36 resultados para Frameworks
Resumo:
The thesis is situated in the domain of contemporary metaphysics of science. The question is which ontology fits best with our knowledge of the world. The method chosen is the one of evaluating the consequences of different ontological frameworks against the background of our scientific knowledge of the world. The thesis analyses the two main frameworks in today's metaphysics of science, Humeanism and dispositionalism. It advocates that only an unorthodox version of Humeanism and only an unorthodox version of dispositionalism can be defended, the unorthodox character of these versions consisting in taking the fundamental properties to be relations rather than intrinsic properties. The thesis then sets out in detail what such an unorthodox version of Humeanism amounts to. Chapters 1 and 2 introduce the standard versions of Humeanism and dispositionalism, focussing on the accounts of laws of nature and causation. Chapter 3 compares both these positions and concludes that as far as the orthodox versions are concerned, dispositionalism fares better than Humeanism, since it can avoid Humeanism's commitments to quidditism and humility. However, as is argued in chapter 4, instead of replying to the objections from quidditism and humility by switching to dispositionalism, there is an unorthodox version of Humeanism available that does not run into these problematic consequences and that is supported by science: if one takes the fundamental physical properties to be relations instead of intrinsic properties, the objection from quidditism is avoided, since there is no hidden intrinsic essence of relations. As regards the objection from humility, one can maintain that science is in principle able to provide knowledge of the fundamental relations that there are in the world so that there is no principled ignorance. Consequently, the thesis concludes that Humeanism and dispositionalism are on a par as regards the remaining charge of humility. Unorthodox Humeanism provides a competitive and adequate ontology in the light of contemporary science.
Resumo:
Discussions at the inaugural meeting of a Trans-European Pedagogic Research Group for Anatomical Sciences highlighted the fact that there exist considerable variations in the legal and ethical frameworks throughout Europe concerning body bequests for anatomical examination. Such differences appear to reflect cultural and religious variations as well as different legal and constitutional frameworks. For example, there are different views concerning the "ownership" of cadavers and concerning the need (perceived by different societies and national politicians) for legislation specifically related to anatomical dissection. Furthermore, there are different views concerning the acceptability of using unclaimed bodies that have not given informed consent. Given that in Europe there have been a series of controversial anatomical exhibitions and also a public (televised) dissection/autopsy, and given that the commercial sale or transport of anatomical material across national boundaries is strongly debated, it would seem appropriate to "harmonise" the situation (at least in the European Union). This paper summarises the legal situation in a variety of European countries and suggests examples of good practice. In particular, it recommends that all countries should adopt clear legal frameworks to regulate the acceptance of donations for medical education and research. It stresses the need for informed consent, with donors being given clear information upon which to base their decision, intentions to bequest being made by the donor before death and encourages donors to discuss their wishes to bequeath with relatives prior to death. Departments are encouraged, where they feel it appropriate, to hold Services of Thanksgiving and Commemoration for those who have donated their bodies. Finally, there needs to be legislation to regulate transport of bodies or body parts across national borders and a discouragement of any moves towards commercialisation in relation to bequests.
Resumo:
Recommendations and laws do not always contain specific and clear provisions on the use of cadaveric material in research, and even more rarely do they address explicitly the ethical issues related to research on material obtained during forensic autopsy. In this article we analyse existing legal frameworks in Europe by comparing the legal provisions in 2 European Countries which are member states of the Council of Europe, the UK and Switzerland. They were chosen because they have distinct legal frameworks that make comparisons interesting. In addition, the detailed laws of the UK and a specific law project and national ethical recommendations in Switzerland permit us to define more clearly the legal range of options for researchers using cadaveric material obtained during forensic investigations. The Human Tissue Act 2004 in England, Wales and Northern Ireland, its Scottish equivalent with the same title (2006) and the national ethical guidelines in Switzerland all require consent from the deceased person, an appropriate relative or a person with power of attorney for healthcare decisions before cadaveric biological material can be obtained and used for research. However, if the purpose of the autopsy is purely forensic, no such authorization will be sought to carry out the autopsy and related analyses, which might include genetic testing. In order to be allowed to carry out future research projects, families need to be approached for informed consent, unless the deceased person had left written directives including permission to use his or her tissues for research.
Resumo:
The ASTM standards on Writing Ink Identification (ASTM 1789-04) and on Writing Ink Comparison (ASTM 1422-05) are the most up-to-date guidelines that have been published on the forensic analysis of ink. The aim of these documents is to cover most aspects of the forensic analysis of ink evidence, from the analysis of ink samples, the comparison of the analytical profile of these samples (with the aim to differentiate them or not), through to the interpretation of the result of the examination of these samples in a forensic context. Significant evolutions in the technology available to forensic scientists, in the quality assurance requirements brought onto them, and in the understanding of frameworks to interpret forensic evidence have been made in recent years. This article reviews the two standards in the light of these evolutions and proposes some practical improvements in terms of the standardization of the analyses, the comparison of ink samples, and the interpretation of ink examination. Some of these suggestions have already been included in a DHS funded project aimed at creating a digital ink library for the United States Secret Service.
Resumo:
It has been proved, for several classes of continuous and discrete dynamical systems, that the presence of a positive (resp. negative) circuit in the interaction graph of a system is a necessary condition for the presence of multiple stable states (resp. a cyclic attractor). A positive (resp. negative) circuit is said to be functional when it "generates" several stable states (resp. a cyclic attractor). However, there are no definite mathematical frameworks translating the underlying meaning of "generates." Focusing on Boolean networks, we recall and propose some definitions concerning the notion of functionality along with associated mathematical results.
Resumo:
OBJECTIVE: We aim to explore how health surrogates of patients with dementia proceed in decision making, which considerations are decisive, and whether family surrogates and professional guardians decide differently. METHODS: We conducted an experimental vignette study using think aloud protocol analysis. Thirty-two family surrogates and professional guardians were asked to decide on two hypothetical case vignettes, concerning a feeding tube placement and a cardiac pacemaker implantation in patients with end-stage dementia. They had to verbalize their thoughts while deciding. Verbalizations were audio-recorded, transcribed, and analyzed according to content analysis. By experimentally changing variables in the vignettes, the impact of these variables on the outcome of decision making was calculated. RESULTS: Although only 25% and 31% of the relatives gave their consent to the feeding tube and pacemaker placement, respectively, 56% and 81% of the professional guardians consented to these life-sustaining measures. Relatives decided intuitively, referred to their own preferences, and focused on the patient's age, state of wellbeing, and suffering. Professional guardians showed a deliberative approach, relied on medical and legal authorities, and emphasized patient autonomy. Situational variables such as the patient's current behavior and the views of health care professionals and family members had higher impacts on decisions than the patient's prior statements or life attitudes. CONCLUSIONS: Both the process and outcome of surrogate decision making depend heavily on whether the surrogate is a relative or not. These findings have implications for the physician-surrogate relationship and legal frameworks regarding surrogacy. Copyright © 2011 John Wiley & Sons, Ltd.
Resumo:
BACKGROUND: Qualitative frameworks, especially those based on the logical discrete formalism, are increasingly used to model regulatory and signalling networks. A major advantage of these frameworks is that they do not require precise quantitative data, and that they are well-suited for studies of large networks. While numerous groups have developed specific computational tools that provide original methods to analyse qualitative models, a standard format to exchange qualitative models has been missing. RESULTS: We present the Systems Biology Markup Language (SBML) Qualitative Models Package ("qual"), an extension of the SBML Level 3 standard designed for computer representation of qualitative models of biological networks. We demonstrate the interoperability of models via SBML qual through the analysis of a specific signalling network by three independent software tools. Furthermore, the collective effort to define the SBML qual format paved the way for the development of LogicalModel, an open-source model library, which will facilitate the adoption of the format as well as the collaborative development of algorithms to analyse qualitative models. CONCLUSIONS: SBML qual allows the exchange of qualitative models among a number of complementary software tools. SBML qual has the potential to promote collaborative work on the development of novel computational approaches, as well as on the specification and the analysis of comprehensive qualitative models of regulatory and signalling networks.
Resumo:
Exchange matrices represent spatial weights as symmetric probability distributions on pairs of regions, whose margins yield regional weights, generally well-specified and known in most contexts. This contribution proposes a mechanism for constructing exchange matrices, derived from quite general symmetric proximity matrices, in such a way that the margin of the exchange matrix coincides with the regional weights. Exchange matrices generate in turn diffusive squared Euclidean dissimilarities, measuring spatial remoteness between pairs of regions. Unweighted and weighted spatial frameworks are reviewed and compared, regarding in particular their impact on permutation and normal tests of spatial autocorrelation. Applications include tests of spatial autocorrelation with diagonal weights, factorial visualization of the network of regions, multivariate generalizations of Moran's I, as well as "landscape clustering", aimed at creating regional aggregates both spatially contiguous and endowed with similar features.
Resumo:
This research project conducted in the Psychology Department of the University of Lausanne (Switzerland) evaluated the therapeutic alliance with Hispanic American Patients. From the patient's perspective, the therapeutic alliance was explored in two types of frameworks: the dyadic and the triadic setting. The dyadic setting is the encounter between a therapist (health professional) and a patient who ideally share the same language. The triadic setting is the encounter of a therapist and a patient who speak different languages, but are able to interact using the help of an interpreter. My specific interest focuses on studying the therapeutic alliance in a cross- cultural setting through a mixed methodology. As part of the quantitative phase, non- parametric tests were used to analyze 55 questionnaires of the Therapeutic Alliance for Migrants - Health Professionals' version (QALM-PS). For the qualitative phase, a thematic analysis was used to analyze 20 transcript interviews. While no differences were found concerning the strength of the therapeutic alliance between the triadic and dyadic settings, results showed that the factors that enrich the therapeutic alliance with migrant patients depend more on an emotional alliance (bond) than on a rational alliance (agreements). Indeed, the positive relationship with the interpreter, and especially with the therapist, relies considerably on human qualities and moral values, bringing the conception of humanity as an important need when meeting foreign patients in health care settings. In addition, the quality of communication, which could be attributed to the type of interpreter in the triadic setting, plays an important role in the establishment of a positive therapeutic relationship. Ce projet de recherche mené au Département de psychologie de l'Université de Lausanne (Suisse) a évalué l'alliance thérapeutique avec les patients hispano-américains. Du point de vue du patient, l'alliance thérapeutique a été étudiée dans deux types de dispositifs: le cadre dyadique et triadique. Le cadre dyadique est la rencontre d'un thérapeute (professionnel de la santé) et d'un patient qui, idéalement, partagent la même langue. Le cadre triadique est la rencontre d'un thérapeute et d'un patient qui parlent différentes langues, mais sont capables d'interagir grâce à l'aide d'un interprète. Mon intérêt porte en particulier sur l'étude de l'alliance thérapeutique dans un cadre interculturel au travers d'une méthodologie mixte. Dans la phase quantitative, des tests non paramétriques ont été utilisés pour les analyses des 55 questionnaires de l'alliance thérapeutique pour les migrants, version - professionnels de la santé (QALM-PS). Pour la phase qualitative, une analyse thématique a été utilisée pour l'analyse des 20 entretiens transcrits. Bien qu'aucune différence n'a été constatée en ce qui concerne la force de l'alliance thérapeutique entre les cadres dyadiques et triadiques, les résultats montrent que les facteurs qui enrichissent l'alliance thérapeutique avec les patients migrants dépendent plus de l'alliance émotionnelle (lien) que sur une alliance rationnelle (accords). En effet, la relation positive avec l'interprète, et en particulier avec le thérapeute, repose en grande partie sur des qualités humaines et des valeurs morales, ce qui porte la conception de l'humanité comme un besoin important lors de la rencontre des patients étrangers dans un cadre de santé. En outre, la qualité de la communication, qui pourrait être attribuée au type d'interprète dans le cadre triadique, joue un rôle important dans l'établissement d'une relation thérapeutique positive.
Resumo:
The opportunity to reflect broadly on the accomplishments, prospects, and reach of a field may present itself relatively infrequently. Each biennial meeting of the International Biogeography Society showcases ideas solicited and developed largely during the preceding year, by individuals or teams from across the breadth of the discipline. Here, we highlight challenges, developments, and opportunities in biogeography that were summarized at or emerge from that biennial synthesis. We note the realized and potential impact of rapid data accumulation in several fields, a Renaissance for inter-disciplinary research, the importance of recognizing the evolution-ecology continuum across spatial and temporal scales and at different taxonomic, phylogenetic and functional levels, and re-exploration of classical assumptions and hypotheses using new tools. However, advances are taxonomically and geographically biased, key theoretical frameworks await development of tools for handling, or strategies for simplifying, the biological complexity seen in empirical systems. Current threats to biodiversity require unprecedented integration of knowledge and development of predictive capacity which may enable biogeography to unite its descriptive and hypothetico-deductive arms and establish a greater role within and outside academia
Resumo:
PURPOSE OF REVIEW: This update reviews the concepts underlying ethical issues in various contexts and countries, highlighting the evolution in the use of the core values underpinning the field and practice of bioethics as applied to healthcare. RECENT FINDINGS: It stresses the specific position of the adolescent as being a unique individual searching for autonomy and, most of the time, being competent to make decisions regarding the adolescent's own health. It briefly outlines the principles of a 'deliberative' approach in which the practitioner, while keeping in mind the legal context of the country where the practitioner is working, assesses to what extent the adolescent can be considered as competent, and then discusses with the adolescent the medical and psychosocial aspects of the various actions to be taken in a situation, as well as the basic ethical values linked with each of the various options available. The deliberation can involve relevant stakeholders, provided the issues concerning confidentiality have been fully discussed with the adolescent. SUMMARY: This process forces the practitioner, the adolescent patient and those who care for the adolescent patient to look outside their usual frameworks and make a decision that is in the best interest of the young person, and is informed by various ethical values.
Resumo:
ABSTRACT: BACKGROUND: Shared decision-making is not widely implemented in healthcare. We aimed to set a research agenda about promoting shared decision-making through continuing professional development. METHODS: Thirty-six participants met for two days. RESULTS: Participants suggested ways to improve an environmental scan that had inventoried 53 shared decision-making training programs from 14 countries. Their proposed research agenda included reaching an international consensus on shared decision-making competencies and creating a framework for accrediting continuing professional development initiatives in shared decision-making. CONCLUSIONS: Variability in shared decision-making training programs showcases the need for quality assurance frameworks.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
At the beginning of the 1990s, the concept of "European integration" could still be said to be fairly unambiguous. Nowadays, it has become plural and complex almost to the point of unintelligibility. This is due, of course, to the internal differentiation of EU membership, with several Member States pulling out of key integrative projects such as establishing an area without frontiers, the "Schengen" area, and a common currency. But this is also due to the differentiated extension of key integrative projects to European non-EU countries - Schengen is again a case in point. Such processes of "integration without membership", the focus of the present publication, are acquiring an ever-growing topicality both in the political arena and in academia. International relations between the EU and its neighbouring countries are crucial for both, and their development through new agreements features prominently on the continent's political agenda. Over and above this aspect, the dissemination of EU values and standards beyond the Union's borders raises a whole host of theoretical and methodological questions, unsettling in some cases traditional conceptions of the autonomy and separation of national legal orders. This publication brings together the papers presented at the Integration without EU Membership workshop held in May 2008 at the EUI (Max Weber Programme and Department of Law). It aims to compare different models and experiences of integration between the EU, on the one hand, and those European countries that do not currently have an accession perspective on the other hand. In delimiting the geographical scope of the inquiry, so as to scale it down to manageable proportions, the guiding principles have been to include both the "Eastern" and "Western" neighbours of the EU, and to examine both structured frameworks of cooperation, such as the European Neighbourhood Policy and the European Economic Area, and bilateral relations developing on a more ad hoc basis. These principles are reflected in the arrangement of the papers, which consider in turn the positions of Ukraine, Russia, Norway, and Switzerland in European integration - current standing, perspectives for evolution, consequences in terms of the EU-ization of their respective legal orders1. These subjects are examined from several perspectives. We had the privilege of receiving contributions from leading practitioners and scholars from the countries concerned, from EU highranking officials, from prominent specialists in EU external relations law, and from young and talented researchers. We wish to thank them all here for their invaluable insights. We are moreover deeply indebted to Marise Cremona (EUI, Law Department, EUI) for her inspiring advice and encouragement, as well as to Ramon Marimon, Karin Tilmans, Lotte Holm, Alyson Price and Susan Garvin (Max Weber Programme, EUI) for their unflinching support throughout this project. A word is perhaps needed on the propriety and usefulness of the research concept embodied in this publication. Does it make sense to compare the integration models and experiences of countries as different as Norway, Russia, Switzerland, and Ukraine? Needless to say, this list of four evokes a staggering diversity of political, social, cultural, and economic conditions, and at least as great a diversity of approaches to European integration. Still, we would argue that such diversity only makes comparisons more meaningful. Indeed, while the particularities and idiosyncratic elements of each "model" of integration are fully displayed in the present volume, common themes and preoccupations run through the pages of every contribution: the difficulty in conceptualizing the finalité and essence of integration, which is evident in the EU today but which is greatly amplified for non-EU countries; the asymmetries and tradeoffs between integration and autonomy that are inherent in any attempt to participate in European integration from outside; the alteration of deeply seated legal concepts, and concepts about the law, that are already observable in the most integrated of the non-EU countries concerned. These issues are not transient or coincidental: they are inextricably bound up with the integration of non-EU countries in the EU project. By publishing this collection, we make no claim to have dealt with them in an exhaustive, still less in a definitive manner. Our ambition is more modest: to highlight the relevance of these themes, to place them more firmly on the scientific agenda, and to provide a stimulating basis for future research and reflection.