13 resultados para Borel-Leroy summability

em Aston University Research Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Release of cytochrome c from mitochondria is a major event during apoptosis. Released cytochrome c has been shown to activate caspase-dependent apoptotic signals. In this report, we provide evidence for a novel role of cytochrome c in caspase-independent nuclear apoptosis. We showed that cytochrome c, released from mitochondria upon apoptosis induction, gradually accumulates in the nucleus as evidenced by both immunofluorescence and subcellular fractionation. Parallel to nuclear accumulation of cytochrome c, acetylated histone H2A, but not unmodified H2A, was released from the nucleus to the cytoplasm. Addition of purified cytochrome c to isolated nuclei recapitulated the preferential release of acetylated, but not deacetylated, histone H2A. Cytochrome c was also found to induce chromatin condensation. These results suggest that the nuclear accumulation of cytochrome c may be directly involved in the remodeling of chromatin. Our results provide evidence of a novel role for cytochrome c in inducing nuclear apoptosis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

N-Heterocyclic cations are incorporated into proteins using 5-(2-bromoethyl)phenanthridinium bromide, which selectively reacts with either cysteine or lysine residues, resulting in ethylphenanthridinium (Phen) or highly stable cyclised dihydro-imidazo-phenanthridinium (DIP) adducts respectively; these modifications have been found to manipulate the observed structure of lysozyme and bovine serum albumin by AFM.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last few years governments, law enforcement agencies, and the media have noted increases of online harassment. Although there has been a great deal of research into 'offline stalking', at this moment in time there has been no formal research that attempts to classify cyberstalkers. This study aimed to identify a classification of cyberstalkers by interviewing victims. Twenty-four participants were interviewed and their responses logged on a 76-item Cyberstalking Incident Checklist. A typology of cyberstalkers was developed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents the first academic case study of a UK cyberstalking incident that involved an individual known to have harassed at least four victims. The case study describes how the harasser selected victims, his use of technology to gather confidential information about them and his use of multiple personalities as part of the process of harassment. The discussion section of the paper raises a broad range of issues, including whether the case represents a genuine cyberstalking incident, how technology was used to assist the harasser's activities and how the harasser attempted to avoid detection

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The advent of the internet has led to the new phenomenon of ‘cyberstalking’. This paper examines the extent of this problem. It is argued that all of the estimates commonly cited are flawed because they rely on inaccurate or outdated information or are based on a number of unproven assumptions. Although some estimates suggest that there may be as many as 10 million victims in the United States and Canada alone, available evidence supports a far smaller estimate. It is concluded that additional research is needed to arrive at more accurate and reliable estimates

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article discusses the emergence of cyberstalking as a means of victimising individuals and minority groups. However, rather than focusing on the activities of far-right groups, we discuss how technology can encourage individuals to harass others. The central argument made is that technology both enables and invites participation in criminal or antisocial behaviour from individuals who would not normally take part in such activities. One way in which this can be explained is by suggesting that some of the social and technological characteristics of the Internet act together in order to lower inhibitions and establish new norms. For instance, the anonymity offered by the Internet enables people to participate in activities such as encouraging violence against others with little fear of retaliation. In addition, by allowing a cyberstalker to harm another person at a distance, the victim is effectively depersonalised. In this way it can be argued that some of those who sympathise with the goals of far-right organisations may be reluctant to act in the offline world but more willing to act in the online world.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet poses a number of threats to the safety of young people. Using numerous examples, this article discusses a wide range of such threats, including: cyberstalking; the 'grooming' of potential victims of sexual abuse; a new 'wish list' scene (where teenagers encourage contact with potential abusers); the creation and distribution of child pornography; and the emergence of services that create child pornography to order. It is suggested that the latter has provided individuals with the ability to inflict sexual abuse on young people from a distance, an act the authors have termed virtual sex tourism. The final section of the article suggests that paedophiles and pornographers have been quick to adopt new technology as a means of concealing their activities. The article concludes by warning of the danger of overestimating or underestimating the threats described.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Case studies which provide evidence of growing problem of cyberstalking and illustrate different ways in which victims suffer, and consideration of whether media has exaggerated problem of cyberstalking.