902 resultados para Level of program implementation


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The purpose of this project was to determine the feasibility of using pavement condition data collected for the Iowa Pavement Management Program (IPMP) as input to the Iowa Quadrennial Need Study. The need study, conducted by the Iowa Department of Transportation (Iowa DOT) every four years, currently uses manually collected highway infrastructure condition data (roughness, rutting, cracking, etc.). Because of the Iowa DOT's 10-year data collection cycles, condition data for a given highway segment may be up to 10 years old. In some cases, the need study process has resulted in wide fluctuations in funding allocated to individual Iowa counties from one study to the next. This volatility in funding levels makes it difficult for county engineers to plan and program road maintenance and improvements. One possible remedy is to input more current and less subjective infrastructure condition data. The IPMP was initially developed to satisfy the Intermodal Surface Transportation Efficiency Act (ISTEA) requirement that federal-aid-eligible highways be managed through a pavement management system. Currently all metropolitan planning organizations (MPOs) in Iowa and 15 of Iowa's 18 RPAs participate in the IPMP. The core of this program is a statewide data base of pavement condition and construction history information. The pavement data are collected by machine in two-year cycles. Using pilot areas, researchers examined the implications of using the automated data collected for the IPMP as input to the need study computer program, HWYNEEDS. The results show that using the IPMP automated data in HWYNEEDS is feasible and beneficial, resulting in less volatility in the level of total need between successive quadrennial need studies. In other words, the more current the data, the smaller the shift in total need.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: Enhanced Recovery After Surgery (ERAS) clinical pathways in¦colorectal surgery are known to reduce postoperative complications leading¦to shortened hospital stay. However, the implementation of such an ERAS¦pathway requires time and financial investment. This study evaluates whether¦the savings related to the reduction in the length of stay (LOS) outweigh the¦costs of implementing an ERAS pathway.¦Methods: An ERAS pathway was implemented in our institution for colorectal¦surgery. The first 50 consecutive patients subjected to this ERAS pathway¦(ERAS group) were compared to 50 consecutive patients that were operated one¦year before its introduction (control group). Primary LOS, readmission within¦30 days, and total costs based on costs per day were compared. The mean costs¦per day were: 3,263 CHF for intensive care, 1,152 CHF for intermediate care,¦and 728 CHF for basic care.¦Results: Primary LOS was shorter in the ERAS group than in the control¦group: median 7 (interquartile range 5-12·25) versus 10 (7-18) days (P =¦0·0025). The readmission within 30 postoperative days was similar in both¦groups (2 patients each). In the ERAS group, the added primary LOS was¦485 days (379 in basic care, 99 in intermediate care, 7 in intensive care) compared¦to 706 days in the control group (533 in basic care, 146 in intermediate care,¦27 in intensive care). The total costs were significantly lower for the 50 ERAS¦patients compared to the control group: 412,801 CHF versus 644,317 CHF (P <¦0·01). Investments required for the 50 first ERAS patients were approximately¦83,544 CHF, including 348 working hours as well a full-time ERAS dedicated¦nurse. The overall cost saving was approximately 2,959 CHF per patient.¦Conclusion: Implementation of an ERAS pathway significantly reduced LOS¦after colorectal surgery. The financial investment to introduce and maintain¦such a pathway is clearly inferior to the cost-saving of reduced hospital stay.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

[spa] Los programas de formación continuada a distancia para jueces presentan problemas de ejecución debido de un lado a la dispersión geográfica de los destinatarios y de otra, a la necesidad de alcanzar cierto nivel de competencias tanto para su uso como para su diseño. En este contexto cobran especial significación la determinación de los objetivos así como el diseño curricular del programa que se pretende ejecutar.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many governments in developing countries implement programs that aim to address nutrionalfailures in early childhood, yet evidence on the effectiveness of these interventions is scant. Thispaper evaluates the impact of a conditional food supplementation program on child mortality inEcuador. The Programa de Alimentaci?n y Nutrici?n Nacional (PANN) 2000 was implementedby regular staff at local public health posts and consisted of offering a free micronutrient-fortifiedfood, Mi Papilla, for children aged 6 to 24 months in exchange for routine health check-ups forthe children. Our regression discontinuity design exploits the fact that at its inception, the PANN2000 was running for about 8 months only in the poorest communities (parroquias) of certainprovinces. Our main result is that the presence of the program reduced child mortality in cohortswith 8 months of differential exposure from a level of about 2.5 percent by 1 to 1.5 percentagepoints.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: Determine the presence of"burnout" syndrome and characteristic personality patterns in the students and faculty of three graduate programs in Dentistry at the University of Barcelona: Department of Oral Surgery and Implantology, Department of Orthodontics and Department of Integrated Dentistry. Materials and Methods: The study was carried out in 78 dentists. The level of"burnout" was evaluated using the Maslach Burnout Inventory, socio-demographic variables and, finally, the personality test. Results: Oral surgeons constituted the group of highlevel"burnout". The profile of an individual with a propensity to"burn out" is a single man, with a median age of 27, that is in the first years of the graduate program and that combines studies with 30 hours of clinical practice and/or other work (p<0,05). Narcissistic and borderline are the types of personality most frequently found in the individuals that present"burnout" syndrome (p<0,05). Conclusions: In general, no high levels of"burnout" were registered in the studied population, only 2-3%, if applying strict definition of"burnout", and 10% if these criteria were amplified. We believe it is necessary to identify the individuals with a tendency towards"burnout", in order to establish preventive measures and avoid future negative behaviour at work as well as at the personal level.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: We assessed expectations to improve cardiovascular disease risk factors (CVD-RF) in participants to a health promotion program. PARTICIPANTS AND METHODS: Blood pressure (BP), blood glucose (BG), blood total cholesterol (TC), body mass index (BMI), and self-reported smoking were assessed in 1,598 volunteers from the general public (men: 40%; mean age: 56.7 +/- 12.7 years) participating in a mobile health promotion program in the Vaud canton, Switzerland. Participants were asked about their expectation to have their CVD-RF improved at a next visit scheduled 2-3 years later. RESULTS: Expectation for improved control was found in 90% of participants with elevated BP, 91% with elevated BG, 45% with elevated TC, 44% who were overweight, and 35% who were smoking. Expectation for TC improvement was reported more often by men, persons with high level of TC, and persons who had consulted a doctor in the past 12 months. Expectations to lose weight and to quit smoking were found more often in younger persons than the older ones. CONCLUSION: Volunteers from the general population participating in a health promotion program expected improved control more often for hypertension and dysglycemia than for dyslipidemia, overweight and smoking.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Since it is established that human chorionic gonadotropin (hCG) affects testosterone production and release in the human body, the use of this hormone as a performance enhancing drug has been prohibited by the World Anti-Doping Agency. Nowadays, the only validated biomarker of a hCG doping is its direct quantification in urine. However, this specific parameter is subjected to large inter-individual variability and its determination is directly dependent on the reliability of hCG immunoassays used. In order to counteract these weaknesses, new biomarkers need to be evidenced. To address this issue, a pilot clinical study was performed on 10 volunteers submitted to 3 subsequent hCG injections. Blood and urine samples were collected during two weeks in order to follow the physiological effects on related compounds such as the steroid profile or hormones involved in the hypothalamo-pituitary axis. The hCG pharmacokinetic observed in all subjects was, as expected, prone to important inter-individual variations. Using ROC plots, level of testosterone and testosterone on luteinizing hormone ratio in both blood and urine were found to be the most relevant biomarker of a hCG abuse, regardless of inter-individual variations. In conclusion, this study showed the crucial importance of reliable quantification methods to assess low differences in hormonal patterns. In regard to these results and to anti-doping requirements and constraints, blood together with urine matrix should be included in the anti-doping testing program. Together with a longitudinal follow-up approach it could constitute a new strategy to detect a hCG abuse, applicable to further forms of steroid or other forbidden drug manipulation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective. Collaborative quality improvement programs have been successfully used to manage chronic diseases in adults and acute lung complications in premature infants. Their effectiveness to improve pain management in acute care hospitals is currently unknown. The purpose of this study was to determine whether a collaborative quality improvement program implemented at hospital level could improve pain management and overall pain relief. Design.To assess the effectiveness of the program, we performed a before-after trial comparing patient's self-reported pain management and experience before and after program implementation. We included all adult patients hospitalized for more than 24 hours and discharged either to their home or to a nursing facility, between March 1, 2001 and March 31, 2001 (before program implementation) and between September 15, 2005 and October 15, 2005 (after program implementation). Setting.A teaching hospital of 2,096 beds in Geneva, Switzerland. Patients.All adult patients hospitalized for more than 24 hours and discharged between 1 to 31 March 2001 (before program) and 15 September to 15 October 2005 (after program implementation). Interventions.Implementation of a collaborative quality improvement program using multifaceted interventions (staff education, opinion leaders, patient education, audit, and feedback) to improve pain management at hospital level. Outcome Measures.Patient-reported pain experience, pain management, and overall hospital experience based on the Picker Patient Experience questionnaire, perceived health (SF-36 Health survey). Results.After implementation of the program only 2.3% of the patients reported having no pain relief during their hospital stay (vs 4.5% in 2001, P = 0.05). Among nonsurgical patients, improvements were observed for pain assessment (42.3% vs 27.9% of the patients had pain intensity measured with a visual analog scale, P = 0.012), pain management (staff did everything they could to help in 78.9% vs 67.9% of cases P = 0.003), and pain relief (70.4% vs 57.3% of patients reported full pain relief P = 0.008). In surgical patients, pain assessment also improved (53.7.3% vs 37.6%) as well as pain treatment. More patients received treatments to relieve pain regularly or intermittently after program implementation (95.1% vs 91.9% P = 0.046). Conclusion.Implementation of a collaborative quality improvement program at hospital level improved both pain management and pain relief in patients. Further studies are needed to determine the overall cost-effectiveness of such programs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Efforts to improve safety and traffic flow through merge areas on high volume/high speed roadways have included early merge and late merge concepts and several studies of the effectiveness of these concepts, many using Intelligent Transportation Systems for implementation. The Iowa Department of Transportation (Iowa DOT) planned to employ a system of dynamic message signs (DMS) to enhance standard temporary traffic control for lane closures and traffic merges at two bridge construction projects in western Iowa (Adair County and Cass County counties) on I-80 during the 2008 construction season. To evaluate the DMS system’s effectiveness for impacting driver merging actions, the Iowa DOT contracted with Iowa State University’s Center for Transportation Research and Education to perform the evaluation and make recommendations for future use of this system based on the results. Data were collected over four weekends, beginning August 1–4 and ending October 16–20, 2008. Two weekends yielded sufficient data for evaluation, one of transition traffic flow and the other with a period of congestion. For both of these periods, a statistical review of collected data did not indicate a significant impact on driver merging actions when the DMS messaging was activated as compared to free flow conditions with no messaging. Collection of relevant project data proved to be problematic for several reasons. In addition to personnel safety issues associated with the placement and retrieval of counting devices on a high speed roadway, unsatisfactory equipment performance and insufficient congestion to activate the DMS messaging hampered efforts. A review of the data that was collected revealed different results taken by the tube counters compared to the older model plate counters. Although variations were not significant from a practical standpoint, a statistical evaluation showed that the data, including volumes, speeds, and classifications from the two sources were not comparable at a 95% level of confidence. Comparison of data from the Iowa DOT’s automated traffic recorders (ATRs) in the area also suggested variations in results from these data collection systems. Additional comparison studies were recommended.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the construction industry, Hispanics have the highest rate of fatal work injuries among the racial/ethnic groups, and productivity in the field is limited by the language barrier between Hispanic workers and their supervisors and the level of education of many Hispanic craft workers. This research developed a training program designed to facilitate the integration process between American supervisors and Hispanic craft workers in a practical and cost-effective way, thus improving productivity and lowering fatality rates. The Iowa State University research team conducted a survey of 38 American supervisors, representing 14 Iowa construction companies. Survey results confirm that communication is the main problem experienced by American supervisors in the job site. Many American supervisors also use or depend on a link-person (an individual who interprets tasks to the rest of the Hispanic crew) to communicate to the Hispanic crew members. Research findings show that language differences affect productivity and workplace safety in the construction industry. Additionally, the educational levels of Hispanic workers indicate that they may not have the literacy skills necessary to understand training materials. This research developed two training courses designed to expand the Spanish communication skills of American supervisors. The research team modified the English-as-a-second-language course developed in Phase I into the Spanish as a Second Language (SSL) Survival Course. A series of technical training courses were also developed, titled Concrete Pavement Construction Basics (CPCB), that cover general practices in concrete pavement construction. They are much shorter and more specialized than the SSL course. The CPCB courses provide American supervisors simple and practical communication tools on a variety of topics to choose from according to their specific needs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many state, county, and local agencies are faced with deteriorating bridge infrastructure composed of a large percentage of relatively short to medium span bridges. In many cases, these older structures are rolled or welded longitudinal steel stringers acting compositely with a reinforced concrete deck. Most of these bridges, although still in service, need some level of strengthening due to increases in legal live loads or loss of capacity due to deterioration. Although these bridges are overstressed in most instances, they do not warrant replacement; thus, structurally efficient but cost-effective means of strengthening needs to be employed. In the past, the use of bolted steel cover plates or angles was a common retrofit option for strengthening such bridges. However, the time and labor involved to attach such a strengthening system can sometimes be prohibitive. This project was funded through the Federal Highway Administration’s Innovative Bridge Research and Construction program. The goal is to retrofit an existing structurally deficient, three-span continuous steel stringer bridge using an innovative technique that involves the application of post-tensioning forces; the post-tensioning forces were applied using fiber reinforced polymer post-tensioning bars. When compared to other strengthening methods, the use of carbon fiber reinforced polymer composite materials is very appealing in that they are highly resistant to corrosion, have a low weight, and have a high tensile strength. Before the post-tensioning system was installed, a diagnostic load test was conducted on the subject bridge to establish a baseline behavior of the unstrengthened bridge. During the process of installing the post-tensioning hardware and stressing the system, both the bridge and the post-tensioning system were monitored. The installation of the hardware was followed by a follow-up diagnostic load test to assess the effectiveness of the post-tensioning strengthening system. Additional load tests were performed over a period of two years to identify any changes in the strengthening system with time. Laboratory testing of several typical carbon fiber reinforced polymer bar specimens was also conducted to more thoroughly understand their behavior. This report documents the design, installation, and field testing of the strengthening system and bridge.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tissue protein hypercatabolism (TPH) is a most important feature in cancer cachexia, particularly with regard to the skeletal muscle. The rat ascites hepatoma Yoshida AH-130 is a very suitable model system for studying the mechanisms involved in the processes that lead to tissue depletion, since it induces in the host a rapid and progressive muscle waste mainly due to TPH (Tessitore, L., G. Bonelli, and F. M. Baccino. 1987. Biochem. J. 241:153-159). Detectable plasma levels of tumor necrosis factor-alpha associated with marked perturbations in the hormonal homeostasis have been shown to concur in forcing metabolism into a catabolic setting (Tessitore, L., P. Costelli, and F. M. Baccino. 1993. Br. J. Cancer. 67:15-23). The present study was directed to investigate if beta 2-adrenergic agonists, which are known to favor skeletal muscle hypertrophy, could effectively antagonize the enhanced muscle protein breakdown in this cancer cachexia model. One such agent, i.e., clenbuterol, indeed largely prevented skeletal muscle waste in AH-130-bearing rats by restoring protein degradative rates close to control values. This normalization of protein breakdown rates was achieved through a decrease of the hyperactivation of the ATP-ubiquitin-dependent proteolytic pathway, as previously demonstrated in our laboratory (Llovera, M., C. García-Martínez, N. Agell, M. Marzábal, F. J. López-Soriano, and J. M. Argilés. 1994. FEBS (Fed. Eur. Biochem. Soc.) Lett. 338:311-318). By contrast, the drug did not exert any measurable effect on various parenchymal organs, nor did it modify the plasma level of corticosterone and insulin, which were increased and decreased, respectively, in the tumor hosts. The present data give new insights into the mechanisms by which clenbuterol exerts its preventive effect on muscle protein waste and seem to warrant the implementation of experimental protocols involving the use of clenbuterol or alike drugs in the treatment of pathological states involving TPH, particularly in skeletal muscle and heart, such as in the present model of cancer cachexia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tissue protein hypercatabolism (TPH) is a most important feature in cancer cachexia, particularly with regard to the skeletal muscle. The rat ascites hepatoma Yoshida AH-130 is a very suitable model system for studying the mechanisms involved in the processes that lead to tissue depletion, since it induces in the host a rapid and progressive muscle waste mainly due to TPH (Tessitore, L., G. Bonelli, and F. M. Baccino. 1987. Biochem. J. 241:153-159). Detectable plasma levels of tumor necrosis factor-alpha associated with marked perturbations in the hormonal homeostasis have been shown to concur in forcing metabolism into a catabolic setting (Tessitore, L., P. Costelli, and F. M. Baccino. 1993. Br. J. Cancer. 67:15-23). The present study was directed to investigate if beta 2-adrenergic agonists, which are known to favor skeletal muscle hypertrophy, could effectively antagonize the enhanced muscle protein breakdown in this cancer cachexia model. One such agent, i.e., clenbuterol, indeed largely prevented skeletal muscle waste in AH-130-bearing rats by restoring protein degradative rates close to control values. This normalization of protein breakdown rates was achieved through a decrease of the hyperactivation of the ATP-ubiquitin-dependent proteolytic pathway, as previously demonstrated in our laboratory (Llovera, M., C. García-Martínez, N. Agell, M. Marzábal, F. J. López-Soriano, and J. M. Argilés. 1994. FEBS (Fed. Eur. Biochem. Soc.) Lett. 338:311-318). By contrast, the drug did not exert any measurable effect on various parenchymal organs, nor did it modify the plasma level of corticosterone and insulin, which were increased and decreased, respectively, in the tumor hosts. The present data give new insights into the mechanisms by which clenbuterol exerts its preventive effect on muscle protein waste and seem to warrant the implementation of experimental protocols involving the use of clenbuterol or alike drugs in the treatment of pathological states involving TPH, particularly in skeletal muscle and heart, such as in the present model of cancer cachexia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tissue protein hypercatabolism (TPH) is a most important feature in cancer cachexia, particularly with regard to the skeletal muscle. The rat ascites hepatoma Yoshida AH-130 is a very suitable model system for studying the mechanisms involved in the processes that lead to tissue depletion, since it induces in the host a rapid and progressive muscle waste mainly due to TPH (Tessitore, L., G. Bonelli, and F. M. Baccino. 1987. Biochem. J. 241:153-159). Detectable plasma levels of tumor necrosis factor-alpha associated with marked perturbations in the hormonal homeostasis have been shown to concur in forcing metabolism into a catabolic setting (Tessitore, L., P. Costelli, and F. M. Baccino. 1993. Br. J. Cancer. 67:15-23). The present study was directed to investigate if beta 2-adrenergic agonists, which are known to favor skeletal muscle hypertrophy, could effectively antagonize the enhanced muscle protein breakdown in this cancer cachexia model. One such agent, i.e., clenbuterol, indeed largely prevented skeletal muscle waste in AH-130-bearing rats by restoring protein degradative rates close to control values. This normalization of protein breakdown rates was achieved through a decrease of the hyperactivation of the ATP-ubiquitin-dependent proteolytic pathway, as previously demonstrated in our laboratory (Llovera, M., C. García-Martínez, N. Agell, M. Marzábal, F. J. López-Soriano, and J. M. Argilés. 1994. FEBS (Fed. Eur. Biochem. Soc.) Lett. 338:311-318). By contrast, the drug did not exert any measurable effect on various parenchymal organs, nor did it modify the plasma level of corticosterone and insulin, which were increased and decreased, respectively, in the tumor hosts. The present data give new insights into the mechanisms by which clenbuterol exerts its preventive effect on muscle protein waste and seem to warrant the implementation of experimental protocols involving the use of clenbuterol or alike drugs in the treatment of pathological states involving TPH, particularly in skeletal muscle and heart, such as in the present model of cancer cachexia.