19 resultados para Hovi, Jon: Games, threats and treaties
em Aston University Research Archive
Resumo:
Previously, quality of formulations information provided for oral medications used in paediatric clinical trials published in 10 highly cited journals between 2002 and 2004 raised concerns. This short report explores if there was any subsequent improvement on how the formulations used in trials involving children
Resumo:
Previous research has suggested that invalidating childhood environments are positively related to the symptoms of eating disorders. However, it is unclear how childhood environments might impact upon the development of eating disorder symptoms. This study examined the relationship between parental invalidation and eating disorder-related attitudes in a nonclinical sample and tested the mediating effect of attitudes towards emotional expression. Two hundred women, with a mean age of 21 years, completed measures of invalidating childhood environments, attitudes towards emotional expression, and eating pathology. Eating concerns were positively associated with recollections of an invalidating parental environment. The belief that the expression of emotions is a sign of weakness fully mediated the relationship between childhood maternal invalidation and adult eating concern. Following replication and extension to a clinical sample, these results suggest that targeting the individual's attitude towards emotional expression might reduce eating attitudes among women who have experienced an invalidating childhood environment. © 2012 John Wiley & Sons, Ltd and Eating Disorders Association.
Resumo:
Small and Medium-scale Enterprises (SMEs), which generate more than one half of the employment (58.9%) and turnover (51.9%), form an important sector of the UK economy. Although they are the main drivers of the UK economy, they are also said to be the most vulnerable to the impacts of Extreme Weather Events (EWEs). The world in recent years has experienced a significant number of EWEs, and SMEs have suffered significant economic losses as a result. The now apparent climate change, which is mostly attributed to human interference with the environment over the past few decades, is believed to have a strong link with the increase of EWEs in the recent past. Threats of EWEs are expected to further increase due to their increased frequency and magnitude and increased vulnerability to their effects. Interestingly, EWEs seem to present businesses with various business opportunities and positive consequences as well, besides the much feared and overwhelming threats and negative consequences they present. Understanding such impacts has become a necessity to improve the resilience of SMEs so that they will be better prepared to minimise the negative consequences and maximise the positive consequences posed by EWEs. This paper attempts to bring together and evaluate the current knowledge with regard to the effects of EWEs on SMEs. The paper establishes the case for more in-depth study with this regard and concludes by stressing the need for improving the resilience of SMEs to EWEs.
Resumo:
These case studies from CIMA highlight the need to embed risk management within more easily understood behaviours, consistent with the overall organisational culture. In each case, some form of internal audit team provides either an oversight function or acts as an expert link in that feedback loop. Frontline staff, managers and specialists should be completely aligned on risk, in part just to ensure that there is a consistency of approach. They should understand instinctively that good performance includes good risk management. Tesco has continued to thrive during the recession and remains a robust and efficient group of businesses despite the emergence of potential threats around consumer spending and the supply chain. RBS, by contrast, has suffered catastrophic and very public failures of risk management despite a large in-house function and stiff regulation of risk controls. Birmingham City Council, like all local authorities, is adapting to more commercial modes of operation and is facing diverse threats and opportunities emerging as a result of social change. And DCMS, like many other public sector organisations, has to handle an incredibly complex network of delivery partners within the context of a relatively recent overhaul of central government risk management processes. Key Findings: •Risk management is no longer solely a financial discipline, nor is it simply a concern for the internal control function. •Where organisations retain a discrete risk management cadre – often specialists at monitoring and evaluating a range of risks – their success is dependent on embedding risk awareness in the wider culture of the enterprise. •Risk management is most successful when it is explicitly linked to operational performance. •Clear leadership, specific goals, excellent influencing skills and open-mindedness to potential threats and opportunities are essential for effective risk management. •Bureaucratic processes and systems can hamper good risk management – either as a result of a ‘box-ticking mentality’ or because managers and staff believe they do not need to consider risk themselves.
Resumo:
The Joint Research Centre (JRC) of the European Commission has developed, in consultation with many partners, the DOPA as a global reference information system to support decision making on protected areas (PAs) and biodiversity conservation. The DOPA brings together the World Database on Protected Areas with other reference datasets on species, habitats, ecoregions, threats and pressures, to deliver critical indicators at country level and PA level that can inform gap analyses, PA planning and reporting. These indicators are especially relevant to Aichi Targets 11 and 12, and have recently contributed to CBD country dossiers and capacity building on these targets. DOPA also includes eConservation, a new module that provides a means to share and search information on conservation projects, and thus allows users to see “who is doing what where”. So far over 5000 projects from the World Bank, GEF, CEPF, EU LIFE Programme, CBD LifeWeb Initiative and others have been included, and these projects can be searched in an interactive mapping interface based on criteria such as location, objectives, timeframe, budget, the organizations involved, target species etc. This seminar will provide an introduction to DOPA and eConservation, highlight how these services are used by the CBD and others, and include ample time for discussion.
Resumo:
G protein-coupled receptors (GPCRs) play important physiological roles transducing extracellular signals into intracellular responses. Approximately 50% of all marketed drugs target a GPCR. There remains considerable interest in effectively predicting the function of a GPCR from its primary sequence.
Resumo:
For the last several years, mobile devices and platform security threats, including wireless networking technology, have been top security issues. A departure has occurred from automatic anti-virus software based on traditional PC defense: risk management (authentication and encryption), compliance, and disaster recovery following polymorphic viruses and malware as the primary activities within many organizations and government services alike. This chapter covers research in Turkey as a reflection of the current market – e-government started officially in 2008. This situation in an emerging country presents the current situation and resistances encountered while engaging with mobile and e-government interfaces. The authors contend that research is needed to understand more precisely security threats and most of all potential solutions for sustainable future intention to use m-government services. Finally, beyond m-government initiatives' success or failure, the mechanisms related to public administration mobile technical capacity building and security issues are discussed.
Resumo:
Following the end of the Cold War and the ensuing changes to the international landscape, thinking about security has tended to become more discursive and interpretative in nature. What counts as security has increasingly derived from security discourses (that is, 'securitisation') and uncertainty about the multi-faceted future facing various countries and regions. Within this post-Cold War discourse, the Western Mediterranean has emerged as a region fraught with latent and manifest threats in the economic, political, societal and military sectors. Improved access to EU markets for Maghrebi exports; the security of energy supplies to the EU from Algeria and Libya; lack of democracy and the advance of political Islam; the flow of northward migration and worries about law and order in France, Italy and Spain; the growth in military expenditure and weapons proliferation in the Maghreb; all have been central to the securitisation agenda. However, this agenda has often lacked credibility especially when inter-linkages have purportedly been established between economic underdevelopment and political instability, between the advance of political Islam and the threat to energy supplies, or between immigration and the threat to national identity. Such inter-sectoral linkages distract from the credibility of those 'securitisation instances' which correspond to reality; the former linkages have often been exploited by extremist politicians in south-west European countries as well as by regimes in the Maghreb to advance their respective interests. Thus, securitisation may defeat its main purpose; it may generate responses out of keeping with the aims proclaimed at the outset, aims centred on the countering of real threats and the ensuring of greater stability.
Resumo:
The number of interoperable research infrastructures has increased significantly with the growing awareness of the efforts made by the Global Earth Observation System of Systems (GEOSS). One of the Societal Benefit Areas (SBA) that is benefiting most from GEOSS is biodiversity, given the costs of monitoring the environment and managing complex information, from space observations to species records including their genetic characteristics. But GEOSS goes beyond simple data sharing to encourage the publishing and combination of models, an approach which can ease the handling of complex multi-disciplinary questions. It is the purpose of this paper to illustrate these concepts by presenting eHabitat, a basic Web Processing Service (WPS) for computing the likelihood of finding ecosystems with equal properties to those specified by a user. When chained with other services providing data on climate change, eHabitat can be used for ecological forecasting and becomes a useful tool for decision-makers assessing different strategies when selecting new areas to protect. eHabitat can use virtually any kind of thematic data that can be considered as useful when defining ecosystems and their future persistence under different climatic or development scenarios. The paper will present the architecture and illustrate the concepts through case studies which forecast the impact of climate change on protected areas or on the ecological niche of an African bird.
Resumo:
Requirements are sensitive to the context in which the system-to-be must operate. Where such context is well-understood and is static or evolves slowly, existing RE techniques can be made to work well. Increasingly, however, development projects are being challenged to build systems to operate in contexts that are volatile over short periods in ways that are imperfectly understood. Such systems need to be able to adapt to new environmental contexts dynamically, but the contextual uncertainty that demands this self-adaptive ability makes it hard to formulate, validate and manage their requirements. Different contexts may demand different requirements trade-offs. Unanticipated contexts may even lead to entirely new requirements. To help counter this uncertainty, we argue that requirements for self-adaptive systems should be run-time entities that can be reasoned over in order to understand the extent to which they are being satisfied and to support adaptation decisions that can take advantage of the systems' self-adaptive machinery. We take our inspiration from the fact that explicit, abstract representations of software architectures used to be considered design-time-only entities but computational reflection showed that architectural concerns could be represented at run-time too, helping systems to dynamically reconfigure themselves according to changing context. We propose to use analogous mechanisms to achieve requirements reflection. In this paper we discuss the ideas that support requirements reflection as a means to articulate some of the outstanding research challenges.
Resumo:
The aim of this research is to consider the possible effect of an emerging technology platform on the uptake of online shopping: interactive (digital) Television (iTV), which enables viewers to select a variety of viewing options, publicity materials, games, entertainment and more recently shopping. An augmented version of the original TAM is applied to this study. Two new constructs are considered namely access and awareness together with perceived ease of use, perceived usefulness, perceived enjoyment and security. The results show that indeed the augmented TAM can be used as a predictive model for the adoption of iTV as an online shopping platform. It is concluded that access, perceived ease of use, perceived enjoyment and perceived usefulness are significant factors to determine the consumers’behavioural intentions towards the use of digital TV as a new shopping platform. However, awareness and security are considered to be insignificant with no effect on consumers’ behavioural intentions towards the new shopping medium.
Resumo:
Cyberstalking has recently emerged as a new and growing problem and is an area that will probably receive a higher profile within criminal law as more cases reach court (see Griffiths, 1999; Griffiths, Rogers and Sparrow, 1998; Bojic and McFarlane, 2002a; 2002b). For the purposes of this article we define cyberstalking as the use of information and communications technology (in particular the Internet) in order to harass individuals. Such harassment may include actions such as the transmission of offensive e-mail messages, identity theft and damage to data or equipment. Whilst a more comprehensive definition has been presented elsewhere (Bocij and McFarlane, 2002), it is hoped that the definition here is sufficient for those unfamiliar with this field. The stereotypical stalker conjures up images of someone harassing a victim who is the object of their affection. However, not all stalking incidents are motivated by unrequited love. Stalking can also be motivated by hate, a need for revenge, a need for power and/or racism. Similarly, cyberstalking can involve acts that begin with the issuing of threats and end in physical assault. We also make distinctions between conventional stalking and cyberstalking. Whilst some may view cyberstalking as an extension of conventional stalking, we believe cyberstalking should be regarded as an entirely new form of deviant behaviour. It is not surprising that cyberstalking is sometimes thought of as a trivial problem. A number of writers and researchers have suggested that cyberstalking and associated activities are of little genuine concern. Koch (2000), for example, goes as far as accusing those interested in cyberstalking as promoting hysteria over a problem that may be minuscule or even imaginary. The impression gained is that cyberstalking represents a relatively small problem where victims seldom suffer any real harm. Whilst there are no genuinely reliable statistics that can be used to determine how common cyberstalking incidents are, a great deal of evidence is available to show that cyberstalking is a significant and growing problem (Griffiths et al, 1998). For instance, CyberAngels (a well-known Internet safety organization) receives some 500 complaints of cyberstalking each day, of which up to 100 represent legitimate cases (Dean, 2000). Another Internet safety organization (Working to Halt Online Abuse) reports receiving an average of 100 cases per week (WHOA, 2001). To highlight the types of cyberstalking behaviours that take place and some of the major issues facing criminal law, we briefly examine four high profile cases of cyberstalking (adapted from Bocij and MacFarlane, 2002b).
Resumo:
This chapter introduces Native Language Identification (NLID) and considers the casework applications with regard to authorship analysis of online material. It presents findings from research identifying which linguistic features were the best indicators of native (L1) Persian speakers blogging in English, and analyses how these features cope at distinguishing between native influences from languages that are linguistically and culturally related. The first chapter section outlines the area of Native Language Identification, and demonstrates its potential for application through a discussion of relevant case history. The next section discusses a development of methodology for identifying influence from L1 Persian in an anonymous blog author, and presents findings. The third part discusses the application of these features to casework situations as well as how the features identified can form an easily applicable model and demonstrates the application of this to casework. The research presented in this chapter can be considered a case study for the wider potential application of NLID.
Resumo:
This volume explores sports mega-events, their social, political, and cultural characters, the value systems that they inscribe and draw on, the claims they make on us and the claims the organisers make for them, the spatial and ethical relationships they create, and the responses of civil societies to them. Our premise is that sports mega-events are not simply sporting or cultural phenomena. They are also political and economic events, characterised by the generation and projection of symbolic meanings – most obviously over the nature of statehood, economic power, and of collective cultural identity – and by social conflict, especially over land use, and over the extent and contours of public spending commitments. Because of their peculiar spatial and temporal organization, they raise questions about the relationships between global cultural and economic flows and particular local and national spaces. Because of their evolutionary characteristics, they ask us to consider not simply the time of the event but of the effects of the event on the long-term direction, implementation, and consequences of public policy.