31 results on '"Kane Smith"'
Search Results
2. Wealth effects of firm's strategic technology investments: evidence from Ethereum blockchain.
- Author
-
Kane Smith, Manu Gupta, Puneet Prakash, and Nanda Rangan
- Published
- 2024
- Full Text
- View/download PDF
3. Re-framing the policy conversation for preventing cyberstalking.
- Author
-
Kane Smith and Gurpreet Dhillon
- Published
- 2023
- Full Text
- View/download PDF
4. The Relationship between Social Capital and Social Media Addiction: The Role of Privacy Self-Efficacy.
- Author
-
Franck Soh, Kane Smith, and Gurpreet Dhillon
- Published
- 2022
- Full Text
- View/download PDF
5. Improving the Cybersecurity of Financial Transactions: Assessing Blockchain Potential.
- Author
-
Kane Smith and Gurpreet Dhillon
- Published
- 2019
6. Reconciling value-based objectives for security and identity management.
- Author
-
Kane Smith, Gurpreet Dhillon, and Karin Hedström
- Published
- 2018
- Full Text
- View/download PDF
7. Defining Objectives for Preventing Cyberstalking.
- Author
-
Gurpreet Dhillon, Chandrashekar Challa, and Kane Smith
- Published
- 2016
- Full Text
- View/download PDF
8. Eliciting Societal Values for Health Information Policy Decisions.
- Author
-
Kane Smith and Gurpreet Dhillon
- Published
- 2018
9. Re-framing the policy conversation for preventing cyberstalking
- Author
-
Kane Smith and Gurpreet Dhillon
- Subjects
Economics and Econometrics ,Sociology and Political Science ,Communication - Abstract
PurposeCyberstalking is a growing threat to society, and policymakers should address it utilizing the input of constituents. For this, two key components are required: actionable objectives informed by the values of society and the means of implementation to maximize their potential benefits. The process should be guided by the constituent's values, requiring the elicitation of intrinsic values as individual preferences that are extrapolated to society at large.Design/methodology/approachThe authors utilize Keeney's (1990) public value forum and Sen's (1999) social choice theory (Sen, 1999) to elicit and convert these intrinsic values to serve as the basis for developing public policy to prevent cyberstalking.FindingsThe results demonstrate a strong desire by participants to have clear regulations, policies and procedures developed in concert with industry and enforced by the government that elucidate required protections against cyberstalking in combination with strong technical controls. These policies should guide technical control development and implementation, but leave ultimate control in the hands of technology users to decide what controls they want to utilize.Originality/valueThis study is the first to utilize Keeney's (1988) public value forum in the context of cyberstalking to develop quantitative measures regarding technology users' desired cybersecurity protections against cyberstalking. The authors provide a decision-making framework for policymakers to develop a new policy based on the input of their constituents in a manner that maximizes their potential utility and ultimate benefit.
- Published
- 2022
- Full Text
- View/download PDF
10. Information systems security research agenda: Exploring the gap between research and practice.
- Author
-
Gurpreet Dhillon, Kane Smith, and Indika Dissanayaka
- Published
- 2021
- Full Text
- View/download PDF
11. FUME-TCRseq: Sensitive and accurate sequencing of the T-cell receptor from limited input of degraded RNA
- Author
-
Ann-Marie Baker, Gayathri Nageswaran, Pablo Nenclares, Tahel Ronel, Kane Smith, Christopher Kimberley, Miangela M Lacle, Shree Bhide, Kevin J Harrington, Alan Melcher, Manuel Rodriguez-Justo, Benny Chain, and Trevor A Graham
- Abstract
Genomic analysis of the T-cell receptor (TCR) reveals the strength, breadth and clonal dynamics of the adaptive immune response to pathogens or cancer. The diversity of the TCR repertoire, however, means that sequencing is technically challenging, particularly for samples with low quality, degraded nucleic acids. Here, we have developed and validated FUME-TCRseq, a robust and sensitive RNA-based TCR sequencing methodology that is suitable for formalin-fixed paraffin-embedded samples and low amounts of input material. FUME-TCRseq incorporates unique molecular identifiers into each molecule of cDNA, allowing correction for sequencing errors and PCR bias. We used RNA extracted from colorectal and head and neck cancers to benchmark the accuracy and sensitivity of FUME-TCRseq against existing methods, and found excellent concordance between the datasets. Furthermore, FUME-TCRseq detected more clonotypes than a commercial RNA-based alternative, with shorter library preparation time and significantly lower cost. The high sensitivity and the ability to sequence RNA of poor quality and limited amount enables quantitative analysis of small numbers of cells from archival tissue sections, which is not possible with other methods. To demonstrate this we performed spatially-resolved FUME-TCRseq of colorectal cancers using macrodissected archival samples, revealing the shifting T-cell landscapes at the transition to an invasive phenotype, and between tumour subclones containing distinct driver alterations. In summary, FUME-TCRseq represents an accurate, sensitive and low-cost tool for the characterisation of T-cell repertoires, particularly in samples with low quality RNA that have not been accessible using existing methodology.
- Published
- 2023
- Full Text
- View/download PDF
12. Evolutionary and immune microenvironment dynamics during neoadjuvant treatment of oesophagael adenocarcinoma
- Author
-
Melissa Barroux, Jacob Househam, Eszter Lakatos, Tahel Ronel, Ann-Marie Baker, Henrike Salié, Max Mossner, Kane Smith, Chris Kimberley, Salpie Nowinski, Alison Berner, Vinaya Gunasri, Marnix Jansen, Giulio Caravagna, Katja Steiger, Julia Slotta-Huspenina, Wilko Weichert, Markus Alberstmeier, Benny Chain, Helmut Friess, Bertram Bengsch, Roland Schmid, Jens Siveke, Michael Quante, and Trevor Graham
- Abstract
Locally advanced oesophageal adenocarcinoma (EAC) remains difficult to treat because of common resistance to neoadjuvant therapy and high recurrence rates. The ecological and evolutionary dynamics responsible for treatment failure are incompletely understood. Here, we performed a comprehensive multi-omic analysis of samples collected from EAC patients in the MEMORI clinical trial, revealing major changes in gene expression profiles and immune microenvironment composition that did not appear to be driven by changes in clonal composition. Multi-region multi-timepoint whole exome (300x depth) and paired transcriptome sequencing was performed on 27 patients pre-, during and after neoadjuvant treatment. EAC showed major transcriptomic changes during treatment with upregulation of immune and stromal pathways and oncogenic pathways such as KRAS, Hedgehog and WNT. However, genetic data revealed that clonal sweeps were rare, suggesting that gene expression changes were not clonally driven. Additional longitudinal image mass cytometry was performed in a subset of 15 patients and T-cell receptor sequencing in 10 patients, revealing remodelling of the T-cell compartment during treatment and other shifts in microenvironment composition. The presence of immune escape mechanisms and a lack of clonal T-cell expansions were linked to poor clinical treatment response. This study identifies profound transcriptional changes during treatment with limited evidence that clonal replacement is the cause, suggesting phenotypic plasticity and immune dynamics as mechanisms for therapy resistance with pharmacological relevance.
- Published
- 2023
- Full Text
- View/download PDF
13. Blockchain for Privacy and Security: The Case of Health Informatics.
- Author
-
Gurpreet Dhillon, Kane Smith, and Monica C. Tremblay
- Published
- 2017
14. Blockchain for Digital Crime Prevention: The Case of Health Informatics.
- Author
-
Kane Smith and Gurpreet Dhillon
- Published
- 2017
15. iGen User (over) Attachment to Social Media: Reframing the Policy Intervention Conversation
- Author
-
Kane Smith, Brigid A. Otoo, and Gurpreet Dhillon
- Subjects
Computer Networks and Communications ,media_common.quotation_subject ,Psychological intervention ,Cognitive reframing ,Mental health ,Theoretical Computer Science ,Action (philosophy) ,Feeling ,Attachment theory ,Conversation ,Social media ,Psychology ,Social psychology ,Software ,Information Systems ,media_common - Abstract
Attachment to social media is a serious problem for iGen users. A recent study of social media use by 10,000 iGen users found 36% were on social media for 2 to 4 h daily, and 11% for more than 5 h. Further, users who reported spending more time on social media were significantly more likely to rate their mental health as poor. With the increasing awareness of the dire consequences of addiction to social media, calls have been made to take action against its continued proliferation. Instead of bans on social media, we call for mild policy-based interventions to guide appropriate positive social media use, while minimizing harmful experiences. Attachment Theory is adopted to understand the individual values and feelings of attachment of iGen to social media. We then use the Value-focused Thinking process to organize values to define iGen’s attachment objectives. In a final synthesis we present a mild policy-based interventions approach to suggest policy interventions and techniques for social media use to combat over-attachment by iGen users.
- Published
- 2021
- Full Text
- View/download PDF
16. Eliciting Societal Values About Cyberstalking Policy Decisions.
- Author
-
Kane Smith and Gurpreet Dhillon
- Published
- 2016
17. Abstract 4539: Tumor evolution and immune microenvironment dynamics define response to neoadjuvant treatment of esophageal adenocarcinoma
- Author
-
Melissa Barroux, Jacob Househam, Eszter Lakatos, Tahel Ronel, Ann-Marie Baker, Henrike Salié, Max Mossner, Kane Smith, Chris Kimberley, Salpie Nowinski, Alison Berner, Vinaya Gunasri, Marnix Jansen, Giulio Caravagna, Julia Slotta-Huspenina, Wilko Weichert, Markus Alberstmeier, Benny Chain, Helmut Friess, Bertram Bengsch, Roland M. Schmid, Jens T. Siveke, Michael Quante, and Trevor A. Graham
- Subjects
Cancer Research ,Oncology - Abstract
Introduction: Locally advanced esophageal adenocarcinoma (EAC) remains difficult to treat, and resistance is common. The ecological and evolutionary dynamics responsible for treatment failure are incompletely understood. Aim & Methods: We performed a multi-omic study with a multi-timepoint strategy to examine neoadjuvant treatment response at clonal resolution and in the surrounding tumor microenvironment. EAC samples from chemotherapy responding (REs) and chemotherapy non-responding (NRs) patients with locally advanced EAC were collected at three time points (prior, during, and after neoadjuvant therapy) within the multicenter MEMORI trial. Whole exome sequencing (mean depth 300x) was performed on 47 samples from 17 REs and on 24 samples from 10 NRs. Matched RNA sequencing was performed on 53 samples from 17 REs and on 26 samples from 10 NRs. To characterize immune response we performed imaging mass cytometry (IMC) with a 18-marker panel on 26 samples from 9 REs and 16 samples from 6 NRs and T-cell receptor sequencing in 18 RE-samples and 9 NR-samples. Results: We observed profound changes in mutation signatures over time, characterized by C>A transitions after exposure to neoadjuvant chemotherapy (FOLFOX), which is consistent with earlier observed oxaliplatin induced mutational signatures. Phylogenetic analysis showed no major changes in the clonal make-up during treatment, suggesting phenotypic plasticity rather than clonal evolution caused treatment resistance. EAC samples displayed widespread copy number alterations (CNAs), as previously described. CNAs arising during treatment were significantly more likely to be small, focal alterations rather than large alterations. At the transcriptome level neoadjuvant treatment led to significant changes with significant upregulation of immune and stromal pathways and oncogenic pathways such as KRAS, Hedgehog and WNT. The presence of immune escape mechanisms (defined as LOH or mutations in HLA, B2M mutations or PDL-1 overexpression) and a lack of clonal T-cell expansions were linked to poor clinical treatment response. Moreover, IMC analyses showed a less activated T-cell phenotype in NRs than in REs throughout treatment. Conclusion: Using a multi-timepoint approach, we integrated genetic analyses with transcriptomic analyses and analyses of the tumor immune microenvironment for a holistic understanding of treatment resistance. This study identifies profound transcriptional changes during treatment with limited evidence that clonal replacement is the cause, suggesting phenotypic plasticity as a mechanism for therapy resistance. The presence of immune escape, a less activated T-cell phenotype and a lack of clonal T-cell expansions in patients with poor clinical treatment response has high pharmacological relevance and could be exploited via combined immune-chemotherapy treatments. Citation Format: Melissa Barroux, Jacob Househam, Eszter Lakatos, Tahel Ronel, Ann-Marie Baker, Henrike Salié, Max Mossner, Kane Smith, Chris Kimberley, Salpie Nowinski, Alison Berner, Vinaya Gunasri, Marnix Jansen, Giulio Caravagna, Julia Slotta-Huspenina, Wilko Weichert, Markus Alberstmeier, Benny Chain, Helmut Friess, Bertram Bengsch, Roland M. Schmid, Jens T. Siveke, Michael Quante, Trevor A. Graham. Tumor evolution and immune microenvironment dynamics define response to neoadjuvant treatment of esophageal adenocarcinoma. [abstract]. In: Proceedings of the American Association for Cancer Research Annual Meeting 2023; Part 1 (Regular and Invited Abstracts); 2023 Apr 14-19; Orlando, FL. Philadelphia (PA): AACR; Cancer Res 2023;83(7_Suppl):Abstract nr 4539.
- Published
- 2023
- Full Text
- View/download PDF
18. HMO-3 Mapping field cancerisation and clonal evolution in IBD colons with dysplasia and CRC
- Author
-
Salpie Nowinski, Kane Smith, Ailsa Hart, Morgan Moorghen, Ibrahim Al-Bakir, Ann-Marie Baker, Mehmet Yalchin, Kit Curtius, Trevor A. Graham, and Chris Kimberley
- Subjects
Field cancerisation ,Dysplasia ,medicine ,Cancer research ,Biology ,medicine.disease ,Somatic evolution in cancer - Published
- 2021
- Full Text
- View/download PDF
19. OMO-4 Developing a genomic biomarker of cancer risk in patients with UC using unselected endoscopic biopsies
- Author
-
Maja Kopczynska, Trevor A. Graham, Morgan Moorghen, Ibrahim Al Bakir, Kane Smith, K Curtius, and Ailsa Hart
- Subjects
Oncology ,Genomic Biomarker ,medicine.medical_specialty ,business.industry ,Internal medicine ,Medicine ,In patient ,business ,Cancer risk - Published
- 2021
- Full Text
- View/download PDF
20. Assessing blockchain potential for improving the cybersecurity of financial transactions
- Author
-
Gurpreet Dhillon and Kane Smith
- Subjects
Value (ethics) ,Blockchain ,Process (engineering) ,05 social sciences ,Context (language use) ,Computer security ,computer.software_genre ,Structuring ,Financial transaction ,0502 economics and business ,Business, Management and Accounting (miscellaneous) ,050211 marketing ,Business ,computer ,050203 business & management ,Finance ,Decision analysis ,Financial sector - Abstract
Purpose Blockchain holds promise as a potential solution to the problem of cybersecurity in financial transactions. However, difficulty exists for both the industry and organizations in assessing this potential solution. Hence, it is important to understand how organizations in the financial sector can address these concerns by exploring blockchain implementation for financial transactions in the context of cybersecurity. To do this, the problem question is threefold: first, what objectives are important based on the strategic values of an organization for evaluating cybersecurity to improve the security of financial transactions? Second, how can they be used to ensure the cybersecurity of financial transactions in a financial organization? Third, how can these objectives be used to evaluate blockchain as a potential solution for enhancing the cybersecurity of organizations in the financial sector relative to existing cybersecurity methods? The paper aims to discuss this issue. Design/methodology/approach To accomplish this goal we utilize Keeney’s (1992) multi-objective decision analytics technique, termed value-focused thinking (VFT), to demonstrate how organizations can assess a blockchain solution’s value to maximize value-add within financial organization. Findings The presented model clearly demonstrates the viability of using Keeney’s (1992) VFT technique as a multi-criteria decision analysis tool for assessing blockchain technology. Further, a clear explanation of how this model can be extended and adapted for individual organizational use is provided. Originality/value This paper engages both the academic literature as well as an expert panel to develop an assessment model for blockchain technology related to financial transactions by providing a useful method for structuring the decision-making process of organizations around blockchain technology.
- Published
- 2019
- Full Text
- View/download PDF
21. Whole genome sequencing for diagnosis of neurological repeat expansion disorders
- Author
-
Greenhalgh L, Fowler T, Karen Temple, Kane Smith, Deshpande, Subramanian S. Ajay, Bourn D, Menzies L, James M. Polke, Pasko D, Polychronopoulos D, Augusto Rendon, Pietro Fratta, Madeleine Reilly, Daugherty L, Chitty Ls, Eggleton K, Raymond Fl, Thomas T. Warner, Paul Brennan, Sian Ellard, Denise L. Perry, Jill Davison, A. C. Need, Arianna Tucci, Prasad Korlipara Lv, Mark J. Caulfield, Meriel McEntagart, Huw R. Morris, Kikkeri N. Naresh, Jenny C. Taylor, Patrick F. Chinnery, Anette Schrag, Aditi Chawla, Deans Zc, Henry Houlden, Twiss P, Douglas A, Sheikh I, Jonathan M. Schott, Hill S, Moutsianas L, Nicholas W. Wood, Tanner Hagelstrom, Robinson R, D. Kasperaviciute, Faravelli F, Rajan, Kristina Ibáñez, Antonio Rueda Martin, Emma L. Baple, Robin Howard, Ellen M. McDonagh, Elisabeth Rosser, Oprych K, Richard Festenstein, John A. Sayer, Kailash P. Bhatia, Michael A. Eberle, Andrew D Mumford, Angus-Leppan H, Thomas E, Matilde Laura, McMullan D, Brittain H, Paola Giunti, Richard H. Scott, Wilson G, Taylor Tavares Al, Ryan J. Taft, Patch C, Hyder Z, Robyn Labrum, Almheiri G, Frances Flinter, Egor Dolzhenko, Santos L, Abbs S, William G. Newman, and Jana Vandrovcova
- Subjects
Whole genome sequencing ,Pediatrics ,medicine.medical_specialty ,medicine.diagnostic_test ,business.industry ,Genome ,Medicine ,Social care ,False positive rate ,Allele ,Family history ,business ,Trinucleotide repeat expansion ,Genetic testing - Abstract
BackgroundRepeat expansion (RE) disorders affect ~1 in 3000 individuals and are clinically heterogeneous diseases caused by expansions of short tandem DNA repeats. Genetic testing is often locus-specific, resulting in under diagnosis of atypical clinical presentations, especially in paediatric patients without a prior positive family history. Whole genome sequencing (WGS) is emerging as a first-line test for rare genetic disorders, but until recently REs were thought to be undetectable by this approach.MethodsWGS pipelines for RE disorder detection were deployed by the 100,000 Genomes Project and Illumina Clinical Services Laboratory. Performance was retrospectively assessed across the 13 most common neurological RE loci using 793 samples with prior orthogonal testing (182 with expanded alleles and 611 with alleles within normal size) and prospectively interrogated in 13,331 patients with suspected genetic neurological disorders.FindingsWGS RE detection showed minimum 97·3% sensitivity and 99·6% specificity across all 13 disease-associated loci. Applying the pipeline to patients from the 100,000 Genomes Project identified pathogenic repeat expansions which were confirmed in 69 patients, including seven paediatric patients with no reported family history of RE disorders, with a 0.09% false positive rate.InterpretationWe show here for the first time that WGS enables the detection of causative repeat expansions with high sensitivity and specificity, and that it can be used to resolve previously undiagnosed neurological disorders. This includes children with no prior suspicion of a RE disorder. These findings are leading to diagnostic implementation of this analytical pipeline in the NHS Genomic Medicine Centres in England.FundingMedical Research Council, Department of Health and Social Care, National Health Service England, National Institute for Health Research, Illumina Inc
- Published
- 2020
- Full Text
- View/download PDF
22. Stabilising selection causes grossly altered but stable karyotypes in metastatic colorectal cancer
- Author
-
William Cross, Maximilian Mossner, Salpie Nowinski, George Cresswell, Abhirup Banerjee, Marc Williams, Laura Gay, Ann-Marie Baker, Christopher Kimberley, Hayley Davis, Pierre Martinez, Maria Traki, Viola Walther, Kane Smith, Giulio Caravagna, Sasikumar Amarasingam, George Elia, Alison Berner, Ryan Changho Choi, Pradeep Ramagiri, Ritika Chauhan, Nik Matthews, Jamie Murphy, Anthony Antoniou, Susan Clark, Jo-Anne Chin Aleong, Enric Domingo, Inmaculada Spiteri, Stuart AC McDonald, Darryl Shibata, Miangela M Lacle, Lai Mun Wang, Morgan Moorghen, Ian PM Tomlinson, Marco Novelli, Marnix Jansen, Alan Watson, Nicholas A Wright, John Bridgewater, Manuel Rodriguez-Justo, Hemant Kocher, Simon J Leedham, Andrea Sottoriva, and Trevor A Graham
- Subjects
0303 health sciences ,Colorectal cancer ,Cancer ,Aneuploidy ,Karyotype ,Biology ,medicine.disease ,Genome ,3. Good health ,Metastasis ,03 medical and health sciences ,0302 clinical medicine ,030220 oncology & carcinogenesis ,Cancer cell ,Cancer research ,medicine ,Selection (genetic algorithm) ,030304 developmental biology - Abstract
Aneuploidy, defined as the loss and gain of whole and part chromosomes, is a near-ubiquitous feature of cancer genomes, is prognostic, and likely an important determinant of cancer cell biology. In colorectal cancer (CRC), aneuploidy is found in virtually all tumours, including precursor adenomas. However, the temporal evolutionary dynamics that select for aneuploidy remain broadly uncharacterised. Here we perform genomic analysis of 755 samples from a total of 167 patients with colorectal-derived neoplastic lesions that cross-sectionally represent the distinct stages of tumour evolution, and longitudinally track individual tumours through metastasis and treatment. Precancer lesions (adenomas) exhibited low levels of aneuploidy but high intra-tumour heterogeneity, whereas cancers had high aneuploidy but low heterogeneity, indicating that progression is through a genetic bottleneck that suppresses diversity. Individual CRC glands from the same tumour have similar karyotypes, despite prior evidence of ongoing instability at the cell level. Pseudo-stable aneuploid genomes were observed in metastatic lesions sampled from liver and other organs, after chemo- or targeted therapies, and late recurrences detected many years after the diagnosis of a primary tumour. Modelling indicates that these data are consistent with the action of stabilising selection that ‘traps’ cancer cell genomes on a fitness peak defined by the specific pattern of aneuploidy. These data show that the initial progression of CRC requires the traversal of a rugged fitness landscape and subsequent genomic evolution, including metastatic dissemination and therapeutic resistance, is constrained by stabilising selection.
- Published
- 2020
- Full Text
- View/download PDF
23. OP38 Developing a Cost-Effective Genomic Biomarker of Cancer Risk in Patients with Ulcerative Colitis using Low-Pass Whole Genome Sequencing of Unselected Endoscopic Biopsies: A Case-Control Study
- Author
-
Morgan Moorghen, M Kopczynska, Alister Hart, I Al Bakir, Kane Smith, Trevor A. Graham, and K Curtius
- Subjects
Oncology ,Whole genome sequencing ,medicine.medical_specialty ,medicine.diagnostic_test ,Cost effectiveness ,business.industry ,Gastroenterology ,Colonoscopy ,Rectum ,General Medicine ,medicine.disease ,Ulcerative colitis ,Inflammatory bowel disease ,Genome ,Genomic Biomarker ,medicine.anatomical_structure ,Internal medicine ,medicine ,business - Abstract
Background Patients with ulcerative colitis (UC) are enrolled into surveillance programs for the early detection of colorectal cancer (CRC). However, most patients under surveillance are low-risk and never progress to CRC, while a significant proportion of CRCs in UC form without a preceding confirmed diagnosis of dysplasia. High resolution chromosomal copy-number alteration (CNA) analysis of unselected formalin-fixed paraffin embedded biopsies taken at surveillance colonoscopies using low pass whole genome sequencing (lpWGS) offers an appealing approach to CRC stratification. Methods We conducted a retrospective case-control study to compare the CNA burden in four unselected non-neoplastic left-sided colorectal biopsies from patients with E2/E3 UC derived 1–5 years prior to HGD/CRC detection (cases), with that of biopsies from patients who subsequently remained HGD/CRC-free for at least 5 years (controls). The two patient groups were matched by age, gender, duration of IBD and PSC status. lpWGS was performed using a standardised pipeline for epithelial enrichment, DNA extraction, library preparation, next generation sequencing and bioinformatic analysis. Results 476 biopsies, derived from 42 cases and 77 controls, were analysed. Nearly 80% of patients had a detectable CNA in at least one of their biopsies, with the maximal CNA burden in a typical biopsy involving a median 1.1% of that biopsy’s genome. The CNA burden was significantly greater in the rectum compared to the sigmoid colon and descending colon. The most common CNA events were losses of between 1–30 megabases involving the sub-telomeric regions of chromosomes 5–9 and 22, which were found in similar proportion in both case and control biopsies. However, losses extending beyond sub-telomeric regions, as well as copy number gains, were found more frequently in cases biopsies (p Conclusion We identified multiple biopsies, predominantly in cases, with a surprisingly marked CNA burden involving over 10% of the genome, highlighting the fluid phenotype-genotype relationship. Non-dysplastic colitic epithelium can bear a significant burden of CNAs and maintain phenotypic stability for years without neoplastic transformation. Remarkably, by analysing the CNA burden of only four random biopsies, derived from less than 0.05% of the colonic surface area, we can significantly discriminate between case and control cohorts.
- Published
- 2021
- Full Text
- View/download PDF
24. User values and the development of a cybersecurity public policy for the IoT
- Author
-
Kane Smith, Lemuria Carter, and Gurpreet Dhillon
- Subjects
Value (ethics) ,Computer Networks and Communications ,Stakeholder ,Public policy ,Library and Information Sciences ,Computer security ,computer.software_genre ,law.invention ,law ,CLARITY ,Business ,Public value ,Rational choice theory (criminology) ,Construct (philosophy) ,computer ,Utility model ,Information Systems - Abstract
Public administrators, entrusted to develop public policy to manage the growing complexities of the IoT, face significant challenges. The challenges exist because of three reasons; First, there is a lack of policy direction. Second, user values related to cybersecurity are not well understood. Third, there is a lack of clarity as to how IoT public policy should be developed. In this paper we argue that new IoT policy should be guided by key stakeholder values (i.e. what users think to be important). We utilize the Public Value Forum to elicit public values to inform decision-making surrounding IoT policy by public administrators, conceptually informed by Rational choice theory. We use a five-phase process to introduce the decision context (i.e. the policy problem), define fundamental objectives, rank these objectives, identify value-based trade-offs between them and construct a multi-attribute utility model. The findings indicate several key themes for IoT security from the citizens themselves and decision-making administrators in diverse public agencies developing IoT cybersecurity public policy.
- Published
- 2021
- Full Text
- View/download PDF
25. Ensuring Core Competencies for Cybersecurity Specialists
- Author
-
Karin Hedström, Kane Smith, and Gurpreet Dhillon
- Subjects
Knowledge management ,ComputingMilieux_THECOMPUTINGPROFESSION ,business.industry ,Core competency ,Key (cryptography) ,business ,Security awareness - Abstract
Within an organization, it is critical that all employees possess a security awareness and thus play a part in the protection of said organization's information assets. Some employees will have key roles and responsibilities and require specific skills to support them. However, organizations can face challenges in regard to recognizing the required specialized skills as well as where to obtain them. For this reason, whether an organization chooses to hire new staff, developing existing staff, or outsource the activities altogether, it is necessary to know the type and level of expertise required. To this end, this chapter discusses the need for organizations to understand and identify the essential skills related to cybersecurity in order for their employees to develop core competencies in these areas.
- Published
- 2019
- Full Text
- View/download PDF
26. Supply Chain Virtualization: Facilitating Agent Trust Utilizing Blockchain Technology
- Author
-
Gurpreet Dhillon and Kane Smith
- Subjects
021103 operations research ,Blockchain ,Computer science ,business.industry ,Supply chain ,05 social sciences ,Hash function ,0211 other engineering and technologies ,Context (language use) ,02 engineering and technology ,Information security ,Encryption ,Computer security ,computer.software_genre ,Virtualization ,0502 economics and business ,Node (computer science) ,business ,computer ,050203 business & management - Abstract
In this chapter, through the lens of information security, we discuss the use of blockchain technology as a mechanism for facilitating trust between various supply chain agents. The goal is to explicate the use of blockchain technology as a distributed ledger to mitigate a varied set of risks to supply chain virtualization, whereby various agents within the supply chain context can engage in transactions with an immutable and cryptographically secure record. This immutable and secure record would then serve as the foundation of a mutually beneficial relationship, built upon the blockchain technology, by engendering greater trust among supply chain agents. The usefulness of blockchain technology is such that it enables information to be stored using a cryptographically secure hash and be distributed among multiple record-keeping nodes. Each agent within the supply chain context can act as a node and, by maintaining a copy of the record, create a distributed ledger of information. This provides two distinct benefits that facilitate trust among agents within the supply chain context; first, agents acting as nodes within the blockchain possess a copy of the information record, which cannot be altered without their consent. Second, information is stored on the blockchain using a secure method of encryption that provides protection against tampering from malicious sources and security of the information contained on the chain. Therefore, these two benefits of blockchain technology provide supply chain agents with powerful trust-building mechanisms, which extricate fear and allay concerns when interacting with new or unknown agents.
- Published
- 2018
- Full Text
- View/download PDF
27. 781 – Quantifying Evolution of Early Dysplastic Lesions in Ulcerative Colitis Predicts Future Colorectal Cancer Risk
- Author
-
Ibrahim Al Bakir, Kane Smith, Morgan Moorghen, Maja Kopczynska, Manuel Rodriguez-Justo, Nadia Nasreddin, Ann-Marie Baker, Kit Curtius, Lai Mun Wang, Theo So Clarke, James E. East, Ailsa Hart, Marnix Jansen, Trevor A. Graham, and Meghan Agnew
- Subjects
medicine.medical_specialty ,Hepatology ,Colorectal cancer ,business.industry ,Internal medicine ,Gastroenterology ,medicine ,medicine.disease ,business ,Ulcerative colitis - Published
- 2019
- Full Text
- View/download PDF
28. Cf-252 Shuffler for Waste Assays and Safeguards Applications.
- Author
-
Menaa, N., McElroy, R. D., Kane Smith, S., Kirkpatrick, J., Nakazawa, D., Mowry, R., M. F. Villani, D. Martancik, and Henry, M.
- Subjects
RADIOACTIVE wastes ,PLUTONIUM ,URANIUM - Abstract
The accurate determination of uranium and plutonium content in both nuclear waste and safeguards fields is very important. The measurement field is quite wide and often quite difficult to apply alpha spectrometry, gamma ray spectrometry or mass spectroscopy. Many nondestructive assay (NDA) techniques use neutron interrogation methods because of the high penetrability and the selective sensitivity of neutrons. The Cf-252 Shuffler is able to identify small quantities of uranium or other fissile material in large and/or dense waste drums. In this paper we report on a first Cf-252 Shuffler that uses software running in Windows XP and a Programmable Logic Controller. The system was developed at Canberra and is based on the Los Alamos National Laboratory (LANL) Cf-252 Shuffler design. The shuffler contains sixty-four 10-atm He-3 tubes configured in eight banks and two 4-atm He-3 tubes used as flux monitors. The neutron interrogation is realized using a 600 μg source. The control mechanism is a Programmable Logic Controller (PLC). Both communications with the PLC and data acquisition are performed through Canberra's NDA 2000 software running on the Windows XP operating system. The shuffler data acquisition system uses the latest shift register electronics; the JSR-15, the JSB-96 and two Multiport II Multi-channel Analyzers. In this work we describe the system and algorithms utilized to convert the response of the system into fissile masses. Preliminary results using Uranium NBL-CRM-969 standards are presented. [ABSTRACT FROM AUTHOR]
- Published
- 2010
29. Letters to the Editor.
- Author
-
KANE-SMITH, MEG, HARKNESS, LAURANCE P., FELICETTA, DENNIS, and REDMOND, JEAN
- Subjects
- *
CONSERVATISM , *CATHOLIC schools - Published
- 2023
30. An evaluation of the journey within: soul care in the African American context
- Author
-
O’ Kane- Smith, Sakinah and O’ Kane- Smith, Sakinah
31. An evaluation of the journey within: soul care in the African American context
- Author
-
O’ Kane- Smith, Sakinah and O’ Kane- Smith, Sakinah
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.