336 resultados para emotional security
Resumo:
The experience of emotional expression in the context of social relations is not well understood for people diagnosed with schizophrenia. Early phenomenological research on the experience of people diagnosed with schizophrenia traditionally focussed on self experience in isolation from others, with later research explicating isolated aspects of self experience in relation to others. The current research aimed to focus on the progressive experience of emotional expression of people diagnosed with schizophrenia in relation to others over 12 months, in order to gain a broad spectrum of experience. This study involved unstructured interviews with 7 participants, an average of 4 times each, over a period of 12 months. Due to the unstructured nature of the interviews, a great breadth of experience was explicated. From the interviews there emerged 6 themes grouped together as a transition into, and 5 themes grouped together as a recovery from, symptoms associated with a diagnosis of schizophrenia. Special significance was given to the theme of relational confusion as an experience that provides an understanding of the relationship between social stressors and personal characteristics with responses that are associated with a diagnosis of schizophrenia. It was suggested that participants experienced themselves, including their distancing and isolating responses, as a part of a social system. The breadth of experiences that emerged afforded a framework of experiences within which prior phenomenological research findings on static moments of experience have been located. A more meaningful understanding of the transitioning into and recovery from the experiences associated with a diagnosis of schizophrenia will afford advances in mental health practice.
Resumo:
This paper describes the gaps in monitoring and surveillance identified while conducting Community Food Security assessments in three geographical areas located in south-east Queensland, Australia
Resumo:
A self-report measure of the emotional and behavioural reactions to intrusive thoughts was developed. The paper presents data that confirm the stability, reliability and validity of the new 7-item measure. Emotional and behavioural reactions to intrusions emerged as separate factors on the Emotional and Behavioural Reactions to Intrusions Questionnaire (EBRIQ), a finding confirmed by an independent stress study. Test retest reliability over 30-70 days was good. Expected relationships with other constructs were significant. Stronger negative responses to intrusions were associated with lower mindfulness scores and higher ratings of experiential avoidance, thought suppression and intensity and frequency of craving. The EBRIQ will help explore differences in reactions to intrusive thoughts in clinical and non clinical populations, and across different emotional and behavioural states. It will also be useful in assessing the effects of therapeutic approaches such as mindfulness.
Resumo:
The implementation of a robotic security solution generally requires one algorithm to route the robot around the environment and another algorithm to perform anomaly detection. Solutions to the routing problem require the robot to have a good estimate of its own pose. We present a novel security system that uses metrics generated by the localisation algorithm to perform adaptive anomaly detection. The localisation algorithm is a vision-based SLAM solution called RatSLAM, based on mechanisms within the hippocampus. The anomaly detection algorithm is based on the mechanisms used by the immune system to identify threats to the body. The system is explored using data gathered within an unmodified office environment. It is shown that the algorithm successfully reacts to the presence of people and objects in areas where they are not usually present and is tolerised against the presence of people in environments that are usually dynamic.
Resumo:
Non-driving related cognitive load and variations of emotional state may impact a driver’s capability to control a vehicle and introduces driving errors. Availability of reliable cognitive load and emotion detection in drivers would benefit the design of active safety systems and other intelligent in-vehicle interfaces. In this study, speech produced by 68 subjects while driving in urban areas is analyzed. A particular focus is on speech production differences in two secondary cognitive tasks, interactions with a co-driver and calls to automated spoken dialog systems (SDS), and two emotional states during the SDS interactions - neutral/negative. A number of speech parameters are found to vary across the cognitive/emotion classes. Suitability of selected cepstral- and production-based features for automatic cognitive task/emotion classification is investigated. A fusion of GMM/SVM classifiers yields an accuracy of 94.3% in cognitive task and 81.3% in emotion classification.
Resumo:
Unified Enterprise application security is a new emerging approach for providing protection against application level attacks. Conventional application security approach that consists of embedding security into each critical application leads towards scattered security mechanism that is not only difficult to manage but also creates security loopholes. According to the CSIIFBI computer crime survey report, almost 80% of the security breaches come from authorized users. In this paper, we have worked on the concept of unified security model, which manages all security aspect from a single security window. The basic idea is to keep business functionality separate from security components of the application. Our main focus was on the designing of frame work for unified layer which supports single point of policy control, centralize logging mechanism, granular, context aware access control, and independent from any underlying authentication technology and authorization policy.
Resumo:
Indigenous men’s support groups are designed to empower men to take greater control and responsibility for their health and wellbeing. They provide health education sessions, counselling, men’s health clinics, diversionary programs for men facing criminal charges, cultural activities, drug- and alcohol-free social events, and advocacy for resources. Despite there being ~100 such groups across Australia, there is a dearth of literature on their strategies and outcomes. This paper is based on participatory action research involving two north Queensland groups which were the subject of a series of five ‘phased’ evaluative reports between 2002 and 2007. By applying ‘meta-ethnography’ to the five studies, we identified four themes which provide new interpretations of the data. Self-reported benefits included improved social and emotional wellbeing, modest lifestyle modifications and willingness to change current notions of ‘gendered’ roles within the home, such as sharing housework. Our qualitative research to date suggests that through promoting empowerment, wellbeing and social cohesion for men and their families, men’s support groups may be saving costs through reduced expenditure on health care, welfare, and criminal justice costs, and higher earnings. Future research needs to demonstrate this empirically.
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.