2 resultados para Radical and Incremental ideas

em Nottingham eTheses


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Public involvement in healthcare is a prominent policy in countries across the economically developed world. A growing body of academic literature has focused on public participation, often presenting dichotomies between good and bad practice: between initiatives that offer empowerment and those constrained by consumerism, or between those which rely for recruitment on self-selecting members of the public, and those including a more broad-based, statistically representative group. In this paper I discuss the apparent tensions between differing rationales for participation, relating recent discussions about the nature of representation in public involvement to parallel writings about the contribution of laypeople’s expertise and experience. In the academic literature, there is, I suggest, a thin line between democratic justifications for involvement, suggesting a representative role for involved publics, and technocratic ideas about the potential ‘expert’ contributions of particular subgroups of the public. Analysing recent policy documents on participation in healthcare in England, I seek moreover to show how contemporary policy transcends both categories, demanding complex roles of involved publics which invoke various qualities seen as important in governing the interface between state and society. I relate this to social-theoretical perspectives on the relationship between governmental authority and citizens in late-modern society.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The immune system provides a rich metaphor for computer security: anomaly detection that works in nature should work for machines. However, early artificial immune system approaches for computer security had only limited success. Arguably, this was due to these artificial systems being based on too simplistic a view of the immune system. We present here a second generation artificial immune system for process anomaly detection. It improves on earlier systems by having different artificial cell types that process information. Following detailed information about how to build such second generation systems, we find that communication between cells types is key to performance. Through realistic testing and validation we show that second generation artificial immune systems are capable of anomaly detection beyond generic system policies. The paper concludes with a discussion and outline of the next steps in this exciting area of computer security.