Poster: "ECR 2015 / C-2235 / Automated breast volume scanner (ABVS) compared to MRI in BRCA ... more Poster: "ECR 2015 / C-2235 / Automated breast volume scanner (ABVS) compared to MRI in BRCA mutation gene carriers" by: "O. Halshtok Neiman1, Z. Erlich2, E. Friedman 3, A. Rundstein1, A. Shalmon1, Y. Servadio1, M. Gotlieb1, M. Sklair-Levy1; 1Ramat Gan/IL, 2Raanana/IL, 3Tel Aviv/IL"
Asynchronous Learning Networks (ALNs) make the process of collaboration more transparent, because... more Asynchronous Learning Networks (ALNs) make the process of collaboration more transparent, because a transcript of conference messages can be used to assess individual roles and contributions and the collaborative process itself. This study considers three aspects of ALNs: the design; the quality of the resulting knowledge construction process; and cohesion, role and power network structures. The design is evaluated according to the Social Interdependence Theory of Cooperative Learning. The quality of the knowledge construction process is evaluated through Content Analysis; and the network structures are analyzed using Social Network Analysis of the response relations among participants during online discussions. In this research we analyze data from two three-month-long ALN academic university courses: a formal, structured, closed forum and an informal, non-structured, open forum. We found that in the structured ALN, the knowledge construction process reached a very high phase of cr...
Encyclopedia of Information Science and Technology, Second Edition
With the rapid growth of networked systems and applications such as e-commerce, the demand for ef... more With the rapid growth of networked systems and applications such as e-commerce, the demand for effective computer security is increasing. Most computer systems are protected through a process of user identification and authentication. While identification is usually non-private information provided by users to identify themselves and can be known by system administrators and other system users, authentication provides secret, private user information which can authenticate their identity. There are various authentication approaches and techniques, from passwords to public keys (Smith, 2002). This article presents the three main authentication approaches, their technology and implementation issues, and the factors to be considered when choosing an authentication method.
The philosophy underlying open source software (OSS) is enabling programmers to freely access the... more The philosophy underlying open source software (OSS) is enabling programmers to freely access the software source by distributing the software source code, thus allowing them to use the software for any purpose, to adapt and modify it, and redistribute the original or the modified source for further use, modification, and redistribution. The modifications, which include fixing bugs and improving the source, evolve the software. This evolutionary process can produce better software than the traditional proprietary software, in which the source is open only to a very few programmers and is closed to everybody else who blindly use it but cannot change or modify it. The idea of open source software arose about 20 years ago and in recent years is breaking out into the educational, commercial, and governmental world. It offers many opportunities when implemented appropriately. The chapter will present a detailed definition of open source software, its philosophy, its operating principles ...
The development and emergence of new technologies in distance learning has opened a broad range o... more The development and emergence of new technologies in distance learning has opened a broad range of options for promoting learning. New technologies and the latest generation of Web-based tools have been increasingly adopted in distance learning. Integrating these technologies into education has a profound impact on all areas of learning, from course management to problem-solving instruction. The new technologies have provided a valuable addition to interactivity and interactions in the process of teaching and learning. In recent years, there has been a rapid increase in the use of the latest generation of Web-based tools (Web 2.0), such as wikis, blogs, and podcasts, in distance learning. The possibilities of wikis and blogs and other new Web tools are countless. Any topic that needs to be discussed openly, quickly, or in a collaborative manner can benefit from these tools.
The Open University of Israel (OUI) is a distance education institution with open admissions that... more The Open University of Israel (OUI) is a distance education institution with open admissions that offers academic studies to students throughout Israel. Its home-study method allows its students to pursue higher education whenever and wherever convenient. The OUI offers over 500 courses in life sciences, natural sciences, mathematics, computer science, social sciences, management, Jewish studies, education, humanities, psychology, communications, music and art, and more, and has about 38,000 students all over Israel and abroad.
The development of new communication technologies has opened a broad range of options for promoti... more The development of new communication technologies has opened a broad range of options for promoting learning, of which a significant one is CMC—computer-mediated communication. CMC refers to communication that utilizes a combination of telecommunication technologies and computer networks, and enables users to transmit, store, and receive information using synchronous and asynchronous tools.
This article discloses for the first time the discovery of a Syriac inscription from the beginnin... more This article discloses for the first time the discovery of a Syriac inscription from the beginning of the eighth century A. C. near Kamed el-Lawz in the Lebanon Valley. The inscription refers to a quarry ('bltmyʾ̇) and belongs to or relates to a 'rēš pathora' (assumed to be a Christian religious leader) named Mar-Addai who came here from Kurdistan. More than 25 similar inscriptions, all written at the same time were discovered on the same mountain range during the thirties (and one in 1968). The subject matter of these inscriptions, as well as some of the linguistic expressions which appear in them several times, are unique to this group of inscriptions, and are still open to further investigation and interpretation.
International Journal of Information Security and Privacy, 2010
With the rapid growth of information systems and networks, security is a major concern of organiz... more With the rapid growth of information systems and networks, security is a major concern of organizations. The main goals of information systems security are confidentially, integrity, and availability. The cornerstone of an organization’s security lies in designing, developing and implementing proper information systems’ security policy that balances security goals with the organization’s needs. In this paper, the authors discuss the goals of information systems security and the techniques to achieve them. Specifically, the paper focuses on access control and the various authentication approaches, as well as intrusion detection and prevention systems. As attacks become more frequent and devastating, ongoing research is required to adapt and improve security technologies and policies to reflect new modes of attack to keep information systems secure.
International Journal of Healthcare Information Systems and Informatics, 2008
The global burden of disease falls most heavily on people in developing countries. Few resources ... more The global burden of disease falls most heavily on people in developing countries. Few resources for healthcare, geographical and infrastructure issues, lack of trained staff, language and cultural diversity and political instability all affect the ability of health providers to support effective and efficient healthcare. Health information systems are a key aspect of improving healthcare, but existing systems are often expensive and unsuitable. Open source software appears to be a promising avenue for quickly and cheaply introducing health information systems that are appropriate for developing nations. This article describes some aspects of open source e-health software that are particularly relevant to developing nations, issues and problems that may arise and suggests some future areas for research and action. Suggestions for critical success factors are included. Much of the discussion will be related to a case study of a training and e-health project, currently running in the ...
Association for Educational Communications …, 2004
This paper considers four aspects of online communities. Design, mechanisms, architecture, and th... more This paper considers four aspects of online communities. Design, mechanisms, architecture, and the constructed knowledge. We hypothesize that different designs of communities drive different mechanisms, which give rise to different architectures, which in turn result in different ...
The serotonin transporter-linked promoter region polymorphism (5-HTTLPR) is thought to be associa... more The serotonin transporter-linked promoter region polymorphism (5-HTTLPR) is thought to be associated with some serotonin dysfunction-related psychopathologies such as depression and anxiety disorders. Suicide and suicide-related behaviors such as violence, aggression, and impulsivity have been reproducibly associated with serotonin dysfunction and are partially genetic. This study examined the association of 5-HTTLPR with suicidal behavior and related traits in Israeli suicidal adolescent inpatients using the haplotype relative risk (HRR) method that controls for artifacts caused by population stratification. Forty-eight inpatient adolescents who recently attempted suicide were assessed by structured interviews for detailed clinical history, diagnoses, suicide intent, suicide risk, impulsivity, violence, and depression. Blood samples were collected and DNA extracted from patients and their biological parents. The 5-HTTLPR allele frequencies were tested for association with suicidality by the HRR method. In addition, the relationship between genotypes and phenotypic severity of several clinical parameters was analyzed. No significant allelic association of the 5-HTTLPR polymorphism with suicidal behavior was found (chi square = 0.023; P = 0.88). Analysis of variance of the suicide-related trait measures for the three genotypes demonstrated a significant difference in violence measures between patients carrying the LL and LS genotypes (9.50+/-4.04 vs. 5.36+/-4.03; P = 0.029). This study suggests that the 5-HTTLPR polymorphism is unlikely to have major relevance to the pathogenesis of suicidal behavior in adolescence but may contribute to violent behavior in this population.
Poster: "ECR 2015 / C-2235 / Automated breast volume scanner (ABVS) compared to MRI in BRCA ... more Poster: "ECR 2015 / C-2235 / Automated breast volume scanner (ABVS) compared to MRI in BRCA mutation gene carriers" by: "O. Halshtok Neiman1, Z. Erlich2, E. Friedman 3, A. Rundstein1, A. Shalmon1, Y. Servadio1, M. Gotlieb1, M. Sklair-Levy1; 1Ramat Gan/IL, 2Raanana/IL, 3Tel Aviv/IL"
Asynchronous Learning Networks (ALNs) make the process of collaboration more transparent, because... more Asynchronous Learning Networks (ALNs) make the process of collaboration more transparent, because a transcript of conference messages can be used to assess individual roles and contributions and the collaborative process itself. This study considers three aspects of ALNs: the design; the quality of the resulting knowledge construction process; and cohesion, role and power network structures. The design is evaluated according to the Social Interdependence Theory of Cooperative Learning. The quality of the knowledge construction process is evaluated through Content Analysis; and the network structures are analyzed using Social Network Analysis of the response relations among participants during online discussions. In this research we analyze data from two three-month-long ALN academic university courses: a formal, structured, closed forum and an informal, non-structured, open forum. We found that in the structured ALN, the knowledge construction process reached a very high phase of cr...
Encyclopedia of Information Science and Technology, Second Edition
With the rapid growth of networked systems and applications such as e-commerce, the demand for ef... more With the rapid growth of networked systems and applications such as e-commerce, the demand for effective computer security is increasing. Most computer systems are protected through a process of user identification and authentication. While identification is usually non-private information provided by users to identify themselves and can be known by system administrators and other system users, authentication provides secret, private user information which can authenticate their identity. There are various authentication approaches and techniques, from passwords to public keys (Smith, 2002). This article presents the three main authentication approaches, their technology and implementation issues, and the factors to be considered when choosing an authentication method.
The philosophy underlying open source software (OSS) is enabling programmers to freely access the... more The philosophy underlying open source software (OSS) is enabling programmers to freely access the software source by distributing the software source code, thus allowing them to use the software for any purpose, to adapt and modify it, and redistribute the original or the modified source for further use, modification, and redistribution. The modifications, which include fixing bugs and improving the source, evolve the software. This evolutionary process can produce better software than the traditional proprietary software, in which the source is open only to a very few programmers and is closed to everybody else who blindly use it but cannot change or modify it. The idea of open source software arose about 20 years ago and in recent years is breaking out into the educational, commercial, and governmental world. It offers many opportunities when implemented appropriately. The chapter will present a detailed definition of open source software, its philosophy, its operating principles ...
The development and emergence of new technologies in distance learning has opened a broad range o... more The development and emergence of new technologies in distance learning has opened a broad range of options for promoting learning. New technologies and the latest generation of Web-based tools have been increasingly adopted in distance learning. Integrating these technologies into education has a profound impact on all areas of learning, from course management to problem-solving instruction. The new technologies have provided a valuable addition to interactivity and interactions in the process of teaching and learning. In recent years, there has been a rapid increase in the use of the latest generation of Web-based tools (Web 2.0), such as wikis, blogs, and podcasts, in distance learning. The possibilities of wikis and blogs and other new Web tools are countless. Any topic that needs to be discussed openly, quickly, or in a collaborative manner can benefit from these tools.
The Open University of Israel (OUI) is a distance education institution with open admissions that... more The Open University of Israel (OUI) is a distance education institution with open admissions that offers academic studies to students throughout Israel. Its home-study method allows its students to pursue higher education whenever and wherever convenient. The OUI offers over 500 courses in life sciences, natural sciences, mathematics, computer science, social sciences, management, Jewish studies, education, humanities, psychology, communications, music and art, and more, and has about 38,000 students all over Israel and abroad.
The development of new communication technologies has opened a broad range of options for promoti... more The development of new communication technologies has opened a broad range of options for promoting learning, of which a significant one is CMC—computer-mediated communication. CMC refers to communication that utilizes a combination of telecommunication technologies and computer networks, and enables users to transmit, store, and receive information using synchronous and asynchronous tools.
This article discloses for the first time the discovery of a Syriac inscription from the beginnin... more This article discloses for the first time the discovery of a Syriac inscription from the beginning of the eighth century A. C. near Kamed el-Lawz in the Lebanon Valley. The inscription refers to a quarry ('bltmyʾ̇) and belongs to or relates to a 'rēš pathora' (assumed to be a Christian religious leader) named Mar-Addai who came here from Kurdistan. More than 25 similar inscriptions, all written at the same time were discovered on the same mountain range during the thirties (and one in 1968). The subject matter of these inscriptions, as well as some of the linguistic expressions which appear in them several times, are unique to this group of inscriptions, and are still open to further investigation and interpretation.
International Journal of Information Security and Privacy, 2010
With the rapid growth of information systems and networks, security is a major concern of organiz... more With the rapid growth of information systems and networks, security is a major concern of organizations. The main goals of information systems security are confidentially, integrity, and availability. The cornerstone of an organization’s security lies in designing, developing and implementing proper information systems’ security policy that balances security goals with the organization’s needs. In this paper, the authors discuss the goals of information systems security and the techniques to achieve them. Specifically, the paper focuses on access control and the various authentication approaches, as well as intrusion detection and prevention systems. As attacks become more frequent and devastating, ongoing research is required to adapt and improve security technologies and policies to reflect new modes of attack to keep information systems secure.
International Journal of Healthcare Information Systems and Informatics, 2008
The global burden of disease falls most heavily on people in developing countries. Few resources ... more The global burden of disease falls most heavily on people in developing countries. Few resources for healthcare, geographical and infrastructure issues, lack of trained staff, language and cultural diversity and political instability all affect the ability of health providers to support effective and efficient healthcare. Health information systems are a key aspect of improving healthcare, but existing systems are often expensive and unsuitable. Open source software appears to be a promising avenue for quickly and cheaply introducing health information systems that are appropriate for developing nations. This article describes some aspects of open source e-health software that are particularly relevant to developing nations, issues and problems that may arise and suggests some future areas for research and action. Suggestions for critical success factors are included. Much of the discussion will be related to a case study of a training and e-health project, currently running in the ...
Association for Educational Communications …, 2004
This paper considers four aspects of online communities. Design, mechanisms, architecture, and th... more This paper considers four aspects of online communities. Design, mechanisms, architecture, and the constructed knowledge. We hypothesize that different designs of communities drive different mechanisms, which give rise to different architectures, which in turn result in different ...
The serotonin transporter-linked promoter region polymorphism (5-HTTLPR) is thought to be associa... more The serotonin transporter-linked promoter region polymorphism (5-HTTLPR) is thought to be associated with some serotonin dysfunction-related psychopathologies such as depression and anxiety disorders. Suicide and suicide-related behaviors such as violence, aggression, and impulsivity have been reproducibly associated with serotonin dysfunction and are partially genetic. This study examined the association of 5-HTTLPR with suicidal behavior and related traits in Israeli suicidal adolescent inpatients using the haplotype relative risk (HRR) method that controls for artifacts caused by population stratification. Forty-eight inpatient adolescents who recently attempted suicide were assessed by structured interviews for detailed clinical history, diagnoses, suicide intent, suicide risk, impulsivity, violence, and depression. Blood samples were collected and DNA extracted from patients and their biological parents. The 5-HTTLPR allele frequencies were tested for association with suicidality by the HRR method. In addition, the relationship between genotypes and phenotypic severity of several clinical parameters was analyzed. No significant allelic association of the 5-HTTLPR polymorphism with suicidal behavior was found (chi square = 0.023; P = 0.88). Analysis of variance of the suicide-related trait measures for the three genotypes demonstrated a significant difference in violence measures between patients carrying the LL and LS genotypes (9.50+/-4.04 vs. 5.36+/-4.03; P = 0.029). This study suggests that the 5-HTTLPR polymorphism is unlikely to have major relevance to the pathogenesis of suicidal behavior in adolescence but may contribute to violent behavior in this population.
Uploads
Papers by Zippy Erlich