rsp Perspiration problems? No sweat! By www.eurekalert.org Published On :: Fri, 08 May 2020 00:00:00 EDT (Osaka University) Researchers from Osaka University and Mandom Corporation succeeded in generating immortalized myoepithelial cells in human eccrine sweat glands, providing a novel test system for research on human sweating. Full Article
rsp Power Politics Could Impede Progress on Responsible Regulation of Cyberspace By feedproxy.google.com Published On :: Tue, 03 Dec 2019 14:34:13 +0000 3 December 2019 Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 A new Chatham House paper examines the prospects of countries reaching agreement on issues of sovereignty and non-intervention in cyberspace in the face of persistent, low-level, state-to-state cyber attacks. 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. In discussions to date about how international law applies in cyberspace, commentators have tended to focus their attention on how the rules on the use of force, or the law of armed conflict, apply to cyber activities conducted by states that give rise to physical damage, injury or death.But in practice, the vast majority of state cyberattacks fall below this threshold. Far more common are persistent, low-level attacks that may leave no physical trace but that are capable of doing significant damage to a state’s ability to control its systems, often at serious economic cost.Such cyber incursions might include network disruptions in the operation of another government’s websites; tampering with electoral infrastructure to change or undermine the result; or using cyber means to destabilize another state’s financial sector.For these kinds of cyber operation, the principle of sovereignty, and the principle of non-intervention in another state’s internal affairs, are the starting point.A UN Group of Government Experts (GGE) agreed in 2013 and 2015 that the principles in the UN Charter, including sovereignty and the prohibition on intervention in another state’s affairs, apply to states’ activities in cyberspace. The 2015 GGE also recommended eleven (non-binding) norms of responsible state behaviour in cyberspace.However, states have not yet reached agreement on how to apply these principles. Until recently, there has also been very little knowledge of what states actually do in cyberspace, as they usually conduct cyber operations covertly and have been reluctant to put their views on record.A new Chatham House research paper analyses the application of the principles of sovereignty and non-intervention to state cyberattacks that fall below the principle of use of force. As well as analysing the application of the law in this area, the paper also makes recommendations to governments on how they might best make progress in reaching agreement in this area.Existing rules or new rules?As the research paper makes clear, there is currently some debate, principally between countries in the West, about the extent to which sovereignty is a legally binding rule in the context of cyberspace and, if so, how it and the principle of non-intervention might apply in practice.In the last few years, certain states have put on record how they consider international law to apply to states’ activities in cyberspace, namely the UK, Australia, France and the Netherlands. While there may be some differences in their approaches, which are discussed in the paper, there also remains important common ground: namely, that existing international law already provides a solid framework for regulating states’ cyber activities, as it regulates every other domain of state-to-state activity.There is also an emerging trend for states to work together when attributing cyberattacks to hostile states, enabling them to call out malign cyber activity when it violates international law. (See, for example, the joint statements made in relation to the NotPetya cyber attack and malicious cyber activity attributed to the Russian government).However, other countries have questioned whether existing international law as it stands is capable of regulating states’ cyber interactions and have called for ‘new legal instruments’ in this area.This includes a proposal by the Shanghai Cooperation Organization (led by Russia and China) for an International Code of Conduct on Information Security, a draft of which was submitted to the UN in 2011 and 2015, without success. The UN has also formed a new Open-Ended Working Group (OEWG) under a resolution proposed by Russia to consider how international law applies to states’ activities in cyberspace.The resolution establishing the OEWG, which began work earlier this year, includes the possibility of the group ‘introducing changes to the rules, norms and principles of responsible behaviour of States’ agreed in the 2013 and 2015 GGE reports. In the OEWG discussions at the UN in September, several countries claimed that a new legal instrument was needed to fill the ‘legal vacuum’ (Cuba) or ‘the gap of ungoverned areas’ (Indonesia).It would be concerning if the hard-won consensus on the application of international law to cyberspace that has been reached at past GGEs started to unravel. In contrast to 2013 and 2015, the 2017 meeting failed to reach an agreement.On 9 December, a renewed GGE will meet in New York, but the existence of the OEWG exploring the same issues in a separate process reflects the fact that cyber norms have become an area of geopolitical rivalry.Aside from the application of international law, states are also adopting divergent approaches to the domestic regulation of cyberspace within their own territory. The emerging trend towards a ‘splinternet’ – i.e. between states that believe the internet should be global and open on the hand, and those that favour a ‘sovereignty and control’ model on the other – is also likely to make discussions at the GGE more challenging.Distinct from the international law concept of sovereignty is the notion of ‘cybersovereignty’, a term coined by China to describe the wide-ranging powers it assumes under domestic law to regulate its citizens’ access to the internet and personal data within its territory. This approach is catching on (as reflected in Russia’s recently enacted ‘Sovereign Internet Law’), with other authoritarian states likely to follow suit.The importance of non-state actorsIn parallel with regional and UN discussions on how international law applies, a number of initiatives by non-state actors have also sought to establish voluntary principles about responsible state behaviour in cyberspace.The Global Commission on the Stability of Cyberspace, a multi-stakeholder body that has proposed principles, norms and recommendations to guide responsible behaviour by all parties in cyberspace, recently published its final report. The Cybersecurity Tech Accord aims to promote collaboration between tech companies on stability and resilience in cyberspace. President Macron’s ‘Paris Call for Trust and Security in Cyberspace’ has to date received the backing of 67 states, 139 international and civil society organizations, and 358 private-sector organizations.It remains to be seen in the long term whether the parallel processes at the UN will work constructively together or be competitive. But notwithstanding the challenging geopolitical backdrop, the UN GGE meeting next week at the least offers states the opportunity to consolidate and build on the results of past meetings; to increase knowledge and discussion about how international law might apply; and to encourage more states to put their own views of these issues on the record. Full Article
rsp Cyber Governance in the Commonwealth: Towards Stability and Responsible State Behaviour in Cyberspace By feedproxy.google.com Published On :: Mon, 05 Aug 2019 14:05:02 +0000 Invitation Only Research Event 7 October 2019 - 10:30am to 5:30pm Addis Ababa, Ethiopia This roundtable is part of a series under the project, 'Implementing the Commonwealth Cybersecurity Agenda', funded by the UK Foreign and Commonwealth Office (FCO). The roundtable aims to provide a multi-stakeholder, pan-Commonwealth platform to discuss how to implement the Commonwealth Cyber Declaration with a focus on its third pillar 'To promote stability in cyberspace through international cooperation'.In particular, the roundtable focuses on points 3 and 4 of the third pillar which revolve around the commitment to promote frameworks for stability in cyberspace including the applicability of international law, agreed voluntary norms of responsible state behaviour and the development and implementation of confidence-building measures consistent with the 2015 report of the UNGGE. The workshop also focuses on the commitment to advance discussions on how existing international law, including the Charter of the United Nations and applicable international humanitarian law, applies in cyberspace.The roundtable addresses the issue of global cyber governance from a Commonwealth perspective and will also include a discussion around the way forward, the needed capacity of the different Commonwealth countries and the cooperation between its members for better cyber governance.Participants include UNGGE members from Commonwealth countries in addition to representatives to the UN Open-Ended Working Group from African countries as well as members from academia, civil society and industry. Department/project International Security Programme Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email Full Article
Calum Inverarity Research Analyst and Coordinator, International Security Department +44 (0) 207 957 5751 Email
rsp Deterrence Perspectives in the 21st Century By feedproxy.google.com Published On :: Fri, 28 Feb 2020 09:36:23 +0000 The aim of this project is to provide a space to explore creative/disruptive ideas in order to make headway on perspectives concerning deterrence. This will encourage ‘responsible disruption’ in the nuclear field. Concerns about transatlantic security are high following the US 2018 Nuclear Posture Review and its interpretation of the Russian doctrine, the demise of the Intermediate Range Nuclear Forces Treaty (INF), the uncertainty surrounding the potential extension of the New Strategic Arms Reduction Treaty (New START), and Russian deployment of Avangard hypersonic, nuclear-capable missile systems.Emerging technologies, especially quantum technologies, jeopardize the reliability of existing encryption measures. Some of the most sophisticated cyber attacks are already assisted by artificial intelligence. The possibility that nuclear weapons systems can be interfered with both during conflict and peacetime by these technologies, without the knowledge of the possessor state, raises questions on the reliability and integrity of these systems, with implications for military decision-making, particularly to deterrence policy.These issues and more indicate the changes in the security landscape that have a bearing on the future of nuclear deterrence.This project is supported by the Hiroshima Prefecture and Government of Ireland. Latest (1) Research paper Perspectives on Nuclear Deterrence in the 21st Century 20 April 2020 Research & Publications (1) Research paper Perspectives on Nuclear Deterrence in the 21st Century 20 April 2020 Full Article
rsp Perspectives on Nuclear Deterrence in the 21st Century By feedproxy.google.com Published On :: Sun, 19 Apr 2020 19:32:28 +0000 20 April 2020 Nuclear deterrence theory, with its roots in the Cold War era, may not account for all eventualities in the 21st century. Researchers at Chatham House have worked with eight experts to produce this collection of essays examining four contested themes in contemporary policymaking on deterrence. Read online Download PDF Dr Beyza Unal Senior Research Fellow, International Security Programme @beyzaunal Google Scholar Yasmin Afina Research Assistant, International Security Programme @afinayasmin LinkedIn Dr Patricia Lewis Research Director, Conflict, Science & Transformation; Director, International Security Programme @PatriciaMary Dr John Borrie Associate Fellow, International Security Programme Google Scholar Dr Jamie Shea Associate Fellow, International Security Programme LinkedIn Peter Watkins Associate Fellow, International Security Programme LinkedIn Dr Maria Rost Rublee Associate Professor of International Relations, Monash University Cristina Varriale Research Fellow in Proliferation and Nuclear Policy, RUSI Dr Tanya Ogilvie-White Adjunct Senior Fellow, Griffith Asia Institute, Griffith University Dr Andrew Futter Associate Professor of International Politics, University of Leicester Christine Parthemore Chief Executive Officer, Council on Strategic Risks (CSR) 2020-04-20-NuclearDeterrence.jpeg Royal Navy Vanguard Class submarine HMS Vigilant returning to HMNB Clyde after extended deployment. The four Vanguard-class submarines form the UK's strategic nuclear deterrent force. Photo: Ministry of Defence. SummaryThis collection of essays explores, from the perspectives of eight experts, four areas of deterrence theory and policymaking: the underlying assumptions that shape deterrence practice; the enduring value of extended deterrence; the impact of emerging technologies; and the ‘blurring’ of the lines between conventional and nuclear weapons.Nuclear deterrence theory, with its roots in the Cold War era, may not account for all eventualities in security and defence in the 21st century, given the larger number of nuclear actors in a less binary geopolitical context. It is clear that a number of present factors challenge the overall credibility of ‘classical’ nuclear deterrence, meaning that in-depth analysis is now needed.Uncertainty as to the appetite to maintain the current nuclear weapons policy architecture looms large in discussions and concerns on global and regional security. The demise of the Intermediate-Range Nuclear Forces Treaty, doubts over the potential extension of the New Strategic Arms Reduction Treaty, heightened regional tensions in Northeast and South Asia, together with the current and likely future risks and challenges arising from global technological competition, making it all the more urgent to examine long-held assumptions in the real-world context.Extended deterrence practices differ from region to region, depending on the domestic and regional landscape. Increased focus on diplomatic capabilities to reduce risks and improve the long-term outlook at regional level, including by spearheading new regional arms-control initiatives, may be a viable way forward. Addressing the bigger picture – notably including, on the Korean peninsula, Pyongyang’s own threat perception – and the links between conventional and nuclear missile issues will need to remain prominent if long-term and concrete changes are to take hold.Most states have long held nuclear weapons to be ‘exceptional’: their use would represent a dramatic escalation of a conflict that must never be attained. Latterly, however, some officials and scholars have made the case that the impact of the use of a low-yield nuclear weapon would not be entirely distinct from that of a large-scale conventional attack. This blurring of lines between conventional and nuclear deterrence strips nuclear weapons of their exceptional nature, in a context in which states are faced with diverse, complex and concurrent threats from multiple potential adversaries that are able to synchronize non-military and military options, up to and including nuclear forces. The use of nuclear weapons risks becoming a ‘new normal’, potentially reducing the threshold for use – to cyberattacks, for example. This has direct implications for discussions around strategic stability. While emerging technologies may offer tremendous opportunities in the modernization of nuclear weapons, they also present major risks and destabilizing challenges. Artificial intelligence, automation, and other developments in the cyber sphere affect dynamics on both the demand and supply sides of the nuclear deterrence equation. States and alliance such as NATO must adapt their deterrence thinking in light of these technological developments, and define their primary purpose and priorities in this shifting security context. Resilience planning, adaptation to the evolving security environment, threat anticipation, and consistent crisis management and incident response – as well as thinking about the mitigation measures necessary to prevent conflict escalation should deterrence fail – will all be critical in upholding nuclear deterrence as both policy and practice. Department/project International Security Programme, Deterrence Perspectives in the 21st Century Full Article
rsp Differential expression of glucose transporters and hexokinases in prostate cancer with a neuroendocrine gene signature: a mechanistic perspective for FDG imaging of PSMA-suppressed tumors By jnm.snmjournals.org Published On :: 2019-12-05T10:37:41-08:00 Purpose: Although the incidence of de novo neuroendocrine prostate cancer (NEPC) is rare, recent data suggests that low expression of prostate-specific membrane antigen (PSMA) is associated with a spectrum of neuroendocrine (NE) hallmarks and androgen receptor (AR)-suppression in prostate cancer (PC). Previous clinical reports indicate that PCs with a phenotype similar to NE tumors can be more amenable to imaging by 18F-Fluorodeoxyglucose (FDG) rather than PSMA-targeting radioligands. In this study, we evaluated the association between NE gene signature and FDG uptake-associated genes including glucose transporters (GLUTs) and hexokinases, with the goal of providing a genomic signature to explain the reported FDG-avidity of PSMA-suppressed tumors. Methods: Data mining approaches, cell lines and patient-derived xenograft (PDX) models were used to study the levels of 14 members of the SLC2A family (encoding GLUT proteins), 4 members of the hexokinase family (genes: HK1 to 3 and GCK) and PSMA (FOLH1 gene) following AR-inhibition and in correlation with NE hallmarks. Also, we characterize a NE-like PC (NELPC) subset among a cohort of primary and metastatic PC samples with no NE histopathology. We measured glucose uptake in a NE-induced in vitro model and a zebrafish model by non-radioactive imaging of glucose uptake using fluorescent glucose bioprobe, GB2-Cy3. Results: This work demonstrates that a NE gene signature associates with differential expression of genes encoding GLUT and hexokinase proteins. In NELPC, elevated expression of GCK (encoding glucokinase protein) and decreased expression of SLC2A12 correlated with earlier biochemical recurrence. In tumors treated with AR-inhibitors, high expression of GCK and low expression of SLC2A12 correlated with NE histopathology and PSMA gene suppression. GLUT12-suppression and amplification of glucokinase was observed in NE-induced PC cell lines and PDX models. A higher glucose uptake was confirmed in low-PSMA tumors using a GB2-Cy3 probe in a zebrafish model. Conclusion: NE gene signature in NEPC and NELPC associates with a distinct transcriptional profile of GLUTs and HKs. PSMA-suppression correlates with GLUT12-suppression and glucokinase-amplification. Alteration of FDG uptake-associated genes correlated positively with higher glucose uptake in AR and PSMA-suppressed tumors. Zebrafish xenograft tumor models are an accurate and efficient pre-clinical method for monitoring non-radioactive glucose uptake. Full Article
rsp Acquiring and Analyzing Data Independent Acquisition Proteomics Experiments without Spectrum Libraries [Perspective] By feedproxy.google.com Published On :: 2020-04-20T11:35:14-07:00 Data independent acquisition (DIA) is an attractive alternative to standard shotgun proteomics methods for quantitative experiments. However, most DIA methods require collecting exhaustive, sample-specific spectrum libraries with data dependent acquisition (DDA) to detect and quantify peptides. In addition to working with non-human samples, studies of splice junctions, sequence variants, or simply working with small sample yields can make developing DDA-based spectrum libraries impractical. Here we illustrate how to acquire, queue, and validate DIA data without spectrum libraries, and provide a workflow to efficiently generate DIA-only chromatogram libraries using gas-phase fractionation (GPF). We present best-practice methods for collecting DIA data using Orbitrap-based instruments, and develop an understanding for why DIA using an Orbitrap mass spectrometer should be approached differently than when using time-of-flight instruments. Finally, we discuss several methods for analyzing DIA data without libraries. Full Article
rsp Perspectives on Nuclear Deterrence in the 21st Century By feedproxy.google.com Published On :: Sun, 19 Apr 2020 19:32:28 +0000 20 April 2020 Nuclear deterrence theory, with its roots in the Cold War era, may not account for all eventualities in the 21st century. Researchers at Chatham House have worked with eight experts to produce this collection of essays examining four contested themes in contemporary policymaking on deterrence. Read online Download PDF Dr Beyza Unal Senior Research Fellow, International Security Programme @beyzaunal Google Scholar Yasmin Afina Research Assistant, International Security Programme @afinayasmin LinkedIn Dr Patricia Lewis Research Director, Conflict, Science & Transformation; Director, International Security Programme @PatriciaMary Dr John Borrie Associate Fellow, International Security Programme Google Scholar Dr Jamie Shea Associate Fellow, International Security Programme LinkedIn Peter Watkins Associate Fellow, International Security Programme LinkedIn Dr Maria Rost Rublee Associate Professor of International Relations, Monash University Cristina Varriale Research Fellow in Proliferation and Nuclear Policy, RUSI Dr Tanya Ogilvie-White Adjunct Senior Fellow, Griffith Asia Institute, Griffith University Dr Andrew Futter Associate Professor of International Politics, University of Leicester Christine Parthemore Chief Executive Officer, Council on Strategic Risks (CSR) 2020-04-20-NuclearDeterrence.jpeg Royal Navy Vanguard Class submarine HMS Vigilant returning to HMNB Clyde after extended deployment. The four Vanguard-class submarines form the UK's strategic nuclear deterrent force. Photo: Ministry of Defence. SummaryThis collection of essays explores, from the perspectives of eight experts, four areas of deterrence theory and policymaking: the underlying assumptions that shape deterrence practice; the enduring value of extended deterrence; the impact of emerging technologies; and the ‘blurring’ of the lines between conventional and nuclear weapons.Nuclear deterrence theory, with its roots in the Cold War era, may not account for all eventualities in security and defence in the 21st century, given the larger number of nuclear actors in a less binary geopolitical context. It is clear that a number of present factors challenge the overall credibility of ‘classical’ nuclear deterrence, meaning that in-depth analysis is now needed.Uncertainty as to the appetite to maintain the current nuclear weapons policy architecture looms large in discussions and concerns on global and regional security. The demise of the Intermediate-Range Nuclear Forces Treaty, doubts over the potential extension of the New Strategic Arms Reduction Treaty, heightened regional tensions in Northeast and South Asia, together with the current and likely future risks and challenges arising from global technological competition, making it all the more urgent to examine long-held assumptions in the real-world context.Extended deterrence practices differ from region to region, depending on the domestic and regional landscape. Increased focus on diplomatic capabilities to reduce risks and improve the long-term outlook at regional level, including by spearheading new regional arms-control initiatives, may be a viable way forward. Addressing the bigger picture – notably including, on the Korean peninsula, Pyongyang’s own threat perception – and the links between conventional and nuclear missile issues will need to remain prominent if long-term and concrete changes are to take hold.Most states have long held nuclear weapons to be ‘exceptional’: their use would represent a dramatic escalation of a conflict that must never be attained. Latterly, however, some officials and scholars have made the case that the impact of the use of a low-yield nuclear weapon would not be entirely distinct from that of a large-scale conventional attack. This blurring of lines between conventional and nuclear deterrence strips nuclear weapons of their exceptional nature, in a context in which states are faced with diverse, complex and concurrent threats from multiple potential adversaries that are able to synchronize non-military and military options, up to and including nuclear forces. The use of nuclear weapons risks becoming a ‘new normal’, potentially reducing the threshold for use – to cyberattacks, for example. This has direct implications for discussions around strategic stability. While emerging technologies may offer tremendous opportunities in the modernization of nuclear weapons, they also present major risks and destabilizing challenges. Artificial intelligence, automation, and other developments in the cyber sphere affect dynamics on both the demand and supply sides of the nuclear deterrence equation. States and alliance such as NATO must adapt their deterrence thinking in light of these technological developments, and define their primary purpose and priorities in this shifting security context. Resilience planning, adaptation to the evolving security environment, threat anticipation, and consistent crisis management and incident response – as well as thinking about the mitigation measures necessary to prevent conflict escalation should deterrence fail – will all be critical in upholding nuclear deterrence as both policy and practice. Department/project International Security Programme, Deterrence Perspectives in the 21st Century Full Article
rsp Power and diplomacy in the post-liberal cyberspace By feedproxy.google.com Published On :: Thu, 07 May 2020 09:31:03 +0000 7 May 2020 , Volume 96, Number 3 André Barrinha and Thomas Renard Read online It is becoming widely accepted that we have transitioned, or are now transitioning, from an international liberal order to a different reality. Whether that reality is different solely in terms of power dynamics, or also in terms of values and institutions, is up for discussion. The growing body of literature on ‘post-liberalism’ is used as an entry-point for this article, which aims to explore how the post-liberal transition applies to cyberspace. We explore how power dynamics are evolving in cyberspace, as well as how established norms, values and institutions are contested. The article then looks at the emergence of cyber diplomacy as a consequence and response to the post-liberal transition. As it will be argued, if cyberspace was a creation of the liberal order, cyber-diplomacy is a post-liberal world practice. What role it plays in shaping a new order or building bridges between different political visions, and what it means for the future of cyberspace, will constitute key points of discussion. Full Article
rsp Power Politics Could Impede Progress on Responsible Regulation of Cyberspace By feedproxy.google.com Published On :: Tue, 03 Dec 2019 14:34:13 +0000 3 December 2019 Harriet Moynihan Senior Research Fellow, International Law Programme @HarrietMoyniha9 A new Chatham House paper examines the prospects of countries reaching agreement on issues of sovereignty and non-intervention in cyberspace in the face of persistent, low-level, state-to-state cyber attacks. 2019-11-29-Intl-Law-Cyberattacks.jpg A computer hacked by a virus known as Petya. The Petya ransomware cyberattack hit computers of Russian and Ukrainian companies on 27 June 2017. Photo: Getty Images. In discussions to date about how international law applies in cyberspace, commentators have tended to focus their attention on how the rules on the use of force, or the law of armed conflict, apply to cyber activities conducted by states that give rise to physical damage, injury or death.But in practice, the vast majority of state cyberattacks fall below this threshold. Far more common are persistent, low-level attacks that may leave no physical trace but that are capable of doing significant damage to a state’s ability to control its systems, often at serious economic cost.Such cyber incursions might include network disruptions in the operation of another government’s websites; tampering with electoral infrastructure to change or undermine the result; or using cyber means to destabilize another state’s financial sector.For these kinds of cyber operation, the principle of sovereignty, and the principle of non-intervention in another state’s internal affairs, are the starting point.A UN Group of Government Experts (GGE) agreed in 2013 and 2015 that the principles in the UN Charter, including sovereignty and the prohibition on intervention in another state’s affairs, apply to states’ activities in cyberspace. The 2015 GGE also recommended eleven (non-binding) norms of responsible state behaviour in cyberspace.However, states have not yet reached agreement on how to apply these principles. Until recently, there has also been very little knowledge of what states actually do in cyberspace, as they usually conduct cyber operations covertly and have been reluctant to put their views on record.A new Chatham House research paper analyses the application of the principles of sovereignty and non-intervention to state cyberattacks that fall below the principle of use of force. As well as analysing the application of the law in this area, the paper also makes recommendations to governments on how they might best make progress in reaching agreement in this area.Existing rules or new rules?As the research paper makes clear, there is currently some debate, principally between countries in the West, about the extent to which sovereignty is a legally binding rule in the context of cyberspace and, if so, how it and the principle of non-intervention might apply in practice.In the last few years, certain states have put on record how they consider international law to apply to states’ activities in cyberspace, namely the UK, Australia, France and the Netherlands. While there may be some differences in their approaches, which are discussed in the paper, there also remains important common ground: namely, that existing international law already provides a solid framework for regulating states’ cyber activities, as it regulates every other domain of state-to-state activity.There is also an emerging trend for states to work together when attributing cyberattacks to hostile states, enabling them to call out malign cyber activity when it violates international law. (See, for example, the joint statements made in relation to the NotPetya cyber attack and malicious cyber activity attributed to the Russian government).However, other countries have questioned whether existing international law as it stands is capable of regulating states’ cyber interactions and have called for ‘new legal instruments’ in this area.This includes a proposal by the Shanghai Cooperation Organization (led by Russia and China) for an International Code of Conduct on Information Security, a draft of which was submitted to the UN in 2011 and 2015, without success. The UN has also formed a new Open-Ended Working Group (OEWG) under a resolution proposed by Russia to consider how international law applies to states’ activities in cyberspace.The resolution establishing the OEWG, which began work earlier this year, includes the possibility of the group ‘introducing changes to the rules, norms and principles of responsible behaviour of States’ agreed in the 2013 and 2015 GGE reports. In the OEWG discussions at the UN in September, several countries claimed that a new legal instrument was needed to fill the ‘legal vacuum’ (Cuba) or ‘the gap of ungoverned areas’ (Indonesia).It would be concerning if the hard-won consensus on the application of international law to cyberspace that has been reached at past GGEs started to unravel. In contrast to 2013 and 2015, the 2017 meeting failed to reach an agreement.On 9 December, a renewed GGE will meet in New York, but the existence of the OEWG exploring the same issues in a separate process reflects the fact that cyber norms have become an area of geopolitical rivalry.Aside from the application of international law, states are also adopting divergent approaches to the domestic regulation of cyberspace within their own territory. The emerging trend towards a ‘splinternet’ – i.e. between states that believe the internet should be global and open on the hand, and those that favour a ‘sovereignty and control’ model on the other – is also likely to make discussions at the GGE more challenging.Distinct from the international law concept of sovereignty is the notion of ‘cybersovereignty’, a term coined by China to describe the wide-ranging powers it assumes under domestic law to regulate its citizens’ access to the internet and personal data within its territory. This approach is catching on (as reflected in Russia’s recently enacted ‘Sovereign Internet Law’), with other authoritarian states likely to follow suit.The importance of non-state actorsIn parallel with regional and UN discussions on how international law applies, a number of initiatives by non-state actors have also sought to establish voluntary principles about responsible state behaviour in cyberspace.The Global Commission on the Stability of Cyberspace, a multi-stakeholder body that has proposed principles, norms and recommendations to guide responsible behaviour by all parties in cyberspace, recently published its final report. The Cybersecurity Tech Accord aims to promote collaboration between tech companies on stability and resilience in cyberspace. President Macron’s ‘Paris Call for Trust and Security in Cyberspace’ has to date received the backing of 67 states, 139 international and civil society organizations, and 358 private-sector organizations.It remains to be seen in the long term whether the parallel processes at the UN will work constructively together or be competitive. But notwithstanding the challenging geopolitical backdrop, the UN GGE meeting next week at the least offers states the opportunity to consolidate and build on the results of past meetings; to increase knowledge and discussion about how international law might apply; and to encourage more states to put their own views of these issues on the record. Full Article
rsp Harriott urges caution with RSPL decision By jamaica-gleaner.com Published On :: Wed, 06 May 2020 23:16:13 -0500 Portmore United captain Rosario Harriott says the Premier League Clubs Association shouldn’t rush to call off this season of the Red Stripe Premier League (RSPL) because of the COVID-19 pandemic. The league was stopped indefinitely in mid-March... Full Article
rsp PLCA eyes July RSPL restart By jamaica-gleaner.com Published On :: Fri, 08 May 2020 00:24:45 -0500 Premier League Clubs Association (PLCA) vice-chairman Carvel Stewart says that the Red Stripe Premier League (RSPL) could return in July at the earliest. The nation’s top flight has been on hiatus since March, with four games left in the regular... Full Article
rsp Role of oxidative stress in diabetic complications: a new perspective on an old paradigm By diabetes.diabetesjournals.org Published On :: 1999-01-01 JW BaynesJan 1, 1999; 48:1-9Articles Full Article
rsp Virtual Breakfast: Engaging with the EU From the Outside: A Perspective From Norway By feedproxy.google.com Published On :: Tue, 07 Apr 2020 14:45:01 +0000 Invitation Only Research Event 24 April 2020 - 8:30am to 9:30am Event participants Niels Engelschiøn, Director-General, Department for European Affairs, Norwegian Ministry of Foreign AffairsChair: Dr Robin Niblett, Director; Chief Executive, Chatham House Please note this an online-only event.Norway is one of the few European countries that remains outside of the European Union. After the country’s population rejected the prospect of joining the EU twice, Norway’s relationship with the Union has been based on its membership of the European Economic Area (EEA), alongside Iceland and Liechtenstein.The ‘Norway Model’ was often mentioned in the run up to the Brexit vote as a possible basis for Britain’s future relationship with the bloc, not least because it offers the least disruption to the current arrangement. Equally, Norway is not subject to the EU fisheries policy - an anticipated major issue in the next phase of Brexit talks. Nor is it part of the EU Customs Union.Even though Prime Minister Johnson has now ruled out the type of deep economic and regulatory integration with the EU that Norway enjoys through its EEA membership, the country’s experience can still offer valuable lessons for the UK as it prepares to exit the transition period at the end of 2020.In this session, the speaker will share Norway’s experience as a long-standing EEA member and discuss the challenges of engaging with the EU from the outside. What lessons can Norway offer the UK ahead of the negotiations on the future of UK-EU relations? What are the limits of its current arrangement with the EU? And is there any appetite among the Norwegian population to revisit it? Department/project Europe Programme, Britain and Europe: The Post-Referendum Agenda Alina Lyadova Europe Programme Coordinator Email Full Article
rsp The Indo-Pacific: Geostrategic Perspectives to 2024 - Workshop 3 By feedproxy.google.com Published On :: Mon, 14 Oct 2019 09:10:01 +0000 Invitation Only Research Event 17 October 2019 - 9:30am to 2:00pm Institut Francais des Relations Internationales, 27 rue de la Procession, 75740 Paris Cedex 15, France This closed-door roundtable explores possible strategic shifts in the Indo-Pacific between now and 2024. Focusing on trade security, climate change disruptions and security cooperation, it aims to enhance the understanding of the regional goals of, and strategic relationships between, the key countries active in the region.The workshop is part of a larger project funded by the Strategic Policy Division of the Australian Department of Defence. The project includes workshops in the United States, the United Kingdom, France, Japan, India and the Pacific Islands (Tonga).Attendance at this event is by invitation only. Department/project Asia-Pacific Programme, Geopolitics and Governance, Sustainable and Inclusive Growth, Trade, Investment and Economics, Energy, Environment and Resources Programme, Geostrategic Outlook for the Indo-Pacific 2019-2024 Anna Aberg Research Analyst, Energy, Environment and Resources Programme 020 7314 3629 Email Full Article
rsp Patient perspective: Roger Boyes By feeds.bmj.com Published On :: Wednesday, May 6, 2020 - 09:27 Full Article
rsp Patient perspective: Gordon Sturmey and Matt Wiltshire By feeds.bmj.com Published On :: Wednesday, May 6, 2020 - 16:45 Full Article
rsp Unequal Perspectives on Racial Equality By www.washingtonpost.com Published On :: Mon, 24 Mar 2008 00:00:00 EDT Imagine that you are waiting in line to be born . . . Presently, you are scheduled to be born white. However, you are offered an alternative arrangement. In exchange for a cash gift, to be deposited in a bank account for you when you are born, you can choose to instead be born black. Full Article Opinions Unequal Perspectives on Racial Equality
rsp The Role of Think Tanks in Times of (Migration) Crisis: A Transatlantic Perspective By www.migrationpolicy.org Published On :: Tue, 05 Sep 2017 10:07:11 -0400 As European policymakers and publics continue to grapple with the migration crisis, this conversation offers an opportunity to reflect on the role and responsibility of experts in these politically sensitive debates. Full Article
rsp Perspectives in Gestational Diabetes Mellitus: A Review of Screening, Diagnosis, and Treatment By clinical.diabetesjournals.org Published On :: 2007-04-01 Jennifer M. PerkinsApr 1, 2007; 25:57-62Feature Articles Full Article
rsp An evolutionary perspective on human health and disease | Lara Durgavich By feedproxy.google.com Published On :: Mon, 20 Apr 2020 15:39:18 +0000 How does your genetic inheritance, culture and history influence your health? Biological anthropologist Lara Durgavich discusses the field of evolutionary medicine as a gateway to understanding the quirks of human biology -- including why a genetic mutation can sometimes have beneficial effects -- and emphasizes how unraveling your own evolutionary past could glean insights into your current and future health. Full Article Higher Education
rsp The PACE Perspective on the 'The California Way' By feedproxy.google.com Published On :: Mon, 11 Jul 2016 00:00:00 +0000 Policy Analysis for California Education has been a premier ed policy organization for three decades. As Daisy Gonzales writes, it is in the forefront of shaping current reforms and interpreting them for audiences such as 'On California.' Full Article California
rsp Student Perspective: The True Meaning of Aloha By feedproxy.google.com Published On :: Mon, 04 Mar 2019 00:00:00 +0000 "Aloha" isn't just a greeting; in a way it is their way of life, and when you distort that sacred word, you distort their way of life. Full Article Hawaii
rsp Advertising, gender and society : a psychological perspective / Magdalena Zawisza-Riley. By www.catalog.slsa.sa.gov.au Published On :: Advertising -- Psychological aspects. Full Article
rsp Dark times : psychoanalytic perspectives on politics, history, and mourning / Jonathan Sklar. By www.catalog.slsa.sa.gov.au Published On :: Psychoanalysis. Full Article
rsp Die Frage über die Heilbarkeit der Lungenphthisen : historisch, pathologisch und therapeutisch untersucht / von Joh. Bapt. Ullersperger. By feedproxy.google.com Published On :: Wurzburg : Stahel, 1867. Full Article
rsp Cocaine use in America : epidemiologic and clinical perspectives / editors, Nicholas J. Kozel, Edgar H. Adams. By search.wellcomelibrary.org Published On :: Rockville, Maryland : National Institute on Drug Abuse, 1985. Full Article
rsp Needle sharing among intravenous drug abusers: national and international perspectives / Editors, Robert J. Battjes, Roy W. Pickens. By search.wellcomelibrary.org Published On :: Rockville, Maryland : National Institute on Drug Abuse, 1988. Full Article
rsp The wilderness of mind : sacred plants in cross-cultural perspective / Marlene Dobkin De Rios. By search.wellcomelibrary.org Published On :: Beverly Hills : Sage Publications, 1976. Full Article
rsp Bill Walton joins Pac-12 Perspective to talk about Bike for Humanity By sports.yahoo.com Published On :: Sat, 18 Apr 2020 01:59:16 GMT Pac-12 Networks' Yogi Roth and Ashley Adamson talk with Hall of Fame player and Pac-12 Networks talent Bill Walton during Thursday's Pac-12 Perspective podcast. Full Article video Sports
rsp Perspective maximum likelihood-type estimation via proximal decomposition By projecteuclid.org Published On :: Mon, 27 Apr 2020 22:02 EDT Patrick L. Combettes, Christian L. Müller. Source: Electronic Journal of Statistics, Volume 14, Number 1, 207--238.Abstract: We introduce a flexible optimization model for maximum likelihood-type estimation (M-estimation) that encompasses and generalizes a large class of existing statistical models, including Huber’s concomitant M-estimator, Owen’s Huber/Berhu concomitant estimator, the scaled lasso, support vector machine regression, and penalized estimation with structured sparsity. The model, termed perspective M-estimation, leverages the observation that convex M-estimators with concomitant scale as well as various regularizers are instances of perspective functions, a construction that extends a convex function to a jointly convex one in terms of an additional scale variable. These nonsmooth functions are shown to be amenable to proximal analysis, which leads to principled and provably convergent optimization algorithms via proximal splitting. We derive novel proximity operators for several perspective functions of interest via a geometrical approach based on duality. We then devise a new proximal splitting algorithm to solve the proposed M-estimation problem and establish the convergence of both the scale and regression iterates it produces to a solution. Numerical experiments on synthetic and real-world data illustrate the broad applicability of the proposed framework. Full Article
rsp A temporal perspective on the rate of convergence in first-passage percolation under a moment condition By projecteuclid.org Published On :: Mon, 04 Mar 2019 04:00 EST Daniel Ahlberg. Source: Brazilian Journal of Probability and Statistics, Volume 33, Number 2, 397--401.Abstract: We study the rate of convergence in the celebrated Shape Theorem in first-passage percolation, obtaining the precise asymptotic rate of decay for the probability of linear order deviations under a moment condition. Our results are presented from a temporal perspective and complement previous work by the same author, in which the rate of convergence was studied from the standard spatial perspective. Full Article
rsp Pitfalls of significance testing and $p$-value variability: An econometrics perspective By projecteuclid.org Published On :: Wed, 03 Oct 2018 22:00 EDT Norbert Hirschauer, Sven Grüner, Oliver Mußhoff, Claudia Becker. Source: Statistics Surveys, Volume 12, 136--172.Abstract: Data on how many scientific findings are reproducible are generally bleak and a wealth of papers have warned against misuses of the $p$-value and resulting false findings in recent years. This paper discusses the question of what we can(not) learn from the $p$-value, which is still widely considered as the gold standard of statistical validity. We aim to provide a non-technical and easily accessible resource for statistical practitioners who wish to spot and avoid misinterpretations and misuses of statistical significance tests. For this purpose, we first classify and describe the most widely discussed (“classical”) pitfalls of significance testing, and review published work on these misuses with a focus on regression-based “confirmatory” study. This includes a description of the single-study bias and a simulation-based illustration of how proper meta-analysis compares to misleading significance counts (“vote counting”). Going beyond the classical pitfalls, we also use simulation to provide intuition that relying on the statistical estimate “$p$-value” as a measure of evidence without considering its sample-to-sample variability falls short of the mark even within an otherwise appropriate interpretation. We conclude with a discussion of the exigencies of informed approaches to statistical inference and corresponding institutional reforms. Full Article
rsp An approximate likelihood perspective on ABC methods By projecteuclid.org Published On :: Fri, 08 Jun 2018 22:03 EDT George Karabatsos, Fabrizio Leisen. Source: Statistics Surveys, Volume 12, 66--104.Abstract: We are living in the big data era, as current technologies and networks allow for the easy and routine collection of data sets in different disciplines. Bayesian Statistics offers a flexible modeling approach which is attractive for describing the complexity of these datasets. These models often exhibit a likelihood function which is intractable due to the large sample size, high number of parameters, or functional complexity. Approximate Bayesian Computational (ABC) methods provides likelihood-free methods for performing statistical inferences with Bayesian models defined by intractable likelihood functions. The vastity of the literature on ABC methods created a need to review and relate all ABC approaches so that scientists can more readily understand and apply them for their own work. This article provides a unifying review, general representation, and classification of all ABC methods from the view of approximate likelihood theory. This clarifies how ABC methods can be characterized, related, combined, improved, and applied for future research. Possible future research in ABC is then outlined. Full Article
rsp Clinical approaches in endodontic regeneration : current and emerging therapeutic perspectives By dal.novanet.ca Published On :: Fri, 1 May 2020 19:44:43 -0300 Callnumber: OnlineISBN: 9783319968483 (electronic bk.) Full Article
rsp Brassica improvement : molecular, genetics and genomic perspectives By dal.novanet.ca Published On :: Fri, 1 May 2020 19:44:43 -0300 Callnumber: OnlineISBN: 9783030346942 (electronic bk.) Full Article
rsp Subspace perspective on canonical correlation analysis: Dimension reduction and minimax rates By projecteuclid.org Published On :: Tue, 26 Nov 2019 04:00 EST Zhuang Ma, Xiaodong Li. Source: Bernoulli, Volume 26, Number 1, 432--470.Abstract: Canonical correlation analysis (CCA) is a fundamental statistical tool for exploring the correlation structure between two sets of random variables. In this paper, motivated by the recent success of applying CCA to learn low dimensional representations of high dimensional objects, we propose two losses based on the principal angles between the model spaces spanned by the sample canonical variates and their population correspondents, respectively. We further characterize the non-asymptotic error bounds for the estimation risks under the proposed error metrics, which reveal how the performance of sample CCA depends adaptively on key quantities including the dimensions, the sample size, the condition number of the covariance matrices and particularly the population canonical correlation coefficients. The optimality of our uniform upper bounds is also justified by lower-bound analysis based on stringent and localized parameter spaces. To the best of our knowledge, for the first time our paper separates $p_{1}$ and $p_{2}$ for the first order term in the upper bounds without assuming the residual correlations are zeros. More significantly, our paper derives $(1-lambda_{k}^{2})(1-lambda_{k+1}^{2})/(lambda_{k}-lambda_{k+1})^{2}$ for the first time in the non-asymptotic CCA estimation convergence rates, which is essential to understand the behavior of CCA when the leading canonical correlation coefficients are close to $1$. Full Article
rsp Art Around the Library - Drawing Perspective By feedproxy.google.com Published On :: Mon, 04 May 2020 00:38:23 +0000 Investigate perspective in some fabulous photographs and discover tips and tricks. Full Article
rsp Comment: Statistical Inference from a Predictive Perspective By projecteuclid.org Published On :: Wed, 08 Jan 2020 04:00 EST Alessandro Rinaldo, Ryan J. Tibshirani, Larry Wasserman. Source: Statistical Science, Volume 34, Number 4, 599--603.Abstract: What is the meaning of a regression parameter? Why is this the de facto standard object of interest for statistical inference? These are delicate issues, especially when the model is misspecified. We argue that focusing on predictive quantities may be a desirable alternative. Full Article
rsp Reese Witherspoon and I Wear the Same Comfy Hoka One One Sneakers to Run Errands By www.health.com Published On :: Mon, 09 Dec 2019 17:49:04 -0500 Once you try them, you’ll never want to wear anything else Full Article
rsp The Right Temporoparietal Junction Is Causally Associated with Embodied Perspective-taking By www.jneurosci.org Published On :: 2020-04-08T09:30:18-07:00 A prominent theory claims that the right temporoparietal junction (rTPJ) is especially associated with embodied processes relevant to perspective-taking. In the present study, we use high-definition transcranial direct current stimulation to provide evidence that the rTPJ is causally associated with the embodied processes underpinning perspective-taking. Eighty-eight young human adults were stratified to receive either rTPJ or dorsomedial PFC anodal high-definition transcranial direct current stimulation in a sham-controlled, double-blind, repeated-measures design. Perspective-tracking (line-of-sight) and perspective-taking (embodied rotation) were assessed using a visuo-spatial perspective-taking task that required understanding what another person could see or how they see it, respectively. Embodied processing was manipulated by positioning the participant in a manner congruent or incongruent with the orientation of an avatar on the screen. As perspective-taking, but not perspective-tracking, is influenced by bodily position, this allows the investigation of the specific causal role for the rTPJ in embodied processing. Crucially, anodal stimulation to the rTPJ increased the effect of bodily position during perspective-taking, whereas no such effects were identified during perspective-tracking, thereby providing evidence for a causal role for the rTPJ in the embodied component of perspective-taking. Stimulation to the dorsomedial PFC had no effect on perspective-tracking or taking. Therefore, the present study provides support for theories postulating that the rTPJ is causally involved in embodied cognitive processing relevant to social functioning. SIGNIFICANCE STATEMENT The ability to understand another's perspective is a fundamental component of social functioning. Adopting another perspective is thought to involve both embodied and nonembodied processes. The present study used high-definition transcranial direct current stimulation (HD-tDCS) and provided causal evidence that the right temporoparietal junction is involved specifically in the embodied component of perspective-taking. Specifically, HD-tDCS to the right temporoparietal junction, but not another hub of the social brain (dorsomedial PFC), increased the effect of body position during perspective-taking, but not tracking. This is the first causal evidence that HD-tDCS can modulate social embodied processing in a site-specific and task-specific manner. Full Article
rsp Shutting Down Hawai‘i: A Historical Perspective on Epidemics in the Islands By www.smithsonianmag.com Published On :: Wed, 25 Mar 2020 14:00:00 +0000 A museum director looks to the past to explain why 'Aloha' is as necessary as ever Full Article
rsp Quelles perspectives après la présidentielle? By feedproxy.google.com Published On :: Fri, 28 Mar 2008 23:00:00 GMT Full Article
rsp Lessons learned during past pandemics - from a Catholic perspective By feedproxy.google.com Published On :: Tue, 05 May 2020 00:00:00 -0600 By Dr. Grazie Pozo ChristieCoronavirus is only the latest iteration of an age-old human affliction. Even now, with the benefit of advanced medical science, our reaction – our confusion, our fear – is not so different from how our ancestors experienced recurrent and terrifying onslaughts of plague, cholera, and yellow fever across the ages. We can learn from the courage and ingenuity of those who travelled this road before us. Consider the work of Dr. Carlos Finlay in Cuba. In 1880 he hypothesized, and then worked to prove his hypothesis, that yellow fever, a disease that regularly decimated coastal populations up and down the Americas, was spread by infected mosquitos. Those mosquitos came to our shores in the 17th century on African slave ships and attacked portal communities in the tropics as well as cities like New Orleans and Philadelphia. The resulting epidemics occurred with oppressive regularity in the summer months, to the people’s great dread, with mortality rates as high as 50 percent. The impact was tremendous – not only in the milllions of lives lost and the wretchedness this caused, but in economic gains and opportunities wiped out or delayed (the Panama Canal). Connecting the transmission of the deadly virus to its source or vector was a decisive step forward in the long struggle against yellow fever. It preceded the development of a vaccine by more than 60 years. Here's how it happened: A young doctor, Carlos Finlay, returned to his home in Havana one night, exhausted, after caring for a Carmelite priest dying of yellow fever. Realizing he had forgotten to say his daily rosary, he sat in his armchair, sweating in the oppressive heat, fingering his beads and swatting at a bothersome mosquito. Suddenly, inspiration pierced his depression and weariness: Could the mosquito, like the one annoying him that moment, be transmitting the infection from person to person? If so, this was marvelous. One could not fight the brutal steamy summer air – the miasma – but one could fight mosquitos. Inspiration, however, was not enough to proceed. Courage and even heroism would be needed to prove Finlay’s hypothesis. These were at hand, thanks to 57 young Jesuit priests and brothers who volunteered as experimental subjects. As each arrived from Spain to staff the Colegio de Belen, newly founded by Queen Isabel II of Spain, he was met by Finlay, carrying a test tube filled with mosquitos that had just fed on a patient sick with yellow fever. Taking their lives in their hands, these Jesuits allowed themselves to be bitten for the sake of their fellow human beings. Three died of the bite, but all 57 were willing to do the same. Subsequent experiments supported Finlay’s hypothesis. Although a vaccine to definitively eradicate the disease would not come for decades, Finlay’s insight helped man to co-exist safely with yellow fever until that time. The incidence of yellow fever in Cuba dropped precipitously through mosquito control. Standing water, a breeding ground for the noxious pests, was eliminated where possible or treated aggressively with insecticides where not. Panama, where tens of thousands of workers had already died of the disease while building the canal followed Cuba’s lead. The last Panama Canal worker to die of yellow fever came in 1906. There are important lessons for us here -- first and foremost, lessons in resourcefulness and valor. Already, thousands of human minds are, today, tenaciously working to find a solution to Covid-19. They’re persisting without respite, persisting through depression and fatigue, to find a way forward. Just as Dr. Finlay did. And, you can depend on it, inspiration is sure to strike again. You can also see today the same kind of valor that animated the Jesuit volunteers who let the infected mosquitos bite them. You see it in the countless men and women who keep showing up for work at nursing homes or crowded food production lines. Their examples help us all to keep up and increase our courage so we can join them as we ease back into our normal daily lives. As we face the moment when we too realize that we have no choice but to go back out into the world of work and personal interactions, we can take hope from contemplating our predecessors’ success in confronting yellow fever. Like us, they dreamed of a vaccine. But they didn’t lock themselves away until it was developed. They found a way to steel themselves and then to steal the deadly efficiency away from the virus that plagued them. A century later, we can do the same. Full Article CNA Columns: Guest Columnist
rsp Perspectives on Informed Consent Practices for Minimal-Risk Research Involving Foster Youth By pediatrics.aappublications.org Published On :: 2020-04-01T01:00:57-07:00 Full Article
rsp What Differentiated Instruction Is Not: A Teacher's Perspective By feedproxy.google.com Published On :: Fri, 22 Nov 2019 00:00:00 +0000 Taking differentiation to mean "everything all the time" isn’t a sustainable model, warns English teacher Chad Towarnicki. Full Article Classroom+management
rsp From the Archives: Perspectives on ESEA By feedproxy.google.com Published On :: Tue, 31 Mar 2015 00:00:00 +0000 The policy implications of the ESEA, and its most recent reauthorization, the No Child Left Behind Act, have been at the heart of an enduring public debate. Full Article Esea
rsp Nonurgent Emergency-Department Care: Analysis of Parent and Primary Physician Perspectives By pediatrics.aappublications.org Published On :: 2011-01-17T04:01:12-08:00 Many patient and family demographic characteristics are well-known risk factors for nonurgent emergency-department use. No previous study has examined the primary care physician perspective on parental decisions regarding specific nonurgent emergency-department visits by children. When discussing specific instances when families in their practices sought nonurgent care for children in the emergency department, physicians believed that parents acted appropriately. Neither parents nor primary care physicians saw nonurgent emergency-department visits as a significant enough problem to warrant change. (Read the full article) Full Article
rsp Pediatric Residents' Perspectives on Reducing Work Hours and Lengthening Residency: A National Survey By pediatrics.aappublications.org Published On :: 2012-06-04T00:07:37-07:00 In 2011, the Accreditation Council on Graduate Medical Education increased restrictions on resident duty-hours. Further changes have been considered, including greater work-hour restrictions and lengthening residency. Residents’ views about these policies are unclear.This is the first systematic, national inquiry into resident opinions on reduced work-hours and longer residency. More pediatric residents support than oppose reduced hours, and a minority would add a year to residency to achieve them. (Read the full article) Full Article
rsp Higher-Hazard, No Benefit Research Involving Children: Parental Perspectives By pediatrics.aappublications.org Published On :: 2013-10-14T00:07:21-07:00 Higher-hazard, no-benefit research involving children may be approved by local institutional review boards only when the protocol enrolls children with the medical condition under study. The ethics of this distinction have been debated, but parental opinions have not been explored.We found that parental opinions support federal regulations. We discuss parental motivations for and against research participation and the extent to which enrolling a child in higher-hazard, no-benefit research reflects appropriate surrogate decision-making. (Read the full article) Full Article