595 results on '"J. Haber"'
Search Results
102. Secured DevOps (SDevOps)
- Author
-
Morey J. Haber and Brad Hibbert
- Subjects
business.industry ,Process (engineering) ,Computer science ,DevOps ,business ,Software engineering ,Automation ,Agile software development - Abstract
As organizations continue to adopt more Agile development methodologies that require extensive integration and automation across operational tools, they often find that it becomes very difficult to effectively and securely manage the credentials required to support the end-to-end process.
- Published
- 2017
103. Privilege Escalation
- Author
-
Morey J. Haber and Brad Hibbert
- Published
- 2017
104. Conclusion
- Author
-
Morey J. Haber and Brad Hibbert
- Published
- 2017
105. Deployment Considerations
- Author
-
Morey J. Haber and Brad Hibbert
- Published
- 2017
106. Ransomware
- Author
-
Morey J. Haber and Brad Hibbert
- Published
- 2017
107. Data-Centric Audit and Protection
- Author
-
Morey J. Haber and Brad Hibbert
- Subjects
Computer science ,Audit ,Computer security ,computer.software_genre ,computer ,Database-centric architecture - Abstract
Not so long ago, it was much easier to protect your data. Perimeter defenses were in place, and there were only so many ways to get to your data.
- Published
- 2017
108. Privileges
- Author
-
Morey J. Haber and Brad Hibbert
- Published
- 2017
109. Key Takeaways
- Author
-
Morey J. Haber and Brad Hibbert
- Published
- 2017
110. Privileged Monitoring
- Author
-
Morey J. Haber and Brad Hibbert
- Published
- 2017
111. PAM Architecture
- Author
-
Morey J. Haber and Brad Hibbert
- Published
- 2017
112. Privileged Access Management
- Author
-
Morey J. Haber and Brad Hibbert
- Subjects
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,business.industry ,Accidental ,Internet privacy ,Information technology ,Privileged access ,business - Abstract
PAM’s primary goal is to keep your organization safe from accidental or deliberate misuse of privileged credentials, the risks of which we have clearly defined. This threat is particularly relevant if your organization is evolving and experiencing change due to growth, new markets, and other business expansion initiatives. The larger and more complex your environment’s information technology systems become, the more privileged users you have. These include employees, contractors, remote, or even automated users.
- Published
- 2017
113. Sample PAM Use Cases
- Author
-
Brad Hibbert and Morey J. Haber
- Subjects
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Weakness ,business.industry ,Best practice ,medicine ,Sample (statistics) ,Use case ,Privileged access ,Public relations ,medicine.symptom ,business - Abstract
A threat actor thrives on the weakness of processes and the inability for an organization to establish best practices or even follow processes. To that end, Privileged Access Management can stymie a threat actor, even if security best practices are being followed.
- Published
- 2017
114. Password Less Authentication
- Author
-
Morey J. Haber and Brad Hibbert
- Subjects
Password ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Authentication ,Computer science ,Process (engineering) ,Limit (mathematics) ,Computer security ,computer.software_genre ,Outcome (game theory) ,computer ,Computing systems - Abstract
While there is a movement to remove passwords and traditional credentials from the authentication process, and many emerging solutions are claiming to do so, the unfortunate fact for any of these technologies is still tied to the binary nature of all computing systems. You either have been authenticated, or you have not; the outcome is always Boolean. While you can apply context-aware scenarios to limit access based on other criteria to minimize risk, the user has still been authenticated with yes or no criteria.
- Published
- 2017
115. Internet of Things (IoT)
- Author
-
Morey J. Haber and Brad Hibbert
- Subjects
Record locking ,Biometrics ,SIMPLE (military communications protocol) ,Computer science ,business.industry ,Compromise ,media_common.quotation_subject ,Computer security ,computer.software_genre ,Business operations ,Credential ,law.invention ,Bluetooth ,Identification (information) ,law ,business ,computer ,media_common - Abstract
This includes everything from network-based cameras, digital video recorders, to digital personal assistants. These devices can be categorized for commercial use like biometric door looks to home use like Bluetooth door lock keypads and thermostats. While these types of devices have existed for years, they have only recently been grouped and labeled IoT based on their mass adoption and, more importantly, their mass identification of security risks and privileged attack vectors. Therefore, as IoT devices become more commonplace, there is a need to ensure that they do not represent an unnecessary security risk to standard business operations. Unfortunately, it has already been proven that many of these devices are insecure by design, have unresolvable flaws, and can be leveraged to compromise an entire organization with something as simple as a default credential.
- Published
- 2017
116. Threat Hunting
- Author
-
Morey J. Haber and Brad Hibbert
- Published
- 2017
117. Mobile Devices
- Author
-
Morey J. Haber and Brad Hibbert
- Published
- 2017
118. Industrial Control Systems (ICS)
- Author
-
Morey J. Haber and Brad Hibbert
- Subjects
Risk analysis (engineering) ,Computer science ,Physical separation ,Control system ,Control (management) ,Visibility (geometry) ,Cost control ,Industrial control system ,Management process - Abstract
Historically ICSs relied heavily on physical separation as the primary means for security. However, modern control system architectures, management processes, and cost control measures have resulted in increased integration of corporate and ICS environments. While these interconnections increase operational visibility and flexible control, it can also increase risks that previously did not occur with isolated ICS.
- Published
- 2017
119. Privileged Attack Vectors : Building Effective Cyber-Defense Strategies to Protect Organizations
- Author
-
Morey J. Haber, Brad Hibbert, Morey J. Haber, and Brad Hibbert
- Subjects
- Computer networks--Access control, Computer security--Management, Information technology--Security measures, Data protection, Computer networks--Security measures
- Abstract
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today's environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats.There is no one silver bullet to provide the protection you need against all vectors and stages of an attack. And while some new and innovative solutions will help protect against or detect the initial infection, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. What You'll Learn Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attackImplement defensive and auditing strategies to mitigate the threats and riskUnderstand a 12-step privileged access management Implementation planConsider deployment and scope, including risk, auditing, regulations, and oversight solutionsWho This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privileged escalation threats
- Published
- 2018
120. Asset Attack Vectors : Building Effective Vulnerability Management Strategies to Protect Organizations
- Author
-
Morey J. Haber, Brad Hibbert, Morey J. Haber, and Brad Hibbert
- Subjects
- Computer security
- Abstract
Build an effective vulnerability management strategy to protect your organization's assets, applications, and data.Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN—savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and regulatory reporting. They also outline practical service level agreements (SLAs) for vulnerability management and patch management. Vulnerability management needs to be more than a compliance check box; it should be the foundation of your organization's cybersecurity strategy. Read Asset Attack Vectors to get ahead of threats and protect your organization with an effective asset protection strategy. What You'll Learn Create comprehensive assessment and risk identification policies and procedures Implement a complete vulnerability management workflow in nine easy steps Understand the implications of active, dormant, and carrier vulnerability states Develop, deploy, and maintain custom and commercial vulnerability management programs Discover the best strategies for vulnerability remediation, mitigation, and removal Automate credentialed scans that leverage least-privilege access principles Read real-world case studies that share successful strategies and reveal potential pitfalls Who This Book Is For New and intermediate security management professionals, auditors, and information technology staff looking to build an effective vulnerability management program and defend against asset based cyberattacks
- Published
- 2018
121. MINERALOGICAL AND CHEMICAL CHARACTERIZATION OF ROAD DUST IN PHILADELPHIA, PA
- Author
-
Michael J. O'Shea, Reto Gieré, David R. Vann, Sarah J. Haber, and Chiara Elmi
- Subjects
Road dust ,Geochemistry ,Environmental science ,Characterization (materials science) - Published
- 2017
122. To Pinpoint the Location and the Orientation of Proteins Associated with Dense-Core Vesicles (DCVs) using CLEM
- Author
-
John A. Ciemniecki, Kem A. Sochacki, Justin W. Taraska, Bijeta Prasai, and Gideon J. Haber
- Subjects
Materials science ,Biophysics ,Dense Core Vesicles ,Orientation (graph theory) - Published
- 2019
123. Odporúčania pre skríning, diagnostiku, profylaxiu a liečbu hepatitíd u hematoonkologických pacientov - odporúčania CELL.
- Author
-
Ľ., Soják, Z., Ráčil, T., Kabut, B., Weinbergerová, J., Mayer, J., Haber, P., Žák, J., Radocha, M., Navrátil, R., Hájek, T., Kozák, P., Sedláček, P., Múdry, R., Szotkowská, T., Papajík, T., Szotkowski, P., Cetkovský, D., Teiserová, N., Mallatová, and J., Lukáš
- Abstract
Copyright of Transfusiology & Haematology Today / Transfuze a Hematologie Dnes is the property of Czech Medical Association of JE Purkyne and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
124. QUANTITATIVE METHODS ESTIМATION OF ТНЕ COMPETITIVENESS OF INSURANCE COMPANIES IN ТНЕ CONTEXT OF SUSTAINABLE DEVELOPMENT.
- Author
-
I., Dyakonova, A., Kravchuk, A., Sheliuk, and J., Haber
- Subjects
INSURANCE companies ,SUSTAINABLE development ,ECONOMIC models ,QUANTITATIVE research ,SOLVENT analysis - Abstract
The presence of а large number of insurance companies in the Ukrainian insurance market requires the use of quantitative methods to assess their competitiveness and attractiveness for consumers of insurance services. In order to ensure the level of competitiveness of an insurance company that would meet the needs of policyholders in comparison with other companies, it is necessary to orient the activity on the line «sustainable development». The use of quantitative methods in assessing the competitiveness of insurance companies is due to the fact that their application is based on well-defined hypotheses in the presence of specific quantitative indicators and oЬtaining results with а high degree of accuracy. The priority objective of an insurance company is to obtain the greatest number of competitive advantages that serve as the basis for ensuring а constant level of efficiency, profitability and profitability of their activities. Solving this problem is possible with the use of an economic and mathematical model aimed at the iterative formation of the structure of the insurance portfolio. There are different methods of optimizing the activities of companies that allow you to increase the amount of profit and increase profitability. One of the methods that an insurance company can use to improve its efficiency is optimization of the insurance portfolio, which includes determining the rational combination of the proportion of individual types of services in the portfolio, analysis of solvent demand for certain types of services, taking into account tl1e restrictions and needs of the market, the choice of rational combination prices and sales volumes, taking into account market demand. Ву developing а model f or quantifying the performance of an insurance company to determine its level of competitiveness, quantitative significance was oЬtained which allowed ranking the insurance companies according to this criterion. The oЬtained results allowed determining the competitive advantages of insurance companies and determining their competitiveness in the market. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
125. Cluster–support interaction in Au–Fe3O4 system
- Author
-
Nika Spiridis, J. Haber, B. Handke, Józef Korecki, M. Szczepanik, and Robert P. Socha
- Subjects
Chemistry ,Photoemission spectroscopy ,Binding energy ,Ultra-high vacuum ,Analytical chemistry ,General Chemistry ,Electronic structure ,Catalysis ,law.invention ,X-ray photoelectron spectroscopy ,law ,Mössbauer spectroscopy ,Cluster (physics) ,Scanning tunneling microscope - Abstract
Cluster–support interaction in a Au–Fe3O4(0 0 1) system was studied using scanning tunneling microscopy, X-ray photoemission spectroscopy and Mossbauer spectroscopy, in situ, under ultra high vacuum conditions. Deposition of 0.02–5 monolayers of Au resulted in the growth of two- and three-dimensional gold nano-cluster. The positive shift of the Au 4f7/2 electron binding energy for the smallest clusters was correlated with modification of the electronic structure in the surface magnetite layer, as found from Mossbauer analysis, leading to conclusion that a positive charging of small Au clusters can be responsible for their outstanding catalytic activity.
- Published
- 2011
126. Labor Negotiations, Misperceptions, and Repeated Prisoner's Dilemma: Some Extensions and Afterthoughts
- Author
-
Nodir Adilov, Joseph N. Khamalah, Nicholas Malin-Adams, and Lawrence J. Haber
- Subjects
Negotiation ,media_common.quotation_subject ,Political science ,Prisoner's dilemma ,Social psychology ,media_common ,Law and economics - Published
- 2008
127. Labor Negotiations, Misperceptions, and Repeated Prisoner's Dilemma: A Simulation
- Author
-
Joseph N. Khamalah, Nicholas Malin-Adams, and Lawrence J. Haber
- Subjects
Negotiation ,media_common.quotation_subject ,Economics ,Prisoner's dilemma ,Positive economics ,Social psychology ,media_common - Published
- 2008
128. Effect of MgF2 and Al2O3 supports on the structure and catalytic activity of copper–manganese oxide catalysts
- Author
-
Maria Wojciechowska, Wiesław Przystajko, J. Haber, and Michał Zieliński
- Subjects
Copper oxide ,Inorganic chemistry ,Spinel ,Oxide ,General Chemistry ,engineering.material ,Heterogeneous catalysis ,Catalysis ,law.invention ,Propene ,chemistry.chemical_compound ,Adsorption ,chemistry ,law ,engineering ,Calcination - Abstract
Structure and catalytic activity of double copper–manganese oxide catalysts supported on MgF2 and Al2O3 have been studied. All samples were calcined at 400 °C and those supported on Al2O3 also at 550 and 950 °C. The properties of surface species have been characterized by low temperature adsorption of nitrogen, XRD and TPR-H2. The catalytic activities have been tested in low-temperature CO oxidation and in NO reduction by propene. The supported oxides react with each other during calcination to form CuMn2O4 spinel. The spinel seems to be responsible for the catalytic activity of the double copper–manganese catalysts. The temperature of calcination changes the strength of interaction between the active phase and the supports influencing the catalytic activity.
- Published
- 2007
129. Salaries for Academic Accountants: The Numbers Crunch
- Author
-
David A. Dilts, Hedayeh Samavati, and Lawrence J. Haber
- Subjects
business.industry ,Political science ,Accounting ,business ,Crunch - Published
- 2007
130. New Concepts in Ctalysis: The Impact of Surface Science
- Author
-
J Haber
- Subjects
lcsh:Q ,lcsh:Science - Abstract
New Concepts in Ctalysis: The Impact of Surface Science
- Published
- 2015
131. LABOR NEGOTIATIONS AND GAME THEORY: THE CASE OF ASYMMETRIC BARGAINING POWER
- Author
-
Lawrence J. Haber
- Subjects
Microeconomics ,Dilemma ,Labor relations ,Non-cooperative game ,Negotiation ,Bargaining power ,Market economy ,Incentive ,media_common.quotation_subject ,Economics ,League ,Game theory ,media_common - Abstract
Recent labor negotiations suggest that game-theory models can be used to analyze a wide range of labor relations situations. This article presents examples of how the Prisoner’s Dilemma game can be extended to highlight the incentives present in many contract negotiations, including sports. Examples are the successful asymmetric bargaining power applied to the Major League Baseball Players Association contract talks in 2002, and the problem-filled National Hockey League Players Association negotiations of 2004, which are likened to a game of Chicken, and in which it was unclear whether one side held an advantage over the other.
- Published
- 2006
132. PUBLIC-SECTOR COLLECTIVE BARGAINING: LESSONS FROM GAME THEORY
- Author
-
John F. Wellington and Lawrence J. Haber
- Subjects
Microeconomics ,Collective bargaining ,Bargaining power ,Market economy ,business.industry ,Positive political theory ,Public sector ,Economics ,business ,Game theory - Published
- 2003
133. Enzymatic activity of the A. bisporus tyrosinase in AOT/isooctane water-in-oil microemulsions
- Author
-
J. Haber, M. Monkiewicz, and J. Rodakiewicz-Nowak
- Subjects
Reaction rate ,Catechol ,chemistry.chemical_compound ,Colloid and Surface Chemistry ,Chromatography ,Aqueous solution ,chemistry ,Tyrosinase ,Substrate (chemistry) ,Microemulsion ,Agaricus bisporus ,Nuclear chemistry ,Quinone - Abstract
Agaricus bisporus tyrosinase was isolated and purified. Its activity in oxidation of 4- t -butylcatechol to 4- t -butyl- o -quinone was investigated in aqueous phosphate buffer solutions (pH 7.0), in the presence and absence of AOT (0–1.2 mM) as well as in AOT in isooctane w/o microemulsions, of variable AOT, water and substrate concentrations. In aqueous solutions AOT activated the enzyme at low concentrations and reduced its activity at higher ones (for about 20% of the initial reaction rate in 1 mM solutions). It reduced the initial rate of tyrosinase reactions in w/o microemulsions, too. The effects are discussed in terms of the substrate partitioning between the water pool, interfacial layer and isooctane phase, taking into account the fact that 4- t -butyl catechol behaves like a co-surfactant in the studied systems, and compared with the available literature data.
- Published
- 2002
134. Corrosion of epitaxial Fe(001) films studied with CEMS and AFM
- Author
-
B. Handke, J. Haber, Józef Korecki, I. Flis-Kabulska, and Nika Spiridis
- Subjects
Auger electron spectroscopy ,Low-energy electron diffraction ,Metallurgy ,Oxide ,Analytical chemistry ,Surfaces and Interfaces ,Condensed Matter Physics ,Surfaces, Coatings and Films ,Corrosion ,law.invention ,chemistry.chemical_compound ,chemistry ,Conversion electron mössbauer spectroscopy ,law ,Materials Chemistry ,Surface layer ,Scanning tunneling microscope ,Layer (electronics) - Abstract
Epitaxial Fe(001) films of a high crystalline and surface quality, as checked in situ with Auger electron spectroscopy, low energy electron diffraction and STM, were grown on MgO(001). Such films show an exceptional corrosion resistance remaining metallic for years at the ambient atmosphere, except of a 5 10 nm surface layer, as found using the conversion electron Mossbauer spectroscopy (GEMS). For more systematic corrosion studies, 50 nm iron films were prepared of the 57 Fe isotope. As-prepared Fe films, exposed to the atmosphere did not show clear morphological and compositional changes, which could be associated with the oxide formation, as checked with contact AFM in air and with CEMS. After exposure of the film to HNO 3 or HCl vapors corrosion was observed with AFM. It resulted in two different types of surface modifications. The first one was seen as a homogenous granular layer with the height amplitude of about 15 nm. Corrosion-induced changes of the second type have a localized character resulting in micrometer sized porous protrusions. The corrosion products were identified as γ-FeOOH. Controlled oxidation of a surface iron layer to epitaxial Fe 3 O 4 passivated the film.
- Published
- 2002
135. Size effects in epitaxial films of magnetite
- Author
-
Nika Spiridis, T. Ślęzak, B. Handke, Józef Korecki, I. Flis-Kabulska, and J. Haber
- Subjects
Annealing (metallurgy) ,Chemistry ,Metals and Alloys ,Analytical chemistry ,Surfaces and Interfaces ,Epitaxy ,Electron spectroscopy ,Surfaces, Coatings and Films ,Electronic, Optical and Magnetic Materials ,law.invention ,Conversion electron mössbauer spectroscopy ,law ,Monolayer ,Materials Chemistry ,Thin film ,Scanning tunneling microscope ,Surface reconstruction - Abstract
Resent results concerning epitaxial Fe 3 O 4 (001) films grown by reactive deposition on MgO(001) substrates as well as obtained by oxidation of epitaxial Fe(001) films are reviewed. Conversion electron Mossbauer spectroscopy (CEMS) performed in and ex situ was used to check the stoichiometry and electronic properties with monolayer resolution. Size effects were reflected in reduction of the Verwey temperature for the film thickness less than 50 nm. With further decrease in thickness, the films showed strong deviation from the bulk properties due to formation of a magnesium rich phase near the MgO/Fe 3 O 4 interface. Surface oxidation to γ-Fe 2 O 3 , which can be reversed by annealing, was found using CEMS. The atomic scale surface characterization was accomplished for the first time in situ by the scanning tunneling microscopy, which revealed details of the surface reconstruction and termination.
- Published
- 2002
136. Vaginal creation for müllerian agenesis
- Author
-
Carla P. Roberts, Michael J. Haber, and John A. Rock
- Subjects
medicine.medical_specialty ,medicine.medical_treatment ,Hymenotomy ,Surgically-Created Structures ,Vaginal disease ,Vaginal dilator ,Humans ,Medicine ,business.industry ,Obstetrics and Gynecology ,General Medicine ,Anus ,University hospital ,medicine.disease ,Dilatation ,Surgery ,Plastic surgery ,Müllerian agenesis ,Urethra ,medicine.anatomical_structure ,Dilator ,Agenesis ,Retreatment ,Vagina ,Dilation (morphology) ,Vaginoplasty ,Female ,business - Abstract
Objective: The purpose of this study was to determine the effectiveness of passive vaginal dilation and McIndoe vaginoplasty in the creation of a neovagina for patients with mullerian agenesis. Study Design: Fifty-one patients with Mayer-Rokitansky-Kuster-Hauser syndrome were treated for vaginal agenesis at either Johns Hopkins Hospital or Emory University. These historic prospective data were obtained by a review of medical records and a current office or telephone consultation. Initial office visits dated from November 18, 1983, through June 6, 1998. Their progress towards both anatomic and functional success was followed through August 1, 2000, which was a range of 2 to 16.8 years. One-way analysis of variance, Student t test, and logistic regression analysis were performed when appropriate. Results: Four patients were lost to follow-up in various stages of the treatment. Ten patients refused vaginal dilation and proceeded to a successful modified McIndoe vaginoplasty. Of the 37 remaining patients, 91.9% anatomic and functional success was achieved from the Ingram method for vaginal dilation. Passive dilation failed in 8.1% of patients, who underwent a modified McIndoe vaginoplasty; all neovaginal creations were successful. All patients who underwent McIndoe vaginoplasty were compliant with postoperative vaginal form use. None of our patients lost vaginal space through contractions or loss of skin graft. Of those patients for whom dilation failed, only 1 patient discontinued the study because of bleeding and discomfort. In addition, only 1 patient from the 3 cases of failure had undergone a previous hymenotomy. Interestingly, 6 patients for whom dilation was successful (6/34 patients; 17.6%) had also undergone a previous hymenotomy. The mean follow-up time for all patients in this study was 111.1 ± 7.2 months, with a range of 25 to 188 months. The mean follow-up time for those patients for whom dilation failed or who refused dilation was significantly lower at 64.5 ± 9.5 and 65.3 ± 18.5 months, respectively (P
- Published
- 2001
137. Magnesium interdiffusion and surface oxidation in magnetite epitaxial films grown on MgO(1 0 0)
- Author
-
J. Haber, T. Ślęzak, M. Kubik, B. Handke, and Józef Korecki
- Subjects
Chemistry ,Annealing (metallurgy) ,Magnesium ,Analytical chemistry ,chemistry.chemical_element ,Condensed Matter Physics ,Epitaxy ,Surfaces, Coatings and Films ,Crystallography ,chemistry.chemical_compound ,Conversion electron mössbauer spectroscopy ,Mössbauer spectroscopy ,Surface layer ,Thin film ,Instrumentation ,Magnetite - Abstract
Epitaxial Fe3O4(0 0 1) thin films were grown on MgO(0 0 1) using molecular beam of 57Fe at the oxygen partial pressure of about 1×10−6 mbar. LEED patterns indicated perfect growth with a p(1×1) reconstructed surface (as labeled with respect to the bulk unit cell of magnetite) . In situ UHV conversion electron Mossbauer spectroscopy (CEMS) was applied to investigate the film stoichiometry and composition. CEMS spectra taken for films in the 10 nm range revealed a magnesium rich magnetite MgxFe3−xO4 phase formed at the MgO/Fe3O4 interface. Ex situ Mossbauer measurements proved that the magnetite surface oxidizes when exposed to the atmosphere for a couple of weeks. The oxidized phase was identified as a few nanometers thick surface layer of γ-Fe2O3 formed on Fe3O4. By virtue of the γ-Fe2O3 CEMS pattern, the oxidation can be easily misinterpreted as a surface non-stoichiometry for films studied only ex situ. The oxidation process is reversible and annealing at 600 K in UHV restores the magnetite surface structure. At elevated annealing temperature Fe also diffuses into MgO forming a wustite phase.
- Published
- 2001
138. Learning oral presentation skills
- Author
-
Richard J. Haber and Lorelei Lingard
- Subjects
Male ,Social Values ,Interprofessional Relations ,media_common.quotation_subject ,Context (language use) ,Social value orientations ,Skills management ,Interviews as Topic ,Presentation ,Professional Competence ,Reading (process) ,Internal Medicine ,Rhetorical question ,Learning ,Humans ,Medicine ,Language ,media_common ,Medical education ,Education, Medical ,Verbal Behavior ,business.industry ,Communication ,Socialization ,Original Articles ,Medical Education ,Social history (medicine) ,Female ,Health Services Research ,business - Abstract
OBJECTIVE: Oral presentation skills are central to physician-physician communication; however, little is known about how these skills are learned. Rhetoric is a social science which studies communication in terms of context and explores the action of language on knowledge, attitudes, and values. It has not previously been applied to medical discourse. We used rhetorical principles to qualitatively study how students learn oral presentation skills and what professional values are communicated in this process. DESIGN: Descriptive study. SETTING: Inpatient general medicine service in a university-affiliated public hospital. PARTICIPANTS: Twelve third-year medical students during their internal medicine clerkship and 14 teachers. MEASUREMENTS: One-hundred sixty hours of ethnographic observation. including 73 oral presentations on rounds. Discoursed-based interviews of 8 students and 10 teachers. Data were qualitatively analyzed to uncover recurrent patterns of communication. MAIN RESULTS: Students and teachers had different perceptions of the purpose of oral presentation, and this was reflected in performance. Students described and conducted the presentation as a rule-based, data-storage activity governed by "order" and "structure." Teachers approached the presentation as a flexible means of "communication" and a method for "constructing" the details of a case into a diagnostic or therapeutic plan. Although most teachers viewed oral presentations rhetorically (sensitive to context), most feedback that students received was implicit and acontextual, with little guidance provided for determining relevant content. This led to dysfunctional generalizations by students, sometimes resulting in worse communication skills (e.g., comment "be brief" resulted in reading faster rather than editing) and unintended value acquisition (e.g., request for less social history interpreted as social history never relevant). CONCLUSIONS: Students learn oral presentation by trial and error rather than through teaching of an explicit rhetorical model. This may delay development of effective communication skills and result in acquisition of unintended professional values. Teaching and learning of oral presentation skills may be improved by emphasizing that context determines content and by making explicit the tacit rules of presentation.
- Published
- 2001
139. Cytokine Profiles of T-lymphocytes from Gingival Tissues with Pathological Pocketing
- Author
-
Martin A. Taubman, Daniel J. Smith, Toshihisa Kawai, Osamu Takeichi, J. Haber, and Itaru Moro
- Subjects
Adult ,CD4-Positive T-Lymphocytes ,Male ,0301 basic medicine ,Pathology ,medicine.medical_specialty ,Adolescent ,medicine.medical_treatment ,Gingiva ,Stimulation ,CD8-Positive T-Lymphocytes ,Biology ,Peripheral blood mononuclear cell ,Interferon-gamma ,03 medical and health sciences ,0302 clinical medicine ,T-Lymphocyte Subsets ,medicine ,Humans ,RNA, Messenger ,Periodontitis ,General Dentistry ,Pathological ,Messenger RNA ,Reverse Transcriptase Polymerase Chain Reaction ,Case-control study ,030206 dentistry ,Th1 Cells ,030104 developmental biology ,Cytokine ,Case-Control Studies ,Chronic Disease ,Immunology ,Leukocytes, Mononuclear ,Cytokines ,Interleukin-2 ,Female ,Interleukin-5 ,Signal transduction ,CD8 ,Signal Transduction - Abstract
Periodontal disease is an infection in which destruction occurs at sites remote from the infection, resulting in pathological pocketing. Intervening between the infection and the destruction is a dense mononuclear inflammatory infiltrate. It has been suggested that this infiltrate might have characteristics and the destructive potential of Th1-type T lymphocytes. To ascertain the nature of the infiltrates we investigated the expression of mRNA for IL-2, IL-5, and IFN-γ by gingival mononuclear cells (GMC) from healthy (n = 8) or adult periodontitis (AP) patients (n = 25) by using cytokine-specific reverse-transcription/polymerasechain-reaction (RT-PCR). GMC, as obtained from patients' tissues, expressed IL-2, IFN-y, or IL-5 mRNA. Significantly higher proportions of GMC from AP patients expressed IL-2 and IFN-γ mRNA than did those from healthy subjects. TFN-γ was the most consistent cytokine message detected. In other experiments, gingival T-lymphocytes (n = 12) and CD4+and CD8+gingival T-lymphocytes (n = 16) were isolated from gingival tissues removed surgically from AP patients. AP gingival T-lymphocytes expressed mRNA for IL-2, IFN-γ, or IL-6 prior to stimulation. After stimulation with Con A, the cells significantly up-regulated IL-5 and IL-6 message expression. Both CD4+ and CD8+gingival T-lymphocytes expressed IFN-γ, IL-5, and some IL-2. This cumulative cytokine profile observed in these experiments is consistent with the predominance of Th1-type cells in pathological tissues and with Th2-type cells, which can also be present, being up-regulated under appropriate stimulation. Importantly, CD4+ and CD8+lymphocytes were shown to express T1- and T2-type cytokine message, emphasizing the potential for CD8-T-lymphocytes to participate in periodontal disease pathology.
- Published
- 2000
140. Teaching and learning communication in medicine
- Author
-
Lorelei Lingard and Richard J. Haber
- Subjects
Medical education ,Education, Medical ,business.industry ,Communication ,Teaching ,Teaching method ,media_common.quotation_subject ,Socialization ,Educational technology ,General Medicine ,Open learning ,Models, Theoretical ,Experiential learning ,Education ,Teaching and learning center ,Rhetoric ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,Rhetorical question ,Humans ,Learning ,Medicine ,Clinical Competence ,business ,media_common - Abstract
The language people use both makes possible and constrains the thoughts they can have. More than just a vehicle for ideas, language shapes ideas--and the practices that follow from them. Thus, in medical education, teaching students how to talk about medical cases also teaches them how to think about patients and medical work, and how to define their relationships to both. Without a theoretical model, however, teaching efforts in this domain tend to be implicit and ad hoc, which can lead to serious problems. Rhetoric is one science that can deepen understanding of communication and improve teaching of this clinical skill. Rhetoric systematically studies the relationships between communication and its effects, between how things are named and how they are experienced, between discourse and socialization. Bringing language to the foreground of education, rhetoric directs attention to the relationship between what medical students learn to say and what they learn to value, believe, and practice.
- Published
- 1999
141. Pricing Parisan Options
- Author
-
Phillip J. Schönbucher, Richard J. Haber, and Paul Wilmott
- Subjects
Microeconomics ,Economics and Econometrics ,Incentive ,Financial economics ,Reset (finance) ,Stochastic game ,Specific time ,Economics ,Market manipulation ,Asset (economics) ,Finance - Abstract
A practical problem with barrier options is the one-touch nature of the knock-in or knock-out provision that is triggered if the barrier is ever reached, however briefly. The contract9s payoff can be greatly affected by sharp but economically unimportant price spikes and outliers, and there is also an incentive for market manipulation near the barrier to push the asset price one way or the other. The Parisian variant of the contract reduces this problem by requiring the barrier to be breached for a specific time period. In this standard contract, the “clock” is reset if the barrier is recrossed before the required period is achieved; a related instrument, dubbed a “Parisian” option by the authors, does not reset the clock each time the barrier is hit, so that barrier crossing time cumulates over multiple excursions. This article describes these interesting contracts and presents a procedure for valuing them.
- Published
- 1999
142. Global overview of research in catalysis — Poland
- Author
-
J. Haber and M. Borowiak
- Subjects
Chemistry ,Process Chemistry and Technology ,Engineering ethics ,Catalysis - Published
- 1997
143. Arbitrator Decision Making in Substance Abuse Cases
- Author
-
Ahmad R. Karim and Lawrence J. Haber
- Subjects
Substance abuse ,medicine.medical_specialty ,medicine ,Business ,medicine.disease ,Psychiatry - Published
- 1997
144. NOTE: THE RATIONAL CALCULUS OF UNION ORGANIZING
- Author
-
Lawrence J. Haber
- Subjects
medicine ,Calculus ,Sociology ,medicine.disease ,Calculus (medicine) - Published
- 2005
145. Recurrent intussusception
- Author
-
Jordana J. Haber and Muhammad Waseem
- Subjects
Male ,IgA Vasculitis ,Ileal Diseases ,Vomiting ,Disease Management ,Enema ,General Medicine ,Patient Readmission ,Patient Discharge ,Abdominal Pain ,Diagnosis, Differential ,Colonic Diseases ,Recurrence ,Child, Preschool ,Pediatrics, Perinatology and Child Health ,Emergency Medicine ,Cecal Diseases ,Humans ,Female ,Emergencies ,Tomography, X-Ray Computed ,Intussusception ,Ultrasonography - Abstract
Recurrent intussusception is defined as an occurrence of intussusception of a bowel loop in a patient with a prior resolution of intussusception, either spontaneously or with an intervention. It is not rare to develop a subsequent episode after a successful reduction of intussusception. We report the cases of 2 children who presented to the emergency department with recurrent intussusception and review the pertinent literature.
- Published
- 2013
146. Reflecting on reflection
- Author
-
Jordana J. Haber
- Subjects
Optics ,Faculty, Medical ,business.industry ,Attitude of Health Personnel ,Education, Medical, Graduate ,Emotions ,Emergency Medicine ,Medicine ,Humans ,General Medicine ,Curriculum ,Reflection (computer graphics) ,business - Published
- 2013
147. A Distinguishing Feature
- Author
-
Sanjiv J. Shah, Aubrey O. Ingraham, Sandra Y. Chung, and Richard J. Haber
- Published
- 2013
148. Do ratings on the american board of internal medicine resident evaluation form detect differences in clinical competence?
- Author
-
Richard J. Haber and Andrew L. Avins
- Subjects
medicine.medical_specialty ,Educational measurement ,Percentile ,business.industry ,Public health ,MEDLINE ,Internship and Residency ,United States ,Community hospital ,Inter-rater reliability ,Specialty Boards ,Internal medicine ,Family medicine ,Public hospital ,Internal Medicine ,medicine ,San Francisco ,Clinical Competence ,Educational Measurement ,Forms and Records Control ,Analysis of variance ,business - Abstract
Objective: To determine whether raters using the American Board of Internal Medicine (ABIM) Resident Evaluation Form can detect differences among residents in clinical competence. Design: Cross-sectional study. Setting: Inpatient general medicine service in a university-affiliated public hospital. Participants: University-based internal medicine (UCIM) residents (ABIM certifying examination pass rate, 91%; mean score, 95th percentile), community hospital-based internal medicine (CHIM) residents (ABIM examination pass rate, 68%; mean score, 42nd percentile), and residents from three university-based non-internal medicine (UC non-IM) programs all assigned to the same inpatient general medicine service over a three-year period. Four hundred eighty-nine evaluations of 110 postgraduate-year-one residents were analyzed. Measurements and main results: Mean ratings for the UCIM residents were significantly higher than those for the CHIM or UC non-IM residents (analysis of variance [ANOVA], p
- Published
- 1994
149. Vanadium in cationic and anionic positions as a promoter of 12-molybdophosphoric-acid-based catalysts
- Author
-
T. Bergier, J. Haber, and K. Brückman
- Subjects
chemistry.chemical_classification ,biology ,Inorganic chemistry ,Cationic polymerization ,Active site ,Vanadium ,chemistry.chemical_element ,Salt (chemistry) ,Butane ,General Chemistry ,Catalysis ,Hydrolysis ,chemistry.chemical_compound ,Hydrocarbon ,chemistry ,Polymer chemistry ,biology.protein - Abstract
Derivatives of 12-molybdophosphoric acid (H3PMo12O40), containing vanadium in the form of a vanadyl cation or substituted as addenda in Keggin anions, have been synthesized and characterized by IR, LRS, XPS, NMR, and DTA/DTG. Their catalytic behavior in the oxidation of methanol, butane and pentane has been determined. Both catalysts exhibit strong acidity, due to hydrolysis of the secondary structure in the case of the salt. The vanadium atom performs its role as the active site for the activation of hydrocarbon molecules irrespective of whether it is present as a cation or incorporated in Keggin anions.
- Published
- 1994
150. Chapter 11. Catalysis
- Author
-
B. Grzybowska-Świerkosz and J. Haber
- Subjects
Chemistry ,General Chemistry ,Combinatorial chemistry ,Catalysis - Published
- 1994
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.