123 resultados para CANCER-RISK ASSESSMENT


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Resistant starch is dietary starch that passes undigested into the colon where it can have effects similar to non-starch polysaccharide (dietary fibre). The results support the potential health benefits of incorporating foods containing high levels of both resistant starch and non-starch polysaccharide, such as whole grain breads and legumes, as part of well balanced diets containing fruit, vegetables, cereals, meat/alternatives and dairy foods.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background - Alterations in folate status are associated with colorectal carcinogenesis. Folate’s role has been postulated to be either via prevention of changes in DNA methylation or uracil misincorporation.
Objective - To investigate the effect of folic acid supplementation on colonocyte folate status and DNA biomarkers.
Design - Twenty individuals harbouring colonic adenomas were randomised to receive folic acid (600 g daily) or placebo for 6 months post polypectomy. Systemic and colonocyte folate status was determined at baseline and following the intervention. Modified Comet assays were used to determine uracil misincorporation and global DNA hypomethylation at the site adjacent to the polyp and a site distal to the polyp.
Outcomes - Supplementation resulted in increased colonocyte folate, which approached significance, at the site adjacent to the polyp (P= 0.06) but not distal to the polyp (P= 0.36); correspondingly there was a reduction in uracil misincorporation at the site adjacent to the polyp (P = 0.02) and the distal site showed no such trend (P= 0.39). There were no significant changes in global DNA hypomethylation at either site post-intervention.
Conclusions - Folic acid supplementation resulted in increased colonocyte folate and decreased uracil misincorporation at the site of the adenoma but not distal to the adenoma. This supports the hypothesis that localised areas of folate deficiency may exist in human colonic mucosa which respond to folic acid supplementation through increasing colonocyte folate and improving folate-related DNA biomarkers of cancer risk.


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Different European institutions have developed mathematical models to propose maximum safe levels either for fortified foods or for dietary supplements. The objective of the present study was to compare and check the safety of these different maximum safe levels (MSL) by using a probabilistic risk assessment approach. The potential maximum nutritional intakes were estimated by taking into account all sources of intakes (base diet, fortified foods and dietary supplements) and compared with the tolerable upper intake levels for vitamins and minerals. This approach simulated the consequences of both food fortification and supplementation in terms of food safety. Different scenarios were tested. They are the result of the combination of several MSL obtained using the previous models. The study was based on the second French Individual and National Study on Food Consumption performed in 2006–7, matched with the French food nutritional composition database. The analyses were based on a sample of 1918 adults aged 18–79 years. Some MSL in fortified foods and dietary supplements obtained independently were protective enough, although some others could lead to nutritional intakes above the tolerable upper intake levels. The simulation showed that it is crucial to consider the inter-individual variability of fortified food intakes when setting MSL for foods and supplements. The risk assessment approach developed here by integrating the MSL for fortified foods and dietary supplements is useful for ensuring consumer protection. It may be subsequently used to test any other MSL for vitamins and minerals proposed in the future.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Although females represent a small proportion of the sex offender population, they occasionally appear before the courts under the current generation of laws intended to protect the public from high-risk sex offenders. In this context, practitioners are called upon to provide assessment of the risk these women pose for sexual re-offending. The primary issues addressed in this paper are related to the validity of conducting such risk assessments and providing professional opinions as to the risk of further sexual offences that may be committed by female offenders. The approach taken is to summarize briefly the available professional literature regarding female sex offenders, and then to present the findings of the relatively few empirical studies that address sexual recidivism in females. The final section examines the positions taken in the published works of various international experts regarding risk assessment with females, followed by conclusions and recommendations in light of the standards typically prescribed by community protection laws.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There are two fundamental challenges in effectively performing security risk assessment in today's IT projects.The first is the project manager's need to know what IT security risks face the project before the project begins. At this stage IT security staff are unable to answer this question without first knowing the system requirements for the project which are yet to be defined. Second organisations that deal with a large project throughput each year find the current IT security risk assessment process to be tedious and expensive, especially when the same process has to be repeated for each individual project. This also makes it difficult for an organisation to prioritise which projects require more investment in IT security in order to fit within budget constraints. This paper presents a conceptual model that is based on an agile approach to alleviate these challenges. We do this by first analysing two online database resources of vulnerabilities by comparing them to each other, and then compare them to the agile criteria of the conceptual model which we define. The conceptual model is then presented and an example is given of how it can be applied to an actual project. We then briefly discuss what further work needs to be done to implement the conceptual model and validate it against an existing IT project.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The current information security standards still advocate the use of risk assessment in the prioritisation of security investments. However, prior research on the use of risk assessment methodologies in organisational security has shown that the use of the traditional monolithic risk assessment process described in the current risk management standard is simply not practical at the organisational level. This paper first examines the problems in performing a systematic risk assessment and then discusses the limitations of a traditional risk assessment. To address these limitations, this paper proposes splitting up the current monolithic risk assessment process. The result is an information security assessment framework that puts greater emphasis on situational awareness and allows for better decision making on the prioritization of security investments.