998 resultados para Intergenerational protection


Relevância:

60.00% 60.00%

Publicador:

Resumo:

A presente dissertação – A Institucionalização no Feminino: que repercussões na Reintegração (Trajectórias de vida e dimensão dos factores de (des) protecção na transmissão intergeracional das jovens que saíram da CIJE de Castelo Branco no período de 1995-2000) – foi realizada no âmbito do VI Curso de Mestrado em Serviço Social. O objecto desta dissertação centrou-se na análise das trajectórias de vida de mulheres adultas que durante a sua infância estiveram internadas na Instituição Casa de Infância e Juventude de Castelo Branco e cuja desinstitucionalização ocorreu no período de 1995 a 2000, considerando como critério a residência das jovens no Distrito de Castelo Branco. Para a prossecução desta investigação, adoptou-se uma metodologia qualitativa. Recorreu-se à análise documental e a entrevistas semi-directivas efectuadas a nove jovens. Com esta investigação pretendeu-se estudar as trajectórias para a obtenção de dados sobre a experiência de vida, o seu processo de autonomização e de que forma a medida de institucionalização se reproduziu nos descendentes, e se estes constam igualmente das crianças e jovens com medida de protecção, nomeadamente de acolhimento institucional. Relativamente aos objectivos, pretendemos: analisar o percurso de vida das jovens com medida de acolhimento institucional; identificar a avaliação das jovens sobre o seu processo de internamento e a experiência de vida; identificar a forma como estas jovens se relacionam com a percepção do conceito formal da lei de “Perigo”; analisar a autonomia de vida face à família, à inserção profissional e eventual ligação face aos sistemas de protecção social; e analisar a situação e as expectativas face às jovens sem filhos. Dos resultados obtidos na presente investigação, podemos concluir que, após a medida de internamento, a maioria das jovens integrou a família de origem. Algumas valorizam este regresso, ressalvando as dificuldades de adaptação à sua família, e à própria comunidade. A maioria das jovens constituíram agregado próprio, revelando capacidades parentais na educação dos seus filhos, e proporcionando-lhes uma infância segura e feliz, assegurando de forma responsável as suas necessidades tendo em vista a sua segurança, saúde, formação, educação e desenvolvimento.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Existing climate change mitigation policies are particularly concerned with the reconciliation of two seemingly conflicting aims: environmental protection and economic efficiency. The normative principles underlying these policies meanwhile focus on two central ideas: fair burden-sharing and agents' responsibility. However, both existing policy instruments and their supporting philosophical principles are highly problematic in terms of intergenerational justice and truly effective climate change mitigation. Three competing conceptions for allocating and distributing the burdens of climate change mitigation (cap-and-trade schemes, carbon emission taxes, and personal ecological space quotas) and their compatibility with principles of intra- and intergenerational justice are analysed and evaluated. None of the proposed instruments is able to satisfy the demands of effective mitigation and egalitarian justice on its own, which suggests that existing proposals for the distribution of emission rights and climate change-related costs need to be supported by a thicker account of intergenerational justice.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Essai présenté à la Faculté des arts et des sciences en vue de l’obtention du grade de Maîtrise en service social

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In his report into corruption in Queensland, Fitzgerald listed whistleblower protection as a necessary part of a strong governance regime. "What is required is an accessible, independent body to which disclosures can be made, confidentially (at least in the first instance) and in any event free from fear of reprisals." It was one of the reforms studied by the Electoral and Administrative Review Committee, the report of which resulted in the Whistleblowers Protection Act 1994 (WPA). The need for whistleblower protection was supported by all sides of Parliament. The Premier, Wayne Goss, in his Second Reading Speech on the Public Sector Ethics Bill , said that that Act and the WPA would form a package with the former outlining required behaviour and the WPA encouraging staff to report wrongdoing. The WPA was subsequently passed and has remained virtually unamended for over a decade. Such consistency is either an indication of skilled drafting and effectiveness or the fact that the Act has been neglected. It is the hypothesis of this paper that the latter is the case. This hypothesis will be tested by examining the sincerity and diligence with which the Act has been treated during, and following, its passage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explains the relevance of the Code and its place in the regulatory framework, discusses some of the key issues arising in the recent review (as identified by consumer advocates1), and explains the relationship between the Code and the Financial Ombudsman Service.