2 resultados para Intensive and extensive margin
em Research Open Access Repository of the University of East London.
Resumo:
Background In recent years, an abstinence-focused, ‘recovery’ agenda has emerged in UK drug policy, largely in response to the perception that many opioid users had been ‘parked indefinitely’ on Opioid Substitution Therapy (OST). The introduction of ten pilot ‘Drug Recovery Wings’ (DRWs) in 2011 represents the application of this recovery agenda to prisons. This paper describes the DRWs’ operational models, the place of opiate dependent prisoners within them, and the challenges of delivering ‘recovery’ in prison. Methods In 2013, the implementation and operational models of all ten pilot DRWs were rapidly assessed. Up to three days were spent in each DRW, undertaking semi-structured interviews with a sample of 94 DRW staff and 102 DRW residents. Interviews were fully transcribed, and coded using grounded theory. Findings from the nine adult prisons are presented here. Results Four types of DRW were identified, distinguished by their size and selection criteria. Strikingly, no mid- or large-sized units regularly supported OST recipients through detoxification. Type A were large units whose residents were mostly on OST with long criminal records and few social or personal resources. Detoxification was rare, and medication reduction slow. Type B's mid-sized DRW was developed as a psychosocial support service for OST clients seeking detoxification. However, staff struggled to find such prisoners, and detoxification again proved rare. Type C DRWs focused on abstinence from all drugs, including OST. Though OST clients were not intentionally excluded, very few applied to these wings. Only Type D DRWs, offering intensive treatment on very small wings, regularly recruited OST recipients into abstinence-focused interventions. Conclusion Prison units wishing to support OST recipients in making greater progress towards abstinence may need to be small, intensive and take a stepped approach based on preparatory motivational work and extensive preparation for release. However, concerns about post-release deaths will remain.
Resumo:
More and more software projects today are security-related in one way or the other. Requirements engineers often fail to recognise indicators for security problems which is a major source of security problems in practice. Identifying security-relevant requirements is labour-intensive and errorprone. In order to facilitate the security requirements elicitation process, we present an approach supporting organisational learning on security requirements by establishing company-wide experience resources, and a socio-technical network to benefit from them. The approach is based on modelling the flow of requirements and related experiences. Based on those models, we enable people to exchange experiences about security-requirements while they write and discuss project requirements. At the same time, the approach enables participating stakeholders to learn while they write requirements. This can increase security awareness and facilitate learning on both individual and organisational levels. As a basis for our approach, we introduce heuristic assistant tools which support reuse of existing security-related experiences. In particular, they include Bayesian classifiers which issue a warning automatically when new requirements seem to be security-relevant. Our results indicate that this is feasible, in particular if the classifier is trained with domain specific data and documents from previous projects. We show how the ability to identify security-relevant requirements can be improved using this approach. We illustrate our approach by providing a step-by-step example of how we improved the security requirements engineering process at the European Telecommunications Standards Institute (ETSI) and report on experiences made in this application.