adalah electronic mail atau sering hanya disebut sebagai e-mail. Untuk menggunakan e-mail, diperlukan piranti lunak khusus supaya pengguna dapat mengirim dan menerima e-mail. Jenis piranti lunak e-mail diantaranya adalah Outlook Express yang merupakan satu paket yang didistribusikan bersama Internet Explorer versi 4. Piranti lunak ini dijalankan pada PC yang mempunyai sistem operasi Windows 95 atau 98. Jenis piranti lunak e-mail yang lain adalah Eudora, Pegasus dan sebagainya. Bahkan ada yang diintegrasikan dengan Web Browser (alat untuk menelusuri situs Web misalnya IE,dan Netscape.Sebagai layaknya pelayanan pos, maka setiap pengguna e-mail mempunyai alamat tertentu yang tidak mungkin dipunyai oleh pengguna lainnya diseluruh dunia. Untuk keperluan pendistribusian, maka e-mail mempunyai semacam kantor pos yang ditempatkan dalam sebuah komputer server (mail server atau sering disebut sebagai host. 

  10. Securing E-mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

    Directory of Open Access Journals (Sweden)

    Andri Zakariya

    2012-12-01

    Full Text Available One of the most popular internet services is electronic mail (e-mail. By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

  11. Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

    Directory of Open Access Journals (Sweden)

    Frank Yeong-Sung Lin

    2013-01-01

    Full Text Available Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.

  12. Study of target and non-target interplay in spatial attention task.

    Science.gov (United States)

    Sweeti; Joshi, Deepak; Panigrahi, B K; Anand, Sneh; Santhosh, Jayasree

    2018-02-01

    Selective visual attention is the ability to selectively pay attention to the targets while inhibiting the distractors. This paper aims to study the targets and non-targets interplay in spatial attention task while subject attends to the target object present in one visual hemifield and ignores the distractor present in another visual hemifield. This paper performs the averaged evoked response potential (ERP) analysis and time-frequency analysis. ERP analysis agrees to the left hemisphere superiority over late potentials for the targets present in right visual hemifield. Time-frequency analysis performed suggests two parameters i.e. event-related spectral perturbation (ERSP) and inter-trial coherence (ITC). These parameters show the same properties for the target present in either of the visual hemifields but show the difference while comparing the activity corresponding to the targets and non-targets. In this way, this study helps to visualise the difference between targets present in the left and right visual hemifields and, also the targets and non-targets present in the left and right visual hemifields. These results could be utilised to monitor subjects' performance in brain-computer interface (BCI) and neurorehabilitation.

  13. Challenges in ensuring radiological safety and nuclear forensic for malicious acts involving nuclear and other radioactive material

    International Nuclear Information System (INIS)

    Sharma, Ranjit; Chatterjee, M.K.; Singh, Rajvir; Pradeepkumar, K.S.

    2010-01-01

    Nuclear and other radioactive materials may get smuggled into the country aimed at malicious acts. Radioactive material detected accidentally or during inspection at the entry points/national borders may indicate illicit trafficking for the purpose of nuclear/radiological terrorism. As country requires prevention and preparedness for response to these malicious acts, nuclear forensic techniques are to be developed incorporating radiological safety aspects. Nuclear forensics helps in determining the origin, intended use, legal owner and the smuggled route etc. by using fingerprinting as well as comparison with reference data. The suggested sequence of methods for analysis of radioactive material/samples will be radiological assessment, physical characterization, traditional forensic analysis, isotope analysis along with elemental/chemical analysis

  14. E-mail security: new restriction on attachments

    CERN Multimedia

    The Mail Team

    2006-01-01

    In order to further protect CERN mail users against viruses that spread using malicious files, from 1st March onwards dangerous file types already forbidden as mail attachments will also be forbidden as contents of an archive attachment (.zip and .rar compressed files). More details, including a list of blocked file types, can be found at http://cern.ch/mmmservices/Help/?kbid=171010 The Mail Team

  15. E-mail security: new restriction on attachments

    CERN Multimedia

    The Mail Team

    2006-01-01

    In order to further protect CERN mail users against viruses that spread using malicious files, from 1st March onwards dangerous file types already forbidden as mail attachments will also be forbidden as contents of an archive attachment (.zip and .rar compressed files). More details, including a list of blocked file types, can be found at http://cern.ch/mmmservices/Help/?kbid=171010. The Mail Team

  16. Efektivitas Email Untuk Pemasaran

    OpenAIRE

    Oetomo, Budi Sutedjo Dharma

    2009-01-01

    Lebih dari 500 juta orang dan badan USAha telah tergabung di internet. Pada umumnya, mereka telah terbiasa untuk memanfaatkan fitur dan aplikasi yang tersedia di internet, seperti email, mailing list, web, blog dan situs jejaring sosial. Diantara fitur dan aplikasi internet itu yang hampir digunakan oleh setiap orang dan badan USAha adalah email, karena mereka telah memiliki alamat email, bahkan lebih dari satu buah. Kini, fitur email telah dimanfaatkan untuk kegiatan pemasaran, khususnya pro...

  17. Predicting malicious behavior tools and techniques for ensuring global security

    CERN Document Server

    Jackson, Gary M

    2012-01-01

    A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates ava

  18. EMAIL MARKETING CAMPAIGNS: THE EASIEST PATH FROM ORGANIZATIONS TO CONSUMERS – AN EXPLORATORY ASSESSMENT

    Directory of Open Access Journals (Sweden)

    Pantea Carmen

    2010-07-01

    Full Text Available The email is a valuable marketing tool for conveying short, simple messages that call for action on behalf of the recipient. Usually companies develop email marketing campaigns for attracting new customers, persuading the existing customers to buy again, encourage customer loyalty, announce or remind about special offers or events. For an email marketing campaign to be efficient, it is wanted a greater number of responses from those in the target. The paper assesses in an exploratory manner the frequency in using the email accounts, the level of exposure to email marketing campaigns as well as the type of information wanted to be received by the Romanian users.

  19. Did You Get My E-Mail? Moving E-Mails beyond the Inbox

    Science.gov (United States)

    Ellis, Susan J.

    2011-01-01

    The challenge today is how to make e-mail and other forms of electronic communication effective in motivating volunteer action. Is it possible to make e-mails feel personal and welcoming? E-mail, instant messaging, texting, and social media are tools that allow individuals to communicate quickly and inexpensively, but they are lifeless without the…

  20. Hacked E-mail

    Science.gov (United States)

    ... your email address was “spoofed,” or faked, and hackers don’t actually have access to your account. ... use public Wi-Fi .) Tagged with: antivirus , email , hacker , imposter , password , phishing , scam , social networking July 2013 ...

  1. On Successful E-Mail Writing

    Directory of Open Access Journals (Sweden)

    Vesna Vulić

    2009-12-01

    Full Text Available This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette or ‘Netiquette’ and it is therefore important that whether it be for business or private use, the basics of e-mail etiquette are followed. When writing an e-mail it is important to consider the recipient. Careful consideration will determine the content and style of the e-mail. No less important is knowing the points of detail in writing e-mail. That is, to be clear and concise in the specific information that the e-mail should contain. Furthermore, abbreviations, acronyms and emoticons are frequently found in e-mail and their use should also be considered. An e-mail is a valuable communication tool and it is essential to use it effectively in order to improve both professional and private communication.

  2. The style of academic e-mails and conventional letters: contrastive analysis of four conversational routines

    Directory of Open Access Journals (Sweden)

    Clyde Ancarno

    2005-04-01

    Full Text Available This paper presents the results of a corpus-based study which investigates the genre of academic email and more specifically its pragmatic dimension. Four conversational routines (thank yous, apologies, requests, offers are analysed and compared in two channels: academic e-mails and conventional print letters. In addition, data from both native and non-native speakers of English is considered, which sheds light on some of the differences found in the academic e-mail writing of learners of English. The findings indicate that academic e-mail is a relatively formal type of correspondence which is still largely influenced, as is to be expected, by the genre of the academic letter, and that as a genre, academic e-mail is in the process of formation or semi-formation. Finally, native speakers of English are found to be more informal than non-native speakers of English in academic e-mails.

  3. The STRENGTH Ezine: an application of e-mail for health promotion in adolescent girls.

    Science.gov (United States)

    Abroms, Lorien C; Fagan, Pebbles; Eisenberg, Marla E; Lee, Hye-Seung H; Remba, Natania; Sorensen, Glorian

    2004-01-01

    Few studies have investigated the efficacy of e-mail for promoting behavior change. This study evaluates the participation in and outcomes associated with an e-mail-based health promotion program. Adolescent girls aged 15 to 17 years were recruited at a shopping mall. Participants with an e-mail address were assigned to the interactive e-mail magazine (Ezine) group (n = 37), whereas those not reporting an e-mail address were assigned to the non-Ezine group (n = 33). Participants in the Ezine group received the health Ezine, which included a quiz and an advice column, on a weekly basis. Results indicate that among the Ezine group, there was a high recall of the Ezine (81.1%), and more than one third of the participants replied to Ezine volumes with quiz answers or an advice question (36.6%). Differences in health behavior change between the Ezine and non-Ezine groups were not significant. E-mails on health-related matters can generate moderate levels of involvement in adolescent girls. Given the widespread use of e-mail, more studies are needed on the effective application of e-mail for health behavior change.

  4. Email Negotiation

    OpenAIRE

    Bülow, Anne Marie

    2010-01-01

    This paper investigates a set of email negotiations in order to explain a high number of deadlocks. The paper argues that one reason is the combination of cognitive effort characteristic of the e-mail genre, and the argumentative pattern found when two parties simultaneously try to persuade the other of the justice of their cause. For a negotiation involving the wording of a contract, the evidence suggests that, while there is a distinct advantage in the features of reviewability and revis...

  5. Assessment of information impacts in power system security against malicious attacks in a general framework

    International Nuclear Information System (INIS)

    Bompard, E.; Napoli, R.; Xue, F.

    2009-01-01

    In the analysis of power systems security, recently a new concern related to possible malicious attacks caught much attention. Coordination among different transmission system operators (TSO) in an interconnected power system to counteract such attacks has become an important problem. This paper presents a general framework for describing the physical, cyber and decision-making aspects of the problem and their interrelations; within this framework, an analytic tool for the assessment of information impacts in handling on-line security after a malicious attack is proposed and discussed. The model is based on the socially rational multi-agent systems and the equilibrium of a fictitious play is considered to analyze the impacts of various levels of information available to the interconnected system operators on the outcomes of the decision-making process under attack. A 34-buses test system, with 3 systems interconnected by tie-lines, is presented to illustrate the model and compare the impacts of different information scenarios

  6. Assessment of information impacts in power system security against malicious attacks in a general framework

    Energy Technology Data Exchange (ETDEWEB)

    Bompard, E. [Dipartimento di Ingegneria Elettrica, Politecnico di Torino, I-10129 Torino (Italy)], E-mail: ettore.bompard@polito.it; Napoli, R.; Xue, F. [Dipartimento di Ingegneria Elettrica, Politecnico di Torino, I-10129 Torino (Italy)

    2009-06-15

    In the analysis of power systems security, recently a new concern related to possible malicious attacks caught much attention. Coordination among different transmission system operators (TSO) in an interconnected power system to counteract such attacks has become an important problem. This paper presents a general framework for describing the physical, cyber and decision-making aspects of the problem and their interrelations; within this framework, an analytic tool for the assessment of information impacts in handling on-line security after a malicious attack is proposed and discussed. The model is based on the socially rational multi-agent systems and the equilibrium of a fictitious play is considered to analyze the impacts of various levels of information available to the interconnected system operators on the outcomes of the decision-making process under attack. A 34-buses test system, with 3 systems interconnected by tie-lines, is presented to illustrate the model and compare the impacts of different information scenarios.

  7. The drug target genes show higher evolutionary conservation than non-target genes.

    Science.gov (United States)

    Lv, Wenhua; Xu, Yongdeng; Guo, Yiying; Yu, Ziqi; Feng, Guanglong; Liu, Panpan; Luan, Meiwei; Zhu, Hongjie; Liu, Guiyou; Zhang, Mingming; Lv, Hongchao; Duan, Lian; Shang, Zhenwei; Li, Jin; Jiang, Yongshuai; Zhang, Ruijie

    2016-01-26

    Although evidence indicates that drug target genes share some common evolutionary features, there have been few studies analyzing evolutionary features of drug targets from an overall level. Therefore, we conducted an analysis which aimed to investigate the evolutionary characteristics of drug target genes. We compared the evolutionary conservation between human drug target genes and non-target genes by combining both the evolutionary features and network topological properties in human protein-protein interaction network. The evolution rate, conservation score and the percentage of orthologous genes of 21 species were included in our study. Meanwhile, four topological features including the average shortest path length, betweenness centrality, clustering coefficient and degree were considered for comparison analysis. Then we got four results as following: compared with non-drug target genes, 1) drug target genes had lower evolutionary rates; 2) drug target genes had higher conservation scores; 3) drug target genes had higher percentages of orthologous genes and 4) drug target genes had a tighter network structure including higher degrees, betweenness centrality, clustering coefficients and lower average shortest path lengths. These results demonstrate that drug target genes are more evolutionarily conserved than non-drug target genes. We hope that our study will provide valuable information for other researchers who are interested in evolutionary conservation of drug targets.

  8. Two time-delay dynamic model on the transmission of malicious signals in wireless sensor network

    International Nuclear Information System (INIS)

    Keshri, Neha; Mishra, Bimal Kumar

    2014-01-01

    Highlights: • Role of time delay to reduce the adversary effect in WSN is explored. • Model with two time delays is proposed to analyse spread of malicious signal in WSN. • Dynamical behaviour of worm-free equilibrium and endemic equilibrium is shown. • Threshold condition for switch of stability are obtained analytically. • Relation between stability and the two time delays is also explored. - Abstract: Deployed in a hostile environment, motes of a Wireless sensor network (WSN) could be easily compromised by the attackers because of several constraints such as limited processing capabilities, memory space, and limited battery life time etc. While transmitting the data to their neighbour motes within the network, motes are easily compromised due to resource constraints. Here time delay can play an efficient role to reduce the adversary effect on motes. In this paper, we propose an epidemic model SEIR (Susceptible–Exposed–Infectious–Recovered) with two time delays to describe the transmission dynamics of malicious signals in wireless sensor network. The first delay accounts for an exposed (latent) period while the second delay is for the temporary immunity period due to multiple worm outbreaks. The dynamical behaviour of worm-free equilibrium and endemic equilibrium is shown from the point of stability which switches under some threshold condition specified by the basic reproduction number. Our results show that the global properties of equilibria also depends on the threshold condition and that latent and temporary immunity period in a mote does not affect the stability, but they play a positive role to control malicious attack. Moreover, numerical simulations are given to support the theoretical analysis

  9. Behavioral biometrics for verification and recognition of malicious software agents

    Science.gov (United States)

    Yampolskiy, Roman V.; Govindaraju, Venu

    2008-04-01

    Homeland security requires technologies capable of positive and reliable identification of humans for law enforcement, government, and commercial applications. As artificially intelligent agents improve in their abilities and become a part of our everyday life, the possibility of using such programs for undermining homeland security increases. Virtual assistants, shopping bots, and game playing programs are used daily by millions of people. We propose applying statistical behavior modeling techniques developed by us for recognition of humans to the identification and verification of intelligent and potentially malicious software agents. Our experimental results demonstrate feasibility of such methods for both artificial agent verification and even for recognition purposes.

  10. Exploration of the Malicious Online Marketing about Taobao Shops%网络恶意营销的反思与治理

    Institute of Scientific and Technical Information of China (English)

    刘欢

    2015-01-01

    对网络恶意营销进行界定分析,指出构建商业伦理是治理网络恶意营销的关键,并尝试从宏观、微观两个层面对商业伦理进行阐释。%This paper gives a definition of malicious online marketing and states that business ethics is the key to the governance of malicious online marketing and the building of business ethics, as a systematic project, should be dealt with from macroscopic and microscopic aspects.

  11. Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Laurendeau Christine

    2009-01-01

    Full Text Available A malicious insider in a wireless network may carry out a number of devastating attacks without fear of retribution, since the messages it broadcasts are authenticated with valid credentials such as a digital signature. In attributing an attack message to its perpetrator by localizing the signal source, we can make no presumptions regarding the type of radio equipment used by a malicious transmitter, including the transmitting power utilized to carry out an exploit. Hyperbolic position bounding (HPB provides a mechanism to probabilistically estimate the candidate location of an attack message's originator using received signal strength (RSS reports, without assuming knowledge of the transmitting power. We specialize the applicability of HPB into the realm of vehicular networks and provide alternate HPB algorithms to improve localization precision and computational efficiency. We extend HPB for tracking the consecutive locations of a mobile attacker. We evaluate the localization and tracking performance of HPB in a vehicular scenario featuring a variable number of receivers and a known navigational layout. We find that HPB can position a transmitting device within stipulated guidelines for emergency services localization accuracy.

  12. On Successful E-Mail Writing

    OpenAIRE

    Vesna Vulić

    2009-01-01

    This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette o...

  13. Social networking through email : studying email usage patterns of persons with aphasia

    NARCIS (Netherlands)

    Al Mahmud, A.; Martens, J.B.O.S.

    2016-01-01

    Background: A social networking program has been developed by the Aphasia Union Netherlands (AVN) to enhance communication between older persons with aphasia (PWA) mutually and with their therapists. The medium of communication is email. Aims: The aim of the paper is to understand the email usage

  14. Non-kinetic capabilities: complementing the kinetic prevalence to targeting

    OpenAIRE

    Ducheine, P.

    2014-01-01

    Targeting is used in military doctrine to describe a military operational way, using (military) means to influence a target (or addressee) in order to achieve designated political and/or military goals. The four factors italicized are used to analyse non-kinetic targeting, complementing our knowledge and understanding of the kinetic prevalence. Paradoxically, non-kinetic targeting is not recognized as a separate concept: kinetic and non-kinetic are intertwined facets of targeting. Kinetic tar...

  15. The Use of Email to Coach Preservice Early Childhood Teachers

    Science.gov (United States)

    Barton, Erin E.; Fuller, Elizabeth A.; Schnitz, Alana

    2016-01-01

    The purpose of this study was to examine the impact of performance feedback on preservice teachers' use of recommended practices within inclusive early childhood classrooms. A multiple baseline design across behaviors was used to examine the relation between performance feedback delivered via email and practicum students' use of target-recommended…

  16. Making Nuclear Malaysia Email Archives Portable

    International Nuclear Information System (INIS)

    Shaharum Ramli

    2013-01-01

    Nuclear Malaysia e-mails can be accessed from any computer and anywhere, even worldwide, via web access. However, this mobility is lost when the e-mails are moved to a personal computer into archive files such as Microsoft Outlook data files. Outlook e-mail archives can only be read on the computer where it is stored. This removal has to be done because of storage space constraints on the e-mail server. This paper shows how e-mail archives can be made portable, brought and read anywhere using a free portable e-mail client application such as Mozilla Thunderbird, Portable Edition. (author)

  17. Orality and literacy, formality and informality in email communication

    Directory of Open Access Journals (Sweden)

    Carmen Pérez Sabater

    2008-04-01

    Full Text Available Approaches to the linguistic characteristics of computer-mediated communication (CMC have highlighted the frequent oral traits involved in electronic mail along with features of written language. But email is today a new communication exchange medium in social, professional and academic settings, frequently used as a substitute for the traditional formal letter. The oral characterizations and linguistic formality involved in this use of emails are still in need of research. This paper explores the formal and informal features in emails based on a corpus of messages exchanged by academic institutions, and studies the similarities and differences on the basis of their mode of communication (one-to-one or one-to-many and the sender’s mother tongue (native or nonnative. The language samples collected were systematically analyzed for formality of greetings and farewells, use of contractions, politeness indicators and non-standard linguistic features. The findings provide new insights into traits of orality and formality in email communication and demonstrate the emergence of a new style in writing for even the most important, confidential and formal purposes which seems to be forming a new sub-genre of letter-writing.

  18. The effect of target and non-target similarity on neural classification performance: A boost from confidence

    Directory of Open Access Journals (Sweden)

    Amar R Marathe

    2015-08-01

    Full Text Available Brain computer interaction (BCI technologies have proven effective in utilizing single-trial classification algorithms to detect target images in rapid serial visualization presentation tasks. While many factors contribute to the accuracy of these algorithms, a critical aspect that is often overlooked concerns the feature similarity between target and non-target images. In most real-world environments there are likely to be many shared features between targets and non-targets resulting in similar neural activity between the two classes. It is unknown how current neural-based target classification algorithms perform when qualitatively similar target and non-target images are presented. This study address this question by comparing behavioral and neural classification performance across two conditions: first, when targets were the only infrequent stimulus presented amongst frequent background distracters; and second when targets were presented together with infrequent non-targets containing similar visual features to the targets. The resulting findings show that behavior is slower and less accurate when targets are presented together with similar non-targets; moreover, single-trial classification yielded high levels of misclassification when infrequent non-targets are included. Furthermore, we present an approach to mitigate the image misclassification. We use confidence measures to assess the quality of single-trial classification, and demonstrate that a system in which low confidence trials are reclassified through a secondary process can result in improved performance.

  19. Effects of malicious ocular laser exposure in commercial airline pilots.

    Science.gov (United States)

    Palakkamanil, Mathew M; Fielden, Michael P

    2015-12-01

    Intentional malicious laser strikes on commercial pilots are committed by individuals who target a laser into airplane cockpits during takeoff and landing. Because laser exposure to pilots is a relatively new but growing occurrence, our study investigates the ocular effect of this laser exposure in pilots. Retrospective chart review by a single ophthalmologist. All commercial airline pilots (58 male, 3 female) who experienced a laser strike while flying between April 2012 and November 2014 who presented to our clinic were included. A retrospective chart review was performed in a retinal specialist's practice. Ocular assessment was performed within 3 days of laser exposure. A complete ophthalmic evaluation was conducted, including Early Treatment Diabetic Retinopathy Study visual acuity, colour vision, visual fields, intraocular pressure, slit-lamp examination, dilated fundus examination, colour fundus photographs, and ocular coherence tomography. Sixty-four laser strike incidents involving commercial pilots were included. All pilots in the study experienced some degree of immediate ocular irritation or light sensitivity. No definite cases of ocular damage were attributed to laser strikes. No pilot had any functional ocular deficits. Our study revealed that laser strikes on aircraft did not result in permanent visual functional or structural deficits. However, laser strikes cause immediate visual effects, including glare, flash blindness, and ocular irritation that can interfere with a pilot's visual function. Given the widespread accessibility of high-power lasers and the rapid increase in incidents, laser strikes threaten to jeopardize aviation safety unless effective preventative measures are put in place. Copyright © 2015 Canadian Ophthalmological Society. Published by Elsevier Inc. All rights reserved.

  20. Malware Analyst's Cookbook and DVD Tools and Techniques for Fighting Malicious Code

    CERN Document Server

    Ligh, Michael; Hartstein, Blake

    2010-01-01

    A computer forensics "how-to" for fighting malicious code and analyzing incidents. With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.: Security professionals face a constant battle agains

  1. MalWebID-Autodetection and Identification of Malicious Web Hosts Through Live Traffic Analysis

    Science.gov (United States)

    2013-03-01

    site (i.e., Porn , Rx/Pharmaceutical, illegal activity, etc.) – propagate or contain viruses, spyware, or other harmful programs, participate in spamming...abu- sive sites remain a constant problem. This thesis explores a technique to discern hosts that support abusive web infrastructure by discovering...in- clude, but is not limited to, web sites that cater to, sponsor, or actively participate in supporting various forms of malicious content. Thus

  2. Legal Issues in Cyber Targeting

    DEFF Research Database (Denmark)

    Juhlin, Jonas Alastair

    Imagine this scenario: Two states are in armed conflict with each other. In order to gain an advantage, one side launches a cyber-attack against the opponent’s computer network. The malicious malware paralyze the military computer network, as intended, but the malware spreads into the civilian...... system with physical damage to follow. This can happen and the natural question arises: What must be considered lawful targeting according to the international humanitarian law in cyber warfare? What steps must an attacker take to minimize the damage done to unlawful targets when conducting an offensive...... operation? How can the attacker separate military targets from civilian targets in cyber space? This paper addresses these questions and argues that a network (civilian or military) consist of several software components and that it is the individual components that is the target. If the components are used...

  3. Interviewing When You’re Not Face-To-Face: The Use of Email Interviews in a Phenomenological Study

    Directory of Open Access Journals (Sweden)

    Chandra Bowden

    2015-01-01

    Full Text Available As Internet usage becomes more commonplace, researchers are beginning to explore the use of email interviews. Email interviews have a unique set of tools, advantages, and limitations, and are not meant to be blind reproductions of traditional face-to-face interview techniques. Email interviews should be implemented when: 1 researchers can justify email interviews are useful to a research project; 2 there is evidence that the target population will be open to email interviewing as a form of data collection; and 3 the justification of the email interview supports the researchers’ theoretical perspective. The objective of this study was to develop an email interviewing methodology. As with other forms of qualitative interviewing, it is important that the researcher: 1 identifies constraints; 2 adequately prepares for the interview; 3 establishes rapport; 4 asks appropriate questions; 5 actively listens; and 6 ends the email interview appropriately.

  4. Detecting malicious chaotic signals in wireless sensor network

    Science.gov (United States)

    Upadhyay, Ranjit Kumar; Kumari, Sangeeta

    2018-02-01

    In this paper, an e-epidemic Susceptible-Infected-Vaccinated (SIV) model has been proposed to analyze the effect of node immunization and worms attacking dynamics in wireless sensor network. A modified nonlinear incidence rate with cyrtoid type functional response has been considered using sleep and active mode approach. Detailed stability analysis and the sufficient criteria for the persistence of the model system have been established. We also established different types of bifurcation analysis for different equilibria at different critical points of the control parameters. We performed a detailed Hopf bifurcation analysis and determine the direction and stability of the bifurcating periodic solutions using center manifold theorem. Numerical simulations are carried out to confirm the theoretical results. The impact of the control parameters on the dynamics of the model system has been investigated and malicious chaotic signals are detected. Finally, we have analyzed the effect of time delay on the dynamics of the model system.

  5. Community composition of target vs. non-target fungi in fungicide treated wheat

    DEFF Research Database (Denmark)

    Knorr, Kamilla; Jørgensen, Lise Nistrup; Justesen, Annemarie Fejer

    2012-01-01

    disease in wheat and within the last decade, new aggressive strains of yellow rust has caused severe epidemics that lead to substantial yield losses. This study explored the community composition of target versus non-target fungi in yellow rust infected wheat as affected by treatment timing and dose......Fungicide treatments are common control strategies used to manage fungal pathogens in agricultural fields, however, effects of treatments on the composition of total fungal communities, including non-target fungi, in the phyllosphere is not well known. Yellow rust (Puccinia striiformis) is a common...

  6. Dataset of anomalies and malicious acts in a cyber-physical subsystem.

    Science.gov (United States)

    Laso, Pedro Merino; Brosset, David; Puentes, John

    2017-10-01

    This article presents a dataset produced to investigate how data and information quality estimations enable to detect aNomalies and malicious acts in cyber-physical systems. Data were acquired making use of a cyber-physical subsystem consisting of liquid containers for fuel or water, along with its automated control and data acquisition infrastructure. Described data consist of temporal series representing five operational scenarios - Normal, aNomalies, breakdown, sabotages, and cyber-attacks - corresponding to 15 different real situations. The dataset is publicly available in the .zip file published with the article, to investigate and compare faulty operation detection and characterization methods for cyber-physical systems.

  7. Impacts of transgenic poplar-cotton agro-ecosystems upon target pests and non-target insects under field conditions.

    Science.gov (United States)

    Zhang, D J; Liu, J X; Lu, Z Y; Li, C L; Comada, E; Yang, M S

    2015-07-27

    Poplar-cotton agro-ecosystems are the main agricultural planting modes of cotton fields in China. With increasing acres devoted to transgenic insect-resistant poplar and transgenic insect-resistant cotton, studies examining the effects of transgenic plants on target and non-target insects become increasingly important. We systematically surveyed populations of both target pests and non-target insects for 4 different combinations of poplar-cotton eco-systems over 3 years. Transgenic Bt cotton strongly resisted the target insects Fall webworm moth [Hyphantria cunea (Drury)], Sylepta derogata Fabrieius, and American bollworm (Heliothis armigera), but no clear impact on non-target insect cotton aphids (Aphis gossypii). Importantly, intercrops containing transgenic Pb29 poplar significantly increased the inhibitory effects of Bt cotton on Fall webworm moth in ecosystem IV. Highly resistant Pb29 poplar reduced populations of the target pests Grnsonoma minutara Hubner and non-target insect poplar leaf aphid (Chaitophorus po-pulialbae), while Fall webworm moth populations were unaffected. We determined the effects of Bt toxin from transgenic poplar and cotton on target and non-target pests in different ecosystems of cotton-poplar intercrops and identified the synergistic effects of such combinations toward both target and non-target insects.

  8. Protecting software agents from malicious hosts using quantum computing

    Science.gov (United States)

    Reisner, John; Donkor, Eric

    2000-07-01

    We evaluate how quantum computing can be applied to security problems for software agents. Agent-based computing, which merges technological advances in artificial intelligence and mobile computing, is a rapidly growing domain, especially in applications such as electronic commerce, network management, information retrieval, and mission planning. System security is one of the more eminent research areas in agent-based computing, and the specific problem of protecting a mobile agent from a potentially hostile host is one of the most difficult of these challenges. In this work, we describe our agent model, and discuss the capabilities and limitations of classical solutions to the malicious host problem. Quantum computing may be extremely helpful in addressing the limitations of classical solutions to this problem. This paper highlights some of the areas where quantum computing could be applied to agent security.

  9. A Software Assurance Framework for Mitigating the Risks of Malicious Software in Embedded Systems Used in Aircraft

    Science.gov (United States)

    2011-09-01

    in what order, certain programming techniques such as recursion and trampoline code make this task impossible at compile time (and thus not...attack is used to jump to the hidden malicious code. This code just returns until it is time to cause a problem Stack Data Trampoline or

  10. Radar automatic target recognition (ATR) and non-cooperative target recognition (NCTR)

    CERN Document Server

    Blacknell, David

    2013-01-01

    The ability to detect and locate targets by day or night, over wide areas, regardless of weather conditions has long made radar a key sensor in many military and civil applications. However, the ability to automatically and reliably distinguish different targets represents a difficult challenge. Radar Automatic Target Recognition (ATR) and Non-Cooperative Target Recognition (NCTR) captures material presented in the NATO SET-172 lecture series to provide an overview of the state-of-the-art and continuing challenges of radar target recognition. Topics covered include the problem as applied to th

  11. Factors affecting acceptability of an email-based intervention to increase fruit and vegetable consumption.

    Science.gov (United States)

    Kothe, Emily J; Mullan, Barbara A

    2014-09-30

    Fresh Facts is a 30-day email-delivered intervention designed to increase the fruit and vegetable consumption of Australian young adults. This study investigated the extent to which the program was acceptable to members of the target audience and examined the relationships between participant and intervention characteristics, attrition, effectiveness, and acceptability ratings. Young adults were randomised to two levels of message frequency: high-frequency (n = 102), low-frequency (n = 173). Individuals in the high-frequency group received daily emails while individuals in the low-frequency group received an email every 3 days. Individuals in the high-frequency group were more likely to indicate that they received too many emails than individuals in the low-frequency group. No other differences in acceptability were observed. Baseline beliefs about fruit and vegetables were an important predictor of intervention acceptability. In turn, acceptability was associated with a number of indicators of intervention success, including change in fruit and vegetable consumption. The findings highlight the importance of considering the relationship between these intervention and participant factors and acceptability in intervention design and evaluation. Results support the ongoing use of email-based interventions to target fruit and vegetable consumption within young adults. However, the relationships between beliefs about fruit and vegetable consumption and acceptability suggest that this intervention may be differentially effective depending on individual's existing beliefs about fruit and vegetable consumption. As such, there is a pressing need to consider these factors in future research in order to minimize attrition and maximize intervention effectiveness when interventions are implemented outside of a research context.

  12. Troubleshooting Requests e-mail Confirmation

    CERN Multimedia

    TS Department

    2004-01-01

    In an ongoing effort to improve quality of the repair requests, a new e-mail confirmation automatic system will be implemented starting from the 21st October. All repair requests transmitted to the TCR (72201) or the FM Helpdesk (77777) will be confirmed in an e-mail to the requestor, provided that the latter has a valid e-mail address in the HR database. The e-mail will contain a reference number, a brief description of the problem, the location and a contact where more information can be obtained. A second e-mail will be sent when the processing of the repair request is finished. We hope that this initiative will improve the transparency and quality of our service. Helpdesk Troubleshooting Requests (reminder) We remind you that all the repair requests and other communication concerning the CERN machine buildings have to be transmitted to the TCR via 72201, whereas the ones concerning tertiary buildings are handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equ...

  13. The use of physician-patient email: a follow-up examination of adoption and best-practice adherence 2005-2008.

    Science.gov (United States)

    Menachemi, Nir; Prickett, Charles T; Brooks, Robert G

    2011-02-25

    Improved communication from physician- patient emailing is an important element of patient centeredness. Physician-patient email use has been low; and previous data from Florida suggest that physicians who email with patients rarely implement best-practice guidelines designed to protect physicians and patients. Our objective was to examine whether email use with patients has changed over time (2005-2008) by using two surveys of Florida physicians, and to determine whether physicians have more readily embraced the best-practice guidelines in 2008 versus 2005. Lastly, we explored the 2008 factors associated with email use with patients and determined whether these factors changed relative to 2005. Our pooled time-series design used results from a 2005 survey (targeting 14,921 physicians) and a separate 2008 survey (targeting 7003 different physicians). In both years, physicians practicing in the outpatient setting were targeted with proportionally identical sampling strategies. Combined data from questions focusing on email use were analyzed using chi-square analysis, Fisher exact test, and logistic regression. A combined 6260 responses were available for analyses, representing a participation rate of 28.2% (4203/14,921) in 2005 and 29.4% (2057/7003) in 2008. Relative to 2005, respondents in 2008 were more likely to indicate that they personally used email with patients (690/4148, 16.6% vs 408/2001, 20.4%, c(2) (1) = 13.0, P email with patients did not change from 2005 to 2008 (2.9% vs 59/2001, 2.9%). Interest among physicians in future email use with patients was lower in 2008 (58.4% vs 52.8%, c(2) (2) = 16.6, P email best practices remained low in 2008. When comparing 2005 and 2008 adherences with each of the individual guidelines, rates decreased over time in each category and were significantly lower for 4 of the 13 guidelines. Physician characteristics in 2008 that predicted email use with patients were different from 2005. Specifically, in multivariate analysis

  14. Using email reminders to engage physicians in an Internet-based CME intervention

    Directory of Open Access Journals (Sweden)

    Wall Terry

    2004-09-01

    Full Text Available Abstract Background Engaging practicing physicians in educational strategies that reinforce guideline adoption and improve the quality of healthcare may be difficult. Push technologies such as email offer new opportunities to engage physicians in online educational reinforcing strategies. The objectives are to investigate 1 the effectiveness of email announcements in engaging recruited community-based primary care physicians in an online guideline reinforcement strategy designed to promote Chlamydia screening, 2 the characteristics of physicians who respond to email announcements, as well as 3 how quickly and when they respond to email announcements. Methods Over a 45-week period, 445 recruited physicians received up to 33 email contacts announcing and reminding them of an online women's health guideline reinforcing CME activity. Participation was defined as physician log-on at least once to the website. Data were analyzed to determine participation, to compare characteristics of participants with recruited physicians who did not participate, and to determine at what point and when participants logged on. Results Of 445 recruited physicians with accurate email addresses, 47.2% logged on and completed at least one module. There were no significant differences by age, race, or specialty between participants and non-participants. Female physicians, US medical graduates and MDs had higher participation rates than male physicians, international medical graduates and DOs. Physicians with higher baseline screening rates were significantly more likely to log on to the course. The first 10 emails were the most effective in engaging community-based physicians to complete the intervention. Physicians were more likely to log on in the afternoon and evening and on Monday or Thursday. Conclusions Email course reminders may enhance recruitment of physicians to interventions designed to reinforce guideline adoption; physicians' response to email reminders may

  15. E-mail, decisional styles, and rest breaks.

    Science.gov (United States)

    Baker, James R; Phillips, James G

    2007-10-01

    E-mail is a common but problematic work application. A scale was created to measure tendencies to use e-mail to take breaks (e-breaking); and self-esteem and decisional style (vigilance, procrastination, buck-passing, hypervigilance) were used to predict the self-reported and actual e-mail behaviors of 133 participants (students and marketing employees). Individuals who were low in defensive avoidance (buck-passing) engaged in more e-mailing per week, both in time spent on e-mail and message volume. E-breakers were more likely to engage in behavioral procrastination and spent more time on personal e-mail.

  16. Mifrenz: Safe email for children

    Directory of Open Access Journals (Sweden)

    Tim Hunt

    Full Text Available Products currently available for monitoring children\\'s email usage are either considered to encourage dubious ethical behaviour or are time consuming for parents to administer. This paper describes the development of a new email client application for children called Mifrenz. This new application gives parents the ability to let their children safely use email, with the minimum of intervention. It was developed using mostly free software and also with the desire to provide real first hand programming examples to demonstrate to students.

  17. Intense or malicious? The decoding of eyebrow-lowering frowning in laughter animations depends on the presentation mode

    Science.gov (United States)

    Hofmann, Jennifer

    2014-01-01

    Joyful laughter is the only laughter type that has received sufficient validation in terms of morphology (i.e., face, voice). Still, it is unclear whether joyful laughter involves one prototypical facial-morphological configuration (Duchenne Display and mouth opening) to be decoded as such, or whether qualitatively distinct facial markers occur at different stages of laughter intensity. It was proposed that intense laughter goes along with eyebrow-lowering frowning, but in decoding studies of pictures, these “frowns” were associated with perceived maliciousness rather than higher intensity. Thus, two studies were conducted to investigate the influence of the presentation mode (static, dynamic) and eyebrow-lowering frowning on the perception of laughter animations of different intensity. In Study 1, participants (N = 110) were randomly assigned to two presentation modes (static pictures vs. dynamic videos) to watch animations of Duchenne laughter and laughter with added eyebrow-lowering frowning. Ratings on the intensity, valence, and contagiousness of the laughter were completed. In Study 2, participants (N = 55) saw both animation types in both presentation modes sequentially. Results confirmed that the static presentation lead to eyebrow-lowering frowning in intense laughter being perceived as more malicious, less intense, less benevolent, and less contagious compared to the dynamic presentation. This was replicated for maliciousness in Study 2, although participants could potentially infer the “frown” as a natural element of the laugh, as they had seen the video and the picture. Thus, a dynamic presentation is necessary for detecting graduating intensity markers in the joyfully laughing face. While this study focused on the decoding, future studies should investigate the encoding of frowning in laughter. This is important, as tools assessing facially expressed joy might need to account for laughter intensity markers that differ from the Duchenne Display

  18. MedlinePlus Connect: Email List

    Science.gov (United States)

    ... MedlinePlus Connect → Email List URL of this page: https://medlineplus.gov/connect/emaillist.html MedlinePlus Connect: Email ... will change.) Old URLs New URLs Web Application https://apps.nlm.nih.gov/medlineplus/services/mpconnect.cfm? ...

  19. The Importance of Etiquette in School Email

    Science.gov (United States)

    Filippone, Monica; Survinski, Melissa

    2016-01-01

    This article investigates the appropriate use of email among secondary and postsecondary students and instructors and provides recommendations for proper email etiquette. A review of the current literature shows that poor email etiquette can impact the working relationship between teachers and students. Evidence indicates that email etiquette must…

  20. Acceptability of a theory of planned behaviour email-based nutrition intervention.

    Science.gov (United States)

    Kothe, E J; Mullan, B A

    2014-03-01

    This study investigated feasibility and acceptability of a new email-delivered intervention promoting fruit and vegetable consumption in a university-based population of Australian young adults. The study explored whether there are differences in the reported feasibility and acceptability between demographic groups within the population of interest and at three levels of intervention intensity. The email-delivered intervention program consists of an implementation intention 'planning task' and between 3 and 15 short email messages over a 15-day study period. The intervention program was developed using the Theory of Planned Behaviour and was designed to modify perceived behavioural control. One hundred and ten participants (mean age = 19.21 years, 25.6% male) completed the feasibility and acceptability questionnaire at Day 15. This questionnaire contained items about all intervention components. High acceptability and feasibility scores were found for all intervention parts and at all levels of intervention intensity. There were few significant differences in the reported acceptability of items between key demographic sub-groups, and no differences in reported acceptability at different levels of intervention intensity. These results suggest that this email-delivered intervention is an acceptable and feasible tool for promoting fruit and vegetable consumption for participants in the target population.

  1. Non-targeted mutagenesis of unirradiated lambda phage in Escherichia coli

    International Nuclear Information System (INIS)

    Wood, R.D.; Hutchinson, F.

    1984-01-01

    Non-targeted mutagenesis of lambda phage by ultraviolet light is the increase over background mutagenesis when non-irradiated phage are grown in irradiated Escherichia coli host cells. Such mutagenesis is caused by different processes from targeted mutagenesis, in which mutations in irradiated phage are correlated with photoproducts in the phage DNA. Non-irradiated phage grown in heavily irradiated uvr + host cells showed non-targeted mutations, which were 3/4 frameshifts, whereas targeted mutations were 2/3 transitions. For non-targeted mutagenesis in heavily irradiated host cells, there were one or two mutant phage per mutant burst. From the results of a series of experiments with various mutant host cells, a major pathway of non-targeted mutagenesis by ultraviolet light was proposed which acts in addition to ''SOS induction''. This pathway involves binding of the enzyme DNA polymerase I to damaged genomic DNA, and low polymerase activity leads to frameshift mutations during semiconservative DNA replication. The data suggest that this process will play a much smaller role in ultraviolet mutagenesis of the bacterial genome than it does in the mutagenesis of lambda phage. (author)

  2. FNAL central email systems

    Energy Technology Data Exchange (ETDEWEB)

    Schmidt, Jack; Lilianstrom, Al; Pasetes, Ray; Hill, Kevin; /Fermilab

    2004-10-01

    The FNAL Email System is the primary point of entry for email destined for an employee or user at Fermilab. This centrally supported system is designed for reliability and availability. It uses multiple layers of protection to help ensure that: (1) SPAM messages are tagged properly; (2) All mail is inspected for viruses; and (3) Valid mail gets delivered. This system employs numerous redundant subsystems to accomplish these tasks.

  3. Transparent Proxy for Secure E-Mail

    Science.gov (United States)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  4. The effect of target and non-target similarity on neural classification performance: A boost from confidence

    OpenAIRE

    Amar R Marathe; Anthony J Ries; Vernon J Lawhern; Vernon J Lawhern; Brent J Lance; Jonathan eTouryan; Kaleb eMcDowell; Hubert eCecotti

    2015-01-01

    Brain computer interaction (BCI) technologies have proven effective in utilizing single-trial classification algorithms to detect target images in rapid serial visualization presentation tasks. While many factors contribute to the accuracy of these algorithms, a critical aspect that is often overlooked concerns the feature similarity between target and non-target images. In most real-world environments there are likely to be many shared features between targets and non-targets resulting in si...

  5. The effect of target and non-target similarity on neural classification performance: a boost from confidence

    OpenAIRE

    Marathe, Amar R.; Ries, Anthony J.; Lawhern, Vernon J.; Lance, Brent J.; Touryan, Jonathan; McDowell, Kaleb; Cecotti, Hubert

    2015-01-01

    Brain computer interaction (BCI) technologies have proven effective in utilizing single-trial classification algorithms to detect target images in rapid serial visualization presentation tasks. While many factors contribute to the accuracy of these algorithms, a critical aspect that is often overlooked concerns the feature similarity between target and non-target images. In most real-world environments there are likely to be many shared features between targets and non-targets resulting in si...

  6. Non-targeted effects of ionising radiation - Implications for radiation protection

    International Nuclear Information System (INIS)

    Sisko Salomaa

    2006-01-01

    The universality of the target theory of radiation-induced effects is challenged by observations on non-targeted effects such as bystander effects, genomic instability and adaptive response. Essential features of non-targeted effects are that they do not require direct nuclear exposure by radiation and they are particularly significant at low doses. This new evidence suggests a need for a new paradigm in radiation biology. The new paradigm should cover both the classical (targeted) and the non-targeted effects. New aspects include the role of cellular communication and tissue-level responses. A better understanding of non-targeted effects may have important consequences for health risk assessment and, consequently, on radiation protection. Non-targeted effects may contribute to the estimation of cancer risk from occupational, medical and environmental exposures. In particular, they may have implications for the applicability of the Linear-No-Threshold (LNT) model in extrapolating radiation risk data into the low-dose region. This also means that the adequacy of the concept of dose to estimate risk is challenged by these findings. Moreover, these effects may provide new mechanistic explanations for the development of non-cancer diseases. Further research is required to determine if these effects, typically measured in cell cultures, are applicable in tissue level, whole animals, and ultimately in humans. (author)

  7. Non-targeted effects of ionising radiation - Implications for radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Sisko Salomaa [STUK - Radiation and Nuclear Safety Authority, Helsinki (Finland)

    2006-07-01

    The universality of the target theory of radiation-induced effects is challenged by observations on non-targeted effects such as bystander effects, genomic instability and adaptive response. Essential features of non-targeted effects are that they do not require direct nuclear exposure by radiation and they are particularly significant at low doses. This new evidence suggests a need for a new paradigm in radiation biology. The new paradigm should cover both the classical (targeted) and the non-targeted effects. New aspects include the role of cellular communication and tissue-level responses. A better understanding of non-targeted effects may have important consequences for health risk assessment and, consequently, on radiation protection. Non-targeted effects may contribute to the estimation of cancer risk from occupational, medical and environmental exposures. In particular, they may have implications for the applicability of the Linear-No-Threshold (LNT) model in extrapolating radiation risk data into the low-dose region. This also means that the adequacy of the concept of dose to estimate risk is challenged by these findings. Moreover, these effects may provide new mechanistic explanations for the development of non-cancer diseases. Further research is required to determine if these effects, typically measured in cell cultures, are applicable in tissue level, whole animals, and ultimately in humans. (author)

  8. Non-targeted mutagenesis of unirradiated lambda phage in Escherichia coli

    Energy Technology Data Exchange (ETDEWEB)

    Wood, R.D.; Hutchinson, F. (Yale Univ., New Haven, CT (USA). Dept. of Molecular Biophysics and Biochemistry)

    1984-03-05

    Non-targeted mutagenesis of lambda phage by ultraviolet light is the increase over background mutagenesis when non-irradiated phage are grown in irradiated Escherichia coli host cells. Such mutagenesis is caused by different processes from targeted mutagenesis, in which mutations in irradiated phage are correlated with photoproducts in the phage DNA. Non-irradiated phage grown in heavily irradiated uvr/sup +/ host cells showed non-targeted mutations, which were 3/4 frameshifts, whereas targeted mutations were 2/3 transitions. For non-targeted mutagenesis in heavily irradiated host cells, there were one or two mutant phage per mutant burst. From the results of a series of experiments with various mutant host cells, a major pathway of non-targeted mutagenesis by ultraviolet light was proposed which acts in addition to ''SOS induction''. This pathway involves binding of the enzyme DNA polymerase I to damaged genomic DNA, and low polymerase activity leads to frameshift mutations during semiconservative DNA replication. The data suggest that this process will play a much smaller role in ultraviolet mutagenesis of the bacterial genome than it does in the mutagenesis of lambda phage.

  9. Association between secure patient-clinician email and clinical services utilisation in a US integrated health system: a retrospective cohort study.

    Science.gov (United States)

    Meng, Di; Palen, Ted E; Tsai, Joanne; McLeod, Melanie; Garrido, Terhilda; Qian, Heather

    2015-11-09

    To assess associations between secure patient-clinician email use and clinical services utilisation over time. Retrospective cohort study between July 2010 and December 2013. Controlling for a utilisation surge around first secure email use, we analysed difference of differences between propensity score-matched groups of secure patient-clinician email users and non-users for utilisation 1-12 months before and 7-18 months after first email (users) or a randomly assigned index date (non-users). US integrated healthcare delivery system. 9345 adults with first secure email use between July 2011 and July 2012 and continuous enrolment for ≥30 months and 9345 adults without secure email use between July 2010 and July 2012 matched to users on demographics, health status, and baseline utilisation. Rates of office visits, patient-initiated phone calls, scheduled telephone visits, after-hours clinic visits, emergency department visits, and hospitalisations. After controlling for multiple factors, no statistically significant differences in utilisation between secure email users and non-users occurred. Utilisation transiently increased by 88-237% around first email use. Annual rates of patient-initiated phone calls decreased among secure email users, 0.2 fewer calls per person (95% CI -0.3 to -0.1), from a mean of 4.1 calls per person 1-12 months before first use to a mean of 3.8 calls per person 7-18 months after first use. Rates of patient-initiated phone calls also decreased among non-users, 0.1 fewer calls per person (95% CI -0.2 to 0.0), from a mean of 4.2 calls per person 1-12 months before the index date to mean of 4.1 calls per person 7-18 months after the index date. Compared with non-users, patient use of secure email with clinicians was not associated with statistically significant differences in clinical services utilisation 7-18 months after first use. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted

  10. Common Knowledge in Email Exchanges

    NARCIS (Netherlands)

    Sietsma, F.; Apt, K.R.

    We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. This allows us to

  11. Common knowledge in email exchanges

    NARCIS (Netherlands)

    Sietsma, F.; Apt, K.R.

    2011-01-01

    We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. This allows us to

  12. BEBAN JARINGAN SAAT MENGAKSES EMAIL DARI BEBERAPA MAIL SERVER

    Directory of Open Access Journals (Sweden)

    Husni Thamrin

    2017-01-01

    Full Text Available Expensive internet facilities require prudent in its use both as a source of information and communication media. This paper discusses observations of the perceived burden of network bandwidth when accessing some of the mail server using a webmail application. Mail server in question consists of three commercial server and 2 non-commercial server. Data when it download home page, while logged in, open the email, and during idle logout recorded with sniffer Wireshark. Observations in various situations and scenarios indicate that access Yahoo email gives the network load is very high while the SquirrelMail gives the network load is very low than 5 other mail servers. For an institution, use a local mail server (institutional is highly recommended in the context of banddwidth savings.

  13. Detection of Illegitimate Emails using Boosting Algorithm

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    and spam email detection. For our desired task, we have applied a boosting technique. With the use of boosting we can achieve high accuracy of traditional classification algorithms. When using boosting one has to choose a suitable weak learner as well as the number of boosting iterations. In this paper, we......In this paper, we report on experiments to detect illegitimate emails using boosting algorithm. We call an email illegitimate if it is not useful for the receiver or for the society. We have divided the problem into two major areas of illegitimate email detection: suspicious email detection...

  14. Email Negotiation

    DEFF Research Database (Denmark)

    Bülow, Anne Marie

    the other of the justice of their cause. For a negotiation involving the wording of a contract, the evidence suggests that, while there is a distinct advantage in the features of reviewability and revisablity, the email format allows selective attention to the other party’s arguments, which can be shown...

  15. Private and Secure Distribution of Targeted Advertisements to Mobile Phones

    Directory of Open Access Journals (Sweden)

    Stylianos S. Mamais

    2017-05-01

    Full Text Available Online Behavioural Advertising (OBA enables promotion companies to effectively target users with ads that best satisfy their purchasing needs. This is highly beneficial for both vendors and publishers who are the owners of the advertising platforms, such as websites and app developers, but at the same time creates a serious privacy threat for users who expose their consumer interests. In this paper, we categorize the available ad-distribution methods and identify their limitations in terms of security, privacy, targeting effectiveness and practicality. We contribute our own system, which utilizes opportunistic networking in order to distribute targeted adverts within a social network. We improve upon previous work by eliminating the need for trust among the users (network nodes while at the same time achieving low memory and bandwidth overhead, which are inherent problems of many opportunistic networks. Our protocol accomplishes this by identifying similarities between the consumer interests of users and then allows them to share access to the same adverts, which need to be downloaded only once. Although the same ads may be viewed by multiple users, privacy is preserved as the users do not learn each other’s advertising interests. An additional contribution is that malicious users cannot alter the ads in order to spread malicious content, and also, they cannot launch impersonation attacks.

  16. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  17. Save our inboxes! Use e-mail wisely

    CERN Multimedia

    Achintya Rao

    2013-01-01

    At CERN, with collaborators all over the world, e-mail is inevitably the primary means of communication: we use it for everything from coordinating projects to organising lunches. But e-mail can also be one of the most inefficient means of communication we have! Here's how to fix it.   Let’s get straight to the point: we receive too many e-mails. Think about all the e-mails that you deleted without a second thought. Think about the times you’ve unnecessarily been in CC. Take a look at the unread e-mails sitting in your inbox at this very moment, ones that you have no intention of ever looking at. You can, however, tame this overload with a few simple measures and turn e-mail into an important communication and productivity tool. Many recommendations for improving e-mail etiquette suggest an abrasive approach riddled with bullet points. In a vastly multi-cultural setting such as CERN, however this approach may fail. So, here are a few dos and don’ts based o...

  18. Communicating the non-targeted effects of radiation from irradiated to non-irradiated cells

    International Nuclear Information System (INIS)

    Laiakis, E.C.; Morgan, W.F.

    2005-01-01

    For many years, the central dogma in radiobiology has been that energy deposited in the cell nucleus is responsible for the biological effects associated with radiation exposure. However, non-targeted and delayed effects of radiation have shifted this belief. The studies of radiation-induced genomic instability, the bystander and abscopal effects, clastogenic factors, and the Death Inducing Effect have dominated the interest of the radiobiology field of late. The passing of signals from irradiated to non-irradiated cells can be accomplished through cell-to-cell gap junction communication or secretion of molecules, which in turn can elicit a response through activation of signal transduction pathways. Proposed mediators of this phenotype include proteins involved with inflammation. Given their size and connection with oxidative stress, cytokines are an attractive candidate as mediators of the induction of the non-targeted effects of radiation. Here we review the evidence for a possible connection between these delayed non-targeted effects of radiation and the cytokine cascades associated with inflammation. (author)

  19. Analyzing E-mail communication of prospective learners

    Directory of Open Access Journals (Sweden)

    Anurag SAXENA

    2005-10-01

    Full Text Available Analyzing E-mail communication of prospective learners Vibha JOSHIAnurag SAXENA Reader School of Management IGNOU, New Delhi, INDIA ABSTRACT Today, computer has replaced all means of communication significantly. E-mail is the most popular means of communication through computers. It has vanished the boundaries between the cities, countries and continents. Earlier Studies that used this medium, had shown evidence of higher quality of responses and also significant cost savings feature of this method (mainly for convenience of dispatch for research purposes. In this communication, an attempt has been made to utilize email responses of prospective learners in education discipline based programs offered through open learning system. The inception of this study is linked to the creation of website (http://www.ignou.ac.in/ and availability of information related to all activated and prospective programs of studies, various school of studies, faculty email addresses and faculty vis-à-vis program coordinator in the University. The present study analyzed 65 email responses received from July 2002 to till date by the researcher on her email ID. These respondents got the email ID from the University website and due to their eagerness to attain qualifications in the field of education/guidance/educational management, sent an e-mail to the program coordinator(s. These email responses were analyzed in order to visualize the learner profiles and viability of the ongoing as well as prospective programs of studies. This paper tries to analyze the e-mail responses of the people who either by surfing IGNOU’s website or from other sources came to know about the various programs of studies offered by the School of Education. The study validates that there is an amount of hidden information even in the curiosity of the learners.

  20. Conversation Threads Hidden within Email Server Logs

    Science.gov (United States)

    Palus, Sebastian; Kazienko, Przemysław

    Email server logs contain records of all email Exchange through this server. Often we would like to analyze those emails not separately but in conversation thread, especially when we need to analyze social network extracted from those email logs. Unfortunately each mail is in different record and those record are not tided to each other in any obvious way. In this paper method for discussion threads extraction was proposed together with experiments on two different data sets - Enron and WrUT..

  1. Understanding email communication of persons with aphasia

    NARCIS (Netherlands)

    Al Mahmud, A.; Martens, J.B.O.S.

    2011-01-01

    An email program has been developed by the Aphasia Union Netherlands (AVN) to enhance communication between aphasics mutually and with their therapists. In this paper we report intermediate evaluation results of the AVN email program. We evaluated the email program in two ways: a. by analyzing the

  2. Publication’s e-mail marketing procedure

    OpenAIRE

    Ebrahim, Nader Ale

    2016-01-01

    Your research findings and publications have to reach thousands of your peers and colleagues by sending an email. If you have recently published a study that would be of interest to others in your field, market it through email. “E-mail marketing” allow the researchers to increase the research impact and citations for their publications. This workshop will provide various techniques to increase the visibility and enhance the impact of researcher’s output by employing the publications E-mail m...

  3. Behavior change through automated e-mails: mediation analysis of self-help strategy use for depressive symptoms.

    Science.gov (United States)

    Morgan, Amy J; Mackinnon, Andrew J; Jorm, Anthony F

    2013-02-01

    To evaluate whether automated e-mails promoting effective self-help strategies for depressive symptoms were effective in changing self-help behavior, and whether this improved depression outcomes. 568 adults with sub-threshold depression participated in a randomized controlled trial and provided complete data. A series of 12 e-mails promoting the use of evidence-based self-help strategies was compared with e-mails providing non-directive depression information. Depression symptoms were assessed with the Patient Health Questionnaire depression scale (PHQ-9) and use of self-help strategies was assessed at baseline and post-intervention. We hypothesized that those receiving the self-help e-mails would increase their use of evidence-based self-help and this would be associated with improvements in depression. Mediation analyses were conducted using a non-parametric bootstrapping procedure. Total use of the self-help strategies promoted in the e-mails significantly mediated the effect of the intervention on depressive symptoms (B = -0.75, SE = 0.16, 95% CI: -1.06 to -0.48). The direct effect of the intervention on depressive symptoms was much smaller and not significant when the mediation path was included. The majority of the individual strategies also had a significant indirect effect on depressive symptoms. In adults with sub-threshold depression, automated e-mails based on behavior change principles can successfully increase use of self-help strategies, leading to a reduction in depressive symptoms. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. Decisional style, mood and work communication: email diaries.

    Science.gov (United States)

    Shirren, S; Phillips, J G

    2011-10-01

    To understand the use of technology to support interpersonal interaction, a theory of decisional style was applied to email use within the workplace. Previous research has used self-report and rating scales to address employee email behaviours, but this falls short of management's capability to monitor the actual behaviour. Thirty-nine employed individuals completed a five-day communication diary recording their actual behaviour upon receiving personal and work-related emails as well as the Melbourne Decision Making Questionnaire and the Depression Anxiety Stress Scales. It was found that vigilant individuals were more likely to use email in an efficient manner by deleting personal email and being less likely to open email later. Procrastinators, buckpassers and people experiencing high levels of negative affect were all more likely to delay dealing with email, which could be viewed as dealing with email in a less efficient manner. STATEMENT OF RELEVANCE: This work offers insights as to how people receive and process emails and is thus relevant to the development and implementation of collaborative technologies. Whilst other studies use individual's self-reports, this study uses a more accurate communication diary. Decisional style can predict the monitoring and response to electronic communication.

  5. Email Adaptation for Conflict Handling

    DEFF Research Database (Denmark)

    Lee, Joyce Yi‐Hui; Panteli, Niki; Bülow, Anne Marie

    2018-01-01

    This paper explores the context of email‐based communication in anestablished but fragile, inter‐organisational partnership, which wasoften overlain with conflict. Drawing upon adaptation theory, thisstudy explores how participants adapt to the use of email to handleconflict. Extensive data were...... obtained during a 6‐month field studyof a case of cross‐border inter‐organisational collaboration in EastAsia. We observed that the individuals involved in the cross‐borderpartnership used email as a lean form of communication to stopcovert conflict from explicitly emerging. In contrast to prior researchon...... the leanness of email in managing conflict, we found that underthe described conflict situation the very leanness of emailwas appreciated and thus, exploited by those concerned tomanage the conflict situation. Specifically, we identified 4 keyconflict‐triggered adaptation strategies, namely...

  6. Studies of Non-Targeted Effects of Ionising Radiation

    International Nuclear Information System (INIS)

    Oleg V Belyakov; Heli Mononen; Marjo Peraelae

    2006-01-01

    The discovery of ionising radiation induced non-targeted effects is important for understanding the dose-response mechanisms relevant to low dose irradiation in vivo. One important question is whether the non-targeted effects relates to a protective mechanism or whether, conversely, it amplifies the number of cells damaged by the isolated radiation tracks of low dose exposures leading to an increased risk of carcinogenesis. One theory supported by the experimental data obtained during this project is that the main functions of the non-targeted effects are to decrease the risk of transformation in a multicellular organism exposed to radiation. Differences in the gene expression profiles, temporal and spatial patterns of key proteins expressed in directly irradiated and bystander cells may determine how the cells ultimately respond to low doses of radiation. Such a mechanism of co-operative response would make the tissue system much more robust. (N.C.)

  7. Studies of Non-Targeted Effects of Ionising Radiation

    Energy Technology Data Exchange (ETDEWEB)

    Oleg V Belyakov; Heli Mononen; Marjo Peraelae [STUK - Radiation and Nuclear Safety Authority, Helsinki (Finland)

    2006-07-01

    The discovery of ionising radiation induced non-targeted effects is important for understanding the dose-response mechanisms relevant to low dose irradiation in vivo. One important question is whether the non-targeted effects relates to a protective mechanism or whether, conversely, it amplifies the number of cells damaged by the isolated radiation tracks of low dose exposures leading to an increased risk of carcinogenesis. One theory supported by the experimental data obtained during this project is that the main functions of the non-targeted effects are to decrease the risk of transformation in a multicellular organism exposed to radiation. Differences in the gene expression profiles, temporal and spatial patterns of key proteins expressed in directly irradiated and bystander cells may determine how the cells ultimately respond to low doses of radiation. Such a mechanism of co-operative response would make the tissue system much more robust. (N.C.)

  8. Phishing E-Mails--Six Month Investigation into What People Click

    Science.gov (United States)

    Lehrfeld, Michael R.

    2014-01-01

    Phishing and SPAM emails have been used by marketers and hackers alike since the inception of email and the Internet. Phishing messages have become so common that many legitimate emails often get flagged and placed in a user's spam bucket. No one is denying that these messages are at a minimum a nuisance, and in many cases malicious. But what is…

  9. Parsing (malicious pleasures: Schadenfreude and gloating at others’ adversity

    Directory of Open Access Journals (Sweden)

    Colin Wayne Leach

    2015-02-01

    Full Text Available We offer the first empirical comparison of the pleasure in seeing (i.e., schadenfreude and in causing (i.e., gloating others’ adversity. In Study 1, we asked participants to recall and report on an (individual or group episode of pleasure that conformed to our formal definition of schadenfreude, gloating, pride, or joy, without reference to an emotion word. Schadenfreude and gloating were distinct in the situational features of the episode, participants’ appraisals of it, and their expressions of pleasure (e.g., smiling, boasting. In Study 2, we had participants imagine being in an (individual or group emotion episode designed to fit our conceptualization of schadenfreude or gloating. Individual and group versions of the emotions did not differ much in either study. However, the two pleasures differed greatly in their situational features, appraisals, experience, and expression. This parsing of the particular pleasures of schadenfreude and gloating brings nuance to the study of (malicious pleasure, which tends to be less finely conceptualized and examined than displeasure despite its importance to social relations.

  10. E-mail communication in pain practice: The importance of being earnest.

    Science.gov (United States)

    Ruiz, Irene Solera; García, Guadalupe Población; Riquelme, Irene

    2014-07-01

    Information technology can play a vital role in meeting patient needs and reinforcing the relationship among patients and their pain physicians. However, strong resistance remains on the medical side to this type of non-frontal care. The primary objective of this study was to assess the effectiveness of an E-mail intervention on customers' satisfaction. The secondary goals were to analyze the messages from patients to their clinician (not only the volume but also the content) and the impact on client, professional and health services outcomes. A prospective, non-randomized evaluation of patients undergoing treatment for chronic pain from September 2011 to May 2012. A private, specialty referral center in Spain. Participants were users visiting the Pain Management Unit evaluated by one physician. The E-mail address of the facility was written in every medical report provided. Patient satisfaction at the end of the 8-month trial period was assessed and outcomes recorded. Patients reported better communication with their therapist and greater satisfaction with overall care. 780 E-mails were read. Specialists received an average of 5 messages per day (standard deviation 0,3). None of them was unsuitable. This is a prospective, single center evaluation performed by one doctor. There was no control group due to ethical considerations. Electronic communication is a cheap, easy and feasible way to address a wide range of concerns, thus enhancing patients' satisfaction. More efforts are needed to implement routinely usage of this tool. If used appropriately, E-mail can facilitate physician-dependent interactions, promote access to care, save time and reduce costs. Concerns about billing, improper utilization, privacy and confidentiality might complicate its introduction and acceptance. Internet access remains a significant barrier to online patient-provider transference.

  11. E-mail communication in pain practice: The importance of being earnest

    Directory of Open Access Journals (Sweden)

    Irene Solera Ruiz

    2014-01-01

    Full Text Available Background: Information technology can play a vital role in meeting patient needs and reinforcing the relationship among patients and their pain physicians. However, strong resistance remains on the medical side to this type of non-frontal care. Objectives: The primary objective of this study was to assess the effectiveness of an E-mail intervention on customers′ satisfaction. The secondary goals were to analyze the messages from patients to their clinician (not only the volume but also the content and the impact on client, professional and health services outcomes. Study Design: A prospective, non-randomized evaluation of patients undergoing treatment for chronic pain from September 2011 to May 2012. Setting: A private, specialty referral center in Spain. Materials and Methods: Participants were users visiting the Pain Management Unit evaluated by one physician. The E-mail address of the facility was written in every medical report provided. Patient satisfaction at the end of the 8-month trial period was assessed and outcomes recorded. Results: Patients reported better communication with their therapist and greater satisfaction with overall care. 780 E-mails were read. Specialists received an average of 5 messages per day (standard deviation 0,3. None of them was unsuitable. Limitations: This is a prospective, single center evaluation performed by one doctor. There was no control group due to ethical considerations. Conclusion s : Electronic communication is a cheap, easy and feasible way to address a wide range of concerns, thus enhancing patients′ satisfaction. More efforts are needed to implement routinely usage of this tool. If used appropriately, E-mail can facilitate physician-dependent interactions, promote access to care, save time and reduce costs. Concerns about billing, improper utilization, privacy and confidentiality might complicate its introduction and acceptance. Internet access remains a significant barrier to online

  12. Develop a solution for protecting and securing enterprise networks from malicious attacks

    Science.gov (United States)

    Kamuru, Harshitha; Nijim, Mais

    2014-05-01

    In the world of computer and network security, there are myriad ways to launch an attack, which, from the perspective of a network, can usually be defined as "traffic that has huge malicious intent." Firewall acts as one of the measure in order to secure the device from incoming unauthorized data. There are infinite number of computer attacks that no firewall can prevent, such as those executed locally on the machine by a malicious user. From the network's perspective, there are numerous types of attack. All the attacks that degrade the effectiveness of data can be grouped into two types: brute force and precision. The Firewall that belongs to Juniper has the capability to protect against both types of attack. Denial of Service (DoS) attacks are one of the most well-known network security threats under brute force attacks, which is largely due to the high-profile way in which they can affect networks. Over the years, some of the largest, most respected Internet sites have been effectively taken offline by Denial of Service (DOS) attacks. A DoS attack typically has a singular focus, namely, to cause the services running on a particular host or network to become unavailable. Some DoS attacks exploit vulnerabilities in an operating system and cause it to crash, such as the infamous Win nuke attack. Others submerge a network or device with traffic so that there are no more resources to handle legitimate traffic. Precision attacks typically involve multiple phases and often involves a bit more thought than brute force attacks, all the way from reconnaissance to machine ownership. Before a precision attack is launched, information about the victim needs to be gathered. This information gathering typically takes the form of various types of scans to determine available hosts, networks, and ports. The hosts available on a network can be determined by ping sweeps. The available ports on a machine can be located by port scans. Screens cover a wide variety of attack traffic

  13. Investigasi Forensik Pada E-Mail Spoofing Menggunakan Metode Header Analysis

    OpenAIRE

    Hoiriyah, Hoiriyah; Sugiantoro, Bambang; Prayudi, Yudi

    2016-01-01

    Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar informasi. Hal ini memungkinkan pihak ketiga menyalahgunakan email untuk mendapatkan informasi secara ilegal dengan mengubah identitas pengirim email dan menjadikannya seperti email yang berasal dari email yang sah (legitimate email), aktivitas tersebut biasa dikenal dengan istilah email spoofing. Untuk dapat mendeteksi adanya email spoofing, maka perlu adanya investigasi forensik email terhadap ...

  14. Mobilização política por e-mail: uma análise da Avaaz como ator-rede

    Directory of Open Access Journals (Sweden)

    Marcelo Castañeda

    2015-04-01

    Full Text Available The article analyzes the Avaaz (an organization that uses the internet intensively, their practices and operating flows in light of the actor-network theory developed by Bruno Latour. To do this, the paper begins by presenting this theoretical model that seeks to insert material objects in sociological analysis in order to characterize the organization of campaigns as a heterogeneous group composed of human and non-human that are configured to each campaign launched. The article focuses on the characterization of Avaaz members, their distribution around the world, e-mail alerts that are sent to members, the participation opportunities offered, the different themes and targets built each campaign.

  15. Non-LTE effects in inertial confinement fusion target chambers

    International Nuclear Information System (INIS)

    MacFarlane, J.J.; Moses, G.A.; Peterson, R.R.

    1989-01-01

    In previous studies of transport processes in inertial confinement fusion target chambers, the radiative properties of the background plasma were calculated under the assumption of local thermodynamic equilibrium (LTE). In this paper, the authors present a study of the equation of state and the radiative properties of high temperature, low-to-moderate density ( 21 cm -3 ) plasmas for the determination of the conditions under which non-LTE effects become important and for an assessment of the importance of non-LTE processes in target chambers during high yield inertial fusion target explosions. For this purpose, two-body (radiative and dielectronic) and three-body (collisional) recombination and de-excitation processes are considered in calculating the steady state ionization and excitation populations. The results of this study indicate that non-LTE processes generally become important at temperatures of > or approx. 1, 10 and 100 eV for plasma densities of 10 18 , 10 19 and 10 21 cm -3 , respectively. Radiation hydrodynamic simulations utilizing the equation of state and the opacities for a non-LTE argon plasma were performed to study the response of a background gas to an inertial fusion target explosion. These calculations indicate that non-LTE processes are often the dominant atomic processes in the background plasma and that they can strongly affect the radiative and shock properties as energy is transported away from the point of the target explosion. (author). 22 refs, 10 figs, 1 tab

  16. The role of email addresses and email contact in encouraging web response in a mixed mode design

    OpenAIRE

    Cernat, Alexandru; Lynn, Peter

    2014-01-01

    We examine whether propensity to participate in a web-CAPI mixed-mode survey is influenced by being contacted by email in addition to mail. In panel surveys, researchers can ask at each wave for an email address, but there is little evidence regarding the value of doing so. Using data from a large sample with an experimental design (IP5) we find that using a respondent-supplied email address to send additional invites and reminders does not affect response rates compared to using mailed invit...

  17. A novel Trojan-horse targeting strategy to reduce the non-specific uptake of nanocarriers by non-cancerous cells.

    Science.gov (United States)

    Shen, Zheyu; Wu, Hao; Yang, Sugeun; Ma, Xuehua; Li, Zihou; Tan, Mingqian; Wu, Aiguo

    2015-11-01

    One big challenge with active targeting of nanocarriers is non-specific binding between targeting molecules and non-target moieties expressed on non-cancerous cells, which leads to non-specific uptake of nanocarriers by non-cancerous cells. Here, we propose a novel Trojan-horse targeting strategy to hide or expose the targeting molecules of nanocarriers on-demand. The non-specific uptake by non-cancerous cells can be reduced because the targeting molecules are hidden in hydrophilic polymers. The nanocarriers are still actively targetable to cancer cells because the targeting molecules can be exposed on-demand at tumor regions. Typically, Fe3O4 nanocrystals (FN) as magnetic resonance imaging (MRI) contrast agents were encapsulated into albumin nanoparticles (AN), and then folic acid (FA) and pH-sensitive polymers (PP) were grafted onto the surface of AN-FN to construct PP-FA-AN-FN nanoparticles. Fourier transform infrared spectroscopy (FT-IR), dynamic light scattering (DLS), transmission electron microscope (TEM) and gel permeation chromatography (GPC) results confirm successful construction of PP-FA-AN-FN. According to difference of nanoparticle-cellular uptake between pH 7.4 and 5.5, the weight ratio of conjugated PP to nanoparticle FA-AN-FN (i.e. graft density) and the molecular weight of PP (i.e. graft length) are optimized to be 1.32 and 5.7 kDa, respectively. In vitro studies confirm that the PP can hide ligand FA to prevent it from binding to cells with FRα at pH 7.4 and shrink to expose FA at pH 5.5. In vivo studies demonstrate that our Trojan-horse targeting strategy can reduce the non-specific uptake of the PP-FA-AN-FN by non-cancerous cells. Therefore, our PP-FA-AN-FN might be used as an accurately targeted MRI contrast agent. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Two Quarantine Models on the Attack of Malicious Objects in Computer Network

    Directory of Open Access Journals (Sweden)

    Bimal Kumar Mishra

    2012-01-01

    Full Text Available SEIQR (Susceptible, Exposed, Infectious, Quarantined, and Recovered models for the transmission of malicious objects with simple mass action incidence and standard incidence rate in computer network are formulated. Threshold, equilibrium, and their stability are discussed for the simple mass action incidence and standard incidence rate. Global stability and asymptotic stability of endemic equilibrium for simple mass action incidence have been shown. With the help of Poincare Bendixson Property, asymptotic stability of endemic equilibrium for standard incidence rate has been shown. Numerical methods have been used to solve and simulate the system of differential equations. The effect of quarantine on recovered nodes is analyzed. We have also analyzed the behavior of the susceptible, exposed, infected, quarantine, and recovered nodes in the computer network.

  19. Adaptive and Reactive Security for Wireless Sensor Networks

    National Research Council Canada - National Science Library

    Stankovic, John A

    2007-01-01

    .... WSNs are also susceptible to malicious, non-random security attacks. For example, a wireless sensor network deployed in remote regions to detect and classify targets could be rendered inoperative by various security attacks...

  20. CEAI: CCM based Email Authorship Identification Model

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah

    2013-01-01

    In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some...... more interesting and effective features for email authorship identification (e.g. the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell). We also included Info Gain feature selection based...... reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM)-based models, as well as the models proposed by Iqbal et al. [1, 2]. The proposed model attains an accuracy rate of 94% for 10...

  1. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2014-01-01

    for important variations of the secure pattern matching problem that are significantly more efficient than the current state of art solutions: First, we deal with secure pattern matching with wildcards. In this variant the pattern may contain wildcards that match both 0 and 1. Our protocol requires O......We propose a protocol for the problem of secure two-party pattern matching, where Alice holds a text t∈{0,1}∗ of length n, while Bob has a pattern p∈{0,1}∗ of length m. The goal is for Bob to (only) learn where his pattern occurs in Alice’s text, while Alice learns nothing. Private pattern matching...... is an important problem that has many applications in the area of DNA search, computational biology and more. Our construction guarantees full simulation in the presence of malicious, polynomial-time adversaries (assuming the hardness of DDH assumption) and exhibits computation and communication costs of O...

  2. Crouching tiger - Hidden payload

    DEFF Research Database (Denmark)

    Heiderich, Mario; Frosch, Tilman; Jensen, Meiko

    2011-01-01

    functional, one-file web applications potentially containing HTML, JavaScript, Flash, and other interactive code structures. We found that even more severe problems have resulted from the often improper handling of complex and maliciously prepared SVG files by the browsers. In this paper, we introduce...... several novel attack techniques targeted at major websites, as well as modern browsers, email clients and other comparable tools. In particular, we illustrate that SVG images embedded via tag and CSS can execute arbitrary JavaScript code. We examine and present how current filtering techniques...

  3. An Approach for Detecting Malicious Emails Using Runtime Monitoring with Hidden Data

    Science.gov (United States)

    2016-09-01

    Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE September 2016...awareness of conditions, a quality mentioned in the Fiskiran and Lee’s paper [3]. In addition, by using temporal assertions, we demonstrate the detection of...requirements [18]. For example, we give a generalization of how natural language can be ambiguous. No restaurants will allow smoking inside. Here no

  4. Non-targeted effects of ionising radiation—Implications for low dose risk

    DEFF Research Database (Denmark)

    Kadhim, Munira; Salomaa, Sisko; Wright, Eric

    2013-01-01

    and adaptive responses are powered by fundamental, but not clearly understood systems that maintain tissue homeostasis. Despite excellent research in this field by various groups, there are still gaps in our understanding of the likely mechanisms associated with non-DNA targeted effects, particularly......Non-DNA targeted effects of ionising radiation, which include genomic instability, and a variety of bystander effects including abscopal effects and bystander mediated adaptive response, have raised concerns about the magnitude of low-dose radiation risk. Genomic instability, bystander effects....... Furthermore, it is still not known what the initial target and early interactions in cells are that give rise to non-targeted responses in neighbouring or descendant cells. This paper provides a commentary on the current state of the field as a result of the non-targeted effects of ionising radiation (NOTE...

  5. Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection

    KAUST Repository

    Wang, Wei

    2014-10-07

    Android has been a major target of malicious applications (malapps). How to detect and keep the malapps out of the app markets is an ongoing challenge. One of the central design points of Android security mechanism is permission control that restricts the access of apps to core facilities of devices. However, it imparts a significant responsibility to the app developers with regard to accurately specifying the requested permissions and to the users with regard to fully understanding the risk of granting certain combinations of permissions. Android permissions requested by an app depict the app\\'s behavioral patterns. In order to help understanding Android permissions, in this paper, we explore the permission-induced risk in Android apps on three levels in a systematic manner. First, we thoroughly analyze the risk of an individual permission and the risk of a group of collaborative permissions. We employ three feature ranking methods, namely, mutual information, correlation coefficient, and T-test to rank Android individual permissions with respect to their risk. We then use sequential forward selection as well as principal component analysis to identify risky permission subsets. Second, we evaluate the usefulness of risky permissions for malapp detection with support vector machine, decision trees, as well as random forest. Third, we in depth analyze the detection results and discuss the feasibility as well as the limitations of malapp detection based on permission requests. We evaluate our methods on a very large official app set consisting of 310 926 benign apps and 4868 real-world malapps and on a third-party app sets. The empirical results show that our malapp detectors built on risky permissions give satisfied performance (a detection rate as 94.62% with a false positive rate as 0.6%), catch the malapps\\' essential patterns on violating permission access regulations, and are universally applicable to unknown malapps (detection rate as 74.03%).

  6. Email for clinical communication between healthcare professionals.

    Science.gov (United States)

    Goyder, Clare; Atherton, Helen; Car, Mate; Heneghan, Carl J; Car, Josip

    2015-02-20

    Email is one of the most widely used methods of communication, but its use in healthcare is still uncommon. Where email communication has been utilised in health care, its purposes have included clinical communication between healthcare professionals, but the effects of using email in this way are not well known. We updated a 2012 review of the use of email for two-way clinical communication between healthcare professionals. To assess the effects of email for clinical communication between healthcare professionals on healthcare professional outcomes, patient outcomes, health service performance, and service efficiency and acceptability, when compared to other forms of communicating clinical information. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 9 2013), MEDLINE (OvidSP) (1946 to August 2013), EMBASE (OvidSP) (1974 to August 2013), PsycINFO (1967 to August 2013), CINAHL (EbscoHOST) (1982 to August 2013), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched November 2013). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies, and interrupted time series studies examining interventions in which healthcare professionals used email for communicating clinical information in the form of: 1) unsecured email, 2) secure email, or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two authors independently assessed studies for inclusion, assessed the included studies' risk of bias, and extracted data. We contacted study authors for additional information and have reported all measures as per the study report. The previous version of this review included one randomised controlled

  7. Simultaneous quantification of tumor uptake for targeted and non-targeted liposomes and their encapsulated contents by ICP-MS

    Science.gov (United States)

    Cheng, Zhiliang; Zaki, Ajlan Al; Hui, James Z; Tsourkas, Andrew

    2012-01-01

    Liposomes are intensively being developed for biomedical applications including drug and gene delivery. However, targeted liposomal delivery in cancer treatment is a very complicated multi-step process. Unfavorable liposome biodistribution upon intravenous administration and membrane destabilization in blood circulation could result in only a very small fraction of cargo reaching the tumors. It would therefore be desirable to develop new quantitative strategies to track liposomal delivery systems to improve the therapeutic index and decrease systemic toxicity. Here, we developed a simple and non-radiative method to quantify the tumor uptake of targeted and non-targeted control liposomes as well as their encapsulated contents simultaneously. Specifically, four different chelated lanthanide metals were encapsulated or surface-conjugated onto tumor-targeted and non-targeted liposomes, respectively. The two liposome formulations were then injected into tumor-bearing mice simultaneously and their tumor delivery was determined quantitatively via inductively coupled plasma-mass spectroscopy (ICP-MS), allowing for direct comparisons. Tumor uptake of the liposomes themselves and their encapsulated contents were consistent with targeted and non-targeted liposome formulations that were injected individually. PMID:22882145

  8. Theoretical Approaches on Successful Email Marketing Campaigns

    Directory of Open Access Journals (Sweden)

    Camelia Budac

    2016-01-01

    This paper aims to bring some clarifications on what could bring success to email marketingcampaigns. Responses are related to how sent emails can draw the attention of people (ie how theycan be observed, given that, users’ inboxes are invaded by messages of all kinds, how to measurethe results of a campaign and which are the best practices through which we can get higher returnsfrom email marketing campaigns.

  9. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  10. A Generalized Email Classification System for Workflow Analysis

    NARCIS (Netherlands)

    P. Chaipornkaew (Piyanuch); T. Prexawanprasut (Takorn); C-L. Chang (Chia-Lin); M.J. McAleer (Michael)

    2017-01-01

    textabstractOne of the most powerful internet communication channels is email. As employees and their clients communicate primarily via email, much crucial business data is conveyed via email content. Where businesses are understandably concerned, they need a sophisticated workflow management

  11. Recent Advances in Targetable Therapeutics in Metastatic Non-Squamous NSCLC

    Directory of Open Access Journals (Sweden)

    Pranshu eBansal

    2016-05-01

    Full Text Available Lung adenocarcinoma is the most common subtype of non-small cell lung cancer (NSCLC. With the discovery of epidermal growth factor receptor (EGFR mutations, anaplastic lymphoma kinase (ALK rearrangements and effective targeted therapies, therapeutic options are expanding for patients with lung adenocarcinoma. Here, we review novel therapies in non-squamous NSCLC, which are directed against oncogenic targets, including EGFR, ALK, ROS1, BRAF, MET, human epidermal growth factor receptor 2 (HER2, vascular endothelial growth factor receptor 2 (VEGFR2, RET and NTRK. With the rapidly evolving molecular testing and development of new targeted agents, our ability to further personalize therapy in non-squamous NSCLC is rapidly expanding.

  12. A survey to evaluate patients' perspective concerning e-mail in an oncology practice

    International Nuclear Information System (INIS)

    Katzen, C.S.; Dicker, A.P.

    2001-01-01

    white (94%) with 6% African American. Sixty-four percent or respondents had access to an e-mail account at home or work. Among these e-mail users, 66% were between the ages of 58-68, and 34% were more than 68 years old. Eight-one percent of email users had completed some or all of college, and 19 % had completed some or all of high school. The majority of patients indicated that the benefits of e-mail were to eliminate phone calls (70%), to increase the timeliness of a message (81%), to arrange appointments (73%), to ask a physician health related questions (79%), to refill prescriptions (64 %). Only one-third of patients felt e-mail to be appropriate to ask urgent health questions. Most patients (72%) felt comfortable responding to health questions sent by their doctor by e-mail. When controlling for age within this group 57% of patients who preferred e-mail were under 68 years old and 43% of patients were over 68 years old. When evaluating education level, 64% of the patients that preferred using email had a college or graduate degree and 36% had completed some or all of high school. More than half of respondents (61%) felt comfortable answering questions via e-mail that were posed to them by someone in their doctor's office, such as, a nurse, or physician's assistant. Patients were evenly divided when asked about confidentiality (56% unconcerned). Conclusion: This study demonstrated that patients were interested in using e-mail in non-urgent situations and to improve the timeliness of communication. Patients preferred e-mail for increased convenience and efficiency regarding minor health problems and did not prefer it for answers to more urgent health questions. Patients with at least a college degree were inclined to use e-mail over those who had completed some or all of high school. Patients who were not currently using e-mail responded favorably to the notion of communicating via e-mail with their physician and/or physician's staff. Our survey revealed that

  13. Are You Managing Your Email - Or is Email Managing You? An Analysis of Email Among Personnel Within Army Project Management Offices

    National Research Council Canada - National Science Library

    Baroni, Brian; Cook, Linda; Keitelman, Marian; Miller, Steven; Wardle, Adelia

    2005-01-01

    Based on a class project that developed leadership communication competencies for seven levels of Army civilians, email was found to be the most prevalent means of communication, regardless of leadership level...

  14. PENGIRIMAN E-MAIL SPAM SEBAGAI KEJAHATAN CYBER DI INDONESIA

    Directory of Open Access Journals (Sweden)

    Eka Nugraha Putra

    2018-01-01

    Full Text Available The Internet is part of the development of technology, where the internet provides many impacts, both positive and negative. Currently, privacy issues on the internet have also become a complicated legal issue, this is due to quite a number of privacy-related issues, but not all countries in the world manage privacy issues on the internet. As a means of communicating the Internet has introduced e-mail that provides convenience and practicality. But in its development e-mail has an adverse impact on its users in the form of e-mail spam. In terms of its actions, sending spam e-mail is quite a disadvantage, even violate the privacy. Some countries have also set it to one type of cybercrime (cybercrime. This research will discuss e-mail spam in Indonesia, how the legislation in Indonesia see the action of this spam e-mail, is there any possibility of spam e-mail is criminalized as a cybercrime. The research will also look at how spam e-mails violate privacy and review and analyze internet privacy settings in Indonesia in relation to the criminalization of spam email.

  15. Reaching consumers: How the tobacco industry uses email marketing.

    Science.gov (United States)

    Brock, Betsy; Carlson, Samantha C; Moilanen, Molly; Schillo, Barbara A

    2016-12-01

    Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the state of Minnesota, US between January 2010 and May 2015 to determine email frequency by brand. These emails were gathered as part of ongoing surveillance of tobacco industry direct marketing. A subset of these emails received between October 2014 and May 2015 (n = 1646) were content analyzed to identify the purpose of the email communication along with type of product promoted. Tobacco companies use email to communicate with consumers on a regular basis. This communication was observed to be as frequent as nine times per month. Emails are most commonly used to promote contests (54.1%), content on tobacco company websites (39.1%), and tobacco coupons (15.7%). Email promotion of menthol-flavored tobacco products was common and was associated with promotion of coupons. Emails promoting menthol had a 1.9 times higher prevalence of also promoting coupons (95% CI: 1.52-2.37). Little is known about tobacco company email marketing and this study fills an identified research gap. A deeper understanding of this type of marketing is needed in order to counter tobacco industry messaging and advance tobacco control.

  16. Reaching consumers: How the tobacco industry uses email marketing

    Directory of Open Access Journals (Sweden)

    Betsy Brock

    2016-12-01

    Full Text Available Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the state of Minnesota, US between January 2010 and May 2015 to determine email frequency by brand. These emails were gathered as part of ongoing surveillance of tobacco industry direct marketing. A subset of these emails received between October 2014 and May 2015 (n = 1646 were content analyzed to identify the purpose of the email communication along with type of product promoted. Tobacco companies use email to communicate with consumers on a regular basis. This communication was observed to be as frequent as nine times per month. Emails are most commonly used to promote contests (54.1%, content on tobacco company websites (39.1%, and tobacco coupons (15.7%. Email promotion of menthol-flavored tobacco products was common and was associated with promotion of coupons. Emails promoting menthol had a 1.9 times higher prevalence of also promoting coupons (95% CI: 1.52–2.37. Little is known about tobacco company email marketing and this study fills an identified research gap. A deeper understanding of this type of marketing is needed in order to counter tobacco industry messaging and advance tobacco control.

  17. Using Email to Improve Parental Involvement in Middle School

    Science.gov (United States)

    Radin, Benjamin Theodore

    2013-01-01

    The purpose of this study was to test the relationship between the type of school-to-home communication (regularly sent, structured emails versus ad hoc emails), the originator of these emails (teacher or student), and Parental Involvement (PI) as measured according to the frequency of email contact and distribution of student and parent emails…

  18. Exogenous Nitric Oxide Suppresses in Vivo X-ray-Induced Targeted and Non-Targeted Effects in Zebrafish Embryos

    Directory of Open Access Journals (Sweden)

    E.Y. Kong

    2016-08-01

    Full Text Available The present paper studied the X-ray-induced targeted effect in irradiated zebrafish embryos (Danio rerio, as well as a non-targeted effect in bystander naïve embryos partnered with irradiated embryos, and examined the influence of exogenous nitric oxide (NO on these targeted and non-targeted effects. The exogenous NO was generated using an NO donor, S-nitroso-N-acetylpenicillamine (SNAP. The targeted and non-targeted effects, as well as the toxicity of the SNAP, were assessed using the number of apoptotic events in the zebrafish embryos at 24 h post fertilization (hpf revealed through acridine orange (AO staining. SNAP with concentrations of 20 and 100 µM were first confirmed to have no significant toxicity on zebrafish embryos. The targeted effect was mitigated in zebrafish embryos if they were pretreated with 100 µM SNAP prior to irradiation with an X-ray dose of 75 mGy but was not alleviated in zebrafish embryos if they were pretreated with 20 µM SNAP. On the other hand, the non-targeted effect was eliminated in the bystander naïve zebrafish embryos if they were pretreated with 20 or 100 µM SNAP prior to partnering with zebrafish embryos having been subjected to irradiation with an X-ray dose of 75 mGy. These findings revealed the importance of NO in the protection against damages induced by ionizing radiations or by radiation-induced bystander signals, and could have important impacts on development of advanced cancer treatment strategies.

  19. Data Leakage Prevention: E-Mail Protection via Gateway

    Science.gov (United States)

    Kaur, Kamaljeet; Gupta, Ishu; Singh, Ashutosh Kumar

    2018-01-01

    Protection of digital assets and intellectual property is becoming a challenge for most of the companies. Due to increasing availability of database services on internet, data may be insecure after passing through precarious networks. To protect intellectual property (IP) is a major concern for today's organizations, because a leakage that compromises IP means, sensitive information of a company is in the hands of biggest competitors. Electronic information processing and communication is replacing paper in many applications increasingly. Instead of paper, an email is being used for communication at workplace and from social media logins to bank accounts. Nowadays an email is becoming a mainstream business tool. An email can be misused to leave company’s sensitive data open to compromise. So, it may be of little surprise that attacks on emails are common. So, here we need an email protection system (EPS) that will protect information to leave organization via mail. In this paper, we developed an algorithm that will offer email protection via gateway during data transfer. This algorithm matches the patterns with the keywords stored in the database and then takes the actions accordingly to protect the data. This paper describes why email protection is important? How companies can protect their confidential information from being leaked by insiders.

  20. Teaching Email Politeness in the EFL/ESL Classroom

    Science.gov (United States)

    Economidou-Kogetsidis, Maria

    2015-01-01

    Writing status-congruent emails is a skill that requires high pragmatic competence and awareness of the politeness conventions and email etiquette that need to be followed. Planning and composing such emails pose a greater challenge for EFL learners who use English in "lingua franca" communication (ELF), as they not only often struggle…

  1. [Email in a dedicated headache clinic: experience gained over a five-year period].

    Science.gov (United States)

    Pedraza, M Isabel; Herrero-Velázquez, Sonia; López-Mesonero, Luis; Ruiz-Piñero, Marina; Posadas, Javier; Guerrero-Peral, Ángel L

    2015-06-16

    The use of email can facilitate communication between the different levels of an organisation. Our primary care physicians have had an email service in the dedicated headache clinic (DHC) since November 2009, and our aim is therefore to analyse the use of email over that five-year period. Data concerning the emails sent up until October 2014 were collected prospectively. The questions were classified as need for referral to the DHC (group 1), progress made by the cases seen in the DHC (group 2), training in headaches (group 3) or the treatment of the headaches suffered by primary care physicians themselves as patients (group 4). A total of 274 email messages were analysed. Monthly consultations have increased (from 1.5 per month during the first year to 7.5 per month during the fifth). Findings showed that 10.2% of the email messages came from rural health centres and 89.8% were sent from urban health centres. Replies were sent within 2 ± 2.8 days (range: 0-24 days). Altogether 130 consultations were classified as belonging to group 1 (47.4%), in which referral through the normal channel was recommended in 60 cases (46.2%), via the preferential channel in 47 (36.2%) and non-referral was suggested in 23 cases (17.6%). Group 2 included 125 emails (45.7%) and in 80 cases there was no need to make a new appointment or to bring forward the existing one (64%). Thirteen visits (4.7%) were classified into group 3 and six (2.2%) in group 4. Our primary care physicians are using the email of the DHC on an increasingly more frequent basis. Its use makes it possible to detect patients whose appointment -whether the first or a follow-up- needs to be brought forward, as well as allowing issues to be solved without the need for referral. It is effective for the treatment of physicians who themselves have headaches and as a tool for continuing education.

  2. CEAI: CCM-based email authorship identification model

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2013-11-01

    Full Text Available In this paper we present a model for email authorship identification (EAI by employing a Cluster-based Classification (CCM technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature set to include some more interesting and effective features for email authorship identification (e.g., the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell. We also included Info Gain feature selection based content features. It is observed that the use of such features in the authorship identification process has a positive impact on the accuracy of the authorship identification task. We performed experiments to justify our arguments and compared the results with other base line models. Experimental results reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM-based models, as well as the models proposed by Iqbal et al. (2010, 2013 [1,2]. The proposed model attains an accuracy rate of 94% for 10 authors, 89% for 25 authors, and 81% for 50 authors, respectively on Enron dataset, while 89.5% accuracy has been achieved on authors’ constructed real email dataset. The results on Enron dataset have been achieved on quite a large number of authors as compared to the models proposed by Iqbal et al. [1,2].

  3. Report: Congressionally Requested Inquiry Into the EPA’s Use of Private and Alias Email Accounts

    Science.gov (United States)

    Report #13-P-0433, September 26, 2013. We found no evidence that the EPA used, promoted or encouraged the use of private “non-governmental” email accounts to circumvent records management responsibilities

  4. INTELLIGENT E-MAIL PERSONALIZATION SYSTEM

    Directory of Open Access Journals (Sweden)

    SHANMUGASUNDARAM HARIHARAN

    2011-02-01

    Full Text Available In Internet era E-mail has become the most important mode of communication in every day life. E-mail offers several advantages like secure delivery, speed, cheaper cost, acknowledgement report, transparent service, and distributed environment. As spammers try to induce large amount of spam or unsolicited mails, managing these E-mails’s in an efficient manner requires huge attention. This paper focus on personalizing the E-mail messages after eliminating the spam messages. The basic step starts with pre-processing the documents and classifying the contents into several folders or categories. The next step is to cluster the documents based on the relativeness they have using cosine similarity metric. This clustering approach is carried out using unsupervised method. The mail messages are the parsed through a filter that would identify the spam immediately. Studies on personalization of mails after spam identification, prioritizing the E-mail’s based on the importance and summarization of were also proposed. The results were quiet promising leading to efficient spam identification providing a platform for further improvements to build a domain independent personalizer system.

  5. The Educational Impact of E-Mail: Extraverted versus Introverted Students.

    Science.gov (United States)

    Kunderewicz, Larisa; Michener, Stacey; Chambliss, Catherine

    College students (N=151) completed surveys assessing the relationship between e-mail use and extraversion. The variables studied included time spent on e-mail; the frequency of e-mail usage; and the purposes e-mail served for each student. The results suggest that extraverts use e-mail as a form of procrastination more than introverts, and that…

  6. Test and Evaluation of the Malicious Activity Simulation Tool (MAST) in a Local Area Network (LAN) Running the Common PC Operating System Environment (COMPOSE)

    Science.gov (United States)

    2013-09-01

    Malicious Activity Simulation Tool MMORPG Massively Multiplayer Online Role-Playing Game MMS Mission Management Server MOA Memorandum of Agreement MS...conferencing, and massively multiplayer online role- playing games ( MMORPG ). During all of these Internet-based exchanges and transactions, the Internet user

  7. Anticipating hidden text salting in emails (extended abstract)

    OpenAIRE

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  8. Using Rhythms of Relationships to Understand Email Archives

    National Research Council Canada - National Science Library

    Perer, Adam; Shneiderman, Ben; Oard, Douglas W

    2005-01-01

    ...: analyzing the temporal rhythms of social relationships. We provide methods for constructing meaningful rhythms from the email headers by identifying relationships and interpreting their attributes. With these visualization techniques, email archive explorers can uncover insights that may have been otherwise hidden in the archive. We apply our methods to an individual's fifteen-year email archive, which consists of about 45,000 messages and over 4,000 relationships.

  9. Technology Corner: Analysing E-mail Headers For Forensic Investigation

    Directory of Open Access Journals (Sweden)

    M. Tariq Banday

    2011-06-01

    Full Text Available Electronic Mail (E-Mail, which is one of the most widely used applications of Internet, has become a global communication infrastructure service.  However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions.  A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies of clients and gateways, etc. Cyber forensic e-mail analysis is employed to collect credible evidence to bring criminals to justice. This paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Further, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions.

  10. Manifestations and mechanisms of non-targeted effects of ionizing radiation

    International Nuclear Information System (INIS)

    Wright, Eric G.

    2010-01-01

    A well-established radiobiological paradigm is that the biological effects of ionizing radiation occur in irradiated cells as a consequence of the DNA damage they incur. However, many observations of, so-called, non-targeted effects indicate that genetic alterations are not restricted to directly irradiated cells. Non-targeted effects are responses exhibited by non-irradiated cells that are the descendants of irradiated cells (radiation-induced genomic instability) or by cells that have communicated with irradiated cells (radiation-induced bystander effects). Radiation-induced genomic instability is characterized by chromosomal abnormalities, gene mutations and cell death. Similar effects, as well as responses that may be regarded as protective, have been attributed to bystander mechanisms. The majority of studies to date have used in vitro systems but some non-targeted effects have been demonstrated in vivo and there is also evidence for radiation-induced instability in the mammalian germ line. However, there may be situations where radiation-induced genomic instability in vivo may not necessarily identify genomically unstable somatic cells but the manifestation of responses to ongoing production of damaging signals generated by genotype-dependent mechanisms having properties in common with inflammatory processes. Non-targeted mechanisms have significant implications for understanding mechanisms of radiation action but the current state of knowledge does not permit definitive statements about whether these phenomena have implications for assessing radiation risk.

  11. The impact of e-mail in acquiring and retaining whole-blood donors: a comparative analysis of the Puget Sound Blood Center donor e-mail communication program.

    Science.gov (United States)

    Geyer, Maria Elena

    2005-12-01

    With the emergence of e-mail as a common form of communication, it is important to understand the role and impact e-mail can have on acquiring and retaining whole-blood donors. Whole-blood donors who opted in to receive e-mail communications (n = 43,232) from the Puget Sound Blood Center (PSBC) and as a result participated in one or more of five e-mail marketing campaigns between July 2002 and March 2003 were studied. New donors with e-mail addresses grew by 74 percent over the measurement period compared with 2 percent growth of those without e-mail addresses. Nearly 15,000 prospective donors were reached as a result of donors passing along e-mails they received from PSBC to friends and family. Nearly 5 percent of PSBC e-mail campaign recipients registered to donate online. PSBC e-mail campaigns have outperformed e-mail marketing industry mean open rates by 44 percent and click-through rates by 36 percent. E-mail is now a mainstream communication medium. It has proven to be an effective method of reaching new donors and generating new donation registrations. Donors respond more favorably to e-mail communications from PSBC compared with e-mail they receive from other organizations. Deeper understanding of how different segments of blood donors use e-mail may help blood centers adjust their donor acquisition and retention programs. New recruitment methods are needed to grow the overall donor base, and e-mail appears to have the potential to make a significant contribution to meeting this objective.

  12. Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2016-10-26

    Malware detection has been widely studied by analysing either file dropping relationships or characteristics of the file distribution network. This paper, for the first time, studies a global heterogeneous malware delivery graph fusing file dropping relationship and the topology of the file distribution network. The integration offers a unique ability of structuring the end-to-end distribution relationship. However, it brings large heterogeneous graphs to analysis. In our study, an average daily generated graph has more than 4 million edges and 2.7 million nodes that differ in type, such as IPs, URLs, and files. We propose a novel Bayesian label propagation model to unify the multi-source information, including content-agnostic features of different node types and topological information of the heterogeneous network. Our approach does not need to examine the source codes nor inspect the dynamic behaviours of a binary. Instead, it estimates the maliciousness of a given file through a semi-supervised label propagation procedure, which has a linear time complexity w.r.t. the number of nodes and edges. The evaluation on 567 million real-world download events validates that our proposed approach efficiently detects malware with a high accuracy. © 2016 Copyright held by the owner/author(s).

  13. Application for automatic e-mail forwarding

    OpenAIRE

    Skupek, Rok

    2010-01-01

    The diploma thesis has two main goals: the first objective is to develop a dynamic library, which will contain methods able to download e-mail messages from mail server using POP3 protocol. The second objective involves development of application for processing and distribution of e-mail messages. Introduction cointains presentation of a practical application example in real time situation. Here are described procedures used for development of server - client communication library, which u...

  14. Students’ Use of Email and Facebook: A Comparative Perspective

    OpenAIRE

    Rahman, Synthia Bintey

    2013-01-01

    Facebook and email have become widely used communication media to Internet users. University students are a major part of Internet users and they use email and Facebook for multiple communication purposes. This research investigates the context of using Facebook and email by university students, the context of choosing any of the medium in respective communication over the last two years, and student perceptions with regard to Facebook and email as communication media. This study was accompli...

  15. Email medication counseling services provided by Finnish community pharmacies.

    Science.gov (United States)

    Pohjanoksa-Mäntylä, Marika K; Kulovaara, Heidi; Bell, J Simon; Enäkoski, Marianne; Airaksinen, Marja S

    2008-12-01

    The importance of email as a mode of communication between medication users and pharmacists is likely to increase. However, little is known about the email medication counseling practices of community pharmacies. To determine the prevalence of email medication counseling services in Finland and to assess the accuracy and comprehensiveness of responses by pharmacies providing the opportunity for email medication counseling to inquiries related to use of antidepressants. An inventory was made of all Finnish community pharmacies that provided the opportunity for email medication counseling. Data related to the accuracy and comprehensiveness of responses were collected, using a virtual pseudo-customer method with 3 scenarios related to common concerns of patients on antidepressants. Two inquiries were emailed to each pharmacy that provided the opportunity for email medication counseling in January and February 2005. The responses were content analyzed by 2 researchers, using a prestructured scoring system. Almost one-third (30%, n = 182) of Finnish community pharmacies maintained a working Web site, and 94% of those provided the opportunity for email medication counseling. An online "ask-the-pharmacist" service was offered by 13% (n = 23) of the pharmacies with a Web site. Pharmacies responded to 54% of the email inquiries sent by the virtual pseudo-customers. The response rate and the content score ratio between mean and maximum scores varied among the scenarios. The content score ratio was highest for the scenarios concerning the adverse effects of fluoxetine (0.53, n = 55) and interactions with mirtazapine (0.52, n = 63) and lowest for the scenario related to sexual dysfunction and weight gain associated with citalopram (0.38, n = 52). Community pharmacies are potential providers of email medication counseling services. However, more attention should be directed to responding to consumer inquiries and to the content of these responses.

  16. Internet and Email Use Among STD Clinic Patients

    Science.gov (United States)

    Mark, Karen E.; Wald, Anna; Drolette, Linda; Golden, Matthew R.

    2009-01-01

    Background Little data exist on Internet and email use among STD clinic patients for research and clinical care communication. Methods An anonymous cross-sectional survey of STD clinic patients aged ≥ 18 years in Seattle, Washington, March 13–22, 2006. Results Of 489 study period patients, 251 (51%) completed the questionnaire. Participants had a median age of 30 (range 18–66) years and were 69% male, 56% White, 19% African-American, 9% Hispanic, and 7% Asian/Pacific Islander. 75% had some post-secondary education but half reported an annual income of email that they check at least 3 times a week, and 144 (57%) were willing to receive an email reminding them to come back for a follow-up appointment if diagnosed with an STD. MSM were more likely than women and heterosexual men to be regular Internet and email users (92% versus 70%, p = 0.001) and to have met a sex partner over the Internet during the past year (69% versus 11%, p email use, as was racial/ethnic background (86% of Whites, 48% of African-Americans, 73% of Hispanics, 100% of Asians/Pacific Islanders, and 57% of others, p email use are common and acceptable to many STD clinic patients for research and clinical purposes. PMID:18685548

  17. Effects of message design and content on the performance of email marketing campaigns

    OpenAIRE

    Carvalho, Ana Teresa Neves de

    2014-01-01

    With the evolution of digital technologies, new ways of carrying out marketing communication activities have emerged. For most businesses today, the Internet is the cheapest and most effective means of reaching broader audiences, target specific market segments and guide individual consumers to the last stages of their decision making journey. Meanwhile, the development of online advertising activities such as promotional emails, display ads and social networks brought about...

  18. Patient Use of Email, Facebook, and Physician Websites to Communicate with Physicians: A National Online Survey of Retail Pharmacy Users.

    Science.gov (United States)

    Lee, Joy L; Choudhry, Niteesh K; Wu, Albert W; Matlin, Olga S; Brennan, Troyen A; Shrank, William H

    2016-01-01

    Patient-physician communication often occurs outside the clinic setting; many institutions discourage electronic communication outside of established electronic health record systems. Little empirical data are available on patient interest in electronic communication and Web-based health tools that are technically feasible but not widely available. To explore patient behavior and interest in using the Internet to contact physicians. National cross-sectional online survey. A sample of 4,510 CVS customers with at least one chronic condition in the household was used to target patients with chronic conditions and their caregivers. Subjects were identified from a national panel of over 100,000 retail pharmacy customers. Of those sampled, 2,252 responded (50.0 % response rate). Survey measures included demographic and health information, patient use of email and Facebook to contact physicians, and patient interest in and use of Web-based tools for health. A total of 37 % of patients reported contacting their physicians via email within the last six months, and 18 % via Facebook. Older age was negatively associated with contacting physicians using email (OR 0.57 [95 % CI 0.41-0.78]) or Facebook (OR 0.28 [0.17-0.45]). Non-white race (OR 1.61 [1.18-2.18] and OR 1.82 [1.24-2.67]) and caregiver status (OR 1.58 [1.27-1.96] and OR 1.71 [1.31- 2.23]) were positively associated with using email and Facebook, respectively. Patients were interested in using Web-based tools to fill prescriptions, track their own health, and access health information (37-57 %), but few were currently doing so (4-8 %). In this population of retail pharmacy users, there is strong interest among patients in the use of email and Facebook to communicate with their physicians. The findings highlight the gap between patient interest for online communication and what physicians may currently provide. Improving and accelerating the adoption of secure Web messaging systems is a possible solution that

  19. Email Related Crimes%电子邮件犯罪

    Institute of Scientific and Technical Information of China (English)

    王小刚

    2006-01-01

    @@ Email has fast emerged as the world's most preferred form of communication. Billions of email messages traverse1 the globe daily. Like any other form of communication, email is also misused by criminal elements. The ease, speed and relative anonymity2 of email has made it a powerful tool for criminals.

  20. Malicious release of radioactive materials in urban area. Exposure of the public and emergency staff, protective measures

    International Nuclear Information System (INIS)

    Koch, Wolfgang; Lange, Florentin

    2016-01-01

    The preparedness for hypothetical radiological scenarios is part of the tasks for governmental authorities, safety and emergency organizations and the staff in case of the incident. The EURATOM guideline for radiation protection has to be implemented into national laws. According to the guidelines it is required that emergency planning has to be prepared for hypothetical radiological scenarios including terroristic or other maliciously motivated attacks using radioactive materials. The study includes assumptions on the released respirable radioactivity, restriction of the hazardous area, wind induced re-suspension of radioactive dusts and inhalation exposure, and mitigation measures.

  1. End of Interactive Emailing from the Technical Network

    CERN Multimedia

    2006-01-01

    According to the CNIC Security Policy for Control Systems (EDMS #584092), interactive emailing on PCs (and other devices) connected to the Technical Network is prohibited. Please note that from November 6th, neither reading emails nor sending emails interactively using e.g. Outlook or Pine mail clients on PCs connected to the Technical Network will be possible anymore. However, automatically generated emails will not be blocked and can still be sent off using CERNMX.CERN.CH as mail server. These restrictions DO NOT apply to PCs connected to any other network, like the General Purpose (or office) network. If you have questions, please do not hesitate to contact Uwe Epting, Pierre Charrue or Stefan Lueders (Technical-Network.Administrator@cern.ch). Your CNIC Working Group

  2. You’ve Got Email: a Workflow Management Extraction System

    NARCIS (Netherlands)

    P. Chaipornkaew (Piyanuch); T. Prexawanprasut (Takorn); M.J. McAleer (Michael)

    2017-01-01

    textabstractEmail is one of the most powerful tools for communication. Many businesses use email as the main channel for communication, so it is possible that substantial data are included in email content. In order to help businesses grow faster, a workflow management system may be required. The

  3. Advantages and Disadvantages of Educational Email Alerts for Family Physicians: Viewpoint

    Science.gov (United States)

    Badran, Hani; Grad, Roland

    2015-01-01

    Background Electronic knowledge resources constitute an important channel for accredited Continuing Medical Education (CME) activities. However, email usage for educational purposes is controversial. On the one hand, family physicians become aware of new information, confirm what they already know, and obtain reassurance by reading educational email alerts. Email alerts can also encourage physicians to search Web-based resources. On the other hand, technical difficulties and privacy issues are common obstacles. Objective The purpose of this discussion paper, informed by a literature review and a small qualitative study, was to understand family physicians’ knowledge, attitudes, and behavior in regard to email in general and educational emails in particular, and to explore the advantages and disadvantages of educational email alerts. In addition, we documented participants’ suggestions to improve email alert services for CME. Methods We conducted a qualitative descriptive study using the “Knowledge, Attitude, Behavior” model. We conducted semi-structured face-to-face interviews with 15 family physicians. We analyzed the collected data using inductive-deductive thematic qualitative data analysis. Results All 15 participants scanned and prioritized their email, and 13 of them checked their email daily. Participants mentioned (1) advantages of educational email alerts such as saving time, convenience and valid information, and (2) disadvantages such as an overwhelming number of emails and irrelevance. They offered suggestions to improve educational email. Conclusions The advantages of email alerts seem to compensate for their disadvantages. Suggestions proposed by family physicians can help to improve educational email alerts. PMID:25803184

  4. Advantages and disadvantages of educational email alerts for family physicians: viewpoint.

    Science.gov (United States)

    Badran, Hani; Pluye, Pierre; Grad, Roland

    2015-02-27

    Electronic knowledge resources constitute an important channel for accredited Continuing Medical Education (CME) activities. However, email usage for educational purposes is controversial. On the one hand, family physicians become aware of new information, confirm what they already know, and obtain reassurance by reading educational email alerts. Email alerts can also encourage physicians to search Web-based resources. On the other hand, technical difficulties and privacy issues are common obstacles. The purpose of this discussion paper, informed by a literature review and a small qualitative study, was to understand family physicians' knowledge, attitudes, and behavior in regard to email in general and educational emails in particular, and to explore the advantages and disadvantages of educational email alerts. In addition, we documented participants' suggestions to improve email alert services for CME. We conducted a qualitative descriptive study using the "Knowledge, Attitude, Behavior" model. We conducted semi-structured face-to-face interviews with 15 family physicians. We analyzed the collected data using inductive-deductive thematic qualitative data analysis. All 15 participants scanned and prioritized their email, and 13 of them checked their email daily. Participants mentioned (1) advantages of educational email alerts such as saving time, convenience and valid information, and (2) disadvantages such as an overwhelming number of emails and irrelevance. They offered suggestions to improve educational email. The advantages of email alerts seem to compensate for their disadvantages. Suggestions proposed by family physicians can help to improve educational email alerts.

  5. Type I-E CRISPR-Cas Systems Discriminate Target from Non-Target DNA through Base Pairing-Independent PAM Recognition

    Science.gov (United States)

    Datsenko, Kirill A.; Jackson, Ryan N.; Wiedenheft, Blake; Severinov, Konstantin; Brouns, Stan J. J.

    2013-01-01

    Discriminating self and non-self is a universal requirement of immune systems. Adaptive immune systems in prokaryotes are centered around repetitive loci called CRISPRs (clustered regularly interspaced short palindromic repeat), into which invader DNA fragments are incorporated. CRISPR transcripts are processed into small RNAs that guide CRISPR-associated (Cas) proteins to invading nucleic acids by complementary base pairing. However, to avoid autoimmunity it is essential that these RNA-guides exclusively target invading DNA and not complementary DNA sequences (i.e., self-sequences) located in the host's own CRISPR locus. Previous work on the Type III-A CRISPR system from Staphylococcus epidermidis has demonstrated that a portion of the CRISPR RNA-guide sequence is involved in self versus non-self discrimination. This self-avoidance mechanism relies on sensing base pairing between the RNA-guide and sequences flanking the target DNA. To determine if the RNA-guide participates in self versus non-self discrimination in the Type I-E system from Escherichia coli we altered base pairing potential between the RNA-guide and the flanks of DNA targets. Here we demonstrate that Type I-E systems discriminate self from non-self through a base pairing-independent mechanism that strictly relies on the recognition of four unchangeable PAM sequences. In addition, this work reveals that the first base pair between the guide RNA and the PAM nucleotide immediately flanking the target sequence can be disrupted without affecting the interference phenotype. Remarkably, this indicates that base pairing at this position is not involved in foreign DNA recognition. Results in this paper reveal that the Type I-E mechanism of avoiding self sequences and preventing autoimmunity is fundamentally different from that employed by Type III-A systems. We propose the exclusive targeting of PAM-flanked sequences to be termed a target versus non-target discrimination mechanism. PMID:24039596

  6. Using Mobile-Based Email for English Foreign Language Learners

    Science.gov (United States)

    Alzu'bi, Mohammad Akram mohammad; Sabha, Muhannad Rushdi Nimer

    2013-01-01

    This study aimed at investigating the role of Mobile-based Email in improving Ajloun College English Students' Achievement. It attempts to answer the following questions: What is the potential contribution of mobile-based email exchanged to writing skills? What is the potential contribution of mobile-based email exchanged to vocabulary…

  7. 36 CFR 1250.76 - May I email my FOIA appeal?

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false May I email my FOIA appeal... email my FOIA appeal? Yes, you may submit a FOIA appeal via email to http://www.archives.gov/global_pages/inquire_form.html. You must put the words “FOIA Appeal” in the subject line of your email message...

  8. Non-cancer diseases and non-targeted effects

    Energy Technology Data Exchange (ETDEWEB)

    Hildebrandt, Guido, E-mail: guido.hildebrandt@med.uni-rostock.de [Department of Radiotherapy and Radiation Oncology, University of Leipzig, Stephanstrasse 9a, 04103 Leipzig (Germany); Department of Radiotherapy, University of Rostock, Suedring 75, 18059 Rostock (Germany)

    2010-05-01

    It is well established that moderate to high doses of radiation can increase the occurrence also of a variety of non-cancer effects in exposed individuals, but for radiation protection purposes it has generally been assumed that there is a threshold of dose below which no significant non-cancer effects (apart from hereditary disease) arise. In recent years, there is growing epidemiological evidence of excess risk of late occurring cardiovascular disease at much lower radiation doses and occurring over much longer intervals after radiation exposure without a clear cut threshold. However, the epidemiological evidence available so far for non-cancer health effects after exposure to moderate or low radiation doses is suggestive rather than persuasive. The mechanisms of radiation-induced vascular disease induction are far away from being understood. However, it seems to be very likely that inflammatory responses are involved. Recent experimental studies by Stewart et al. could demonstrate that high dose exposure to the cardiovascular system is associated with an earlier onset and accelerated development of macrophage-rich, inflammatory atherosclerotic lesions prone to intra-plaque hemorrhage and may also cause a decrease in myocardial perfusion. Both, macro-vascular and micro-vascular radiation effects involve the endothelium and pro-inflammatory signalling cascades. If modulation of inflammatory response is arguably also the most likely cause of radiation-induced cardiovascular disease after low dose exposure, this also implies a role for non-targeted radiation effects. In the absence of a convincing mechanistic explanation of the currently available epidemiological evidence for radiation-induced cardiovascular risk at low radiation doses, caution is required in the interpretation of the statistical associations. On the other hand, the possibility of such a causal explanation cannot be reliably excluded. Further epidemiological and biological evidence from currently

  9. Detection of Fraudulent Emails by Employing Advanced Feature Abundance

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Glasdam, Mathies

    2014-01-01

    In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email detection rate. The different types of features...... are incorporated step by step. The detection of fraudulent email has been considered as a classification problem and it is evaluated using various state-of-the art algorithms and on CCM [1] which is authors' previous cluster based classification model. The experiments have been performed on diverse feature sets...... and the different classification methods. The comparison of the results is also presented and the evaluations shows that for the fraudulent email detection tasks, the feature set is more important regardless of classification method. The results of the study suggest that the task of fraudulent emails detection...

  10. Therapeutic emails

    Directory of Open Access Journals (Sweden)

    Sinkule Jennifer

    2007-02-01

    Full Text Available Abstract Background In this paper, we show how counselors and psychologists can use emails for online management of substance abusers, including the anatomy and content of emails that clinicians should send substance abusers. Some investigators have attempted to determine if providing mental health services online is an efficacious delivery of treatment. The question of efficacy is an empirical issue that cannot be settled unless we are explicitly clear about the content and nature of online treatment. We believe that it is not the communications via internet that matters, but the content of these communications. The purpose of this paper is to provide the content of our online counseling services so others can duplicate the work and investigate its efficacy. Results We have managed nearly 300 clients online for recovery from substance abuse. Treatment included individual counseling (motivational interviewing, cognitive-behavior therapy, relapse prevention assignments, participation in an electronic support group and the development of a recovery team. Our findings of success with these interventions are reported elsewhere. Our experience has led to development of a protocol of care that is described more fully in this paper. This protocol is based on stages of change and relapse prevention theories and follows a Motivational Interviewing method of counseling. Conclusion The use of electronic media in providing mental health treatment remains controversial due to concerns about confidentiality, security and legal considerations. More research is needed to validate and generalize the use of online treatment for mental health problems. If researchers have to build on each others work, it is paramount that we share our protocols of care, as we have done in this paper.

  11. Modeling Personalized Email Prioritization: Classification-based and Regression-based Approaches

    Energy Technology Data Exchange (ETDEWEB)

    Yoo S.; Yang, Y.; Carbonell, J.

    2011-10-24

    Email overload, even after spam filtering, presents a serious productivity challenge for busy professionals and executives. One solution is automated prioritization of incoming emails to ensure the most important are read and processed quickly, while others are processed later as/if time permits in declining priority levels. This paper presents a study of machine learning approaches to email prioritization into discrete levels, comparing ordinal regression versus classier cascades. Given the ordinal nature of discrete email priority levels, SVM ordinal regression would be expected to perform well, but surprisingly a cascade of SVM classifiers significantly outperforms ordinal regression for email prioritization. In contrast, SVM regression performs well -- better than classifiers -- on selected UCI data sets. This unexpected performance inversion is analyzed and results are presented, providing core functionality for email prioritization systems.

  12. Teleradiology with DICOM e-mail: recommendations of rate at GIT; Teleradiologie mit DICOM E-mail: Empfehlungen der rate at GIT

    Energy Technology Data Exchange (ETDEWEB)

    Mildenberger, P.; Kaemmerer, M.; Klos, G.; Schuetze, B. [Klinik und Poliklinik fuer Radiologie, Johannes Gutenberg-Univ. Mainz (Germany); Engelmann, U. [Deutsches Krebsforschungszentrum, Abt. Medizinische und Biologische Informatik, Heidelberg (Germany); Ruggiero, S.; Runa, A.; Weisser, G. [Inst. fuer Klinische Radiologie, Universitaetsklinikum Mannheim (Germany); Schroeter, A. [CHILI GmbH, Heidelberg (Germany); Walz, M. [TUeV Industrie Service GmbH, TUeV-SUeD-Gruppe, Aerztliche Stelle fuer Qualitaetssicherung in der Radiologie, Eschborn (Germany)

    2005-05-01

    E-mail is ideal for ad-hoc connections in teleradiology. The DICOM standard offers the possibility to append DICOM data types as a MIME attachment to any e-mail, thus ensuring the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g. protection of data privacy) which must be obeyed. Because of the lack of given standards which would grant interoperability as well as manufacturer independence, teleradiology has not been established in Germany until today. Therefore, the IT-Team (Arbeitsgemeinschaft fuer Informationstechnologie, rate at GIT) of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) set up an initiative to standardise telemedicine by using e-mail. Its members agreed that an e-mail-based variant would be the most practicable way to a communication solution - as easy to implement as to use. In their opinion, e-mail represents the smallest common denominator for a safe data interchange that would fulfill the legal advantages for telemedicine in Germany. (orig.)

  13. Non-targeted effects of ionising radiation. Proceedings of the RISC-RAD specialised training course

    International Nuclear Information System (INIS)

    Belyakov, O.V.

    2008-12-01

    The training course 'Non-targeted effects of ionising radiation' took place at the STUK, Radiation and Nuclear Safety Authority, Helsinki, Finland 14-16 February 2005. Proceeding of this course is collected in this volume. The idea of the course was to convene a number of scientists leading in the area of non-targeted effects of ionising radiation with the aim to outline their visions for the role of these effects and outline the future directions of radiation research on the basis of their expertise. The course was supported by the RISC-RAD IP FI6R-CT-2003-508842, Euratom specific programme for research and training on nuclear energy, 6th FP of the EC. The main objectives of the training course were: (1) to clarify the mechanisms of non-targeted effects, in particular, bystander effects, genomic instability and adaptive response; (2) to look if and how non-targeted effects modulate the cancer risk in the low dose region, and whether they relate to protective or harmful functions; (3) to clarify if ionising radiation can cause non-cancer diseases or beneficial effects at low and intermediate doses; (4) address the issue of individual susceptibility and other factors modifying non-targeted responses; (5) attempt to assess the relevance of non-targeted effects for radiation protection and to set the scientific basis for a modern, more realistic, radiation safety system; (6) and finally to contribute to the conceptualisation of a new paradigm in radiation biology that would cover both the classical direct (DNA-targeted) and non-targeted (indirect) effects

  14. Radiation responses of stem cells: targeted and non-targeted effects

    International Nuclear Information System (INIS)

    Kavanagh, J.N.; Waring, E.J.; Prise, K.M.

    2015-01-01

    Stem cells are fundamental to the development of any tissue or organism via their ability to self-renew, which is aided by their unlimited proliferative capacity and their ability to produce fully differentiated offspring, often from multiple lineages. Stems cells are long lived and have the potential to accumulate mutations, including in response to radiation exposure. It is thought that stem cells have the potential to be induced into a cancer stem cell phenotype and that these may play an important role in resistance to radiotherapy. For radiation-induced carcinogenesis, the role of targeted and non-targeted effects is unclear with tissue or origin being important. Studies of genomic instability and bystander responses have shown consistent effects in haematopoietic models. Several models of radiation have predicted that stem cells play an important role in tumour initiation and that bystander responses could play a role in proliferation and self-renewal. (authors)

  15. Business communication across three European cultures: A contrastive analysis of British, Spanish and Polish email writing

    Directory of Open Access Journals (Sweden)

    Rosa Giménez-Moreno

    2013-10-01

    Full Text Available Today the most international written mode of communication within the business world is electronic correspondence. As the introductory section explains, diverse analyses of emails written in different cultures have been carried out revealing interesting differences and similarities in their discourse features and rhetorical strategies. However, a comparative examination of business emails from representative European cultures such as British (Northern Europe, Spanish (Southern Europe and Polish (Eastern Europe has not been undertaken so far. With this aim, a corpus of over 100 emails of response to business requests written in English by companies set up in these three cultures has been compiled and analysed. The main research targets are to observe the main parameters of variation across these cultures, the existent variation regarding the prototypical move structure and how register variation fluctuates depending on each culture. The results will indicate that across these cultures the move structure of this genre is more complex than current templates and existing published materials show. The study also demonstrates that, while there is a tendency to standardize email correspondence at a European level, there are certain parameters of variation that may help language learners and users to conform their messages depending on the recipient’s culture.

  16. E-mail to SMS service change

    CERN Multimedia

    IT Department

    2010-01-01

    If you have a CERN e-mail account, you have probably already used one of the popular services that CERN’s IT Department offers to CERN users: the mail2SMS service. It allows any CERN e-mail account holder to send short messages (SMS) free of charge to CERN GSM phone numbers. Further to recent negotiations with our GSM operator, this service has been extended. It is now possible to send short messages free of charge to any Swiss mobile number. This extension of service aims at replacing the similar service that was made available by SWITCH(1) to CERN users (address: mobilenumber@sms.switch.ch). Because of repeated abuse, this service will be definitively stopped for CERN users on 15th January 2010. Please keep in mind that CERN’s e-mail to SMS service still has some restrictions: messages can only be sent from CERN mail accounts, and not from personal ones, such as GMAIL, MSN, Yahoo; the maximum length of the message is 160 characters (standard maximum SMS length); and only Swiss mobile...

  17. Effects of neonicotinoids and fipronil on non-target invertebrates.

    Science.gov (United States)

    Pisa, L W; Amaral-Rogers, V; Belzunces, L P; Bonmatin, J M; Downs, C A; Goulson, D; Kreutzweiser, D P; Krupke, C; Liess, M; McField, M; Morrissey, C A; Noome, D A; Settele, J; Simon-Delso, N; Stark, J D; Van der Sluijs, J P; Van Dyck, H; Wiemers, M

    2015-01-01

    We assessed the state of knowledge regarding the effects of large-scale pollution with neonicotinoid insecticides and fipronil on non-target invertebrate species of terrestrial, freshwater and marine environments. A large section of the assessment is dedicated to the state of knowledge on sublethal effects on honeybees (Apis mellifera) because this important pollinator is the most studied non-target invertebrate species. Lepidoptera (butterflies and moths), Lumbricidae (earthworms), Apoidae sensu lato (bumblebees, solitary bees) and the section "other invertebrates" review available studies on the other terrestrial species. The sections on freshwater and marine species are rather short as little is known so far about the impact of neonicotinoid insecticides and fipronil on the diverse invertebrate fauna of these widely exposed habitats. For terrestrial and aquatic invertebrate species, the known effects of neonicotinoid pesticides and fipronil are described ranging from organismal toxicology and behavioural effects to population-level effects. For earthworms, freshwater and marine species, the relation of findings to regulatory risk assessment is described. Neonicotinoid insecticides exhibit very high toxicity to a wide range of invertebrates, particularly insects, and field-realistic exposure is likely to result in both lethal and a broad range of important sublethal impacts. There is a major knowledge gap regarding impacts on the grand majority of invertebrates, many of which perform essential roles enabling healthy ecosystem functioning. The data on the few non-target species on which field tests have been performed are limited by major flaws in the outdated test protocols. Despite large knowledge gaps and uncertainties, enough knowledge exists to conclude that existing levels of pollution with neonicotinoids and fipronil resulting from presently authorized uses frequently exceed the lowest observed adverse effect concentrations and are thus likely to have large

  18. Non-targeted and delayed effects of exposure to ionizing radiation

    International Nuclear Information System (INIS)

    Zuo Yahui; Tong Jian

    2007-01-01

    Non-targeted and delayed effects are relative phenomena in cellular responses to ionizing radiation. These effects (bystander effects, genomic instability and adaptive responses) have been studied most extensively for radiation exposures. It is clear that adaptive responses, bystander effects and genomic instability will play an important role in the low dose-response to radiation. This review will provide a synthesis of the known, and proposed interrelationships amongst low-dose cellular responses to radiation, It also will examine the potential biological significance of non-targeted and delayed effects of exposure to ionizing radiation. (authors)

  19. Detection of fraudulent emails by employing advanced feature abundance

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2014-11-01

    Full Text Available In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email detection rate. The different types of features are incorporated step by step. The detection of fraudulent email has been considered as a classification problem and it is evaluated using various state-of-the art algorithms and on CCM (Nizamani et al., 2011 [1] which is authors’ previous cluster based classification model. The experiments have been performed on diverse feature sets and the different classification methods. The comparison of the results is also presented and the evaluation show that for the fraudulent email detection tasks, the feature set is more important regardless of classification method. The results of the study suggest that the task of fraudulent emails detection requires the better choice of feature set; while the choice of classification method is of less importance.

  20. Side Effects of Nitrification Inhibitors on Non Target Microbial Processes in Soils

    Directory of Open Access Journals (Sweden)

    Johannes Carl Gottlieb Ottow

    2011-01-01

    Full Text Available Agricultural chemicals have been used extensively in modern agriculture and toxicological studies suggest a great potential for inducing undesirable effects on non target organisms. A model experiment was conducted in order to determine side effects of three nitrification inhibitors (NIs, 3,4dimethylpyrazolephosphate = DMPP, 4-Chlor-methylpyrazole phosphate = ClMPP and dicyandiamide = DCD on non target microbial processes in soils. Side effects and dose response curve of three NIs were quantified under laboratory conditions using silty clay, loam and a sandy soils. Dehydrogenase, dimethylsulfoxide reductase as well as nitrogenase activity (NA and potential denitrification capacity were measured as common and specific non target microbial processes. The influence of 5-1000 times the base concentration, dose response curves were examined, and no observable effect level = NOEL, as well as effective dose ED10 and ED50 (10% and 50% inhibition were calculated. The NOEL for microbial non target processes were about 30–70 times higher than base concentration in all investigated soils. The potential denitrification capacity revealed to be the most sensitive parameter. ClMPP exhibited the strongest influence on the non target microbial processes in the three soils. The NOEL, ED10 and ED50 values were higher in clay than in loamy or sandy soil. The NIs was the most effective in sandy soils.

  1. The impacts of email reminder/recall on adolescent influenza vaccination.

    Science.gov (United States)

    Dombkowski, Kevin J; Cowan, Anne E; Reeves, Sarah L; Foley, Matthew R; Dempsey, Amanda F

    2017-05-25

    We sought to: (1) explore the feasibility of using email for seasonal influenza vaccination reminders to parents of adolescents and (2) assess influenza vaccination rates among adolescents whose parents were randomized to either receive or not receive email reminders. Email addresses were obtained for parents of patients 10-18years from 4 practices in Michigan. Addresses were randomized to either receive email reminders, or not. Reminder messages were sent during October 2012-March 2013 (Season 1) and October 2013-March 2014 (Season 2). Vaccination status was determined 60days following the last email reminder for each season using the statewide Michigan Care Improvement Registry (MCIR); per protocol bivariate and multivariate logistic regression analyses were conducted to evaluate reminder notification. After email cleaning, testing, and matching with MCIR, approximately half of email addresses (2348 of 5312 in Season 1; 3457 of 6549 in Season 2) were randomized. Bivariate analyses found that influenza vaccination within 60days after notification date was similar among those notified (34%) versus not notified (29%) in both Season 1 (p=0.06) and Season 2 (39% vs. 37%, p=0.20). However, multivariate models adjusted for season, site, and receipt of notification in two seasons found a higher likelihood of influenza vaccination among children that received notification (aOR=1.28, 95% CI=1.09, 1.51); in addition, differences in influenza vaccination were also observed between practice sites (range: p=0.15 to pemail influenza vaccine reminders to parents of adolescents are feasible, but not without complications. Our study demonstrates that email reminders from practices can yield increases in influenza vaccination rates among adolescents. Practices should consider email as an option for influenza reminders and establish business practices for collecting and maintaining patient email addresses. This study is registered at www.ClinicalTrials.gov id #NCT01732315. Copyright

  2. Assessment of email communication skills of rheumatology fellows: a pilot study

    Science.gov (United States)

    Dhuper, Sonal; Siva, Chokkalingam; Fresen, John L; Petruc, Marius; Velázquez, Celso R

    2010-01-01

    Physician–patient email communication is gaining popularity. However, a formal assessment of physicians' email communication skills has not been described. We hypothesized that the email communication skills of rheumatology fellows can be measured in an objective structured clinical examination (OSCE) setting using a novel email content analysis instrument which has 18 items. During an OSCE, we asked 50 rheumatology fellows to respond to a simulated patient email. The content of the responses was assessed using our instrument. The majority of rheumatology fellows wrote appropriate responses scoring a mean (±SD) of 10.6 (±2.6) points (maximum score 18), with high inter-rater reliability (0.86). Most fellows were concise (74%) and courteous (68%) but not formal (22%). Ninety-two percent of fellows acknowledged that the patient's condition required urgent medical attention, but only 30% took active measures to contact the patient. No one encrypted their messages. The objective assessment of email communication skills is possible using simulated emails in an OSCE setting. The variable email communication scores and incidental patient safety gaps identified, suggest a need for further training and defined proficiency standards for physicians' email communication skills. PMID:20962134

  3. Non-LTE radiation in laser-disk target couply

    International Nuclear Information System (INIS)

    Gu Peijun; Fei Weibing; Feng Tinggui; Wu Changshu

    2004-11-01

    The coupling of laser-disk target has been studied by Multi-group radiation transfer code RDMGL. The results show that the X-ray spectra are strongly non-LTE and dependent on the atomic model. The plasma states, laser energy absorption and X-ray conversion rates are almost the same as those simulated by three-temperature model code, which fact shows that the three-temperature model is reasonable to describe the exchange of different kinds of energy and the hydrodynamic phenomena of plasmas in laser-target coupling. (authors)

  4. Heterotic non-linear sigma models with anti-de Sitter target spaces

    International Nuclear Information System (INIS)

    Michalogiorgakis, Georgios; Gubser, Steven S.

    2006-01-01

    We calculate the beta function of non-linear sigma models with S D+1 and AdS D+1 target spaces in a 1/D expansion up to order 1/D 2 and to all orders in α ' . This beta function encodes partial information about the spacetime effective action for the heterotic string to all orders in α ' . We argue that a zero of the beta function, corresponding to a worldsheet CFT with AdS D+1 target space, arises from competition between the one-loop and higher-loop terms, similarly to the bosonic and supersymmetric cases studied previously in [J.J. Friess, S.S. Gubser, Non-linear sigma models with anti-de Sitter target spaces, Nucl. Phys. B 750 (2006) 111-141]. Various critical exponents of the non-linear sigma model are calculated, and checks of the calculation are presented

  5. Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email

    Directory of Open Access Journals (Sweden)

    Albert Ginting

    2015-04-01

    Full Text Available In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography. One fairly popular cryptographic algorithms are RSA algorithm. In this study will discuss the implementation of a cryptographic algorithm RSA encryption and decryption process email. To test created a java-based email client program with message encryption and decryption features messages. This application uses the Java programming language and Netbeans 7.4 as editor. Mail servers used is Google Mail. The initial step of this study was to download email from the Google server and encrypt the message. The second step is decrypt the message to verify whether the message is still the same as the original message before it is encrypted . Results from this study is the application that can encrypt and decrypt messages using RSA cryptographic algorithm. With this application is expected to mail delivery is much safer. Because encrypted email will generate a random decimal number of unknown value .

  6. An Automatic Multi-Target Independent Analysis Framework for Non-Planar Infrared-Visible Registration.

    Science.gov (United States)

    Sun, Xinglong; Xu, Tingfa; Zhang, Jizhou; Zhao, Zishu; Li, Yuankun

    2017-07-26

    In this paper, we propose a novel automatic multi-target registration framework for non-planar infrared-visible videos. Previous approaches usually analyzed multiple targets together and then estimated a global homography for the whole scene, however, these cannot achieve precise multi-target registration when the scenes are non-planar. Our framework is devoted to solving the problem using feature matching and multi-target tracking. The key idea is to analyze and register each target independently. We present a fast and robust feature matching strategy, where only the features on the corresponding foreground pairs are matched. Besides, new reservoirs based on the Gaussian criterion are created for all targets, and a multi-target tracking method is adopted to determine the relationships between the reservoirs and foreground blobs. With the matches in the corresponding reservoir, the homography of each target is computed according to its moving state. We tested our framework on both public near-planar and non-planar datasets. The results demonstrate that the proposed framework outperforms the state-of-the-art global registration method and the manual global registration matrix in all tested datasets.

  7. Electronic Identities: The Strategic Use of Email for Impression Management.

    Science.gov (United States)

    Kersten, Larry; Phillips, Stephen R.

    Traditionally, e-mail (electronic mail) has been seen as an efficient communications medium for the transmission of simple, routine, unambiguous messages. More recent research has argued that the simple, efficient view of e-mail is incomplete. Future research should be extended into the strategic and symbolic functions of email, such as the use of…

  8. Email as a Data Collection Tool when Interviewing Older Adults

    Directory of Open Access Journals (Sweden)

    Mario A. Brondani DDS, MSc, PhD

    2011-09-01

    Full Text Available This article explores several aspects of electronic communication, specifically its advantages and disadvantages within the context of a brief experience using email to interview elders. Two older adults participated via email as the psychosocial impact of aging was collected using such venue. Our experiences are compared with published reports from others to analyze the benefits and limitations of email as a research tool. The email was spontaneous, comprehensive, interactive, efficient, confidential, and cost effective. The use of email within this exploratory study appeared to be an effective approach to collecting qualitative information about beliefs and behaviours from older adults who feel comfortable with this form of communication. The lack of similar studies limited the scope of discussion and comparison of findings; generalization is limited due to the small sample size. This investigation, however, suggested that the use of email as an interview tool may be considered in today's exploratory research arena as an alternative to conference calls or face-to-face interviews when time is a constraint.

  9. Email for clinical communication between patients/caregivers and healthcare professionals.

    Science.gov (United States)

    Atherton, Helen; Sawmynaden, Prescilla; Sheikh, Aziz; Majeed, Azeem; Car, Josip

    2012-11-14

    Email is a popular and commonly-used method of communication, but its use in health care is not routine. Where email communication has been demonstrated in health care this has included its use for communication between patients/caregivers and healthcare professionals for clinical purposes, but the effects of using email in this way is not known.This review addresses the use of email for two-way clinical communication between patients/caregivers and healthcare professionals. To assess the effects of healthcare professionals and patients using email to communicate with each other, on patient outcomes, health service performance, service efficiency and acceptability. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010) and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists, contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies examining interventions using email to allow patients to communicate clinical concerns to a healthcare professional and receive a reply, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two authors independently assessed the risk of bias of included studies and extracted data. We contacted study authors for additional information. We assessed risk of bias according to the Cochrane Handbook for Systematic Reviews of Interventions. For continuous measures, we report effect sizes as mean

  10. Non-Invasive Radiofrequency-Induced Targeted Hyperthermia for the Treatment of Hepatocellular Carcinoma

    Directory of Open Access Journals (Sweden)

    Mustafa Raoof

    2011-01-01

    Full Text Available Targeted biological therapies for hepatocellular cancer have shown minimal improvements in median survival. Multiple pathways to oncogenesis leading to rapid development of resistance to such therapies is a concern. Non-invasive radiofrequency field-induced targeted hyperthermia using nanoparticles is a radical departure from conventional modalities. In this paper we underscore the need for innovative strategies for the treatment of hepatocellular cancer, describe the central paradigm of targeted hyperthermia using non-invasive electromagnetic energy, review the process of characterization and modification of nanoparticles for the task, and summarize data from cell-based and animal-based models of hepatocellular cancer treated with non-invasive RF energy. Finally, future strategies and challenges in bringing this modality from bench to clinic are discussed.

  11. The Dark Side of Micro-Task Marketplaces: Characterizing Fiverr and Automatically Detecting Crowdturfing

    OpenAIRE

    Lee, Kyumin; Webb, Steve; Ge, Hancheng

    2014-01-01

    As human computation on crowdsourcing systems has become popular and powerful for performing tasks, malicious users have started misusing these systems by posting malicious tasks, propagating manipulated contents, and targeting popular web services such as online social networks and search engines. Recently, these malicious users moved to Fiverr, a fast-growing micro-task marketplace, where workers can post crowdturfing tasks (i.e., astroturfing campaigns run by crowd workers) and malicious c...

  12. E-Mail at Work: Is it Really Private?

    Science.gov (United States)

    Rosenblum, Cindy

    This paper examines the controversy of e-mail privacy in the workplace. Once an employee uses an e-mail system that belongs to the employer, according to recent case law, their privacy rights are forfeited. Employers will now have to start creating policies to safeguard themselves from expensive litigation, and employees will have to be more…

  13. Morphological Effect of Non-targeted Biomolecule-Modified MNPs on Reticuloendothelial System.

    Science.gov (United States)

    Li, Xiao; Hu, Yan; Xiao, Jie; Cheng, Dengfeng; Xiu, Yan; Shi, Hongcheng

    2015-12-01

    Magnetic nanoparticles (MNPs) with special morphology were commonly used as biomaterials, while morphological effects of non-targeted biomolecule-modified MNPs on biological behaviors were still unclear. In this research, spherical and rod-like Fe3O4 in a comparable size were synthesized and then surface-modified by bovine serum albumin (BSA) as a model of non-targeted biomolecule-modified MNPs. Morphological effects were featured by TEM and quantification of in vitro phagocytic uptake, as well as the in vivo quantification of particles in reticuloendothelial system (RES)-related organs of normal Kunming mice. For these non-targeted BSA-modified MNPs, intracellular distributions were the same, but the rod-like MNPs were more likely to be uptake by macrophages; furthermore, the BSA-modified MNPs gathered in RES-related organs soon after intravenous injection, but the rod-like ones were expelled from the lung more quickly and expelled from the spleen more slowly. These preliminary results may be referable if MNPs or other similar biomolecule-modified nanoparticles were used.

  14. Email for the coordination of healthcare appointments and attendance reminders.

    Science.gov (United States)

    Atherton, Helen; Sawmynaden, Prescilla; Meyer, Barbara; Car, Josip

    2012-08-15

    Email is a popular and commonly-used method of communication, but its use in health care is not routine. Where email communication has been utilised in health care, its purposes have included the coordination of healthcare appointments and attendance reminders, but the effects of using email in this way are not known. This review considers the use of email for the coordination of healthcare appointments and reminders for attendance; particularly scheduling, rescheduling and cancelling healthcare appointments, and providing prompts/reminders for attendance at appointments. To assess the effects of using email for the coordination of healthcare appointments and attendance reminders, compared to other forms of coordinating appointments and reminders, on outcomes for health professionals, patients and carers, and health services, including harms. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010),and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies of interventions that use email for scheduling health appointments, for reminders for a scheduled health appointment or for ongoing coordination of health appointments and that took the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two review authors independently assessed the titles and abstracts of retrieved

  15. Non-targeted detection of chemical contamination in carbonated soft drinks using NMR spectroscopy, variable selection and chemometrics

    Energy Technology Data Exchange (ETDEWEB)

    Charlton, Adrian J. [Department for Environment, Food and Rural Affairs, Central Science Laboratory, Sand Hutton, York YO41 1LZ (United Kingdom)], E-mail: adrian.charlton@csl.gov.uk; Robb, Paul; Donarski, James A.; Godward, John [Department for Environment, Food and Rural Affairs, Central Science Laboratory, Sand Hutton, York YO41 1LZ (United Kingdom)

    2008-06-23

    An efficient method for detecting malicious and accidental contamination of foods has been developed using a combined {sup 1}H nuclear magnetic resonance (NMR) and chemometrics approach. The method has been demonstrated using a commercially available carbonated soft drink, as being capable of identifying atypical products and to identify contaminant resonances. Soft-independent modelling of class analogy (SIMCA) was used to compare {sup 1}H NMR profiles of genuine products (obtained from the manufacturer) against retail products spiked in the laboratory with impurities. The benefits of using feature selection for extracting contaminant NMR frequencies were also assessed. Using example impurities (paraquat, p-cresol and glyphosate) NMR spectra were analysed using multivariate methods resulting in detection limits of approximately 0.075, 0.2, and 0.06 mM for p-cresol, paraquat and glyphosate, respectively. These detection limits are shown to be approximately 100-fold lower than the minimum lethal dose for paraquat. The methodology presented here is used to assess the composition of complex matrices for the presence of contaminating molecules without a priori knowledge of the nature of potential contaminants. The ability to detect if a sample does not fit into the expected profile without recourse to multiple targeted analyses is a valuable tool for incident detection and forensic applications.

  16. Non-targeted detection of chemical contamination in carbonated soft drinks using NMR spectroscopy, variable selection and chemometrics

    International Nuclear Information System (INIS)

    Charlton, Adrian J.; Robb, Paul; Donarski, James A.; Godward, John

    2008-01-01

    An efficient method for detecting malicious and accidental contamination of foods has been developed using a combined 1 H nuclear magnetic resonance (NMR) and chemometrics approach. The method has been demonstrated using a commercially available carbonated soft drink, as being capable of identifying atypical products and to identify contaminant resonances. Soft-independent modelling of class analogy (SIMCA) was used to compare 1 H NMR profiles of genuine products (obtained from the manufacturer) against retail products spiked in the laboratory with impurities. The benefits of using feature selection for extracting contaminant NMR frequencies were also assessed. Using example impurities (paraquat, p-cresol and glyphosate) NMR spectra were analysed using multivariate methods resulting in detection limits of approximately 0.075, 0.2, and 0.06 mM for p-cresol, paraquat and glyphosate, respectively. These detection limits are shown to be approximately 100-fold lower than the minimum lethal dose for paraquat. The methodology presented here is used to assess the composition of complex matrices for the presence of contaminating molecules without a priori knowledge of the nature of potential contaminants. The ability to detect if a sample does not fit into the expected profile without recourse to multiple targeted analyses is a valuable tool for incident detection and forensic applications

  17. The effect of lindane on non-target fauna in a maize agro-ecosystem in Zambia

    International Nuclear Information System (INIS)

    Deedat, Y.D.; Chanda, S.; Chivundu, A.M.; Kalembe, G.; Mecha, C.D.

    1997-01-01

    The effect of lindane on non-target fauna in a maize agro-ecosystem was studied in Zambia in 1992 and 1993. While lindane was effective against the stalk borers, a target pest, it also affected other non-target fauna. Ants, spiders and springtails were significantly reduced. However the effect was only transient and lasted for approximately two months. Lindane appeared to have no real effect on aerial non-target fauna or on soil inhabiting microorganisms. (author). 8 refs, 6 tabs

  18. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    OpenAIRE

    Biloš, Antun; Turkalj, Davorin; Kelić, Ivan

    2016-01-01

    Purpose – The main purpose of this paper is to test the controlled experiment (A/B split) methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes o...

  19. The relative efficacy of telephone and email reminders to elicit blood donation.

    Science.gov (United States)

    Germain, M; Godin, G

    2016-04-01

    The aim of the study was to test the relative efficacy of telephone and email reminders to trigger blood donation. A sample of 3454 donors was randomized to one of three conditions: phone only (n = 1176), email only (n = 1091) and phone + email (n = 1187). There was a higher proportion of donors who registered to give blood in the phone + email condition (18·45%) compared to the other two conditions (phone: 15·73%, P email: 13·20%; P email conditions did not differ significantly (P = 0·16), suggesting equivalent efficacy. © 2015 International Society of Blood Transfusion.

  20. Legal and policy issues associated with monitoring employee E-mail

    Energy Technology Data Exchange (ETDEWEB)

    Segura, M.A.; Rither, A.C.

    1997-01-01

    This paper examines the legal issues involved with employer monitoring of employee e-mail. In addition to identifying pertinent legal issues, the paper provides guidelines that will help the Pacific Northwest National Laboratory (PNNL) establish a program for monitoring outgoing e-mail to insure compliance with company policies, particularly those regarding protection of trade secrets and proprietary information, and to comply with the Department of Energy`s (DOE) procedures for protecting Export Controlled Information (ECI). Electronic communication has allowed companies to enhance efficiency, responsiveness and effectiveness. E-mail allows employees to transmit all types of data to other individuals inside and outside of their companies. The ease with which information can be transmitted by e-mail has placed trade secrets, proprietary information, and other sensitive data at risk from inadvertent disclosure by employees. As employers attempt to protect their interests through measures such as monitoring e-mail, they may expose themselves to liability under federal and state laws for violating employee privacy. Business use of e-mail has proliferated so rapidly that the federal and state legal systems have not been able to adequately address the issues arising out of its use in the workplace.

  1. [WMN: a negative ERPs component related to working memory during non-target visual stimuli processing].

    Science.gov (United States)

    Zhao, Lun; Wei, Jin-he

    2003-10-01

    To study non-target stimuli processing in the brain. Features of the event-related potentials (ERPs) from non-target stimuli during selective response task (SR) was compared with that during visual selective discrimination (DR) task in 26 normal subjects. The stimuli consisted of two color LED flashes (red and green) appeared randomly in left (LVF) or right (RVF) visual field with same probability. ERPs were derived at 9 electrode sites on the scalp under 2 task conditions: a) SR, making switch response to the target (NT) stimuli from LVF or RVF in one direction and making no response to the non-target (NT) ones; b) DR, making switching response to T stimuli differentially, i.e., to the left for T from LVF and to the right for T from RVF. 1) the non-target stimuli in DR conditions, compared with that in SR condition, elicited smaller P2 and P3 components and larger N2 component at the frontal brain areas; 2) a significant negative component, named as WMN (working memory negativity), appeared in the non-target ERPs during DR in the period of 100 to 700 ms post stimulation which was predominant at the frontal brain areas. According to the major difference between brain activities for non-target stimuli during SR and DR, the predominant appearance of WMN at the frontal brain areas demonstrated that the non-target stimulus processing was an active process and was related to working memory, i.e., the temporary elimination and the retrieval of the response mode which was stored in working memory.

  2. Measuring Future Worker Productivity via Business Email Message Creation: Implications for Education

    Science.gov (United States)

    Hagler, Barbara E.; Erthal, Margaret; Walzer, Dona; Anderson, Marcia A.

    2009-01-01

    Objective: This research was conducted to determine if relationships exist among college students' business email message productivity score and (a) email message quality score, (b) text keying method used to create email message, and (c) self-reported college English grade. Background: Email is increasingly the communication channel preferred for…

  3. Side Effects of Nitrification Inhibitors on Non Target Microbial Processes in Soils

    OpenAIRE

    Johannes Carl Gottlieb Ottow; Gero Benckiser; Ferisman Tindaon

    2011-01-01

    Agricultural chemicals have been used extensively in modern agriculture and toxicological studies suggest a great potential for inducing undesirable effects on non target organisms. A model experiment was conducted in order to determine side effects of three nitrification inhibitors (NIs, 3,4dimethylpyrazolephosphate = DMPP, 4-Chlormethylpyrazole phosphate = ClMPP and dicyandiamide = DCD) on non target microbial processes in soils. Side effects and dose response curve of three NIs were quanti...

  4. Efficacy and Ecotoxicity of Novel Anti-Fouling Nanomaterials in Target and Non-Target Marine Species.

    Science.gov (United States)

    Avelelas, Francisco; Martins, Roberto; Oliveira, Tânia; Maia, Frederico; Malheiro, Eliana; Soares, Amadeu M V M; Loureiro, Susana; Tedim, João

    2017-04-01

    Biofouling is a global problem that affects virtually all the immersed structures. Currently, several novel environmentally friendly approaches are being tested worldwide to decrease the toxicity of biocides in non-fouling species, such as the encapsulation/immobilization of commercially available biocides, in order to achieve control over the leaching rate. The present study addresses the toxicity of two widely used booster biocides, zinc pyrithione (ZnPT) and copper pyrithione (CuPT), in its free and incorporated forms in order to assess their toxicity and anti-fouling efficacy in target and non-target species. To achieve this goal, the following marine organisms were tested; the green microalgae Tetraselmis chuii (non-target species) and both target species, the diatom Phaeodactylum tricornutum and the mussel Mytilus edulis. Organisms were exposed to both biocides, two unloaded nanostructured materials and nanomaterials loaded with biocides, from 10 μg/L to 100 mg/L total weight, following standard protocols. The most eco-friendly and simultaneously efficient anti-fouling solution against the two photosynthetic species (nanoclays loaded with ZnPT) was then tested on mussels to assess its lethal efficacy (LC 50  = 123 μg/L) and compared with free biocide (LC 50  = 211 μg/L) and unloaded material (LC 50  > 1000 μg/L). A second exposure test with sub-lethal concentrations (lower than 100 μg/L), using mussels, was carried out to assess biochemical changes caused by the tested compounds. Oxidative stress, detoxification and neurotransmission markers were not responsive; however, different antioxidant patterns were found with free ZnPT and loaded nanoclay exposures. Thus, the immobilization of the biocide ZnPT into nanoclays proved to be a promising efficient and eco-friendly anti-fouling strategy.

  5. Evaluation of a social cognitive theory-based email intervention designed to influence the physical activity of survivors of breast cancer.

    Science.gov (United States)

    Hatchett, Andrew; Hallam, Jeffrey S; Ford, M Allison

    2013-04-01

    The aim of this study is to evaluate a 12-week social cognitive theory (SCT)-based email intervention designed to influence the physical activity of survivors of breast cancer. Seventy-four volunteers (intervention group, n = 36; control group, n = 38) were recruited by mass email and written letter solicitation. Participants completed a series of online questionnaires measuring demographic characteristics, physical activity readiness, level of physical activity and selected SCT variables at baseline, 6 and 12 weeks. The intervention group received email messages based on SCT designed specifically for breast cancer survivors and targeting physical activity. For the first 6 weeks of the intervention, participants assigned to the intervention group received messages weekly, from weeks 7 to 12, participants received messages every other week and had access to an e-counselor. The control group did not receive email messages, nor did they have access to an e-counselor. Significant differences in levels of self-reported vigorous physical activity were found between groups at 6 and 12 weeks. Significant differences were also found for self-reported moderate physical activity at 12 weeks. Email-based interventions based on SCT can significantly influence levels of self-reported physical activity of breast cancer survivors. Copyright © 2012 John Wiley & Sons, Ltd.

  6. Discourse strategies in professional e-mail negotiation

    DEFF Research Database (Denmark)

    Jensen, Astrid

    2009-01-01

    The purpose of this article is to report on some of the preliminary results of an on-going study on the use of discourse strategies in e-mail negotiation. The analysis aims at showing how relations between the participants develop through the use of specific discourse strategies in their e......-mail communication which covers a period of three months, during which the relationship progresses from initial contact to on-going business. Drawing on Hyland's (2005) concept of metadiscourse combined with Charles' (1996) categories of ‘old and new relationship negotiations', this study provides insights...

  7. Comparative ecotoxicity of chlorantraniliprole to non-target soil invertebrates.

    Science.gov (United States)

    Lavtižar, Vesna; Berggren, Kristina; Trebše, Polonca; Kraak, Michiel H S; Verweij, Rudo A; van Gestel, Cornelis A M

    2016-09-01

    The insecticide chlorantraniliprole (CAP) is gaining importance in agricultural practice, but data on its possible negative effects on non-target organisms is severely deficient. This study therefore determined CAP toxicity to non-target soil invertebrates playing a crucial role in ecosystem functioning, including springtails (Folsomia candida), isopods (Porcellio scaber), enchytraeids (Enchytraeus crypticus) and oribatid mites (Oppia nitens). In sublethal toxicity tests in Lufa 2.2 soil, chronic exposure to CAP concentrations up to 1000 mg/kgdw did not affect the survival and reproduction of E. crypticus and O. nitens nor the survival, body weight and consumption of P. scaber. In contrast, the survival and reproduction of F. candida was severely affected, with an EC50 for effects on reproduction of 0.14 mg CAP/kgdw. The toxicity of CAP to the reproduction of F. candida was tested in four different soils following OECD guideline 232, and additionally in an avoidance test according to ISO guideline 17512-2. A significantly lower toxicity in soils rich in organic matter was observed, compared to low organic soils. Observations in the avoidance test with F. candida suggest that CAP acted in a prompt way, by affecting collembolan locomotor abilities thus preventing them from escaping contaminated soil. This study shows that CAP may especially pose a risk to non-target soil arthropods closely related to insects, while other soil invertebrates seem rather insensitive. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Quantification of non-coding RNA target localization diversity and its application in cancers.

    Science.gov (United States)

    Cheng, Lixin; Leung, Kwong-Sak

    2018-04-01

    Subcellular localization is pivotal for RNAs and proteins to implement biological functions. The localization diversity of protein interactions has been studied as a crucial feature of proteins, considering that the protein-protein interactions take place in various subcellular locations. Nevertheless, the localization diversity of non-coding RNA (ncRNA) target proteins has not been systematically studied, especially its characteristics in cancers. In this study, we provide a new algorithm, non-coding RNA target localization coefficient (ncTALENT), to quantify the target localization diversity of ncRNAs based on the ncRNA-protein interaction and protein subcellular localization data. ncTALENT can be used to calculate the target localization coefficient of ncRNAs and measure how diversely their targets are distributed among the subcellular locations in various scenarios. We focus our study on long non-coding RNAs (lncRNAs), and our observations reveal that the target localization diversity is a primary characteristic of lncRNAs in different biotypes. Moreover, we found that lncRNAs in multiple cancers, differentially expressed cancer lncRNAs, and lncRNAs with multiple cancer target proteins are prone to have high target localization diversity. Furthermore, the analysis of gastric cancer helps us to obtain a better understanding that the target localization diversity of lncRNAs is an important feature closely related to clinical prognosis. Overall, we systematically studied the target localization diversity of the lncRNAs and uncovered its association with cancer.

  9. SAR Imaging of Ground Moving Targets with Non-ideal Motion Error Compensation(in English

    Directory of Open Access Journals (Sweden)

    Zhou Hui

    2015-06-01

    Full Text Available Conventional ground moving target imaging algorithms mainly focus on the range cell migration correction and the motion parameter estimation of the moving target. However, in real Synthetic Aperture Radar (SAR data processing, non-ideal motion error compensation is also a critical process, which focuses and has serious impacts on the imaging quality of moving targets. Non-ideal motion error can not be compensated by either the stationary SAR motion error compensation algorithms or the autofocus techniques. In this paper, two sorts of non-ideal motion errors that affect the Doppler centroid of the moving target is analyzed, and a novel non-ideal motion error compensation algorithm is proposed based on the Inertial Navigation System (INS data and the range walk trajectory. Simulated and real data processing results are provided to demonstrate the effectiveness of the proposed algorithm.

  10. Effects of text messaging in addition to emails on physical activity among university and college employees in the UK.

    Science.gov (United States)

    Suggs, Suzanne; Blake, Holly; Bardus, Marco; Lloyd, Scott

    2013-04-01

    To test the effects of adding text messages to weekly email communications on recipients' total physical activity (leisure-time; workplace; domestic and garden; and active transportation) in employees of universities and colleges in the UK. A randomised trial with two study groups (email only or email plus text messaging for 12 weeks) was implemented at five workplaces. Data were collected at baseline, immediately after, and four weeks after the intervention. Intervention effects on physical activity were evaluated using latent growth modelling. Total physical activity decreased over time in both groups but the decrease was non-significant. The only significant difference between groups was found for workplace physical activity, with the group receiving emails and text messages having a linear decrease of 2.81 Metabolic Equivalent h/week (β = -0.31, p = 0.035) compared to the email only group. Sending employees two additional text messages resulted in less physical activity. Further investigation is needed to understand whether text messaging may play a beneficial role in promoting physical activity in workplace settings. © The Author(s) 2013 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  11. 一种基于Cloud-P2P计算模型的恶意代码联合防御网络%Malicious code united-defense network based on Cloud-P2P model

    Institute of Scientific and Technical Information of China (English)

    徐小龙; 吴家兴; 杨庚

    2012-01-01

    The current anti-virus systems are usually unable io respond to endless emerging malicious codes in time. To sohe this problem, this paper proposed and constructed a new malicious code united-defense network based on the Cloud-P2P computing model. The Cloud-P2P model integrated the cloud computing and the P2P computing systems together organically. Servers and user terminals in the malicious code united-defense network carry out their own duties, forming a high-security collaborative defense network against malicious cooes and obtaining the whole group immunity quickly. It also proposed two kinds of hierarchical network topology, C-DHT and D-DHT, which were based on the distributed hash table technology and suitable for the Cloud-P2P computing model. By the introduction of mobile agent technology, realized vaccine agent and patrol agent of the malicious code defense united-network. The malicious code united-defense network based on the Cloud-P2P computing model has ideal performances, such as the network load balance, the rapid response, the comprehensive defense and the good compatibility.%针对目前的反病毒系统在应对恶意代码时通常具有的滞后性,提出并构建了一种新颖的基于CloudP2P计算模型的恶意代码联合防御网络.Cloud-P2P计算模型将云计算与对等计算进行有机融合.恶意代码联合防御网络系统中的集群服务器与用户终端群体联合组成了一个高安全防御网,协同防御恶意代码,并快速产生群体免疫力.为了提高系统的性能表现,提出适用于Cloud-P2P融合计算环境的两种基于分布式哈希表的层次式网络结构C-DHT和D-DHT,并通过引入移动agent技术实现了恶意代码联合防御网络中的疫苗agent和巡警agent.基于Cloud-P2P计算模型的恶意代码联合防御网络具有负载均衡、反应快捷、防御全面和兼容性良好等性能表现.

  12. 36 CFR 1250.24 - Will you accept a FOIA request through email?

    Science.gov (United States)

    2010-07-01

    ... request through email? 1250.24 Section 1250.24 Parks, Forests, and Public Property NATIONAL ARCHIVES AND... Access Records Under FOIA § 1250.24 Will you accept a FOIA request through email? Yes, send email FOIA... of your email message that you are sending a FOIA request. The body of the message must contain all...

  13. Email for the provision of information on disease prevention and health promotion.

    Science.gov (United States)

    Sawmynaden, Prescilla; Atherton, Helen; Majeed, Azeem; Car, Josip

    2012-11-14

    Email is a popular and commonly used method of communication, but its use in health care is not routine. Its application in health care has included the provision of information on disease prevention and health promotion, but the effects of using email in this way are not known. This review assesses the use of email for the provision of information on disease prevention and health promotion. To assess the effects of email for the provision of information on disease prevention and health promotion, compared to standard mail or usual care, on outcomes for healthcare professionals, patients and caregivers, and health services, including harms. We searched: the Cochrane Consumers and Communication Review Group Specialised Register (January 2010), the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (1950 to January 2010), EMBASE (1980 to January 2010), CINAHL (1982 to February 2010), ERIC (1965 to January 2010) and PsycINFO (1967 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists, contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies examining interventions where email is used by healthcare professionals to provide information to patients on disease prevention and health promotion, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. We considered healthcare professionals or associated administrative staff as participants originating the email communication, and patients and caregivers as participants receiving the email communication, in all settings. Email communication was one-way from healthcare professionals or associated administrative staff originating the email communication, to patients or caregivers receiving the email communication. Two

  14. Monitoring Agent for Detecting Malicious Packet Drops for Wireless Sensor Networks in the Microgrid and Grid-Enabled Vehicles

    Directory of Open Access Journals (Sweden)

    Jongbin Ko

    2012-05-01

    Full Text Available Of the range of wireless communication technologies, wireless sensor networks (WSN will be one of the most appropriate technologies for the Microgrid and Grid-enabled Vehicles in the Smartgrid. To ensure the security of WSN, the detection of attacks is more efficient than their prevention because of the lack of computing power. Malicious packet drops are the easiest means of attacking WSNs. Thus, the sensors used for constructing a WSN require a packet drop monitoring agent, such as Watchdog. However, Watchdog has a partial drop problem such that an attacker can manipulate the packet dropping rate below the minimum misbehaviour monitoring threshold. Furthermore, Watchdog does not consider real traffic situations, such as congestion and collision, and so it has no way of recognizing whether a packet drop is due to a real attack or network congestion. In this paper, we propose a malicious packet drop monitoring agent, which considers traffic conditions. We used the actual traffic volume on neighbouring nodes and the drop rate while monitoring a sending node for specific period. It is more effective in real network scenarios because unlike Watchdog it considers the actual traffic, which only uses the Pathrater. Moreover, our proposed method does not require authentication, packet encryption or detection packets. Thus, there is a lower likelihood of detection failure due to packet spoofing, Man-In-the Middle attacks or Wormhole attacks. To test the suitability of our proposed concept for a series of network scenarios, we divided the simulations into three types: one attack node, more than one attack nodes and no attack nodes. The results of the simulations meet our expectations.

  15. Private E-Mail Requests and the Diffusion of Responsibility.

    Science.gov (United States)

    Barron, Greg; Yechiam, Eldad

    2002-01-01

    Discussion of e-mail technology and requesting information from multiple sources simultaneously focuses on an experiment demonstrating that addressing e-mails simultaneously to multiple recipients may actually reduce the number of helpful responses. Discusses diffusion of responsibility and implications for the application of social cueing theory…

  16. Real-time non-rigid target tracking for ultrasound-guided clinical interventions

    NARCIS (Netherlands)

    Zachiu, Cornel; Ries, Mario G; Ramaekers, Pascal; Guey, Jean-Luc; Moonen, Chrit T W; de Senneville, Baudouin Denis

    2017-01-01

    Biological motion is a problem for non- or mini-invasive interventions when conducted in mobile/deformable organs due to the targeted pathology moving/deforming with the organ. This may lead to high miss rates and/or incomplete treatment of the pathology. Therefore, real-time tracking of the target

  17. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    Directory of Open Access Journals (Sweden)

    Antun Biloš

    2016-06-01

    Full Text Available Purpose – The main purpose of this paper is to test the controlled experiment (A/B split methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes of spamming and progression of online communication clutter, some practitioners began to question the usability of e-mail as a marketing communication channel, while others embarked on working on improving the message itself. Efforts were invested into improving message quality, as well as into better understanding user expectations. One of the most commonly used techniques to test specific e-mail message elements is the controlled experiment. Findings and implications – This paper explores several types of controlled experiments in a specific Croatian B2C market. Tests were run to determine subscriber behavior towards several newsletter components, including sending time, sending day, sender’s name, and subject line. Open and click rates for tested campaigns, and several other metrics were investigated using MailChimp software. An N − 1 two-proportion test using an adjusted Wald confidence interval around the difference in the proportions was used for comparing the open-rate measure in the controlled experiments between subjects. Limitation – Controlled experiments (A/B split tests showed a lot of potential as a way of measuring behavior and preferences of subscribers, although several apparent limitations (the data-set scope, comparability issues indicated a clear need for standardization on a managerial and scientific level. Originality – This paper provides an up-to-date e-mail marketing effectiveness literature review, describes and tests the

  18. Who sends the email? Using electronic surveys in violence research.

    Science.gov (United States)

    Sutherland, Melissa A; Amar, Angela F; Laughon, Kathryn

    2013-08-01

    Students aged 16-24 years are at greatest risk for interpersonal violence and the resulting short and long-term health consequences. Electronic survey methodology is well suited for research related to interpersonal violence. Yet methodological questions remain about best practices in using electronic surveys. While researchers often indicate that potential participants receive multiple emails as reminders to complete the survey, little mention is made of the sender of the recruitment email. The purpose of this analysis is to describe the response rates from three violence-focused research studies when the recruitment emails are sent from a campus office, researcher or survey sampling firm. Three violence-focused studies were conducted about interpersonal violence among college students in the United States. Seven universities and a survey sampling firm were used to recruit potential participants to complete an electronic survey. The sender of the recruitment emails varied within and across the each of the studies depending on institutional review boards and university protocols. An overall response rate of 30% was noted for the 3 studies. Universities in which researcher-initiated recruitment emails were used had higher response rates compared to universities where campus officials sent the recruitment emails. Researchers found lower response rates to electronic surveys at Historically Black Colleges or Universities and that other methods were needed to improve response rates. The sender of recruitment emails for electronic surveys may be an important factor in response rates for violence-focused research. For researchers identification of best practices for survey methodology is needed to promote accurate disclosure and increase response rates.

  19. Targeting nanoparticles to M cells with non-peptidic ligands for oral vaccination.

    Science.gov (United States)

    Fievez, Virginie; Plapied, Laurence; des Rieux, Anne; Pourcelle, Vincent; Freichels, Hélène; Wascotte, Valentine; Vanderhaeghen, Marie-Lyse; Jerôme, Christine; Vanderplasschen, Alain; Marchand-Brynaert, Jacqueline; Schneider, Yves-Jacques; Préat, Véronique

    2009-09-01

    The presence of RGD on nanoparticles allows the targeting of beta1 integrins at the apical surface of human M cells and the enhancement of an immune response after oral immunization. To check the hypothesis that non-peptidic ligands targeting intestinal M cells or APCs would be more efficient for oral immunization than RGD, novel non-peptidic and peptidic analogs (RGD peptidomimitic (RGDp), LDV derivative (LDVd) and LDV peptidomimetic (LDVp)) as well as mannose were grafted on the PEG chain of PCL-PEG and incorporated in PLGA-based nanoparticles. RGD and RGDp significantly increased the transport of nanoparticles across an in vitro model of human M cells as compared to enterocytes. RGD, LDVp, LDVd and mannose enhanced nanoparticle uptake by macrophages in vitro. The intraduodenal immunization with RGDp-, LDVd- or mannose-labeled nanoparticles elicited a higher production of IgG antibodies than the intramuscular injection of free ovalbumin or intraduodenal administration of either non-targeted or RGD-nanoparticles. Targeted formulations were also able to induce a cellular immune response. In conclusion, the in vitro transport of nanoparticles, uptake by macrophages and the immune response were positively influenced by the presence of ligands at the surface of nanoparticles. These targeted-nanoparticles could thus represent a promising delivery system for oral immunization.

  20. E-mail communication patterns and job burnout

    Science.gov (United States)

    2018-01-01

    A considerable body of research has documented the negative effects of job burnout on employees and their organizations, emphasizing the importance of the identification of early signs of the phenomenon for the purposes of prevention and intervention. However, such timely identification is difficult due to the time and cost of assessing the burnout levels of all employees in an organization using established scales. In this paper, we propose an innovative way to identify employees at risk of job burnout by analyzing their e-mail communication patterns. Building on the Job Demands–Resources model, we theorize about the relationship between e-mail communication patterns and levels of employee exhaustion and disengagement (two dimensions of burnout). We analyzed 52,190 e-mails exchanged between 57 employees of a medium sized R&D company over a five-month period. We then related these employees’ communication patterns to their levels of burnout, collected using an established scale (the OLBI–Oldenburg Burnout Inventory). Our results provide support for the overall proposition of the paper, that e-mail communications can be used to identify individuals at risk of job burnout. Our models explain up to 34% of the variance of burnout and up to 37% and 19% respectively of the variance of exhaustion and disengagement. They also successfully distinguish between employees with a higher risk of burnout and those with lower levels of risk (F1 score of 84% with recall of 100% and 73% precision). We discuss the implications of our results and present suggestions for future research. PMID:29518128

  1. Email communication in a developing country: different family physician and patient perspectives.

    Science.gov (United States)

    Makarem, Nisrine N; Antoun, Jumana

    2016-01-01

    Email communication between physicians and patients could improve access to and delivery of health care. Most of the literature studies about email communication between physicians and patients have been conducted in developing countries. Therefore, this study aims to analyze the practices, attitudes, and barriers of both physicians' and patients' use of email within the same health care setting of a developing country. A cross-sectional paper-based survey was conducted among 39 physicians and 500 patients at the Family Medicine clinics of the American University of Beirut, a tertiary academic medical center. Most of the surveyed patients and physicians reported that they would like to communicate through email and agreed that it is useful. However, only 19% of the patients have ever communicated with their physicians via email, and only 5.1% of physicians have often communicated with their patients via email. Almost half of the patients surveyed were unaware of the possibility of this form of communication, and only 17% reported that their physician offered them his or her email address. In addition, physicians and patients did not agree on the services to be provided by email communication. For instance, almost half of the patients indicated consultation for an urgent medical matter as suitable for email communication. The use of email communication in health care is still scarce. Patients and physicians have different perspectives of its use and importance. Further rigorous research is needed to clarify the advantages and disadvantages of this form of communication, especially in the developing world. Interested physicians are encouraged to establish appropriate personal policies for email communication with adequate announcement and patient education plans.

  2. Non-targeted analysis of unexpected food contaminants using LC-HRMS.

    Science.gov (United States)

    Kunzelmann, Marco; Winter, Martin; Åberg, Magnus; Hellenäs, Karl-Erik; Rosén, Johan

    2018-03-29

    A non-target analysis method for unexpected contaminants in food is described. Many current methods referred to as "non-target" are capable of detecting hundreds or even thousands of contaminants. However, they will typically still miss all other possible contaminants. Instead, a metabolomics approach might be used to obtain "true non-target" analysis. In the present work, such a method was optimized for improved detection capability at low concentrations. The method was evaluated using 19 chemically diverse model compounds spiked into milk samples to mimic unknown contamination. Other milk samples were used as reference samples. All samples were analyzed with UHPLC-TOF-MS (ultra-high-performance liquid chromatography time-of-flight mass spectrometry), using reversed-phase chromatography and electrospray ionization in positive mode. Data evaluation was performed by the software TracMass 2. No target lists of specific compounds were used to search for the contaminants. Instead, the software was used to sort out all features only occurring in the spiked sample data, i.e., the workflow resembled a metabolomics approach. Procedures for chemical identification of peaks were outside the scope of the study. Method, study design, and settings in the software were optimized to minimize manual evaluation and faulty or irrelevant hits and to maximize hit rate of the spiked compounds. A practical detection limit was established at 25 μg/kg. At this concentration, most compounds (17 out of 19) were detected as intact precursor ions, as fragments or as adducts. Only 2 irrelevant hits, probably natural compounds, were obtained. Limitations and possible practical use of the approach are discussed.

  3. Using E-mail in a Math/Computer Core Course.

    Science.gov (United States)

    Gurwitz, Chaya

    This paper notes the advantages of using e-mail in computer literacy classes, and discusses the results of incorporating an e-mail assignment in the "Introduction to Mathematical Reasoning and Computer Programming" core course at Brooklyn College (New York). The assignment consisted of several steps. The students first read and responded…

  4. NON-TARGET AND ECOSYSTEM IMPACTS FROM GENETICALLY MODIFIED CROPS CONTAINING PLANT INCORPORATED PROTECTANTS (PIPS)

    Science.gov (United States)

    The risk of unintended and unexpected adverse impacts on non-target organisms and ecosystems is a key issue in environmental risk assessment of PIP crop plants. While there has been considerable examination of the effects of insect resistant crops on certain non-target organisms...

  5. Non-ETS emission targets for 2030. Indication of emission targets for the Netherlands and other EU Member States under the European Effort Sharing Decision

    Energy Technology Data Exchange (ETDEWEB)

    Verdonk, M.; Hof, A.

    2013-10-15

    As European Member States are making progress towards their 2020 targets in the Effort Sharing Decision, the attention of policymakers is shifting to a framework beyond 2020. The European Commission launched a discussion with its Green Paper on a possible policy framework for 2030. This PBL Note aims to contribute to that discussion by analysing the effects of various assumptions on Member States' non-ETS emission targets for 2030. The effort sharing of the current European target for 2020 has resulted in an emission target of +20% relative to 2005 levels for the least wealthy Member State and -20% for the three wealthiest Member States. The targets for all other Member States were determined based on per-capita income levels of 2005. For possible non-ETS targets for 2030, we assumed a Europe-wide emission reduction target of 40% for 2030, compared to 1990 levels. This target is considered by the European Commission as the most cost-efficient to achieve a low-carbon economy by 2050. The 2030 target was split into a target for emissions covered by the EU Emissions Trading System (ETS) and one for emissions that are not covered by the ETS (non-ETS). According to our estimations, European non-ETS emissions need to be reduced by around 30% by 2030, compared to 2005 levels. We distributed the non-ETS reduction target of 30% over the Member States by using similar effort sharing principles that are applied in the EU Effort Sharing Decision for 2020, but with different targets assumed for the least wealthy Member State. We also took recent per-capita income levels into account. However, we did not take into account the costs and effects of emission reductions on GDP. This PBL Note analyses two possible scenarios that differ in the target assumed for the least wealthy Member State, in order to assess the effects of differing assumptions on the 2030 non-ETS targets. These scenarios should be considered as 'what if' scenarios and not as political positions

  6. Role of non-fossil energy in meeting China's energy and climate target for 2020

    International Nuclear Information System (INIS)

    Zhou, Sheng; Tong, Qing; Yu, Sha; Wang, Yu; Chai, Qimin; Zhang, Xiliang

    2012-01-01

    China is the largest energy consumer and CO 2 emitter in the world. The Chinese government faces growing challenges of ensuring energy security and reducing greenhouse gas emissions. To address these two issues, the Chinese government has announced two ambitious domestic indicative autonomous mitigation targets for 2020: increasing the ratio of non-fossil energy to 15% and reducing carbon dioxide emissions per unit of GDP by 40–45% from 2005 levels. To explore the role of non-fossil energy in achieving these two targets, this paper first provides an overview of current status of non-fossil energy development in China; then gives a brief review of GDP and primary energy consumption; next assesses in detail the role of the non-fossil energy in 2020, including the installed capacity and electricity generation of non-fossil energy sources, the share and role of non-fossil energy in the electricity structure, emissions reduction resulting from the shift to non-fossil energy, and challenges for accomplishing the mitigation targets in 2020; finally, conclusions and policy measures for non-fossil energy development are proposed.

  7. Email networks and the spread of computer viruses

    Science.gov (United States)

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  8. DESCRIPTIVE STUDY OF HONORIFIC USE IN KOREAN EMAIL DISCOURSE

    Directory of Open Access Journals (Sweden)

    Jaegu Kim

    2016-07-01

    Full Text Available It is a relatively new field that examines how Korean culture affects Korean language use in terms of age difference in a corpus of computer mediated email discourse. The purpose of this descriptive study and experiment is to prove the close relationship between Korean language and culture. This paper shows the descriptive study of Korean culture in relation to language use. Korean culture acknowledges an inherent hierarchy with regard to age, and considers [+age] as relating socially to [+power]. When younger Koreans converse with older ones, they express different morpho-syntactic patterns, which is an age complex. The main task of the experiment was to examine the way through which the age complex is reflected by Korean honorific linguistic system in email discourse. I asked 15 Korean native speakers between the ages of 20 to 25 to write emails expressing an impositive request to [+age (46-50 years old], [-age (below 25 years old] and [=age] recipients. The results show significant differences in the use of grammatical features in emails written to [+age] recipients, as compared to emails written to [-age] and [=age] recipients. The implication of the findings is that the cultural values that are attached to age and aging in the Korean society affects Koreans’ language use, which means Korean language and culture are closely intermingled.

  9. Clustering and classification of email contents

    Directory of Open Access Journals (Sweden)

    Izzat Alsmadi

    2015-01-01

    Full Text Available Information users depend heavily on emails’ system as one of the major sources of communication. Its importance and usage are continuously growing despite the evolution of mobile applications, social networks, etc. Emails are used on both the personal and professional levels. They can be considered as official documents in communication among users. Emails’ data mining and analysis can be conducted for several purposes such as: Spam detection and classification, subject classification, etc. In this paper, a large set of personal emails is used for the purpose of folder and subject classifications. Algorithms are developed to perform clustering and classification for this large text collection. Classification based on NGram is shown to be the best for such large text collection especially as text is Bi-language (i.e. with English and Arabic content.

  10. ATR-dependent bystander effects in non-targeted cells

    International Nuclear Information System (INIS)

    Burdak-Rothkamm, S.

    2007-01-01

    Complete text of publication follows. Radiation induced non-targeted bystander effects have been reported for a range of endpoints including the induction of γH2AX foci which serve as a marker for DNA double strand breaks. We have recently reported the induction of γH2AX foci in non-targeted bystander cells up to 48 hours after irradiation and the involvement of reactive oxygen species (ROS) and TGF-beta 1 in the induction of γH2AX foci (Oncogene (2007) 26:993-1002). Here, we wanted to determine the role of the PI3-like kinases ATM, ATR and DNA-PK in DNA damage signalling in bystander cells. Conditioned medium from T98G cells irradiated with 2 Gy of X-rays was transferred onto non-irradiated cells that were subsequently analysed for the induction of γH2AX, ATR and 53BP1 foci as well as clonogenic survival. Irradiated T98G glioma cells generated signals that induced γH2AX and 53BP1 foci in cells treated with the conditioned medium from irradiated cells. These foci co-localised with ATR foci. Inhibition of ATM and DNA-PK could not suppress the induction of bystander γH2AX foci whereas the mutation of ATR in Seckel cells abrogated bystander foci induction. A restriction of bystander foci to the S-phase of the cell cycle both in T98G cells and in ATR- proficient fibroblasts was observed. These results identify ATR as a central player within the bystander signalling cascade leading to γH2AX and 53BP1 foci formation, and suggest a mechanism of DNA damage induction in non-targeted cells. Further investigations have shown decreased clonogenic cell survival in bystander T98G and ATR wild-type fibroblasts. ATR mutated Seckel cells and also ATM-/- fibroblasts were resistant to this effect suggesting a role for both ATR and ATM in the bystander signalling cascade with regard to cell survival. Taken together, these observations support a hypothesis of DNA damage-induced accumulation of stalled replication forks in bystander cells which are subsequently processed by

  11. If You're House Is Still Available, Send Me an Email: Personality Influences Reactions to Written Errors in Email Messages.

    Science.gov (United States)

    Boland, Julie E; Queen, Robin

    2016-01-01

    The increasing prevalence of social media means that we often encounter written language characterized by both stylistic variation and outright errors. How does the personality of the reader modulate reactions to non-standard text? Experimental participants read 'email responses' to an ad for a housemate that either contained no errors or had been altered to include either typos (e.g., teh) or homophonous grammar errors (grammos, e.g., to/too, it's/its). Participants completed a 10-item evaluation scale for each message, which measured their impressions of the writer. In addition participants completed a Big Five personality assessment and answered demographic and language attitude questions. Both typos and grammos had a negative impact on the evaluation scale. This negative impact was not modulated by age, education, electronic communication frequency, or pleasure reading time. In contrast, personality traits did modulate assessments, and did so in distinct ways for grammos and typos.

  12. Who Sends the Email? Using Electronic Surveys in Violence Research

    Directory of Open Access Journals (Sweden)

    Melissa A Sutherland

    2013-08-01

    Full Text Available Introduction: Students aged 16–24 years are at greatest risk for interpersonal violence and the resulting short and long-term health consequences. Electronic survey methodology is well suited for research related to interpersonal violence. Yet methodological questions remain about best practices in using electronic surveys. While researchers often indicate that potential participants receive multiple emails as reminders to complete the survey, little mention is made of the sender of the recruitment email. The purpose of this analysis is to describe the response rates from three violence-focused research studies when the recruitment emails are sent from a campus office, researcher or survey sampling firm. Methods: Three violence-focused studies were conducted about interpersonal violence among college students in the United States. Seven universities and a survey sampling firm were used to recruit potential participants to complete an electronic survey. The sender of the recruitment emails varied within and across the each of the studies depending on institutional review boards and university protocols.Results: An overall response rate of 30% was noted for the 3 studies. Universities in which researcher initiated recruitment emails were used had higher response rates compared to universities where campus officials sent the recruitment emails. Researchers found lower response rates to electronic surveys at Historically Black Colleges or Universities and that other methods were needed to improve response rates.Conclusion: The sender of recruitment emails for electronic surveys may be an important factor in response rates for violence-focused research. For researchers identification of best practices for survey methodology is needed to promote accurate disclosure and increase response rates. [West J Emerg Med. 2013;14(4:363–369.

  13. A Discourse Analysis of School Counseling Supervisory E-Mail

    Science.gov (United States)

    Luke, Melissa; Gordon, Cynthia

    2011-01-01

    This article is a discourse analysis of weekly computer-mediated communications between 8 school counseling interns and their e-mail supervisor over a 16-week semester. Course-required e-mail supervision was provided as an adjunct to traditional face-to-face individual and group supervision. School counselor supervisees and supervisor enacted 3…

  14. Instruction and Pragmatic Change during Study Abroad Email Communication

    Science.gov (United States)

    Alcón-Soler, Eva

    2015-01-01

    The study deals with the effect of instruction and study abroad (SA) on pragmatic knowledge. More specifically, the focus is on gains in explicit knowledge of request mitigators, and whether learners draw on this knowledge when they perform email requests. Email requests produced by 60 Spanish students staying abroad (30 treatment/30 control…

  15. Etiquette for medical students' email communication with faculty members: a single-institution study.

    Science.gov (United States)

    Kim, Do-Hwan; Yoon, Hyun Bae; Yoo, Dong-Mi; Lee, Sang-Min; Jung, Hee-Yeon; Kim, Seog Ju; Shin, Jwa-Seop; Lee, Seunghee; Yim, Jae-Joon

    2016-04-27

    Email is widely used as a means of communication between faculty members and students in medical education because of its practical and educational advantages. However, because of the distinctive nature of medical education, students' inappropriate email etiquette may adversely affect their learning as well as faculty members' perception of them. Little data on medical students' competency in professional email writing is available; therefore, this study explored the strengths and weaknesses of medical students' email etiquette and factors that contribute to professional email writing. A total of 210 emails from four faculty members at Seoul National University College of Medicine were collected. An evaluation criteria and a scoring rubric were developed based on the various email-writing guidelines. The rubric comprised 10 items, including nine items for evaluation related to the email components and one item for the assessment of global impression of politeness. Three evaluators independently assessed all emails according to the criteria. Students were identified as being 61.0% male and 52.8% were in the undergraduate-entry program. The sum of each component score was 62.21 out of 100 and the mean value for global impression was 2.6 out of 4. The results demonstrated that students' email etiquettes remained low-to-mediocre for most criteria, except for readability and honorifics. Three criteria, salutation (r=0.668), closing (r=0.653), and sign-off (r=0.646), showed a strong positive correlation with the global impression of politeness. Whether a student entered a graduate-entry program or an undergraduate-entry program significantly contributed to professional email writing after other variables were controlled. Although students in the graduate-entry program demonstrated a relatively superior level of email etiquette, the majority of medical students did not write emails professionally. Educating all medical students in email etiquette may well contribute to

  16. The Application of E-Mail to College English Teaching in China

    Science.gov (United States)

    Wang, Guofeng

    2010-01-01

    With the development of information technology in the past 10 years, e-mail has been widely used in the field of English teaching. This paper, based on an analysis of the ways of using e-mail in college English teaching in China, probes the feasibility and the benefits of application of e-mail to college English teaching.

  17. Proteomic Identification of Non-Gal Antibody Targets After Pig-to-Primate Cardiac Xenotransplantation

    Science.gov (United States)

    Byrne, Guerard W.; Stalboerger, Paul G.; Davila, Eduardo; Heppelmann, Carrie J.; Gazi, Mozammel H.; McGregor, Hugh C. J.; LaBreche, Peter T.; Davies, William R.; Rao, Vinay P.; Oi, Keiji; Tazelaar, Henry D.; Logan, John S.; McGregor, Christopher G. A.

    2008-01-01

    Background Experience with non-antigenic galactose α1,3 galactose (αGal) polymers and development of αGal deficient pigs has reduced or eliminated the significance of this antigen in xenograft rejection. Despite these advances, delayed xenograft rejection (DXR) continues to occur most likely due to antibody responses to non-Gal endothelial cell (EC) antigens. Methods To gauge the diversity of the non-Gal antibody response we used antibody derived from CD46 transgenic heterotopic cardiac xenografts performed without T-cell immunosuppression, Group A (n = 4) and Gal knockout (GT-KO) heart transplants under tacrolimus and sirolimus immunosuppression, Group B (n = 8). Non-Gal antibody was measured by flow cytometry and by Western blots using GT-KO EC membrane antigens. A nanoLC/MS/MS analysis of proteins recovered from 2D gels was used to identify target antigens. Results Group A recipients exhibited a mixed cellular and humoral rejection. Group B recipients mainly exhibited classical DXR. Western blot analysis showed a non-Gal antibody response induced by GT+ and GT-KO hearts to an overlapping set of pig aortic EC membrane antigens. Proteomic analysis identified 14 potential target antigens but failed to define several immunodominant targets. Conclusions These experiments indicate that the non-Gal antibody response is directed to a number of stress response and inflammation related pig EC antigens and a few undefined targets. Further analysis of these antibody specificities using alternative methods is required to more fully define the repertoire of non-Gal antibody responses. PMID:18957049

  18. Oracle Inequalities for Convex Loss Functions with Non-Linear Targets

    DEFF Research Database (Denmark)

    Caner, Mehmet; Kock, Anders Bredahl

    This paper consider penalized empirical loss minimization of convex loss functions with unknown non-linear target functions. Using the elastic net penalty we establish a finite sample oracle inequality which bounds the loss of our estimator from above with high probability. If the unknown target...... of the same order as that of the oracle. If the target is linear we give sufficient conditions for consistency of the estimated parameter vector. Next, we briefly discuss how a thresholded version of our estimator can be used to perform consistent variable selection. We give two examples of loss functions...

  19. Targeting nanoparticles to M cells with non-peptidic ligands for oral vaccination

    OpenAIRE

    Fievez, Virginie; Plapied, Laurence; des Rieux, Anne; Pourcelle, Vincent; Freichels, Hélène; Wascotte, Valentine; Vanderhaegen, Marie-Lyse; Jérôme, Christine; Vanderplasschen, Alain; Marchand-Brynaert, Jacqueline; Préat, Véronique

    2009-01-01

    The presence of RGD on nanoparticles allows the targeting of β1 integrins at the apical surface of human M cells and the enhancement of an immune response after oral immunization. To check the hypothesis that non-peptidic ligands targeting intestinal M cells or APCs would be more efficient for oral immunization than RGD, novel non-peptidic and peptidic analogs (RGD peptidomimitic (RGDp), LDV derivative (LDVd) and LDV peptidomimetic (LDVp)) as well as mannose were grafted on the PEG chain of P...

  20. The implementation of flipped classroom model in CIE in the environment of non-target language

    Science.gov (United States)

    Xiao, Renfei; Mustofa, Ali; Zhang, Fang; Su, Xiaoxue

    2018-01-01

    This paper sets a theoretical framework that it’s both feasible and indispensable of flipping classroom in Chinese International Education (CIE) in the non-target language environments. There are mainly three sections included: 1) what is flipped classroom and why it becomes inevitable existence; 2) why should we flip the classroom in CIE environments, especially in non-target language environments; 3) take Pusat Bahasa Mandarin Universitas Negeri Surabaya as an instance to discuss the application of flipped classroom in non-target language environments.

  1. Student Perceptions of Peer Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.; Maier, David J.

    2013-01-01

    The purpose of this study was to evaluate students' perceptions of their peer's credibility based on email addresses. The survey was conducted at a community college in Michigan where all students were registered and actively taking at least one course. The survey results show that a student's selection of an email address does influence other…

  2. Student Perceptions of Faculty Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.

    2010-01-01

    The purpose of this study was to evaluate students' perceptions of faculty credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a faculty member's selection of an email address does…

  3. An Empirical Study of Email-Based Advertisement and its Influence on Consumers’ Attitude

    Directory of Open Access Journals (Sweden)

    Navid Behravan

    2012-07-01

    Full Text Available E-commerce becomes a cornerstone for many businesses over the recent years. Align with e-commerce activities, the marketing communication through online media plays a major role in achieving competitive advantageous. E-mail advertising in this context offers a cost effective, direct and reciprocal means for businesses overcoming time and geographical barriers. As so, this study discussed the advertising e-mail characteristics and its influences on customers' attitude about email-based advertisement. According to the research findings, entertainment and informativeness of advertising email content is strongly and positively affect customers’ attitude about email-based advertisement. On the other hand, the privacy of advertising e-mail is strongly, yet negatively influences the customers’ attitude towards email-based advertisement.

  4. Targeting the Brain with Nanomedicine.

    Science.gov (United States)

    Rueda, Felix; Cruz, Luis J

    2017-01-01

    Herein, we review innovative nanomedicine-based approaches for treating, preventing and diagnosing neurodegenerative diseases. We focus on nanoscale systems such as polymeric nanoparticles (NPs), liposomes, micelles and other vehicles (e.g. dendrimers, nanogels, nanoemulsions and nanosuspensions) for targeted delivery of bioactive molecules to the brain. To ensure maximum selectivity for optimal therapeutic or diagnostic results, researchers must employ delivery systems that are non-toxic, biodegradable and biocompatible. This entails: (i) use of "safe" materials, such as polymers or lipids; (ii) targeting to the brain and, specifically, to the desired active site within the brain; (iii) controlled release of the loaded agent; and (iv) use of agents that, once released into the brain, will exhibit the desired pharmacologic activity. Here, we explore the design and preclinical use of representative delivery systems that have been proposed to date. We then analyze the principal challenges that have delayed clinical application of these and other approaches. Lastly, we look at future developments in this area, addressing the needs for increased penetration of the blood brain barrier (BBB), enhanced targeting of specific brain sites, improved therapeutic efficacy and lower neurotoxicity. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  5. Study on the non-target effect of ionizing radiation using single cell gel electrophoresis

    International Nuclear Information System (INIS)

    Wang Yan; Li Deguan; Liu Jianfeng; Chu Liping; Liu Qiang

    2008-01-01

    Objective: To assess the non-target effect of ionizing radiation by single cell gel electrophoresis (SCGE). Methods: Cross incubated the irradiated( 137 Cs; 2Gy) or non-irradiated lymphocytes of human peripheral blood in the irradiated or non-irradiated plasma respectively, then, assess the DNA damage of lymphocytes using SCGE analysis. Results: The lymphocytes incubated in the irradiated plasma presented more obvious DNA damage than the incubated in the non-irradiated plasma dose (P<0.05). Conclusion: The non-target effect of ionizing radiation can be assessed by SCGE, and the results confirm that cytokines may play a great role in it. (authors)

  6. What parents want from emails with their pediatrician: implications for teaching communication skills.

    Science.gov (United States)

    Schiller, Jocelyn H; Christner, Jennifer G; Stansfield, Robert Brent; Watnick, Caroline S; Mullan, Patricia B

    2013-07-01

    Physician-patient email communication is increasing but trainees receive no education on this communication medium. Research eliciting patient preferences about email communication could inform training. Investigators elicited parents' perspectives on physician-parent email communication and compared parent and faculty assessments of medical students' emails. This mixed methods study explored physician-parent email communication in 5 parent focus groups using qualitative analyses to identify themes. Differences between faculty and parent assessment scores for students' email responses were calculated using univariate general linear modeling. Themes that emerged were: (1) Building the Relationship, (2) Clarity of Communication and (3) Expectations. Parents criticized student's statements as condescending. The sum of assessment scores by parents and faculty were moderately correlated (r(44)=.407, Pparents gave students lower scores on "acknowledges validity/expresses empathy" (P=.01) and higher scores on "provides next steps" (PParents place value on students' abilities to communicate clearly and convey respect and empathy in email. Parent and faculty perspectives on email communication are similar but not the same. Differences between parental and faculty assessments of medical students' emails supports the need for the involvement of patients and families in email communication curriculum development. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  7. Email communication at the medical primary-secondary care interface: a qualitative exploration.

    Science.gov (United States)

    Sampson, Rod; Barbour, Rosaline; Wilson, Philip

    2016-07-01

    There is little published research into the influence of email communication between primary and secondary care clinicians on patient care. To explore the use of email communication between clinicians across the primary- secondary care interface, and how this may relate to patient care. A qualitative study involving primary and secondary care services in the NHS Highland Health Board area, Scotland. Ten GPs and 12 hospital consultants were purposively sampled to reflect diversity. Eligible clinicians were invited to take part in a semi-structured interview. Data were analysed using a thematic analysis approach. Key themes that emerged for clinicians included general perceptions of email; using email in practice (managing workload, impact on patient journeys, and 'quick answers'); system issues (variability and governance); relational aspects; and email skills. Email communication between primary and secondary care clinicians generally has a positive impact on patient access to specialist expertise. Governance issues around the use of clinical email need to be defined. There may currently be a two-tier health service for those patients (and their GPs) requiring 'quick answers'. © British Journal of General Practice 2016.

  8. Faculty Perceptions of Student Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Wiechowski, Linda S.; Scafe, Marla G.

    2011-01-01

    The purpose of this study was to evaluate faculty perceptions of student credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a student's selection of an email address does influence the…

  9. BEWARE OF OPENING ATTACHMENTS IN E-MAIL

    CERN Multimedia

    2000-01-01

    Following the recent e-mail viruses you are asked to be cautious when opening e-mail attachments on your PC. Attachments that are apparently harmless might hide active content producing nasty effects as soon as they are opened. Some of these so called 'Trojan horses' can conceal themselves in very attractive pictures and funny slide shows.On the PC Windows infrastructure, CERN runs software to protect users from known viruses, but new ones can sometimes arrive before our software recognises them. They can enter your system when you open an attachment. To remove them it may be necessary to re-install the Windows software on your PC.

  10. Effects of seed mixture sowing with resistant and susceptible rice on population dynamics of target planthoppers and non-target stemborers and leaffolders.

    Science.gov (United States)

    Li, Zhuo; Wan, Guijun; Wang, Long; Parajulee, Megha N; Zhao, Zihua; Chen, Fajun

    2018-07-01

    The widespread planting of insect-resistant crops has caused a dramatic shift in agricultural landscapes, thus raising concerns about the potential impact on both target and non-target pests worldwide. In this study, we examined the potential effects of six seed mixture ratios of insect-resistance dominance [100% (R100), 95% (S05R95), 90% (S10R90), 80% (S20R80), 60% (S40R60), and 0% (S100)] on target and non-target pests in a 2-year field trial in southern China. The occurrence of the target pests Nilaparvata lugens and Sogatella furcifera decreased with an increase in the ratio of resistant rice, and mixture ratios with ≥90% resistant rice significantly increased the pest suppression efficiency, with the lowest occurrences of the non-target pests Sesamia inferens, Chilo suppressalis and Cnaphalocrocis medinalis for S100 and S10R90 seed mixture ratios. Furthermore, there were no significant differences in the 1000-grain dry weight and grain yield between R100 and other treatments with ≥80% resistant seeds in the mixture (S20R80, S10R90 and S05R95). S10R90 produced a good yield and provided the most effective control of both target and non-target pests, with the potential to significantly reduce the application of chemical pesticides for integrated pest management in paddy fields. It is further presumed that the strategy of seed mixture with resistant and susceptible rice would be advantageous for rice yield stability. © 2018 Society of Chemical Industry. © 2018 Society of Chemical Industry.

  11. [Target and non-target screening of volatile organic compounds in industrial exhaust gas using thermal desorption-gas chromatography-mass spectrometry].

    Science.gov (United States)

    Ma, Huilian; Jin, Jing; Li, Yun; Chen, Jiping

    2017-10-08

    A method of comprehensive screening of the target and non-target volatile organic compounds (VOCs) in industrial exhaust gas using thermal desorption-gas chromatography-mass spectrometry (TD-GC-MS) has been developed. In this paper, two types of solid phase adsorption column were compared, and the Tenex SS TD Tube was selected. The analytes were enriched into the adsorption tube by constant flow sampling, and detected by TD-GC-MS in full scan mode. Target compounds were quantified by internal standard method, and the quantities of non-target compounds were calculated by response coefficient of toluene. The method detection limits (MDLs) for the 24 VOCs were 1.06 to 5.44 ng, and MDLs could also be expressed as 0.004 to 0.018 mg/m 3 assuming that the sampling volume was 300 mL. The average recoveries were in the range of 78.4% to 89.4% with the relative standard deviations (RSDs) of 3.9% to 14.4% ( n =7). The established analytical method was applied for the comprehensive screening of VOCs in a waste incineration power plant in Dalian city. Twenty-nine VOCs were identified. In these compounds, only five VOCs were the target compounds set in advance, which accounted for 26.7% of the total VOCs identified. Therefore, this study further proved the importance of screening non-target compounds in the analysis of VOCs in industrial exhaust gas, and has certain reference significance for the complete determination of VOCs distribution.

  12. Ombuds' corner: Code of Conduct and e-mails

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Luke* holds a key position in the coordination of a large project. He is also a recognized expert in modeling complicated structures. Because of his expertise in the field, he receives a considerable number of e-mails every day which he has trouble responding to in addition to his responsibilities of management and development. Constantly interrupted, he tends to answer his emails quickly, sometimes even in an instinctive way, which leads to somewhat laconic messages. One day he receives an e-mail from Dave* challenging some of the decisions taken by the project’s management. Luke agrees with Dave’s remarks, which seem justified given his own expertise of the su...

  13. Non-accidental injuries found in necropsies of domestic cats: a review of 191 cases.

    Science.gov (United States)

    de Siqueira, Adriana; Cassiano, Fabiana Cecília; de Albuquerque Landi, Marina Frota; Marlet, Elza Fernandes; Maiorka, Paulo César

    2012-10-01

    Animal cruelty is defined as a deliberate action that causes pain and suffering to an animal. In Brazil, legislation known as the Environmental Crimes Law states that cruelty toward all animal species is criminal in nature. From 644 domestic cats necropsied between January 1998 and December 2009, 191 (29.66%) presented lesions highly suggestive of animal cruelty. The main necroscopic finding was exogenous carbamate poisoning (75.39%) followed by blunt-force trauma (21.99%). Cats from 7 months to 2 years of age were the most affected (50.79%). In Brazil, violence is a public health problem and there is a high prevalence of domestic violence. Therefore, even if laws provide for animal welfare and protection, animals are common targets for violent acts. Within a context of social violence, cruelty toward animals is an important parameter to be considered, and the non-accidental lesions that were found are evidence of malicious actions.

  14. Email for communicating results of diagnostic medical investigations to patients.

    Science.gov (United States)

    Meyer, Barbara; Atherton, Helen; Sawmynaden, Prescilla; Car, Josip

    2012-08-15

    As medical care becomes more complex and the ability to test for conditions grows, pressure on healthcare providers to convey increasing volumes of test results to patients is driving investigation of alternative technological solutions for their delivery. This review addresses the use of email for communicating results of diagnostic medical investigations to patients. To assess the effects of using email for communicating results of diagnostic medical investigations to patients, compared to SMS/ text messaging, telephone communication or usual care, on outcomes, including harms, for health professionals, patients and caregivers, and health services. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies of interventions using email for communicating results of any diagnostic medical investigations to patients, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two review authors independently assessed the titles and abstracts of retrieved citations. No studies were identified for inclusion. Consequently, no data collection or analysis was possible. No studies met the inclusion criteria, therefore there are no results to report on the use of email for communicating results of diagnostic medical

  15. Email communication at the medical primary–secondary care interface: a qualitative exploration

    Science.gov (United States)

    Sampson, Rod; Barbour, Rosaline; Wilson, Philip

    2016-01-01

    Background There is little published research into the influence of email communication between primary and secondary care clinicians on patient care. Aim To explore the use of email communication between clinicians across the primary– secondary care interface, and how this may relate to patient care. Design and setting A qualitative study involving primary and secondary care services in the NHS Highland Health Board area, Scotland. Ten GPs and 12 hospital consultants were purposively sampled to reflect diversity. Method Eligible clinicians were invited to take part in a semi-structured interview. Data were analysed using a thematic analysis approach. Results Key themes that emerged for clinicians included general perceptions of email; using email in practice (managing workload, impact on patient journeys, and ‘quick answers’); system issues (variability and governance); relational aspects; and email skills. Conclusion Email communication between primary and secondary care clinicians generally has a positive impact on patient access to specialist expertise. Governance issues around the use of clinical email need to be defined. There may currently be a two-tier health service for those patients (and their GPs) requiring ‘quick answers’. PMID:27162209

  16. Uptake and adherence of a self-directed internet-based mental health intervention with tailored e-mail reminders in senior high schools in Norway.

    Science.gov (United States)

    Lillevoll, Kjersti R; Vangberg, Hans Christian B; Griffiths, Kathleen M; Waterloo, Knut; Eisemann, Martin R

    2014-01-21

    Internet-based cognitive behavioural therapy (ICBT) is a promising approach to the prevention and reduction of depressive symptoms among adolescents. This study aimed to evaluate the feasibility and efficacy of disseminating a self-directed internet-based mental health intervention (MoodGYM) in senior high schools. It also sought to investigate possible effects of tailored and weekly e-mail reminders on initial uptake and adherence to the intervention. A baseline survey was conducted in four senior high schools in two Norwegian municipalities (n = 1337). 52.8% (707/1337) of the students consented to further participation in the trial and were randomly allocated to one of three MoodGYM intervention groups (tailored weekly e-mail reminder (n = 175), standardized weekly e-mail reminder (n = 176 ) or no e-mail reminder (n = 175)) or a waitlist control group (n = 180). We tested for effects of the intervention on depression and self-esteem using multivariate analysis of variance, effects of tailored e-mail and self-reported current need of help on initial uptake of the intervention using logistic regression and the effect of weekly e-mails on adherence using ordinal regression. There was substantial non-participation from the intervention, with only 8.5% (45/527) participants logging on to MoodGYM, and few proceeding beyond the first part of the programme. No significant effect on depression or self-esteem was found among the sample as a whole or among participants with elevated depression scores at baseline. Having a higher average grade in senior high school predicted initial uptake of the intervention, but tailored e-mail and self-reported current need of help did not. Weekly e-mail prompts did not predict adherence. The main reasons for non-use reported were lack of time/forgetting about it and doubt about the usefulness of the program. Overall, disseminating a self-directed internet-based intervention to a school population proved difficult despite steps taken to

  17. Email use in elementary school: an analysis of exchange patterns and content

    NARCIS (Netherlands)

    van der Meij, Hans; Boersma, Kerst

    Email was embedded in a project in design and technology education in elementary school. During four lessons children worked in groups on building a flying object. These groups communicated through email with groups of children from another school. The analyses of the emails, as viewed from

  18. Statistics-based email communication security behavior recognition

    Science.gov (United States)

    Yi, Junkai; Su, Yueyang; Zhao, Xianghui

    2017-08-01

    With the development of information technology, e-mail has become a popular communication medium. It has great significant to determine the relationship between the two sides of the communication. Firstly, this paper analysed and processed the content and attachment of e-mail using the skill of steganalysis and malware analysis. And it also conducts the following feature extracting and behaviour model establishing which based on Naive Bayesian theory. Then a behaviour analysis method was employed to calculate and evaluate the communication security. Finally, some experiments about the accuracy of the behavioural relationship of communication identifying has been carried out. The result shows that this method has a great effects and correctness as eighty-four percent.

  19. The Perceived Helpfulness of Rendering Emotional First Aid via Email

    Science.gov (United States)

    Gilat, Itzhak; Reshef, Eyal

    2015-01-01

    The present research examined the perceived helpfulness of an increasingly widespread mode of psychological assistance, namely, emotional first aid via email. The sample comprised 62 naturally occurring email interactions between distressful clients and trained volunteers operating within the framework of the Israeli Association for Emotional…

  20. Risk-Based Treatment Targets for Onsite Non-Potable Water Reuse

    Science.gov (United States)

    This presentation presents risk-based enteric pathogen log reduction targets for non-potable and potable uses of a variety of alternative source waters (i.e., municipal wastewater, locally-collected greywater, rainwater, and stormwater). A probabilistic, forward Quantitative Micr...

  1. Normative Data for Email Writing by Native Speakers of British English

    Directory of Open Access Journals (Sweden)

    Lindsey Thiel

    2015-05-01

    Full Text Available This dataset includes emails from forty two control participants ranging from 16 to 88 years of age (mean = 46 and 9 to 24 years of education (mean = 13. Three emails were produced by each participant (between 2011 and 2014, each within a time limit of three minutes. It is expected that this normative data will be useful for clinicians and researchers working with adults with acquired language disorders in assessing email writing.

  2. Normative Data for Email Writing by Native Speakers of British English

    OpenAIRE

    Thiel, Lindsey; Sage, Karen; Conroy, Paul

    2015-01-01

    This dataset includes emails from forty two control participants ranging from 16 to 88 years of age (mean = 46) and 9 to 24 years of education (mean = 13). Three emails were produced by each participant (between 2011 and 2014), each within a time limit of three minutes. It is expected that this normative data will be useful for clinicians and researchers working with adults with acquired language disorders in assessing email writing.

  3. Unraveling mulitple translatorship through an e-mail correspondence

    DEFF Research Database (Denmark)

    Jansen, Hanne

    2017-01-01

    The aim of this study is to shed light on questions of “multiple translatorship” and particularly on translation collaboration processes. The empirical material consists of more than three hundred e-mails exchanged between two co-translators who translated Claudio Magris’s novel Alla cieca (2005......) into Danish. The theoretical framework presents a double perspective through which the e-mail correspondence is studied: on the one hand, as an ethnographic “thick description” (focusing on translation as an event), with the aim of uncovering who the agents involved are, how they interact, and what...

  4. Experiences of using email for general practice consultations: a qualitative study.

    Science.gov (United States)

    Atherton, Helen; Pappas, Yannis; Heneghan, Carl; Murray, Elizabeth

    2013-11-01

    Reports suggest approximately 21-23% of GPs in the UK have consulted with patients using email, but little is known about the nature of this use and what it means for clinicians and patients in general practice. To understand the use of email consultation in general practice by investigating the experiences of existing users and views of experts. A qualitative study conducted in 2010 using purposive sampling and semi-structured interviews in general practice and community settings in some London boroughs. A maximum variation sample of GPs and patients who had used email for consultation in general practice were recruited, as were policy and/or implementation experts. Interviews continued until saturation was achieved. In total 10 GPs, 14 patients, and six experts were interviewed. Consultation by email was often triggered by logistic or practical issues; motivators for ongoing use were the benefits, such as convenience, for GPs and patients. Both GPs and patients reported concerns about safety and lack of guidance about the 'rules of engagement' in email consultations, with GPs also concerned about workload. In response, both groups attempted to introduce their own rules, although this only went some way to addressing uncertainty. Long term, participants felt there was a need for regulation and guidance. Consultations by email in general practice occur in an unregulated and unstructured way. Current UK policy is to promote consultations by email, making it crucial to consider the responsibility and workload faced by clinicians, and the changes required to ensure safe use; not doing so may risk safety breaches and result in suboptimal care for patients.

  5. E-mail security a pocket guide

    CERN Document Server

    Furnell, Steven

    2010-01-01

    This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.

  6. Employees' Perceptions of Email Communication, Volume and Management Strategies in an Australian University

    Science.gov (United States)

    Pignata, Silvia; Lushington, Kurt; Sloan, Jeremy; Buchanan, Fiona

    2015-01-01

    Despite email playing a central role in university business, little is known about the strategies used by staff to manage email and the factors contributing to email overload. In a mixed method study undertaken in one Australian university comparing academic (n = 193) and professional (n = 278) staff, we found that while email volume was higher in…

  7. Orbit Determination for a Microsatellite Rendezvous with a Non-Cooperative Target

    National Research Council Canada - National Science Library

    Foster, Brian

    2003-01-01

    This study investigated the minimum requirements to establish a satellite tracking system architecture for a hostile "parasitic microsatellite" to rendezvous with a larger, non-cooperative target satellite...

  8. Non-targeted effects of radiation exposure: recent advances and implications

    International Nuclear Information System (INIS)

    Kadhim, M.A.; Hill, M.A.

    2015-01-01

    The target theory of radiation-induced effects has been challenged by numerous studies, which indicate that in addition to biological effects resulting from direct DNA damage within the cell, a variety of non-DNA targeted effects (NTE) may make important contributions to the overall outcome. Ionising radiation induces complex, global cellular responses, such as genomic instability (GI) in both irradiated and never-irradiated 'bystander' cells that receive molecular signals produced by irradiated cells. GI is a well-known feature of many cancers, increasing the probability of cells to acquire the 'hallmarks of cancer' during the development of tumours. Although epidemiological data include contributions of both direct and NTE, they lack (i) statistical power at low dose where differences in dose response for NTE and direct effects are likely to be more important and (ii) heterogeneity of non-targeted responses due to genetic variability between individuals. In this article, NTE focussing on GI and bystander effects were critically examined, the specific principles of NTE were discussed and the potential influence on human health risk assessment from low-dose radiation was considered. (authors)

  9. Assessing Potential Impact of Bt Eggplants on Non-Target Arthropods in the Philippines

    Science.gov (United States)

    Navasero, Mario V.; Candano, Randolph N.; Hautea, Desiree M.; Hautea, Randy A.; Shotkoski, Frank A.; Shelton, Anthony M.

    2016-01-01

    Studies on potential adverse effects of genetically engineered crops are part of an environmental risk assessment that is required prior to the commercial release of these crops. Of particular concern are non-target organisms (NTOs) that provide important ecosystem services. Here, we report on studies conducted in the Philippines over three cropping seasons with Bt eggplants expressing Cry1Ac for control of the eggplant fruit and shoot borer (EFSB), Leucinodes orbonalis, to examine potential effects on field abundance, community composition, structure and biodiversity of NTO’s, particularly non-target arthropod (NTA) communities. We document that many arthropod taxa are associated with Bt eggplants and their non-Bt comparators and that the number of taxa and their densities varied within season and across trials. However, we found few significant differences in seasonal mean densities of arthropod taxa between Bt and non-Bt eggplants. As expected, a lower abundance of lepidopteran pests was detected in Bt eggplants. Higher abundance of a few non-target herbivores was detected in non-Bt eggplants as were a few non-target beneficials that might control them. Principal Response Curve (PRC) analyses showed no statistically significant impact of Bt eggplants on overall arthropod communities through time in any season. Furthermore, we found no significant adverse impacts of Bt eggplants on species abundance, diversity and community dynamics, particularly for beneficial NTAs. These results support our previous studies documenting that Bt eggplants can effectively and selectively control the main pest of eggplant in Asia, the EFSB. The present study adds that it can do so without adverse effects on NTAs. Thus, Bt eggplants can be a foundational component for controlling EFSB in an Integrated Pest Management (IPM) program and dramatically reduce dependence on conventional insecticides. PMID:27798662

  10. Meta-Analysis of PECS with Individuals with ASD: Investigation of Targeted versus Non-Targeted Outcomes, Participant Characteristics, and Implementation Phase

    Science.gov (United States)

    Ganz, Jennifer B.; Davis, John L.; Lund, Emily M.; Goodwyn, Fara D.; Simpson, Richard L.

    2012-01-01

    The Picture Exchange Communication System (PECS) is a widely used picture/icon aided augmentative communication system designed for learners with autism and other developmental disorders. This meta-analysis analyzes the extant empirical literature for PECS relative to targeted (functional communication) and non-targeted concomitant outcomes…

  11. Teleradiology with DICOM e-mail: recommendations of rate at GIT

    International Nuclear Information System (INIS)

    Mildenberger, P.; Kaemmerer, M.; Klos, G.; Schuetze, B.; Engelmann, U.; Ruggiero, S.; Runa, A.; Weisser, G.; Schroeter, A.; Walz, M.

    2005-01-01

    E-mail is ideal for ad-hoc connections in teleradiology. The DICOM standard offers the possibility to append DICOM data types as a MIME attachment to any e-mail, thus ensuring the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g. protection of data privacy) which must be obeyed. Because of the lack of given standards which would grant interoperability as well as manufacturer independence, teleradiology has not been established in Germany until today. Therefore, the IT-Team (Arbeitsgemeinschaft fuer Informationstechnologie, rate at GIT) of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) set up an initiative to standardise telemedicine by using e-mail. Its members agreed that an e-mail-based variant would be the most practicable way to a communication solution - as easy to implement as to use. In their opinion, e-mail represents the smallest common denominator for a safe data interchange that would fulfill the legal advantages for telemedicine in Germany. (orig.)

  12. GlobalTrust: An Attack Resilient Reputation System for Tactical Networks

    Science.gov (United States)

    2014-07-03

    MSA): Some malicious nodes misbehave while other malicious nodes, called malicious spies, behave normally by providing proper services. These...disseminate conflicting (or inconsistent) LTOs. For example, they may misbehave only to a subset of honest nodes (referred to as target nodes) to... misbehaving with prob. α honestly reporting LTOs NRA misbehaving with prob. α reporting opposite LTOs, 1− α CRA misbehaving with prob. α reporting

  13. Non-MHC Antigenic Targets of the Humoral Immune Response in Transplantation

    OpenAIRE

    Zhang, Qiuheng; Reed, Elaine F.

    2010-01-01

    There is a growing body of data supporting a role for non-HLA antibodies in acute and chronic rejection of solid organ transplants. While many of these non-HLA antigens remain poorly defined, the principle antigenic targets are expressed on cells of the allograft including endothelium and epithelium. These non-HLA antigens are classified as either alloantigens, such as the major histocompatibility complex class I chain-related gene A (MICA) or MICB, or tissue-specific autoantigens such as vim...

  14. The relevance of existing health communication models in the email age: An

    Science.gov (United States)

    Fage-Butler, Antoinette Mary; Jensen, Matilde Nisbeth

    2015-01-01

    Email communication is being integrated relatively slowly into doctor–patient communication. Patients have expressed enthusiasm for the medium, while doctors are generally more reluctant. As existing health communication models have characteristically assumed the co-presence of doctor and patient and primarily reflect medical practitioners’ perspectives, their suitability in relation to email communication and patients’ perspectives warrants further investigation. Following a two-step process and using the methodology of the integrative literature review, 29 articles from 2004–2014 are analysed with the aim of investigating the advantages and disadvantages of the medium of email from the patient’s perspective. The findings are compared to the health communication models of biomedicine, patient-centeredness, patient education and patient empowerment to investigate these models’ relevance for doctor–patient email communication. Results show that patients identify numerous advantages with email communication, including improved convenience and access, more detailed informational exchanges, greater reflection opportunities, freedom from the medical gaze and the potential to level out power imbalances, as well as a number of primarily medium-related disadvantages. The findings indicate that email can counteract some of the communicative problems associated with biomedicine and suggest the ongoing relevance of aspects of the models of patient empowerment, patient-centeredness and patient education for email communication.

  15. Which online format is most effective for assisting Baby Boomers to complete advance directives? A randomised controlled trial of email prompting versus online education module.

    Science.gov (United States)

    Bradley, Sandra L; Tieman, Jennifer J; Woodman, Richard J; Phillips, Paddy A

    2017-08-29

    Completion of Advance Directives (ADs), being financial and healthcare proxy or instructional documents, is relatively uncommon in Australia. Efforts to increase completion rates include online education and prompting which past literature suggests may be effective. The aim of this randomized controlled trial was to assess computer-based online AD information and email prompting for facilitating completion of ADs by Australian Baby Boomers (b.1946-1965) as well as factors which may impede or assist completion of these documents by this generation when using the online environment. Two hundred eighty-two men and women aged 49-68 years at the time of the trial were randomly assigned to one of 3 intervention groups: education module only; email prompt only; email prompt and education module; and a control group with no education module and no email prompt. The randomized controlled trial was undertaken in participants' location of choice. Randomization and allocation to trial group were carried out by a central computer system. The primary analysis was based on a final total of 189 participants who completed the trial (n = 52 education module only; n = 44 email prompt only; n = 46 email prompt and education module; and n = 47 control). The primary outcome was the number of individuals in any group completing any of the 4 legal ADs in South Australia within 12 months or less from entry into the trial. Frequency analysis was conducted on secondary outcomes such as reasons for non-completion. Mean follow-up post-intervention at 12 months showed that 7% of overall participants completed one or more of the 4 legal ADs but without significant difference between groups (delta = 1%, p = .48 Prompt/Non-Prompt groups, delta = 5%, p = .44 education/non-education groups). Reasons offered for non-completion were too busy (26%) and/or it wasn't the right time (21%). Our results suggest that neither email prompting nor provision of additional educational material

  16. Non-statistical fluctuations in fragmentation of target nuclei in high energy nuclear interactions

    International Nuclear Information System (INIS)

    Ghosh, Dipak; Ghosh, Premomoy; Ghosh, Alokananda; Roy, Jaya

    1994-01-01

    Analysis of target fragmented ''black'' particles in nuclear emulsion from high energy relativistic interactions initiated by 16 O at 2.1 GeV/nucleon and 12 C and 24 Mg at 4.5 GeV/nucleon reveal the existence of non-statistical fluctuations in the azimuthal plane of interaction. The asymmetry or the non-statistical fluctuations, while found to be independent of projectile mass or incident energy, are dependent on the excitation energy of the target nucleus. (Author)

  17. 13 CFR 124.509 - What are non-8(a) business activity targets?

    Science.gov (United States)

    2010-01-01

    ... non-8(a) business activity targets. These include requiring the Participant to obtain management..., business development, financing, marketing, accounting, or proposal preparation. (5) SBA may initiate... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false What are non-8(a) business...

  18. Providing cell phone numbers and email addresses to Patients: the physician's perspective

    Science.gov (United States)

    2011-01-01

    Background The provision of cell phone numbers and email addresses enhances the accessibility of medical consultations, but can add to the burden of physicians' routine clinical practice and affect their free time. The objective was to assess the attitudes of physicians to providing their telephone number or email address to patients. Methods Primary care physicians in the southern region of Israel completed a structured questionnaire that related to the study objective. Results The study population included 120 primary care physicians with a mean age of 41.2 ± 8.5, 88 of them women (73.3%). Physicians preferred to provide their cell phone number rather than their email address (P = 0.0007). They preferred to answer their cell phones only during the daytime and at predetermined times, but would answer email most hours of the day, including weekends and holidays (P = 0.001). More physicians (79.7%) would have preferred allotted time for email communication than allotted time for cell phone communication (50%). However, they felt that email communication was more likely to lead to miscommunication than telephone calls (P = 0.0001). There were no differences between male and female physicians on the provision of cell phone numbers or email addresses to patients. Older physicians were more prepared to provide cell phone numbers that younger ones (P = 0.039). Conclusions The attitude of participating physicians was to provide their cell phone number or email address to some of their patients, but most of them preferred to give out their cell phone number. PMID:21426591

  19. Providing cell phone numbers and email addresses to Patients: the physician's perspective

    Directory of Open Access Journals (Sweden)

    Freud Tamar

    2011-03-01

    Full Text Available Abstract Background The provision of cell phone numbers and email addresses enhances the accessibility of medical consultations, but can add to the burden of physicians' routine clinical practice and affect their free time. The objective was to assess the attitudes of physicians to providing their telephone number or email address to patients. Methods Primary care physicians in the southern region of Israel completed a structured questionnaire that related to the study objective. Results The study population included 120 primary care physicians with a mean age of 41.2 ± 8.5, 88 of them women (73.3%. Physicians preferred to provide their cell phone number rather than their email address (P = 0.0007. They preferred to answer their cell phones only during the daytime and at predetermined times, but would answer email most hours of the day, including weekends and holidays (P = 0.001. More physicians (79.7% would have preferred allotted time for email communication than allotted time for cell phone communication (50%. However, they felt that email communication was more likely to lead to miscommunication than telephone calls (P = 0.0001. There were no differences between male and female physicians on the provision of cell phone numbers or email addresses to patients. Older physicians were more prepared to provide cell phone numbers that younger ones (P = 0.039. Conclusions The attitude of participating physicians was to provide their cell phone number or email address to some of their patients, but most of them preferred to give out their cell phone number.

  20. Non-statistical fluctuations in fragmentation of target nuclei in high energy nuclear interactions

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Dipak; Ghosh, Premomoy; Ghosh, Alokananda; Roy, Jaya [Jadavpur Univ., Calcutta (India)

    1994-07-01

    Analysis of target fragmented ''black'' particles in nuclear emulsion from high energy relativistic interactions initiated by [sup 16]O at 2.1 GeV/nucleon and [sup 12]C and [sup 24]Mg at 4.5 GeV/nucleon reveal the existence of non-statistical fluctuations in the azimuthal plane of interaction. The asymmetry or the non-statistical fluctuations, while found to be independent of projectile mass or incident energy, are dependent on the excitation energy of the target nucleus. (Author).

  1. Promotion and communication through e-mail marketing campaigns

    Directory of Open Access Journals (Sweden)

    Raluca Dania TODOR

    2017-07-01

    Full Text Available The main purpose of this article is to try to emphasize the e-mail marketing campaigns importance and efficiency and the way they increase the interaction between a company and potential customers and to increase their interest in a company’s products and services and finally trigger the buying decision. Also the present paper’s aim is to exemplify how business can gain benefits by using marketing automation tools like e-mail marketing campaigns which is considered nowadays a form of direct marketing which is less expensive than the traditional direct marketing alternatives.

  2. Managing Discourse in Intercultural Business Email Interactions: A Case Study of a British and Italian Business Transaction

    Science.gov (United States)

    Incelli, Ersilia

    2013-01-01

    This paper investigates native speaker (NS) and non-native speaker (NNS) interaction in the workplace in computer-mediated communication (CMC). Based on empirical data from a 10-month email exchange between a medium-sized British company and a small-sized Italian company, the general aim of this study is to explore the nature of the intercultural…

  3. Non-targeted plasma metabolome of early and late lactation gilts

    Science.gov (United States)

    Female pigs nursing their first litter (first-parity gilts) have increased energy requirements not only to support their piglets, but they themselves are still maturing. Non-targeted plasma metabolomics were used to investigate the differences between (1) post-farrowing and weaning (early or late l...

  4. Factors that impact nurses' use of electronic mail (e-mail).

    Science.gov (United States)

    Hughes, J A; Pakieser, R A

    1999-01-01

    As electronic applications are used increasingly in healthcare, nurses are being challenged to adopt them. Electronic mail (e-mail) is an electronic tool with general as well as healthcare uses. E-mail use may be an opportunity to learn a tool that requires skills similar to those used in other applications. This study aimed to identify barriers and facilitators that impact nurses' use of e-mail in the workplace. Data for this study were gathered using focus group methodology. Content analysis identified and labeled factors into seven major categories. Specific factors identified were generally consistent with those previously described in the literature as affecting use of computers in general. However, there were several additional factors identified that were not reported in other previous studies: lack of face-to-face communication, individual writing skills, recency of any educational experience, volume of mail received, password integrity, and technical support. Findings from this study provide information for any individual involved in introducing or updating an e-mail system in a healthcare environment.

  5. ‘Thank you in advance’: Slovenian Request Emails and Responses

    Directory of Open Access Journals (Sweden)

    Sara Orthaber

    2017-10-01

    Full Text Available Communication through email represents one of the most important forms of business communication, not just within a company but also externally with customers. The paper examines email interactions between the agents representing a Slovenian transport company and its customers. More specifically, the study examines specific aspects and elements of email production in a Slovenian customer service setting. It is hoped that the findings will help enhance the communication skills of learners of Slovenian as a foreign language and students of translation and increase their cultural awareness and their knowledge of technology-mediated customer service communication. Moreover, the findings could increase students’ understanding of the pragmatic motivations behind interactants’ linguistic choices.

  6. The future impacts of non-targeted effects.

    Science.gov (United States)

    Bright, Scott; Kadhim, Munira

    2018-04-11

    Ionizing radiation was traditionally thought to exert its detrimental effects through interaction with sensitive cellular targets, nuclear DNA being of most importance. This theory has since merged with a more recently described radiation response called non-targeted effects (NTE). This review will briefly look at the various types of NTE and the potential implications they may have for radiobiology research and its applications. The most well-known NTE are genomic instability (GI) and bystander effects (BE). Other NTE include abscopal effects, which are similar to bystander effects but are generally based in a clinical environment with immune involvement as the defining feature. Currently, our understanding of NTE is limited to certain signaling pathways/molecules, and as yet there is no theory that describes or can accurately predict the occurrence or outcome of these NTE. There are numerous groups investigating these processes in vitro and in vivo, and thus steady progress is being made. Developing a deeper understanding of NTE has potential impacts for therapy and diagnosis, safer occupational exposures, space flight and our general understanding of radiation biology.

  7. Con Artists Attack Colleges with Fake Help-Desk E-Mail

    Science.gov (United States)

    Young, Jeffrey R.

    2008-01-01

    An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…

  8. Pediatric caregiver attitudes toward email communication: survey in an urban primary care setting.

    Science.gov (United States)

    Dudas, Robert Arthur; Crocetti, Michael

    2013-10-23

    Overall usage of email communication between patients and physicians continues to increase, due in part to expanding the adoption of electronic health records and patient portals. Unequal access and acceptance of these technologies has the potential to exacerbate disparities in care. Little is known about the attitudes of pediatric caregivers with regard to their acceptance of email as a means to communicate with their health care providers. We conducted a survey to assess pediatric caregiver access to and attitudes toward the use of electronic communication modalities to communicate with health care providers in an urban pediatric primary care clinic. Participants were pediatric caregivers recruited from an urban pediatric primary care clinic in Baltimore, Maryland, who completed a 35-item questionnaire in this cross-sectional study. Of the 229 caregivers who completed the survey (91.2% response rate), 171 (74.6%) reported that they use email to communicate with others. Of the email users, 145 respondents (86.3%) stated that they would like to email doctors, although only 18 (10.7%) actually do so. Among email users, African-American caregivers were much less likely to support the expanded use of email communication with health care providers (adjusted OR 0.34, 95% CI 0.14-0.82) as were those with annual incomes less than US $30,000 (adjusted OR 0.26, 95% CI 0.09-0.74). Caregivers of children have access to email and many would be interested in communicating with health care providers. However, African-Americans and those in lower socioeconomic groups were much less likely to have positive attitudes toward email.

  9. EphB1 as a Novel Drug Target to Combat Pain and Addiction

    Science.gov (United States)

    2015-09-01

    EphB1  as  a  Novel  Drug  Target  to  Combat  Pain  and   Addiction   Principal  Investigator  Name:   Mark...Principal  Investigator   Phone  and  Email:   Phone :  214-­‐645-­‐5916   Email:  Mark.Henkemeyer@UTSouthwestern.edu   Report  Date...31 Aug 2015 4. TITLE AND SUBTITLE EphB1 as a Novel Drug Target to Combat Pain and Addiction 5a. CONTRACT NUMBER EphB1 as a Novel Drug Target to

  10. Perceptions and use of e-mail among Universiti Utara Malaysia staff: A pilot study

    Science.gov (United States)

    Mohamed, Shafinah Farvin Packeer; Ku-Mahamud, Ku Ruhana; Ramli, Razamin; Abdullah, Kamarudin

    2017-10-01

    The use of e-mail has become common either for work purposes or personal usage. Despite its usefulness, complain about the overwhelming messages received which cause the users to have problem in managing those messages. Similar situation occurred among Universiti Utara Malaysia (UUM) staff. Thus, a pilot study was conducted to investigate its staff's perception and use of e-mail in order to improve the e-mail service provided to them. This paper discusses the findings from the pilot study, which involves 41 UUM staff. Self-administered questionnaires were used to gather the data, while descriptive statistical analysis was used for data analysis. The findings of the study reveal that UUM staff appreciate the e-mail service. However they faced problems like limited storage size and overwhelming e-mails. They think that UUM e-mail is being abused by the repeating advertisements and news sent to them. The output of this study can be used as a guideline by the UUM management in revising its e-mail policy to serve better quality of e-mail service.

  11. New information technology and communication in health care: using e-mail for marketing services

    Directory of Open Access Journals (Sweden)

    Jorge Iván Martínez Espitia

    2015-01-01

    Full Text Available Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email marketing by independent health professionals was conducted in Colombia. Four variables, including tenure email account, receiving these email accounts marketing of products or services, read marketing emails and use by marketing professionals were measured with email. The result of this study showed that independent health professionals in Colombia are familiar with this type of marketing. Generally interested incorporate it as one of your marketing tools, but do not know how to do this activity, which is described in a simple way how to do a marketing campaign with the use of emails to the users of health services.

  12. New information technology and communication in health care: using e-mail for marketing services

    Directory of Open Access Journals (Sweden)

    Jorge Iván Martínez Espitia

    2014-07-01

    Full Text Available Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email marketing by independent health professionals was conducted in Colombia. Four variables, including tenure email account, receiving these email accounts marketing of products or services, read marketing emails and use by marketing professionals were measured with email. The result of this study showed that independent health professionals in Colombia are familiar with this type of marketing. Generally interested incorporate it as one of your marketing tools, but do not know how to do this activity, which is described in a simple way how to do a marketing campaign with the use of emails to the users of health services.

  13. Essays on Information Assurance: Examination of Detrimental Consequences of Information Security, Privacy, and Extreme Event Concerns on Individual and Organizational Use of Systems

    Science.gov (United States)

    Park, Insu

    2010-01-01

    The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…

  14. Effects of seed mixture sowing with transgenic Bt rice and its parental line on the population dynamics of target stemborers and leafrollers, and non-target planthoppers.

    Science.gov (United States)

    Li, Zhuo; Li, Li-Kun; Liu, Bin; Wang, Long; Parajulee, Megha N; Chen, Fa-Jun

    2018-01-24

    The widespread planting of insect-resistant crops has caused a dramatic shift in agricultural landscapes, thus raising concerns about the potential impacts on both target and non-target pests. In this study, we examined the potential effects of intra-specific seed mixture sowing with transgenic Bt rice (Bt) and its parental non-transgenic line (Nt) (100% Bt rice [Bt 100 ], 5% Nt+95% Bt [Nt 05 Bt 95 ], 10% Nt+90% Bt [Nt 10 Bt 90 ], 20% Nt+80% Bt [Nt 20 Bt 80 ], 40% Nt+60% Bt [Nt 40 Bt 60 ] and 100% Nt rice [Nt 100 ]) on target and non-target pests in a 2-year field trial in southern China. The occurrence of target pests, Sesamia inferens, Chilo suppressalis and Cnaphalocrocis medinalis, decreased with the increased ratio of Bt rice, and the mixture ratios with more than 90% Bt rice (Bt 100 and Nt 05 Bt 95 ) significantly increased the pest suppression efficiency, with the lowest occurrences of non-target planthoppers, Nilaparvata lugens and Sogatella furcifera in Nt 100 and Nt 05 Bt 95 . Furthermore, there were no significant differences in 1000-grain dry weight and grain dry weight per 100 plants between Bt 100 and Nt 05 Bt 95 . Seed mixture sowing of Bt rice with ≤10% (especially 5%) of its parent line was sufficient to overcome potential compliance issues that exist with the use of block or structured refuge to provide most effective control of both target and non-target pests without compromising the grain yield. It is also expected that the strategy of seed mixture sowing with transgenic Bt rice and the non-transgenic parental line would provide rice yield stability while decreasing the insecticide use frequency in rice production. © 2018 Institute of Zoology, Chinese Academy of Sciences.

  15. A yeast model for target-primed (non-LTR retrotransposition

    Directory of Open Access Journals (Sweden)

    Busby Jason N

    2007-08-01

    Full Text Available Abstract Background Target-primed (non-LTR retrotransposons, such as the human L1 element, are mobile genetic elements found in many eukaryotic genomes. They are often present in large numbers and their retrotransposition can cause mutations and genomic rearrangements. Despite their importance, many aspects of their replication are not well understood. Results We have developed a yeast model system for studying target-primed retrotransposons. This system uses the Zorro3 element from Candida albicans. A cloned copy of Zorro3, tagged with a retrotransposition indicator gene, retrotransposes at a high frequency when introduced into an appropriate C. albicans host strain. Retrotransposed copies of the tagged element exhibit similar features to the native copies, indicating that the natural retrotransposition pathway is being used. Retrotransposition is dependent on the products of the tagged element's own genes and is highly temperature-regulated. The new assay permits the analysis of the effects of specific mutations introduced into the cloned element. Conclusion This Zorro3 retrotransposition assay system complements previously available target-primed retrotransposition assays. Due to the relative simplicity of the growth, manipulation and analysis of yeast cells, the system should advance our understanding of target-primed retrotransposition.

  16. Chemically different non-thermal plasmas target distinct cell death pathways

    Czech Academy of Sciences Publication Activity Database

    Lunov, O.; Zablotskyy, V.; Chrupina, O.; Lunova, M.; Jirsa, M.; Dejneka, A.; Kubinová, Šárka

    2017-01-01

    Roč. 7, apr (2017), s. 600 ISSN 2045-2322 R&D Projects: GA MŠk(CZ) LO1309 Institutional support: RVO:68378041 Keywords : chemically different * non-thermal plasmas * target distinct cell death pathways Subject RIV: FP - Other Medical Disciplines OBOR OECD: Biophysics Impact factor: 4.259, year: 2016

  17. Utilizing Multi-Field Text Features for Efficient Email Spam Filtering

    Directory of Open Access Journals (Sweden)

    Wuying Liu

    2012-06-01

    Full Text Available Large-scale spam emails cause a serious waste of time and resources. This paper investigates the text features of email documents and the feature noises among multi-field texts, resulting in an observation of a power law distribution of feature strings within each text field. According to the observation, we propose an efficient filtering approach including a compound weight method and a lightweight field text classification algorithm. The compound weight method considers both the historical classifying ability of each field classifier and the classifying contribution of each text field in the current classified email. The lightweight field text classification algorithm straightforwardly calculates the arithmetical average of multiple conditional probabilities predicted from feature strings according to a string-frequency index for labeled emails storing. The string-frequency index structure has a random-sampling-based compressible property owing to the power law distribution and can largely reduce the storage space. The experimental results in the TREC spam track show that the proposed approach can complete the filtering task in low space cost and high speed, whose overall performance 1-ROCA exceeds the best one among the participators at the trec07p evaluation.

  18. Passive Target Tracking in Non-cooperative Radar System Based on Particle Filtering

    Institute of Scientific and Technical Information of China (English)

    LI Shuo; TAO Ran

    2006-01-01

    We propose a target tracking method based on particle filtering(PF) to solve the nonlinear non-Gaussian target-tracking problem in the bistatic radar systems using external radiation sources. Traditional nonlinear state estimation method is extended Kalman filtering (EKF), which is to do the first level Taylor series extension. It will cause an inaccuracy or even a scatter estimation result on condition that there is either a highly nonlinear target or a large noise square-error. Besides, Kalman filtering is the optimal resolution under a Gaussian noise assumption, and is not suitable to the non-Gaussian condition. PF is a sort of statistic filtering based on Monte Carlo simulation that is using some random samples (particles) to simulate the posterior probability density of system random variables. This method can be used in any nonlinear random system. It can be concluded through simulation that PF can achieve higher accuracy than the traditional EKF.

  19. Power Perceptions and Negotiations in a Cross-National Email Writing Activity

    Science.gov (United States)

    Liu, Yichun

    2011-01-01

    The present study investigates EFL students' perceptions of power differentials and their negotiation strategies when communicating with native English-speaking students via emails. The study involved 28 Taiwanese and American undergraduates who participated in a semester-long cross-national email writing activity. Findings show that students in…

  20. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  1. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  2. Bt crop effects on functional guilds of non-target arthropods: a meta-analysis.

    Directory of Open Access Journals (Sweden)

    L LaReesa Wolfenbarger

    Full Text Available BACKGROUND: Uncertainty persists over the environmental effects of genetically-engineered crops that produce the insecticidal Cry proteins of Bacillus thuringiensis (Bt. We performed meta-analyses on a modified public database to synthesize current knowledge about the effects of Bt cotton, maize and potato on the abundance and interactions of arthropod non-target functional guilds. METHODOLOGY/PRINCIPAL FINDINGS: We compared the abundance of predators, parasitoids, omnivores, detritivores and herbivores under scenarios in which neither, only the non-Bt crops, or both Bt and non-Bt crops received insecticide treatments. Predators were less abundant in Bt cotton compared to unsprayed non-Bt controls. As expected, fewer specialist parasitoids of the target pest occurred in Bt maize fields compared to unsprayed non-Bt controls, but no significant reduction was detected for other parasitoids. Numbers of predators and herbivores were higher in Bt crops compared to sprayed non-Bt controls, and type of insecticide influenced the magnitude of the difference. Omnivores and detritivores were more abundant in insecticide-treated controls and for the latter guild this was associated with reductions of their predators in sprayed non-Bt maize. No differences in abundance were found when both Bt and non-Bt crops were sprayed. Predator-to-prey ratios were unchanged by either Bt crops or the use of insecticides; ratios were higher in Bt maize relative to the sprayed non-Bt control. CONCLUSIONS/SIGNIFICANCE: Overall, we find no uniform effects of Bt cotton, maize and potato on the functional guilds of non-target arthropods. Use of and type of insecticides influenced the magnitude and direction of effects; insecticde effects were much larger than those of Bt crops. These meta-analyses underscore the importance of using controls not only to isolate the effects of a Bt crop per se but also to reflect the replacement of existing agricultural practices. Results will

  3. Ancient Origin of the U2 Small Nuclear RNA Gene-Targeting Non-LTR Retrotransposons Utopia.

    Science.gov (United States)

    Kojima, Kenji K; Jurka, Jerzy

    2015-01-01

    Most non-long terminal repeat (non-LTR) retrotransposons encoding a restriction-like endonuclease show target-specific integration into repetitive sequences such as ribosomal RNA genes and microsatellites. However, only a few target-specific lineages of non-LTR retrotransposons are distributed widely and no lineage is found across the eukaryotic kingdoms. Here we report the most widely distributed lineage of target sequence-specific non-LTR retrotransposons, designated Utopia. Utopia is found in three supergroups of eukaryotes: Amoebozoa, SAR, and Opisthokonta. Utopia is inserted into a specific site of U2 small nuclear RNA genes with different strength of specificity for each family. Utopia families from oomycetes and wasps show strong target specificity while only a small number of Utopia copies from reptiles are flanked with U2 snRNA genes. Oomycete Utopia families contain an "archaeal" RNase H domain upstream of reverse transcriptase (RT), which likely originated from a plant RNase H gene. Analysis of Utopia from oomycetes indicates that multiple lineages of Utopia have been maintained inside of U2 genes with few copy numbers. Phylogenetic analysis of RT suggests the monophyly of Utopia, and it likely dates back to the early evolution of eukaryotes.

  4. Detection of Spam Email by Combining Harmony Search Algorithm and Decision Tree

    Directory of Open Access Journals (Sweden)

    M. Z. Gashti

    2017-06-01

    Full Text Available Spam emails is probable the main problem faced by most e-mail users. There are many features in spam email detection and some of these features have little effect on detection and cause skew detection and classification of spam email. Thus, Feature Selection (FS is one of the key topics in spam email detection systems. With choosing the important and effective features in classification, its performance can be optimized. Selector features has the task of finding a subset of features to improve the accuracy of its predictions. In this paper, a hybrid of Harmony Search Algorithm (HSA and decision tree is used for selecting the best features and classification. The obtained results on Spam-base dataset show that the rate of recognition accuracy in the proposed model is 95.25% which is high in comparison with models such as SVM, NB, J48 and MLP. Also, the accuracy of the proposed model on the datasets of Ling-spam and PU1 is high in comparison with models such as NB, SVM and LR.

  5. Re-connect: designing accessible email communication support for persons with aphasia

    NARCIS (Netherlands)

    Mahmud, Al A.; Martens, J.B.O.S.

    2010-01-01

    In this paper we present some preliminary outcomes concerning the design of an email communication tool for persons with expressive aphasia. The purpose of our design is to make email accessible for aphasics. It is based on interviews with persons with aphasia and their partners and has been

  6. Confirm calculation of 12 MeV non-destructive testing electron linear accelerator target

    International Nuclear Information System (INIS)

    Ma Shudong; Zhang Rutong; Guo Yanbin; Zhou Yuan; Li Xuexian; Chen Yan

    2012-01-01

    The confirm calculation of 12 MeV non-destructive testing (NDT) electron linear accelerator (LINAC) target was studied. Firstly, the most optimal target thickness and related photon dose yield, distributions of dose rate, and related photon conversion efficiencies were got by calculation with specific analysis of the physical mechanism of the interactions between the beam and target; Secondly, the photon dose rate distribution, converter efficiencies, and thickness of various kinds of targets, such as W, Au, Ta, etc. were verified by MCNP simulation and the most optimal target was got using the MCNP code; Lastly, the calculation results of theory and MCNP were compared to confirm the validity of target calculation. (authors)

  7. Detection And Classification Of Web Robots With Honeypots

    Science.gov (United States)

    2016-03-01

    Web robots are valuable tools for indexing content on the Web, they can also be malicious through phishing , spamming, or performing targeted attacks...indexing content on the Web, they can also be malicious through phishing , spamming, or performing targeted attacks. In this thesis, we study an approach...programs has been attributed to the explosion in content and user-generated social media on the Internet. The Web search engines like Google require

  8. Non-Targeted effects of ionising radiation and radiotherapy

    International Nuclear Information System (INIS)

    Sjostedt, Svetlana; Bezak, Eva

    2010-01-01

    Full text: Modern radiobiology is undergoing rapid change due to new discoveries contradicting the target concept which is currently used to predict dose-response relationships. Thus relatively recently discovered radiation induced bystander effects (RlBEs), that include additional death, mutation and radio-adaptation in non-irradiated cells, change our understanding of the target concept and broadens its boundaries. This can be significant from a radioprotection point of view and also has the potential to reassess radiation damage models currently used in radiotherapy. This article reviews briefly the general concepts of RlBEs such as the proposed underlying mechanisms of signal induction and propagation, experimental approaches and biological end points used to investigate these phenomena. It also summ rises several mathematical models currently proposed in an attempt to quantify RlBE. The main emphasis of this al1icle is to review and highlight the potential impact of the bystander phenomena in radiotherapy.

  9. E-mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    Directory of Open Access Journals (Sweden)

    Behzad NAZARI

    2015-01-01

    Full Text Available The present study highly supported the effective role of providing background information via e-mail by the teacher to write e-mail by the students in learners’ writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of Oxford English Language Placement Test (OELPT the students' proficiency level seems to be nearly the same. Participants were randomly assign into two groups of experimental and control, each consisting of 25 students. After the administration of the proficiency test, all groups were assigned to write topic 1 as the pre-test. Next, the teacher involved the learners in the new instruction (treatment. During writing topics 2, 3, 4, 5, 6, and 7 experimental group’s background knowledge was activated through e-mail before writing and e-mailing topics while the control group received no background knowledge activation through e-mail. After the treatment was given to the experimental group, the students in both groups were required to write another composition about the last topic, topic 8. Again, in this phase, none of the groups received any background information. The results indicated that providing background information via e-mail by the teacher to write e-mail by the students significantly improved learners’ writing ability.

  10. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Doohwan Oh

    2014-12-01

    Full Text Available With the emergence of the Internet of Things (IoT, a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  11. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    Science.gov (United States)

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-01-01

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382

  12. A malicious pattern detection engine for embedded security systems in the Internet of Things.

    Science.gov (United States)

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-12-16

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  13. Probabilistic Characterization of Adversary Behavior in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  14. Sistema Automatizado de Emailing Marketing

    OpenAIRE

    Martínez López, Javier

    2010-01-01

    Projecte final de carrera realitzat en col.laboració amb E-xpertel S.A El presente proyecto describe el diseño e implementación de un sistema de automatización de campañas de marketing a través de email hacia clientes y/o clientes potenciales. Este sistema tiene como objetivos principales adquirir nuevos clientes y conseguir la delización de los mismos. El sistema se complementa con una plataforma CRM (Customer Relationship Management) para el mantenimiento de datos de empresa...

  15. EVALUATION OF E-MAIL USAGE BY EXTENDED TECHNOLOGY ACCEPTANCE MODEL

    Directory of Open Access Journals (Sweden)

    Savaş Mutlu

    2013-01-01

    Full Text Available This study is performed to evaluate E-mail usage by Extended Technology Acceptance Model (TAM2 and to test the moderation effects of Espoused National Cultural Values between Subjective Norm (SN and E-mail usage Behavioral Intention (BI/Perceived Usefulness (PU. Survey was conducted in Adana Branches of an important Turkish State-Run Bank including 151 participants who have E-mail access for work purposes. As the results of the study; PU and Perceived Ease Of Use (PEOU have positive effects on BI, PEOU and SN both effect PU, Femininity (F shows positive moderating effect on the relationship between SN and PU as well as the relation between SN and BI, Collectivism (C shows positive moderation effect between SN and PU, moderation effect of SN on PU is higher for people who have higher tolerance to uncertainty.

  16. Phishtest: Measuring the Impact of Email Headers on the Predictive Accuracy of Machine Learning Techniques

    Science.gov (United States)

    Tout, Hicham

    2013-01-01

    The majority of documented phishing attacks have been carried by email, yet few studies have measured the impact of email headers on the predictive accuracy of machine learning techniques in detecting email phishing attacks. Research has shown that the inclusion of a limited subset of email headers as features in training machine learning…

  17. Non-destructive testing of the MEGAPIE target

    Energy Technology Data Exchange (ETDEWEB)

    Dai, Y., E-mail: yong.dai@psi.ch; Wohlmuther, M.; Boutellier, V.; Hahl, S.; Lagotzki, A.; Leu, H.; Linder, H.P.; Schwarz, R.; Spahr, A.; Zanini, L.; Kuster, D.; Gavillet, D.; Wagner, W.

    2016-01-15

    Non-destructive testing (NDT) is one important part of the post-irradiation examination (PIE) of the MEGAPIE target. It includes visual inspection and ultrasonic measurement of the beam window of the T91 LBE container and gamma mapping of the beam window of the AlMg{sub 3} safety-container. The visual inspection showed no visible failure in the proton beam window area of the T91 LBE container. The ultrasonic measurement demonstrated no detectable change in the wall thickness of the T91 beam window, which implies no severe corrosion effect induced by flowing LBE during the four-month irradiation period. The gamma mapping provided the distribution of {sup 22}Na, a spallation product, in the proton beam window area of the AlMg{sub 3} safety-container. The result was used to evaluate the accumulated proton fluence distribution profile, the input data for determining irradiation parameters. A maximum proton fluence of 1.9 × 10{sup 25} p/m2 was deduced. The corresponding displacement damage degree in the T91 beam window was 7.1 dpa. - Highlights: • MEGAPIE is to design, build, operate and explore a liquid lead–bismuth (LBE) spallation target for 1 MW of beam power. • NDT of the target components exposed to high fluxes of high-energy protons and spallation neutrons was conducted. • There are no evident failures and corrosion effect of LBE in the T91 steel liquid metal container after irradiation to 7.1 dpa.

  18. Chemically different non-thermal plasmas target distinct cell death pathways

    Czech Academy of Sciences Publication Activity Database

    Lunov, Oleg; Zablotskyy, Vitaliy A.; Churpita, Olexandr; Lunova, M.; Jirsa, M.; Dejneka, Alexandr; Kubinová, Šárka

    2017-01-01

    Roč. 7, č. 1 (2017), s. 1-17, č. článku 600. ISSN 2045-2322 Grant - others:AV ČR(CZ) Fellowship J. E. Purkyně Institutional support: RVO:68378271 Keywords : chemically different * non-thermal plasmas * target distinct cell death pathways Subject RIV: BO - Biophysics OBOR OECD: Biophysics Impact factor: 4.259, year: 2016

  19. Email English with new social media section and phrase bank of useful expressions

    CERN Document Server

    Emmerson, Paul

    2013-01-01

    Email English will help students of English to write effective and convincing communications, whether for work or study, whether by email or via social media. Based on hundreds of real examples, Email English deals systematically with key language for constructing effective and convincing emails in English as well as developing an appropriate voice through social media. Basics, including opening and closing emails, giving information, making requests, arranging meetings and checking understanding. Specific situations, such as negotiating, asking for payment and dealing with a supplier or customer. Skills such as describing business trends, relating cause and effect and reporting. General grammar problems, for instance, sentence structure, verb forms, comparison and punctuation. Communication styles: formal and informal, direct and indirect, ways of seeming friendlier. A NEW social media section presents strategies, tips and key language and expressions for writing blogs and on social media platforms such as F...

  20. A qualitative analysis of email interactions of children who use augmentative and alternative communication.

    Science.gov (United States)

    Sundqvist, Anett; Rönnberg, Jerker

    2010-12-01

    The aim of this study was to introduce email as a form of interaction for a group of six children who used augmentative and alternative communication. In a 12-week exploratory study, aspects of the email messages sent were analyzed. The content of the messages was analyzed by an inductive qualitative method, and seven descriptive categories emerged. The most frequently occurring categories were Social Etiquette, Personal/Family Statistics and Personal Common Ground. The children utilized different email strategies that included use of most of the above-mentioned categories. Through the email writing practice, the children developed new social skills and increased their social participation. Email practice may be a good strategy to increase children's social networks.

  1. Pandora's electronic box: GPs reflect upon email communication with their patients

    Directory of Open Access Journals (Sweden)

    Felicity Goodyear-Smith

    2005-11-01

    Conclusion Study sample closely mirrored current NZ GP population. Although few GPs emailed with patients, many might once barriers are addressed. GPs had a collective view of the appropriate boundaries for email communication, routine tasks and the transmission of information. GPs would encourage professional debate regarding guidelines for good practice, managing demand and remuneration.

  2. Non-targeted effects of radiation: applications for radiation protection and contribution to LNT discussion

    International Nuclear Information System (INIS)

    Belyakov, O.V.; Folkard, M.; Prise, K.M.; Michael, B.D.; Mothersill, C.

    2002-01-01

    According to the target theory of radiation induced effects (Lea, 1946), which forms a central core of radiation biology, DNA damage occurs during or very shortly after irradiation of the nuclei in targeted cells and the potential for biological consequences can be expressed within one or two cell generations. A range of evidence has now emerged that challenges the classical effects resulting from targeted damage to DNA. These effects have also been termed non-(DNA)-targeted (Ward, 1999) and include radiation-induced bystander effects (Iyer and Lehnert, 2000a), genomic instability (Wright, 2000), adaptive response (Wolff, 1998), low dose hyper-radiosensitivity (HRS) (Joiner, et al., 2001), delayed reproductive death (Seymour, et al., 1986) and induction of genes by radiation (Hickman, et al., 1994). An essential feature of non-targeted effects is that they do not require a direct nuclear exposure by irradiation to be expressed and they are particularly significant at low doses. This new evidence suggests a new paradigm for radiation biology that challenges the universality of target theory. In this paper we will concentrate on the radiation-induced bystander effects because of its particular importance for radiation protection

  3. Changes in the e-mail policy for people without CERN affiliation

    CERN Multimedia

    2012-01-01

    When affiliated with CERN, every computing account owner is entitled to have a CERN mail address (e.g. “John.Doe@cern.ch”). However, up to now, this mail address was still valid even after the end of a person's affiliation if the owner declared an external email address (e.g. “John.Doe@gmail.com”) to which all personal CERN emails (i.e. those sent to “John.Doe@cern.ch”) could be forwarded.*   As a result, to use our John Doe analogy, John could continue to write and receive emails ostensibly on behalf of CERN despite the fact that he is no longer a member of the personnel or subject to the CERN Staff Rules and Regulations and the Computing Rules. It is doubtful whether this makes sense. Therefore, in agreement with departments and LHC experiments at the last ITSRM meeting, all CERN email addresses of people whose affiliation has been terminated more than six months ago will be deactivated on 15 October 2012. For all others, incl...

  4. Machine Learning for Email Spam Filtering and Priority Inbox

    CERN Document Server

    Conway, Drew

    2011-01-01

    If you're an experienced programmer willing to crunch data, this concise guide will show you how to use machine learning to work with email. You'll learn how to write algorithms that automatically sort and redirect email based on statistical patterns. Authors Drew Conway and John Myles White approach the process in a practical fashion, using a case-study driven approach rather than a traditional math-heavy presentation. This book also includes a short tutorial on using the popular R language to manipulate and analyze data. You'll get clear examples for analyzing sample data and writing machi

  5. Non-target adjacent stimuli classification improves performance of classical ERP-based brain computer interface

    Science.gov (United States)

    Ceballos, G. A.; Hernández, L. F.

    2015-04-01

    Objective. The classical ERP-based speller, or P300 Speller, is one of the most commonly used paradigms in the field of Brain Computer Interfaces (BCI). Several alterations to the visual stimuli presentation system have been developed to avoid unfavorable effects elicited by adjacent stimuli. However, there has been little, if any, regard to useful information contained in responses to adjacent stimuli about spatial location of target symbols. This paper aims to demonstrate that combining the classification of non-target adjacent stimuli with standard classification (target versus non-target) significantly improves classical ERP-based speller efficiency. Approach. Four SWLDA classifiers were trained and combined with the standard classifier: the lower row, upper row, right column and left column classifiers. This new feature extraction procedure and the classification method were carried out on three open databases: the UAM P300 database (Universidad Autonoma Metropolitana, Mexico), BCI competition II (dataset IIb) and BCI competition III (dataset II). Main results. The inclusion of the classification of non-target adjacent stimuli improves target classification in the classical row/column paradigm. A gain in mean single trial classification of 9.6% and an overall improvement of 25% in simulated spelling speed was achieved. Significance. We have provided further evidence that the ERPs produced by adjacent stimuli present discriminable features, which could provide additional information about the spatial location of intended symbols. This work promotes the searching of information on the peripheral stimulation responses to improve the performance of emerging visual ERP-based spellers.

  6. 24 CFR 982.203 - Special admission (non-waiting list): Assistance targeted by HUD.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 4 2010-04-01 2010-04-01 false Special admission (non-waiting list... Admission to Tenant-Based Program § 982.203 Special admission (non-waiting list): Assistance targeted by HUD... family residing in a multifamily rental housing project when HUD sells, forecloses or demolishes the...

  7. 78 FR 45910 - Proposed Information Collection; Comment Request; Current Population Survey (CPS) Email Address...

    Science.gov (United States)

    2013-07-30

    ... Population Survey (CPS) Email Address Collection Test Supplement AGENCY: U.S. Census Bureau, Commerce. ACTION... request clearance for the collection of data concerning the November 2013 Email Address Collection Test... tool to help increase response rates. We foresee that in the future, we could collect email addresses...

  8. Analysis of Naïve Bayes Algorithm for Email Spam Filtering across Multiple Datasets

    Science.gov (United States)

    Fitriah Rusland, Nurul; Wahid, Norfaradilla; Kasim, Shahreen; Hafit, Hanayanti

    2017-08-01

    E-mail spam continues to become a problem on the Internet. Spammed e-mail may contain many copies of the same message, commercial advertisement or other irrelevant posts like pornographic content. In previous research, different filtering techniques are used to detect these e-mails such as using Random Forest, Naïve Bayesian, Support Vector Machine (SVM) and Neutral Network. In this research, we test Naïve Bayes algorithm for e-mail spam filtering on two datasets and test its performance, i.e., Spam Data and SPAMBASE datasets [8]. The performance of the datasets is evaluated based on their accuracy, recall, precision and F-measure. Our research use WEKA tool for the evaluation of Naïve Bayes algorithm for e-mail spam filtering on both datasets. The result shows that the type of email and the number of instances of the dataset has an influence towards the performance of Naïve Bayes.

  9. Ethical Judgments Concerning Email Use in the Workplace: University Students' Perceptions.

    Science.gov (United States)

    Keith, Nancy; Perreault, Heidi; Sutliff, Kris

    2001-01-01

    A survey of 1,272 college students showed that most believed it appropriate to use company e-mail accounts for personal messages, but inappropriate to read others' e-mail or send messages with ethnic, racial, or sexual content. Students who participated in ethics discussions were less likely to rate certain behaviors as appropriate. (Contains 22…

  10. Location Is Everything: The Use and Marketing of Reference E-Mail

    Science.gov (United States)

    Collins, Susan L.

    2006-01-01

    Reference e-mail continues to be a vital reference service. This article studies the trends in reference e-mail use over an eight year period. Usage statistics are analyzed particularly in light of the marketing of the service via changes in the location of the service on the official university libraries' Web pages. Included are recommendations…

  11. ENHANCING DISTANT LEARNING THROUGH EMAIL COMMUNICATION: A Case of BOU

    Directory of Open Access Journals (Sweden)

    K. M. Rezanur RAHMAN

    2008-04-01

    Full Text Available Today computer has replaced all means of traditional communication significantly. Many distant learning tools claim to be interactive, but few can offer two-way communication. Email is the most popular means of communication medium now-a-days. Therefore, it may be used as an educational tool for learning. In present socio-economic condition of Bangladesh, learners can afford computer, cell phone and Internet. We took this opportunity to investigate the prospective use of these tools for distant learning. The present survey has been carried out to understand the present status of Internet knowledge among the learners and their views for possible introduction of e-mail communication as supporting tool for learning. BOU’s available infrastructural facilities for providing Internet support have been investigated. Furthermore, possible solutions have been pointed out to provide e-mail facility to the learner in a cost effective way.

  12. Online Counseling Using Email: A Qualitative Study

    Science.gov (United States)

    Salleh, Amla; Hamzah, Ramlan; Nordin, Norazah; Ghavifekr, Simin; Joorabchi, Toktam Namyandeh

    2015-01-01

    Despite numerous studies in increasingly popular online mental health service, the nature of the relationship between online counselors and their clients, particularly in the email modality, deserves more attention. To enhance the knowledge in this area, this study was conducted to explore whether the online counseling relationship could be…

  13. Language Use in Computer-Mediated Communication: An Investigation into the Genre of Workplace Emails

    Directory of Open Access Journals (Sweden)

    Mohammad Awad AlAfnan

    2015-01-01

    Full Text Available This study investigated the moves and communicative purposes used in 522 email messages that were exchanged in a Malaysian private educational institute. Using Swales’s (1990 move approach, this study revealed that email writers used fourteen moves that are mainly six framing and eight content moves. Content moves included four main, one intertextual, one supporting and two follow-up moves. The four main content moves reflected the main communicative purposes of the emails that are discussing issues, enquiring about issues, couriering (delivering documents and informing about organizational and academic issues. The four communicative purposes varied in their structural organization, number of recipients and reaction to receiving the email. Keywords: Genre analysis; Email communication; Rhetorical moves; Communicative purposes; Discourse community

  14. Beemsterboer email discussion Jan. 10 - Mar. 4, 2014

    Science.gov (United States)

    A series of emails between Beemsterboer Slag Corp. and the Air Enforcement department of EPA Region 5 regarding site monitoring, and transportation of pet coke and met coke from facilities in Chicago, Illinois.

  15. Targeting solid tumors with non-pathogenic obligate anaerobic bacteria.

    Science.gov (United States)

    Taniguchi, Shun'ichiro; Fujimori, Minoru; Sasaki, Takayuki; Tsutsui, Hiroko; Shimatani, Yuko; Seki, Keiichi; Amano, Jun

    2010-09-01

    Molecular-targeting drugs with fewer severe adverse effects are attracting great attention as the next wave of cancer treatment. There exist, however, populations of cancer cells resistant to these drugs that stem from the instability of tumor cells and/or the existence of cancer stem cells, and thus specific toxicity is required to destroy them. If such selectivity is not available, these targets may be sought out not by the cancer cell types themselves, but rather in their adjacent cancer microenvironments by means of hypoxia, low pH, and so on. The anaerobic conditions present in malignant tumor tissues have previously been regarded as a source of resistance in cancer cells against conventional therapy. However, there now appears to be a way to make use of these limiting factors as a selective target. In this review, we will refer to several trials, including our own, to direct attention to the utilizable anaerobic conditions present in malignant tumor tissues and the use of bacteria as carriers to target them. Specifically, we have been developing a method to attack solid cancers using the non-pathogenic obligate anaerobic bacterium Bifidobacterium longum as a vehicle to selectively recognize and target the anaerobic conditions in solid cancer tissues. We will also discuss the existence of low oxygen pressure in tumor masses in spite of generally enhanced angiogenesis, overview current cancer therapies, especially the history and present situation of bacterial utility to treat solid tumors, and discuss the rationality and future possibilities of this novel mode of cancer treatment. © 2010 Japanese Cancer Association.

  16. Understanding Patient Experience Using Internet-based Email Surveys: A Feasibility Study at Mount Sinai Hospital.

    Science.gov (United States)

    Morgan, Matthew; Lau, Davina; Jivraj, Tanaz; Principi, Tania; Dietrich, Sandra; Bell, Chaim M

    2015-01-01

    Email is becoming a widely accepted communication tool in healthcare settings. This study sought to test the feasibility of Internet-based email surveys of patient experience in the ambulatory setting. We conducted a study of email Internet-based surveys sent to patients in selected ambulatory clinics at Mount Sinai Hospital in Toronto, Canada. Our findings suggest that email links to Internet surveys are a feasible, timely and efficient method to solicit patient feedback about their experience. Further research is required to optimally leverage Internet-based email surveys as a tool to better understand the patient experience.

  17. Plenary panel 1: The scientific bases of radiation protection. Non-targeted effects of ionising radiation - Implications for radiation protection

    International Nuclear Information System (INIS)

    Salomaa, S.

    2006-01-01

    The universality of the target theory of radiation-induced effects is challenged by observations on non-targeted effects such as bystander effects, genomic instability and adaptive response. Essential features of non-targeted effects are that they do not require direct nuclear exposure by radiation and they are particularly significant at low doses. This new evidence suggests a need for a new paradigm in radiation biology. The new paradigm should cover both the classical (targeted) and the non-targeted effects. New aspects include the role of cellular communication and tissue-level responses. A better understanding of non-targeted effects may have important consequences for health risk assessment and, consequently, on radiation protection. Non-targeted effects may contribute to the estimation of cancer risk from occupational, medical and environmental exposures. In particular, they may have implications for the applicability of the Linear-No-Threshold (L.N.T.) model in extrapolating radiation risk data into the low-dose region. This also means that the adequacy of the concept of dose to estimate risk is challenged by these findings. Moreover, these effects may provide new mechanistic explanations for the development of non-cancer diseases. Further research is required to determine if these effects, typically measured in cell cultures, are applicable in tissue level, whole animals, and ultimately in humans. (authors)

  18. Plenary panel 1: The scientific bases of radiation protection. Non-targeted effects of ionising radiation - Implications for radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Salomaa, S. [STUK - Radiation and Nuclear Safety Authority, Helsinki (Finland)

    2006-07-01

    The universality of the target theory of radiation-induced effects is challenged by observations on non-targeted effects such as bystander effects, genomic instability and adaptive response. Essential features of non-targeted effects are that they do not require direct nuclear exposure by radiation and they are particularly significant at low doses. This new evidence suggests a need for a new paradigm in radiation biology. The new paradigm should cover both the classical (targeted) and the non-targeted effects. New aspects include the role of cellular communication and tissue-level responses. A better understanding of non-targeted effects may have important consequences for health risk assessment and, consequently, on radiation protection. Non-targeted effects may contribute to the estimation of cancer risk from occupational, medical and environmental exposures. In particular, they may have implications for the applicability of the Linear-No-Threshold (L.N.T.) model in extrapolating radiation risk data into the low-dose region. This also means that the adequacy of the concept of dose to estimate risk is challenged by these findings. Moreover, these effects may provide new mechanistic explanations for the development of non-cancer diseases. Further research is required to determine if these effects, typically measured in cell cultures, are applicable in tissue level, whole animals, and ultimately in humans. (authors)

  19. Linear and non-linear amplification of high-mode perturbations at the ablation front in HiPER targets

    Energy Technology Data Exchange (ETDEWEB)

    Olazabal-Loume, M; Breil, J; Hallo, L; Ribeyre, X [CELIA, UMR 5107 Universite Bordeaux 1-CNRS-CEA, 351 cours de la Liberation, 33405 Talence (France); Sanz, J, E-mail: olazabal@celia.u-bordeaux1.f [ETSI Aeronauticos, Universidad Politecnica de Madrid, Madrid 28040 (Spain)

    2011-01-15

    The linear and non-linear sensitivity of the 180 kJ baseline HiPER target to high-mode perturbations, i.e. surface roughness, is addressed using two-dimensional simulations and a complementary analysis by linear and non-linear ablative Rayleigh-Taylor models. Simulations provide an assessment of an early non-linear stage leading to a significant deformation of the ablation surface for modes of maximum linear growth factor. A design using a picket prepulse evidences an improvement in the target stability inducing a delay of the non-linear behavior. Perturbation evolution and shape, evidenced by simulations of the non-linear stage, are analyzed with existing self-consistent non-linear theory.

  20. Indirect Effects of Functional Communication Training on Non-Targeted Disruptive Behavior

    Science.gov (United States)

    Schieltz, Kelly M.; Wacker, David P.; Harding, Jay W.; Berg, Wendy K.; Lee, John F.; Padilla Dalmau, Yaniz C.; Mews, Jayme; Ibrahimovic, Muska

    2011-01-01

    The purpose of this study was to evaluate the effects of functional communication training (FCT) on the occurrence of non-targeted disruptive behavior. The 10 participants were preschool-aged children with developmental disabilities who engaged in both destructive (property destruction, aggression, self-injury) and disruptive (hand flapping,…

  1. Classification of Phishing Email Using Random Forest Machine Learning Technique

    Directory of Open Access Journals (Sweden)

    Andronicus A. Akinyelu

    2014-01-01

    Full Text Available Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals. In 2012, an online report put the loss due to phishing attack at about $1.5 billion. This global impact of phishing attacks will continue to be on the increase and thus requires more efficient phishing detection techniques to curb the menace. This paper investigates and reports the use of random forest machine learning algorithm in classification of phishing attacks, with the major objective of developing an improved phishing email classifier with better prediction accuracy and fewer numbers of features. From a dataset consisting of 2000 phishing and ham emails, a set of prominent phishing email features (identified from the literature were extracted and used by the machine learning algorithm with a resulting classification accuracy of 99.7% and low false negative (FN and false positive (FP rates.

  2. Using PLSI-U To Detect Insider Threats from Email Traffic

    Science.gov (United States)

    Okolica, James; Peterson, Gilbert; Mills, Robert

    Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to commercial and government organizations. Once information on a specific topic has gone missing, being able to quickly determine who has shown an interest in that topic can allow investigators to focus their attention. Even more promising is when individuals can be found who have an interest in the topic but who have never communicated that interest within the organization. An employee's interests can be discerned by data mining corporate email correspondence. These interests can be used to construct social networks that graphically expose investigative leads. This paper describes the use of Probabilistic Latent Semantic Indexing (PLSI) [4] extended to include users (PLSI-U) to determine topics that are of interest to employees from their email activity. It then applies PLSI-U to the Enron email corpus and finds a small number of employees (0.02%) who appear to have had clandestine interests.

  3. Communicative In-Betweens of E-mail Communication

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2009-01-01

    In this paper I seek to deconstruct internet-based communication. I highlight Derrida’s focus on the margins and in-betweens of communication, and relate it to the genre of e-mail. I argue (i) that the silence between the dialogic turns becomes more marked, while (ii) the separation of present an...

  4. Comparing appropriateness and equivalence of email interviews to phone interviews in qualitative research on reproductive decisions.

    Science.gov (United States)

    Hershberger, Patricia E; Kavanaugh, Karen

    2017-10-01

    Despite an increasing use of qualitative email interviews by nurse researchers, there is little understanding about the appropriateness and equivalence of email interviews to other qualitative data collection methods, especially on sensitive topics research. The purpose is to describe our procedures for completing asynchronous, email interviews and to evaluate the appropriateness and equivalency of email interviews to phone interviews in two qualitative research studies that examined reproductive decisions. Content analysis guided the methodological appraisal of appropriateness and equivalency of in-depth, asynchronous email interviews to single phone interviews. Appropriateness was determined by: (a) participants' willingness to engage in email or phone interviews, (b) completing data collection in a timely period, and (c) participants' satisfaction with the interview. Equivalency was evaluated by: (a) completeness of the interview data, and (b) insight obtained from the data. Of the combined sample in the two studies (N=71), 31% of participants chose to participate via an email interview over a phone interview. The time needed to complete the email interviews averaged 27 to 28days and the number of investigator probe-participant response interchanges was 4 to 5cycles on average. In contrast, the phone interviews averaged 59 to 61min in duration. Most participants in both the email and phone interviews reported they were satisfied or very satisfied with their ability to express their true feelings throughout the interview. Regarding equivalence, 100% of the email and phone interviews provided insight into decision processes. Although insightful, two of the email and one phone interview had short answers or, at times, underdeveloped responses. Participants' quotes and behaviors cited within four published articles, a novel evaluation of equivalency, revealed that 20% to 37.5% of the citations about decision processes were from email participants, which is

  5. COMMUNICATION TOPICS AND STRATEGIES IN E-MAIL CONSULTATION: COMPARISON BETWEEN AMERICAN AND INTERNATIONAL UNIVERSITY STUDENTS

    Directory of Open Access Journals (Sweden)

    Sigrun Biesenbach-Lucas

    2005-05-01

    Full Text Available On today's "wired" college campuses, students avail themselves in increasing numbers of electronic channels, most notably e-mail, as a means to consult with their professors. While some research has investigated the purposes for which university students communicate with their instructors via e-mail, little research has examined differences in e-mail use between American and international students. In the present study, e-mail messages sent by American and international students enrolled in a teacher-preparation program to their professor were collected over the course of one semester. The messages were examined for three major communication topics (facilitative, substantive, relational and communication strategies (requesting, negotiating, reporting. Results indicate quantitative and qualitative differences in American and international students' e-mail topics and strategies, suggesting, similar to findings for face-to-face academic advising sessions, that American students demonstrate greater initiative and ability to adapt to the spatial and temporal remoteness between interlocutors in e-mail interaction, especially when using e-mail to solicit face-to-face appointments and input on projects. Findings also show that messages from both groups of students contained substantial relational communication, perhaps in an attempt to compensate for the lack of visual and paralinguistic clues in the e-mail medium.

  6. DETECTION OF MALICIOUS SOFTWARE USING CLASSICAL AND NEURAL NETWORK CLASSIFICATION METHODS

    Directory of Open Access Journals (Sweden)

    S. V. Zhernakov

    2015-01-01

    Full Text Available Formulation of the problem: the spectrum of problems solved by modern mobile systems such as Android is constantly growing. This is because on the one hand by the potential opportunities that are implemented in hardware, as well as their integration with modern information technologies, which in turn harmoniously complement and create powerful ardware and software information systems, capable of performing many functions, including pro- information boards. Increasing the flow of information, complexity of the processes and of the hardware and software component devices such as Android, forcing developers to create new means of protection, efficiency and qualitative performing the process. This is especially important in the development of automated systems instrumental performing classification (clustering of existing software into two classes: safe and malicious software. The aim is to increase the reliability and quality of recognition of modern built-in security of information, as well as the rationale and the selection methods of carrying out these functions. The methods used are: to accomplish the goals are analyzed and used classical methods of classification, neural network method based on standard architectures, and support vector machine (SVM - machine. Novelty: The paper presents the concept of the use of support vector in identifying deleterious software developed methodological, algorithmic and software that implements this concept in relation to the means of mobile communication. Result: The obtained qualitative and quantitative characteristics-security software. Practical value: the technique of development of advanced information security systems in mobile environments such as Android. It presents an approach to the description of behavioral malware (based on the following virus: none - wakes - Analysis of weaknesses - the action: a healthy regime or attack (threat.

  7. Network Analysis with the Enron Email Corpus

    Science.gov (United States)

    Hardin, J. S.; Sarkis, G.; URC, P. .

    2015-01-01

    We use the Enron email corpus to study relationships in a network by applying six different measures of centrality. Our results came out of an in-semester undergraduate research seminar. The Enron corpus is well suited to statistical analyses at all levels of undergraduate education. Through this article's focus on centrality, students can explore…

  8. Fighting Spam: Moving Email to the Cloud

    Science.gov (United States)

    Schrader, Andrew

    2011-01-01

    On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…

  9. Do family physicians retrieve synopses of clinical research previously read as email alerts?

    Science.gov (United States)

    Grad, Roland; Pluye, Pierre; Johnson-Lafleur, Janique; Granikov, Vera; Shulha, Michael; Bartlett, Gillian; Marlow, Bernard

    2011-11-30

    A synopsis of new clinical research highlights important aspects of one study in a brief structured format. When delivered as email alerts, synopses enable clinicians to become aware of new developments relevant for practice. Once read, a synopsis can become a known item of clinical information. In time-pressured situations, remembering a known item may facilitate information retrieval by the clinician. However, exactly how synopses first delivered as email alerts influence retrieval at some later time is not known. We examined searches for clinical information in which a synopsis previously read as an email alert was retrieved (defined as a dyad). Our study objectives were to (1) examine whether family physicians retrieved synopses they previously read as email alerts and then to (2) explore whether family physicians purposefully retrieved these synopses. We conducted a mixed-methods study in which a qualitative multiple case study explored the retrieval of email alerts within a prospective longitudinal cohort of practicing family physicians. Reading of research-based synopses was tracked in two contexts: (1) push, meaning to read on email and (2) pull, meaning to read after retrieval from one electronic knowledge resource. Dyads, defined as synopses first read as email alerts and subsequently retrieved in a search of a knowledge resource, were prospectively identified. Participants were interviewed about all of their dyads. Outcomes were the total number of dyads and their type. Over a period of 341 days, 194 unique synopses delivered to 41 participants resulted in 4937 synopsis readings. In all, 1205 synopses were retrieved over an average of 320 days. Of the 1205 retrieved synopses, 21 (1.7%) were dyads made by 17 family physicians. Of the 1205 retrieved synopses, 6 (0.5%) were known item type dyads. However, dyads also occurred serendipitously. In the single knowledge resource we studied, email alerts containing research-based synopses were rarely retrieved

  10. Do non-targeted effects increase or decrease low dose risk in relation to the linear-non-threshold (LNT) model?

    International Nuclear Information System (INIS)

    Little, M.P.

    2010-01-01

    In this paper we review the evidence for departure from linearity for malignant and non-malignant disease and in the light of this assess likely mechanisms, and in particular the potential role for non-targeted effects. Excess cancer risks observed in the Japanese atomic bomb survivors and in many medically and occupationally exposed groups exposed at low or moderate doses are generally statistically compatible. For most cancer sites the dose-response in these groups is compatible with linearity over the range observed. The available data on biological mechanisms do not provide general support for the idea of a low dose threshold or hormesis. This large body of evidence does not suggest, indeed is not statistically compatible with, any very large threshold in dose for cancer, or with possible hormetic effects, and there is little evidence of the sorts of non-linearity in response implied by non-DNA-targeted effects. There are also excess risks of various types of non-malignant disease in the Japanese atomic bomb survivors and in other groups. In particular, elevated risks of cardiovascular disease, respiratory disease and digestive disease are observed in the A-bomb data. In contrast with cancer, there is much less consistency in the patterns of risk between the various exposed groups; for example, radiation-associated respiratory and digestive diseases have not been seen in these other (non-A-bomb) groups. Cardiovascular risks have been seen in many exposed populations, particularly in medically exposed groups, but in contrast with cancer there is much less consistency in risk between studies: risks per unit dose in epidemiological studies vary over at least two orders of magnitude, possibly a result of confounding and effect modification by well known (but unobserved) risk factors. In the absence of a convincing mechanistic explanation of epidemiological evidence that is, at present, less than persuasive, a cause-and-effect interpretation of the reported

  11. Biological Evaluation of 99mTc-HYNIC-EDDA/tricine-(Ser)-D4 Peptide for Tumor Targeting.

    Science.gov (United States)

    Kazemi, Ziba; Zahmatkesh, Mona Haddad; Abedi, Seyed Mohammad; Hosseinimehr, Seyed Jalal

    2017-08-24

    D4 small peptide (Leu-Ala-Arg-Leu-Leu-Thr) was selected as an appropriate agent for specific targeting of epidermal growth factor receptor (EGFR). The aim of study was to investigate the 99mTc-labeled D4 peptide for non-small cell lung tumor targeting. HYNIC-(Ser)3-D4 peptide was labeled with 99mTc using mixture of tricine and ethylenediamine diacetic acid (EDDA) as co-ligands. The in vitro cellular uptake of radiolabeled peptide was evaluated by blocking test on human non-small cell lung cancer (A-549) cell line and its biodistribution was evaluated in A-549 xenografted nude mice. This conjugated peptide was labeled with 99mTc in high radiochemical purity and it was highly stable in buffer and serum. The un-blocked to blocked cellular radioactivity ratio was 4- fold that showed a specific binding of this radiolabeled peptide on A-549 cell. Animal biodistribution in A-549 xenografted nude mice showed rapid clearance from blood and other non-target organs. Tumor uptake values as %ID/g (percentage of injection dose per gram of tissue) were 2.47% and 1.30% at 1 and 4 h after injection. This study showed the 99mTc-EDDA/tricine-HYNIC-(Ser)3-D4 peptide had tumor targeting on the non-small cell lung tumor. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  12. Targeting of non-dominant antigens as a vaccine strategy to broaden T-cell responses during chronic viral infection

    DEFF Research Database (Denmark)

    Holst, Peter Johannes; Jensen, Benjamin Anderschou Holbech; Ragonnaud, Emeline

    2015-01-01

    In this study, we compared adenoviral vaccine vectors with the capacity to induce equally potent immune responses against non-dominant and immunodominant epitopes of murine lymphocytic choriomeningitis virus (LCMV). Our results demonstrate that vaccination targeting non-dominant epitopes facilita......In this study, we compared adenoviral vaccine vectors with the capacity to induce equally potent immune responses against non-dominant and immunodominant epitopes of murine lymphocytic choriomeningitis virus (LCMV). Our results demonstrate that vaccination targeting non-dominant epitopes...... was lost over time in T cells specific for the dominant T cell epitopes, and these cells were fully capable of expanding in response to a new viral challenge. Overall, our data suggests a potential for broadening of the antiviral CD8+ T-cell response by selecting non-dominant antigens to be targeted...

  13. 49 CFR 551.63 - May a foreign manufacturer submit a designation by email or facsimile?

    Science.gov (United States)

    2010-10-01

    ... email or facsimile? 551.63 Section 551.63 Transportation Other Regulations Relating to Transportation... foreign manufacturer submit a designation by email or facsimile? No, the statute requires designation... designation documents submitted via email or facsimile, as they do not satisfy this requirement. ...

  14. ASSESSING POSSIBLE ECOLOGICAL RISKS OF GENETICALLY MODIFIED CROPS: GENE EXPRESSION ASSAYS AND GENETIC MONITORING OF NON-TARGET ORGANISMS

    Science.gov (United States)

    Widespread planting of genetically modified crops with the Bt transgene pesticide has led to concern over non-target effects of Bt compounds in agroecosystems. While some research suggests that non-target organisms exposed to Bt toxin exhibit reduced fecundity and increased morta...

  15. One photo to rule your phone

    CERN Multimedia

    Computer Security Team

    2012-01-01

    Have you ever seen those black-wide squares (picture below) called “Quick Response Codes”? Such QR tags are the two-dimensional forms of EAN codes (International Article Number, the black-white bars scanned at Migros’ check-outs) encoding a web address. Scanning those codes with your smart phone can lead you to a webpage, send an SMS or an e-mail depending on the contents of the tag. Beautiful, isn’t it? But wait. Can you trust that QR tag? What if the QR tag leads to something malicious? Just to add more fun, we have recently heard about a vulnerability for Android devices prior to version 4.1.1 on its so-called “USSD code handling”.   The USSD code allows a phone to be reset or a SIM card to be blocked. Combined with clicking on a malicious link or tagging a malicious QR tag, this is a lethal combination that can convert your phone into a useless brick. In the past, we’ve suggested to “Stop - Think - Click!&...

  16. Colleges Get out of E-Mail Business

    Science.gov (United States)

    Carnevale, Dan

    2008-01-01

    Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like…

  17. Development of an E-mail Application Seemit and its Utilization in an Information Literacy Course

    Science.gov (United States)

    Kita, Toshihiro; Miyazaki, Makoto; Nakano, Hiroshi; Sugitani, Kenichi; Akiyama, Hidenori

    We have developed a simple e-mail application named Seemit which is designed for being used in information literacy courses. It has necessary and sufficient functionality of an e-mail application, and it has been developed for the purpose of learning basic operations and mechanisms of e-mail transfer easily. It is equipped with the function to automatically set the configuration of user's SMTP/POP servers and e-mail address, etc. The process of transferring e-mail via SMTP and POP can be demonstrated step by step showing actual messages passed during the client-server interaction. We have utilized Seemit in a university-wide information literacy course which holds about 1800 students.

  18. Modelling the impacts of challenging 2020 non-ETS GHG emissions reduction targets on Ireland′s energy system

    International Nuclear Information System (INIS)

    Chiodi, Alessandro; Gargiulo, Maurizio; Deane, J.P.; Lavigne, Denis; Rout, Ullash K.; Ó Gallachóir, Brian P.

    2013-01-01

    This paper focuses on Ireland's ambitious target for 2020 to reduce greenhouse gas (GHG) emissions by 20% below 2005 levels for sectors not covered by ETS (Non-ETS). Ireland is an interesting case study due to the role of agriculture (a particularly challenging sector with regard to GHG emissions reduction), that represents 29% of Ireland's GHG emissions compared with less than 10% for the EU. The analysis is carried out with the Irish TIMES model, a bottom-up energy systems modelling tool with detailed characterization of Ireland's energy system. The paper uses scenario analysis to provide pathways that demonstrate how Ireland can meet the non-ETS target at least cost. The paper considers the impacts (in terms of different technology choices and higher marginal abatement costs) arising from higher targets for the energy system to compensate for growth in agriculture activity and low mitigation potential in that sector. The results point to a need to reconsider Ireland's renewable energy focus, with a need for increased effort in renewable transport and renewable heat in particular. The results also point to significant electrification of residential heating. The results also point to a high marginal abatement cost (€213/tCO 2 ), which challenges the analysis carried out at EU level to establish Ireland's non-ETS target. - Highlights: • Techno-economic energy model to deliver EU GHG mitigation target by 2020 in Ireland. • Agriculture represents nearly half of Non-ETS emissions in Ireland. • The target set for Non-ETS GHG for Ireland is far from a cost optimal target. • The results point to a need to reconsider Ireland's renewable energy focus. • Key pathways: electrification of heating in buildings and biofuels in transport

  19. Toxicological effects of pyrethroids on non-target aquatic insects.

    Science.gov (United States)

    Antwi, Frank B; Reddy, Gadi V P

    2015-11-01

    The toxicological effects of pyrethroids on non-target aquatic insects are mediated by several modes of entry of pyrethroids into aquatic ecosystems, as well as the toxicological characteristics of particular pyrethroids under field conditions. Toxicokinetics, movement across the integument of aquatic insects, and the toxicodynamics of pyrethroids are discussed, and their physiological, symptomatic and ecological effects evaluated. The relationship between pyrethroid toxicity and insecticide uptake is not fully defined. Based on laboratory and field data, it is likely that the susceptibility of aquatic insects (vector and non-vector) is related to biochemical and physiological constraints associated with life in aquatic ecosystems. Understanding factors that influence aquatic insects susceptibility to pyrethroids is critical for the effective and safe use of these compounds in areas adjacent to aquatic environments. Copyright © 2015 The Authors. Published by Elsevier B.V. All rights reserved.

  20. How to Increase the Efficiency and Reach of Email Marketing: Case Onninen Finland

    OpenAIRE

    Nuutinen, Sami

    2015-01-01

    This thesis took an analytical and practical approach on email marketing, and studied it from the perspective of the case study company Onninen. The aim was at finding out how to increase the efficiency and reach of email marketing at the case company. The case company, Onninen, is a large Finnish distributor of HVACR, steel, and electrical goods. Email marketing can be one of the most effective tools for marketers to invest in. In order to find solutions to the aforementioned aim of the...

  1. Using Email to Enable E[superscript 3] (Effective, Efficient, and Engaging) Learning

    Science.gov (United States)

    Kim, ChanMin

    2008-01-01

    This article argues that technology that supports both noncognitive and cognitive aspects can make learning more effective, efficient, and engaging (e[superscript 3]-learning). The technology of interest in this article is email. The investigation focuses on characteristics of email that are likely to enable e[superscript 3]-learning. In addition,…

  2. Efficient Nonlocal M-Control and N-Target Controlled Unitary Gate Using Non-symmetric GHZ States

    Science.gov (United States)

    Chen, Li-Bing; Lu, Hong

    2018-03-01

    Efficient local implementation of a nonlocal M-control and N-target controlled unitary gate is considered. We first show that with the assistance of two non-symmetric qubit(1)-qutrit(N) Greenberger-Horne-Zeilinger (GHZ) states, a nonlocal 2-control and N-target controlled unitary gate can be constructed from 2 local two-qubit CNOT gates, 2 N local two-qutrit conditional SWAP gates, N local qutrit-qubit controlled unitary gates, and 2 N single-qutrit gates. At each target node, the two third levels of the two GHZ target qutrits are used to expose one and only one initial computational state to the local qutrit-qubit controlled unitary gate, instead of being used to hide certain states from the conditional dynamics. This scheme can be generalized straightforwardly to implement a higher-order nonlocal M-control and N-target controlled unitary gate by using M non-symmetric qubit(1)-qutrit(N) GHZ states as quantum channels. Neither the number of the additional levels of each GHZ target particle nor that of single-qutrit gates needs to increase with M. For certain realistic physical systems, the total gate time may be reduced compared with that required in previous schemes.

  3. Non-target screening to trace ozonation transformation products in a wastewater treatment train including different post-treatments.

    Science.gov (United States)

    Schollée, Jennifer E; Bourgin, Marc; von Gunten, Urs; McArdell, Christa S; Hollender, Juliane

    2018-05-25

    Ozonation and subsequent post-treatments are increasingly implemented in wastewater treatment plants (WWTPs) for enhanced micropollutant abatement. While this technology is effective, micropollutant oxidation leads to the formation of ozonation transformation products (OTPs). Target and suspect screening provide information about known parent compounds and known OTPs, but for a more comprehensive picture, non-target screening is needed. Here, sampling was conducted at a full-scale WWTP to investigate OTP formation at four ozone doses (2, 3, 4, and 5 mg/L, ranging from 0.3 to 1.0 gO 3 /gDOC) and subsequent changes during five post-treatment steps (i.e., sand filter, fixed bed bioreactor, moving bed bioreactor, and two granular activated carbon (GAC) filters, relatively fresh and pre-loaded). Samples were measured with online solid-phase extraction coupled to liquid chromatography high-resolution tandem mass spectrometry (LC-HRMS/MS) using electrospray ionization (ESI) in positive and negative modes. Existing non-target screening workflows were adapted to (1) examine the formation of potential OTPs at four ozone doses and (2) compare the removal of OTPs among five post-treatments. In (1), data processing included principal component analysis (PCA) and chemical knowledge on possible oxidation reactions to prioritize non-target features likely to be OTPs. Between 394 and 1328 unique potential OTPs were detected in positive ESI for the four ozone doses tested; between 12 and 324 unique potential OTPs were detected in negative ESI. At a specific ozone dose of 0.5 gO 3 /gDOC, 27 parent compounds were identified and were related to 69 non-target features selected as potential OTPs. Two OTPs were confirmed with reference standards (venlafaxine N-oxide and chlorothiazide); 34 other potential OTPs were in agreement with literature data and/or reaction mechanisms. In (2), hierarchical cluster analysis (HCA) was applied on profiles detected in positive ESI mode across the

  4. Do insect repellents induce drift behaviour in aquatic non-target organisms?

    Science.gov (United States)

    Fink, Patrick; Moelzner, Jana; Berghahn, Ruediger; von Elert, Eric

    2017-01-01

    Synthetic insect repellents are compounds applied to surfaces to discourage insects, mainly mosquitoes, from landing on those surfaces. As some of these repellents have repeatedly been detected in surface waters at significant concentrations, they may also exert repellent effects on aquatic non-target organisms. In running water systems, aquatic invertebrates actively enter downstream drift in order to avoid unfavourable environmental conditions. We thus tested the hypothesis that the widely used insect repellents DEET (N,N-Diethyl-m-toluamide), EBAAP (3-[N-butyl-N-acetyl]-aminopropionic acid ethyl ester) and Icaridin (1-piperidinecarboxylic acid 2-(2-hydroxyethyl)-1-methylpropyl ester) induce downstream drift behaviour in the aquatic invertebrates Gammarus pulex (Crustacea, Amphipoda) and Cloeon dipterum (Insecta, Ephemeroptera), using a laboratory-scale drift assay. We found no clear increase in the drift behaviour of both invertebrate species across a concentration gradient of eight orders of magnitude and even beyond maximum environmental concentrations for any of the three repellents. We found no evidence for a direct drift-inducing activity of insect repellents on aquatic non-target organisms. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. An E-mail Service in a Military Adolescent Medicine Clinic: will teens ...

    African Journals Online (AJOL)

    The goal of this study was to determine utilization patterns of an Adolescent Medicine Clinic e-mail service. An e-mail service was offered to 6134 patients presenting for care to a military Adolescent Medicine Clinic in San Antonio, Texas over a 6-month period. Families had to complete an authorization form acknowledging ...

  6. Kajian Kesantunan dalam E-Mail Permohonan yang Ditulis oleh Penutur Jepang dan Pembelajar Indonesia

    Directory of Open Access Journals (Sweden)

    Hani Wahyuningtias

    2014-05-01

    Full Text Available Nowadays electronic mail (e-mail is a communication tool that is often used in everyday life. One of the utilizations of e-mail is used in practical purposes such as making a request. This paper provided views on linguistic politeness in submitting an e-mail containing the request based on e-mail data written by native speakers of Japanese (J and the Indonesian Japanese language learners (IJL. The data was analyzed using the theory of politeness expressed by Brown and Levinson. This paper focused on the strategy that what more likely was to be used by J and IJL in the expression of request. In the final part, it concluded the view about what should be considered in connection with the linguistic politeness in Japanese e-mail containing request. It was intended for learners of foreign language, especially Indonesian people, to know the limitation of politeness, so that IJL will not repeat the same mistakes in the future.

  7. Impact of fungicide and insecticide use on non-target aquatic organisms in rice paddy fields

    Directory of Open Access Journals (Sweden)

    Alana Cristina Dorneles Wandscheer

    Full Text Available ABSTRACT: The intensive use of plant protection products in rice paddy fields ( Oryza sativa L. has caused concern about the environmental impact on communities of non-target organisms that are natural inhabitants in these agroecosystems. The purpose of this review is to analyze the data currently available in the literature about some important fungicides and insecticides (such as trifloxystrobin, tebuconazole, tricyclazole, lambda-cyhalothrin, and thiamethoxam, which are currently used to control pests and diseases in rice paddy fields, as well as their effects on the community of non-target aquatic organisms.

  8. Targeting myeloid cells to the brain using non-myeloablative conditioning.

    Directory of Open Access Journals (Sweden)

    Chotima Böttcher

    Full Text Available Bone marrow-derived cells (BMDCs are able to colonize the central nervous system (CNS at sites of damage. This ability makes BMDCs an ideal cellular vehicle for transferring therapeutic genes/molecules to the CNS. However, conditioning is required for bone marrow-derived myeloid cells to engraft in the brain, which so far has been achieved by total body irradiation (TBI and by chemotherapy (e.g. busulfan treatment. Unfortunately, both regimens massively disturb the host's hematopoietic compartment. Here, we established a conditioning protocol to target myeloid cells to sites of brain damage in mice using non-myeloablative focal head irradiation (HI. This treatment was associated with comparatively low inflammatory responses in the CNS despite cranial radiation doses which are identical to TBI, as revealed by gene expression analysis of cytokines/chemokines such as CCL2, CXCL10, TNF-α and CCL5. HI prior to bone marrow transplantation resulted in much lower levels of blood chimerism defined as the percentage of donor-derived cells in peripheral blood ( 95% or busulfan treatment (> 50%. Nevertheless, HI effectively recruited myeloid cells to the area of motoneuron degeneration in the brainstem within 7 days after facial nerve axotomy. In contrast, no donor-derived cells were detected in the lesioned facial nucleus of busulfan-treated animals up to 2 weeks after transplantation. Our findings suggest that myeloid cells can be targeted to sites of brain damage even in the presence of very low levels of peripheral blood chimerism. We established a novel non-myeloablative conditioning protocol with minimal disturbance of the host's hematopoietic system for targeting BMDCs specifically to areas of pathology in the brain.

  9. Non-target activity detection by post-radioembolization yttrium-90 PET/CT: Image assessment technique and case examples

    Directory of Open Access Journals (Sweden)

    Yung Hsiang eKao

    2014-02-01

    Full Text Available High-resolution yttrium-90 (90Y imaging of post-radioembolization microsphere biodistribution may be achieved by conventional positron emission tomography with integrated computed tomography (PET/CT scanners that have time-of-flight capability. However, reconstructed 90Y PET/CT images have high background noise, making non-target activity detection technically challenging. This educational article describes our image assessment technique for non-target activity detection by 90Y PET/CT which qualitatively overcomes the problem of background noise. We present selected case examples of non-target activity in untargeted liver, stomach, gallbladder, chest wall and kidney, supported by angiography and 90Y bremsstrahlung single photon emission computed tomography with integrated computed tomography (SPECT/CT or technetium-99m macroaggregated albumin SPECT/CT.

  10. Real-time non-rigid target tracking for ultrasound-guided clinical interventions

    Science.gov (United States)

    Zachiu, C.; Ries, M.; Ramaekers, P.; Guey, J.-L.; Moonen, C. T. W.; de Senneville, B. Denis

    2017-10-01

    Biological motion is a problem for non- or mini-invasive interventions when conducted in mobile/deformable organs due to the targeted pathology moving/deforming with the organ. This may lead to high miss rates and/or incomplete treatment of the pathology. Therefore, real-time tracking of the target anatomy during the intervention would be beneficial for such applications. Since the aforementioned interventions are often conducted under B-mode ultrasound (US) guidance, target tracking can be achieved via image registration, by comparing the acquired US images to a separate image established as positional reference. However, such US images are intrinsically altered by speckle noise, introducing incoherent gray-level intensity variations. This may prove problematic for existing intensity-based registration methods. In the current study we address US-based target tracking by employing the recently proposed EVolution registration algorithm. The method is, by construction, robust to transient gray-level intensities. Instead of directly matching image intensities, EVolution aligns similar contrast patterns in the images. Moreover, the displacement is computed by evaluating a matching criterion for image sub-regions rather than on a point-by-point basis, which typically provides more robust motion estimates. However, unlike similar previously published approaches, which assume rigid displacements in the image sub-regions, the EVolution algorithm integrates the matching criterion in a global functional, allowing the estimation of an elastic dense deformation. The approach was validated for soft tissue tracking under free-breathing conditions on the abdomen of seven healthy volunteers. Contact echography was performed on all volunteers, while three of the volunteers also underwent standoff echography. Each of the two modalities is predominantly specific to a particular type of non- or mini-invasive clinical intervention. The method demonstrated on average an accuracy of

  11. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  12. Do non-monetary prices target the poor? Evidence from a field experiment in India

    OpenAIRE

    Hoffmann, Bridget

    2016-01-01

    This paper uses willingness to pay (WTP) data from a field experiment in Hyderabad, India in 2013 to determine whether non-monetary prices better target health products to the poor than monetary prices. Monetary WTP is increasing in income and non-monetary WTP is weakly decreasing in income. Household fixed effects in a pooled sample of monetary WTP and non-monetary WTP are used to compare the correlation of income and WTP across price types. It is found that non-monetary WTP falls relative t...

  13. E-mail marketing grows up: a primer for the managed care industry.

    Science.gov (United States)

    Dysart, J

    2000-02-01

    Managed care plans are jumping onto the electronic marketing bandwagon in a big way, taking advantage of not only the basic E-mail system but also expanding on that medium and developing creative vehicles to send the health plan's message. In this article, the author describes how E-mail technology is being used to hone the marketing edge in MCOs.

  14. Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots

    Energy Technology Data Exchange (ETDEWEB)

    Seifert, Christian; Endicott-Popovsky, Barbara E.; Frincke, Deborah A.; Komisarczuk, Peter; Muschevici, Radu; Welch, Ian D.

    2008-01-03

    Abstract: Client honeypot technology can find malicious web servers that attack web browsers and push malware, so called drive-by-downloads, to the client machine. Merely recording the network traffic is insufficient to perform an efficient forensic analysis of the attack. Custom tools need to be developed to access and examine the embedded data of the network protocols. Once the information is extracted from the network data, it cannot be used to perform a behavioral analysis on the attack, therefore limiting the ability to answer what exactly happened on the attacked system. Implementation of a record/ replay mechanism is proposed that allows the forensic examiner to easily extract application data from recorded network streams and allows applications to interact with such data for behavioral analysis purposes. A concrete implementation of such a setup for HTTP and DNS protocols using the HTTP proxy Squid and DNS proxy pdnsd is presented and its effect on digital forensic analysis demonstrated.

  15. Email solicitation for scholarly work--a single researcher's perspective.

    Science.gov (United States)

    Bugeja, Justine; Grech, Victor

    2015-01-01

    Publishing is important for career progression. The traditional journal model results in subscribers bearing publication costs. The eagerness with which researchers seek journals for the publishing of their work, along with the internet, has resulted in the creation of a new model called open access (OA). Author/s or their institution/s pay an actual publication fee. This has in turn resulted in the creation of questionable journals which charge steep publishing fees. Emails soliciting publication to one of the authors (VG) were collected for the month of March 2015. Information collected included costs of OA publishing, and whether or not this information was readily available. The appropriateness of said solicitations was also assessed with regard to topics with which the targeted author was familiar. There was a total of 44 solicitations: 3 were duplicates. Out of 41 solicitations, 20 (49%) were appropriate. The open access fee was readily available in 27 out of 41 solicitations (66%). The open access fee averaged $475, ranging from $25 to $1500. The only journal which provided true OA was Medical Principles and Practice, with no fees charged whatsoever. Potential authors should carefully investigate OA journals prior to choosing journals wherein to submit their work.

  16. Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail.

    Science.gov (United States)

    Wang, Jing; Madnick, Stuart; Li, Xitong; Alstott, Jeff; Velu, Chander

    2015-01-01

    Social mobilization is a process that enlists a large number of people to achieve a goal within a limited time, especially through the use of social media. There is increasing interest in understanding the factors that affect the speed of social mobilization. Based on the Langley Knights competition data set, we analyzed the differences in mobilization speed between users of Facebook and e-mail. We include other factors that may influence mobilization speed (gender, age, timing, and homophily of information source) in our model as control variables in order to isolate the effect of such factors. We show that, in this experiment, although more people used e-mail to recruit, the mobilization speed of Facebook users was faster than that of those that used e-mail. We were also able to measure and show that the mobilization speed for Facebook users was on average seven times faster compared to e-mail before controlling for other factors. After controlling for other factors, we show that Facebook users were 1.84 times more likely to register compared to e-mail users in the next period if they have not done so at any point in time. This finding could provide useful insights for future social mobilization efforts.

  17. Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail.

    Directory of Open Access Journals (Sweden)

    Jing Wang

    Full Text Available Social mobilization is a process that enlists a large number of people to achieve a goal within a limited time, especially through the use of social media. There is increasing interest in understanding the factors that affect the speed of social mobilization. Based on the Langley Knights competition data set, we analyzed the differences in mobilization speed between users of Facebook and e-mail. We include other factors that may influence mobilization speed (gender, age, timing, and homophily of information source in our model as control variables in order to isolate the effect of such factors. We show that, in this experiment, although more people used e-mail to recruit, the mobilization speed of Facebook users was faster than that of those that used e-mail. We were also able to measure and show that the mobilization speed for Facebook users was on average seven times faster compared to e-mail before controlling for other factors. After controlling for other factors, we show that Facebook users were 1.84 times more likely to register compared to e-mail users in the next period if they have not done so at any point in time. This finding could provide useful insights for future social mobilization efforts.

  18. Non-proinflammatory and responsive nanoplatforms for targeted treatment of atherosclerosis.

    Science.gov (United States)

    Dou, Yin; Chen, Yue; Zhang, Xiangjun; Xu, Xiaoqiu; Chen, Yidan; Guo, Jiawei; Zhang, Dinglin; Wang, Ruibing; Li, Xiaohui; Zhang, Jianxiang

    2017-10-01

    Atherosclerosis is the leading cause of many fatal cardiovascular and cerebrovascular diseases. Whereas nanomedicines are promising for targeted therapy of atherosclerosis, great challenges remain in development of effective, safe, and translational nanotherapies for its treatment. Herein we hypothesize that non-proinflammatory nanomaterials sensitive to low pH or high reactive oxygen species (ROS) may serve as effective platforms for triggerable delivery of anti-atherosclerotic therapeutics in cellular and tissue microenvironments of inflammation. To demonstrate this hypothesis, an acid-labile material of acetalated β-cyclodextrin (β-CD) (Ac-bCD) and a ROS-sensitive β-CD material (Ox-bCD) were separately synthesized by chemical modification of β-CD, which were formed into responsive nanoparticles (NPs). Ac-bCD NP was rapidly hydrolyzed in mildly acidic buffers, while hydrolysis of Ox-bCD NP was selectively accelerated by H 2 O 2 . Using an anti-atherosclerotic drug rapamycin (RAP), we found stimuli-responsive release of therapeutic molecules from Ac-bCD and Ox-bCD nanotherapies. Compared with non-responsive poly(lactide-co-glycolide) (PLGA)-based NP, Ac-bCD and Ox-bCD NPs showed negligible inflammatory responses in vitro and in vivo. By endocytosis in cells and intracellularly releasing cargo molecules in macrophages, responsive nanotherapies effectively inhibited macrophage proliferation and suppressed foam cell formation. After intraperitoneal (i.p.) delivery in apolipoprotein E-deficient (ApoE -/- ) mice, fluorescence imaging showed accumulation of NPs in atherosclerotic plaques. Flow cytometry analysis indicated that the lymphatic translocation mediated by neutrophils and monocytes/macrophages may contribute to atherosclerosis targeting of i.p. administered NPs, in addition to targeting via the leaky blood vessels. Correspondingly, i.p. treatment with different nanotherapies afforded desirable efficacies. Particularly, both pH and ROS

  19. Relationships between Emotional States and Emoticons in Mobile Phone Email Communication in Japan

    Science.gov (United States)

    Kato, Shogo; Kato, Yuuki; Scott, Douglass

    2009-01-01

    Three related studies conducted on the role of emotional transfer in email messages were studied in order to better understand Japanese college students' online communications and their broader participation in online communications. The first study investigated users' initiatives in preventing emotional misunderstandings when sending email.…

  20. Targeted and non-targeted drug screening in whole blood by UHPLC-TOF-MS with data-independent acquisition

    DEFF Research Database (Denmark)

    Mollerup, Christian Brinch; Dalsgaard, Petur Weihe; Mardal, Marie

    2017-01-01

    of peaks to inspect by three orders of magnitude, down to four peaks per DUID sample. The screening allowed for tentative identification of metabolites and drugs not included in the initial screening, and three drugs and thirteen metabolites were tentatively identified in the authentic DUID samples......High-resolution mass spectrometry (HRMS) is widely used for the drug screening of biological samples in clinical and forensic laboratories. With the continuous addition of new psychoactive substances (NPS), keeping such methods updated is challenging. HRMS allows for combined targeted and non......-targeted screening; first, peaks are identified by software algorithms, and identifications are based on reference standard data. Remaining unknown peaks are attempted identified with in silico and literature data. However, several thousand peaks remain where most are unidentifiable or uninteresting in drug...

  1. No-lose targets as an option to integrate non-Annex I countries in global emission reduction efforts. A game-theoretical analysis

    Energy Technology Data Exchange (ETDEWEB)

    Duscha, Vicki

    2012-07-01

    Substantial greenhouse gas emission reductions of 50% and more below 1990 levels by 2050 are necessary, to limit mean temperature increase below 2 C above pre-industrial levels. While the Kyoto Protocol foresees emission reduction targets for Annex I countries only, current and projected greenhouse gas emissions, as well as the growing economic importance of emerging economies call for an integration of non-Annex I countries in global reduction efforts. No-lose targets set emission reduction targets and define incentives for meeting the target, in contrast to binding reduction targets that use penalties to ensure compliance. One form of incentive is the participation in an international emissions trading market. While a few conceptual and quantitative analyses of no-lose targets can be found in the literature, economic analyses have not been carried out so far. In this thesis, two theoretical frameworks are introduced to analyze the potential of no-lose targets to contribute to global emission reduction efforts. First, a two-player, two-stage model is developed to model a non-Annex I country's participation decision and derive the contribution to global emission reductions. Then a two-player participation game is introduced to analyze the effects that the participation decision of one non-Annex I country has on another non-Annex I country also facing a no-lose target. Two market forms, a perfectly competitive market, and a market with market power on the side of the non-Annex I country are analyzed. In order to complement the highly stylized theoretical frameworks, a quantitative analysis applying marginal abatement cost curves is conducted to estimate the contribution of no-lose targets to reaching the 2 C target. The analyses show that no-lose targets can result in substantial contributions from non-Annex I countries to global emission reductions, in particular if the reduction potential in the non-Annex I countries is large, compared to that of the Annex I

  2. Targeting brain metastases in ALK-rearranged non-small-cell lung cancer.

    Science.gov (United States)

    Zhang, Isabella; Zaorsky, Nicholas G; Palmer, Joshua D; Mehra, Ranee; Lu, Bo

    2015-10-01

    The incidence of brain metastases has increased as a result of improved systemic control and advances in imaging. However, development of novel therapeutics with CNS activity has not advanced at the same rate. Research on molecular markers has revealed many potential targets for antineoplastic agents, and a particularly important aberration is translocation in the ALK gene, identified in non-small-cell lung cancer (NSCLC). ALK inhibitors have shown systemic efficacy against ALK-rearranged NSCLC in many clinical trials, but the effectiveness of crizotinib in CNS disease is limited by poor blood-brain barrier penetration and acquired drug resistance. In this Review, we discuss potential pathways to target ALK-rearranged brain metastases, including next generation ALK inhibitors with greater CNS penetration and mechanisms to overcome resistance. Other important mechanisms to control CNS disease include targeting pathways downstream of ALK phosphorylation, increasing the permeability of the blood-brain barrier, modifying the tumour microenvironment, and adding concurrent radiotherapy. Copyright © 2015 Elsevier Ltd. All rights reserved.

  3. Drug-Target Interactions: Prediction Methods and Applications.

    Science.gov (United States)

    Anusuya, Shanmugam; Kesherwani, Manish; Priya, K Vishnu; Vimala, Antonydhason; Shanmugam, Gnanendra; Velmurugan, Devadasan; Gromiha, M Michael

    2018-01-01

    Identifying the interactions between drugs and target proteins is a key step in drug discovery. This not only aids to understand the disease mechanism, but also helps to identify unexpected therapeutic activity or adverse side effects of drugs. Hence, drug-target interaction prediction becomes an essential tool in the field of drug repurposing. The availability of heterogeneous biological data on known drug-target interactions enabled many researchers to develop various computational methods to decipher unknown drug-target interactions. This review provides an overview on these computational methods for predicting drug-target interactions along with available webservers and databases for drug-target interactions. Further, the applicability of drug-target interactions in various diseases for identifying lead compounds has been outlined. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  4. Understanding Style, Language and Etiquette in Email Communication in Higher Education: A Survey

    Science.gov (United States)

    Lewin-Jones, Jenny; Mason, Victoria

    2014-01-01

    This study investigates academic staff and student attitudes to style and etiquette of emails. Data were collected through two online staff and student surveys. Reported use and acceptability of particular features of email style were assessed. Open-ended responses yielded four themes: the balance between formality and informality, relationships,…

  5. Non-targeted bystander effects induced by ionizing radiation

    International Nuclear Information System (INIS)

    Morgan, William F.; Sowa, Marianne B.

    2007-01-01

    Radiation-induced bystander effects refer to those responses occurring in cells that were not subject to energy deposition events following ionizing radiation. These bystander cells may have been neighbors of irradiated cells, or physically separated but subject to soluble secreted signals from irradiated cells. Bystander effects have been observed in vitro and in vivo and for various radiation qualities. In tribute to an old friend and colleague, Anthony V. Carrano, who would have said 'well what are the critical questions that should be addressed, and so what?', we review the evidence for non-targeted radiation-induced bystander effects with emphasis on prevailing questions in this rapidly developing research field, and the potential significance of bystander effects in evaluating the detrimental health effects of radiation exposure

  6. Advanced Email Risk Classification and Recipient Decision Assistance

    Science.gov (United States)

    Estes, Aaron

    2016-01-01

    Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…

  7. The Presence of Algae Mitigates the Toxicity of Copper-Based Algaecides to a Non-Target Organism.

    Science.gov (United States)

    Bishop, West M; Willis, Ben E; Richardson, Robert J; Cope, W Gregory

    2018-05-07

    Copper-based algaecides are routinely applied to target noxious algal blooms in freshwaters. Standard toxicity testing data with copper suggest typical concentrations used to control algae can cause deleterious acute impacts to non-target organisms. These "clean" water experiments lack algae, which are specifically targeted in field applications of algaecides and contain competing ligands. This research measured the influence of algae on algaecide exposure and subsequent response of the non-target species Daphnia magna to copper sulfate and an ethanolamine-chelated copper algaecide (Captain®). Significant shifts (Palgae were present in exposures along with a copper salt or chelated copper formulation. Copper sulfate 48-h LC50 values shifted from 75.3 to 317.8 and 517.8 µg Cu/L whereas Captain increased from 353.8 to 414.2 and 588.5 µg Cu/L in no algae, 5 × 10 5 and 5 × 10 6 cells/mL algae treatments, respectively. Larger shifts were measured with copper sulfate exposures, although Captain was less toxic to Daphnia magna in all corresponding treatments. Captain was more effective at controlling Scenedesmus dimorphus at most concentrations, and control was inversely proportional to toxicity to D. magna. Overall, incorporating target competing ligands (i.e., algae) into standard toxicity testing is important for accurate risk assessment, and copper formulation can significantly alter algaecidal efficacy and risks to non-target organisms. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  8. Involvement of ways of death receptors in the target and non target effects of ionizing radiations

    International Nuclear Information System (INIS)

    Luce, A.

    2008-10-01

    Delayed cell death by mitotic catastrophe is a frequent mode of breast cancer cell death after γ-irradiation. Whereas the mechanisms that underlie the early γ-irradiation-induced cell death are well documented, those that drive the delayed cell death are largely unknown. Here we show that the Fas, TRAIL and TNF-α death receptor pathways mediate the delayed cell death observed after γ-irradiation of breast cancer cells. Receptors of the three pathways are over expressed early after irradiation and sensitize cells to apoptosis, whereas their ligands are over expressed three to four days after γ-irradiation, leading to apoptosis of the irradiated cells through a mitotic catastrophe. We also show for the first time that irradiated breast cancer cells excrete soluble forms of the three ligands which can induce the death of sensitive bystander cells. Altogether, these results define the molecular basis of the delayed cell death induced by targeted and non-targeted effects of γ-irradiation. (author)

  9. Polymer-Based Novel Lung Targeted Delivery Systems.

    Science.gov (United States)

    Elmowafy, Enas; Osman, Rihab; Ishak, Rania A H

    2017-01-01

    Due to its unique features, the respiratory tract had received great attention as a promising non-invasive route for drug administration to achieve both local and systemic effects. Efforts spent to tailor systems able to overcome the lung defence mechanisms and biological barriers are followed in this review. Aerodynamic diameter, morphology, lung deposition and drug release profiles are the main criteria describing the selected new smart lung targeted delivery systems. Novel systems such as nanoparticles, nano-embedded-in microparticles (NEM), small microparticles (MP), large porous particles (LPP), PulmospheresTM and polymeric micelles are used to passively target different areas in the respiratory tract. The most common preparation methods are outlined in the article. Special emphasis was given to the characteristics of the polymers used to fabricate the developed systems. Efforts made to prepare systems using chitosan (CS), alginate (alg), hyaluronic acid (HA), gelatin and albumin as examples of natural polymers and poly lactic-co-glycolic acid (PLGA) and poly(Ɛ-caprolactone) (PCL) as synthetic polymers were compiled. The continuous development and work in the area of lung targeting resulted in the development of engineered smart platforms with the capability to carry small drug molecules, proteins and genes to treat a variety of local and systemic diseases. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  10. Email and Epistolary technologies: Presence, Intimacy, Disembodiment

    Directory of Open Access Journals (Sweden)

    Esther Milne

    2003-01-01

    Full Text Available A key problem for critical media practice is how to assess accurately the technological impact, historical significance and cultural consequences of a particular change in a communications system. Contemporary theorising about the impact of electronic, digitally networked culture is often articulated within an eschatological narrative of apocalypse and last things. The old is cast as naive and redundant while the new appears triumphant, conquering and redemptive. Washing away the sins of the old, the new technology arrives, it seems, out of nowhere. In response to such socio-technological representations, this paper argues that the dialectic between old and new communication systems is more complex than has been assumed by contemporary media theory. Rather than a narrative of radical changes, decisive shifts and abrupt breaks, the relation between epistolary and email technology reveals certain continuities. Specifically, tropes of presence and intimacy are traced through three media sites: a "virtual community" of British nineteenth-century letter writers, the postcard correspondence of an Australian First World War soldier and a twenty first century email discussion list. Mapping these sites reveals a central paradox of technological and discursive cultural practice, namely, that material signifiers can be used to produce incorporeal presence.

  11. Email Between Patient and Provider: Assessing the Attitudes and Perspectives of 624 Primary Health Care Patients.

    Science.gov (United States)

    Seth, Puneet; Abu-Abed, Mohamed Ismail; Kapoor, Vikram; Nicholson, Kathryn; Agarwal, Gina

    2016-12-22

    Email between patients and their health care providers can serve as a continuous and collaborative forum to improve access to care, enhance convenience of communication, reduce administrative costs and missed appointments, and improve satisfaction with the patient-provider relationship. The main objective of this study was to investigate the attitudes of patients aged 16 years and older toward receiving email communication for health-related purposes from an academic inner-city family health team in Southern Ontario. In addition to exploring the proportion of patients with a functioning email address and interest in email communication with their health care provider, we also examined patient-level predictors of interest in email communication. A cross-sectional study was conducted using a self-administered, 1-page survey of attitudes toward electronic communication for health purposes. Participants were recruited from attending patients at the McMaster Family Practice in Hamilton, Ontario, Canada. These patients were aged 16 years and older and were approached consecutively to complete the self-administered survey (N=624). Descriptive analyses were conducted using the Pearson chi-square test to examine correlations between variables. A logistic regression analysis was conducted to determine statistically significant predictors of interest in email communication (yes or no). The majority of respondents (73.2%, 457/624) reported that they would be willing to have their health care provider (from the McMaster Family Practice) contact them via email to communicate health-related information. Those respondents who checked their personal email more frequently were less likely to want to engage in this electronic communication. Among respondents who check their email less frequently (fewer than every 3 days), 46% (37/81) preferred to communicate with the McMaster Family Practice via email. Online applications, including email, are emerging as a viable avenue for patient

  12. Email Reminders Increase the Frequency That Pet Owners Update Their Microchip Information

    Directory of Open Access Journals (Sweden)

    Katie Goodwin

    2018-01-01

    Full Text Available Stray animals with incorrect microchip details are less likely to be reclaimed, and unclaimed strays are at increased risk of euthanasia. A retrospective cohort study was performed using 394,747 cats and 904,909 dogs registered with Australia’s largest microchip database to describe animal characteristics, determine whether annual email reminders increased the frequency that owners updated their information, and to compare frequencies of microchip information updates according to pet and owner characteristics. More than twice as many dogs (70% than cats (30% were registered on the database; the most numerous pure-breeds were Ragdoll cats and Staffordshire Bull Terrier dogs, and the number of registered animals per capita varied by Australian state or territory. Owners were more likely (p < 0.001 to update their details soon after they were sent a reminder email, compared to immediately before that email, and there were significant (p < 0.001 differences in the frequency of owner updates by state or territory of residence, animal species, animal age, and socioeconomic index of the owner’s postcode. This research demonstrates that email reminders increase the probability of owners updating their details on the microchip database, and this could reduce the percentages of stray animals that are unclaimed and subsequently euthanized.

  13. Targeting Adenosine Signaling in Parkinson's Disease: From Pharmacological to Non-pharmacological Approaches

    Directory of Open Access Journals (Sweden)

    Luiza R. Nazario

    2017-11-01

    Full Text Available Parkinson's disease (PD is one of the most prevalent neurodegenerative disease displaying negative impacts on both the health and social ability of patients and considerable economical costs. The classical anti-parkinsonian drugs based in dopaminergic replacement are the standard treatment, but several motor side effects emerge during long-term use. This mini-review presents the rationale to several efforts from pre-clinical and clinical studies using adenosine receptor antagonists as a non-dopaminergic therapy. As several studies have indicated that the monotherapy with adenosine receptor antagonists reaches limited efficacy, the usage as a co-adjuvant appeared to be a promising strategy. The formulation of multi-targeted drugs, using adenosine receptor antagonists and other neurotransmitter systems than the dopaminergic one as targets, have been receiving attention since Parkinson's disease presents a complex biological impact. While pharmacological approaches to cure or ameliorate the conditions of PD are the leading strategy in this area, emerging positive aspects have arisen from non-pharmacological approaches and adenosine function inhibition appears to improve both strategies.

  14. The Impact of Using Email on Improving the Writing Skills among Iranian Students

    Science.gov (United States)

    Janfaza, Abusaied; Shahsavari, Khadijeh; Soori, Afshin

    2014-01-01

    The need for the application of technology in education has been increased. One of the new approaches in technology is using email for learning a second or a foreign language. The present study aimed at investigating the effectiveness of using email in improving writing skills among Iranian EFL students. The participants of the study were 42…

  15. E-Mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    Science.gov (United States)

    Nazari, Behzad; Ninknejad, Sahar

    2015-01-01

    The present study highly supported the effective role of providing background information via email by the teacher to write e-mail by the students in learners' writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of…

  16. Design and development of mobile Email system based on brew and IMAP4

    International Nuclear Information System (INIS)

    Chen Liangchen; Liu Shuzhen; Yan Xiaofei; Sun Gongxing

    2007-01-01

    In order to achieve IMAP4 support agreement in the mobile e-mail client application on the smart phone, using the Qualcomm introduced wireless devices designed for the BREW platform. Research on the BREW platform mobile and IMAP4 protocol, design and implement the 3G technology standard smart phone e-mail client based on the BREW platform. (authors)

  17. Competitive release and outbreaks of non-target pests associated with transgenic Bt cotton.

    Science.gov (United States)

    Zeilinger, Adam R; Olson, Dawn M; Andow, David A

    2016-06-01

    The adoption of transgenic Bt cotton has, in some cases, led to environmental and economic benefits through reduced insecticide use. However, the distribution of these benefits and associated risks among cotton growers and cotton-growing regions has been uneven due in part to outbreaks of non-target or secondary pests, thereby requiring the continued use of synthetic insecticides. In the southeastern USA, Bt cotton adoption has resulted in increased abundance of and damage from stink bug pests, Euschistus servus and Nezara viridula (Heteroptera: Pentatomidae). While the impact of increased stink bug abundance has been well-documented, the causes have remained unclear. We hypothesize that release from competition with Bt-susceptible target pests may drive stink bug outbreaks in Bt cotton. We first examined the evidence for competitive release of stink bugs through meta-analysis of previous studies. We then experimentally tested if herbivory by Bt-susceptible Helicoverpa zea increases stink bug leaving rates and deters oviposition on non-Bt cotton. Consistent with previous studies, we found differences in leaving rates only for E servus, but we found that both species strongly avoided ovipositing on H. zea-damaged plants. Considering all available evidence, competitive release of stink bug populations in Bt cotton likely contributes to outbreaks, though the relative importance of competitive release remains an open question. Ecological risk assessments of Bt crops and other transgenic insecticidal crops would benefit from greater understanding of the ecological mechanisms underlying non-target pest outbreaks and greater attention to indirect ecological effects more broadly.

  18. Mass Communication and Journalism Faculty's Perceptions of the Effectiveness of Email Communication with College Students: A Nationwide Study

    Science.gov (United States)

    Yates, Bradford L.; Adams, Jennifer Wood; Brunner, Brigitta R.

    2009-01-01

    Nearly 700 US journalism and mass communication faculty (all teaching personnel) reported their perceptions of student email use via a web-based survey. This nationwide study focused on the content of email sent by faculty to students, email's effectiveness, and email's effect on student learning. Comparisons were made based on faculty gender,…

  19. The effect of antibiotics and diet on enterolactone concentration and metabolome studied by targeted and non-targeted LC-MS metabolomics

    DEFF Research Database (Denmark)

    Bolvig, Anne Katrine; Nørskov, Natalja; Hedemann, Mette Skou

    2017-01-01

    with lower levels of ENL. Here, we investigate the link between antibiotic use and lignan metabolism in pigs using LC-MS/MS. The effect of lignan intake and antibiotic use on the gut microbial community and the pig metabolome is studied by 16S rRNA sequencing and non-targeted LC-MS. Treatment...

  20. Epidermal Growth Factor Receptor targeting in non-small cell lung cancer: revisiting different strategies against the same target.

    Science.gov (United States)

    Castañón, Eduardo; Martín, Patricia; Rolfo, Christian; Fusco, Juan P; Ceniceros, Lucía; Legaspi, Jairo; Santisteban, Marta; Gil-Bazo, Ignacio

    2014-01-01

    Epidermal Growth Factor Receptor (EGFR) tyrosine kinase inhibitors (TKIs) have changed the paradigm of treatment in non-small cell lung cancer (NSCLC). The molecular biology study of EGFR has led to clinical trials that select patients more accurately, regarding the presence of EGFR activating mutations. Nonetheless, a lack of response or a temporary condition of the response has been detected in patients on EGFR TKIs. This has urged to study potential resistance mechanisms underneath. The most important ones are the presence of secondary mutations in EGFR, such as T790M, or the overexpression of mesenchymal-epithelial transition factor (MET) that may explain why patients who initially respond to EGFR TKIs, may ultimately become refractory. Several approaches have been taken and new drugs both targeting EGFR resistance-mutation or MET are currently being developed. Here we review and update the EGFR biological pathway as well as the clinical data leading to approval of the EGFR TKIs currently in the market. New compounds under investigation targeting resistance mutations or dually targeting EGFR and other relevant receptors are also reviewed and discussed.

  1. The Communicative Functions of Emoticons in Workplace E-Mails :-)

    DEFF Research Database (Denmark)

    Skovholt, Karianne; Grønning, Anette; Kankaanranta, Anne

    2014-01-01

    CMC research presents emoticons as visual representations of writers' emotions. We argue that the emoticons in authentic workplace e-mails do not primarily indicate writers' emotions. Rather, they provide information about how an utterance is supposed to be interpreted. We show that emoticons...

  2. Mapping network development of international new ventures with the use of company e-mails

    NARCIS (Netherlands)

    Wakkee, I.A.M.

    2006-01-01

    International new ventures use e-mail frequently to communicate with globally dispersed contacts. In this paper we present and discuss a qualitative research method to map international network development based on company e-mails. Our approach also allows for combinations of inductive and deductive

  3. Gelotophobia and the Challenges of Implementing Laughter into Virtual Agents Interactions

    Science.gov (United States)

    Ruch, Willibald F.; Platt, Tracey; Hofmann, Jennifer; Niewiadomski, Radosław; Urbain, Jérôme; Mancini, Maurizio; Dupont, Stéphane

    2014-01-01

    This study investigated which features of AVATAR laughter are perceived threatening for individuals with a fear of being laughed at (gelotophobia), and individuals with no gelotophobia. Laughter samples were systematically varied (e.g., intensity, laughter pitch, and energy for the voice, intensity of facial actions of the face) in three modalities: animated facial expressions, synthesized auditory laughter vocalizations, and motion capture generated puppets displaying laughter body movements. In the online study 123 adults completed, the GELOPH (Ruch and Proyer, 2008a,b) and rated randomly presented videos of the three modalities for how malicious, how friendly, how real the laughter was (0 not at all to 8 extremely). Additionally, an open question asked which markers led to the perception of friendliness/maliciousness. The current study identified features in all modalities of laughter stimuli that were perceived as malicious in general, and some that were gelotophobia specific. For facial expressions of AVATARS, medium intensity laughs triggered highest maliciousness in the gelotophobes. In the auditory stimuli, the fundamental frequency modulations and the variation in intensity were indicative of maliciousness. In the body, backwards and forward movements and rocking vs. jerking movements distinguished the most malicious from the least malicious laugh. From the open answers, the shape and appearance of the lips curling induced feelings that the expression was malicious for non-gelotophobes and that the movement round the eyes, elicited the face to appear as friendly. This was opposite for gelotophobes. Gelotophobia savvy AVATARS should be of high intensity, containing lip and eye movements and be fast, non-repetitive voiced vocalization, variable and of short duration. It should not contain any features that indicate a down-regulation in the voice or body, or indicate voluntary/cognitive modulation. PMID:25477803

  4. An integrated control scheme for space robot after capturing non-cooperative target

    Science.gov (United States)

    Wang, Mingming; Luo, Jianjun; Yuan, Jianping; Walter, Ulrich

    2018-06-01

    How to identify the mass properties and eliminate the unknown angular momentum of space robotic system after capturing a non-cooperative target is of great challenge. This paper focuses on designing an integrated control framework which includes detumbling strategy, coordination control and parameter identification. Firstly, inverted and forward chain approaches are synthesized for space robot to obtain dynamic equation in operational space. Secondly, a detumbling strategy is introduced using elementary functions with normalized time, while the imposed end-effector constraints are considered. Next, a coordination control scheme for stabilizing both base and end-effector based on impedance control is implemented with the target's parameter uncertainty. With the measurements of the forces and torques exerted on the target, its mass properties are estimated during the detumbling process accordingly. Simulation results are presented using a 7 degree-of-freedom kinematically redundant space manipulator, which verifies the performance and effectiveness of the proposed method.

  5. Targeted therapy for localized non-small-cell lung cancer: a review

    Directory of Open Access Journals (Sweden)

    Paleiron N

    2016-07-01

    Full Text Available Nicolas Paleiron,1 Olivier Bylicki,2 Michel André,1 Emilie Rivière,1 Frederic Grassin,1 Gilles Robinet,3 Christos Chouaïd4 On behalf of the GFPC Group 1Chest Department, HIA Clermont Tonnerre, Brest, 2Chest Department, HIA Percy, Clamart, 3Chest Department, CHU de Brest, Brest, 4GRC OncoEst, Université Paris XII, Paris, France Abstract: Targeted therapies have markedly improved the management of patients with advanced non-small-cell lung cancer (NSCLC, but their efficacy in localized NSCLC is less well established. The aim of this review is to analyze trials of targeted therapies in localized NSCLC. In patients with wild-type EGFR, tyrosine kinase inhibitors have shown no efficacy in Phase III trials. Few data are available for EGFR-mutated localized NSCLC, as routine biological profiling is not recommended. Available studies are small, often retrospectives, and/or conducted in a single-center making it difficult to draw firm conclusions. Ongoing prospective Phase III trials are comparing adjuvant tyrosine kinase inhibitor administration versus adjuvant chemotherapy. By analogy with the indication of bevacizumab in advanced NSCLC, use of antiangiogenic agents in the perioperative setting is currently restricted to nonsquamous NSCLC. Several trials of adjuvant or neoadjuvant bevacizumab are planned or ongoing, but for the moment there is no evidence of efficacy. Data on perioperative use of biomarkers in early-stage NSCLC come mainly from small, retrospective, uncontrolled studies. Assessment of customized adjuvant or neoadjuvant therapy in localized NSCLC (with or without oncogenic driver mutations is a major challenge. Keywords: targeted therapy, non-small-cell lung cancer, adjuvant, neo-adjuvant, surgery 

  6. The impact of email as a communicative medium on the doctor-patient relationship

    DEFF Research Database (Denmark)

    Jensen, Matilde Nisbeth; Fage-Butler, Antoinette Mary

    Background and objective: Although theoretical perspectives on the doctor-patient relationship have characteristically assumed the temporal and physical co-presence of doctor and patient, the advent of email in doctor-patient communication has brought with it a different communicative reality. New...... technologies come with significant implications as, amongst other things, they impose practices and identities on participants (Malater 2007). The purpose of this integrative literature review is thus to investigate how the advent of email as a medium of communication affects the doctor-patient relationship...... of the medium, convenience, freedom from the clinical gaze, pseudo-anonymity and greater opportunities for reflection, whilst doctors express concerns about confidentiality, time and the challenge of conveying empathy electronically. Implications: The impact of email on the doctor-patient relationship has...

  7. Health Literacy and Global Cognitive Function Predict E-Mail but Not Internet Use in Heart Failure Patients

    Directory of Open Access Journals (Sweden)

    Jared P. Schprechman

    2013-01-01

    Full Text Available Background. The internet offers a potential for improving patient knowledge, and e-mail may be used in patient communication with providers. However, barriers to internet and e-mail use, such as low health literacy and cognitive impairment, may prevent patients from using technological resources. Purpose. We investigated whether health literacy, heart failure knowledge, and cognitive function were related to internet and e-mail use in older adults with heart failure (HF. Methods. Older adults (N=119 with heart failure (69.84±9.09 years completed measures of health literacy, heart failure knowledge, cognitive functioning, and internet use in a cross-sectional study. Results. Internet and e-mail use were reported in 78.2% and 71.4% of this sample of patients with HF, respectively. Controlling for age and education, logistic regression analyses indicated that higher health literacy predicted e-mail (P<.05 but not internet use. Global cognitive function predicted e-mail (P<.05 but not internet use. Only 45% used the Internet to obtain information on HF and internet use was not associated with greater HF knowledge. Conclusions. The majority of HF patients use the internet and e-mail, but poor health literacy and cognitive impairment may prevent some patients from accessing these resources. Future studies that examine specific internet and email interventions to increase HF knowledge are needed.

  8. Sex differences in the vaccine-specific and non-targeted effects of vaccines

    DEFF Research Database (Denmark)

    Flanagan, Katie L; Klein, Sabra L; Skakkebaek, Niels E

    2011-01-01

    Vaccines have non-specific effects (NSE) on subsequent morbidity and mortality from non-vaccine related infectious diseases. Thus NSE refers to any effect that cannot be accounted for by the induction of immunity against the vaccine-targeted disease. These effects are sex-differential, generally...... being more pronounced in females than males. Furthermore, the NSE are substantial causing greater than fifty percent changes in all cause mortality in certain settings, yet have never been systematically tested despite the fact that millions of children receive vaccines each year. As we strive...... to eliminate infectious diseases through vaccination programmes, the relative impact of NSE of vaccines on mortality is likely to increase, raising important questions regarding the future of certain vaccine schedules. A diverse group of scientists met in Copenhagen to discuss non-specific and sex...

  9. Minimizing the non-specific binding of nanoparticles to the brain enables active targeting of Fn14-positive glioblastoma cells.

    Science.gov (United States)

    Schneider, Craig S; Perez, Jimena G; Cheng, Emily; Zhang, Clark; Mastorakos, Panagiotis; Hanes, Justin; Winkles, Jeffrey A; Woodworth, Graeme F; Kim, Anthony J

    2015-02-01

    A major limitation in the treatment of glioblastoma (GBM), the most common and deadly primary brain cancer, is delivery of therapeutics to invading tumor cells outside of the area that is safe for surgical removal. A promising way to target invading GBM cells is via drug-loaded nanoparticles that bind to fibroblast growth factor-inducible 14 (Fn14), thereby potentially improving efficacy and reducing toxicity. However, achieving broad particle distribution and nanoparticle targeting within the brain remains a significant challenge due to the adhesive extracellular matrix (ECM) and clearance mechanisms in the brain. In this work, we developed Fn14 monoclonal antibody-decorated nanoparticles that can efficiently penetrate brain tissue. We show these Fn14-targeted brain tissue penetrating nanoparticles are able to (i) selectively bind to recombinant Fn14 but not brain ECM proteins, (ii) associate with and be internalized by Fn14-positive GBM cells, and (iii) diffuse within brain tissue in a manner similar to non-targeted brain penetrating nanoparticles. In addition, when administered intracranially, Fn14-targeted nanoparticles showed improved tumor cell co-localization in mice bearing human GBM xenografts compared to non-targeted nanoparticles. Minimizing non-specific binding of targeted nanoparticles in the brain may greatly improve the access of particulate delivery systems to remote brain tumor cells and other brain targets. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Writing for Business Purposes: Elements of Email Etiquette

    OpenAIRE

    Gabriela Dumbravă; Adriana Koronka

    2006-01-01

    Starting from the premise that electronic mail has experienced an explosive development throughout the world over the past few years, gaining substantial territory in the field of business communication, the paper focuses on the basic elements of email etiquette and on their importance in writing an effective and competitive electronic message. adapted to the context and purpose of professional writing.

  11. The Impact of Using Email on Improving the Writing Skills Among Iranian Students

    Directory of Open Access Journals (Sweden)

    Abusaied Janfaza

    2014-10-01

    Full Text Available The need for the application of technology in education has been increased. One of the new approaches in technology is using email for learning a second or a foreign language. The present study aimed at investigating the effectiveness of using email in improving writing skills among Iranian EFL students. The participants of the study were 42 pre-intermediate Iranian EFL students in an English language institute in Shiraz, Iran. The participants were randomly assigned into an experimental and a control group. Each group consisted of 21 participants. The treatment continued for three weeks and 3 sessions a week. The students in the experimental group used email for sending their assignments. These students were in contact with their teacher via email and asked writing questions. In contrast, the students in the control group taught writing without using the computer in traditional way. To be sure of homogeneity of the participants, a pre-test was administered before the treatment. After three weeks treatment, a post-test was administered to check the students’ improvement in writing. The findings revealed that the students in in the experimental group performed significantly better than the students in the control group.

  12. Rancang Bangun Aplikasi Enkripsi dan Dekripsi Email Dengan Menggunakan Algoritma Advanced Encryption Standard Dan Knapsack

    Directory of Open Access Journals (Sweden)

    Timothy John Pattiasina

    2014-07-01

    Full Text Available Advanced Encryption Standard (AES dan Knapsack adalah dua algoritma enkripsi simetris dan asimetris yang paling sering digunakan. Penelitian ini menganalisa kedua algoritma AES dan algoritma Knapsack. Prototipe aplikasi enkripsi email ini dirancang dengan menggabungkan karateristik algoritma AES dan Knapsack untuk memecahkan masalah keamanan email. Algoritma AES digunakan untuk mengenkripsi dan deskripsi email berupa teks atau file, sedangkan Algoritma Knapsack di gunakan untuk mengenkripsi kunci AES. Enkripsi hybrid yang diterapkan pada aplikasi bertujuan untuk menambah keamanan informasi dalam sebuah jaringan.

  13. Tailored emails prompt electric vehicle owners to engage with tariff switching information

    Science.gov (United States)

    Nicolson, Moira; Huebner, Gesche M.; Shipworth, David; Elam, Simon

    2017-06-01

    The carbon intensity of the electricity used to charge an electric vehicle (EV) is dependent on when in the day charging occurs. However, persuading EV owners to adopt incentives to charge during off-peak hours is challenging. Here we show that governments could exploit the 'window of opportunity' created when people purchase their first EV to promote time-of-use tariffs. Email recipients (n = 7,038 EV owners) were more likely to click-through to an information webpage when the email emphasized specific reductions in home-charging costs versus general bill savings. However, the 'window of opportunity' for maximizing potential adoption is short; email open rates declined from over 70% immediately after purchase to 40% for recipients owning their EV for over three months. These results demonstrate the potential of prompts to change behaviours for which opt-out enrolment (where enrolment is automatic unless people explicitly opt out) would be unethical or less effective.

  14. CD20-targeted therapy: a breakthrough in the treatment of non-Hodgkin's lymphoma

    NARCIS (Netherlands)

    van Meerten, T.; Hagenbeek, A.

    2009-01-01

    Targeting the CD20 antigen on B lymphocytes with the monoclonal antibody rituximab has greatly improved the outcome of patients with B-cell malignancies. Despite the success of rituximab, resistance occurs in about half of the patients, resulting in non-response to treatment or early relapse of the

  15. When envy leads to schadenfreude.

    Science.gov (United States)

    van de Ven, Niels; Hoogland, Charles E; Smith, Richard H; van Dijk, Wilco W; Breugelmans, Seger M; Zeelenberg, Marcel

    2015-01-01

    Previous research has yielded inconsistent findings concerning the relationship between envy and schadenfreude. Three studies examined whether the distinction between benign and malicious envy can resolve this inconsistency. We found that malicious envy is related to schadenfreude, while benign envy is not. This result held both in the Netherlands where benign and malicious envy are indicated by separate words (Study 1: Sample A, N = 139; Sample B, N = 150), and in the USA where a single word is used to denote both types (Study 2, N = 180; Study 3, N = 349). Moreover, the effect of malicious envy on schadenfreude was independent of other antecedents of schadenfreude (such as feelings of inferiority, disliking the target person, anger, and perceived deservedness). These findings improve our understanding of the antecedents of schadenfreude and help reconcile seemingly contradictory findings on the relationship between envy and schadenfreude.

  16. Spallation Neutron Source Accelerator Facility Target Safety and Non-safety Control Systems

    International Nuclear Information System (INIS)

    Battle, Ronald E.; DeVan, B.; Munro, John K. Jr.

    2006-01-01

    The Spallation Neutron Source (SNS) is a proton accelerator facility that generates neutrons for scientific researchers by spallation of neutrons from a mercury target. The SNS became operational on April 28, 2006, with first beam on target at approximately 200 W. The SNS accelerator, target, and conventional facilities controls are integrated by standardized hardware and software throughout the facility and were designed and fabricated to SNS conventions to ensure compatibility of systems with Experimental Physics Integrated Control System (EPICS). ControlLogix Programmable Logic Controllers (PLCs) interface to instruments and actuators, and EPICS performs the high-level integration of the PLCs such that all operator control can be accomplished from the Central Control room using EPICS graphical screens that pass process variables to and from the PLCs. Three active safety systems were designed to industry standards ISA S84.01 and IEEE 603 to meet the desired reliability for these safety systems. The safety systems protect facility workers and the environment from mercury vapor, mercury radiation, and proton beam radiation. The facility operators operated many of the systems prior to beam on target and developed the operating procedures. The safety and non-safety control systems were tested extensively prior to beam on target. This testing was crucial to identify wiring and software errors and failed components, the result of which was few problems during operation with beam on target. The SNS has continued beam on target since April to increase beam power, check out the scientific instruments, and continue testing the operation of facility subsystems

  17. Anticoagulant rodenticide toxicity to non-target wildlife under controlled exposure conditions

    Science.gov (United States)

    Rattner, Barnett A.; Mastrota, F. Nicholas; van den Brink, Nico; Elliott, J.; Shore, R.; Rattner, B.

    2018-01-01

    Much of our understanding of anticoagulant rodenticide toxicity to non-target wildlife has been derived from molecular through whole animal research and registration studies in domesticated birds and mammals, and to a lesser degree from trials with captive wildlife. Using these data, an adverse outcome pathway identifying molecular initiating and anchoring events (inhibition of vitamin K epoxide reductase, failure to activate clotting factors), and established and plausible linkages (coagulopathy, hemorrhage, anemia, reduced fitness) associated with toxicity, is presented. Controlled exposure studies have demonstrated that second-generation anticoagulant rodenticides (e.g., brodifacoum) are more toxic than first- and intermediate-generation compounds (e.g., warfarin, diphacinone), however the difference in potency is diminished when first- and intermediate-generation compounds are administered on multiple days. Differences in species sensitivity are inconsistent among compounds. Numerous studies have compared mortality rate of predators fed prey or tissue containing anticoagulant rodenticides. In secondary exposure studies in birds, brodifacoum appears to pose the greatest risk, with bromadiolone, difenacoum, flocoumafen and difethialone being less hazardous than brodifacoum, and warfarin, coumatetralyl, coumafuryl, chlorophacinone and diphacinone being even less hazardous. In contrast, substantial mortality was noted in secondary exposure studies in mammals ingesting prey or tissue diets containing either second- or intermediate-generation compounds. Sublethal responses (e.g., prolonged clotting time, reduced hematocrit and anemia) have been used to study the sequelae of anticoagulant intoxication, and to some degree in the establishment of toxicity thresholds or toxicity reference values. Surprisingly few studies have undertaken histopathological evaluations to identify cellular lesions and hemorrhage associated with anticoagulant rodenticide exposure in non-target

  18. Perspective on Secure Development Activities and Features of Safety I and C Systems

    International Nuclear Information System (INIS)

    Kang, Youngdoo; Yu, Yeong Jin; Kim, Hyungtae; Kwon, Yong il; Park, Yeunsoo; Choo, Jaeyul; Son, Jun Young; Jeong, Choong Heui

    2015-01-01

    The Enforcement Decree of the Act on Physical Protection and Radiological Emergency (ED-APPRE) was revised December 2013 to include security requirements on computer systems at nuclear facilities to protect those systems against malicious cyber-attacks. It means Cyber-Security-related measures, controls and activities of safety I and C systems against cyber-attacks shall meet the requirements of ED-APPRE. Still regulation upon inadvertent access or non-malicious modifications to the safety I and C systems is covered under the Nuclear Safety Act. The objective of this paper is to propose KINS' regulatory perspective on secure development and features against non-malicious access or modification of safety I and C systems. Secure development activities and features aim to prevent inadvertent and non-malicious access, and to prevent unwanted action from personnel or connected systems for ensuring reliable operation of safety I and C systems. Secure development activities of safety I and C systems are life cycle activities to ensure unwanted, unneeded and undocumented code is not incorporated into the systems. Secure features shall be developed, verified and qualified throughout the development life cycle

  19. Perspective on Secure Development Activities and Features of Safety I and C Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kang, Youngdoo; Yu, Yeong Jin; Kim, Hyungtae; Kwon, Yong il; Park, Yeunsoo; Choo, Jaeyul; Son, Jun Young; Jeong, Choong Heui [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of)

    2015-05-15

    The Enforcement Decree of the Act on Physical Protection and Radiological Emergency (ED-APPRE) was revised December 2013 to include security requirements on computer systems at nuclear facilities to protect those systems against malicious cyber-attacks. It means Cyber-Security-related measures, controls and activities of safety I and C systems against cyber-attacks shall meet the requirements of ED-APPRE. Still regulation upon inadvertent access or non-malicious modifications to the safety I and C systems is covered under the Nuclear Safety Act. The objective of this paper is to propose KINS' regulatory perspective on secure development and features against non-malicious access or modification of safety I and C systems. Secure development activities and features aim to prevent inadvertent and non-malicious access, and to prevent unwanted action from personnel or connected systems for ensuring reliable operation of safety I and C systems. Secure development activities of safety I and C systems are life cycle activities to ensure unwanted, unneeded and undocumented code is not incorporated into the systems. Secure features shall be developed, verified and qualified throughout the development life cycle.

  20. Baby or bathwater? Referrals of "non-cases" in a targeted early identification intervention for psychosis.

    Science.gov (United States)

    Jordan, Gerald; Kinkaid, Miriam; Iyer, Srividya N; Joober, Ridha; Goldberg, Karen; Malla, Ashok; Shah, Jai L

    2018-03-14

    To explore the unintended impact of a targeted case identification (TCI) campaign for first episode psychosis (FEP) on people not experiencing FEP ("non-cases") with respect to referral patterns and reasons for being a non-case. Sources of referral, reasons for being a non-case, and subsequent referral destinations of non-cases were examined before and after a TCI. Following the TCI, a greater proportion of non-cases lived outside the study catchment area. A smaller proportion was referred by the parent hospital's emergency room or had a substance-induced psychosis. TCIs for FEP may have unintended effects, with implications for early case identification and early intervention services.