A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Biomarker-Driven Therapy in Metastatic Gastric and Esophageal Cancer: Real-Life Clinical Experience
2018
Targeted oncology
Precision treatment of cancer uses biomarker-driven therapy to individualize and optimize patient care. Objective To evaluate real-life clinical experience with biomarker-driven therapy in metastatic gastric and esophageal cancer in Israel. Patients and Methods This multicenter retrospective cohort study included patients with metastatic gastric or esophageal cancer who were treated in the participating institutions and underwent biomarker-driven therapy. Treatment was considered to have a
doi:10.1007/s11523-017-0548-8
pmid:29353436
pmcid:PMC5886994
fatcat:gffzfwyw2nhdhmxl75pqlv4v7y
more »
... it if the ratio between the longest progression-free survival (PFS) post biomarker-driven therapy and the last PFS before the biomarker-driven therapy was ≥1.3. The null hypothesis was that ≤15% of patients gain such benefit. Results The analysis included 46 patients (61% men; median age, 58 years; 57% with poorly-differentiated tumors). At least one actionable (i.e., predictive of response to a specific therapy) biomarker was identified for each patient. Immunohistochemistry was performed on all samples and identified 1-8 (median: 3) biomarkers per patient (most commonly: low TS, high TOPO1, high TOP2A). Twenty-eight patients received therapy after the biomarker analysis (1-4 lines). In the 1st line after biomarker analysis, five patients (18%) achieved a partial response and five (18%) stable disease; the median (range) PFS was 129 (12-1155) days. Twenty-four patients were evaluable for PFS ratio analysis; in seven (29.2%), the ratio was ≥1.3. In a one-sided exact binomial test vs. the null hypothesis, p = 0.019; therefore, the null hypothesis was rejected. Conclusions Our findings demonstrated that implementing biomarker-driven analysis is feasible and could provide clinical benefit for a considerable proportion (~30%) of patients with metastatic gastric or esophageal cancer. * Ofer Purim
Caregiving strategies, parental practices, and the use of Facebook groups among Israeli mothers of adolescents
2021
Cyberpsychology: Journal of Psychosocial Research on Cyberpspace
(e.g., Amichai-Hamburger, 2017; de Vries & Kühne, 2015; Fardouly et al., 2015) . ...
Adolescents spend increasingly less time with their parents and more time with peers Scharf & Shulman, 2006) , making it more difficult for parents to monitor adolescents' whereabouts. ...
doi:10.5817/cp2021-3-9
fatcat:gznfabg32jgn7fft34rlrycfxu
Why do people use Facebook?
2012
Personality and Individual Differences
extraversion, some investigators have found that a target's own apparent assertions about their extraversion exerted a significant influence on observers' judgments (Utz, 2010; Walther, Van Der Heide, Hamel, & Shulman ...
In a follow-up study with university students, Amichai-Hamburger and Vinitzsky (2010) sought to determine the relation- Table 1 Sources for literature review. ...
doi:10.1016/j.paid.2011.11.007
pmid:22544987
pmcid:PMC3335399
fatcat:g43nypxqdrbydcyqxr2yx2iecu
Internet and political empowerment
2017
Information Development
Other studies (Bartle and Vass, 2007; Hofmann, 2015; Shulman et al., 2003; Ranson, 2003) have emphasised that public control improves transparency and accountability and that this may increase the political ...
Amichai-Hamburger et al. (2008) explored the effect of the Internet as a tool of empowerment. Their model, shown in Table 1 , divides the empowering effects of the Internet into four levels. ...
doi:10.1177/0266666917730118
fatcat:ubj4jqozhrf67eohbxt76zvcf4
The Future of Enterprise Security with Regards to Mobile Technology and Applications
[chapter]
2016
Communications in Computer and Information Science
Shulman, chief technology officer at Imperva [2] . 54% of companies had a 100% block on social network use in 2009 but by 2011, this number was reduced to just 31% [3] . ...
"Social networking, user-generated content and PHP-based applications are prevalent on the web… consider how easily sensitive personal information can be accessed through these channels," said Amichai ...
doi:10.1007/978-3-319-51064-4_25
fatcat:4nm2sgn46nhxddxz2siepngm4m
Video Surveillance in the Cloud?
2019
Zenodo
Ofer Maor and Amichai Shulman [14] in their paper give a detailed report of all the techniques used to evade SQL Injection signatures. ...
doi:10.5281/zenodo.3358616
fatcat:t4bq66eoqvdlvatitm3vmnrr64
Showing Off? Human Mobility and the Interplay of Traits, Self-Disclosure, and Facebook Check-Ins
2013
Social science computer review
Rather, Facebook provides a platform where impressions can be formed and managed through selective self-presentation of self-generated content (Walther, Van Der Heide, Hamel, & Shulman, 2009 ). ...
In contrast, other researchers found no support for the statement that extroverts self-disclose more on Facebook (Amichai-Hamburger &Vinitzky, 2010; Moore & McElroy, 2011) . ...
doi:10.1177/0894439313481424
fatcat:nc5cllu6jfgmxoj2e2ikv47vae
ENTER THE TWILIGHT ZONE: THE PARADOX OF THE DIGITAL NATIVE
2019
Issues in Information Systems
that they will learn the right answers and gain the wisdom to avoid the wrong approach, they are confused when they realize many problems have more than one solution (Colby, Ehrlich, Sullivan, Dolle, & Shulman ...
information need, redefine that need into search terms a database or search engine can act on, and use those results for organizing one's understanding and resolving the information need (Eshet-Alkali & Amichai-Hamburger ...
doi:10.48009/2_iis_2019_206-215
fatcat:pjpdigpuq5fzpi3o7oe6tvdno4
Intrusion Protection against SQL Injection Attacks Using a Reverse Proxy
2012
Computer Science & Information Technology (CS & IT)
unpublished
Ofer Maor and Amichai Shulman [19] in their paper give a detailed report of all the techniques used to evade SQL Injection signatures. ...
Ofer Maor and Amichai Shulman [17] , in their paper, show that SQL Injection could be performed even without any detailed error messages from the server. William G.J. ...
doi:10.5121/csit.2012.2314
fatcat:kwhn2uj34fgtla4ustsb6oy5aa
INTRUSION PROTECTION AGAINST SQL INJECTION AND CROSS SITE SCRIPTING
Multidisciplinary Journal of Research in Engineering and Technology
unpublished
Ofer Maor and Amichai Shulman [31] in their paper gave report of all the techniques used to manipulate SQL Injection signatures. ...
Ofer Maor and Amichai Shulman [30] , in their paper, show that SQL Injection could be performed even without any detailed error messages from the server. ...
fatcat:unzhfkmhuff65dnci5ggi45dke
Are Norms of Disclosure of Online and Offline Personal Information Associated with the Disclosure of Personal Information Online?
2010
Human Communication Research
context of adolescent disclosure (usually as part of a wider exploration of adolescent intimacy), evidence suggests gender differences in both the self-disclosurequantity and quality of self-disclosure (Shulman ...
her virtual representation in the CMC setting may create a dissociation effect which may contribute to the over-representation of personality traits not usually expressed in non-virtual everyday life (Amichai-Hamburger ...
doi:10.1111/j.1468-2958.2010.01389.x
fatcat:zmgvk5jp35hp7d4uqmp2tmkpt4
COVID-19: Education policy, autonomy and alternative teacher education in Israel
2021
Perspectives in Education
While some of these programmes are permanent and open annually, such as Teach First Israel (Amichai & Ron, 2018) others are offered ad hoc for specific purposes. ...
Although this was not stated explicitly, the items related to the following types of knowledge suggested by Shulman (1987) : content knowledge, pedagogical content knowledge, general pedagogical knowledge ...
doi:10.18820/2519593x/pie.v39.i1.23
fatcat:p4rnj25lhvbixi56stwdeu3tpu
INTRUSION PROTECTION AGAINST SQL INJECTION AND CROSS-SITE SCRIPTING
Multidisciplinary Journal of Research in Engineering and Technology
unpublished
Ofer Maor and Amichai Shulman [31] in their paper gave report of all the techniques used to manipulate SQL Injection signatures. ...
Ofer Maor and Amichai Shulman [30] , in their paper, show that SQL Injection could be performed even without any detailed error messages from the server. ...
fatcat:rofv6vsbg5dejekoib6l6gubtq
Self-Boundary Dissolution in Meditation: A Phenomenological Investigation
2021
Brain Sciences
and Amir David for their significant contribution to the analysis process, Amir Freimann, Alexandra Anis Weil, Liat Yardeni Shamir, Limor Shemesh, Noa Segev for their dedicated assistance, and Eviatar Shulman ...
outside in and the world into a chamber and God into a little soul Brain Sci. 2021, 11, 819. https://doi.org/10.3390/brainsci11060819 https://www.mdpi.com/journal/brainsci inside the endless body-Yehuda Amichai ...
doi:10.3390/brainsci11060819
fatcat:fzholcaiqrenjd5kxeehoo3u6e
Reducing Metadata Leakage from Encrypted Files and Communication with PURBs
[article]
2019
arXiv
pre-print
[7] Tal
Be'ery
and
Amichai
Shulman.
A Perfect CRIME? Only TIME Will Tell.
Black Hat Europe, 2013.
[8] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. ...
arXiv:1806.03160v4
fatcat:aesd5teyjrb2rbcoi4vnuui4ae
« Previous
Showing results 1 — 15 out of 26 results