143 resultados para Security Measures.
Resumo:
This study explores the associations between mothers' religiosity, and families' and children's functioning in a stratified random sample of 695 Catholic and Protestant motherchild dyads in socially deprived areas in Belfast, Northern Ireland, a region which has experienced centuries of sectarian conflict between Protestant Unionists and Catholics Nationalists. Findings based on mother and child surveys indicated that even in this context of historical political violence associated with religious affiliation, mothers' religiosity played a consistently positive role, including associations with multiple indicators of better family functioning (i.e., more cohesion and behavioral control and less conflict, psychological distress, and adjustment problems) and greater parentchild attachment security. Mothers' religiosity also moderated the association between parentchild attachment security and family resources and family stressors, enhancing positive effects of cohesion and mother behavioral control on motherchild attachment security, and providing protection against risks associated with mothers' psychological distress. Findings are discussed in terms of implications for understanding the role of religiosity in serving as a protective or risk factor for children and families.
Resumo:
We present the findings of 57 interviews conducted in 2007-2008 with Canadians who have cared for a dying family member to examine their ideal expectations of the Compassionate Care Benefit (CCB) - a social programme providing job security and income support for workers caring for a dying person. Our aims are to (1) appreciate how intended users and other family caregivers view the programme's very nature; (2) identify programme challenges and improvements that emerge from considering family caregivers' ideal expectations; and (3) contribute to a larger evaluative study designed to make policy-relevant recommendations for CCB improvement. Review of transcripts across three respondent groups reveals four categories of ideal expectations: (1) eligibility, (2) informational, (3) timing and (4) financial. Ideal expectations were typically derived from respondents' experiences of care-giving, their knowledge of the programme and, for some, of applying for and/or receiving the CCB. Findings reveal that there are gaps between respondents' ideal expectations and their experienced realities. Such gaps may lead to disappointment being experienced by those who believe they should be eligible for the programme but are not, or should be entitled to receive some form of support that is not presently available. This analysis plays an important role in identifying potential changes for the CCB that may better support family caregivers, in that the ideal expectations serve as a starting point for articulating desirable programme amendments. This analysis also has wider relevance. For jurisdictions looking to create new social programmes to support caregivers based upon labour policy strategies and legislation, this analysis identifies considerations that should be made at the outset of development. For jurisdictions that already have employment-based caregiver support programmes, this analysis demonstrates that programme challenges may not always be met through legislative changes alone but also through measures such as increasing awareness. © 2011 Blackwell Publishing Ltd.
Resumo:
This article argues that the terrorist bombings of hotels, pubs and nightclubs in Bali in October 2002, and in Mombasa one month later, were inaugural moments in the post-9/11 securitization of the tourism industry. Although practices of tourism and terrorism seem antithetical – one devoted to travel and leisure, the other to political violence – this article argues that their entanglement is revealed most clearly in the counter-terrorism responses that brought the everyday lives of tourists and tourism workers, as well as the material infrastructure of the tourism industry, within the orbit of a global security apparatus waging a ‘war on terror’. Drawing on critical work in international relations and geography, this article understands the securitization of tourism as part of a much wider logic in which the liberal order enacts pernicious modes of governance by producing a terrorist threat that is exceptional. It explores how this logic is reproduced through a cosmopolitan community symbolized by global travellers, and examines the measures taken by the tourism industry to secure this community (e.g. the physical transformations of hotel infrastructure and the provision of counter-terrorism training).
Resumo:
SALT threatened to institutionalize a bipolar world order. NWS and NNWS alike feared that the US and SU will prioritize global security principles such as systemic stability and conflict stability to Atlantic and European security. Endangered was Europe’s security and position in the future world order. Parity in strategic weapons invalidated the US nuclear umbrella. An ABM deployment and a non-transfer regime threatened Europe’s nuclear defence options. The danger of a Limited War or a denuclearization of Central Europe led to a European co-ordination on nuclear arms control to assure the preservation of the West and the future of Europe.
Resumo:
In conditional probabilistic logic programming, given a query, the two most common forms for answering the query are either a probability interval or a precise probability obtained by using the maximum entropy principle. The former can be noninformative (e.g.,interval [0; 1]) and the reliability of the latter is questionable when the priori knowledge isimprecise. To address this problem, in this paper, we propose some methods to quantitativelymeasure if a probability interval or a single probability is sufficient for answering a query. We first propose an approach to measuring the ignorance of a probabilistic logic program with respect to a query. The measure of ignorance (w.r.t. a query) reflects howreliable a precise probability for the query can be and a high value of ignorance suggests that a single probability is not suitable for the query. We then propose a method to measure the probability that the exact probability of a query falls in a given interval, e.g., a second order probability. We call it the degree of satisfaction. If the degree of satisfaction is highenough w.r.t. the query, then the given interval can be accepted as the answer to the query. We also prove our measures satisfy many properties and we use a case study to demonstrate the significance of the measures. © Springer Science+Business Media B.V. 2012
Resumo:
Emotion research has long been dominated by the “standard method” of displaying posed or acted static images of facial expressions of emotion. While this method has been useful it is unable to investigate the dynamic nature of emotion expression. Although continuous self-report traces have enabled the measurement of dynamic expressions of emotion, a consensus has not been reached on the correct statistical techniques that permit inferences to be made with such measures. We propose Generalized Additive Models and Generalized Additive Mixed Models as techniques that can account for the dynamic nature of such continuous measures. These models allow us to hold constant shared components of responses that are due to perceived emotion across time, while enabling inference concerning linear differences between groups. The mixed model GAMM approach is preferred as it can account for autocorrelation in time series data and allows emotion decoding participants to be modelled as random effects. To increase confidence in linear differences we assess the methods that address interactions between categorical variables and dynamic changes over time. In addition we provide comments on the use of Generalized Additive Models to assess the effect size of shared perceived emotion and discuss sample sizes. Finally we address additional uses, the inference of feature detection, continuous variable interactions, and measurement of ambiguity.
Resumo:
The scheduling problem in distributed data-intensive computing environments has become an active research topic due to the tremendous growth in grid and cloud computing environments. As an innovative distributed intelligent paradigm, swarm intelligence provides a novel approach to solving these potentially intractable problems. In this paper, we formulate the scheduling problem for work-flow applications with security constraints in distributed data-intensive computing environments and present a novel security constraint model. Several meta-heuristic adaptations to the particle swarm optimization algorithm are introduced to deal with the formulation of efficient schedules. A variable neighborhood particle swarm optimization algorithm is compared with a multi-start particle swarm optimization and multi-start genetic algorithm. Experimental results illustrate that population based meta-heuristics approaches usually provide a good balance between global exploration and local exploitation and their feasibility and effectiveness for scheduling work-flow applications. © 2010 Elsevier Inc. All rights reserved.
Resumo:
One of the core elements of successful planning is the individuals’ experience of their shared open spaces. This paper attributes to the relationship between safety and urban design by means of natural surveillance and security in the city’s shared spaces. It examines how political claims over space reassembled alternative definitions of security in one of Cairo’s oldest quarters, and how ambitious planning schemes were mostly driven by problems of insecurity, chaos and disorder. The main crux to this account is based on original documents, interviews and maps which reveals considerable insights and accounts of how this vision affected the quarter’s spatial quality and the user’s reactions to his new spatial formula. It also reveals conflicting conceptions of safety and security between the planning ambitions and the users experiences, which not only lacked reliable visions for securing the quarter, but also resulted further disruption to their everyday living spaces.
Resumo:
Mobile malware has been growing in scale and complexity spurred by the unabated uptake of smartphones worldwide. Android is fast becoming the most popular mobile platform resulting in sharp increase in malware targeting the platform. Additionally, Android malware is evolving rapidly to evade detection by traditional signature-based scanning. Despite current detection measures in place, timely discovery of new malware is still a critical issue. This calls for novel approaches to mitigate the growing threat of zero-day Android malware. Hence, the authors develop and analyse proactive machine-learning approaches based on Bayesian classification aimed at uncovering unknown Android malware via static analysis. The study, which is based on a large malware sample set of majority of the existing families, demonstrates detection capabilities with high accuracy. Empirical results and comparative analysis are presented offering useful insight towards development of effective static-analytic Bayesian classification-based solutions for detecting unknown Android malware.
Resumo:
The increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in the Smart Grid has exposed them to a wide range of cyber-security issues, and there are a multitude of potential access points for cyber attackers. This paper presents a SCADA-specific cyber-security test-bed which contains SCADA software and communication infrastructure. This test-bed is used to investigate an Address Resolution Protocol (ARP) spoofing based man-in-the-middle attack. Finally, the paper proposes a future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues in SCADA systems.
Resumo:
Greater complexity and interconnectivity across systems embracing Smart Grid technologies has meant that cyber-security issues have attracted significant attention. This paper describes pertinent cyber-security requirements, in particular cyber attacks and countermeasures which are critical for reliable Smart Grid operation. Relevant published literature is presented for critical aspects of Smart Grid cyber-security, such as vulnerability, interdependency, simulation, and standards. Furthermore, a preliminary study case is given which demonstrates the impact of a cyber attack which violates the integrity of data on the load management of real power system. Finally, the paper proposes future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues. This paper also provides an overview of Smart Grid cyber-security with reference to related cross-disciplinary research topics.
Resumo:
Synchrophasor systems will play a crucial role in next generation Smart Grid monitoring, protection and control. However these systems also introduce a multitude of potential vulnerabilities from malicious and inadvertent attacks, which may render erroneous operation or severe damage. This paper proposes a Synchrophasor Specific Intrusion Detection System (SSIDS) for malicious cyber attack and unintended misuse. The SSIDS comprises a heterogeneous whitelist and behavior-based approach to detect known attack types and unknown and so-called ‘zero-day’ vulnerabilities and attacks. The paper describes reconnaissance, Man-in-the-Middle (MITM) and Denial-of-Service (DoS) attack types executed against a practical synchrophasor system which are used to validate the real-time effectiveness of the proposed SSIDS cyber detection method.