Search Results - "Parsons, Kathryn"
-
1
Trastuzumab-DM1 (T-DM1) retains all the mechanisms of action of trastuzumab and efficiently inhibits growth of lapatinib insensitive breast cancer
Published in Breast cancer research and treatment (01-07-2011)“…Trastuzumab (Herceptin ® ) is currently used as a treatment for patients whose breast tumors overexpress HER2/ErbB2. Trastuzumab-DM1 (T-DM1, trastuzumab…”
Get full text
Journal Article -
2
Targeting HER2-positive breast cancer with trastuzumab-DM1, an antibody-cytotoxic drug conjugate
Published in Cancer research (Chicago, Ill.) (15-11-2008)“…HER2 is a validated target in breast cancer therapy. Two drugs are currently approved for HER2-positive breast cancer: trastuzumab (Herceptin), introduced in…”
Get full text
Journal Article -
3
Conjugation site modulates the in vivo stability and therapeutic activity of antibody-drug conjugates
Published in Nature biotechnology (01-02-2012)“…Conjugating drugs to therapeutic antibodies is a promising strategy to increase their therapeutic efficacy. Shen et al. show that the local chemical…”
Get full text
Journal Article -
4
Ligand-Independent HER2/HER3/PI3K Complex Is Disrupted by Trastuzumab and Is Effectively Inhibited by the PI3K Inhibitor GDC-0941
Published in Cancer cell (05-05-2009)“…Herceptin (trastuzumab) is the backbone of HER2-directed breast cancer therapy and benefits patients in both the adjuvant and metastatic settings. Here, we…”
Get full text
Journal Article -
5
Engineered Thio-Trastuzumab-DM1 Conjugate with an Improved Therapeutic Index to Target Human Epidermal Growth Factor Receptor 2-Positive Breast Cancer
Published in Clinical cancer research (01-10-2010)“…Antibody drug conjugates (ADCs) combine the ideal properties of both antibodies and cytotoxic drugs by targeting potent drugs to the antigen-expressing tumor…”
Get full text
Journal Article -
6
Using Semantic Context to Rank the Results of Keyword Search
Published in International journal of human-computer interaction (28-05-2019)“…In an empirical user study, we assessed two approaches to ranking the results from a keyword search using semantic contextual match based on Latent Semantic…”
Get full text
Journal Article -
7
Can Cyberloafing and Internet Addiction Affect Organizational Information Security?
Published in Cyberpsychology, behavior and social networking (01-09-2017)“…Researchers have noted potential links between Internet addiction, the use of work computers for nonwork purposes and an increased risk of threat to the…”
Get more information
Journal Article -
8
An assessment of email and spontaneous dialog visualizations
Published in International journal of human-computer studies (01-06-2012)“…Two experiments were conducted examining the effectiveness of visualizations of unstructured texts. The first experiment presented transcriptions of…”
Get full text
Journal Article -
9
Message matters: Correcting organisational fake news
Published in Computers in human behavior (01-07-2023)“…Misinformation and fake news represent significant strategic and financial risks to organisations. To dispute or manage fake news, organisations are often…”
Get full text
Journal Article -
10
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q)
Published in Computers & security (01-05-2014)“…It is increasingly acknowledged that many threats to an organisation's computer systems can be attributed to the behaviour of computer users. To quantify these…”
Get full text
Journal Article -
11
Site-Specific Trastuzumab Maytansinoid Antibody–Drug Conjugates with Improved Therapeutic Activity through Linker and Antibody Engineering
Published in Journal of medicinal chemistry (09-10-2014)“…Antibody–drug conjugates (ADCs) have a significant impact toward the treatment of cancer, as evidenced by the clinical activity of the recently approved ADCs,…”
Get full text
Journal Article -
12
Predicting susceptibility to social influence in phishing emails
Published in International journal of human-computer studies (01-08-2019)“…•A total of 985 participants completed a role play scenario-based phishing study.•The presence of social influence principles influenced phishing…”
Get full text
Journal Article -
13
Individual differences and Information Security Awareness
Published in Computers in human behavior (01-04-2017)“…The main purpose of this study was to examine the relationship between individuals' Information Security Awareness (ISA) and individual difference variables,…”
Get full text
Journal Article -
14
The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies
Published in Computers & security (01-05-2017)“…Information security awareness (ISA) is integral to protecting an organisation from cyber threats. The aim of this paper is to further establish the validity…”
Get full text
Journal Article -
15
The design of phishing studies: Challenges for researchers
Published in Computers & security (01-07-2015)“…In this paper, a role play scenario experiment of people's ability to differentiate between phishing and genuine emails demonstrated limitations in the…”
Get full text
Journal Article -
16
When believing in technology leads to poor cyber security: Development of a trust in technical controls scale
Published in Computers & security (01-11-2020)“…While technical controls can reduce vulnerabilities to cyber threats, no technology provides absolute protection and we hypothesised that people may act less…”
Get full text
Journal Article -
17
Matching training to individual learning styles improves information security awareness
Published in Information and computer security (03-04-2020)“…Purpose This paper aims to introduce the concept of a framework of cyber-security controls that are adaptable to different types of organisations and different…”
Get full text
Journal Article -
18
The effect of resilience and job stress on information security awareness
Published in Information and computer security (09-07-2018)“…Purpose The purpose of this study was to investigate the relationship between resilience, job stress and information security awareness (ISA). The study…”
Get full text
Journal Article -
19
Superior In vivo Efficacy of Afucosylated Trastuzumab in the Treatment of HER2-Amplified Breast Cancer
Published in Cancer research (Chicago, Ill.) (01-06-2010)“…The enhancement of immune effector functions has been proposed as a potential strategy for increasing the efficacy of therapeutic antibodies. Here, we show…”
Get full text
Journal Article -
20
Managing information security awareness at an Australian bank: a comparative study
Published in Information and computer security (12-06-2017)“…Purpose The aim of this study was first to confirm that a specific bank’s employees were generally more information security-aware than employees in other…”
Get full text
Journal Article