Jose David López González - Academia.edu (original) (raw)

Uploads

Papers by Jose David López González

Research paper thumbnail of Atrasentan and renal events in patients with type 2 diabetes and chronic kidney disease (SONAR): a double-blind, randomised, placebo-controlled trial

The Lancet, 2019

Background Short-term treatment for people with type 2 diabetes using a low dose of the selective... more Background Short-term treatment for people with type 2 diabetes using a low dose of the selective endothelin A receptor antagonist atrasentan reduces albuminuria without causing significant sodium retention. We report the long-term effects of treatment with atrasentan on major renal outcomes. Methods We did this double-blind, randomised, placebo-controlled trial at 689 sites in 41 countries. We enrolled adults aged 18-85 years with type 2 diabetes, estimated glomerular filtration rate (eGFR) 25-75 mL/min per 1•73 m² of body surface area, and a urine albumin-to-creatinine ratio (UACR) of 300-5000 mg/g who had received maximum labelled or tolerated renin-angiotensin system inhibition for at least 4 weeks. Participants were given atrasentan 0•75 mg orally daily during an enrichment period before random group assignment. Those with a UACR decrease of at least 30% with no substantial fluid retention during the enrichment period (responders) were included in the double-blind treatment period. Responders were randomly assigned to receive either atrasentan 0•75 mg orally daily or placebo. All patients and investigators were masked to treatment assignment. The primary endpoint was a composite of doubling of serum creatinine (sustained for ≥30 days) or end-stage kidney disease (eGFR <15 mL/min per 1•73 m² sustained for ≥90 days, chronic dialysis for ≥90 days, kidney transplantation, or death from kidney failure) in the intention-to-treat population of all responders. Safety was assessed in all patients who received at least one dose of their assigned study treatment. The study is registered with ClinicalTrials.gov, number NCT01858532.

Research paper thumbnail of Managing Emerging Information Security Risks during Transitions to Integrated Operations

2010 43rd Hawaii International Conference on System Sciences, 2010

The Norwegian Oil and Gas Industry is adopting new information communication technology to connec... more The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. The management of the oil companies is generally aware of the increasing risks associated with the transition, but so far, investment in incident response (IR) capability has not been highly prioritized because of uncertainty related to risks and the present reactive mental model for security risk management. In this paper, we extend previous system dynamics models on operation transition and change of vulnerability, investigating the role of IR capability in controlling the severity of incidents. The model simulation shows that a reactive approach to security risk management might trap the organization in low IR capability and lead to severe incidents. With a long-term view, proactive investment in IR capability is of financial benefit.

Research paper thumbnail of Crowd Models for Emergency Evacuation: A Review Targeting Human-Centered Sensing

2013 46th Hawaii International Conference on System Sciences, 2013

Emergency evacuation of crowds is a fascinating phenomenon that has attracted researchers from va... more Emergency evacuation of crowds is a fascinating phenomenon that has attracted researchers from various fields. Better understanding of this class of crowd behavior opens up for improving evacuation policies and smarter design of buildings, increasing safety. Recently, a new class of disruptive technology has appeared: Humancentered sensing which allows crowd behavior to be monitored in real-time, and provides the basis for realtime crowd control. The question then becomes: to what degree can previous crowd models incorporate this development, and what areas need further research? In this paper, we provide a survey that describes some widely used crowd models and discuss their advantages and shortages from the angle of human-centered sensing. Our review reveals important research opportunities that may contribute to an improved and more robust emergency management.

Research paper thumbnail of Understanding Hidden Information Security Threats: The Vulnerability Black Market

2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007

It has been discovered recently that there is a "black market" for software vulnerabilities. Crim... more It has been discovered recently that there is a "black market" for software vulnerabilities. Criminals and terrorists can launch exploits toward organizations before system administrators have had a chance to apply a corrective patch. To counteract this threat, software vendors and security companies have been establishing a legitimate market for software vulnerabilities; they offer rewards for software bugs reported. To explain the basic traits of this phenomenon, we develop a system dynamics model showing the growth of the vulnerability black market. A simple conceptual model is developed and some simulations using the model are implemented to learn whether the attempt to legalize the vulnerability market helps to reduce the vulnerability information circulating in the black market.

Research paper thumbnail of Emergent Vulnerability in Integrated Operations: A Proactive Simulation Study of Risk and Organizational Learning

2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007

The implementation of Integrated Operations (IO) for oil and gas recovery-a real-time linkage amo... more The implementation of Integrated Operations (IO) for oil and gas recovery-a real-time linkage among platform-based facilities, onshore control centers and suppliers-is anticipated to reduce operating costs by 30%, extend the lifetime of current production fields by five years or longer and maintain Norwegian Continental Shelf production for 50-100 years. The changes in operating procedures require extensive training to ensure continued personal and environmental safety. Vulnerabilities may emerge during the rollout of updated techniques and integration of IO technology with existing work practices. We focus on user knowledge as key to successful change. A system dynamics simulation is presented that defines work process and knowledge transition. Interviews and historical records assisted in parameterizing the model. The simulation suggests that great care should be taken to facilitate and monitor the rate of knowledge maturation, even in the face of expensive implementation delays, to reduce the risk of catastrophic failure from endemic incidents. 1

Research paper thumbnail of Modeling instrumental conditioning - the behavioral regulation approach

36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, 2003

Basically, instrumental conditioning is learning through consequences: Behavior that produces pos... more Basically, instrumental conditioning is learning through consequences: Behavior that produces positive results (high "instrumental response") is reinforced, and that which produces negative effects (low "instrumental response") is weakened. Instrumental conditioning plays a major role in learning, but the content of such learning might be desired (e.g. correct cause-effect association) or undesired (superstitious behavior/beliefs). We apply the (relatively) recent behavioral regulation approach to develop a generic system dynamic model of a "classroom example" of instrumental conditioning. The model captures essential aspects of the theory and it enhances understanding of how desirable learning may be promoted and undesired outcomes restrained during an instrumental conditioning process.

Research paper thumbnail of Introduction to Communication and Information Systems Technology for Emergency Management Minitrack

2014 47th Hawaii International Conference on System Sciences, 2014

Research paper thumbnail of A Group Model Building Approach for Identifying Simulation Scenarios in Critical Infrastructure

2010 43rd Hawaii International Conference on System Sciences, 2010

Table-top and field simulation exercises are common tools for learning and practicing responses t... more Table-top and field simulation exercises are common tools for learning and practicing responses to unplanned IT security and critical infrastructure (CI) events. Preparing, executing and debriefing complex exercises are expensive and time consuming. Computer simulations can generate numerous potential scenarios and focus exercises on those that generate the most informative results. Credible scenarios must be based on a grounded causal structure that drives the dynamics of the crisis and response. As part of a project to examine a CI & IT crisis with cross-border effects we used Group Model Building (GMB) and system dynamics to develop plausible scenarios. Expert consensus was achieved about the crisis causal structure "driving" the event into a cross-border crisis. The model shows the negative effects of uncoordinated single country action on crisis perception and resource misallocation, in turn escalating crisis duration and severity. It is particularly severe if the crisis is exacerbated by ICT failures.

Research paper thumbnail of A Framework for Conceptualizing Social Engineering Attacks

Critical Information Infrastructures Security, 2006

Research paper thumbnail of Emotional words induce enhanced brain activity in schizophrenic patients with auditory hallucinations

Psychiatry Research: Neuroimaging, 2007

Neuroimaging studies of emotional response in schizophrenia have mainly used visual (faces) parad... more Neuroimaging studies of emotional response in schizophrenia have mainly used visual (faces) paradigms and shown globally reduced brain activity. None of these studies have used an auditory paradigm. Our principal aim is to evaluate the emotional response of patients with schizophrenia to neutral and emotional words. An auditory emotional paradigm based on the most frequent words heard by psychotic patients with auditory hallucinations was designed. This paradigm was applied to evaluate cerebral activation with functional magnetic resonance imaging (fMRI) in 11 patients with schizophrenia with persistent hallucinations and 10 healthy subjects. We found a clear enhanced activity of the frontal lobe, temporal cortex, insula, cingulate, and amygdala (mainly right side) in patients when hearing emotional words in comparison with controls. Our findings are consistent with other studies suggesting a relevant role for emotional response in the pathogenesis and treatment of auditory hallucinations.

Research paper thumbnail of Managing information security risks during new technology adoption

Computers & Security, 2012

Research paper thumbnail of A quest for a framework to improve software security: Vulnerability black markets scenario

Proceedings of the the 27th …, 2009

The discovery and management of software vulnerabilities after a product is released to the publi... more The discovery and management of software vulnerabilities after a product is released to the public is an important element of improving software quality and stability. The discovery of vulnerabilities enables exploitation and stimulates the development of patches or other protections, ...

Research paper thumbnail of Smartphone sensing platform for emergency management

The increasingly sophisticated sensors supported by modern smartphones open up novel research opp... more The increasingly sophisticated sensors supported by modern smartphones open up novel research opportunities, such as mobile phone sensing. One of the most challenging of these research areas is context-aware and activity recognition. The SmartRescue project takes advantage of smartphone sensing, processing and communication capabilities to monitor hazards and track people in a disaster. The goal is to help crisis managers and members of the public in early hazard detection, prediction, and in devising risk-minimizing evacuation plans when disaster strikes. In this paper we suggest a novel smartphone-based communication framework. It uses specific machine learning techniques that intelligently process sensor readings into useful information for the crisis responders. Core to the framework is a content-based publish-subscribe mechanism that allows flexible sharing of sensor data and computation results. We also evaluate a preliminary implementation of the platform, involving a smartphone app that reads and shares mobile phone sensor data for activity recognition.

Research paper thumbnail of A design proposal of real-time monitoring stations: implementation and performance in contrasting environmental conditions

Scientia Marina, 2012

With the aim of creating a real-time monitoring network for both oceanographic and meteorological... more With the aim of creating a real-time monitoring network for both oceanographic and meteorological data, a monitoring station conceptual design was developed. A common framework for software and electronics was adapted to different environmental conditions using two buoy approaches: one intended for oceanic waters, to be moored up to 30-40 m depth, where waves are the critical design factor, and one for continental waters (rivers, lakes and the inner part of estuaries), where currents are the critical design factor. When structures such as bridges are present in the area, the monitoring station can be installed on these structures, thus reducing its impact and increasing safety. In this paper, the design, implementation, operation and performance of these stations are described. A reliability index is calculated for the longest time series of the three related deployment options on the Galician coast: Cíes (oceanic buoy in front of the Ría de Vigo), Catoira (continental buoy in the Ulla river) and Cortegada (installation in a bed in the Ría de Arousa).

Research paper thumbnail of Atrasentan and renal events in patients with type 2 diabetes and chronic kidney disease (SONAR): a double-blind, randomised, placebo-controlled trial

The Lancet, 2019

Background Short-term treatment for people with type 2 diabetes using a low dose of the selective... more Background Short-term treatment for people with type 2 diabetes using a low dose of the selective endothelin A receptor antagonist atrasentan reduces albuminuria without causing significant sodium retention. We report the long-term effects of treatment with atrasentan on major renal outcomes. Methods We did this double-blind, randomised, placebo-controlled trial at 689 sites in 41 countries. We enrolled adults aged 18-85 years with type 2 diabetes, estimated glomerular filtration rate (eGFR) 25-75 mL/min per 1•73 m² of body surface area, and a urine albumin-to-creatinine ratio (UACR) of 300-5000 mg/g who had received maximum labelled or tolerated renin-angiotensin system inhibition for at least 4 weeks. Participants were given atrasentan 0•75 mg orally daily during an enrichment period before random group assignment. Those with a UACR decrease of at least 30% with no substantial fluid retention during the enrichment period (responders) were included in the double-blind treatment period. Responders were randomly assigned to receive either atrasentan 0•75 mg orally daily or placebo. All patients and investigators were masked to treatment assignment. The primary endpoint was a composite of doubling of serum creatinine (sustained for ≥30 days) or end-stage kidney disease (eGFR <15 mL/min per 1•73 m² sustained for ≥90 days, chronic dialysis for ≥90 days, kidney transplantation, or death from kidney failure) in the intention-to-treat population of all responders. Safety was assessed in all patients who received at least one dose of their assigned study treatment. The study is registered with ClinicalTrials.gov, number NCT01858532.

Research paper thumbnail of Managing Emerging Information Security Risks during Transitions to Integrated Operations

2010 43rd Hawaii International Conference on System Sciences, 2010

The Norwegian Oil and Gas Industry is adopting new information communication technology to connec... more The Norwegian Oil and Gas Industry is adopting new information communication technology to connect its offshore platforms, onshore control centers and the suppliers. The management of the oil companies is generally aware of the increasing risks associated with the transition, but so far, investment in incident response (IR) capability has not been highly prioritized because of uncertainty related to risks and the present reactive mental model for security risk management. In this paper, we extend previous system dynamics models on operation transition and change of vulnerability, investigating the role of IR capability in controlling the severity of incidents. The model simulation shows that a reactive approach to security risk management might trap the organization in low IR capability and lead to severe incidents. With a long-term view, proactive investment in IR capability is of financial benefit.

Research paper thumbnail of Crowd Models for Emergency Evacuation: A Review Targeting Human-Centered Sensing

2013 46th Hawaii International Conference on System Sciences, 2013

Emergency evacuation of crowds is a fascinating phenomenon that has attracted researchers from va... more Emergency evacuation of crowds is a fascinating phenomenon that has attracted researchers from various fields. Better understanding of this class of crowd behavior opens up for improving evacuation policies and smarter design of buildings, increasing safety. Recently, a new class of disruptive technology has appeared: Humancentered sensing which allows crowd behavior to be monitored in real-time, and provides the basis for realtime crowd control. The question then becomes: to what degree can previous crowd models incorporate this development, and what areas need further research? In this paper, we provide a survey that describes some widely used crowd models and discuss their advantages and shortages from the angle of human-centered sensing. Our review reveals important research opportunities that may contribute to an improved and more robust emergency management.

Research paper thumbnail of Understanding Hidden Information Security Threats: The Vulnerability Black Market

2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007

It has been discovered recently that there is a "black market" for software vulnerabilities. Crim... more It has been discovered recently that there is a "black market" for software vulnerabilities. Criminals and terrorists can launch exploits toward organizations before system administrators have had a chance to apply a corrective patch. To counteract this threat, software vendors and security companies have been establishing a legitimate market for software vulnerabilities; they offer rewards for software bugs reported. To explain the basic traits of this phenomenon, we develop a system dynamics model showing the growth of the vulnerability black market. A simple conceptual model is developed and some simulations using the model are implemented to learn whether the attempt to legalize the vulnerability market helps to reduce the vulnerability information circulating in the black market.

Research paper thumbnail of Emergent Vulnerability in Integrated Operations: A Proactive Simulation Study of Risk and Organizational Learning

2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007

The implementation of Integrated Operations (IO) for oil and gas recovery-a real-time linkage amo... more The implementation of Integrated Operations (IO) for oil and gas recovery-a real-time linkage among platform-based facilities, onshore control centers and suppliers-is anticipated to reduce operating costs by 30%, extend the lifetime of current production fields by five years or longer and maintain Norwegian Continental Shelf production for 50-100 years. The changes in operating procedures require extensive training to ensure continued personal and environmental safety. Vulnerabilities may emerge during the rollout of updated techniques and integration of IO technology with existing work practices. We focus on user knowledge as key to successful change. A system dynamics simulation is presented that defines work process and knowledge transition. Interviews and historical records assisted in parameterizing the model. The simulation suggests that great care should be taken to facilitate and monitor the rate of knowledge maturation, even in the face of expensive implementation delays, to reduce the risk of catastrophic failure from endemic incidents. 1

Research paper thumbnail of Modeling instrumental conditioning - the behavioral regulation approach

36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, 2003

Basically, instrumental conditioning is learning through consequences: Behavior that produces pos... more Basically, instrumental conditioning is learning through consequences: Behavior that produces positive results (high "instrumental response") is reinforced, and that which produces negative effects (low "instrumental response") is weakened. Instrumental conditioning plays a major role in learning, but the content of such learning might be desired (e.g. correct cause-effect association) or undesired (superstitious behavior/beliefs). We apply the (relatively) recent behavioral regulation approach to develop a generic system dynamic model of a "classroom example" of instrumental conditioning. The model captures essential aspects of the theory and it enhances understanding of how desirable learning may be promoted and undesired outcomes restrained during an instrumental conditioning process.

Research paper thumbnail of Introduction to Communication and Information Systems Technology for Emergency Management Minitrack

2014 47th Hawaii International Conference on System Sciences, 2014

Research paper thumbnail of A Group Model Building Approach for Identifying Simulation Scenarios in Critical Infrastructure

2010 43rd Hawaii International Conference on System Sciences, 2010

Table-top and field simulation exercises are common tools for learning and practicing responses t... more Table-top and field simulation exercises are common tools for learning and practicing responses to unplanned IT security and critical infrastructure (CI) events. Preparing, executing and debriefing complex exercises are expensive and time consuming. Computer simulations can generate numerous potential scenarios and focus exercises on those that generate the most informative results. Credible scenarios must be based on a grounded causal structure that drives the dynamics of the crisis and response. As part of a project to examine a CI & IT crisis with cross-border effects we used Group Model Building (GMB) and system dynamics to develop plausible scenarios. Expert consensus was achieved about the crisis causal structure "driving" the event into a cross-border crisis. The model shows the negative effects of uncoordinated single country action on crisis perception and resource misallocation, in turn escalating crisis duration and severity. It is particularly severe if the crisis is exacerbated by ICT failures.

Research paper thumbnail of A Framework for Conceptualizing Social Engineering Attacks

Critical Information Infrastructures Security, 2006

Research paper thumbnail of Emotional words induce enhanced brain activity in schizophrenic patients with auditory hallucinations

Psychiatry Research: Neuroimaging, 2007

Neuroimaging studies of emotional response in schizophrenia have mainly used visual (faces) parad... more Neuroimaging studies of emotional response in schizophrenia have mainly used visual (faces) paradigms and shown globally reduced brain activity. None of these studies have used an auditory paradigm. Our principal aim is to evaluate the emotional response of patients with schizophrenia to neutral and emotional words. An auditory emotional paradigm based on the most frequent words heard by psychotic patients with auditory hallucinations was designed. This paradigm was applied to evaluate cerebral activation with functional magnetic resonance imaging (fMRI) in 11 patients with schizophrenia with persistent hallucinations and 10 healthy subjects. We found a clear enhanced activity of the frontal lobe, temporal cortex, insula, cingulate, and amygdala (mainly right side) in patients when hearing emotional words in comparison with controls. Our findings are consistent with other studies suggesting a relevant role for emotional response in the pathogenesis and treatment of auditory hallucinations.

Research paper thumbnail of Managing information security risks during new technology adoption

Computers & Security, 2012

Research paper thumbnail of A quest for a framework to improve software security: Vulnerability black markets scenario

Proceedings of the the 27th …, 2009

The discovery and management of software vulnerabilities after a product is released to the publi... more The discovery and management of software vulnerabilities after a product is released to the public is an important element of improving software quality and stability. The discovery of vulnerabilities enables exploitation and stimulates the development of patches or other protections, ...

Research paper thumbnail of Smartphone sensing platform for emergency management

The increasingly sophisticated sensors supported by modern smartphones open up novel research opp... more The increasingly sophisticated sensors supported by modern smartphones open up novel research opportunities, such as mobile phone sensing. One of the most challenging of these research areas is context-aware and activity recognition. The SmartRescue project takes advantage of smartphone sensing, processing and communication capabilities to monitor hazards and track people in a disaster. The goal is to help crisis managers and members of the public in early hazard detection, prediction, and in devising risk-minimizing evacuation plans when disaster strikes. In this paper we suggest a novel smartphone-based communication framework. It uses specific machine learning techniques that intelligently process sensor readings into useful information for the crisis responders. Core to the framework is a content-based publish-subscribe mechanism that allows flexible sharing of sensor data and computation results. We also evaluate a preliminary implementation of the platform, involving a smartphone app that reads and shares mobile phone sensor data for activity recognition.

Research paper thumbnail of A design proposal of real-time monitoring stations: implementation and performance in contrasting environmental conditions

Scientia Marina, 2012

With the aim of creating a real-time monitoring network for both oceanographic and meteorological... more With the aim of creating a real-time monitoring network for both oceanographic and meteorological data, a monitoring station conceptual design was developed. A common framework for software and electronics was adapted to different environmental conditions using two buoy approaches: one intended for oceanic waters, to be moored up to 30-40 m depth, where waves are the critical design factor, and one for continental waters (rivers, lakes and the inner part of estuaries), where currents are the critical design factor. When structures such as bridges are present in the area, the monitoring station can be installed on these structures, thus reducing its impact and increasing safety. In this paper, the design, implementation, operation and performance of these stations are described. A reliability index is calculated for the longest time series of the three related deployment options on the Galician coast: Cíes (oceanic buoy in front of the Ría de Vigo), Catoira (continental buoy in the Ulla river) and Cortegada (installation in a bed in the Ría de Arousa).