5 resultados para Consumer Security Concerns
em Boston University Digital Common
Resumo:
The issue of ancestors has been controversial since the first encounters of Christianity with Shona religion. It remains a major theological problem that needs to be addressed within the mainline churches of Zimbabwe today. Instead of ignoring or dismissing the ancestor cult, which deeply influences the socio-political, religious, and economic lives of the Shona, churches in Zimbabwe should initiate a Christology that is based on it. Such a Christology would engage the critical day-to-day issues that make the Shona turn to their ancestors. Among these concerns are daily protection from misfortune, maintaining good health and increasing longevity, successful rainy seasons and food security, and responsible governance characterized by economic and political stability. Since the mid-16th century arrival of Jesuit missionaries in the Mutapa Kingdom, the Church has realized that many African Christians resorted to their ancestors in times of crisis. Although both Catholic and Protestant missionaries from the 1700s through the early 1900s fiercely attacked Shona traditional beliefs as superstitious and equated ancestors with evil spirits, the cult did not die. Social institutions, such as schools and hospitals provided by missionaries, failed to eliminate ancestral beliefs. Even in the 21st century, many Zimbabweans consult their ancestors. The Shona message to the church remains "Not without My Ancestors." This dissertation examines the significance of the ancestors to the Shona, and how selected denominations and new religious movements have interpreted and accommodated ancestral practices. Taking the missiological goal of "self-theologizing" as the framework, this dissertation proposes a "tripartite Christology" of "Jesus the Family Ancestor", "Jesus the Tribal Ancestor," and "Jesus the National Ancestor," which is based on the Shona "tripartite ancestrology." Familiar ecclesiological and liturgical language, idioms, and symbols are used to contribute to the wider Shona understanding of Jesus as the ancestor par excellence, in whom physical and spiritual needs-including those the ordinary ancestors fail to meet-are fulfilled.
Resumo:
Supported housing for individuals with severe mental illness strives to provide the services necessary to place and keep individuals in independent housing that is integrated into the community and in which the consumer has choice and control over his or her services and supports. Supported housing can be contrasted to an earlier model called the “linear residential approach” in which individuals are moved from the most restrictive settings (e.g., inpatient settings) through a series of more independent settings (e.g., group homes, supervised apartments) and then finally to independent housing. This approach has been criticized as punishing the client due to frequent moves, and as being less likely to result in independent housing. In the supported housing model (Anthony & Blanch, 1988) consumers have choice and control over their living environment, their treatment, and supports (e.g., case management, mental health and substance abuse services). Supports are flexible and faded in and out depending on needs. Results of this systematic review of supported housing suggest that there are several well-controlled studies of supported housing and several studies conducted with less rigorous designs. Overall, our synthesis suggests that supported housing can improve the living situation of individuals who are psychiatrically disabled, homeless and with substance abuse problems. Results show that supported housing can help people stay in apartments or homes up to about 80% of the time over an extended period. These results are contrary to concerns expressed by proponents of the linear residential model and housing models that espoused more restrictive environments. Results also show that housing subsidies or vouchers are helpful in getting and keeping individuals housed. Housing services appear to be cost effective and to reduce the costs of other social and clinical services. In order to be most effective, intensive case management services (rather than traditional case management) are needed and will generally lead to better housing outcomes. Having access to affordable housing and having a service system that is well-integrated is also important. Providing a person with supported housing reduces the likelihood that they will be re-hospitalized, although supported housing does not always lead to reduced psychiatric symptoms. Supported housing can improve clients’ quality of life and satisfaction with their living situation. Providing supported housing options that are of decent quality is important in order to keep people housed and satisfied with their housing. In addition, rapid entry into housing, with the provision of choices is critical. Program and clinical supports may be able to mitigate the social isolation that has sometimes been associated with supported housing.
Resumo:
Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the physical location of the offending party, as opposed to its possibly spoofed (MAC addresses) identity in cyber space. Traditional Wireless Network Security Systems are still heavily anchored in the digital plane of "cyber space" and hence cannot be used reliably or effectively to derive the physical identity of an intruder in order to prevent further malicious wireless broadcasts, for example by escorting an intruder off the premises based on physical evidence. In this paper, we argue that Embedded Sensor Networks could be used effectively to bridge the gap between digital and physical security planes, and thus could be leveraged to provide reciprocal benefit to surveillance and security tasks on both planes. Toward that end, we present our recent experience integrating wireless networking security services into the SNBENCH (Sensor Network workBench). The SNBENCH provides an extensible framework that enables the rapid development and automated deployment of Sensor Network applications on a shared, embedded sensing and actuation infrastructure. The SNBENCH's extensible architecture allows an engineer to quickly integrate new sensing and response capabilities into the SNBENCH framework, while high-level languages and compilers allow novice SN programmers to compose SN service logic, unaware of the lower-level implementation details of tools on which their services rely. In this paper we convey the simplicity of the service composition through concrete examples that illustrate the power and potential of Wireless Security Services that span both the physical and digital plane.
Resumo:
The Java programming language has been widely described as secure by design. Nevertheless, a number of serious security vulnerabilities have been discovered in Java, particularly in the component known as the Bytecode Verifier. This paper describes a method for representing Java security constraints using the Alloy modeling language. It further describes a system for performing a security analysis on any block of Java bytecodes by converting the bytes into relation initializers in Alloy. Any counterexamples found by the Alloy analyzer correspond directly to insecure code. Analysis of a real-world malicious applet is given to demonstrate the efficacy of the approach.
Resumo:
The TCP/IP architecture was originally designed without taking security measures into consideration. Over the years, it has been subjected to many attacks, which has led to many patches to counter them. Our investigations into the fundamental principles of networking have shown that carefully following an abstract model of Interprocess Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, without the aid of cryptographic techniques, the bare-bones architecture of RINA can resist most of the security attacks faced by TCP/IP. We also show how hard it is for an intruder to compromise RINA. Then, we show how RINA inherently supports security policies in a more manageable, on-demand basis, in contrast to the rigid, piecemeal approach of TCP/IP.