946 resultados para Related Key Attack


Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Background and purpose - The N-terminus of calcitonin gene-related peptide (CGRP) is important for receptor activation, especially the disulphide-bonded ring (residues 1-7). However, the roles of individual amino acids within this region have not been examined and so the molecular determinants of agonism are unknown. This study has examined the role of residues 1, 3-6 and 8-9, excluding Cys-2 and Cys-7. Experimental approach - CGRP derivatives were substituted with either cysteine or alanine; further residues were introduced at position 6. Their affinity was measured by radioligand binding and their efficacy by measuring cAMP production in SK-N-MC cells and ß-arrestin 2 translocation in CHO-K1 cells at the CGRP receptor. Key results - Substitution of Ala-5 by cysteine reduced affinity 270-fold and reduced efficacy for production of cAMP in SK-N-MCs. Potency at ß-arrestin translocation was reduced by 9-fold. Substitution of Thr-6 by cysteine destroyed all measurable efficacy of both cAMP and ß-arrestin responses; substitution with either alanine or serine impaired potency. Substitutions at positions 1, 4, 8 and 9 resulted in approximately 10-fold reductions in potency at both responses. Similar observations were made at a second CGRP-activated receptor, the AMY1(a) receptor. Conclusions and implications - Ala-5 and Thr-6 are key determinants of agonist activity for CGRP. Ala-5 is also very important for receptor binding. Residues outside of the 1-7 ring also contribute to agonist activity.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In 2013 the European Commission launched its new green infrastructure strategy to make another attempt to stop and possibly reverse the loss of biodiversity until 2020, by connecting habitats in the wider landscape. This means that conservation would go beyond current practices to include landscapes that are dominated by conventional agriculture, where biodiversity conservation plays a minor role at best. The green infrastructure strategy aims at bottom-up rather than top-down implementation, and suggests including local and regional stakeholders. Therefore, it is important to know which stakeholders influence land-use decisions concerning green infrastructure at the local and regional level. The research presented in this paper served to select stakeholders in preparation for a participatory scenario development process to analyze consequences of different implementation options of the European green infrastructure strategy. We used a mix of qualitative and quantitative social network analysis (SNA) methods to combine actors’ attributes, especially concerning their perceived influence, with structural and relational measures. Further, our analysis provides information on institutional backgrounds and governance settings for green infrastructure and agricultural policy. The investigation started with key informant interviews at the regional level in administrative units responsible for relevant policies and procedures such as regional planners, representatives of federal ministries, and continued at the local level with farmers and other members of the community. The analysis revealed the importance of information flows and regulations but also of social pressure, considerably influencing biodiversity governance with respect to green infrastructure and biodiversity.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

It has been proposed that body image disturbance is a form of cognitive bias wherein schemas for self-relevant information guide the selective processing of appearancerelated information in the environment. This threatening information receives disproportionately more attention and memory, as measured by an Emotional Stroop and incidental recall task. The aim of this thesis was to expand the literature on cognitive processing biases in non-clinical males and females by incorporating a number of significant methodological refinements. To achieve this aim, three phases of research were conducted. The initial two phases of research provided preliminary data to inform the development of the main study. Phase One was a qualitative exploration of body image concerns amongst males and females recruited through the general community and from a university. Seventeen participants (eight male; nine female) provided information on their body image and what factors they saw as positively and negatively impacting on their self evaluations. The importance of self esteem, mood, health and fitness, and recognition of the social ideal were identified as key themes. These themes were incorporated as psycho-social measures and Stroop word stimuli in subsequent phases of the research. Phase Two involved the selection and testing of stimuli to be used in the Emotional Stroop task. Six experimental categories of words were developed that reflected a broad range of health and body image concerns for males and females. These categories were high and low calorie food words, positive and negative appearance words, negative emotion words, and physical activity words. Phase Three addressed the central aim of the project by examining cognitive biases for body image information in empirically defined sub-groups. A National sample of males (N = 55) and females (N = 144), recruited from the general community and universities, completed an Emotional Stroop task, incidental memory test, and a collection of psycho-social questionnaires. Sub-groups of body image disturbance were sought using a cluster analysis, which identified three sub-groups in males (Normal, Dissatisfied, and Athletic) and four sub-groups in females (Normal, Health Conscious, Dissatisfied, and Symptomatic). No differences were noted between the groups in selective attention, although time taken to colour name the words was associated with some of the psycho-social variables. Memory biases found across the whole sample for negative emotion, low calorie food, and negative appearance words were interpreted as reflecting the current focus on health and stigma against being unattractive. Collectively these results have expanded our understanding of processing biases in the general community by demonstrating that the processing biases are found within non-clinical samples and that not all processing biases are associated with negative functionality

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Manufacture, construction and use of buildings and building materials make a significant environmental impact internally (inside the building), locally (neighbourhood) and globally. Life cycle assessment (LCA) methodology is being applied for evaluating the environmental impact of building/or building materials. One of the major applications of LCA is to identify key issues of a product system from cradle to grave. Key issues identified in an LCA lead one to the right direction in assessing the environmental aspects of a product system and help to identify the areas for improvement of the environmental performance of a product as well. The purpose of this paper is to suggest two methods for identifying key issues using an integrated tool (LCADesign), which has been developed to provide a method of determining the best alternative for reducing environmental impacts from a building or building materials, and compare both methods in the case study. This paper assists the designers or marketers related to building or building materials in their decision making by giving information on activities or alternatives which are identified as key issues for environmental impacts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. In this paper, a key management scheme is proposed to defeat node capture attack by offering both forward and backward secrecies. Our scheme overcomes the pitfalls which Nilsson et al.'s scheme suffers from, and is not more expensive than their scheme.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper reports on part of a study which was aimed at assessing the views of leading researchers, theorists or clinicians working in the field of bereavement on key issues including, as reported here, concepts of different forms of grief as well as favoured theoretical orientations. Of a range of conceptual models the most favoured, by a large margin, were attachment theory and the psychodynamic model. The views of the “experts’ were canvassed with respect to the use of seven selected terms used to denote some variant of the grieving process. There was, on the part of the respondents, reasonable support for the syndromes of “delayed’, “chronic’, “anticipatory’ and “absent’ grief. “Inhibited’ and “unresolved’ grief tended to be described using one of the four terms already supported, while the use of the term “distorted grief’ attracted little support.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper aimed to explore the proportion associated with the perceived importance and the actual use of performance indicators from manufacturing and non manufacturing industries. The sample was 86 small and medium sized-organizations in Thailand. The perceived importance and the actual use of financial and non financial indicators were found to be significantly related among manufacturing and non manufacturing industries. KPI 3, 9, and 12 (i.e. sales and sales growth; quality of products and /or services; and process time) were perceived the most importance among manufacturing managers (85.3%, 79.4% and 76.5% respectively). While KPI 6, 9, and 12 (i.e. customer satisfaction, quality of products and /or services; and process time) were perceived the most importance among non manufacturing managers (84.8%, 93.5%, and 84.8% respectively). Interestingly, the most used KPIs for manufacturing were sales and sales growth (64.7%); profit margins (61.8%); and customer satisfaction (84.8) while non manufacturing used quality products/services (60.9%); sales and sales growth (54.3%) and employee development (54.3%) respectively. Limitation and implication were also discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite the facts that vehicle incidents continue to be the most common mechanism for Australian compensated fatalities and that employers have statutory obligations to provide safe workplaces, very few organisations are proactively and comprehensively managing their work-related road risks. Unfortunately, limited guidance is provided in the existing literature to assist practitioners in managing work-related road risks. The current research addresses this gap in the literature. To explore how work-related road safety can be enhanced, three studies were conducted. Study one explored the effectiveness of a range of risk management initiatives and whether comprehensive risk management practices were associated with safety outcomes. Study two explored barriers to, and facilitators for, accepting risk management initiatives. Study three explored the influence of organisational factors on road safety outcomes to identify optimal work environments for managing road risks. To maximise the research sample and increase generalisability, the studies were designed to allow data collection to be conducted simultaneously drawing upon the same sample obtained from four Australian organisations. Data was collected via four methods. A structured document review of published articles was conducted to identify what outcomes have been observed in previously investigated work-related road safety initiatives. The documents reviewed collectively assessed the effectiveness of 19 work-related road safety initiatives. Audits of organisational practices and process operating within the four researched organisations were conducted to identify whether organisations with comprehensive work-related road risk management practices and processes have better safety outcomes than organisations with limited risk management practices and processes. Interviews were conducted with a sample of 24 participants, comprising 16 employees and eight managers. The interviews were conducted to identify what barriers and facilitators within organisations are involved in implementing work-related road safety initiatives and whether differences in fleet safety climate, stage of change and safety ownership relate to work-related road safety outcomes. Finally, questionnaires were administered to a sample of 679 participants. The questionnaires were conducted to identify which initiatives are perceived by employees to be effective in managing work-related road risks and whether differences in fleet safety climate, stage of change and safety ownership relate to work-related road safety outcomes. Seven research questions were addressed in the current research project. The key findings with respect to each of the research questions are presented below. Research question one: What outcomes have been observed in previously investigated work-related road safety initiatives? The structured document review indicated that initiatives found to be positively associated with occupational road safety both during and after the intervention period included: a pay rise; driver training; group discussions; enlisting employees as community road safety change agents; safety reminders; and group and individual rewards. Research question two: Which initiatives are perceived by employees to be effective in managing work-related road risks? Questionnaire findings revealed that employees believed occupational road risks could best be managed through making vehicle safety features standard, providing practical driver skills training and through investigating serious vehicle incidents. In comparison, employees believed initiatives including signing a promise card commitment to drive safely, advertising the organisation’s phone number on vehicles and consideration of driving competency in staff selection process would have limited effectiveness in managing occupational road safety. Research question three: Do organisations with comprehensive work-related road risk management practices and processes have better safety outcomes than organisations with limited risk management practices and processes? The audit identified a difference among the organisations in their management of work-related road risks. Comprehensive risk management practices were associated with employees engaging in overall safer driving behaviours, committing less driving errors, and experiencing less fatigue and distraction issues when driving. Given that only four organisations participated in this research, these findings should only be considered as preliminary. Further research should be conducted to explore the relationship between comprehensiveness of risk management practices and road safety outcomes with a larger sample of organisations. Research question four: What barriers and facilitators within organisations are involved in implementing work-related road safety initiatives? The interviews identified that employees perceived six organisational characteristics as potential barriers to implementing work-related road safety initiatives. These included: prioritisation of production over safety; complacency towards work-related road risks; insufficient resources; diversity; limited employee input in safety decisions; and a perception that road safety initiatives were an unnecessary burden. In comparison, employees perceived three organisational characteristics as potential facilitators to implementing work-related road safety initiatives. These included: management commitment; the presence of existing systems that could support the implementation of initiatives; and supportive relationships. Research question five: Do differences in fleet safety climate relate to work-related road safety outcomes? The interviews and questionnaires identified that organisational climates with high management commitment, support for managing work demands, appropriate safety rules and safety communication were associated with employees who engaged in safer driving behaviours. Regression analyses indicated that as participants’ perceptions of safety climate increased, the corresponding likelihood of them engaging in safer driving behaviours increased. Fleet safety climate was perceived to influence road safety outcomes through several avenues. Some of these included: the allocation of sufficient resources to manage occupational road risks; fostering a supportive environment of mutual responsibility; resolving safety issues openly and fairly; clearly communicating to employees that safety is the top priority; and developing appropriate work-related road safety policies and procedures. Research question six: Do differences in stage of change relate to work-related road safety outcomes? The interviews and questionnaires identified that participants’ perceptions of initiative effectiveness were found to vary with respect to their individual stage of readiness, with stage-matched initiatives being perceived most effective. In regards to safety outcomes, regression analyses identified that as participants’ progress through the stages of change, the corresponding likelihood of them being involved in vehicle crashes decreases. Research question seven: Do differences in safety ownership relate to work-related road safety outcomes? The interviews and questionnaires revealed that management of road risks is often given less attention than other areas of health and safety management in organisations. In regards to safety outcomes, regression analyses identified that perceived authority and perceived shared ownership both emerged as significant independent predictors of self-reported driving behaviours pertaining to fatigue and distractions. The regression models indicated that as participants’ perceptions of the authority of the person managing road risks increases, and perceptions of shared ownership of safety tasks increases, the corresponding likelihood of them engaging in driving while fatigued or multitasking while driving decreases. Based on the findings from the current research, the author makes several recommendations to assist practitioners in developing proactive and comprehensive approaches to managing occupational road risks. The author also suggests several avenues for future research in the area of work-related road safety.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The worldwide organ shortage occurs despite people’s positive organ donation attitudes. The discrepancy between attitudes and behaviour is evident in Australia particularly, with widespread public support for organ donation but low donation and communication rates. This problem is compounded further by the paucity of theoretically based research to improve our understanding of people’s organ donation decisions. This program of research contributes to our knowledge of individual decision making processes for three aspects of organ donation: (1) posthumous (upon death) donation, (2) living donation (to a known and unknown recipient), and (3) providing consent for donation by communicating donation wishes on an organ donor consent register (registering) and discussing the donation decision with significant others (discussing). The research program used extended versions of the Theory of Planned Behaviour (TPB) and the Prototype/Willingness Model (PWM), incorporating additional influences (moral norm, self-identity, organ recipient prototypes), to explicate the relationship between people’s positive attitudes and low rates of organ donation behaviours. Adopting the TPB and PWM (and their extensions) as a theoretical basis overcomes several key limitations of the extant organ donation literature including the often atheoretical nature of organ donation research, thefocus on individual difference factors to construct organ donor profiles and the omission of important psychosocial influences (e.g., control perceptions, moral values) that may impact on people’s decision-making in this context. In addition, the use of the TPB and PWM adds further to our understanding of the decision making process for communicating organ donation wishes. Specifically, the extent to which people’s registering and discussing decisions may be explained by a reasoned and/or a reactive decision making pathway is examined (Stage 3) with the novel application of the TPB augmented with the social reaction pathway in the PWM. This program of research was conducted in three discrete stages: a qualitative stage (Stage 1), a quantitative stage with extended models (Stage 2), and a quantitative stage with augmented models (Stage 3). The findings of the research program are reported in nine papers which are presented according to the three aspects of organ donation examined (posthumous donation, living donation, and providing consent for donation by registering or discussing the donation preference). Stage One of the research program comprised qualitative focus groups/interviews with university students and community members (N = 54) (Papers 1 and 2). Drawing broadly on the TPB framework (Paper 1), content analysed responses revealed people’s commonly held beliefs about the advantages and disadvantages (e.g., prolonging/saving life), important people or groups (e.g., family), and barriers and motivators (e.g., a family’s objection to donation), related to living and posthumous organ donation. Guided by a PWM perspective, Paper Two identified people’s commonly held perceptions of organ donors (e.g., altruistic and giving), non-donors (e.g., self-absorbed and unaware), and transplant recipients (e.g., unfortunate, and in some cases responsible/blameworthy for their predicament). Stage Two encompassed quantitative examinations of people’s decision makingfor living (Papers 3 and 4) and posthumous (Paper 5) organ donation, and for registering and discussing donation wishes (Papers 6 to 8) to test extensions to both the TPB and PWM. Comparisons of health students’ (N = 487) motivations and willingness for living related and anonymous donation (Paper 3) revealed that a person’s donor identity, attitude, past blood donation, and knowing a posthumous donor were four common determinants of willingness, with the results highlighting students’ identification as a living donor as an important motive. An extended PWM is presented in Papers Four and Five. University students’ (N = 284) willingness for living related and anonymous donation was tested in Paper Four with attitude, subjective norm, donor prototype similarity, and moral norm (but not donor prototype favourability) predicting students’ willingness to donate organs in both living situations. Students’ and community members’ (N = 471) posthumous organ donation willingness was assessed in Paper Five with attitude, subjective norm, past behaviour, moral norm, self-identity, and prior blood donation all significantly directly predicting posthumous donation willingness, with only an indirect role for organ donor prototype evaluations. The results of two studies examining people’s decisions to register and/or discuss their organ donation wishes are reported in Paper Six. People’s (N = 24) commonly held beliefs about communicating their organ donation wishes were explored initially in a TPB based qualitative elicitation study. The TPB belief determinants of intentions to register and discuss the donation preference were then assessed for people who had not previously communicated their donation wishes (N = 123). Behavioural and normative beliefs were important determinants of registering and discussing intentions; however, control beliefs influenced people’s registering intentions only. Paper Seven represented the first empirical test of the role of organ transplant recipient prototypes (i.e., perceptions of organ transplant recipients) in people’s (N = 465) decisions to register consent for organ donation. Two factors, Substance Use and Responsibility, were identified and Responsibility predicted people’s organ donor registration status. Results demonstrated that unregistered respondents were the most likely to evaluate transplant recipients negatively. Paper Eight established the role of organ donor prototype evaluations, within an extended TPB model, in predicting students’ and community members’ registering (n = 359) and discussing (n = 282) decisions. Results supported the utility of an extended TPB and suggested a role for donor prototype evaluations in predicting people’s discussing intentions only. Strong intentions to discuss donation wishes increased the likelihood that respondents reported discussing their decision 1-month later. Stage Three of the research program comprised an examination of augmented models (Paper 9). A test of the TPB augmented with elements from the social reaction pathway in the PWM, and extensions to these models was conducted to explore whether people’s registering (N = 339) and discussing (N = 315) decisions are explained via a reasoned (intention) and/or social reaction (willingness) pathway. Results suggested that people’s decisions to communicate their organ donation wishes may be better explained via the reasoned pathway, particularly for registering consent; however, discussing also involves reactive elements. Overall, the current research program represents an important step toward clarifying the relationship between people’s positive organ donation attitudes but low rates of organ donation and communication behaviours. Support has been demonstrated for the use of extensions to two complementary theories, the TPB and PWM, which can inform future research aiming to explicate further the organ donation attitude-behaviour relationship. The focus on a range of organ donation behaviours enables the identification of key targets for future interventions encouraging people’s posthumous and living donation decisions, and communication of their organ donation preference.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Age-related maculopathy (ARM) has remained a challenging topic with respect to its aetiology, pathomechanisms, early detection and treatment since the late 19th century when it was first described as its own entity. ARM was previously considered an inflammatory disease, a degenerative disease, a tumor and as the result of choroidal hemodynamic disturbances and ischaemia. The latter processes have been repeatedly suggested to have a key role in its development and progression. In vivo experiments under hypoxic conditions could be models for the ischaemic deficits in ARM. Recent research has also linked ARM with gene polymorphisms. It is however unclear what triggers a person's gene susceptibility. In this manuscript, a linking hypothesis between aetiological factors including ischaemia and genetics and the development of early clinicopathological changes in ARM is proposed. New clinical psychophysical and electrophysiological tests are introduced that can detect ARM at an early stage. Models of early ARM based upon hemodynamic, photoreceptor and post-receptoral deficits are described and the mechanisms by which ischaemia may be involved as a final common pathway are considered. In neovascular age-related macular degeneration (neovascular AMD), ischaemia is thought to promote release of vascular endothelial growth factor (VEGF) which induces chorioretinal neovascularisation. VEGF is critical in the maintenance of the healthy choriocapillaris. In the final section of the manuscript the documentation of the effect of new anti-VEGF treatments on retinal function in neovascular AMD is critically viewed.