Filters








26 Hits in 1.0 sec

Biomarker-Driven Therapy in Metastatic Gastric and Esophageal Cancer: Real-Life Clinical Experience

Ofer Purim, Alexander Beny, Moshe Inbar, Katerina Shulman, Baruch Brenner, Elizabeth Dudnik, Felix Bokstein, Mark Temper, Dror Limon, Diana Matceyevsky, David Sarid, Amiel Segal (+12 others)
2018 Targeted oncology  
Precision treatment of cancer uses biomarker-driven therapy to individualize and optimize patient care. Objective To evaluate real-life clinical experience with biomarker-driven therapy in metastatic gastric and esophageal cancer in Israel. Patients and Methods This multicenter retrospective cohort study included patients with metastatic gastric or esophageal cancer who were treated in the participating institutions and underwent biomarker-driven therapy. Treatment was considered to have a
more » ... it if the ratio between the longest progression-free survival (PFS) post biomarker-driven therapy and the last PFS before the biomarker-driven therapy was ≥1.3. The null hypothesis was that ≤15% of patients gain such benefit. Results The analysis included 46 patients (61% men; median age, 58 years; 57% with poorly-differentiated tumors). At least one actionable (i.e., predictive of response to a specific therapy) biomarker was identified for each patient. Immunohistochemistry was performed on all samples and identified 1-8 (median: 3) biomarkers per patient (most commonly: low TS, high TOPO1, high TOP2A). Twenty-eight patients received therapy after the biomarker analysis (1-4 lines). In the 1st line after biomarker analysis, five patients (18%) achieved a partial response and five (18%) stable disease; the median (range) PFS was 129 (12-1155) days. Twenty-four patients were evaluable for PFS ratio analysis; in seven (29.2%), the ratio was ≥1.3. In a one-sided exact binomial test vs. the null hypothesis, p = 0.019; therefore, the null hypothesis was rejected. Conclusions Our findings demonstrated that implementing biomarker-driven analysis is feasible and could provide clinical benefit for a considerable proportion (~30%) of patients with metastatic gastric or esophageal cancer. * Ofer Purim
doi:10.1007/s11523-017-0548-8 pmid:29353436 pmcid:PMC5886994 fatcat:gffzfwyw2nhdhmxl75pqlv4v7y

Caregiving strategies, parental practices, and the use of Facebook groups among Israeli mothers of adolescents

Alon Goldberg, Yael Grinshtain, Yair Amichai-Hamburger
2021 Cyberpsychology: Journal of Psychosocial Research on Cyberpspace  
(e.g., Amichai-Hamburger, 2017; de Vries & Kühne, 2015; Fardouly et al., 2015) .  ...  Adolescents spend increasingly less time with their parents and more time with peers Scharf & Shulman, 2006) , making it more difficult for parents to monitor adolescents' whereabouts.  ... 
doi:10.5817/cp2021-3-9 fatcat:gznfabg32jgn7fft34rlrycfxu

Why do people use Facebook?

Ashwini Nadkarni, Stefan G. Hofmann
2012 Personality and Individual Differences  
extraversion, some investigators have found that a target's own apparent assertions about their extraversion exerted a significant influence on observers' judgments (Utz, 2010; Walther, Van Der Heide, Hamel, & Shulman  ...  In a follow-up study with university students, Amichai-Hamburger and Vinitzsky (2010) sought to determine the relation- Table 1 Sources for literature review.  ... 
doi:10.1016/j.paid.2011.11.007 pmid:22544987 pmcid:PMC3335399 fatcat:g43nypxqdrbydcyqxr2yx2iecu

Internet and political empowerment

Ali Pirannejad, Marijn Janssen
2017 Information Development  
Other studies (Bartle and Vass, 2007; Hofmann, 2015; Shulman et al., 2003; Ranson, 2003) have emphasised that public control improves transparency and accountability and that this may increase the political  ...  Amichai-Hamburger et al. (2008) explored the effect of the Internet as a tool of empowerment. Their model, shown in Table 1 , divides the empowering effects of the Internet into four levels.  ... 
doi:10.1177/0266666917730118 fatcat:ubj4jqozhrf67eohbxt76zvcf4

The Future of Enterprise Security with Regards to Mobile Technology and Applications [chapter]

F. T. Tagoe, M. S. Sharif
2016 Communications in Computer and Information Science  
Shulman, chief technology officer at Imperva [2] . 54% of companies had a 100% block on social network use in 2009 but by 2011, this number was reduced to just 31% [3] .  ...  "Social networking, user-generated content and PHP-based applications are prevalent on the web… consider how easily sensitive personal information can be accessed through these channels," said Amichai  ... 
doi:10.1007/978-3-319-51064-4_25 fatcat:4nm2sgn46nhxddxz2siepngm4m

Video Surveillance in the Cloud?

DJ Neal, Syed (Shawon) Rahman
2019 Zenodo  
Ofer Maor and Amichai Shulman [14] in their paper give a detailed report of all the techniques used to evade SQL Injection signatures.  ... 
doi:10.5281/zenodo.3358616 fatcat:t4bq66eoqvdlvatitm3vmnrr64

Showing Off? Human Mobility and the Interplay of Traits, Self-Disclosure, and Facebook Check-Ins

Shaojung Sharon Wang, Michael A. Stefanone
2013 Social science computer review  
Rather, Facebook provides a platform where impressions can be formed and managed through selective self-presentation of self-generated content (Walther, Van Der Heide, Hamel, & Shulman, 2009 ).  ...  In contrast, other researchers found no support for the statement that extroverts self-disclose more on Facebook (Amichai-Hamburger &Vinitzky, 2010; Moore & McElroy, 2011) .  ... 
doi:10.1177/0894439313481424 fatcat:nc5cllu6jfgmxoj2e2ikv47vae

ENTER THE TWILIGHT ZONE: THE PARADOX OF THE DIGITAL NATIVE

2019 Issues in Information Systems  
that they will learn the right answers and gain the wisdom to avoid the wrong approach, they are confused when they realize many problems have more than one solution (Colby, Ehrlich, Sullivan, Dolle, & Shulman  ...  information need, redefine that need into search terms a database or search engine can act on, and use those results for organizing one's understanding and resolving the information need (Eshet-Alkali & Amichai-Hamburger  ... 
doi:10.48009/2_iis_2019_206-215 fatcat:pjpdigpuq5fzpi3o7oe6tvdno4

Intrusion Protection against SQL Injection Attacks Using a Reverse Proxy

S Fouzul Hidhaya
2012 Computer Science & Information Technology (CS & IT)   unpublished
Ofer Maor and Amichai Shulman [19] in their paper give a detailed report of all the techniques used to evade SQL Injection signatures.  ...  Ofer Maor and Amichai Shulman [17] , in their paper, show that SQL Injection could be performed even without any detailed error messages from the server. William G.J.  ... 
doi:10.5121/csit.2012.2314 fatcat:kwhn2uj34fgtla4ustsb6oy5aa

INTRUSION PROTECTION AGAINST SQL INJECTION AND CROSS SITE SCRIPTING

Rutika Dhapte, Divya Nadanasundaram, Saif Shaikh, Chaitali Mankar, Prashant Kumbharkar
Multidisciplinary Journal of Research in Engineering and Technology   unpublished
Ofer Maor and Amichai Shulman [31] in their paper gave report of all the techniques used to manipulate SQL Injection signatures.  ...  Ofer Maor and Amichai Shulman [30] , in their paper, show that SQL Injection could be performed even without any detailed error messages from the server.  ... 
fatcat:unzhfkmhuff65dnci5ggi45dke

Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online?

Gustavo S. Mesch, Guy Beker
2010 Human Communication Research  
context of adolescent disclosure (usually as part of a wider exploration of adolescent intimacy), evidence suggests gender differences in both the self-disclosurequantity and quality of self-disclosure (Shulman  ...  her virtual representation in the CMC setting may create a dissociation effect which may contribute to the over-representation of personality traits not usually expressed in non-virtual everyday life (Amichai-Hamburger  ... 
doi:10.1111/j.1468-2958.2010.01389.x fatcat:zmgvk5jp35hp7d4uqmp2tmkpt4

COVID-19: Education policy, autonomy and alternative teacher education in Israel

2021 Perspectives in Education  
While some of these programmes are permanent and open annually, such as Teach First Israel (Amichai & Ron, 2018) others are offered ad hoc for specific purposes.  ...  Although this was not stated explicitly, the items related to the following types of knowledge suggested by Shulman (1987) : content knowledge, pedagogical content knowledge, general pedagogical knowledge  ... 
doi:10.18820/2519593x/pie.v39.i1.23 fatcat:p4rnj25lhvbixi56stwdeu3tpu

INTRUSION PROTECTION AGAINST SQL INJECTION AND CROSS-SITE SCRIPTING

Rutika Dhapte, Divya Nadanasundaram, Saif Shaikh, Chaitali Mankar, Prashant Kumbharkar
Multidisciplinary Journal of Research in Engineering and Technology   unpublished
Ofer Maor and Amichai Shulman [31] in their paper gave report of all the techniques used to manipulate SQL Injection signatures.  ...  Ofer Maor and Amichai Shulman [30] , in their paper, show that SQL Injection could be performed even without any detailed error messages from the server.  ... 
fatcat:rofv6vsbg5dejekoib6l6gubtq

Self-Boundary Dissolution in Meditation: A Phenomenological Investigation

Ohad Nave, Fynn-Mathis Trautwein, Yochai Ataria, Yair Dor-Ziderman, Yoav Schweitzer, Stephen Fulder, Aviva Berkovich-Ohana
2021 Brain Sciences  
and Amir David for their significant contribution to the analysis process, Amir Freimann, Alexandra Anis Weil, Liat Yardeni Shamir, Limor Shemesh, Noa Segev for their dedicated assistance, and Eviatar Shulman  ...  outside in and the world into a chamber and God into a little soul Brain Sci. 2021, 11, 819. https://doi.org/10.3390/brainsci11060819 https://www.mdpi.com/journal/brainsci inside the endless body-Yehuda Amichai  ... 
doi:10.3390/brainsci11060819 fatcat:fzholcaiqrenjd5kxeehoo3u6e

Reducing Metadata Leakage from Encrypted Files and Communication with PURBs [article]

Kirill Nikitin, Ludovic Barman, Wouter Lueks, Matthew Underwood, Jean-Pierre Hubaux, Bryan Ford
2019 arXiv   pre-print
[7] Tal Be'ery and Amichai Shulman. A Perfect CRIME? Only TIME Will Tell. Black Hat Europe, 2013. [8] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway.  ... 
arXiv:1806.03160v4 fatcat:aesd5teyjrb2rbcoi4vnuui4ae
« Previous Showing results 1 — 15 out of 26 results