35 research outputs found

    Reconstruction of the Nipple Areola Complex (NAC)

    No full text

    Superficial temporal recipient vessels in microvascular orbit and scalp reconstruction of oncologic defects.

    No full text
    The superficial temporal artery and vein (STA/V) are often considered suboptimal recipient vessels due to anecdotal reports that they are unreliable and prone to spasm. This is unfortunate, as their position greatly facilitates reconstruction of the scalp and orbit. We present our experience with 28 patients who underwent microvascular craniofacial reconstruction of oncological defects using the STA/V as recipients over a 4-year period at a single institution. Rates of vessel thrombosis, total flap loss, and partial flap loss were not significantly different from 282 flaps anastomosed to neck vessels. With knowledge of the anatomy and proper technique, the STA/V are reliable and available in most patients and can facilitate microvascular orbit and scalp reconstruction. The proximity they offer allows more flexibility in flap pedicle length requirement and avoids the use of vein grafts. Caution should be exercised if there is a history of radiation therapy

    International Relations, Cybersecurity, and Content Analysis: A Constructivist Approach

    No full text
    The development and global diffusion of access to the Internet has—as is the case with most new and game-changing technologies—been accompanied with fears and threat perceptions. This chapter argues, on the one hand, that Constructivist IR theory is particularly suited for addressing and interpreting the threat discourses and identity issues which come in focus in cybersecurity. The ease with which cyber-culprits can hide their identity and location, operating through networks of hijacked computers across the world, makes fear-mongering threat and identity discourses a key issue in cybersecurity. On the other hand, this chapter presents content analysis—a set of quantitative methods focusing on key word searches—as a pertinent or even ubiquitous method for both the study and practice of cybersecurity. Through simple and globally accessible interfaces, the entire Web can be scrutinized using content analysis. Equipped with Constructivist theory and content analysis methods, the IR scholar stands prepared to uncover and better understand the massive discursive world of the Internet.</p
    corecore