Oxidative stressOxidative stress reflects an imbalance between the systemic manifestation of reactive oxygen species and a biological system's ability to readily detoxify the reactive intermediates or to repair the resulting damage. Disturbances in the normal redox state of cells can cause toxic effects through the production of peroxides and free radicals that damage all components of the cell, including proteins, lipids, and DNA. Oxidative stress from oxidative metabolism causes base damage, as well as strand breaks in DNA.
Reactive oxygen speciesIn chemistry, reactive oxygen species (ROS) are highly reactive chemicals formed from diatomic oxygen (). Examples of ROS include peroxides, superoxide, hydroxyl radical, singlet oxygen, and alpha-oxygen. The reduction of molecular oxygen () produces superoxide (), which is the precursor to most other reactive oxygen species: O2{} + e^- -> \ ^\bullet O2- Dismutation of superoxide produces hydrogen peroxide (): 2 H+{} + 2 \ ^\bullet O2^-{} -> H2O2{} + O2 Hydrogen peroxide in turn may be partially reduced, thus forming hydroxide ions and hydroxyl radicals (), or fully reduced to water: H2O2{} + e^- -> HO^-{} + \ ^\bullet OH 2 H+ + 2 e- + H2O2 -> 2 H2O In a biological context, ROS are byproducts of the normal metabolism of oxygen.
Key sizeIn cryptography, key size, key length, or key space refer to the number of bits in a key used by a cryptographic algorithm (such as a cipher). Key length defines the upper-bound on an algorithm's security (i.e. a logarithmic measure of the fastest known attack against an algorithm), because the security of all algorithms can be violated by brute-force attacks. Ideally, the lower-bound on an algorithm's security is by design equal to the key length (that is, the algorithm's design does not detract from the degree of security inherent in the key length).
Public-key cryptographyPublic-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic algorithms based on mathematical problems termed one-way functions. Security of public-key cryptography depends on keeping the private key secret; the public key can be openly distributed without compromising security.
Social influenceSocial influence comprises the ways in which individuals adjust their behavior to meet the demands of a social environment. It takes many forms and can be seen in conformity, socialization, peer pressure, obedience, leadership, persuasion, sales, and marketing. Typically social influence results from a specific action, command, or request, but people also alter their attitudes and behaviors in response to what they perceive others might do or think. In 1958, Harvard psychologist Herbert Kelman identified three broad varieties of social influence.
Social anxiety disorderSocial anxiety disorder (SAD), also known as social phobia, is an anxiety disorder characterized by sentiments of fear and anxiety in social situations, causing considerable distress and impairing ability to function in at least some aspects of daily life. These fears can be triggered by perceived or actual scrutiny from others. Individuals with social anxiety disorder fear negative evaluations from other people. Physical symptoms often include excessive blushing, excessive sweating, trembling, palpitations, and nausea.
Key managementKey management refers to management of cryptographic keys in a cryptosystem. This includes dealing with the generation, exchange, storage, use, crypto-shredding (destruction) and replacement of keys. It includes cryptographic protocol design, key servers, user procedures, and other relevant protocols. Key management concerns keys at the user level, either between users or systems. This is in contrast to key scheduling, which typically refers to the internal handling of keys within the operation of a cipher.
Mental healthMental health encompasses emotional, psychological, and social well-being, influencing cognition, perception, and behavior. According to World Health Organization (WHO), it is a "state of well-being in which the individual realizes his or her abilities, can cope with the normal stresses of life, can work productively and fruitfully, and can contribute to his or her community". It likewise determines how an individual handles stress, interpersonal relationships, and decision-making.
Organizational behaviorOrganizational behavior or organisational behaviour (see spelling differences) is the: "study of human behavior in organizational settings, the interface between human behavior and the organization, and the organization itself". Organizational behavioral research can be categorized in at least three ways: individuals in organizations (micro-level) work groups (meso-level) how organizations behave (macro-level) Chester Barnard recognized that individuals behave differently when acting in their organizational role than when acting separately from the organization.
Species descriptionA species description is a formal scientific description of a newly encountered species, usually in the form of a scientific paper. Its purpose is to give a clear description of a new species of organism and explain how it differs from species that have been described previously or are related. To be considered valid, a species description must follow guidelines established over time.