411 resultados para Drug Prevention
Resumo:
Objective: The study aimed to examine the difference in response rates between opt-out and opt-in participant recruitment in a population-based study of heavy-vehicle drivers involved in a police-attended crash. Methods: Two approaches to subject recruitment were implemented in two different states over a 14-week period and response rates for the two approaches (opt-out versus opt-in recruitment) were compared. Results: Based on the eligible and contactable drivers, the response rates were 54% for the optout group and 16% for the opt-in group. Conclusions and Implications: The opt-in recruitment strategy (which was a consequence of one jurisdiction’s interpretation of the national Privacy Act at the time) resulted in an insufficient and potentially biased sample for the purposes of conducting research into risk factors for heavy-vehicle crashes. Australia’s national Privacy Act 1988 has had a long history of inconsistent practices by state and territory government departments and ethical review committees. These inconsistencies can have profound effects on the validity of research, as shown through the significantly different response rates we reported in this study. It is hoped that a more unified interpretation of the Privacy Act across the states and territories, as proposed under the soon-to-be released Australian Privacy Principles will reduce the recruitment challenges outlined in this study.
Resumo:
A recent meta-analysis provides evidence supporting the universal application of school-based prevention programs for adolescent depression. The mechanisms underlying such successful interventions, however, are largely unknown. We report on a qualitative analysis of 109 Grade 9 students’ beliefs about what they gained from an evidence-based depression prevention intervention, the Resourceful Adolescent Program (RAP-A). Fifty-four percent of interviewees articulated at least one specific example of program benefit. A thematic analysis of responses revealed two major themes, improved interpersonal relationships and improved self-regulation, both stronger than originally assumed. A more minor theme also emerged—more helpful cognitions. It is postulated that both improved interpersonal relationships and improved self-regulation are likely to enhance one another, and more helpful cognitions may express its contribution through enhanced self-regulation. These findings broaden our understanding of the impact of depression prevention programs, beginning to illuminate how such programs benefit participants.
Resumo:
This article explores the relationship between the Responsibility to Protect (R2P) and the pursuit of the so-called ‘Women, Peace and Security’ (WPS) agenda at the UN. We ask whether the two agendas should continue to be pursued separately or whether each can make a useful contribution to the other. We argue that while the history of R2P has not included language that deliberately evokes the protection of women and the promotion of gender in preventing genocide and mass atrocities, this does not preclude the R2P and WPS agendas becoming mutually reinforcing. The article identifies cross-cutting areas where the two agendas may be leveraged for the UN and member states to address the concerns of women as both actors in need of protection and active agents in preventing and responding to genocide and mass atrocities, namely in the areas of early warning.
Resumo:
Cheating detection in linear secret sharing is considered. The model of cheating extends the Tompa-Woll attack and includes cheating during multiple (unsuccessful) recovery of the secret. It is shown that shares in most linear schemes can be split into subshares. Subshares can be used by participants to trade perfectness of the scheme with cheating prevention. Evaluation of cheating prevention is given in the context of different strategies applied by cheaters.
Resumo:
The work investigates cheating prevention in secret sharing. It is argued that cheating is immune against cheating if the cheaters gain no advantage over honest participants by submitting invalid shares to the combiner. This work addresses the case when shares and the secret are taken from GF(pt). Two models are considered. The first one examines the case when cheaters consistently submit always invalid shares. The second modeldeal s with cheaters who submit a mixture of valid and invalid shares. For these two models, cheating immunity is defined, properties of cheating immune secret sharing are investigated and their constructions are given.
Resumo:
New advancement in genomics, proteomics, and metabonomics created significant excitement about the use of these relatively new technologies in drug design, discovery, development, and molecular-targeted therapeutics by identifying new drug targets and better tools for safety and efficacy studies in preclinical and clinical stages of drug development as well as diagnostics. In this chapter, we will briefly discuss the application of genomics, proteomics, and metabonomics in drug discovery and development
Resumo:
Owing to their unique mechanical, electrical, optical, and thermal properties, carbon nanostructures including carbon nanotubes and graphenes show great promise for advancing the fields of biology and medicine. Many reports have demonstrated the promise of these carbon nanostructures and their hybrid structures (composites with polymers, ceramics, and metal nanoparticles, etc.) for a variety of biomedical areas ranging from biosensing, drug delivery, and diagnostics, to cancer treatment, tissue engineering, and bioterrorism prevention. However, the issue of the safety and toxicity of these carbon nanostructures, which is vital to their use as diagnostic and therapeutic tools in biomedical fields, has not been completely resolved. This paper aims to provide a summary of the features of carbon nanotube and graphene-based materials and current research progress in biomedical applications. We also highlight the current opinions within the scientific community on the toxicity and safety of these carbon structures.
Resumo:
Realizing the promise of molecularly targeted inhibitors for cancer therapy will require a new level of knowledge about how a drug target is wired into the control circuitry of a complex cellular network. Here we review general homeostatic principles of cellular networks that enable the cell to be resilient in the face of molecular perturbations, while at the same time being sensitive to subtle input signals. Insights into such mechanisms may facilitate the development of combination therapies that take advantage of the cellular control circuitry, with the aim of achieving higher efficacy at a lower drug dosage and with a reduced probability of drug-resistance development.
Resumo:
An increasing range of services are now offered via online applications and e-commerce websites. However, problems with online services still occur at times, even for the best service providers due to the technical failures, informational failures, or lack of required website functionalities. Also, the widespread and increasing implementation of web services means that service failures are both more likely to occur, and more likely to have serious consequences. In this paper we first develop a digital service value chain framework based on existing service delivery models adapted for digital services. We then review current literature on service failure prevention, and provide a typology of technolo- gies and approaches that can be used to prevent failures of different types (functional, informational, system), that can occur at different stages in the web service delivery. This makes a contribution to theory by relating specific technologies and technological approaches to the point in the value chain framework where they will have the maximum impact. Our typology can also be used to guide the planning, justification and design of robust, reliable web services.
Resumo:
Child sexual abuse is a serious problem that has received increased attention in recent years. From an ecological perspective, in which social problems are viewed in the context of characteristics of individuals, families, and broader societal systems (Prilleltensky, Peirson, & Nelson, 2001), preventing child sexual abuse involves strengthening capacity to intervene at individual, family/relationship, school, and community levels. School-based education programs have been developed in efforts to prevent child sexual abuse before it happens and to provide children who may already be experiencing it with help seeking information. Use of these programs must be based on evidence rather than ideology. Evaluations of these programs have demonstrated that sexual abuse prevention education can provide children with improved knowledge and skills for responding to and reporting potential sexual abuse. However, this learning does not seem to be maintained over time which means further attention should be given to repeated learning, opportunities for concept reinforcement and integration with other topics. School-based programs typically present information to children by presenting a series of core concepts and messages which are delivered using engaging pedagogical strategies such as multi-media technologies, animations, theatre and songs, puppets, picture books, and games. This chapter will outline the key characteristics of effective child sexual abuse prevention programs, and will provide directions for future research and practice.
Resumo:
Unsafe road behaviors, violence and alcohol use, are primary contributors to adolescent injury. Research suggests that adolescents look out for their friends and engage in protective behavior to reduce others' risk-taking and that school connectedness is associated with reduced injury-risks. This study examined the role of school connectedness in willingness to protect and prevent friends from involvement in alcohol use, fights and unlicensed driving. Surveys were completed at two time points, six months apart, by 545 13-14 year olds from seven Australian high schools. Females were significantly more likely than males to report willingness to protect their friends. School connectedness significantly and positively predicted willingness to protect across all three injury-risk behaviors, after accounting for sex and own involvement in injury-risk behaviors. School connectedness may therefore be an important factor to target in school-based prevention programs, both to reduce adolescents' own injury-risk behavior and to increase injury prevention among friends.
Resumo:
We show that imatinib, nilotinib, and dasatinib possess weak off-target activity against RAF and, therefore, drive paradoxical activation of BRAF and CRAF in a RAS-dependent manner. Critically, because RAS is activated by BCR-ABL, in drug-resistant chronic myeloid leukemia (CML) cells, RAS activity persists in the presence of these drugs, driving paradoxical activation of BRAF, CRAF, MEK, and ERK, and leading to an unexpected dependency on the pathway. Consequently, nilotinib synergizes with MEK inhibitors to kill drug-resistant CML cells and block tumor growth in mice. Thus, we show that imatinib, nilotinib, and dasatinib drive paradoxical RAF/MEK/ERK pathway activation and have uncovered a synthetic lethal interaction that can be used to kill drug-resistant CML cells in vitro and in vivo.
Resumo:
Introduction With the ever-increasing global burden of retinal disease, there is an urgent need to vastly improve formulation strategies that enhance posterior eye delivery of therapeutics. Despite intravitreal administration having demonstrated notable superiority over other routes in enhancing retinal drug availability, there still exist various significant physical/biochemical barriers preventing optimal drug delivery into the retina. A further complication lies with an inability to reliably translate laboratory-based retinal models into a clinical setting. Several formulation approaches have recently been evaluated to improve intravitreal therapeutic outcomes, and our aim in this review is to highlight strategies that hold the most promise. Areas covered We discuss the complex barriers faced by the intravitreal route and examine how formulation strategies including implants, nanoparticulate carriers, viral vectors and sonotherapy have been utilized to attain both sustained delivery and enhanced penetration through to the retina. We conclude by highlighting the advances and limitations of current in vitro, ex vivo and in vivo retinal models in use by researchers globally. Expert opinion Various nanoparticle compositions have demonstrated the ability to overcome the retinal barriers successfully; however, their utility is limited to the laboratory setting. Optimization of these formulations and the development of more robust experimental retinal models are necessary to translate success in the laboratory into clinically efficacious outcomes.