7,265 results on '"SETA"'
Search Results
2. Harnessing the Right Talent for SETA Programs: Cybersecurity Roles and Competencies that Make a Difference
- Author
-
Charalambous, Apostolos, Stavrou, Eliana, Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Carette, Jacques, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Stettner, Lukasz, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, M. Davison, Robert, Editorial Board Member, Rettberg, Achim, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, and Clarke, Nathan, editor
- Published
- 2025
- Full Text
- View/download PDF
3. Moss Sporophytes with a Higher Proportion of Leptoids Have Higher Water Transport Rates.
- Author
-
Okafor, Amy N. and Budke, Jessica M.
- Subjects
- *
CELL anatomy , *MOSSES , *HYDROZOA , *GAMETOPHYTES , *BRYOPHYTES - Abstract
The sporophytes of moss plants are dependent on the gametophytes for both photosynthesis and water, which makes conducting cells (hydroids and leptoids) an important part of the sporophyte anatomy. A previous study found that Physcomitrium pyriforme, which has shorter sporophytes, had higher rates of water transport than Funaria hygrometrica, which has taller sporophytes. The aim of this study is to test for differences in the conducting cell anatomy between these two moss species, which could be responsible for differences in water transport rates. We used histology methods to fix, embed, and section sporophyte seta and then quantified the numbers and sizes of the conducting cells. The results revealed that leptoids comprise a higher proportion of the conducting cell area in P. pyriforme, while hydroids comprise more of the conducting cell area in F. hygrometrica. These results point toward the leptoids playing a role in water transport in the moss sporophyte. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Comparative larval morphology and DNA barcodes of Kamimuria petasus Chen and Neoperla tuberculata Wu (Plecoptera: Perlidae).
- Author
-
Chen, Zhi-Teng
- Subjects
COMPARATIVE anatomy ,STONEFLIES ,GENETIC barcoding ,DNA ,MORPHOLOGY ,CHLOROPLAST DNA - Abstract
The larval morphology of Perlidae is relatively understudied compared to that of their adult counterparts, making it challenging to identify species using traditional morphological methods. In this study, we describe and illustrate the larvae of two stonefly species, Kamimuria petasus Chen, 2019 and Neoperla tuberculata Wu, 1937, based on specimens collected from China. Despite sharing a close resemblance in external morphology, the larvae of K. petasus and N. tuberculata can be distinguished based on their color pattern, chaetotaxy, and details of mouthparts. In addition, we generated and compared two DNA barcoding sequences for these two larvae. The analysis revealed that while the two species share some similar sequences, they exhibit high sequence divergence, which can be used to aid in the identification of the two different species based on immature material. The larval morphology and DNA barcodes provided in this study will supplement the classification of Perlidae larvae, enabling their more accurate and reliable identification in both full-evidence phylogenetic studies and bio-monitoring practices in the field. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Producción de Pleurotus ostreatus y Pleurotus sapidus con residuos agrícolas de Glycine max, Oryza sativa y Zea mays.
- Author
-
Quintana Zamora, Jorge Gustavo, Parrales Gallo, María Aurora, Vera Chang, Jaime Fabian, and Tigselema Zambrano, Solanyi Marley
- Abstract
The objective of this study was to evaluate two strains of fungi, Pleurotus ostreatus and Pleurotus sapidus, on radia growth, biomass production, mushroom production and chemical composition. The treatments to evalua)te radial growth and biomass production were: T1) PDA + P. ostreatus, T2) PDA + P. sapidus, T3) PDA Soybean stubble + P. ostreatus, T4) PDA Soybean stubble + P. sapidus, T5) PDA Rice stubble + P. ostreatus, T6) PDA Rice stubble + P. sapidus, T7) PDA Corn bush + P. ostreatus, T8) PDA Corn bush + P. sapidus. To evaluate the production and chemical composition of the Pleurotus mushroom mushrooms, they were: T1) Soybean stubble + P. ostreatus, T2) Soybean stubble + P. sapidus, T3) Corn tusa + P. ostreatus, T4) Corn tusa + P. sapidus, T5) Rice stubble + P. ostreatus, T6) Rice stubble + P. sapidus. There were differences (≤ 0,05) between the treatments in the variables of radial growth and biomass production, highlighting T3 with better growth and biomass production. In the yield and chemical composition of the Pleurotus mushrooms, there were also differences (≤ 0,05), with T1 being the best compared to the other treatments. These results could be explained because soybean stubble contains a high content of lignocellulosic components since these components are very palatable for the growth of Pleurotus fungi. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Look but do not touch: the occurrence of venomous species across Lepidoptera.
- Author
-
Battisti, Andrea, Walker, Andrew A., Mizuki Uemura, Zalucki, Myron P., Brinquin, Anne-Sophie, Caparros-Megidos, Rudy, Gachet, Emmanuel, Kerdelhué, Carole, and Desneux, Nicolas
- Subjects
- *
LEPIDOPTERA , *NUMBERS of species , *NATURAL history , *SPECIES , *MEDICAL personnel , *PHYSICAL contact - Abstract
Lepidoptera can cause several health issues in humans and domestic animals due to their setae, which are defensive adaptations that protect them from predators. The diversity of venomous Lepidoptera has been explored in several reviews starting from the first comprehensive attempt in 1984 by Kawamoto and Kumada (KK) who compiled a list of 228 species based on previous reviews; however, KK did not cite the original publications for listed species. In this review we validated and updated the KK table. The updated list of venomous Lepidoptera includes 5 superfamilies, 14 families, 208 genera, and 576 species, representing a two-fold increase for genera and 2.9-fold for species with respect to KK. The total number of species in the genera including at least one venomous species, which we argue is likely closer to the true number of venomous species, is 7 times higher (3,620). GBIF (Global Biodiversity Information Facility) occurrences for venomous species are 1-4 orders of magnitude higher than those of confamilial non-venomous species. The presence of venomous structures is independent of the relatedness of the clades or geographic region; venom is produced by many species of Zygaenoidea, Lasiocampoidea and Bombycoidea but only by some specialized groups in Papilionoidea and Noctuoidea. There are likely to be multiple evolutionary origins of venom within Lepidoptera, but the exact number is difficult to estimate. The knowledge gap between medical and natural history fields needs to be addressed with novel approaches to study ecology and toxicology. This review offers health practitioners a tool to better understand the origin of the reactions observed and to improve the identification of the causal agents. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Beyond stomatal development: SMF transcription factors as versatile toolkits for land plant evolution
- Author
-
Yuki Doll, Hiroyuki Koga, and Hirokazu Tsukaya
- Subjects
co-option ,stomata ,seta ,air pore ,Marchantia polymorpha ,Plant culture ,SB1-1110 ,Botany ,QK1-989 - Abstract
As master transcription factors of stomatal development, SPEECHLESS, MUTE, and FAMA, collectively termed SMFs, are primary targets of molecular genetic analyses in the model plant Arabidopsis thaliana. Studies in other model systems identified SMF orthologs as key players in evolutionary developmental biology studies on stomata. However, recent studies on the astomatous liverwort Marchantia polymorpha revealed that the functions of these genes are not limited to the stomatal development, but extend to other types of tissues, namely sporophytic setal and gametophytic epidermal tissues. These studies provide insightful examples of gene-regulatory network co-opting, and highlight SMFs and related transcription factors as general toolkits for novel trait evolution in land plant lineages. Here, we critically review recent literature on the SMF-like gene in M. polymorpha and discuss their implications for plant evolutionary biology.
- Published
- 2024
- Full Text
- View/download PDF
8. An Empirical Study of SETA Program Sustaining Educational Sector's Information Security vs. Information Systems Misuse.
- Author
-
Zheng, Binglong, Tse, Daniel, Ma, Jiajing, Lang, Xuanyi, and Lu, Yinli
- Abstract
Information systems misuse and data breaches are among the most common information security threats at the organisational and individual levels. Security, Education, Training and Awareness (SETA) program can be effective tools in addressing and preventing such risks for sustaining the educational sector's information security, although it is costly to implement and achieves limited results. Several studies have shown that SETA implementation can improve corporate employees' information security protection behaviours. This study adopts the method of quantitative research, deterrence theory with selected perceived cost and information security awareness (ISA) as intermediate variables and explores how SETA programs affect information system abuse on campuses. The results show that implementing the SETA program positively impacts perceived cost and ISA; perceived cost and information security positively impact reducing misuse behaviour of information systems. At last, we provide rationalisation suggestions for individual students and schools to help SETA programs to be better implemented. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. Applying PDCA to Security, Education, Training and Awareness Programs
- Author
-
de Casanove, Olivier, Leleu, Nicolas, Sèdes, Florence, Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Tröltzsch, Fredi, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Reis, Ricardo, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, and Clarke, Nathan, editor
- Published
- 2022
- Full Text
- View/download PDF
10. A Social Engineering Research Partnership in Higher Education to Improve Information Security Education, Training, and Awareness (SETA) Programs.
- Author
-
Nwankpa, Joseph, Zhe Shan, Merhout, Jeffrey W., Benamati, John “Skip”, and Weese, Maria
- Subjects
ACTION research ,HIGHER education ,PHISHING ,PUBLIC universities & colleges ,AWARENESS - Abstract
The education sector continues to be challenged by phishing attacks. A simulation study of phishing response behavior across four industries found that the education sector had the highest number of employees opening and clicking a phishing email. Understanding the factors contributing to the high phishing susceptibility within the education sector would help develop more comprehensive information security education, training, and awareness (SETA) programs. This would allow universities to become better protected from attempts at using social engineering to gain access to sensitive personal and university data. However, despite the increased levels of phishing attacks within educational institutions, limited research has systematically examined how conditions unique to the sector can influence user engagement and phishing susceptibility. Against this backdrop, our research collaborates with the IT department of a large public university to examine how certain attributes within educational institutions influence phishing susceptibility. [ABSTRACT FROM AUTHOR]
- Published
- 2023
11. Triad or Error? Introducing Three Basic Dimensions of Competence as a Driving Force for Information Security Performance.
- Author
-
Rampold, Florian, Masuch, Kristin, Warwas, Julia, and Trang, Simon Thanh-Nam
- Subjects
DATA security failures ,VOCATIONAL education ,PERFORMANCE standards ,EMPLOYEE misconduct ,AWARENESS - Abstract
As security incidents such as data breaches have dramatically increased in recent years, companies have acknowledged the utmost importance of implementing SETA (Security, Education, Training, and Awareness) programs. Although there has been much effort in designing these programs as effectively as possible, many security incidents are caused by employee misconduct. In this study, we shed light on the basic dimensions of information security competence (ISC) that employees need to efficiently improve their performance in dealing with security threats. Using a competence model from the field of vocational education, we conceptualize information security competence as a multidimensional construct. We then empirically test the impact of information security competence on information security performance in a study with 234 participants. Our results suggest that a differentiated view of competence is necessary, first, to improve employee performance in dealing with security threats and, second, to develop SETA programs that address employee vulnerabilities. [ABSTRACT FROM AUTHOR]
- Published
- 2023
12. The Influence of Temporal Focus on Cybersecurity Training Preferences.
- Author
-
Shaikh, Faheem Ahmed
- Subjects
INFORMATION processing ,INTERNET security ,EMPLOYEE training ,DIGITAL technology ,AWARENESS - Abstract
This study investigates the impact of employees' temporal focus on the effectiveness of Security Education, Training, and Awareness (SETA) programs in organizations. Drawing on Construal Level Theory, the research examines the relationship between temporal focus, level of abstraction in information processing, and preferences for tactical or strategic cybersecurity training. Findings confirm that employees with a present temporal focus prefer tactical training, while those with a future temporal focus prefer strategic training. Concrete cybersecurity cognition mediates the relationship between present temporal focus and tactical training preference, while abstract cybersecurity cognition mediates the relationship between future temporal focus and strategic training preference. Results emphasize the importance of understanding individual preferences when designing and delivering cybersecurity training programs to maximize engagement. The study contributes to the SETA literature. [ABSTRACT FROM AUTHOR]
- Published
- 2023
13. Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance.
- Author
-
Silic, Mario and Lowry, Paul Benjamin
- Subjects
GAMIFICATION ,PHISHING prevention ,BEHAVIOR ,INTERNAL security ,INTRINSIC motivation - Abstract
We conducted a design-science research project to improve an organization's compound problems of (1) unsuccessful employee phishing prevention and (2) poorly received internal security training. To do so, we created a gamified security training system focusing on two factors: (1) enhancing intrinsic motivation through gamification and (2) improving security learning and efficacy. Our key theoretical contribution is proposing a recontextualized kernel theory from the hedonic-motivation system adoption model that can be used to assess employee security constructs along with their intrinsic motivations and coping for learning and compliance. A six-month field study with 420 participants shows that fulfilling users' motivations and coping needs through gamified security training can result in statistically significant positive behavioral changes. We also provide a novel empirical demonstration of the conceptual importance of "appropriate challenge" in this context. We vet our work using the principles of proof-of-concept and proof-of-value, and we conclude with a research agenda that leads toward final proof-in-use. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
14. Exploring Experiences of Using SETA in Nordic Municipalities
- Author
-
Salek, Aous Al, Kävrestad, Joakim, Nohlberg, Marcus, Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Tröltzsch, Fredi, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Reis, Ricardo, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, and Clarke, Nathan, editor
- Published
- 2021
- Full Text
- View/download PDF
15. An Exploratory Study on Sustaining Cyber Security Protection through SETA Implementation.
- Author
-
Wang, Guangxu, Tse, Daniel, Cui, Yuanshuo, and Jiang, Hantao
- Abstract
It is undeniable that most business organizations rely on the Internet to conduct their highly competitive businesses nowadays. Cyber security is one of the important elements for companies to guarantee the normal operation of their business activities. However, there is no panacea in cyber security protection. Common security practices used are to deploy hardware and software security protection tools to combat the known security threats which may become more and more powerful later. In fact, the attackers and security practitioners are at war from time to time. As a result, such a tools-based security protection strategy cannot be sustained. On the other hand, the related awareness training for employees is ignored in a number of companies, which has made biased the decisions made by staff when facing cyber security breaches. In this study, in order to find ways to sustain such protection, we conduct a quantitative analysis to explore the key elements contributing to the SETA implementation of the companies and organizations. We evaluate the performances of eight supervised learning models in a dataset collected from cyber security breach surveys on UK businesses to perform a fundamental analysis. The detailed analysis is performed via the feature importance of features generated in the model with better performance in the task of detecting the companies and organizations with SETA implementation. The experiment result shows that the awareness related factors play the most significant role in the SETA implementation decision-making for the businesses, and most of the businesses are lacking the awareness to prevent the potential cyber security risks in the stuff using externally-hosted web services and products as well as services depending on online services. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
16. That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training.
- Author
-
Kam, Hwee‐Joo, Ormond, Dustin K., Menard, Philip, and Crossler, Robert E.
- Subjects
SELF-determination theory ,INTERNET security ,TELECOMMUTING ,LABOR demand - Abstract
With government and industry experiencing a critical shortage of trained cybersecurity professionals, organisations are spearheading various training programs to cultivate cybersecurity skills. With more people working from home and the existing cybersecurity staff shortages, cybercriminals are increasingly exploiting new and existing vulnerabilities by launching ubiquitous cyberattacks. This study focuses on how to close the gap in cybersecurity skills through interest cultivation and self‐determined motivation. Our study shows that situational interest (SI) in cybersecurity along with situational motivational determinants (i.e., perceived learning autonomy and perceived relatedness) engendered self‐determined motivation toward cybersecurity training. Consequently, self‐determined motivation facilitated actual learning behaviour. Meanwhile, individual interest in cybersecurity created positive moderating effects in the relationships between self‐determination and its key antecedents (i.e., perceived relatedness and situational interest). Based on these findings, we provide research implications accordingly. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
17. Evaluation of Contextual and Game-Based Training for Phishing Detection.
- Author
-
Kävrestad, Joakim, Hagberg, Allex, Nohlberg, Marcus, Rambusch, Jana, Roos, Robert, and Furnell, Steven
- Subjects
PHISHING ,COMPUTER passwords ,EMAIL security ,INFORMATION technology security ,EMAIL ,EYE tracking ,EDUCATIONAL games ,INTERNET security - Abstract
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical support for users comes from Information Security Awareness Training (ISAT), which makes the effectiveness of ISAT a key cybersecurity issue. This paper presents an evaluation of how two promising methods for ISAT support users in acheiving secure behavior using a simulated experiment with 41 participants. The methods were game-based training, where users learn by playing a game, and Context-Based Micro-Training (CBMT), where users are presented with short information in a situation where the information is of direct relevance. Participants were asked to identify phishing emails while their behavior was monitored using eye-tracking technique. The research shows that both training methods can support users towards secure behavior and that CBMT does so to a higher degree than game-based training. The research further shows that most participants were susceptible to phishing, even after training, which suggests that training alone is insufficient to make users behave securely. Consequently, future research ideas, where training is combined with other support systems, are proposed. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
18. TOWARDS DESIGNING A METHOD TO CREATE STICKY INFORMATION SECURITY TRAINING FOR SMES: IDENTIFYING DESIGN FACTORS.
- Author
-
Brehmer, Martin, Abbas, Antragama Ewa, and Vaidyanathan, Nageswaran
- Subjects
SMALL business ,COMPUTER crimes ,DATA security ,CYBERCRIMINALS ,ACQUISITION of data - Abstract
The risk of being impacted by a cyberattack is high, because of more professional attacks. Thereby, cyber criminals are bypassing technological countermeasures through tricking users. Recently collected data during the SARS-CoV-2 pandemic demonstrate, that cyberattacks including social engineering are among the main threats, especially for Small and Medium-sized Enterprises (SME). (Information) Security Education and Training Awareness (SETA) is proposed to be an effective countermeasure. However, the effects of SETA fade rapidly over time and learnings are not applied in practice sustainably. Thus, we state that a method is required to create SETA programs with sustainable learning outcomes for SME. To develop such a method, we follow the Design Science Research Methodology and share insights of our first design cycle in this article. We conducted a literature review and analyzed factors of failure and success regarding the design of sustainable SETA programs. Furthermore, we sketch our plans for design cycle 2. [ABSTRACT FROM AUTHOR]
- Published
- 2021
19. RESCATE DEL HONGO PLEUROTUS OPUNTIAE, USO DE SUS PROPIEDADES LIGNOCELULÍTICAS Y POTENCIAL EN OTRAS APLICACIONES BIOTECNOLÓGICAS.
- Author
-
Vega Morales, Tony, Andriano Avelar, Angel Mizraim, Hernández Romero, Angel Raúl, Navarrete Peón, Alberto, Ortíz Yescas, Gisela, Pérez España, Victor Hugo, Cortázar Martínez, Adriana, Romero Cortes, Teresa, Aparicio Burgos, José Esteban, and Peralta Gil, Martin
- Abstract
Copyright of Congreso Internacional de Investigacion Academia Journals is the property of PDHTech, LLC and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
20. A Drake Equation for Alien Artifacts.
- Author
-
Benford, James
- Subjects
- *
DRAKE equation , *EXTRATERRESTRIAL beings , *SOLAR system , *EQUATIONS , *SPACE vehicles , *MOON - Abstract
I propose a version of the Drake equation to include searching for alien artifacts, which may be located on the Moon, Earth Trojans, and Earth co-orbital objects. The virtue of searching for artifacts is their lingering endurance in space, long after they go dead. I compare a search for extraterrestrial artifacts (SETA) strategy with the existing listening to stars search for extraterrestrial intelligence (SETI) strategy. I construct a ratio of a SETA Drake equation for artifacts to the conventional Drake equation so that most terms cancel out. This ratio is a good way to debate the efficacy of SETI versus SETA. The ratio is the product of two terms: one is the ratio of the length of time that probes from extraterrestrial (ET) civilizations could be present in the near-Earth region to the length of time that ET civilizations transmit signals to the Solar System. The second term is the ratio of the respective origin volumes: the volume from which probes can come, which is affected by the long-term passage of stars near the Sun, to the volume of transmitting civilizations. Scenarios are quantified that suggest that looking for alien artifacts near Earth is a credible alternative approach relative to listening to stars. This argues for emphasis on artifact searches, ET archeology. I suggest study of existing high-resolution images of the Moon, imaging of the Earth Trojans and Earth co-orbitals, and probe missions to the latter two. Close inspection in these near-Earth regions, which also may hold primordial remnants of the early Solar System, yields concrete astronomical research. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
21. Italy, East Asia and Silk. One hundred years of a relationship (1830-1940).
- Author
-
Zanier, Claudio
- Subjects
- *
SILK production , *SILK thread , *SILKWORM diseases , *INTERNATIONAL relations ,JAPANESE foreign relations - Abstract
During the early nineteenth century Italy became the second biggest world exporter of silk thread. To improve productivity in silk cultivation a number of Chinese and Japanese silk production techniques were tried and when Europe was struck by a ruinous and incurable silkworm disease (1845-1880) to keep domestic silk production running Italian experts went to Inner and East Asia to purchase large quantities of healthy silkworm eggs. Eventually Japanese silkworm eggs were seen as the best choice and exported consecutively to Italy for some twenty years in a row. As well as trade connections, cultural ties between Italy and Japan were developed as well while from the late nineteenth century Italy showed much interest in Chinese silk production too. Two expeditions were sent there, the first 1914 lasted for about one year while the second was from 1932 to 1937 and was headed by an Italian expert who was recruited by the League of Nations to revive and modernize Chinese silk production. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
22. Beyond the silkworm eggs. The role of the Italian semai (silkworm eggs merchants) in spreading knowledge of Japan in Italy in the second half of the nineteenth century between art and science.
- Author
-
Turina, Stefano
- Subjects
- *
SILKWORMS , *MERCHANTS , *JAPANESE art , *SILK , *COMMERCE - Abstract
Due to a disease that affected European silkworms in the 1850s, Italian silkworm eggs merchants travelled from the Near East to the Far East looking for a solution. Few of them visited Japan as early as 1859 and from 1864 until the early 1880s they travelled to Japan yearly and some of them settled in Yokohama. They spent large amounts of money to buy silkworm eggs, but they also played an important role in the diffusion of Japanese objects especially in Northern Italy and they contributed to the development of the knowledge of Japan and of Japanese (and Chinese) flora and fauna. This essay will present the results of an ongoing research and will investigate some case studies, revealing the semai crucial role in shaping the early relations between Italy and Japan and in contributing in their country to the raising of the interest towards Japan, fueling also contemporary giapponismo. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
23. Italy's Orient: Introduction.
- Author
-
Lyttelton, Adrian
- Subjects
- *
ORIENTALISM , *OTTOMAN Empire , *ITALIAN unification , *SILK - Abstract
This introduction aims to suggest connections between the articles published in this special number. While Orientalist stereotypes were recurrent in many of the writings discussed here, there was considerable variety in Italian approaches to the Orient. They were differentiated according to the needs and intellectual traditions of cities and regions (Turin, Milan, Florence, Naples and Sicily). Even more, they varied according to the object of interest - the Ottoman Empire, India, or the Far East. After Italian unification, the study of the Orient should be seen in the context of the discussion of Italy's place in Europe, and the development of new commercial networks. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
24. Examining employee security violations: moral disengagement and its environmental influences
- Author
-
Herath, Tejaswini, Yim, Myung-Seong, D’Arcy, John, Nam, Kichan, and Rao, H.R.
- Published
- 2018
- Full Text
- View/download PDF
25. Evaluation of Contextual and Game-Based Training for Phishing Detection
- Author
-
Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos, and Steven Furnell
- Subjects
usable security ,cybersecurity training ,ISAT ,SETA ,phishing ,user awareness ,Information technology ,T58.5-58.64 - Abstract
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical support for users comes from Information Security Awareness Training (ISAT), which makes the effectiveness of ISAT a key cybersecurity issue. This paper presents an evaluation of how two promising methods for ISAT support users in acheiving secure behavior using a simulated experiment with 41 participants. The methods were game-based training, where users learn by playing a game, and Context-Based Micro-Training (CBMT), where users are presented with short information in a situation where the information is of direct relevance. Participants were asked to identify phishing emails while their behavior was monitored using eye-tracking technique. The research shows that both training methods can support users towards secure behavior and that CBMT does so to a higher degree than game-based training. The research further shows that most participants were susceptible to phishing, even after training, which suggests that training alone is insufficient to make users behave securely. Consequently, future research ideas, where training is combined with other support systems, are proposed.
- Published
- 2022
- Full Text
- View/download PDF
26. Study on the structural parameters and adhesive force of gecko seta.
- Author
-
Zhang, Q. K. and Li, L. X.
- Subjects
- *
GECKOS , *FAILURE mode & effects analysis , *ADHESION , *FIBERS , *HIERARCHIES - Abstract
It is found from the observation that seta on the adhesive pad of gecko is around several microns in diameter and has a multilevel projective terminal which eventually forms 100 ~ 1000 projections. In addition, the adhesive force of a single seta is about 20 ~ 200μN. To explain this fine structure and such a large adhesive force of seta, we develop an ideal-self-similar hierarchical model composed of a fiber array at each level to mimic the multilevel projective terminal of single gecko's seta. With this model, the variations of the properties with increasing number of levels are investigated. For Tokay gecko's seta, the total number of levels is first estimated, and the structural parameters such as radius, the total number of terminal fibers and the adhesive force are then predicted. The results agree well with those observed in nature. Furthermore, with the present model, the dominant failure mode of each level is always the adhesion failure, and the role of structural hierarchy for adhesion release is addressed. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
27. PER LE NECESSITÀ E PER I CAPRICCI: «LINI» E «SETE» NEL BILANCIO DI COMMERCIO DELLO STATO DI MILANO DEL 1778.
- Author
-
Tonelli, Giovanna
- Subjects
LINEN ,SILK ,COMMERCE ,BALANCE of trade - Abstract
Copyright of Mediterranea - Ricerche Storiche is the property of Mediterranea-Ricerche Storiche and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2020
- Full Text
- View/download PDF
28. Choose your own training adventure: designing a gamified SETA artefact for improving information security and privacy through interactive storytelling.
- Author
-
Dincelli, Ersin and Chengalur-Smith, InduShobha
- Abstract
Online self-disclosure (OSD) on social networking sites can leave individuals and organisations vulnerable to security threats. Following a design science research (DSR) method, we created a gamified, "choose your own adventure" style security education, training, and awareness (SETA) artefact using two formats: text and visual. Both artefacts were designed to identify the security threats that trainees are most susceptible to, debrief them about the threat and its potential consequences, and facilitate behaviour change by letting trainees re-evaluate their decisions. Using a longitudinal randomised controlled experiment, we compared these two artefacts to no intervention and traditional security warning emails by assessing both instrumental (changes in attitudes, intentions, and OSD behaviour) and experiential (memorability and user experience) outcomes. Our survey of 1,718 employees showed that the text-based artefact was better at improving instrumental outcomes, and the visual-based artefact was better at improving experiential outcomes. This study provides a more granular understanding of the linkages between technology artefacts and human experiences through the application of design science thinking. The findings contribute to DSR by developing design principles, testable propositions, and realistic performance evaluation metrics for gamified SETA artefacts, and present practical recommendations for regulating employees' information security and privacy behaviours inside and outside the workplace. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
29. Exploring IS security themes: a literature analysis.
- Author
-
Alyami, Areej, Sammon, David, Neville, Karen, and Mahony, Carolanne
- Subjects
THEMES in literature ,DATA privacy ,CODING theory ,SECURITY management ,INFORMATION technology security ,PERIODICAL articles - Abstract
This study presents a literature review of the Information Systems (IS) security field. The purpose of this review is to identify IS 'security themes'. Articulating IS 'security themes' can assist in making effective decisions and reducing risks faced by organisations. This review analyses 87 journal articles from the AIS Senior Scholars' Basket of Journals, and journals recommended by the AIS Special Interest Group in Information Security and Privacy (SIGSEC). An inductive approach to open coding was followed which led to the emergence of twelve IS 'security themes'. Based on our analysis, we found significant research focus on certain 'security themes' (e.g. IS Security Policy, IS Security Behaviour, IS Security Management, and IS Security Awareness) over others (e.g. IS Security Knowledge, IS Security Ethics, and IS Security Investment). We also examine the role of Security Education, Training, and Awareness (SETA) programmes across the IS 'security themes' and provide some initial observations. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
30. KONSTEN ATT BALANSERA SÄKERHET OCH ÖPPENHET : En kvalitativ studie av offentliga organisationers hantering av säkerhetshot
- Author
-
Johansson, Matthias, Påander, Erik, Johansson, Matthias, and Påander, Erik
- Abstract
Offentliga organisationer har flera krafter som trycker och påverkar deras säkerhetspraktik, dessa är både externa men även interna. För att förstå hur den offentliga organisationen hanterar dessa krafter som kräver öppenhet respektive IT-säkerhet har studien använt sig av kvalitativ datainsamling i form av intervjuer med medarbetare med olika roller inom den offentliga sektorn. Studien har inspirerats av induktion som ansats och utvecklat sitt teoretiska ramverk efter det att empirin färdigställts. Teoretiska begrepp som används i analysen är bland annat det politiska systemet, skugg-IT och Information Security Awareness. Empirin består av intervjuer med personer som är anställda hos en offentlig organisation. Utmaningar för IT-säkerhetspraktiken uppstår i form av syn på utbildning och svårigheten att nå ut till personal som följd av den komplexitet som är inneboende i den offentliga organisationen. Studien ger insyn och förslag på hur detta skulle kunna hanteras för att göra arbetet att upprätthålla säkerheten mer effektiv. Arbetet utmynnar i framtagandet av ett ramverk som visualiserar det förlopp som aktualiseras i studien, där knyts sambandet mellan olika krafter och synpunkter som påverkar varandra., Public organizations face various forces that exert pressure and influence their security practices, both externally and internally. To understand how public organizations manage these forces, which require both transparency and IT security, this study employed qualitative data collection in the form of interviews with employees in different roles within the public sector. The study was inspired by an inductive approach and developed its theoretical framework after the completion of empirical data gathering. The theoretical concepts used in the analysis include the political system, shadow IT, and Information Security Awareness. The empirical data consists of interviews with individuals employed by a public organization. Challenges for IT security practices arise in the form of differing views on education and the difficulty of reaching personnel due to the inherent complexity of the public organization. The study provides insight and suggestions on how to address these challenges in order to make the task of maintaining security more effective. The work culminates in the development of a framework that visualizes the progression highlighted in the study, establishing connections between the various forces and perspectives that influence one another.
- Published
- 2023
31. Microscopic morphology of the antennule and antenna of the marine isopod Cirolana harfordi.
- Author
-
Salma, Umme and Thomson, Murray
- Subjects
- *
CRUSTACEA , *SCANNING electron microscopy , *WATER currents , *DECAPODA , *ANTENNAS (Electronics) , *ISOPODA , *MORPHOLOGY , *MARINE algae - Abstract
The use of scanning electron microscopy on the cuticle outgrowths called setae (that contain sensilla) in crustaceans is useful for, understanding how crustacean species sense their environment and for taxonomic studies. So far, most of the setal morphology studies have been performed on decapod crustaceans such as lobsters and shrimps and there has been a comparative lack of such research on marine isopods, from which terrestrial isopods such as woodlice or slaters have evolved. In the current study, electron microscopy was used to study the antennal setae of the marine isopod Cirolana harfordi using magnification powers of up to 40, 000. C. harfordi displayed a number of setal types including setae that had a sub-terminal pore that contained a cupule-shaped structure and plumose setae which are pennate in structure and have two rows of setules along the setal shaft in a fashion analogous to a palm leaf. These plumose setae may be useful to the animal in detecting water currents. Differences in the structure and placement of setae on the antennae of C. harfordi as compared to two other marine isopods, Bathynomus pelor and Natatolana borealis (that have had a comprehensive study of antennae setal morphology performed on them in previous studies) indicate that scanning electron microscopy of isopod setae may be useful in taxonomic studies of isopods. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
32. Chaetotaxy and setal diversity of grooming legs in species of porcelain crabs (Crustacea: Anomura: Porcellanidae)
- Author
-
Luciane Augusto de Azevedo Ferreira and Marcos Tavares
- Subjects
Fifth pereiopod ,Porcellanid crabs ,Seta ,Setal types ,Zoology ,QL1-991 - Abstract
Abstract The morphology of the fifth pereiopods was studied under scanning electron microscopy in ten species of porcelain crabs for chaetotaxy and setal diversity, namelly Megalobrachium pacificum, Megalobrachium roseum, Pachycheles grossimanus, Petrolisthes armatus, Petrolisthes tuberculatus, Pisidia brasiliensis, Pisidia longicornis, Polyonyx gibbesi, Porcellana platycheles and Porcellana sayana. Six setal types were identified: simple, pappose, sickle-shaped serrate, straight serrate, club-shaped and tooth-like cuspidate. Porcelain crabs can differ in the fifth pereiopod setal morphology, chaetotaxy and setal density, even among species within the same genus. The absence of sexual dimorphism of the grooming legs in porcelain crabs suggests that grooming eggs requires no particular grooming apparatus in females and that male and female are equal in grooming efficiency.
- Published
- 2018
- Full Text
- View/download PDF
33. The Misunderstood Link: Information Security Training Strategy.
- Author
-
Torres, Henry G. and Gupta, Saurabh
- Subjects
INFORMATION technology security ,DATA security failures ,INFORMATION storage & retrieval systems ,EMPLOYEES ,PHISHING - Abstract
Insecure user behavior and failure to identify phishing is a leading cause of information security breaches triggering increased company costs in keeping information secure. Training employees toward secure information systems (IS) behavior is a way for organizations to attempt keeping information secure. Herein we outline how using traditional goals for information security training is a contributing factor to continued rise of insecure employee behavior. We posit that the approach to information security training recommended in extant literature is failing because of focus on improving skills in procedural, policy, and compliance activities. We propose a model suggesting alternative goals and draws propositions regarding its effectiveness. The model is of interest to investigate if using a training design that includes goals/inputs matching tools and users, a training process matching inputs to methods, and knowledge transfer outcomes emphasizing affective and meta cognitive learning, has a positive impact on secure behavior when using IS. The paper presents a design science model for a training strategy regarding information systems secure behavior. [ABSTRACT FROM AUTHOR]
- Published
- 2018
34. A new genus Bongotarsonemus with two new species of tarsonemid (Acari: Heterostigmata) mites discovered from the Himalayan forests of West Bengal, India
- Author
-
Mondal, Priyankar and Karmakar, Krishna
- Subjects
Male ,Claw ,India ,Zoology ,Forests ,Biology ,Magnoliopsida ,Polypodiaceae ,Genus ,Animals ,Acari ,Rosales ,Plantae ,Rosaceae ,Ecology, Evolution, Behavior and Systematics ,Taxonomy ,Mites ,Tarsonemidae ,Seta ,Biodiversity ,biology.organism_classification ,Tracheophyta ,Female ,Animal Science and Zoology ,Taxonomy (biology) ,Fern - Abstract
Bongotarsonemus unicornus gen. nov., sp. nov. (Tarsonemidae: Tarsoneminae) is described from adult females and males collected on leaves of Sweet Cherry, Prunus avium L. (Rosaceae). Another species, Bongotarsonemus bicornus sp. nov. is described from adult females collected on leaves of a mountain fern Arthromeris wallichiana (Spreng.) Ching (Polypodiaceae). Both species were collected from the Himalayan forests of Darjeeling district in the State of West Bengal, India. Adult females of this new genus are unusual in having a median raised section of the prodorsum which is delimited by elongated tubercles bearing setae v1 and sometimes sc2. This area is ornamented with sclerotized ridges or elevated strial thickenings; and has a single or bifurcated spear-shaped horn between bases of setae v1. The new genus also has a characteristically bipartite sejugal apodeme and seta d on tibia I often reaching beyond the claw. Adult males are characterized by seta sc2 subequal to sc1; tarsus II with baciliform seta pl'' longer than half the length of the segment, and a conspicuously enlarged solenidion on tarsus IV. Both sexes are unique in having a fish-hook shaped claw on leg I with an elongated shank and strongly curved apex, and seta l' on femur I plumose.
- Published
- 2021
- Full Text
- View/download PDF
35. Two new species of Yushania (Poaceae: Bambusoideae) from South China, with a taxonomic revision of related species
- Author
-
Xia-Ying Ye, De-Zhu Li, and Yu-Xiao Zhang
- Subjects
0106 biological sciences ,South china ,QH301-705.5 ,Yushania ,Plant Science ,Bambusoideae ,010603 evolutionary biology ,01 natural sciences ,Arundinarieae ,Botany ,Poaceae ,Biology (General) ,Ecology, Evolution, Behavior and Systematics ,Taxonomy ,biology ,Seta ,biology.organism_classification ,New species ,Synonym (taxonomy) ,QK1-989 ,Habit (biology) ,Hunan ,010606 plant biology & botany ,Research Paper - Abstract
Two new species of Yushania (Poaceae, Bambusoideae, Arundinarieae) are described and illustrated from Hunan, China. Yushania longshanensis D.Z. Li & X.Y. Ye is distinguished from related species (Y. confusa, Y. angustifolia and Y. pachyclada) by having a thinner culm (0.2–0.3 cm in diameter), glabrous sheath scar, no oral setae, a large glabrous leaf blade (10–20 × 0.9–1.3 cm) and 3–4 pairs of secondary veins. Yushania stoloniforma D.Z. Li & X.Y. Ye has a distinctive scrambling habit, which differs from its putative close allies. Both of these two new species have a solitary branch at the basal nodes and can be assigned to Yushania sect. Yushania based on morphological features. Additionally, we treated Yushania gigantea T.P. Yi & L. Yang as a new synonym of Y. elevata T.P. Yi and renamed Y. microphylla T.P. Yi & L. Yang as Y. weiningensis D.Z. Li & X.Y. Ye., Highlights • Two new species of Yushania (Poaceae, Bambusoideae, Arundinarieae) are described and illustrated from South China: Yushania longshanensis D.Z. Li & X.Y. Ye and Y. stoloniforma D.Z. Li & X.Y. Ye. • Yushania longshanensis and Y. stoloniforma have distinctive morphological characters which can be used to distinguish them from putative close allies. • Yushaniagigantea T.P. Yi & L. Yang is treated as a synonym and Y. microphylla T.P. Yi & L. Yang is replaced by a new name.
- Published
- 2021
36. Do SETA Interventions Change Security Behavior? : A Literature Review
- Author
-
Nwachukwu, Uchechukwu, Vidgren, Jiri, Niemimaa, Marko, Järveläinen, Jonna, and Bui, Tung X.
- Subjects
security behavior ,training ,turvallisuusjohtaminen ,koulutus ,socio-technical issues in organizational information technologies ,awareness ,security management ,tietoturva ,käyttäytyminen ,intervention ,interventio ,seta - Abstract
Information security education, training, and awareness (SETA) are approaches to changing end-users’ security behavior. Research into SETA has conducted interventions to study the effects of SETA on security behavior. However, we lack aggregated knowledge on ‘how do SETA interventions influence security behavior?’. This study reviews 21 empirical SETA intervention studies published across the top IS journals. The theoretical findings show that the research has extended Protection Motivation Theory by (1) enhancements to fear appeals; (2) drawing attention to relevance; (3) incorporating temporality; (4) and shifting from intentions to behavior. In terms of behavior, the SETA interventions have targeted (1) information security policy compliance behavior; and (2) information protection behavior. We argue that while these studies have provided insights into security intentions and behavior, knowledge on designing effective SETA training has remained primarily anecdotal. We contribute (1) by pointing out gaps in the knowledge; and (2) by proposing tentative design recommendations. peerReviewed
- Published
- 2023
37. O primeiro registro de Bergamina lineolata (Chydoridae; Aloninae) na Colômbia
- Author
-
J. M. Fuentes-Reinés, P. Eslava-Eljaiek, and L. M. A. Elmoor-Loureiro
- Subjects
Claw ,QH301-705.5 ,Science ,taxonomia ,Zoology ,Lineolata ,Colombia ,Biology ,taxonomy ,Genus ,neotrópico ,Animals ,Body Size ,neotropic ,Biology (General) ,Botany ,Seta ,lagoa temporária ,biology.organism_classification ,Cladocera ,vegetação aquática ,Spine (zoology) ,QL1-991 ,QK1-989 ,General Agricultural and Biological Sciences ,Animal Distribution ,aquatic vegetation ,temporary pond ,Brazil - Abstract
The Neotropical freshwater cladoceran Bergamina lineolata (Sars, 1901) was found in a small temporal pond in the Magdalena department. Hitherto, it has been reported in Brazil and El Salvador. It was originally described as Alonella lineolata by Sars, 1901 from Brazil and then placed to the genus Bergamina by Elmoor-Loureiro et al. (2013). This is the first record of this species in Colombia. B. lineolata can be identified by a unique combination of characters including: 1) a remarkably large and oblong postabdomen, with three denticles on distal corner; 2) basal spine of the claw very short, length less than the half claw diameter at base; 3) IDL with two setae shorter than ODL seta, armed with fine setules unilaterally in terminal half; 4) endite 1 of trunk limb I with a long smooth seta between endites 1 and 2. Resumo O cladócero neotropical de água doce Bergamina lineolata (Sars, 1901) foi encontrado em uma pequena lagoa temporária no departamento de Magdalena, na Colômbia. Até o momento, havia sido relatado no Brasil e em El Salvador. Foi originalmente descrito como Alonella lineolata por Sars, 1901 no Brasil, e, em seguida, colocado no gênero Bergamina por Elmoor-Loureiro et al. (2013). Esse é o primeiro registro dessa espécie na Colômbia. B. lineolata pode ser identificada por uma combinação única de caracteres, incluindo: 1) um pós-abdômen notavelmente grande e oblongo, com três dentículos no ângulo distal; 2) espinho basal da garra muito curto, comprimento menor que o diâmetro da metade da garra na base; 3) IDL com duas cerdas mais curtas que cerdas ODL, armadas com sétulas finas unilateralmente na metade terminal; e 4) endito 1 do toracópodo I com uma longa cerda lisa entre os enditos 1 e 2.
- Published
- 2023
38. Mouthpart morphology of three calanoid copepods from Australian temporary pools: evidence for carnivory
- Author
-
John D. Green and Russell J. Shiel
- Subjects
Herbivore ,Ecology ,biology ,Range (biology) ,Hemiboeckella ,Seta ,Aquatic Science ,biology.organism_classification ,Predation ,Algae ,Boeckella ,Omnivore ,Ecology, Evolution, Behavior and Systematics ,Water Science and Technology - Abstract
La Trobe University Faculty of Science, Technology and Engineering Murray Darling Freshwater Research CentreMDFRC item.The mandibles, first and second maxillae, and maxillipeds of Boeckella major, B. pseudochelae, and Hemiboeckella searli from temporary pools of the upper River Murray catchment were dissected off and examined by light microscopy for features associated with carnivorous feeding. In B. major adaptations for carnivory are enlarged ventral mandibular teeth, strong falciform medial setae on the second maxillae, falciform endopodal setae on the maxilliped, large body size and large mouthpart size in relation to body size. Its mandibular edge index is 772, in the upper omnivore range. B. major is predicted to be an omnivore with strong carnivorous tendencies and able to handle large prey items. Carnivorous features in H. searli are enlarged ventral mandibular teeth, a mandibular edge index of 1395, and strong unguiform and falciform setae on the second maxillae. It is predicted to be an omnivore with moderate carnivorous tendencies, but unable to handle prey as large as can B. major. In B. pseudochelae the only adaptations for carnivory are an edge index of 1080 and falciform setae on the maxilliped. It is predicted to be an omnivore with herbivorous tendencies. Examination of gut contents confirmed these predictions. B. major guts contained 19 animal taxa, mainly planktonic cladocerans, copepods and rotifers, H. searli 12 taxa, mainly copepods and rotifers, and B. pseudochelae 8 taxa, mainly rotifers. All had consumed algae. We suggest that predation by B. major may be an important factor affecting community structure in fishless Australian temporary pools.
- Published
- 2023
- Full Text
- View/download PDF
39. Rheological and microstructural properties of wheat dough supplemented with Flammulina velutipes (mushroom) powder and soluble polysaccharides.
- Author
-
Nie, Yuanyang, Jin, Yuhui, Deng, Chujun, Xu, Linshuang, Yu, Mingjun, Yang, Wei, Li, Bo, and Zhao, Renyong
- Subjects
- *
FLAMMULINA velutipes , *FLOUR , *DOUGH , *WHEAT , *MUSHROOMS , *PSILOCYBIN - Abstract
Partial substitution of wheat flour with Flammulina velutipes powder (FVP) or soluble polysaccharide (SPFV) at different addition levels, and the effects of which on the rheological and microstructural properties of dough were investigated. FVP significantly (P < 0.05) increased the water absorption but decreased the development time and stability of dough significantly (P < 0.05). Furthermore, it was capable of providing a weaker extension and harder dough with the increasing of FVP addition levels. FVP increased the storage (G′) and loss (G″) moduli, while the tan δ decreased with the increasing of FVP addition levels. However, SPFV addition had inconsistent viscoelastic results with that of FVP addition. The microstructure of dough showed that the continuity of gluten networks had been disrupted by FVP and SPFV at a higher addition level. This research could provide a foundation for the application of FVP in wheat-flour foods, and FVP addition levels of 2.5% to 5.0% are recommended. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
40. Astroengineering, Dysonian SETI, and naturalism: A new Catch-22.
- Author
-
Ćirković, Milan M.
- Subjects
- *
EXTRATERRESTRIAL resources , *ENGINEERING , *ASTROPHYSICS , *ANTIQUITIES , *SPACE archaeology - Abstract
Abstract A methodological problem is inherent in any discussion of extraterrestrial engineering and its detectability: how to distinguish detection signatures of such astroengineering from "natural", non-intentional, albeit exotic, processes? In practice, searches for traces and manifestations of advanced technological civilizations have been reduced so far to searching for outliers in the allegedly well-known regularities expected from natural astrophysical sources. This procedure, however, is an epistemological minefield, for at least two reasons: (i) prior datasets on which the regularities are based might be contaminated by artefacts, and (ii) the procedure of computation of unobservable quantities usually contains the implicit assumption of the non-intentional nature of sources. In other words, we are facing a Catch-22-type problem: in order to prove the artificial nature of a source, we seemingly need to first assume that it is not artificial. In contrast to most problems in science, this one could possibly be aggravated, rather than reduced, with the progress of our scientific understanding. Some possible recourses, as well as directions for further work toward building a comprehensive methodology of the Dysonian SETI, are discussed. Highlights • We consider epistemological and methodological aspect of the search for extraterrestrial artefacts (SETA). • SETA projects are impacted by important methodological problems and biases which have not been studied in the literature so far. • Our analysis offers some guidelines for the selection of objects of interest from a sample of astrophysical sources. • The importance of establishing the proper context for SETA and of utilizing the experience of terrestrial archaeology. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
41. Larva and pupa of Ctesias (s. str.) serra (Fabricius, 1792) with remarks on biology and economic importance, and larval comparison of co-occurring genera (Coleoptera, Dermestidae).
- Author
-
Kadej, Marcin
- Subjects
- *
BEETLES , *LARVAE , *DERMESTIDAE - Abstract
Updated descriptions of the last larval instar (based on the larvae and exuviae) and first detailed description of the pupa of Ctesias (s. str.) serra (Fabricius, 1792) (Coleoptera: Dermestidae) are presented. Several morphological characters of C. serra larvae are documented: antenna, epipharynx, mandible, maxilla, ligula, labial palpi, spicisetae, hastisetae, terga, frons, foreleg, and condition of the antecostal suture. The paper is fully illustrated and includes some important additions to extend notes for this species available in the references. Summarised data about biology, economic importance, and distribution of C. serra are also provided. The comparison of larval characteristics for some of the genera of Dermestidae co-occurring with Ctesias is presented. A key for identification of these genera is also provided. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
42. CAPACIDAD PRODUCTIVA DE PLEUROTUS OSTREATUS UTILIZANDO ALFALFA DESHIDRATADA COMO SUPLEMENTO EN DIFERENTES SUSTRATOS AGRÍCOLAS.
- Author
-
Romero-Arenas, Omar, Valencia-De Ita, Ma. Ángeles, Rivera-Tapia, J. António, Tello-Salgado, Issac, Villarreal Espino-Barros, Oscar A., and Damián-Huato, M. Ángel
- Abstract
Copyright of Agricultura Sociedad y Desarrollo is the property of Colegio de Postgraduados and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2018
- Full Text
- View/download PDF
43. Setal descriptions, locations, and abundances: Their impacts on decorating behaviors in the spider crabLibinia(Crustacea: Epialtidae)
- Author
-
Jen L. Wortham
- Subjects
Spider ,biology ,Libinia ,Seta ,Zoology ,Spiders ,biology.organism_classification ,Crustacean ,Majoidea ,Abundance (ecology) ,Crustacea ,Microscopy, Electron, Scanning ,Animals ,Body Size ,Animal Science and Zoology ,Body region ,Epialtidae ,Sensilla ,Developmental Biology - Abstract
The setal abundances and distributions of the spider crab Libinia are examined, using two species. These spider crabs decorate their bodies with environmental materials and camouflage from predators. These decorations attach to hooked setae, but other types setae are prevalent in body regions where decorations occur. Adult crabs undergo a terminal molt and lose the ability to regrow setae. Little is known about setal changes over the lifetime in these crabs and if hooked setae abundance decreases with age, resulting in a loss of camouflage strategy in larger individuals. The objective of this study is to determine the prevalence and abundance of hooked and non-hooked setae in the decorated body regions and if these setal patterns vary by species and body size. Scanning electron microscopy is used along with computer software to describe, count, and measure the setal coverage of hooked and non-hooked setae in body regions. Small individuals have more hooked setae than larger individuals and the two species have different setal abundances of hooked and non-hooked setae. Non-hooked setae cover much surface areas of crabs, attach decorations, and remain on the crabs even when hooked setae are damaged and broken. Setal morphologies and fouling are described among different sized crabs and the two species, with setal types and morphologies being similar but fouling being different. Large individuals likely employ a different camouflage strategy than small individuals due to losing hooked setae but retaining non-hooked setae.
- Published
- 2021
- Full Text
- View/download PDF
44. A new species of Sparsorythus Sroka & Soldán, 2008 (Ephemeroptera: Tricorythidae) from Tamil Nadu, India
- Author
-
T. Sivaruban, Rajasekaran Isack, Pandiarajan Srinivasan, and S. Barathy
- Subjects
Male ,Nymph ,Pointed teeth ,India ,Seta ,Zoology ,Biology ,language.human_language ,Posterior margin ,Rivers ,Genus ,Tamil ,language ,Animals ,Key (lock) ,Female ,Animal Science and Zoology ,Tricorythidae ,Ephemeroptera ,Ecology, Evolution, Behavior and Systematics - Abstract
Sparsorythus srokai sp. nov. is described from the Veerapandi River, Theni district, Tamil Nadu, India based on nymphs of both sexes. The nymphs of Sparsorythus srokai sp. nov. can be distinguished by the following combination of characters: i) presence of lateral setae in each segment of caudal filaments, ii) dorsal surface of labrum entirely covered with scattered ribbon-like bristles, iii) posterior margin of mesonotum reaching abdominal segment III in both sexes, and iv) left prostheca with several pointed teeth apically. The new species is compared with other Indian species: S. gracilis Sroka & Soldán, 2008, S. sivaramakrishnani Sivaruban, Srinivasan, Barathy, Rosi & Isack, 2021 and S. nanjangudensis Muthukatturaja & Balasubramanian, 2021. The distributional map and key to the genus Sparsorythus in Southern India are also given.
- Published
- 2021
- Full Text
- View/download PDF
45. Redescription of Paracles vulpina (Hübner, [1825]) (Lepidoptera: Erebidae), with comments of the aquatic habit of larval instars
- Author
-
Enrique Morelli, Hernán Mario Beccacece, Pamela Graff, and Gabriela Bentancur Viglione
- Subjects
Larva ,Insecta ,Arthropoda ,biology ,Seta ,Zoology ,Biodiversity ,Moths ,Plants ,biology.organism_classification ,Erebidae ,Lepidoptera ,Arctiidae ,Lepidoptera genitalia ,Spilosomina ,Arctiini ,Habits ,Genus ,Animalia ,Animals ,Instar ,Animal Science and Zoology ,Ecology, Evolution, Behavior and Systematics ,Taxonomy - Abstract
The genus Paracles Walker, 1855 is one of the most diverse genera present in Arctiinae and some species have larvae with aquatic habits. Several larvae were found swimming in flooded areas in different grasslands and were bred to adults to identify the species: Paracles vulpina (Hübner, [1825]). The current knowledge of immature stages of this species is not useful to identify and discriminate from other species of Paracles. For this reason, we proposed to redescribe adults of P. vulpina, showing for the first time the male and female genitalia, and improve the information on the immature stages and their habits. The adults can be recognized by the whitish paler brown band in the costal area in the forewing and whitish paler brown antenna. The final larval stage of P. vulpina can be differentiated from other species because it shows a body with a black pubescence except for a ferruginous subventral pubescence, blue dorsal verrucae, red lateral verrucae, and dorsal plastron with longest white setae. Because of its polyphagous feeding habit on aquatic and non aquatic plants we consider the aquatic larval habit is not a necessary strategy and could depend on the ground topography or weather of the locality.
- Published
- 2021
- Full Text
- View/download PDF
46. A new species of Epeorus (Caucasiron) (Ephemeroptera, Heptageniidae) from Azerbaijan and Iran
- Author
-
Jindriska Bojkova, Ľuboš Hrivniak, Roman J. Godunko, Peter Manko, Pavel Sroka, Biology Centre of the Czech Academy of Sciences, Institute of Entomology, Branišovská 31, 37005 České Budějovice, Czech Republic, Department of Invertebrate Zoology and Hydrobiology, University of Łódź, Banacha 12/16, 90237 Łódź, Poland, Department of Botany and Zoology, Masaryk University, Kotlářská 2, 61137 Brno, Czech Republic, and Department of Ecology, Faculty of Humanities and Natural Sciences, University of Prešov, 17. novembra 1, 08116 Prešov, Slovakia
- Subjects
0106 biological sciences ,Caucasus ,Heptageniidae ,Insecta ,Asia ,Arthropoda ,Sterna ,010607 zoology ,Zoology ,mayflies ,010603 evolutionary biology ,01 natural sciences ,Costal margin ,Heptagenioidea ,Epeorus ,taxonomy ,Caucasus, mayflies ,Systematics ,Biodiversity & Conservation ,medicine ,Animalia ,Ephemeroptera ,Invertebrata ,Ecology, Evolution, Behavior and Systematics ,Larva ,biology ,fungi ,Hexapoda ,Seta ,molecular species delimitation ,biology.organism_classification ,Biota ,Europe ,medicine.anatomical_structure ,QL1-991 ,Habitat ,Heptaeniidae ,Animal Science and Zoology ,Taxonomy (biology) ,Research Article - Abstract
A new species, Epeorus (Caucasiron) hyrcanicussp. nov., is described based on larval morphology and molecular data (COI) containing sequences from all Caucasian Caucasiron species described to date. The species is distributed in the Hyrcanian forest of southeastern Azerbaijan and northwestern Iran. Based on our wide-range sampling, the new species is likely endemic to this area. The most pronounced larval morphological diagnostic characters are the coloration pattern of abdominal sterna (a pair of oblique stripes and stripe-like medio-lateral maculae) and terga (triangular medial maculae), poorly developed projection of the costal margin of gill plates III, presence of hair-like setae on the surface of abdominal terga, and relatively wide shape of gill plates VII (in natural position from ventral view). The diagnostic characters are compared to related species, and primary information to habitat is provided.
- Published
- 2021
- Full Text
- View/download PDF
47. An assessment of function, intraspecific variation, and taxonomic reliability of eremobatid ctenidia (Arachnida: Solifugae)
- Author
-
Ryan Jones and Paula E. Cushing
- Subjects
Arachnid ,Solifugae ,biology ,Phylogenetic tree ,Evolutionary biology ,Eremobatidae ,Molecular phylogenetics ,Seta ,Animal Science and Zoology ,Context (language use) ,Taxonomy (biology) ,biology.organism_classification - Abstract
Camel spiders, members of the order Solifugae, are a diverse but poorly understood order of arachnids. The conserved morphology within many groups in the order makes species delimitation and identification challenging. In the North American family Eremobatidae, swollen setae called ctenidia are a common character employed in species delimitation, diagnoses, and identification. Unlike many other arachnid systems, the traditional use of ctenidia characters in eremobatid taxonomy and species identification does not allow for intraspecific variation, despite variation being common in this character system. To access and document the extent of intraspecific variation in this system, a combination of light microscopy and scanning electron micrographs (SEM) were used to survey and document the inter- and intraspecific variation of ctenidia shaft number, shape, and relative length. Additionally, these characters were also evaluated for species-group level and/or genus level taxonomic utility by evaluating the phylogenetic signal for each using a previously published molecular phylogeny as a context. Lastly, as ctenidia have no known biological function, we also assessed ctenidia shaft morphology for evidence of mechano- and/or chemoreceptive function. Observations from nearly 800 museum specimens indicate that ctenidia characteristics are generally far more variable within individual species than previous taxonomic literature indicates, necessitating increased caution for utilization in species diagnoses, delimitation and identifications. Phylogenetic signal was detected for shaft number and shape, but shaft length was not constrained by phylogenetic proximity. Scanning electron micrographs did not reveal morphology consistent with arachnid mechano- or chemoreception, as evidenced by a lack of pores or shaft mobility. Although the biological function of ctenidia remains elusive, the presence of phylogenetic signal and shifts in shaft number and shape may indicate some functional significance yet undiscovered.
- Published
- 2021
- Full Text
- View/download PDF
48. Morphological and Morphometrical Study of the Stink Bug Mustha spinulosa (Lefebrve, 1831) (Hemiptera: Pentatomidae) from Erbil – Iraq
- Author
-
Sarkaut Hussein Muhammed and Wand Khalis Ali
- Subjects
Scent gland ,General Computer Science ,biology ,Proboscis ,Seta ,General Chemistry ,Anatomy ,Pentatomidae ,biology.organism_classification ,Hemiptera ,General Biochemistry, Genetics and Molecular Biology ,Instar ,Thorax (insect anatomy) ,Nymph - Abstract
All life stages of the pentatomid stink bug Mustha spinulosa (Lefebrve, 1831) (Hemiptera: Pentatomidae) collected from several types of trees in Erbil Governorate, North Iraq, along with their morphometrical description, were illustrated. Eggs are barrel in shape, green in color when freshly laid, and usually deposited in clusters that contain 14 eggs each (sometimes 12). Nymphs complete their stage through 5 instars. Head, pronotum, and connexivum of the adults and instars are with pale pink and gray spines; female is slightly larger than male; female is 27.30 mm long and 12.80 mm wide, while male is 25.80 mm long and 11.98 mm wide. Labium proboscis is1.25 ± 0.01 cm long, with brown blackish color. A pair of scent glands are located on the underside of thorax between second and third leg base. All body parts, especially head, thorax, and abdomen are densely covered with setae.
- Published
- 2021
- Full Text
- View/download PDF
49. On the genus Polypedilum, subgenus Collartomyia, with description of P. (Col.) baishanzuensis sp. nov. from Baishanzu Nature Reserve, China (Diptera, Chironomidae)
- Author
-
Xin Qi, Binqing Zhu, Chao Song, and Wei Liu
- Subjects
Culicomorpha ,Chironominae ,Insecta ,Asia ,Arthropoda ,Zoology ,DNA barcoding ,Chironomidae ,Magnoliopsida ,key ,Genus ,Systematics ,morphology ,DNA barcode ,Animalia ,Saxifragoideae ,Plantae ,Saxifragales ,Invertebrata ,Ecology, Evolution, Behavior and Systematics ,Taxonomy ,new species ,biology ,Diptera ,Chironomini ,Saxifragaceae ,Saxifraga ,Seta ,Polypedilum ,Collartomyia ,biology.organism_classification ,Biota ,Tracheophyta ,QL1-991 ,Nematocera ,Key (lock) ,Animal Science and Zoology ,Taxonomy (biology) ,Subgenus ,Research Article - Abstract
A new species of the genus Polypedilum Kieffer, 1912 is described from Baishanzu Nature Reserve, China, based on molecular and morphological data. Molecular phylogenetic analysis based on standard barcode sequences confirmed a new clade of Polypedilum (Collartomyia) species. The new species is easily distinguished from its congeners by a combination of the following morphological characters: membrane of wing with a large spot occupying 70% of the proximal area; tergite without dark brown band pigmentation; tarsi I–V dark brown; superior volsella with three outer lateral setae and six long setae along inner base; inferior volsella with setose tubercules. An updated key to adult males of the subgenus Collartomyia is also provided.
- Published
- 2021
- Full Text
- View/download PDF
50. A new species of Caridina H. Milne Edwards, 1837 (Family: Atyidae) from a limestone cave on Interview Island, Andaman and Nicobar Islands, India
- Author
-
Vijayamma, Jayachandran Kunjuraman, Dhamorikar, Amruta, and Manchi, Shirish
- Subjects
Arthropoda ,India ,Zoology ,Biology ,Atyidae ,Calcium Carbonate ,Cave ,Decapoda ,Animalia ,Animals ,Malacostraca ,Ecology, Evolution, Behavior and Systematics ,Taxonomy ,Telson ,Islands ,geography ,geography.geographical_feature_category ,Seta ,Biodiversity ,biology.organism_classification ,Caves ,Dactylus ,Caridina ,Key (lock) ,Animal Science and Zoology ,Black spot - Abstract
Caridina ravisankarani sp. nov. is a cave-adapted species, collected during June and November 2018 and January 2019 from a limestone cave (CN2) on Interview Island, Andaman and Nicobar Islands. The shrimps were collected from a stream, sourced through the percolation of rainwater, which reduces during the post-monsoon months. The species is closely related to Caridina typus H. Milne Edwards, 1837, Caridina villadolidi Blanco, 1939 and Caridina jeani Cai, 2010. A detailed comparison of characters and a key for identification are given in the text. The present species can be diagnosed by the presence of: short rostum with edentulous upper margin and ventral margin with 2 minute teeth situated at the distal part; outer antennular flagellum with 16 segments at the basal part swollen; highly atrophied propodus and dactylus of endopod of 2nd maxilliped; bushy long setae on fingers of 2nd chelate legs; dactylus of 5th pereopod with 42–43 comb-like bristles; dieresis with 18 spines; dorsal surface of telson with 4–5 pairs of spines and disto-median region doesn’t end in a point, outer lateral pair of spines absent and eyes with cornea pigmentation variable, from totally absent to a small black spot. Fecundity is 1300 eggs with an average length 0.71±0.03 mm and width 0.42±0.03 mm (Mean±SD).
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.