20 resultados para high value-added compounds
em Université de Lausanne, Switzerland
Resumo:
Since the mid 90's, international actors as well as governmental actors have raised their interest into the development of irrigation's potential that is still largely unexploited in Niger. It seems all the more interesting as it could answer the needs of a fast growing population (3.3% per year). However, if everyone agrees on the need to development this system, the current implementation triggers questions on the process itself and its side effects. National and international policies on this matter were build upon an historical process through colonial, post-colonial and then the late 1980's neoliberal structures, leading to a business model that reveals a discrepancy between the state logic and the farming one. This business model asks for a high capacity of mobilization of resources unachievable for many, especially when they want to address small-scale irrigation (area
Resumo:
L'article décrypte certains rouages de l'expatriation des joueurs africains vers l'Europe. La précocité de leur migration et la fragmentation de leur trajectoire sont expliquées par les spéculations dont ils font l'objet. Les réseaux socio-économiques qui portent les filières spéculatives sont mis en lumière, ce qui permet de comprendre en particulier le rôle primordial qu'y jouent les clubs intermédiaires européens, et maintenant asiatiques, intermédiaires dans la chaîne à haute valeur ajoutée, au « taux d'éviction » le plus élevé du monde. This paper decodes various workings at play in the expatriation of African players to Europe. The early nature of their migration and the fragmentation of their trajectories are explained by the speculation that surrounds them. The socio-economic networks that carry speculative channels are brought to light, which helps us to understand in particular the major role played by the European, and now Asian, clubs, which serve as intermediaries in the high value-added chain, with the highest "eviction rate" in the world.
Resumo:
Hydrocarbon distributions and stable isotope ratios of carbonates (delta(13)C(car), delta(18)O(car)), kerogen (delta(13)C(ker)), extractable organic matter (delta(13)C(EOM)) and individual hydrocarbons of Liassic black shale samples from a prograde metamorphic sequence in the Swiss Alps were used to identify the major organic reactions with increasing metamorphic grade. The studied samples range from the diagenetic zone (< 100 degrees C) to amphibolite facies (similar to 550 degrees C). The samples within the diagenetic zones (< 100 and 150 degrees C) are characterized by the dominance of C-< 20 n-alkanes, suggesting an origin related with marine and/or bacterial inputs. The metamorphic samples (200 to 550 degrees C) have distributions significantly dominated by C-12 and C-13 n-alkanes, C-14, C-16 and C-18 n-alkylcyclopentanes and to a lesser extend C-15, C-17 and C-21 n-alkylcyclohexanes. The progressive C-13-enrichment (up to 3.9 parts per thousand) with metamorphism of the C-> 17 n-alkanes suggests the occurrence of cracking reactions of high molecular weight compounds. The isotopically heavier (up to 5.6 parts per thousand) C-< 17 n-alkanes in metamorphic samples are likely originated by thermal degradation of long-chain homologous with preferential release of isotopically light C-1 and C-2 radicals. The dominance of specific even C-number n-alkylcyclopentanes suggests an origin related to direct cyclization mechanism (without decarboxylation step) of algal or bacterial fatty acids occurring in reducing aqueous metamorphic fluid conditions. The regular increase of the concentrations of n-alkylcycloalkanes vs. C-> 13 n-alkanes with metamorphism suggests progressive thermal release of kerogen-linked fatty acid precursors and degradation of n-alkanes. Changes of the steroid and terpenoid distributions are clearly related to increasing metamorphic temperatures. The absence of 18 alpha(H)-22,29,30-trisnorneohopane (Ts), the occurrence of 17 beta(H)-trisnorhopane, 17 beta(H), 21 alpha(H)-hopanes in the C-29 to C-31 range and 5 alpha(H),14 alpha(H),17 alpha(H)-20R C-27, C-29 steranes in the low diagenetic samples (< 100 degrees C) are characteristic of immature bitumens. The higher thermal stress within the upper diagenetic zone (150 degrees C) is marked by the presence of Ts, the disappearance of 17 beta(H)-trisnorhopane and thermodynamic equilibrium of the 22S/(22S + 22R) homohopane ratios. The increase of the alpha alpha alpha-sterane 20S/(20S + 20R) and 20R beta beta/(beta beta + alpha alpha) ratios (from 0.0 to 0.55 and from 0.0 to 0.40, respectively) in the upper diagenetic zone indicates the occurrence of isomerization reactions already at < 150 degrees C. However, the isomerization at C-20 (R -> S) reaches thermodynamic equilibrium values already at the upper diagenesis (similar to 150 degrees C) whereas the epimerisation at C-14 and C-17 (alpha alpha ->beta beta) arrives to constant values in the lower anchizone (similar to 200 degrees C). The ratios Ts vs. 17 alpha(H)-22,29,30-trisnorneohopane [(Ts/(Ts + Tm)] and 18 alpha(H)-30-norneohopane (C29Ts) vs. 17 alpha(H),21 beta(H)-30-norhopane [C29Ts/(C29Ts + C-29)] increase until the medium anchizone (200 to 250 degrees C) from 0.0 to 0.96 and from 0.0 to 0.44, respectively. An opposite trend owards lower values is observed in the higher metamorphic samples. The occurrence of specific hydrocarbons (e.g., n-alkylcyclopentanes, cadalene, hydrogenated aromatic compounds) in metamorphic samples points to kerogen degradation reactions most probably occurring in the presence of water and under reducing conditions. The changes of hydrocarbon distributions and carbon isotopic compositions of n-alkanes related to metamorphism suggest that the organic geochemistry may help to evaluate the lowest grades of prograde metamorphism. Copyright (c) 2005 Elsevier Ltd.
Resumo:
Financial markets play an important role in an economy performing various functions like mobilizing and pooling savings, producing information about investment opportunities, screening and monitoring investments, implementation of corporate governance, diversification and management of risk. These functions influence saving rates, investment decisions, technological innovation and, therefore, have important implications for welfare. In my PhD dissertation I examine the interplay of financial and product markets by looking at different channels through which financial markets may influence an economy.My dissertation consists of four chapters. The first chapter is a co-authored work with Martin Strieborny, a PhD student from the University of Lausanne. The second chapter is a co-authored work with Melise Jaud, a PhD student from the Paris School of Economics. The third chapter is co-authored with both Melise Jaud and Martin Strieborny. The last chapter of my PhD dissertation is a single author paper.Chapter 1 of my PhD thesis analyzes the effect of financial development on growth of contract intensive industries. These industries intensively use intermediate inputs that neither can be sold on organized exchange, nor are reference-priced (Levchenko, 2007; Nunn, 2007). A typical example of a contract intensive industry would be an industry where an upstream supplier has to make investments in order to customize a product for needs of a downstream buyer. After the investment is made and the product is adjusted, the buyer may refuse to meet a commitment and trigger ex post renegotiation. Since the product is customized to the buyer's needs, the supplier cannot sell the product to a different buyer at the original price. This is referred in the literature as the holdup problem. As a consequence, the individually rational suppliers will underinvest into relationship-specific assets, hurting the downstream firms with negative consequences for aggregate growth. The standard way to mitigate the hold up problem is to write a binding contract and to rely on the legal enforcement by the state. However, even the most effective contract enforcement might fail to protect the supplier in tough times when the buyer lacks a reliable source of external financing. This suggests the potential role of financial intermediaries, banks in particular, in mitigating the incomplete contract problem. First, financial products like letters of credit and letters of guarantee can substantially decrease a risk and transaction costs of parties. Second, a bank loan can serve as a signal about a buyer's true financial situation, an upstream firm will be more willing undertake relationship-specific investment knowing that the business partner is creditworthy and will abstain from myopic behavior (Fama, 1985; von Thadden, 1995). Therefore, a well-developed financial (especially banking) system should disproportionately benefit contract intensive industries.The empirical test confirms this hypothesis. Indeed, contract intensive industries seem to grow faster in countries with a well developed financial system. Furthermore, this effect comes from a more developed banking sector rather than from a deeper stock market. These results are reaffirmed examining the effect of US bank deregulation on the growth of contract intensive industries in different states. Beyond an overall pro-growth effect, the bank deregulation seems to disproportionately benefit the industries requiring relationship-specific investments from their suppliers.Chapter 2 of my PhD focuses on the role of the financial sector in promoting exports of developing countries. In particular, it investigates how credit constraints affect the ability of firms operating in agri-food sectors of developing countries to keep exporting to foreign markets.Trade in high-value agri-food products from developing countries has expanded enormously over the last two decades offering opportunities for development. However, trade in agri-food is governed by a growing array of standards. Sanitary and Phytosanitary standards (SPS) and technical regulations impose additional sunk, fixed and operating costs along the firms' export life. Such costs may be detrimental to firms' survival, "pricing out" producers that cannot comply. The existence of these costs suggests a potential role of credit constraints in shaping the duration of trade relationships on foreign markets. A well-developed financial system provides the funds to exporters necessary to adjust production processes in order to meet quality and quantity requirements in foreign markets and to maintain long-standing trade relationships. The products with higher needs for financing should benefit the most from a well functioning financial system. This differential effect calls for a difference-in-difference approach initially proposed by Rajan and Zingales (1998). As a proxy for demand for financing of agri-food products, the sanitary risk index developed by Jaud et al. (2009) is used. The empirical literature on standards and norms show high costs of compliance, both variable and fixed, for high-value food products (Garcia-Martinez and Poole, 2004; Maskus et al., 2005). The sanitary risk index reflects the propensity of products to fail health and safety controls on the European Union (EU) market. Given the high costs of compliance, the sanitary risk index captures the demand for external financing to comply with such regulations.The prediction is empirically tested examining the export survival of different agri-food products from firms operating in Ghana, Mali, Malawi, Senegal and Tanzania. The results suggest that agri-food products that require more financing to keep up with food safety regulation of the destination market, indeed sustain longer in foreign market, when they are exported from countries with better developed financial markets.Chapter 3 analyzes the link between financial markets and efficiency of resource allocation in an economy. Producing and exporting products inconsistent with a country's factor endowments constitutes a serious misallocation of funds, which undermines competitiveness of the economy and inhibits its long term growth. In this chapter, inefficient exporting patterns are analyzed through the lens of the agency theories from the corporate finance literature. Managers may pursue projects with negative net present values because their perquisites or even their job might depend on them. Exporting activities are particularly prone to this problem. Business related to foreign markets involves both high levels of additional spending and strong incentives for managers to overinvest. Rational managers might have incentives to push for exports that use country's scarce factors which is suboptimal from a social point of view. Export subsidies might further skew the incentives towards inefficient exporting. Management can divert the export subsidies into investments promoting inefficient exporting.Corporate finance literature stresses the disciplining role of outside debt in counteracting the internal pressures to divert such "free cash flow" into unprofitable investments. Managers can lose both their reputation and the control of "their" firm if the unpaid external debt triggers a bankruptcy procedure. The threat of possible failure to satisfy debt service payments pushes the managers toward an efficient use of available resources (Jensen, 1986; Stulz, 1990; Hart and Moore, 1995). The main sources of debt financing in the most countries are banks. The disciplining role of banks might be especially important in the countries suffering from insufficient judicial quality. Banks, in pursuing their rights, rely on comparatively simple legal interventions that can be implemented even by mediocre courts. In addition to their disciplining role, banks can promote efficient exporting patterns in a more direct way by relaxing credit constraints of producers, through screening, identifying and investing in the most profitable investment projects. Therefore, a well-developed domestic financial system, and particular banking system, would help to push a country's exports towards products congruent with its comparative advantage.This prediction is tested looking at the survival of different product categories exported to US market. Products are identified according to the Euclidian distance between their revealed factor intensity and the country's factor endowments. The results suggest that products suffering from a comparative disadvantage (labour-intensive products from capital-abundant countries) survive less on the competitive US market. This pattern is stronger if the exporting country has a well-developed banking system. Thus, a strong banking sector promotes exports consistent with a country comparative advantage.Chapter 4 of my PhD thesis further examines the role of financial markets in fostering efficient resource allocation in an economy. In particular, the allocative efficiency hypothesis is investigated in the context of equity market liberalization.Many empirical studies document a positive and significant effect of financial liberalization on growth (Levchenko et al. 2009; Quinn and Toyoda 2009; Bekaert et al., 2005). However, the decrease in the cost of capital and the associated growth in investment appears rather modest in comparison to the large GDP growth effect (Bekaert and Harvey, 2005; Henry, 2000, 2003). Therefore, financial liberalization may have a positive impact on growth through its effect on the allocation of funds across firms and sectors.Free access to international capital markets allows the largest and most profitable domestic firms to borrow funds in foreign markets (Rajan and Zingales, 2003). As domestic banks loose some of their best clients, they reoptimize their lending practices seeking new clients among small and younger industrial firms. These firms are likely to be more risky than large and established companies. Screening of customers becomes prevalent as the return to screening rises. Banks, ceteris paribus, tend to focus on firms operating in comparative-advantage sectors because they are better risks. Firms in comparative-disadvantage sectors finding it harder to finance their entry into or survival in export markets either exit or refrain from entering export markets. On aggregate, one should therefore expect to see less entry, more exit, and shorter survival on export markets in those sectors after financial liberalization.The paper investigates the effect of financial liberalization on a country's export pattern by comparing the dynamics of entry and exit of different products in a country export portfolio before and after financial liberalization.The results suggest that products that lie far from the country's comparative advantage set tend to disappear relatively faster from the country's export portfolio following the liberalization of financial markets. In other words, financial liberalization tends to rebalance the composition of a country's export portfolio towards the products that intensively use the economy's abundant factors.
Resumo:
Ten microsatellite loci and a partial sequence of the COII mitochondrial gene were used to investigate genetic differentiation in B. terrestris, a bumble bee of interest for its high-value crop pollination. The analysis included eight populations from the European continent, five from Mediterranean islands (six subspecies altogether) and one from Tenerife (initially described as a colour form of B. terrestris but recently considered as a separate species, B. canariensis). Eight of the 10 microsatellite loci displayed high levels of polymorphism in most populations. In B. terrestris populations, the total number of alleles detected per polymorphic locus ranged from 3 to 16, with observed allelic diversity from 3.8 +/- 0.5 to 6.5 +/- 1.4 and average calculated heterozygosities from 0.41 +/- 0.09 to 0.65 +/- 0.07. B. canariensis showed a significantly lower average calculated heterozygosity (0.12 +/- 0.08) and observed allelic diversity (1.5 +/- 0.04) as compared to both continental and island populations of B. terrestris. No significant differentiation was found among populations of B. terrestris from the European continent. In contrast, island populations were all significantly and most of them strongly differentiated from continental populations. B. terrestris mitochondrial DNA is characterized by a low nucleotide diversity: 0.18% +/- 0.07%, 0.20% +/- 0.04% and 0.27% +/- 0.04% for the continental populations, the island populations and all populations together, respectively. The only haplotype found in the Tenerife population differs by a single nucleotide substitution from the most common continental haplotype of B. terrestris. This situation, identical to that of Tyrrhenian islands populations and quite different from that of B. lucorum (15 substitutions between terrestris and lucorum mtDNA) casts doubts on the species status of B. canariensis. The large genetic distance between the Tenerife and B. terrestris populations estimated from microsatellite data result, most probably, from a severe bottleneck in the Canary island population. Microsatellite and mitochondrial DNA data call for the protection of the island populations of B. terrestris against importation of bumble bees of foreign origin which are used as crop pollinators.
Resumo:
Anti-doping authorities have high expectations of the athlete steroidal passport (ASP) for anabolic-androgenic steroids misuse detection. However, it is still limited to the monitoring of known well-established compounds and might greatly benefit from the discovery of new relevant biomarkers candidates. In this context, steroidomics opens the way to the untargeted simultaneous evaluation of a high number of compounds. Analytical platforms associating the performance of ultra-high pressure liquid chromatography (UHPLC) and the high mass-resolving power of quadrupole time-of-flight (QTOF) mass spectrometers are particularly adapted for such purpose. An untargeted steroidomic approach was proposed to analyse urine samples from a clinical trial for the discovery of relevant biomarkers of testosterone undecanoate oral intake. Automatic peak detection was performed and a filter of reference steroid metabolites mass-to-charge ratio (m/z) values was applied to the raw data to ensure the selection of a subset of steroid-related features. Chemometric tools were applied for the filtering and the analysis of UHPLC-QTOF-MS(E) data. Time kinetics could be assessed with N-way projections to latent structures discriminant analysis (N-PLS-DA) and a detection window was confirmed. Orthogonal projections to latent structures discriminant analysis (O-PLS-DA) classification models were evaluated in a second step to assess the predictive power of both known metabolites and unknown compounds. A shared and unique structure plot (SUS-plot) analysis was performed to select the most promising unknown candidates and receiver operating characteristic (ROC) curves were computed to assess specificity criteria applied in routine doping control. This approach underlined the pertinence to monitor both glucuronide and sulphate steroid conjugates and include them in the athletes passport, while promising biomarkers were also highlighted.
Resumo:
ABSTRACT: BACKGROUND: The ongoing increase in life expectancy in developed countries is associated with changes in the shape of the survival curve. These changes can be characterized by two main, distinct components: (i) the decline in premature mortality, i.e., the concentration of deaths around some high value of the mean age at death, also termed rectangularization of the survival curve; and (ii) the increase of this mean age at death, i.e., longevity, which directly reflects the reduction of mortality at advanced ages. Several recent observations suggest that both mechanisms are simultaneously taking place. METHODS: We propose a set of indicators aiming to quantify, disentangle, and compare the respective contribution of rectangularization and longevity increase to the secular increase of life expectancy. These indicators, based on a nonparametric approach, are easy to implement. RESULTS: We illustrate the method with the evolution of the Swiss mortality data between 1876 and 2006. Using our approach, we are able to say that the increase in longevity and rectangularization explain each about 50% of the secular increase of life expectancy. CONCLUSION: Our method may provide a useful tool to assess whether the contribution of rectangularization to the secular increase of life expectancy will remain around 50% or whether it will be increasing in the next few years, and thus whether concentration of mortality will eventually take place against some ultimate biological limit.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
Introduction: Sleep disordered breathing with central apnea or hypopnea frequently occurs during sleep at high altitude. The aim of this study was to assess the effects of added dead space (DS) on sleep disordered breathing and transcutaneous CO2 (PtcCO2) level during sleep at high altitude. Methods: Full night sleep recordings were obtained on 12 unacclimatized mountaineers (11 males, 1 female, mean age 39 ± 12 y.o.) during one of the first 4 nights after arrival in Leh, Ladakh (3500 m). In random order, half of the night was spent with a 500 ml increase in dead space through a custom designed full face mask and the other half without it. PtcCO2 was measured in 3 participants. Results: Baseline recordings reveled two clearly distinct groups: one with severe sleep disordered breathing (n = 5) and the other with mild or no disordered breathing (n = 7). Added dead space markedly improved breathing in the first group (baseline vs DS): apnea hypopnea index (AHI) 70.3 ± 25.8 vs 29.4 ± 6.9 (p = 0.013), oxygen desaturation index (ODI): 72.9 ± 24.1/h vs 42.5 ± 14.4 (p = 0.031), whereas it had no significant effect in the second group. Added dead space did not have a significant effect on mean oxygen saturation level. Respiratory events were almost exclusively central apnea or hypopnea except for one subject. Only a minor increase in mean PtcCO2 (n = 3) was observed: 33.6 ± 1.8 mm Hg at baseline and 35.0 ± 2.62 mm Hg with DS. Sleep quality was preserved under dead space condition, since the microarousal rate remained unchanged (16.8 ± 8.7/h vs 19.4 ± 18.6/h (p = 0.51). Conclusion: In mountaineers with severe sleep disordered breathing at high altitude, a 500 ml increase in dead space through a fitted mask significantly improves nocturnal breathing.
Resumo:
Species distribution models (SDMs) studies suggest that, without control measures, the distribution of many alien invasive plant species (AIS) will increase under climate and land-use changes. Due to limited resources and large areas colonised by invaders, management and monitoring resources must be prioritised. Choices depend on the conservation value of the invaded areas and can be guided by SDM predictions. Here, we use a hierarchical SDM framework, complemented by connectivity analysis of AIS distributions, to evaluate current and future conflicts between AIS and high conservation value areas. We illustrate the framework with three Australian wattle (Acacia) species and patterns of conservation value in Northern Portugal. Results show that protected areas will likely suffer higher pressure from all three Acacia species under future climatic conditions. Due to this higher predicted conflict in protected areas, management might be prioritised for Acacia dealbata and Acacia melanoxylon. Connectivity of AIS suitable areas inside protected areas is currently lower than across the full study area, but this would change under future environmental conditions. Coupled SDM and connectivity analysis can support resource prioritisation for anticipation and monitoring of AIS impacts. However, further tests of this framework over a wide range of regions and organisms are still required before wide application.
Resumo:
OBJECTIVES: To determine whether nalmefene combined with psychosocial support is cost-effective compared with psychosocial support alone for reducing alcohol consumption in alcohol-dependent patients with high/very high drinking risk levels (DRLs) as defined by the WHO, and to evaluate the public health benefit of reducing harmful alcohol-attributable diseases, injuries and deaths. DESIGN: Decision modelling using Markov chains compared costs and effects over 5 years. SETTING: The analysis was from the perspective of the National Health Service (NHS) in England and Wales. PARTICIPANTS: The model considered the licensed population for nalmefene, specifically adults with both alcohol dependence and high/very high DRLs, who do not require immediate detoxification and who continue to have high/very high DRLs after initial assessment. DATA SOURCES: We modelled treatment effect using data from three clinical trials for nalmefene (ESENSE 1 (NCT00811720), ESENSE 2 (NCT00812461) and SENSE (NCT00811941)). Baseline characteristics of the model population, treatment resource utilisation and utilities were from these trials. We estimated the number of alcohol-attributable events occurring at different levels of alcohol consumption based on published epidemiological risk-relation studies. Health-related costs were from UK sources. MAIN OUTCOME MEASURES: We measured incremental cost per quality-adjusted life year (QALY) gained and number of alcohol-attributable harmful events avoided. RESULTS: Nalmefene in combination with psychosocial support had an incremental cost-effectiveness ratio (ICER) of £5204 per QALY gained, and was therefore cost-effective at the £20,000 per QALY gained decision threshold. Sensitivity analyses showed that the conclusion was robust. Nalmefene plus psychosocial support led to the avoidance of 7179 alcohol-attributable diseases/injuries and 309 deaths per 100,000 patients compared to psychosocial support alone over the course of 5 years. CONCLUSIONS: Nalmefene can be seen as a cost-effective treatment for alcohol dependence, with substantial public health benefits. TRIAL REGISTRATION NUMBERS: This cost-effectiveness analysis was developed based on data from three randomised clinical trials: ESENSE 1 (NCT00811720), ESENSE 2 (NCT00812461) and SENSE (NCT00811941).
Resumo:
The pending workforce crisis in family medicine has triggered various initiatives. This article describes the PMU-FLON walk-in clinic, a project of the Institute of General Medicine University of Lausanne. The working conditions in this clinic are close to that of a family practice. Doctors in training are supervised by family doctors who work part-time in the clinic. The objective is to improve training in the various fields of family medicine, from technical skills (improving optimal use of diagnostic tools), to integrating patients' requests in a more global patient-centered approach. This new educational model allows doctors in training to benefit from the specific approaches of different trainers. It will contribute to promoting quality family medicine in the future.