3 resultados para VULNERABILITIES

em Research Open Access Repository of the University of East London.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

To what extent is the therapist-client relationship damaged following client perpetuated violence and what steps can we take to diminish its impact? Much of the information we have on client violence comes from multiple mental health disciplines in the US and the UK over the last 20-30 years and has formed a useful, though sometimes dated and sporadic, quantitative baseline to delineate a range of issues. However, there is limited systematic research on how practitioner psychologists process the violence in the course of their everyday practice and how this impacts the therapist-client dynamic. Using Interpretative Phenomenological Analysis (IPA), we explored seven therapists’ experiences of client violence across a range of work sites – acute psychiatric hospital wards, forensic hospital wards and community mental health teams. Three main themes were documented: processing the moment-to-moment experience of client violence; professional vulnerabilities and needs as a result of client violence; and the ruptured therapeutic relationship. Strategies for supporting practicing psychologists and providing continuing professional care for clients include challenging self-doubt and re-energizing professional competencies as well as repairing ourselves and repairing the therapeutic relationship. Recommendations for credentialing and regulatory bodies in relation to client violence are also highlighted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The discipline of counselling psychology continues to grow and change in response to social, economic and political pressures. It has been argued that its quest for a coherent and distinct identity, which emphasises the possibility of the coexistence of multiple approaches, creates an inherently uncertain and dilemmatic training environment that may hinder the development of trainees’ professional identities. In order to gain a deeper understanding of the issue at hand, the aim was to explore how final year trainees and newly qualified counselling psychologists constructed and made sense of their emerging professional identities and what experiences, past and present, they drew upon in the context of their training to shape those identities. Applying narrative inquiry to analyse eight open-ended interviews, eight preliminary themes were originally identified in participants’ narratives, which with further refinements lead to stories of struggle and marginalisation, growth and discovery, and power and resilience. Participants’ stories of struggle and marginalisation emerged in reference to early family dynamics and stressful life experiences, which seemed to also foster a strong identification with the counselling psychology profession, while stories of growth and discovery focused on the importance of having supportive figures, who helped to instill a sense of security and create an atmosphere of openness. It was in this learning environment that participants felt it was possible to develop a more resilient, empowered professional self, which allowed them to shed an earlier sense of struggle and vulnerability. However, where more of an emphasis was placed on power and resilience, there seemed to be less room for participants to express other feelings that came into conflict with their preferred sense of professional self. While there seems to be a need for a ‘safer’ climate, in which trainees could voice and acknowledge anxieties, vulnerabilities and limitations, addressing concerns around power and vulnerability that may be contributing to the silencing of particular voices and identities may be equally important if trainees are to develop coherent and distinct counselling psychologist identities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Reverse engineering is usually the stepping stone of a variety of at-tacks aiming at identifying sensitive information (keys, credentials, data, algo-rithms) or vulnerabilities and flaws for broader exploitation. Software applica-tions are usually deployed as identical binary code installed on millions of com-puters, enabling an adversary to develop a generic reverse-engineering strategy that, if working on one code instance, could be applied to crack all the other in-stances. A solution to mitigate this problem is represented by Software Diversity, which aims at creating several structurally different (but functionally equivalent) binary code versions out of the same source code, so that even if a successful attack can be elaborated for one version, it should not work on a diversified ver-sion. In this paper, we address the problem of maximizing software diversity from a search-based optimization point of view. The program to protect is subject to a catalogue of transformations to generate many candidate versions. The problem of selecting the subset of most diversified versions to be deployed is formulated as an optimisation problem, that we tackle with different search heuristics. We show the applicability of this approach on some popular Android apps.