214 resultados para emotional security
Resumo:
The production of reports and the distribution of information have become integral to the operation of many non-governmental organizations. In this regard, the fact that the all-women organization of Checkpoint Watch publishes reports about the Israeli checkpoints in the occupied West Bank seems to comply with current trends. However, the reports—most of which are short repetitive descriptions of the banality and everydayness of the military checkpoints, counting the number of people and cars waiting, commenting on the manner in which the checks are performed and meticulously documenting what mostly amounts to minor incidents of humiliation and distress—do not seem to abide by any convention of reporting. This work analyzes the reporting praxis of the organization and claims that it should be understood as a form of activism in and of itself. Tracking the ways in which the reports address the Israeli public through the concept of parrhesia, the work suggests that this form of reporting enables the women activists to use their gendered marginality to make their way into the highly masculinized and militarized Israeli security discourse.
Resumo:
Background: Temper outbursts are common in Prader-Willi syndrome but rarely described in detail. This study investigated the phenomenology of temper outbursts in terms of antecedents, sequence of behaviours and emotions and intervention strategies used.
Method: A semi-structured interview about temper outbursts was conducted with the main carers of seven children (9.5 to 16.7 years) and seven adults (24.7 to 47.10 years) with Prader-Willi syndrome (10 male, 4 female). Reliability and validity of the interview results was established.
Results: Various setting events increased and reduced the likelihood of temper outbursts. The most common antecedent was a change to routine or expectation. There were marked similarities in the sequence of behaviours and emotions during temper outbursts, with anger rising quickly followed by expressions of remorse and distress at the end of an outburst.
Discussion: The sequence of behaviours and emotions within outbursts was similar to that described in temper tantrums in typical development. Cognitive and emotional processes are likely to be important in the understanding of temper outbursts with implications for early intervention.
Resumo:
Background: Emotional responding is sensitive to social context; however, little emphasis has been placed on the mechanisms by which social context effects changes in emotional responding.
Objective: We aimed to investigate the effects of social context on neural responses to emotional stimuli to inform on the mechanisms underpinning context-linked changes in emotional responding.
Design: We measured event-related potential (ERP) components known to index specific emotion processes and self-reports of explicit emotion regulation strategies and emotional arousal. Female Chinese university students observed positive, negative, and neutral photographs, whilst alone or accompanied by a culturally similar (Chinese) or dissimilar researcher (British).
Results: There was a reduction in the positive versus neutral differential N1 amplitude (indexing attentional capture by positive stimuli) in the dissimilar relative to alone context. In this context, there was also a corresponding increase in amplitude of a frontal late positive potential (LPP) component (indexing engagement of cognitive control resources). In the similar relative to alone context, these effects on differential N1 and frontal LPP amplitudes were less pronounced, but there was an additional decrease in the amplitude of a parietal LPP component (indexing motivational relevance) in response to positive stimuli. In response to negative stimuli, the differential N1 component was increased in the similar relative to dissimilar and alone (trend) context.
Conclusion: These data suggest that neural processes engaged in response to emotional stimuli are modulated by social context. Possible mechanisms for the social-context-linked changes in attentional capture by emotional stimuli include a context-directed modulation of the focus of attention, or an altered interpretation of the emotional stimuli based on additional information proportioned by the context.
Resumo:
The research examined the socio-emotional impact of sight loss on a sample of 18 blind and partially sighted adults from the East coast of Scotland (average age 64). The impact of sight loss in four core areas mood, self concept, social connectedness and loss was explored. Data was collected using the mental health and social functioning sub-scales of the National Eye Institute Visual Functioning Questionnaire-25 and semi-structured interviews. Data indicated that participants experienced reduced mental health and decreased social functioning as a result of sight loss. Data also showed that participants shared common socio-emotional issues during transition from sight to blindness, starting with diagnosis, coping with deterioration of sight, experiencing loss, experiencing changed perceptions of self in relation to society, experiencing others in a changed way and experiencing rehabilitation. A theoretical model describing the socio-emotional transition from sight to blindness is proposed. Implications for practice are explored.
Resumo:
African coastal regions are expected to experience the highest rates of population growth in coming decades. Fresh groundwater resources in the coastal zone of East Africa (EA) are highly vulnerable to seawater intrusion. Increasing water demand is leading to unsustainable and ill-planned well drilling and abstraction. Wells supplying domestic, industrial and agricultural needs are or have become, in many areas, too saline for use. Climate change, including weather changes and sea level rise, is expected to exacerbate this problem. The multiplicity of physical, demographic and socio-economic driving factors makes this a very challenging issue for management. At present the state and probable evolution of coastal aquifers in EA are not well documented. The UPGro project 'Towards groundwater security in coastal East Africa' brings together teams from Kenya, Tanzania, Comoros Islands and Europe to address this knowledge gap. An integrative multidisciplinary approach, combining the expertise of hydrogeologists, hydrologists and social scientists, is investigating selected sites along the coastal zone in each country. Hydrogeologic observatories have been established in different geologic and climatic settings representative of the coastal EA region, where focussed research will identify the current status of groundwater and identify future threats based on projected demographic and climate change scenarios. Researchers are also engaging with end users as well as local community and stakeholder groups in each area in order to understanding the issues most affecting the communities and searching sustainable strategies for addressing these.
Resumo:
The current study sought to elaborate and test a theoretical proposition that introjective personality functioning, which has been implicated in various psychological difficulties (e.g., self-critical depression, obsessive-compulsive disorder), has an emotional foundation in the self-conscious emotion of shame and is supported by dissociation. Moreover, introjective functioning was predicted to be associated with reduced interpersonal intimacy. To test the model, a Web-based survey design using path analysis was used. Three hundred and fifteen university students were assessed with measures of self-conscious emotions (i.e., shame, guilt, and embarrassment), introjective (self-definition) and anaclitic (relational) personality style, pathological dissociation, and interpersonal intimacy. Introjective personality was found to be associated with increased shame and reduced interpersonal intimacy. However, the path between pathological dissociation and introjective functioning was not significant. The results are discussed with reference to the moderating influence of introjective functioning between shame and reduced interpersonal intimacy.
Resumo:
In this paper, the impact of multiple active eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destination selection, in which, after the selection of the relay with the minimum effective maximum signal-to-noise ratio (SNR) to a cluster of eavesdroppers, the destination that has the maximum SNR from the chosen relay is selected. In order to accurately assess the secrecy performance, the exact and asymptotic expressions are obtained in closed-form for several security metrics including the secrecy outage probability, the probability of non-zero secrecy rate, and the ergodic secrecy rate in frequency selective fading. Based on the asymptotic analysis, key design parameters such as secrecy diversity gain, secrecy array gain, secrecy multiplexing gain, and power cost are characterized, from which new insights are drawn. Moreover, it is concluded that secrecy performance limits occur when the average received power at the eavesdropper is proportional to the counterpart at the destination. Specifically, for the secrecy outage probability, it is confirmed that the secrecy diversity gain collapses to zero with outage floor, whereas for the ergodic secrecy rate, it is confirmed confirm that its slope collapses to zero with capacity ceiling.
Resumo:
Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its security concerns while at the same time they are attracted by its benefits. This article highlights SaaS utility and applicability in different environments like cloud computing, mobile cloud computing, software defined networking and Internet of things. It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security. A detailed review of the existing mainstream solutions to tackle the respective security issues mapping into different SaaS security challenges is presented. Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.