Depression and anxiety are commonly associated with anorexia nervosa (AN) and contribute to difficulties in social integration, a negative factor for outcome in AN. The link between those disorders ...and AN has been poorly studied. Thus, our objective was to investigate (1) the link between outcome nine years after hospitalisation for AN and the occurrence of lifetime anxious or depressive comorbidities; (2) the prognostic value of these comorbidities on patient outcome; 181 female patients were hospitalised for AN (between 13 and 22 years old), and were re-evaluated for their psychological, dietary, physical and social outcomes, from 6 to 12 years after their hospitalisation. The link between anxious and depressive disorders (premorbid to AN and lifetime) and the outcome assessment criteria were tested through multivariate analyses; 63% of the participants had good or intermediate outcome, 83% had presented at least one anxiety or depression disorder in the course of their lives, half of them before the onset of AN. Premorbid obsessive compulsive disorders (OCD), BMI at admission, and premenarchal AN all contribute to poor prognosis. Social phobia and agoraphobia affect the subjects’ quality of life and increase eating disorder symptoms. These results encourage a systematic assessment of, and care for, anxiety and depression comorbidities among female adolescent patients with a particular focus on premorbid OCD.
Dans cet article, les auteurs se proposent d’interroger les problématiques posées par le polyhandicap à partir de l’analyse du discours de cinq frères et sœurs d’adolescents handicapés recueilli via ...des entretiens semi-directifs de recherche afin d’explorer la spécificité des conflits inhérents à la relation fraternelle avec une personne handicapée.
Le discours fraternel fait apparaître le sujet polyhandicapé comme un organisateur de l’ensemble de la dynamique familiale vis-à-vis duquel l’hostilité, renforcée par le handicap, génère une intense culpabilité.
Il semble qu’une des spécificités de ce type de configuration familiale est d’accentuer les difficultés de séparation pour les membres de la fratrie, sur fond d’espace psychique commun où les différenciations de génération entre parent et fratrie sont parfois floues, et ce d’autant plus lorsque la question du placement du sujet handicapé se pose.
In this article, authors sought to understand issues raised by adolescents with multiple disabilities (MD) through content analysis of five siblings.
Discourses have been collected from semi-structured interviews. The content analysis allows opening up the exploration of the specificity of conflicts inherent to fraternal relationship in a disabled family member.
Findings suggest that the adolescent with MD seems to be an organizer of the whole family dynamics; an organiser to whom the hostility, strengthened by disability, increases an overwhelming sense of guilt.
This family configuration seems to contribute intensifying difficulties of separation for the siblings, standing out from a mutual psychological space where differentiations in generation are sometimes blurred, and all the more so / especially as is raised the question of the placement for adolescent with MD.
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the ...sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected large organizations in the world, and millions of users. When they talk, security vendors listen: so should you. AVIEN's sister organization AVIEWS is an invaluable meeting ground between the security vendors and researchers who know most about malicious code and anti- malware technology, and the top security administrators of AVIEN who use those technologies in real life. This new book uniquely combines the knowledge of these two groups of experts. Anyone who is responsible for the security of business information systems should be aware of this major addition to security literature.* "Customer Power" takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It then considers the roles of the independent researcher, the vendor-employed specialist, and the corporate security specialist. * "Stalkers on Your Desktop" considers the thorny issue of malware nomenclature and then takes a brief historical look at how we got here, before expanding on some of the malware-related problems we face today. * "A Tangled Web" discusses threats and countermeasures in the context of the World Wide Web. * "Big Bad Bots" tackles bots and botnets, arguably Public Cyber-Enemy Number One. * "Crème de la CyberCrime" takes readers into the underworld of old-school virus writing, criminal business models, and predicting future malware hotspots. * "Defense in Depth" takes a broad look at DiD in the enterprise, and looks at some specific tools and technologies. * "Perilous Outsorcery" offers sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few horrible examples of how not to do it. * "Education in Education" offers some insights into user education from an educationalist's perspective, and looks at various aspects of security in schools and other educational establishments. * "DIY Malware Analysis" is a hands-on, hands-dirty approach to security management, considering malware analysis and forensics techniques and tools. * "Antivirus Evaluation & Testing" continues the D-I-Y theme, discussing at length some of the thorny issues around the evaluation and testing of antimalware software. * "AVIEN & AVIEWS: the Future" looks at future developments in AVIEN and AVIEWS.* Unique, knowledgeable, unbiased and hype-free commentary. * Written by members of the anti-malware community; most malware books are written by outsiders. * Combines the expertise of truly knowledgeable systems administrators and managers, with that of the researchers who are most experienced in the analysis of malicious code, and the development and maintenance of defensive programs.
OBJECTIVE:
To provide a critical review of the research on mood and anxiety disorders in relatives of individuals with anorexia nervosa (AN). In the first section, we explore methodological issues ...with these studies. In the second section, we present results.
METHOD:
A Medline search identified studies published on family history of mood and anxiety disorders in AN, and was complemented by a manual search. Only studies from 1980 to 2006 using strict diagnostic criteria for the disorders were included Feighner and Halmi criteria for AN, Reasearch Diagnostic Criteria (RDC), Diagnostic and Statistical Manual of Mental Disorders — Third Edition — Revised (DSM-III-R) or DSM — Fourth Edition (DSM-IV) for anorexia and other disorders.
RESULTS:
A review of the research methods used in the studies revealed a number of methodological problems. Therefore, we provide only a description of the prevalence of mood and anxiety disorders in relatives of individuals with AN.
CONCLUSIONS:
In the light of the methodological issues uncovered, the value of the results of these studies and their implications for further study are considered.
Objective
To develop a population pharmacokinetic model for lopinavir boosted by ritonavir in coronavirus disease 2019 (Covid-19) patients.
Methods
Concentrations of lopinavir/ritonavir were assayed ...by an accredited LC-MS/MS method. The population pharmacokinetics of lopinavir was described using non-linear mixed-effects modeling (NONMEM version 7.4). After determination of the base model that better described the data set, the influence of covariates (age, body weight, height, body mass index (BMI), gender, creatinine, aspartate aminotransferase (AST), alanine aminotransferase (ALT), C reactive protein (CRP), and trough ritonavir concentrations) was tested on the model.
Results
From 13 hospitalized patients (4 females, 9 males, age = 64 ± 16 years), 70 lopinavir/ritonavir plasma concentrations were available for analysis. The data were best described by a one-compartment model with a first-order input (KA). Among the covariates tested on the PK parameters, only the ritonavir trough concentrations had a significant effect on CL/F and improved the fit. Model-based simulations with the final parameter estimates under a regimen lopinavir/ritonavir 400/100 mg b.i.d. showed a high variability with median concentration between 20 and 30 mg/L (
C
min
/
C
max
) and the 90% prediction intervals within the range 1–100 mg/L.
Conclusion
According to the estimated 50% effective concentration of lopinavir against SARS-CoV-2 virus in Vero E6 cells (16.7 mg/L), our model showed that at steady state, a dose of 400 mg b.i.d. led to 40% of patients below the minimum effective concentration while a dose of 1200 mg b.i.d. will reduce this proportion to 22%.
Chapter 8 - Education in Education David Harley; Robert S. Vibert; Ken Bechtel ...
AVIEN Malware Defense Guide for the Enterprise,
2007
Book Chapter
It has long been held in some security circles that education does not work. In fact, this assertion is really based on a fundamental disagreement about what one can expect education to accomplish. ...Education and training have certainly made a difference in many organizations, especially as part of a multi-layered protection strategy. The antivirus industry has developed a somewhat pretentiously entitled tripartite (three-part) model for categorizing the kinds of damage malware can cause. This model groups damage under three main headings: availability, integrity, and confidentiality. Security awareness and good practice through a more rounded educational approach, rather than focusing entirely on operational training, is likely to make user education far more successful. This chapter reviews the work of David Phillips who offers some insights into user education from an educationalist’s perspective. It also quotes David and Judith Harley, who look at various aspects of security in schools and other educational establishments. Finally, it suggests that fragmented responsibilities and uncertainty about which informational resources are reliable can create intense difficulties. However, community-oriented information and resource sharing initiatives like the Warning, Advice and Reporting Points (WARP) movement can make quite a difference.
Chapter 9 - DIY Malware Analysis David Harley; Robert S. Vibert; Ken Bechtel ...
AVIEN Malware Defense Guide for the Enterprise,
2007
Book Chapter
This chapter is based on the works of Michael Blanchard and Bojan Zdrnja. It deals with malware analysis and forensics techniques and tools, starting from basics and progressing to advanced ...forensics. In the past couple of years, malware has become increasingly difficult to analyze and remove. Most malware authors today are organized crime gangs that seek profit. They go an extra step in making it difficult to remove their malware, to hide it, and to make reverse engineering more complex. This is why the only sure way to deal with infected machines is to reinstall them. However, before doing that, one should make sure that he/she knows what the infection vector was, because otherwise the same re-infection can be faced in the future. A prepared and tested incident response plan is a must for every organization today. Malware incidents do happen, no matter how much one has invested in protection. When previously unknown malware strikes an organization, people get to assess the impact and decide on the countermeasures. This can be very difficult in the first few hours of malware spread, as most antivirus (AV) vendors would not yet have definitions and malware descriptions. By analyzing malware when it is required, one is able to assess the impact (and the threat) correctly, and ultimately decide on money spent by the organization on damage recovery which can range from reinstalling the infected machine to dealing with stolen intellectual property or customer data.
Chapter 7 - Perilous Outsorcery David Harley; Robert S. Vibert; Ken Bechtel ...
AVIEN Malware Defense Guide for the Enterprise,
2007
Book Chapter
Outsourcing is a commonly considered option today for Information Technology (IT) security managers in public, private, and non-profit entities and in most areas of information management. This ...chapter considers outsourcing anti-malware protection as a possible response to the latest security threats caused by malicious code. It reviews the work of Henk Diemer, where, based on David Harley’s casebook, he offers some sound advice on how to avoid the perils and pitfalls of outsourcing, incorporating a few examples of how not to do it. There are fine resources on the Internet and in books on the topic of AV outsourcing, and consultancy firms, with questions to ask before signing the contract and finalizing an arrangement. However, very little information has been published on what happens after that point. In this regard, this chapter explores the question of what areas one must focus on in order to avoid some of the perils of outsourcing. Therefore, it deals with the phase after signing the deal, helping people spot and manage some common threats and to avoid things becoming unmanageable.