20 resultados para Danger
em Aston University Research Archive
Resumo:
Despite abundant literature on human behaviour in the face of danger, much remains to be discovered. Some descriptive models of behaviour in the face of danger are reviewed in order to identify areas where documentation is lacking. It is argued that little is known about recognition and assessment of danger and yet, these are important aspects of cognitive processes. Speculative arguments about hazard assessment are reviewed and tested against the results of previous studies. Once hypotheses are formulated, the reason for retaining the reportory grid as the main research instrument are outlined, and the choice of data analysis techniques is described. Whilst all samples used repertory grids, the rating scales were different between samples; therefore, an analysis is performed of the way in which rating scales were used in the various samples and of some reasons why the scales were used differently. Then, individual grids are looked into and compared between respondents within each sample; consensus grids are also discussed. the major results from all samples are then contrasted and compared. It was hypothesized that hazard assessment would encompass three main dimensions, i.e. 'controllability', 'severity of consequences' and 'likelihood of occurrence', which would emerge in that order. the results suggest that these dimensions are but facets of two broader dimensions labelled 'scope of human intervention' and 'dangerousness'. It seems that these two dimensions encompass a number of more specific dimensions some of which can be further fragmented. Thus, hazard assessment appears to be a more complex process about which much remains to be discovered. Some of the ways in which further discovery might proceed are discussed.
Resumo:
In the context of the needs of the Semantic Web and Knowledge Management, we consider what the requirements are of ontologies. The ontology as an artifact of knowledge representation is in danger of becoming a Chimera. We present a series of facts concerning the foundations on which automated ontology construction must build. We discuss a number of different functions that an ontology seeks to fulfill, and also a wish list of ideal functions. Our objective is to stimulate discussion as to the real requirements of ontology engineering and take the view that only a selective and restricted set of requirements will enable the beast to fly.
Resumo:
Risks and uncertainties are part and parcel of any project as projects are planned with many assumptions. Therefore, managing those risks is the key to project success. Although risk is present in all most all projects, large-scale construction projects are most vulnerable. Risk is by nature subjective. However, managing risk subjectively posses the danger of non-achievement of project goals. This study introduces an analytical framework for managing risk in projects. All the risk factors are identified, their effects are analyzed, and alternative responses are derived with cost implication for mitigating the identified risks. A decision-making framework is then formulated using decision tree. The expected monetary values are derived for each alternative. The responses, which require least cost is selected. The entire methodology has been explained through a case study of an oil pipeline project in India and its effectiveness in managing projects has been demonstrated. © INTERNATIONAL JOURNAL OF INDUSTRIAL ENGINEERING.
Resumo:
Time, cost and quality achievements on large-scale construction projects are uncertain because of technological constraints, involvement of many stakeholders, long durations, large capital requirements and improper scope definitions. Projects that are exposed to such an uncertain environment can effectively be managed with the application of risk management throughout the project life cycle. Risk is by nature subjective. However, managing risk subjectively poses the danger of non-achievement of project goals. Moreover, risk analysis of the overall project also poses the danger of developing inappropriate responses. This article demonstrates a quantitative approach to construction risk management through an analytic hierarchy process (AHP) and decision tree analysis. The entire project is classified to form a few work packages. With the involvement of project stakeholders, risky work packages are identified. As all the risk factors are identified, their effects are quantified by determining probability (using AHP) and severity (guess estimate). Various alternative responses are generated, listing the cost implications of mitigating the quantified risks. The expected monetary values are derived for each alternative in a decision tree framework and subsequent probability analysis helps to make the right decision in managing risks. In this article, the entire methodology is explained by using a case application of a cross-country petroleum pipeline project in India. The case study demonstrates the project management effectiveness of using AHP and DTA.
Resumo:
A cross-sectional study aims to describe the overall picture of a phenomenon, a situational problem, an attitude or an issue, by asking a cross-section of a given population at one specified moment in time. This paper describes the key features of the cross-sectional survey method. It begins by highlighting the main principles of the method, then discusses stages in the research process, drawing on two surveys of primary care pharmacists to illustrate some salient points about planning, sampling frames, definition and conceptual issues, research instrument design and response rates. Four constraints in prescribing studies were noted. First the newness of the subject meant a low basis of existing knowledge to design a questionnaire. Second, there was no public existing database for the sampling frame, so a pragmatic sampling exercise was used. Third, the definition of a Primary Care Pharmacist (PCP) [in full] and respondents recognition of that name and identification with the new role limited the response. Fourth, a growing problem for all surveys, but particularly with pharmacists and general practitioners (GP) [in full] is the growing danger of survey fatigue, which has a negative impact on response levels.
Resumo:
Fire Service personnel face risk on a daily basis, frequently working in extremely hazardous conditions—and the severity of the danger faced can fluctuate rapidly. The Fire Service has therefore become extremely experienced at managing dynamic risks. The aim of this article is to review techniques used in the UK fire service to attenuate the effects of risk and to discuss these with respect to organisations which experience dynamic risk in other fields—even if in less dramatic conditions.
Resumo:
In emerging markets, the amount of mobile communication and the number of occasions mobile phones are used are increasing. More and more settings appropriate or not for mobile phone usage are being exposed. Although prohibited by many governments, there is evidence that use of new mobile devices while driving are somehow becoming current everyday practice, hence legitimatizing usage for many users. Dominant dangerous behavior in the absence of enforced legal framework is being deployed and has become routine for many m-users. This chapter adopts a qualitative case study approach (20 cases) to examine the public transport drivers' motives, logic and legitimacy processes. The question which these issues raise in the light of advancing m-technologies is: How do, in the context of emerging market, undesired emerging routines enactment get to be reflected upon and voluntarily disregarded to maximize the benefits of m-technologies while minimizing their drawbacks? Findings point out at multiple motives for usage including external social pressure through the ubiquitous 24/7 usage of mtechnology, lack of alternative communication protocol, real time need for action and from an internal perspectives boredoms, lack of danger awareness, blurring of the boundaries between personal and business life and lack of job fulfillment are uncovered as key factors. As secondary dynamic factors such as education, drivers work' histories, impunity, lack of strong consumer opposition appear central in shaping the development of the routines. © 2011, IGI Global.
Resumo:
The International Cooperation Agency (identified in this article as IDEA) working in Colombia is one of the most important in Colombian society with programs that support gender rights, human rights, justice and peace, scholarships, aboriginal population, youth, afro descendants population, economic development in communities, and environmental development. The identified problem is based on the diversified offer of services, collaboration and social intervention which requires diverse groups of people with multiple agendas, ways to support their mandates, disciplines, and professional competences. Knowledge creation and the growth and sustainability of the organization can be in danger because of a silo culture and the resulting reduced leverage of the separate group capabilities. Organizational memory is generally formed by the tacit knowledge of the organization members, given the value of accumulated experience that this kind of social work implies. Its loss is therefore a strategic and operational risk when most problem interventions rely on direct work in the socio-economic field and living real experiences with communities. The knowledge management solution presented in this article starts first, with the identification of the people and groups concerned and the creation of a knowledge map as a means to strengthen the ties between organizational members; second, by introducing a content management system designed to support the documentation process and knowledge sharing process; and third, introducing a methodology for the adaptation of a Balanced Scorecard based on the knowledge management processes. These three main steps lead to a knowledge management “solution” that has been implemented in the organization, comprising three components: a knowledge management system, training support and promotion of cultural change.
Resumo:
Introduction: The requirement of adjuvants in subunit protein vaccination is well known yet their mechanisms of action remain elusive. Of the numerous mechanisms suggested, cationic liposomes appear to fulfil at least three: the antigen depot effect, the delivery of antigen to antigen presenting cells (APCs) and finally the danger signal. We have investigated the role of antigen depot effect with the use of dual radiolabelling whereby adjuvant and antigen presence in tissues can be quantified. In our studies a range of cationic liposomes and different antigens were studied to determine the importance of physical properties such as liposome surface charge, antigen association and inherent lipid immunogenicity. More recently we have investigated the role of liposome size with the cationic liposome formulation DDA:TDB, composed of the cationic lipid dimethyldioctadecylammonium (DDA) and the synthetic mycobacterial glycolipid trehalose 6,6’-dibehenate (TDB). Vesicle size is a frequently investigated parameter which is known to result in different routes of endocytosis. It has been postulated that targeting different routes leads to different intracellular signaling pathway activation and it is certainly true that numerous studies have shown vesicle size to have an effect on the resulting immune responses (e.g. Th1 vs. Th2). Aim: To determine the effect of cationic liposome size on the biodistribution of adjuvant and antigen, the ensuing humoral and cell-mediated immune responses and the uptake and activation of antigen by APCs including macrophages and dendritic cells. Methods: DDA:TDB liposomes were made to three different sizes (~ 0.2, 0.5 and 2 µm) followed by the addition of tuberculosis antigen Ag85B-ESAT-6 therefore resulting in surface adsorption. Liposome formulations were injected into Balb/c or C57Bl/6 mice via the intramuscular route. The biodistribution of the liposome formulations was followed using dual radiolabelling. Tissues including muscle from the site of injection and local draining lymph nodes were removed and liposome and antigen presence quantified. Mice were also immunized with the different vaccine formulations and cytokine production (from Ag85B-ESAT-6 restimulated splenocytes) and antibody presence in blood assayed. Furthermore, splenocyte proliferation after restimulating with Ag85B-ESAT-6 was measured. Finally, APCs were compared for their ability to endocytose vaccine formulations and the effect this had on the maturation status of the cell populations was compared. Flow cytometry and fluorescence labelling was used to investigate maturation marker up-regulation and efficacy of phagocytosis. Results: Our results show that for an efficient Ag85B-ESAT-6 antigen depot at the injection site, liposomes composed of DDA and TDB are required. There is no significant change in the presence of liposome or antigen at 6hrs or 24hrs p.i, nor does liposome size have an effect. Approximately 0.05% of the injected liposome dose is detected in the local draining lymph node 24hrs p.i however protein presence is low (<0.005% dose). Preliminary in vitro data shows liposome and antigen endocytosis by macrophages; further studies on this will be presented in addition to the results of the immunisation study.
Resumo:
This thesis has been concerned with obtaining evidence to explore the proposition that the provision of occupational health services as arranged at the present time represents a misallocation of resources. The research has been undertaken within the occupational health service of a large Midlands food factory. As the research progressed it became evident that questions were being raised about the nature and scope of occupational health as well as the contribution, in combating danger at work, that occupational health services can make to the health and safety team. These questions have been scrutinized in depth, as they are clearly important, and a resolution of the problem of the definition of occupational health has been proposed. I have taken the approach of attempting to identify specific objectives or benefits of occupational health activities so that it is possible to assess how far these objectives are being achieved. I have looked at three aspects of occupational health; audiometry, physiotherapy and pre-employment medical examinations as these activities embody crucial concepts which are common to all activities in an occupational health programme. A three category classification of occupational health activities is proposed such that the three activities provide examples within each category. These are called personnel therapy, personnel input screening and personnel throughput screening. I conclude that I have not shown audiometry to be cost-effective. My observations of the physiotherapy service lead me to support the suggestion that there is a decline in sickness absence rates due to physiotherapy in industry. With pre-employment medical examinations I have shown that the service is product safety oriented and that benefits are extremely difficult to identify. In regard to the three services studied, in the one factory investigated, and because of the immeasurability of certain activities, I find support for the proposition that the mix of occupational health services as provided at the present time represents a misallocation of resources.
Resumo:
In recent years dual phase steels comprising of 5-20% martensite in a ferrite matrix have come into the limelight of high strength cold formable steels because of their potential for vehicle weight saving. They show the following features: no yield point; relatively low initial flow stress; high initial workhardening rate; well sustained work hardening. As a consequence of these characteristics, dual phase steels exhibit a better combination of strength and elongation than other HSLA steels. In this thesis, a broad view of the factors which influence their properties is presented. Mechanical properties and forming ability of a commercially available dual phase steel and an AL-Si killed steel processed to dual phase form are investigated to ascertain the effect of their microstructure on their properties. It is found that the yield phenomena are masked by the transformation induced stresses present during processing and so yield point could be recovered under suitable ageing treatment; that apart from giving the above properties dual phasing gives rise to very low strain-rate sensitivity and a low R value ~ 1; that the mechanical response under rolling conditions is not different from those under tension; that there is a danger of damage to tooling during forming operations of these steels if fracture should precede instability as a result of grain size dependent strength found for these steels. It is also found that very little deformation of the martensite islands took place during deformation except at high strains. The work-hardening and the strength levels can be controlled by either decreasing the grain size or increasing the martensite volume fraction, but it is found that increasing martensite has a detrimental effect on ductility and the ductility and fracture strength can be controlled better by refining the grain size. A remarkable effect found in the dual phase steel tested is that the compressive strength is higher than the tensile strength. The reason for this observation is not yet clear but it is suggested that it might be due to the introduction of emissary type dislocations into the ferrite lattice as a result of twins formed in the martensite during transformation from austenite. The twins are envisaged to be {111} <112> in character.
Resumo:
In 2007, the English Department of Health (DH) issued advice stating 'pregnant woman' and 'those trying to conceive' should abstain from drinking alcohol. As others have noted, this advice was issued despite their being no new evidence about the deleterious effects of low levels of alcohol consumption. In this paper, we argue this development is significant for the social construction of 'risk', since in advocating abstinence without an evidence base for this advice, policy makers formalise a connection between uncertainty and danger. We suggest this development has important implications, most obviously for pregnant women, certainly impacting on the nature of the advice they will now receive and likely more generally on their experience of the transition to motherhood. We suggest it has wider implications for individuals' experience also, as policy makers appear to be advocating the same approach to risk to non-pregnant people. Further, it suggests a noteworthy formalisation of a new definition of risk, which should be debated far more extensively, as it matters for the future development of health policy.
Resumo:
Book revew: Marketinggeschichte: die Genese einer modernen Sozialtechnik [Marketing history: The genesis of a modern social technique], edited by Hartmut Berghoff, Frankfurt/Main, Campus Verlag, 2007, 409 pp., illus., [euro]30.00 (paperback), ISBN 978-3-593-38323-1. This edited volume is the result of a workshop at Göttingen University in 2006 and combines a number of different approaches to the research into the history of marketing in Germany's economy and society. The majority of contributions loosely focus around the occurrence of a ‘marketing revolution’ in the 1970s, which ties in with interpretations of the Americanisation of German business. This revolution replaced the indigenous German idea of Absatzwirtschaft (the economics of sales) with the American-influenced idea of Marketing, which was less functionally oriented and more strategic, and which aimed to connect processes within the firm in order to allow a greater focus on the consumer. The entire volume is framed by Hartmut Berghoff's substantial and informative introduction, which introduces a number of actors and trends beyond the content of the volume. Throughout the various contributions, authors provide explanations of the timing and nature of marketing revolutions. Alexander Engel identifies an earlier revolution in the marketing of dyes, which undergoes major change with the emergence of chemical dyes. While the natural dyestuff had been a commodity, with producers removed from consumers via a global network of traders, chemical dyes were products and were branded at an early stage. This was a fundamental change in the nature of production and sales. As Roman Rossfeld shows in his contribution on the Swiss chocolate industry (which focuses almost exclusively on Suchard), even companies that produced non-essential consumer goods which had always required some measure of labelling grappled for years with the need to develop fewer and higher impact brands, as well as an efficient sales operation. A good example for the classical ‘marketing revolution’ of the 1970s is the German automobile industry. Ingo Köhler convincingly argues that the crisis situation of German car manufacturers – the change from a seller's to a buyer's market, appreciation of the German mark which undermines exports, the oil crises coupled with higher inflation and greater frugality of consumers and the emergence of new competitors – lead companies to refocus from production to the demands of the consumer. While he highlights the role of Ford in responding most rapidly to these problems, he does not address whether the multinational was potentially transferring American knowledge to the German market. Similarly, Paul Erker illustrates that a marketing revolution in transport and logistics happened much later, because the market remained highly regulated until the 1980s. Both Paul Erker and Uwe Spiekermann in their contribution, present comparisons of two different sectors or companies (the tire manufacturer Continental and the logistics company Dachser, and agriculture and trade, respectively). In both cases, however, it remains unclear why these examples were chosen for comparison, as both seem to have little in common and are not always effectively used to demonstrate differences. The weakest section of the book is the development of marketing as an academic discipline. The attempt at sketching the phases in the evolution of marketing as an academic discipline by Ursula Hansen and Matthias Bode opens with an undergraduate-level explanation on the methodology of historical periodisation that seems extraneous. Considerably stronger is the section on the wider societal impact of marketing, and Anja Kruke shows how the new techniques of opinion research was accepted by politics and business – surprisingly more readily by politicians than their commercial counterparts. In terms of contemporary personalities, Hans Domizlaff emerges as one fascinating figure of German marketing history, which several contributors refer to and whose career as the German cigarette manufacturer Reemtsma is critically analysed by Tino Jacobs. Domizlaff was Germany's own ‘marketing guru’, whose successful campaigns led to the wide-ranging reception of his ideas about the nature of good branding and marketing. These are variously described as intuitive, elitist, and sachlich, a German concept of a sober, fact-based, and ‘no frills’ approach. Domizlaff did not believe in market research. Rather, he saw the genius of the individual advertiser as key to intuitively ascertaining the people's moods, wishes, and desires. This seems to have made him peculiarly suited to the tastes of the German middle class, according to Thomas Mergel's contribution on the nature of political marketing in the republic. Especially in politics, any form of hard sales tactics were severely frowned upon and considered to demean the citizen as incapable of making an informed choice, a mentality that he dates back to the traditions of nineteenth-century liberalism. Part of this disdain of ‘selling politics like toothpaste’ was also founded on the highly effective use of branding by the National Socialists, who identified their party through the use of an increasingly standardised image of Adolf Hitler and the swastika. Alexander Schug extends on previous research that criticised the simplistic notion of Hitler's charisma as the only explanation of the popular success and distances his approach from those who see it in terms of propaganda and demagogy. He argues that the NSDAP used the tools of advertising and branding precisely because they had to introduce their new ideology into a political marketplace dominated by more established parties. In this they were undoubtedly successful, more so than they intended: as bakers sold swastika cookies and butchers formed Führer heads out of lard, the NSDAP sought to regain control over the now effectively iconic images that constituted their brand, which was in danger of being trivialised and devalued. Key to understanding the history of marketing in Germany is on the one hand the exchange of ideas with the United States, and on the other the impact of national-socialist policies, and the question whether they were a force of modernisation or retardation. The general argument in the volume appears to favour the latter explanation. In the 1930s, some of the leading marketing experts emigrated to the USA, leaving German academia and business isolated. The aftermath of the Second World War left a country that needed to increase production to satisfy consumer demand, and there was little interest in advanced sales techniques. Although the Nazis were progressive in applying new marketing methods to their political campaign, this retarded the adoption of sales techniques in politics for a long time. Germany saw the development of idiosyncratic approaches by people like Domizlaff in the 1930s and 1940s, when it lost some leading thinkers, and only engaged with American marketing conceptions in the 1960s and 1970s, when consumers eventually became more important than producers.
Resumo:
Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.
Resumo:
The Internet poses a number of threats to the safety of young people. Using numerous examples, this article discusses a wide range of such threats, including: cyberstalking; the 'grooming' of potential victims of sexual abuse; a new 'wish list' scene (where teenagers encourage contact with potential abusers); the creation and distribution of child pornography; and the emergence of services that create child pornography to order. It is suggested that the latter has provided individuals with the ability to inflict sexual abuse on young people from a distance, an act the authors have termed virtual sex tourism. The final section of the article suggests that paedophiles and pornographers have been quick to adopt new technology as a means of concealing their activities. The article concludes by warning of the danger of overestimating or underestimating the threats described.