928 resultados para mborayu (the spirit that unites us)


Relevância:

100.00% 100.00%

Publicador:

Resumo:

There has been a long standing desire to produce thick (up to 500 nm) cryo-sections of fully hydrated cells and tissue for high-resolution analysis in their natural state by cryo-transmission electron microscopy. Here, we present a method that can successfully produce sections (lamellas in FIB-SEM terminology) of fully hydrated, unstained cells from high-pressure frozen samples by focused ion beam (FIB) milling. The samples are therefore placed in thin copper tubes and vitrified by high-pressure freezing. For transfer, handling and subsequent milling, the tubes are placed in a novel connective device (ferrule) that protects the sample from devitrification and contamination and passes through all operation steps. A piezo driven sample positioning stage (cryo-nano-bench, CNB) with three degrees of freedom was additionally developed to enable accurate milling of frozen-hydrated lamellas. With the CNB, high-pressure frozen samples can be milled to produce either thin lamellas (<100 nm), for direct imaging by high-resolution cryo-TEM or thicker lamellas (300-500 nm) for cryo-electron tomography. The sample remains vitreous throughout the process by using the presented tools and methods. The results are an important step towards investigating larger cells and even tissue in there natural state which in the end will enable us to gain better insights into cellular processes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Five years after the 2005 Pakistan earthquake that triggered multiple mass movements, landslides continue to pose a threat to the population of Azad Kashmir, especially during heavy monsoon rains. The thousands of landslides that were triggered by the 7.6 magnitude earthquake in 2005 were not just due to a natural phenomenon but largely induced by human activities, namely, road building, grazing, and deforestation. The damage caused by the landslides in the study area (381 km2) is estimated at 3.6 times the annual public works budget of Azad Kashmir for 2005 of US$ 1 million. In addition to human suffering, this cost constitutes a significant economic setback to the region that could have been reduced through improved land use and risk management. This article describes interdisciplinary research conducted 18 months after the earthquake to provide a more systemic approach to understanding risks posed by landslides, including the physical, environmental, and human contexts. The goal of this research is twofold: to present empirical data on the social, geological, and environmental contexts in which widespread landslides occurred following the 2005 earthquake; and, second, to describe straightforward methods that can be used for integrated landslide risk assessments in data-poor environments. The article analyzes limitations of the methodologies and challenges for conducting interdisciplinary research that integrates both social and physical data. This research concludes that reducing landslide risk is ultimately a management issue, based in land use decisions and governance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Résumé : Le cancer, qui est responsable d'un quart des décès en Suisse, exhibe un état cellulaire désordonné, qui lui-même, est la conséquence d'un dérèglement des gènes. Le gène le plus fréquemment altéré, dans les cas de cancers humains, est p53. Ce gène encode un facteur de transcription, impliqué dans la régulation de nombreux gènes impliqués dans le cycle cellulaire, l'apoptose ou la différenciation. Notre laboratoire a récemment identifié seize nouveaux gènes, dont l'expression est régulée par p53, parmi lesquels sept4, su jet de cette thèse. La protéine 5EPT4 appartient à la famille des septines, qui est impliquée dans la cytokinèse. Dans ce travail, nous avons confirmé la régulation de l'expression de sept4 par p53 dans des tissus de souris, et étonnamment, seul un des deux promoteurs du gène sept4 est contrôlé par p53. En outre, l'approche immunohistologique nous a permis de supposer une implication de la protéine SEPT4 dans le mécanisme de l'exocytose. Cette hypothèse a été confirmée par l'interaction de SEPT4 avec la protéine syntaxine 1A, et par son activité inhibitrice sur la sécrétion stimulée. En élargissant l'étude de la protéine SEPT4, nous avons découvert que celle-ci avait comme partenaire fonctionnel, la protéine Pinl, une enzyme qui catalyse l'isomérisation cis-trans du lien peptidique précédant une proline. bans ce contexte, nous avons démontré que l'interaction entre ces deux protéines reposait sur le domaine WW de Pinl, un type de domaine reconnaissant les motifs phosphoséryl-prolyl et phosphothréonyl-prolyl. Ce dernier résultat nous a conduit à examiner la phosphorylation de 5EPT4. Nous avons démontré que la partie N-terminale de SEPT4 était phosphorylée par la kinase Cdk5. La co¬expression de Cdk5 et de SEPT4 stimule la dégradation de SEPT4, indépendamment de la voie du protéasome. Ainsi, l'ensemble de nos observations fournissent l'évidence de l'engagement de la protéine SEPT4 dans la régulation de l'exocytose, et soutiennent le rôle de p53 dans le contrôle de l'exocytose, via SEPT4, ce qui constituerait un nouveau rôle fonctionnel pour ce gardien du génome. Summary: Cancer, which is responsible for a quarter of the deaths in Switzerland, exhibits a disordered cellular state, which itself, is the consequence of an altered state of genes. The most frequently altered gene in human cancer is p53. This gene encodes a transcription factor, implicated in the regulation of numerous genes involved in cell cycle, apoptosis or differentiation. Our laboratory has recently identified sixteen new genes whose expression is regulated by p53, amongst them septin 4, which is the subject of this thesis. The SEPT4 protein belongs to the septin family which is implicated in cytokinesis. In the present work, we have confirmed the regulation of sept4 expression by p53 in mouse tissues, and surprisingly, only one of the two sept4 promoters is regulated by p53. In addition, the immunohistologic approach enabled us to suppose a role of SEPT4 in exocytosis. This assumption was confirmed by the interaction of SEPT4 with syntaxin 1A, and by its inhibiting activity on stimulated secretion. By widening the analysis of SEPT4, we identified Pin1 as an interacting protein. Pin1 is an enzyme which catalyzes the cis-trans isomerization of the peptide bond preceding a proline residue. In this context, we showed that the interaction between these two proteins depends on the WW domain of Pin 1. This domain has been shown to function as a phosphoserine- or phosphothreonine¬binding module. This last result prompted us to examine phosphorylation of SEPT4. We demonstrated that the N-terminal portion of SEPT4 was phosphorylated by the Cdk5 kinase. The co-expression of Cdk5 with 5EPT4 stimulates SEPT4 degradation, independently of the proteasome pathway. Thus, these observations provide evidence for the engagement of SEPT4 in the regulation of exocytosis, and supports the role of p53 in the control of exocytosis, via SEPT4, which constitutes a new functional role for this guardian of the genome.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Introduction Societies of ants, bees, wasps and termites dominate many terrestrial ecosystems (Wilson 1971). Their evolutionary and ecological success is based upon the regulation of internal conflicts (e.g. Ratnieks et al. 2006), control of diseases (e.g. Schmid-Hempel 1998) and individual skills and collective intelligence in resource acquisition, nest building and defence (e.g. Camazine 2001). Individuals in social species can pass on their genes not only directly trough their own offspring, but also indirectly by favouring the reproduction of relatives. The inclusive fitness theory of Hamilton (1963; 1964) provides a powerful explanation for the evolution of reproductive altruism and cooperation in groups with related individuals. The same theory also led to the realization that insect societies are subject to internal conflicts over reproduction. Relatedness of less-than-one is not sufficient to eliminate all incentive for individual selfishness. This would indeed require a relatedness of one, as found among cells of an organism (Hardin 1968; Keller 1999). The challenge for evolutionary biology is to understand how groups can prevent or reduce the selfish exploitation of resources by group members, and how societies with low relatedness are maintained. In social insects the evolutionary shift from single- to multiple queens colonies modified the relatedness structure, the dispersal, and the mode of colony founding (e.g. (Crozier & Pamilo 1996). In ants, the most common, and presumably ancestral mode of reproduction is the emission of winged males and females, which found a new colony independently after mating and dispersal flights (Hölldobler & Wilson 1990). The alternative reproductive tactic for ant queens in multiple-queen colonies (polygyne) is to seek to be re-accepted in their natal colonies, where they may remain as additional reproductives or subsequently disperse on foot with part of the colony (budding) (Bourke & Franks 1995; Crozier & Pamilo 1996; Hölldobler & Wilson 1990). Such ant colonies can contain up to several hundred reproductive queens with an even more numerous workforce (Cherix 1980; Cherix 1983). As a consequence in polygynous ants the relatedness among nestmates is very low, and workers raise brood of queens to which they are only distantly related (Crozier & Pamilo 1996; Queller & Strassmann 1998). Therefore workers could increase their inclusive fitness by preferentially caring for their closest relatives and discriminate against less related or foreign individuals (Keller 1997; Queller & Strassmann 2002; Tarpy et al. 2004). However, the bulk of the evidence suggests that social insects do not behave nepotistically, probably because of the costs entailed by decreased colony efficiency or discrimination errors (Keller 1997). Recently, the consensus that nepotistic behaviour does not occur in insect colonies was challenged by a study in the ant Formica fusca (Hannonen & Sundström 2003b) showing that the reproductive share of queens more closely related to workers increases during brood development. However, this pattern can be explained either by nepotism with workers preferentially rearing the brood of more closely related queens or intrinsic differences in the viability of eggs laid by queens. In the first chapter, we designed an experiment to disentangle nepotism and differences in brood viability. We tested if workers prefer to rear their kin when given the choice between highly related and unrelated brood in the ant F. exsecta. We also looked for differences in egg viability among queens and simulated if such differences in egg viability may mistakenly lead to the conclusion that workers behave nepotistically. The acceptance of queens in polygnous ants raises the question whether the varying degree of relatedness affects their share in reproduction. In such colonies workers should favour nestmate queens over foreign queens. Numerous studies have investigated reproductive skew and partitioning of reproduction among queens (Bourke et al. 1997; Fournier et al. 2004; Fournier & Keller 2001; Hammond et al. 2006; Hannonen & Sundström 2003a; Heinze et al. 2001; Kümmerli & Keller 2007; Langer et al. 2004; Pamilo & Seppä 1994; Ross 1988; Ross 1993; Rüppell et al. 2002), yet almost no information is available on whether differences among queens in their relatedness to other colony members affects their share in reproduction. Such data are necessary to compare the relative reproductive success of dispersing and non-dispersing individuals. Moreover, information on whether there is a difference in reproductive success between resident and dispersing queens is also important for our understanding of the genetic structure of ant colonies and the dynamics of within group conflicts. In chapter two, we created single-queen colonies and then introduced a foreign queens originating from another colony kept under similar conditions in order to estimate the rate of queen acceptance into foreign established colonies, and to quantify the reproductive share of resident and introduced queens. An increasing number of studies have investigated the discrimination ability between ant workers (e.g. Holzer et al. 2006; Pedersen et al. 2006), but few have addressed the recognition and discrimination behaviour of workers towards reproductive individuals entering colonies (Bennett 1988; Brown et al. 2003; Evans 1996; Fortelius et al. 1993; Kikuchi et al. 2007; Rosengren & Pamilo 1986; Stuart et al. 1993; Sundström 1997; Vásquez & Silverman in press). These studies are important, because accepting new queens will generally have a large impact on colony kin structure and inclusive fitness of workers (Heinze & Keller 2000). In chapter three, we examined whether resident workers reject young foreign queens that enter into their nest. We introduced mated queens into their natal nest, a foreign-female producing nest, or a foreign male-producing nest and measured their survival. In addition, we also introduced young virgin and mated queens into their natal nest to examine whether the mating status of the queens influences their survival and acceptance by workers. On top of polgyny, some ant species have evolved an extraordinary social organization called 'unicoloniality' (Hölldobler & Wilson 1977; Pedersen et al. 2006). In unicolonial ants, intercolony borders are absent and workers and queens mix among the physically separated nests, such that nests form one large supercolony. Super-colonies can become very large, so that direct cooperative interactions are impossible between individuals of distant nests. Unicoloniality is an evolutionary paradox and a potential problem for kin selection theory because the mixing of queens and workers between nests leads to extremely low relatedness among nestmates (Bourke & Franks 1995; Crozier & Pamilo 1996; Keller 1995). A better understanding of the evolution and maintenance of unicoloniality requests detailed information on the discrimination behavior, dispersal, population structure, and the scale of competition. Cryptic genetic population structure may provide important information on the relevant scale to be considered when measuring relatedness and the role of kin selection. Theoretical studies have shown that relatedness should be measured at the level of the `economic neighborhood', which is the scale at which intraspecific competition generally takes place (Griffin & West 2002; Kelly 1994; Queller 1994; Taylor 1992). In chapter four, we conducted alarge-scale study to determine whether the unicolonial ant Formica paralugubris forms populations that are organised in discrete supercolonies or whether there is a continuous gradation in the level of aggression that may correlate with genetic isolation by distance and/or spatial distance between nests. In chapter five, we investigated the fine-scale population structure in three populations of F. paralugubris. We have developed mitochondria) markers, which together with the nuclear markers allowed us to detect cryptic genetic clusters of nests, to obtain more precise information on the genetic differentiation within populations, and to separate male and female gene flow. These new data provide important information on the scale to be considered when measuring relatedness in native unicolonial populations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this studywas to adapt and assess the psychometric properties of the Spanish version of the sMARS in terms of evidence of validity and reliability of scores. The sMARS was administered to 342 students and, in order to assess convergent and discriminant validity, several subsamples completed a series of related tests. The factorial structure of the sMARSwas analyzed by means of a confirmatory factor analysis and results showed that the three-factor structure reported in the original test fits well with the data. Thus, three dimensions were established in the test: math test, numerical task and math course anxiety. The results of this study provide sound evidence that demonstrates the good psychometric properties of the scores of the Spanish version of the sMARS: strong internal consistency, high 7-week testretest reliability and good convergent/discriminant validity were evident. Overall, this study provides an instrument that allows us to obtain valid and reliable math anxiety measurements. This instrument may be a useful tool for educators and psychologists interested in identifying individuals that may have a low level of math mastery because of their anxiety.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Johanson-Blizzard syndrome (JBS) is a rare, autosomal recessive disorder characterized by exocrine pancreatic insufficiency, typical facial features, dental anomalies, hypothyroidism, sensorineural hearing loss, scalp defects, urogenital and anorectal anomalies, short stature, and cognitive impairment of variable degree. This syndrome is caused by a defect of the E3 ubiquitin ligase UBR1, which is part of the proteolytic N-end rule pathway. Herein, we review previously reported (n = 29) and a total of 31 novel UBR1 mutations in relation to the associated phenotype in patients from 50 unrelated families. Mutation types include nonsense, frameshift, splice site, missense, and small in-frame deletions consistent with the hypothesis that loss of UBR1 protein function is the molecular basis of JBS. There is an association of missense mutations and small in-frame deletions with milder physical abnormalities and a normal intellectual capacity, thus suggesting that at least some of these may represent hypomorphic UBR1 alleles. The review of clinical data of a large number of molecularly confirmed JBS cases allows us to define minimal clinical criteria for the diagnosis of JBS. For all previously reported and novel UBR1 mutations together with their clinical data, a mutation database has been established at LOVD.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The good news with regard to this (or any) chapter on the future of leadership is that there is one. There was a time when researchers called for a moratorium on new leadership theory and research (e.g., Miner, 1975) citing the uncertain future of the field. Then for a time there was a popular academic perspective that leadership did not really matter when it came to shaping organizational outcomes (Meindl & Ehrlich, 1987; Meindl, Ehrlich, & Dukerich, 1985; Pfeffer, 1977). That perspective was laid to rest by "realists" in the field (Day & Antonakis, 2012a) by means of empirical re-interpretation of the results used to support the position that leadership does not matter (Lieberson & O'Connor, 1972; Salancik & Pfeffer, 1977). Specifically, Day and Lord (1988) showed that when proper methodological concerns were addressed (e.g., controlling for industry and company size effects; incorporating appropriate time lags) that the impact of top-level leadership was considerable - explaining as much as 45% of the variance in measures of organizational performance. Despite some recent pessimistic sentiments about the "curiously unformed" state of leadership research and theory (Hackman & Wageman, 2007), others have argued that the field has continued to evolve and is potentially on the threshold of some significant breakthroughs (Day & Antonakis, 2012a). Leadership scholars have been re-energized by new directions in the field and research efforts have revitalized areas previously abandoned for apparent lack of consistency in findings (e.g., leadership trait theory). Our accumulated knowledge now allows us to explain the nature of leadership including its biological bases and other antecedents, and consequences with some degree of confidence. There are other comprehensive sources that review the extensive theoretical and empirical foundation of leadership (Bass, 2008; Day & Antonakis, 2012b) so that will not be the focus of the present chapter. Instead, we will take a future-oriented perspective in identifying particular areas within the leadership field that we believe offer promising perspectives on the future of leadership. Nonetheless, it is worthwhile as background to first provide an overview of how we see the leadership field changing over the past decade or so. This short chronicle will set the stage for a keener understanding of where the future contributions are likely to emerge. Overall, across nine major schools of leadership - trait, behavioural, contingency, contextual, relational, sceptics, information processing, New Leadership, biological and evolutionary - researchers have seen a resurgence in interest in one area, a high level of activity in at least four other areas, inactivity in three areas, and one that was modestly active in the previous decade but we think holds strong promise for the future (Gardner, Lowe, Moss, Mahoney, & Cogliser, 2010). We will next provide brief overviews of these nine schools and their respective levels of research activity (see Figure 1).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

An increasing body of research has pointed to the relevance of social capital in studying a great variety of socio-economic phenomena, ranging from economics growth and development to educational attainment and public health. Conceptually, our paper is framed within the debates about the possible links between health and social capital, on one hand, and within the hypotheses regarding the importance of social and community networks in all stages of the dynamics of international migration, on the other hand. Our primary objective is to explore the ways social relations contribute to health differences between the immigrants and the native-born population of Spain. We also try to reveal differences in the nature of the social networks of foreign-born, as compared to that of the native-born persons. The empirical analysis is based on an individual-level data coming from the 2006 Spanish Health Survey, which contains a representative sample of the immigrant population. To assess the relationship between various health indicators (self-assessed health, chronic conditions and long-term illness) and social capital, controlling for other covariates, we estimate multilevel models separately for the two population groups of interest. In the estimates we distinguish between individual and community-level social capital. While the Health Survey contains information that allows us to define individual social capital measures, the collective indicators come from other official sources. In particular, for the subsample of immigrants, we proxy community-level networks and relationships by variables contained in the Spanish National Survey of Immigrants 2007. The results obtained so far point to the relevance of social capital as a covariate in the health equation, although, the significance varies according to the specific health indicator used. Additionally, and contrary to what is expected, immigrants’ social networks seem to be inferior to those of the native-born population in many aspects; and they also affect immigrant’s health to a lesser extent. Policy implications of the findings are discussed. Keywords: health status, social capital, immigration, Spain

Relevância:

100.00% 100.00%

Publicador:

Resumo:

OBJECTIVES: To evaluate the combination of ultrasound (US) + fine-needle aspiration (FNA) in the assessment of salivary gland tumours in the hands of the otolaryngologist. DESIGN: A retrospective review of case notes was performed. SETTING: Two university teaching hospitals in Switzerland. PARTICIPANTS: One hundred and three patients with a total of 106 focal masses of the salivary glands were included. Clinician-operated US + FNA were the first line of investigation for these lesions. All patients underwent surgical excision of the lesion, which allowed for confirmation of diagnosis by histopathology in 104 lesions and by laboratory testing in two lesions. MAIN OUTCOME MEASURES: Primary--diagnostic accuracy in identifying true salivary gland neoplasms and detecting malignancy. Secondary--predicting an approximate and specific diagnosis in these tumours. RESULTS: The combination of US + FNA achieved a diagnostic accuracy of 99% in identifying and differentiating true salivary gland neoplasms from tumour-like lesions. In detecting malignancy, this combination permitted an accuracy of 98%. An approximate diagnosis was possible in 89%, and a specific diagnosis in 69% of our patients. CONCLUSIONS: Due to economic factors and a high diagnostic accuracy, the combination of US + FNA represents the investigation method of choice for most salivary gland tumours. We suggest that the otolaryngologist be employed in carrying out these procedures, as is already the rule in other medical specialties, while computed tomography and magnetic resonance imaging should be reserved to those few lesions, which cannot be delineated completely by sonography.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Turkish part of the Tethyan realm is represented by a series of terranes juxtaposed through Alpine convergent movements and separated by complex suture zones. Different terranes can be defined and characterized by their dominant geological background. The Pontides domain represents a segment of the former active margin of Eurasia, where back-arc basins opened in the Triassic and separated the Sakarya terrane from neighbouring regions. Sakarya was re-accreted to Laurasia through the Balkanic mid-Cretaceous orogenic event that also affected the Rhodope and Strandja zones. The whole region from the Balkans to the Caucasus was then affected by a reversal of subduction and creation of a Late Cretaceous arc before collision with the Anatolian domain in the Eocene. If the Anatolian terrane underwent an evolution similar to Sakarya during the Late Paleozoic and Early Triassic times, both terranes had a diverging history during and after the Eo-Cimmerian collision. North of Sakarya, the Küre back-arc was closed during the Jurassic, whereas north of the Anatolian domain, the back-arc type oceans did not close before the Late Cretaceous. During the Cretaceous, both domains were affected by ophiolite obduction, but in very different ways: north directed diachronous Middle to Late Cretaceous mélange obduction on the Jurassic Sakarya passive margin; Senonian synchronous southward obduction on the Triassic passive margin of Anatolia. From this, it appears that the Izmir-Ankara suture, currently separating both terranes, is composite, and that the passive margin of Sakarya is not the conjugate margin of Anatolia. To the south, the Cimmerian Taurus domain together with the Beydağları domain (part of the larger Greater Apulian terrane), were detached from north Gondwana in the Permian during the opening of the Neotethys (East-Mediterranean basin). The drifting Cimmerian blocks entered into a soft collision with the Anatolian and related terranes in the Eo-Cimmerian orogenic phase (Late Triassic), thus suturing the Paleotethys. At that time, the Taurus plate developed foreland-type basins, filled with flysch-molasse deposits that locally overstepped the lower plate Taurus terrane and were deposited in the opening Neotethys to the south. These olistostromal deposits are characterized by pelagic Carboniferous and Permian material from the Paleotethys suture zone found in the Mersin mélange. The latter, as well as the Antalya and Mamonia domains are represented by a series of exotic units now found south of the main Taurus range. Part of the Mersin exotic material was clearly derived from the former north Anatolian passive margin (Huğlu-type series) and re-displaced during the Paleogene. This led us to propose a plate tectonic model where the Anatolian ophiolitic front is linked up with the Samail/Baër-Bassit obduction front found along the Arabian margin. The obduction front was indented by the Anatolian promontory whose eastern end was partially subducted. Continued slab roll-back of the Neotethys allowed Anatolian exotics to continue their course southwestward until their emplacement along the Taurus southern margin (Mersin) and up to the Beydağları promontory (Antaya-Mamonia) in the latest Cretaceous-Paleocene. The supra-subduction ocean opening at the back of the obduction front (Troodos-type Ocean) was finally closed by Eocene north-south shortening between Africa and Eurasia. This brought close to each other Cretaceous ophiolites derived from the north of Anatolia and those obducted on the Arabian promontory. The latter were sealed by a Maastrichtian platform, and locally never affected by Alpine tectonism, whereas those located on the eastern Anatolian plate are strongly deformed and metamorphosed, and affected by Eocene arc magmatism. These observations help to reconstruct the larger frame of the central Tethyan realm geodynamic evolution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents a very fine grid hydrological model based on the spatiotemporal repartition of precipitation and on the topography. The goal is to estimate the flood on a catchment area, using a Probable Maximum Precipitation (PMP) leading to a Probable Maximum Flood (PMF). The spatiotemporal distribution of the precipitation was realized using six clouds modeled by the advection-diffusion equation. The equation shows the movement of the clouds over the terrain and also gives the evolution of the rain intensity in time. This hydrological modeling is followed by a hydraulic modeling of the surface and subterranean flows, done considering the factors that contribute to the hydrological cycle, such as the infiltration, the exfiltration and the snowmelt. This model was applied to several Swiss basins using measured rain, with results showing a good correlation between the simulated and observed flows. This good correlation proves that the model is valid and gives us the confidence that the results can be extrapolated to phenomena of extreme rainfall of PMP type. In this article we present some results obtained using a PMP rainfall and the developed model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: Over the years, somatic care has become increasingly specialized. Furthermore, a rising number of patients requiring somatic care also present with a psychiatric comorbidity. As a consequence, the time and resources needed to care for these patients can interfere with the course of somatic treatment and influence the patient-caregiver relationship. In the light of these observations, the Liaison Psychiatry Unit at the University Hospital in Lausanne (CHUV) has educated its nursing staff in order to strengthen its action within the general care hospital. What has been developed is a reflexive approach through supervision of somatic staff, in order to improve the efficiency of liaison psychiatry interventions with the caregivers in charge of patients. The kind of supervision we have developed is the result of a real partnership with somatic staff. Besides, in order to better understand the complexity of interactions between the two systems involved, the patient's and the caregivers', we use several theoretical references in an integrative manner. PSYCHOANALYTICAL REFERENCE: The psychoanalytical model allows us to better understand the dynamics between the supervisor and the supervised group in order to contain and give meaning to the affects arising in the supervision space. "Containing function" and "transitional phenomena" refer to the experience in which emotions can find a space where they can be taken in and processed in a secure and supportive manner. These concepts, along with that of the "psychic envelope", were initially developed to explain the psychological development of the baby in its early interactions with its mother or its surrogate. In the field of supervision, they allow us to be aware of these complex phenomena and the diverse qualities to which a supervisor needs to resort, such as attention, support and incentive, in order to offer a secure environment. SYSTEMIC REFERENCE: A new perspective of the patient's complexity is revealed by the group's dynamics. The supervisor's attention is mainly focused on the work of affects. However, these are often buried under a defensive shell, serving as a temporary protection, which prevents the caregiver from recognizing his or her own emotions, thereby enhancing the difficulties in the relationship with the patient. Whenever the work of putting emotions into words fail, we use "sculpting", a technique derived from the systemic model. Through the use of this type of analogical language, affects can emerge without constraint or feelings of danger. Through "playing" in that "transitional space", new exchanges appear between group members and allow new behaviors to be conceived. In practice, we ask the supervisee who is presenting a complex situation, to design a spatial representation of his or her understanding of the situation, through the display of characters significant to the situation: the patient, somatic staff members, relatives of the patient, etc. In silence, the supervisee shapes the characters into postures and arranges them in the room. Each sculpted character is identified, named, and positioned, with his or her gaze being set in a specific direction. Finally the sculptor shapes him or herself in his or her own role. When the sculpture is complete and after a few moments of fixation, we ask participants to express themselves about their experience. By means of this physical representation, participants to the sculpture discover perceptions and feelings that were unknown up to then. Hence from this analogical representation a reflection and hypotheses of understanding can arise and be developed within the group. CONCLUSION: Through the use of the concepts of "containing function" and "transitional space" we position ourselves in the scope of the encounter and the dialog. Through the use of the systemic technique of "sculpting" we promote the process of understanding, rather than that of explaining, which would place us in the position of experts. The experience of these encounters has shown us that what we need to focus on is indeed what happens in this transitional space in terms of dynamics and process. The encounter and the sharing of competencies both allow a new understanding of the situation at hand, which has, of course, to be verified in the reality of the patient-caregiver relationship. It is often a source of adjustment for interpersonal skills to recover its containing function in order to enable caregiver to better respond to the patient's needs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Abstract The amygdala is a group of nuclei in the temporal lobe of the brain that plays a crucial role in anxiety and fear behavior. Sensory information converges in the basolateral and lateral nuclei of the amygdala, which have been the first regions in the brain where the acquisition of new (fear) memories has been associated with long term changes in synaptic transmission. These nuclei, in turn, project to the central nucleus of the amygdala. The central amygdala, through its extensive projections to numerous nuclei in the midbrain and brainstem, plays a pivotal role in the orchestration of the rapid autonomic and endocrine fear responses. In the central amygdala a large number of neuropeptides and receptors is expressed, among which high levels of vasopressin and oxytocin receptors. Local injections of these peptides into the amygdala modulate several aspects of the autonomic fear reaction. Interestingly, their effects are opposing: vasopressin tends to enhance the fear reactions, whereas oxytocin has anxiolytic effects. In order to investigate the neurophysiological mechanisms that could underlie this opposing modulation of the fear behavior, we studied the effects of vasopressin and oxytocin on the neuronal activity in an acute brain slice preparation of the rat central amygdala. We first assessed the effects of vasopressin and oxytocin on the spontaneous activity of central amygdala neurons. Extracellular single unit recordings revealed two major populations of neurons: a majority of neurons was excited by vasopressin and inhibited by oxytocin, whereas other neurons were only excited by oxytocin receptor activation. The inhibitory effect of oxytocin could be reduced by the block of GABAergic transmission, whereas the excitatory effects of vasopressin and oxytocin were not affected. In a second step we identified the cellular mechanisms for the excitatory effects of both peptides as well as the morphological and biochemical mechanisms underlying the opposing effects, by using sharp electrode recordings together with intracellular labelings. We revealed that oxytocin-excited neurons are localized in the lateral part (CeL) whereas vasopressin excited cells are found in the medial part of the central amygdala (CeM). The tracing of the neuronal morphology showed that the axon collaterals of the oxytocin-excited neurons project from the CeL, far into the CeM. Combined immunohistochemical stainings indicated that these projections are GABAergic. In the third set of experiments we investigated the synaptic interactions between the two identified cell populations. Whole-cell patch-clamp recordings in the CeM revealed that the inhibitory effect of oxytocin was caused by the massive increase of inhibitory GABAergic currents, which was induced by the activation of CeL neurons. Finally, the effects of vasopressin and oxytocin on evoked activity were investigated. We found on the one hand, that the probability of evoking action potentials in the CeM by stimulating the basolateral amygdala afferents was enhanced under vasopressin, whereas it decreased under oxytocin. On the other hand, the impact of cortical afferents stimulation on the CeL neurons was enhanced by oxytocin application. Taken together, these findings have allowed us to develop a model, in which the opposing behavioral effects of vasopressin and oxytocin are caused by a selective activation of two distinct populations of neurons in the GABAergic network of the central amygdala. Our model could help to develop new anxiolytic treatments, which modulate simultaneously both receptor systems. By acting on a GABAergic network, such treatments can further be tuned by combinations with classical benzodiazepines. Résumé: L'amygdale est un groupe de noyaux cérébraux localisés dans le lobe temporal. Elle joue un rôle essentiel dans les comportements liés à la peur et l'anxiété. L'information issue des aires sensorielles converge vers les noyaux amygdaliens latéraux et basolatéraux, qui sont les projections vers différents noyaux du tronc cérébral et de l'hypothalamus, joue un rôle clef premières régions dans lesquelles il a été démontré que l'acquisition d'une nouvelle mémoire (de peur) était associée à des changements à long terme de la transmission synaptique. Ces noyaux envoient leurs projections sur l'amygdale centrale, qui à travers ses propres dans l'orchestration des réponses autonomes et endocrines de peur. Le contrôle de l'activité neuronale dans l'amygdale centrale module fortement la réaction de peur. Ainsi, un grand nombre de neuropeptides sont spécifiquement exprimés dans l'amygdale centrale et un bon nombre d'entre eux interfère dans la réaction de peur et d'anxiété. Chez les rats, une forte concentration de récepteurs à l'ocytocine et à la vasopressine est exprimée dans le noyau central, et l'injection de ces peptides dans l'amygdale influence différents aspects de la réaction viscérale associée à la peur. Il est intéressant de constater que ces peptides exercent des effets opposés. Ainsi, la vasopressine augmente la réaction de peur alors que l'ocytocine a un effet anxiolytique. Afin d'investiguer les mécanismes neurophysiologiques responsables de ces effets opposés, nous avons étudié l'effet de la vasopressine et de l'ocytocine sur l'activité neuronale de préparations de tranches de cerveau de rats contenant entre autres de l'amygdale centrale. Tout d'abord, notre intérêt s'est porté sur les effets de ces deux neuropeptides sur l'activité spontanée dans l'amygdale centrale. Des enregistrements extracellulaires ont révélé différentes populations de neurones ; une majorité était excitée par la vasopressine et inhibée par l'ocytocine ; d'autres étaient seulement excités par l'activation du récepteur à l'ocytocine. L'effet inhibiteur de l'ocytocine a pu être réduit par l'inhibition de la transmission GABAergique, alors que ses effets excitateurs n'étaient pas affectés. Dans un deuxième temps, nous avons identifié les mécanismes cellulaires responsables de l'effet excitateur de ces deux peptides et analysé les caractéristiques morphologiques et biochimiques des neurones affectés. Des enregistrements intracellulaires ont permis de localiser les neurones excités par l'ocytocine dans la partie latérale de l'amygdale centrale (CeL), et ceux excités par la vasopressine dans sa partie médiale (CeM). Le traçage morphologique des neurones a révélé que les collatérales axonales des cellules excitées par l'ocytocine projetaient du CeL loin dans le CeM. De plus, des colorations immuno-histochimiques ont révélé que ces projections étaient GABAergiques. Dans un troisième temps, nous avons étudié les interactions synaptiques entre ces deux populations de cellules. Les enregistrements en whole-cell patch-clamp dans le CeM ont démontré que les effets inhibiteurs de l'ocytocine résultaient de l'augmentation massive des courants GABAergique résultant de l'activation des neurones dans le CeL. Finalement, les effets de l'ocytocine et de la vasopressine sur l'activité évoquée ont été étudiés. Nous avons pu montrer que la probabilité d'évoquer un potentiel d'action dans le CeM, par stimulation de l'amygdale basolatérale, était augmentée sous l'effet de la vasopressine et diminuée sous l'action de l'ocytocine. Par contre, l'impact de la stimulation des afférences corticales sur les neurones du CeL était augmenté par l'application de l'ocytocine. L'ensemble de ces résultats nous a permis de développer un modèle dans lequel les effets comportementaux opposés de la vasopressine et de l'ocytocine sont causés par une activation sélective des deux différentes populations de neurones dans un réseau GABAergique. Un tel modèle pourrait mener au développement de nouveaux traitements anxiolytiques en modulant l'activité des deux récepteurs simultanément. En agissant sur un réseau GABAergique, les effets d'un tel traitement pourraient être rendus encore plus sélectifs en association avec des benzodiazépines classiques.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Comparative analyses of survival senescence by using life tables have identified generalizations including the observation that mammals senesce faster than similar-sized birds. These generalizations have been challenged because of limitations of life-table approaches and the growing appreciation that senescence is more than an increasing probability of death. Without using life tables, we examine senescence rates in annual individual fitness using 20 individual-based data sets of terrestrial vertebrates with contrasting life histories and body size. We find that senescence is widespread in the wild and equally likely to occur in survival and reproduction. Additionally, mammals senesce faster than birds because they have a faster life history for a given body size. By allowing us to disentangle the effects of two major fitness components our methods allow an assessment of the robustness of the prevalent life-table approach. Focusing on one aspect of life history - survival or recruitment - can provide reliable information on overall senescence.