SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Hübner Anna) srt2:(2010-2014)"

Sökning: WFRF:(Hübner Anna) > (2010-2014)

  • Resultat 1-3 av 3
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Hübner, Anna, et al. (författare)
  • Tourist perceptions of extreme weather events in Martinique
  • 2012
  • Ingår i: Journal of Destination Marketing and Management. - : Elsevier BV. - 2212-571X .- 2212-5752. ; 1:1-2, s. 47-55
  • Tidskriftsartikel (refereegranskat)abstract
    • Climate change is expected to lead to an increase in extreme weather situations, such as storms, heat waves or intense and prolonged rainfall. This paper explores in situ tourist perceptions of an extreme weather situation in the Caribbean island of Martinique. In a situation of prolonged, heavy rains in what is usually the dry season in April/May, a study was conducted including 240 questionnaires and 28 semi-structured interviews. Results indicate that tourists have a predetermined understanding of local climate conditions, which in the case of repeat visitors is also based on previous in-situ experiences. Frequent and intense rains as experienced by the tourists during the survey period are largely in conflict with weather expectations, but (largely negative) perceptions are negotiated in relation to a range of aspects, such as travel motives, explanatory information about the events, and climate change. Findings are discussed with regard to their implications for demand responses and travel behavior.
  •  
2.
  • Lee, Po-Shun, et al. (författare)
  • mTORC1-S6K activation by endotoxin contributes to cytokine up-regulation and early lethality in animals.
  • 2010
  • Ingår i: PloS one. - : Public Library of Science (PLoS). - 1932-6203. ; 5:12
  • Tidskriftsartikel (refereegranskat)abstract
    • mTORC1 (mammalian target of rapamycin complex 1) activation has been demonstrated in response to endotoxin challenge, but the mechanism and significance are unclear. We investigated the effect of mTORC1 suppression in an animal model of endotoxemia and in a cellular model of endotoxin signaling.Mice were treated with the mTORC1 inhibitor rapamycin or vehicle prior to lethal endotoxin challenge. Mortality and cytokine levels were assessed. Cultured macrophage-like cells were challenged with endotoxin with or without inhibitors of various pathways known to be upstream of mTORC1. Activated pathways, including downstream S6K pathway, were assessed by immunoblots. We found that mTORC1-S6K suppression by rapamycin delayed mortality of mice challenged with lethal endotoxin, and was associated with dampened circulating levels of VEGF, IL-1β, IFN-γ and IL-5. Furthermore, in vitro cellular studies demonstrated that LPS (lipopolysaccharide) activation of mTORC1-S6K still occurs in the presence of PI3K-Akt inhibition alone, but can be suppressed by concurrent inhibition of PI3K-Akt and MEK-ERK pathways.We conclude that cellular activation of mTORC1-S6K contributes to cytokine up-regulation and mortality in response to endotoxin, and may occur via multiple pathways.
  •  
3.
  • Vapen, Anna, 1983- (författare)
  • Contributions to Web Authentication for Untrusted Computers
  • 2011
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Authentication methods offer varying levels of security. Methods with one-time credentials generated by dedicated hardware tokens can reach a high level of security, whereas password-based authentication methods have a low level of security since passwords can be eavesdropped and stolen by an attacker. Password-based methods are dominant in web authentication since they are both easy to implement and easy to use. Dedicated hardware, on the other hand, is not always available to the user, usually requires additional equipment and may be more complex to use than password-based authentication.Different services and applications on the web have different requirements for the security of authentication.  Therefore, it is necessary for designers of authentication solutions to address this need for a range of security levels. Another concern is mobile users authenticating from unknown, and therefore untrusted, computers. This in turn raises issues of availability, since users need secure authentication to be available, regardless of where they authenticate or which computer they use.We propose a method for evaluation and design of web authentication solutions that takes into account a number of often overlooked design factors, i.e. availability, usability and economic aspects. Our proposed method uses the concept of security levels from the Electronic Authentication Guideline, provided by NIST.We focus on the use of handheld devices, especially mobile phones, as a flexible, multi-purpose (i.e. non-dedicated) hardware device for web authentication. Mobile phones offer unique advantages for secure authentication, as they are small, flexible and portable, and provide multiple data transfer channels. Phone designs, however, vary and the choice of channels and authentication methods will influence the security level of authentication. It is not trivial to maintain a consistent overview of the strengths and weaknesses of the available alternatives. Our evaluation and design method provides this overview and can help developers and users to compare and choose authentication solutions.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-3 av 3

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy