782 resultados para human identity
Resumo:
This book examines the interface between religion, charity law and human rights. It does so by treating the Church of England and its current circumstances as a timely case study providing an opportunity to examine the tensions that have now become such a characteristic feature of that interface. Firstly, it suggests that the Church is the primary source of canon law principles that have played a formative role in shaping civic morality throughout the common law jurisdictions: the history of their emergence and enforcement by the State in post-Reformation England is recorded and assessed. Secondly, it reveals that of such principles those of greatest weight were associated with matters of sexuality: in particular, for centuries, family law was formulated and applied with regard for the sanctity of the heterosexual marital family which provided the only legally permissible context for any form of sexual relationship. Thirdly, given that history, it identifies and assesses the particular implications that now arise for the Church as a consequence of recent charity law reform outcomes and human rights case law developments: a comparative analysis of religion related case law is provided. Finally, following an outline of the structure and organizational functions of the Church, a detailed analysis is undertaken of its success in engaging with these issues in the context of the Lambeth Conferences, the wider Anglican Communion and in the ill-fated Covenant initiative. From the perspective of the dilemmas currently challenging the moral authority of the Church of England, this book identifies and explores the contemporary ‘moral imperatives’ or red line issues that now threaten the coherence of Christian religions in most leading common law nations. Gay marriage and abortion are among the host of morally charged and deeply divisive topics demanding a reasoned response and leadership from religious bodies. Attention is given to the judicial interpretation and evaluation of these and other issues that now undermine the traditional role of the Church of England. As the interface between religion, charity law and human rights becomes steadily more fractious, with religious fundamentalism and discrimination acquiring a higher profile, there is now a pressing need for a more balanced relationship between those with and those without religious beliefs. This book will be an invaluable aid in starting the process of achieving a triangulated relationship between the principles of canon law, charity law and human rights law.
Resumo:
“Supermax” prisons, conceived by the United States in the early 1980s, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country’s decision to build a supermax prison.
Resumo:
A victim of phishing emails could be subjected to money loss and identity theft. This paper investigates the different types of phishing email victims, with the goal of increasing such victims' defences. To obtain this kind of information, an experiment which involves sending a phishing email to participants is conducted. Quantitative and qualitative methods are also used to collect users' information. A model for detecting deception has been employed to understand victims' behaviour. This paper reports the qualitative results. The findings suggest that victims of phishing emails do not always exhibit the same vulnerability. The cause of being a victim is a result of three weaknesses in the detection process: (1) lack of knowledge; (2) weak confirmation channel, and; (3) victims' high propensity towards risk-taking. Therefore, it is suggested that users be provided with suitable confirmation channels and be more risk averse in their behaviour so that they would not fall victim to phishing emails.
Resumo:
Dendritic cells (DCs) play critical roles in immune-mediated kidney diseases. Little is known, however, about DC subsets in human chronic kidney disease, with previous studies restricted to a limited set of pathologies and to using immunohistochemical methods. In this study, we developed novel protocols for extracting renal DC subsets from diseased human kidneys and identified, enumerated, and phenotyped them by multicolor flow cytometry. We detected significantly greater numbers of total DCs as well as CD141(hi) and CD1c(+) myeloid DC (mDCs) subsets in diseased biopsies with interstitial fibrosis than diseased biopsies without fibrosis or healthy kidney tissue. In contrast, plasmacytoid DC numbers were significantly higher in the fibrotic group compared with healthy tissue only. Numbers of all DC subsets correlated with loss of kidney function, recorded as estimated glomerular filtration rate. CD141(hi) DCs expressed C-type lectin domain family 9 member A (CLEC9A), whereas the majority of CD1c(+) DCs lacked the expression of CD1a and DC-specific ICAM-3-grabbing nonintegrin (DC-SIGN), suggesting these mDC subsets may be circulating CD141(hi) and CD1c(+) blood DCs infiltrating kidney tissue. Our analysis revealed CLEC9A(+) and CD1c(+) cells were restricted to the tubulointerstitium. Notably, DC expression of the costimulatory and maturation molecule CD86 was significantly increased in both diseased cohorts compared with healthy tissue. Transforming growth factor-β levels in dissociated tissue supernatants were significantly elevated in diseased biopsies with fibrosis compared with nonfibrotic biopsies, with mDCs identified as a major source of this profibrotic cytokine. Collectively, our data indicate that activated mDC subsets, likely recruited into the tubulointerstitium, are positioned to play a role in the development of fibrosis and, thus, progression to chronic kidney disease.
Resumo:
Poly(l-lactide) (PLLA), a versatile biodegradable polymer, is one of the most commonly-used materials for tissue engineering applications. To improve cell affinity for PLLA, poly(ethylene glycol) (PEG) was used to develop diblock copolymers. Human bone marrow stromal cells (hBMSCs) were cultured on MPEG-b-PLLA copolymer films to determine the effects of modification on the attachment and proliferation of hBMSC. The mRNA expression of 84 human extracellular matrix (ECM) and adhesion molecules was analyzed using RT-qPCR to understand the underlying mechanisms. It was found that MPEG-b-PLLA copolymer films significantly improved cell adhesion, extension, and proliferation.This was found to be related to the significant upregulation of two adhesion genes, CDH1 and CTNND2, which encode 1-cadherin and delta-2-catenin, respectively, two key components for the cadherin-catenin complex. In summary, MPEG-b-PLLA copolymer surfaces improved initial cell adhesion by stimulation of adhesion molecule gene expression.
Resumo:
This article examines the constructs of masculinity that are predominant in contemporary Australian society and their influence upon men's perception of their health and well-being. It questions the currency of ‘male stoicism’ at a time when changed perceptions of masculinity are emerging. In particular, it considers how these constructs are evidenced in men's embracing of human mortality and their public expressions of grief. The nature of men's health promotion is discussed and a platform for promoting healthy approaches to masculinity, mortality and grief is presented.
Resumo:
This research contributes new understandings about the development of the professional identity of child care practitioners and how professional identity changes during the transition from student to practitioner. Self-authorship theory was used as the framework to investigate the development of professional identity through exploration of beliefs about practice, sense of self, and capabilities for collaborative engagement. Students recruited for this research were completing their qualifications to work with young children in child care settings. Data from initial and follow-up interviews were analysed to understand change over time in professional identity. Findings indicated a need for training institutions and workplaces to move beyond competency-based training approaches to include more critically reflective learning opportunities. Such a focus on critical reflection has implications for improving the skills, status, and recognition of child care practitioners as educators.
Resumo:
Heparan sulfate proteoglycans (HSPGs) are key components of the extracellular matrix that mediate cell proliferation, invasion, and cellular signaling. The biological functions of HSPGs are linked to their co-stimulatory effects on extracellular ligands (e.g., WNTs) and the resulting activation of transcription factors that control mammalian development but also associated with tumorigenesis. We examined the expression profile of HSPG core protein syndecans (SDC1–4) and glypicans (GPC1–6) along with the enzymes that initiate or modify their glycosaminoglycan chains in human breast cancer (HBC) epithelial cells. Gene expression in relation to cell proliferation was examined in the HBC cell lines MCF-7 and MDA-MB-231 following treatment with the HS agonist heparin. Heparin increased gene expression of chain initiation and modification enzymes including EXT1 and NDST1, as well as core proteins SDC2 and GPC6. With HS/Wnt interactions established, we next investigated WNT pathway components and observed that increased proliferation of the more invasive MDA-MB-231 cells is associated with activation of the Wnt signaling pathway. Specifically, there was substantial upregulation (>5-fold) of AXIN1, WNT4A, and MYC in MDA-MB-231 but not in MCF-7 cells. The changes in gene expression observed for HSPG core proteins and related enzymes along with the associated Wnt signaling components suggest coordinated interactions. The influence of HSPGs on cellular proliferation and invasive potential of breast cancer epithelial cells are cell and niche specific. Further studies on the interactions between HSPGs and WNT ligands may yield clinically relevant molecular targets, as well as new biomarkers for characterization of breast cancer progression.
Resumo:
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellman Inversion assumption and provides another approach to building IBE systems. Our first system, BB1, is very versatile and well suited for practical applications: the basic hierarchical construction can be efficiently secured against chosen-ciphertext attacks, and further extended to support efficient non-interactive threshold decryption, among others, all without using random oracles. Both systems, BB1 and BB2, can be modified generically to provide “full” IBE security (i.e., against adaptive-identity attacks), either using random oracles, or in the standard model at the expense of a non-polynomial but easy-to-compensate security reduction.
Resumo:
This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the main design parameter. Finally, we catalogue the strengths and weaknesses of each construction according to a few theoretical and many applied comparison criteria.
Resumo:
Recently, a convex hull-based human identification protocol was proposed by Sobrado and Birget, whose steps can be performed by humans without additional aid. The main part of the protocol involves the user mentally forming a convex hull of secret icons in a set of graphical icons and then clicking randomly within this convex hull. While some rudimentary security issues of this protocol have been discussed, a comprehensive security analysis has been lacking. In this paper, we analyze the security of this convex hull-based protocol. In particular, we show two probabilistic attacks that reveal the user’s secret after the observation of only a handful of authentication sessions. These attacks can be efficiently implemented as their time and space complexities are considerably less than brute force attack. We show that while the first attack can be mitigated through appropriately chosen values of system parameters, the second attack succeeds with a non-negligible probability even with large system parameter values that cross the threshold of usability.