References of "2018"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailThe Belgian euthanasia law and its impact on the practises of Belgian paediatric palliative care teams.
Friedel, Marie UL; Terwangne, Brigitte De; Brichard, Bénédicte et al

in International journal of palliative nursing (2018), 24(7), 333-337

Detailed reference viewed: 7 (0 UL)
Full Text
Peer Reviewed
See detailBuilding Bridges, Paediatric Palliative Care in Belgium: A secondary data analysis of annual paediatric liaison team reports from 2010 to 2014.
Friedel, Marie UL; Brichard, Bénédicte; Fonteyne, Christine et al

in BMC palliative care (2018), 17(1), 77

BACKGROUND: Although continuity of care in paediatric palliative care (PPC) is considered to be an essential element of quality of care, it's implementation is challenging. In Belgium, five paediatric ... [more ▼]

BACKGROUND: Although continuity of care in paediatric palliative care (PPC) is considered to be an essential element of quality of care, it's implementation is challenging. In Belgium, five paediatric liaison teams (PLTs) deliver palliative care. A Royal Decree issued in 2010 provides the legal framework that defines the PLTs' missions, as ensuring continuity of curative and palliative care between the hospital and home for children diagnosed with life-limiting conditions. This national study describes how PLTs ensure continuity of care by describing their activities and the characteristics of the children they cared for from 2010 to 2014. METHODS: Thematic analysis of open-ended questions was performed and descriptive statistics of aggregated data issued from annual reports, collected by the Belgian Ministry of Public Health through the Cancer Plan was used. A review panel of PLT members discussed the results and contributed to their interpretation. RESULTS: Between 2010 and 2014, 3607 children and young adults (0-21 years) were cared for by the 5 Belgian PLTs (mean of 721/per year). Of these children, 50% were diagnosed with an oncological disease, 27% with a neurological or metabolic disease. Four hundred and twenty eight (428) children had died. For 51% of them, death took place at home. PLT activities include coordination; communication; curative and palliative care; education; research and fundraising. Different perceptions of what constitutes a palliative stage, heterogeneity in reporting diagnosis and the current lack of specific valid indicators to report PPC activities were found. CONCLUSION: PLTs are offering highly individualised, flexible and integrated care from diagnosis to bereavement in all care settings. Improvements in data registration and implementation of outcome measures are foreseen. [less ▲]

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailFormation et évolution des mémoires de guerre : Analyse diachronique de figures historiques
Farhat, Nadim UL; Rosoux, Valérie

in Cahiers Mémoire et Politique (2018), Cahier n°6

Detailed reference viewed: 12 (0 UL)
Full Text
Peer Reviewed
See detailGerman early career scholars in Gender Studies: Do networks matter?
Gewinner, Irina UL

in Journal of Applied Social Theory (2018)

Detailed reference viewed: 50 (3 UL)
Full Text
Peer Reviewed
See detailSecurity Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
Kardaş, Süleyman; Genç, Ziya Alper UL

in Wireless Personal Communications (2018), 98(1), 1135-1154

Radio frequency identification (RFID) technology has been increasingly integrated into numerous applications for authentication of objects or individuals. However, because of its limited computation power ... [more ▼]

Radio frequency identification (RFID) technology has been increasingly integrated into numerous applications for authentication of objects or individuals. However, because of its limited computation power, RFID technology may cause several security and privacy issues such as tracking the owner of the tag, cloning of the tags and etc. Recently, two chaotic map-based authentication protocols have been proposed for low-cost RFID tags in order to eliminate these issues. In this paper, we give the security analysis of these protocols and uncover their weaknesses. We prove that these protocols are vulnerable to tag tracing, tag impersonation and desynchronization attacks. The attack complexity of an adversary is polynomial and the success probability of these attacks are substantial. Moreover, we also propose an improved RFID authentication protocol that employs Chebyshev chaotic maps and complies with the EPC global Class 1 Generation 2 standard. Finally, we show that our protocol is resistant against those security issues. [less ▲]

Detailed reference viewed: 173 (4 UL)
Full Text
Peer Reviewed
See detailNext Generation Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in Proceedings of the Secure IT Systems (2018)

We are assisting at an evolution in the ecosystem of cryptoware - the malware that encrypts files and makes them unavailable unless the victim pays up. New variants are taking the place once dominated by ... [more ▼]

We are assisting at an evolution in the ecosystem of cryptoware - the malware that encrypts files and makes them unavailable unless the victim pays up. New variants are taking the place once dominated by older versions; incident reports suggest that forthcoming ransomware will be more sophisticated, disruptive, and targeted. Can we anticipate how such future generations of ransomware will work in order to start planning on how to stop them? We argue that among them there will be some which will try to defeat current anti-ransomware; thus, we can speculate over their working principle by studying the weak points in the strategies that seven of the most advanced anti-ransomware are currently implementing. We support our speculations with experiments, proving at the same time that those weak points are in fact vulnerabilities and that the future ransomware that we have imagined can be effective. [less ▲]

Detailed reference viewed: 354 (13 UL)
Full Text
Peer Reviewed
See detailNo Random, No Ransom: A Key to Stop Cryptographic Ransomware
Genç, Ziya Alper UL; Lenzini, Gabriele UL; Ryan, Peter UL

in Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (2018)

To be effective, ransomware has to implement strong encryption, and strong encryption in turn requires a good source of random numbers. Without access to true randomness, ransomware relies on the pseudo ... [more ▼]

To be effective, ransomware has to implement strong encryption, and strong encryption in turn requires a good source of random numbers. Without access to true randomness, ransomware relies on the pseudo random number generators that modern Operating Systems make available to applications. With this insight, we propose a strategy to mitigate ransomware attacks that considers pseudo random number generator functions as critical resources, controls accesses on their APIs and stops unauthorized applications that call them. Our strategy, tested against 524 active real-world ransomware samples, stops 94% of them, including WannaCry, Locky, CryptoLocker and CryptoWall. Remarkably, it also nullifies NotPetya, the latest offspring of the family which so far has eluded all defenses. [less ▲]

Detailed reference viewed: 640 (28 UL)
Full Text
Peer Reviewed
See detailProvable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks
Cogliati, Benoît-Michel UL; Dodis, Yevgeniy; Katz, Jonathan et al

in Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks (2018)

Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wn-bit block cipher from n-bit public permutations (often called S-boxes), which alternate keyless and “local” ... [more ▼]

Substitution-Permutation Networks (SPNs) refer to a family of constructions which build a wn-bit block cipher from n-bit public permutations (often called S-boxes), which alternate keyless and “local” substitution steps utilizing such S-boxes, with keyed and “global” permu- tation steps which are non-cryptographic. Many widely deployed block ciphers are constructed based on the SPNs, but there are essentially no provable-security results about SPNs. In this work, we initiate a comprehensive study of the provable security of SPNs as (possibly tweakable) wn-bit block ciphers, when the underlying n-bit permutation is modeled as a public random permutation. When the permutation step is linear (which is the case for most existing designs), we show that 3 SPN rounds are necessary and sufficient for security. On the other hand, even 1-round SPNs can be secure when non-linearity is allowed. Moreover, 2-round non-linear SPNs can achieve “beyond- birthday” (up to 2 2n/3 adversarial queries) security, and, as the number of non-linear rounds increases, our bounds are meaningful for the number of queries approaching 2 n . Finally, our non-linear SPNs can be made tweakable by incorporating the tweak into the permutation layer, and provide good multi-user security. As an application, our construction can turn two public n-bit permuta- tions (or fixed-key block ciphers) into a tweakable block cipher working on wn-bit inputs, 6n-bit key and an n-bit tweak (for any w ≥ 2); the tweakable block cipher provides security up to 2 2n/3 adversarial queries in the random permutation model, while only requiring w calls to each permutation, and 3w field multiplications for each wn-bit input. [less ▲]

Detailed reference viewed: 58 (0 UL)
Full Text
See detailL'annexion de la Crimée devant les juges
Erpelding, Michel UL

in Annuaire Français de Droit International (2018), 63

In accordance with the practice of a majority of States, the incorporation of Crimea into the Russian Federation can be qualified as a case of annexation. As a serious breach of international law, it ... [more ▼]

In accordance with the practice of a majority of States, the incorporation of Crimea into the Russian Federation can be qualified as a case of annexation. As a serious breach of international law, it raises a certain number of questions with regard to the respective rights and obligations of all relevant actors. With no conventional resolution of the dispute between Russia and Ukraine in sight, judicial remedies—both before national and international courts and tribunals—are destined to play a key role in this context. As a matter of fact, annexation of Crimea has already resulted in judicial decisions regarding the restitution of cultural property, investment protection, and the restrictive measures adopted by the EU following Crimea’s annexation. Other questions raised by this situation are currently being discussed before the ICJ, the ECtHR, the ICC, the WTO, and a UNCLOS Annex VII Arbitral Tribunal. [less ▲]

Detailed reference viewed: 64 (1 UL)
Full Text
Peer Reviewed
See detailKnow Your Preferences: Self-Regulation as Need-Congruent Goal Selection
Grund, Axel UL; Fries, Stefan; Rheinberg, Falko

in REVIEW OF GENERAL PSYCHOLOGY (2018), 22(4), 437-451

Theory and research on self-regulation is dominated by a social-cognitive perspective that places an emphasis on postdecisional (i.e., volitional) control processes of goal-maintenance in response to dual ... [more ▼]

Theory and research on self-regulation is dominated by a social-cognitive perspective that places an emphasis on postdecisional (i.e., volitional) control processes of goal-maintenance in response to dual-motive conflict. In the current contribution, we focus on research on self-regulation that acknowledges the affective fundamentals of motivated action, and we highlight processes of goal selection as vital parts of self-regulation. From our perspective of motivational competence, affective and cognitive processes work together rather than oppose each other in self-regulation, rendering effortless rather than effortful goal pursuit as the hallmark of efficient human action. A precondition for such motive- and self-congruent goal pursuits is that individuals have insight into their basic preferences and (can) act accordingly. Therefore, we address capacities, such as mindfulness, which may take effect in predecisional (i.e., motivational) action phases, thereby determining all subsequent action processes. [less ▲]

Detailed reference viewed: 67 (0 UL)
Full Text
Peer Reviewed
See detailUnderstanding procrastination: A motivational approach
Grund, Axel UL; Fries, Stefan

in PERSONALITY AND INDIVIDUAL DIFFERENCES (2018), 121

Procrastination is often seen as a self-regulatory failure. We want to offer a perspective that shifts the focus from volitional to motivational aspects of procrastination. In an attempt to demystify the ... [more ▼]

Procrastination is often seen as a self-regulatory failure. We want to offer a perspective that shifts the focus from volitional to motivational aspects of procrastination. In an attempt to demystify the phenomenon, we combine two studies exploring the motivational foundations of procrastination with a study aiming to uncover its implicit normative connotations. Study 1 investigated the link between value orientations and procrastination at a general level, showing that people high in procrastination entertain low achievement and high well-being value orientations. Study 2 investigated the link between self-determination and procrastination within and across daily activities. Low self-determination related to low levels of activity completion and to procrastination in general. Finally, Study 3 investigated the link between value as well as political orientations and perceptions of procrastination. Individuals who favored modern, conservative values were more likely to attribute academic procrastination as personal failure, whereas individuals who endorsed post-modern, liberal values were more likely to consider situational causes of academic procrastination. Against this background, we argue for a less normative view on procrastination and recommend motivational (e.g., goal selection) rather than volitional (e.g., goal implementation) interventions to prevent procrastination. [less ▲]

Detailed reference viewed: 84 (0 UL)
Full Text
See detailGeorges Kaeckenbeeck (1892–1973)
Erpelding, Michel UL

in Galerie des internationalistes francophones (2018)

This biographical sketch presents the life and work of Georges Kaeckenbeeck, a Belgian international lawyer who, despite also producing highly regarded scholarly work, was mostly active as a diplomat, an ... [more ▼]

This biographical sketch presents the life and work of Georges Kaeckenbeeck, a Belgian international lawyer who, despite also producing highly regarded scholarly work, was mostly active as a diplomat, an international judge and civil servant between the 1910s and the 1960s. [less ▲]

Detailed reference viewed: 38 (1 UL)
Full Text
Peer Reviewed
See detailEvaluation of school tasks in the light of sustainability education: Textbook research in science education in Luxembourgish primary schools
Andersen, Katja Natalie UL

in Environmental Education Research (2018), 24(9), 1301-1319

This article describes a research project that aimed to classify different types of sustainability-related school tasks in terms of two central approaches in primary school education: action-based and ... [more ▼]

This article describes a research project that aimed to classify different types of sustainability-related school tasks in terms of two central approaches in primary school education: action-based and task-based learning. Using a textbook analysis approach, the article clarifies implicit and explicit forms of sustainability education in school tasks in Luxembourgish science textbooks for Grades 1 to 6. The study uses a two-step analysis: first, scanning textbooks on content relating to sustainability; and, second, evaluating the teaching practices associated with this content apparent in the textbooks. Step one identifies the school tasks in which sustainability content is implicitly or explicitly addressed while step two analyzes which forms of action-based and task-based learning occur in these sustainability-related school tasks. Based on the results two claims can be made: first, that there is very little sustainability-related content in Luxembourgish primary science textbooks, and those topics raised mostly relate to sustainability only indirectly; secondly, action-based and task-based learning are undervalued in the context of sustainability-related school tasks; neither of the two was commonly found in school tasks in sustainability education. [less ▲]

Detailed reference viewed: 186 (13 UL)
Full Text
See detailSpace Mining And The Protection Of Extra-terrestrial Environment In The Light Of Article IX Of The Outer Space Treaty
Bergamasco, Federico UL

in Proceedings of the 78th Colloquium on the Law of Outer Space (2018)

Detailed reference viewed: 67 (7 UL)
Full Text
Peer Reviewed
See detailFighting and Voting: Mapping Electoral Violence in the Region of Post-communist Europe
Mochtak, Michal UL

in Terrorism and Political Violence (2018), 30(4), 589-615

Detailed reference viewed: 136 (19 UL)
See detailSelbstakzeptanz: Die Rational-Emotive Verhaltenstherapie nach Albert Ellis
Hoellen, Burkhard; Böhmer, Matthias UL

Book published by Klett-Cotta (2018)

Das Buch führt in die Grundlagen der REVT ein und skizziert die Weiterentwicklung der erfolgreichen Methode bis heute. Dem Überblick folgt der Einblick in die konkrete therapeutische Arbeit von Albert ... [more ▼]

Das Buch führt in die Grundlagen der REVT ein und skizziert die Weiterentwicklung der erfolgreichen Methode bis heute. Dem Überblick folgt der Einblick in die konkrete therapeutische Arbeit von Albert Ellis: Dieser bevorzugte effektive, herausfordernde Interventionen, die Veränderungen »kurz und wirksam« anstoßen können. In einem Therapieprotokoll wird deutlich, dass herausfordernde, manchmal provozierende Worte sehr gut zusammengehen mit einer tief humanistischen und zugewandten therapeutischen Grundhaltung. [less ▲]

Detailed reference viewed: 367 (7 UL)
See detailChroniclItaly: A corpus of Italian language newspapers published in the United States between 1898 and 1922
Viola, Lorella UL

Textual, factual or bibliographical database (2018)

Detailed reference viewed: 50 (5 UL)
Full Text
Peer Reviewed
See detailThe impact of self-control cues on subsequent monetary risk-taking.
Brevers, Damien UL; Foucart, Jennifer; Turel, Ofir et al

in Journal of behavioral addictions (2018), 7(4), 1044-1055

BACKGROUND AND AIMS: The "process-model" of self-control proposes that the ego-depletion effect is better explained by a switch between interest in "have-to" labor and cognitive "want-to" leisure, rather ... [more ▼]

BACKGROUND AND AIMS: The "process-model" of self-control proposes that the ego-depletion effect is better explained by a switch between interest in "have-to" labor and cognitive "want-to" leisure, rather than being mainly due to a decrease in cognitive resources, as advanced by the "strength-model" of self-control. However, it is currently difficult to disentangle the "process-model" from the "strength-model" of self-control. Here, we employed a stepwise approach, featuring three studies, for testing the process model of self-control. METHODS: In Study 1, we created a list of 30 self-control events for characterizing "have-to" conducts in the daily life. In Study 2, mental visualization of effortful self-control events ("have-to") and monetary risk-taking ("want-to") were employed for testing the strength-model of self-control. In Study 3, to test the process-model of self-control, participants were simply required to read self-control (or neutral) sentences. RESULTS: Study 1 provided evidence regarding external validly for the list of self-control events. Study 2 showed that mental visualization of effortful self-control events increases subsequent monetary risk-taking. Study 3 highlighted that the brief apparition of a self-control-related sentence was sufficient for increasing risk-taking. These patterns were evidenced in the trial with the less advantageous gain/loss ratio. DISCUSSION: Altogether these findings support the process-model of self-control in showing that triggering the semantic content of a "have-to" conduct, without its actual execution, is sufficient for modulating subsequent "want-to" activity. CONCLUSION: These findings could contribute to advancing current knowledge on how the high availability of ready-to-consume rewards in modern environments is redefining humans' self-control ability. [less ▲]

Detailed reference viewed: 102 (0 UL)