28 resultados para soliciting


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Desenvolupament d'un sistema d'informació, és a dir, d'una aplicació Java empresarial, que s'adapti a les necessitats de l'empresa sol·licitant. Tota l'aplicació estarà realitzada amb el llenguatge de programació Java16, realitzant un anàlisi i disseny orientat a objectes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Personalised ubiquitous services have rapidly proliferated due technological advancements in sensing, ubiquitous and mobile computing. Evolving societal trends, business and the economic potential of Personal Information (PI) have overlapped the service niches. At the same time, the societal thirst for more personalised services has increased and are met by soliciting deeper and more privacy invasive PI from customers. Consequentially, reinforcing traditional privacy challenges and unearthed new risks that render classical safeguards ine ective. The absence of solutions to criticise personalised ubiquitous services from privacy perspectives, aggravates the situation. This thesis presents a solution permitting users' PI, stored in their mobile terminals to be disclosed to services in privacy preserving manner for personalisation needs. The approach termed, Mobile Electronic Personality Version 2 (ME2.0), is compared to alternative mechanisms. Within ME2.0, PI handling vulnerabilities of ubiquitous services are identi ed and sensitised on their practices and privacy implications. Vulnerability where PI may leak through covert solicits, excessive acquisitions and legitimate data re-purposing to erode users privacy are also considered. In this thesis, the design, components, internal structures, architectures, scenarios and evaluations of ME2.0 are detailed. The design addresses implications and challenges leveraged by mobile terminals. ME2.0 components and internal structures discusses the functions related to how PI pieces are stored and handled by terminals and services. The architecture focusses on di erent components and their exchanges with services. Scenarios where ME2.0 is used are presented from di erent environment views, before evaluating for performance, privacy and usability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Presentation at Open Repositories 2014, Helsinki, Finland, June 9-13, 2014

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Online sexual solicitation (solicitation) of youth has received widespread media and research attention during the last decade. The prevalence rates of youth who have experienced solicitation or solicitation attempts vary between studies depending on the methodology used (e.g., whether youth or adults are the target study group). In studies focusing on youth victims, the prevalence of solicitation attempts made by adults during the past year is typically reported to be between 5 and 9%. Adults who solicit youth online have been found to use deception and other manipulative behaviors to gain access to sexual activities with youth. However, previous studies have lacked a control group of adults who solicit other adults online. Without this comparison, one could argue that deceiving others online about one’s identity, and engaging in manipulative behaviors, is an inherent part of most online sexual interactions with strangers. Additionally, little is known about the associations between manipulative behaviors and the solicitation outcomes. In research concerning offline sexual behaviors, it has been noted that situational factors, such as sexual arousal, may alter both sexual interest and behavior. The effects of situational factors on online sexual behaviors have been less extensively studied (especially so with a quantitative approach); no studies have to date focused on adults’ solicitation of youth. Investigating the role of a lowered sexual age preference and the role of situational factors in the soliciting adults could be an important step in order to receive deeper knowledge of the role of traits and states in the context of solicitation. Additionally, there is a lack of knowledge of the effect of the age of the youth. Although previous studies on solicitation has found that older youth, compared with younger youth and children, are more often solicited, the possible reasons for this have not been investigated. Are adults who solicit youth affected by legal deterrence (through the legal age of consent), is it because older youth are more available online, or are the adults’ age preferences merely a product of a normally distributed age preference in the population? The purpose of the present thesis was fivefold: 1) to obtain an estimate of the frequency of adults’ solicitation of youth as self-reported and observed in actual behavior; 2) to explore whether the legal age of consent (LAC) affects solicitation frequency, or whether a normally distributed sexual age preference more accurately describe the proportion of solicited youth of different ages; 3) to investigate the associations of both traits (e.g., lower sexual age preference) and states (immediate situational factors, such as alcohol intoxication), and the solicitation target; 4) to explore whether adults who solicit youth and adults who solicit adults are equally deceitful and manipulative online, and whether the different solicitation outcomes are as common in both groups; and 5) to investigate whether the deceitful and manipulative behaviors engaged in had different associations with the solicitation outcomes depending on the age of the solicited. In the survey study, a convenience sample of 1393 adult participants (aged 18 years or older) self-reported any online communication with strangers during the past year. Of these, 56% (776 respondents) reported that they had solicited or attempted to solicit at least one stranger. Of the respondents, 453 (58.4%) were men, and 323 (41.6%) were women. Participants with only adult contacts (18 years or older) constituted the majority (640 respondents). In contrast, 136 individuals reported a youth contact (a 13 year old or younger, or a 14 to 17-year old). Approximately half of the participants were men in the adult contact group, while 75% of the participants were men in the youth contact group. Approximately 60% of the participants with youth contacts were recruited from two websites associated with a pedophilic sexual interest. In an online quasi-experimental study, with researchers impersonating youth of different ages (10–18 year olds) in chat rooms, 251 online conversations with chat room visitors made up the entire sample. All chat room visitors alleged to be men. The self-reported frequency of having solicited youth (0–17-year olds) during the past year was approximately 10% in our sample of adults who reported communicating with any strangers online. When we observed this behavior in chat rooms, we found that approximately 30% of the chat room visitors who believed they interacted with a 10 to 14 year old attempted to solicit the youth. We found that solicitation attempts increased equally much when increasing the age of the impersonated youth from 14 to 16, as from 16 to 18. Thus, we concluded that a normally distributed age preference in the population was a more plausible explanation to the effect of the age of the solicited, rather than the LAC (here; 15 and 16). If the chat room visitors would have been deterred only by the LAC, we would have expected that the change in amount of solicitation attempts from an illegal age group to a legal age group would have been significantly stronger than changes between age groups within illegal-illegal and legal-legal groups. Our subsample of survey participants from the pedophilia-related websites expectedly reported that they had solicited youth more often in comparison to the sample gathered through general (i.e., not associated with any particular sexual preference) websites. We also found that participants with a youth contact reported higher levels of sexual arousal and shame before the sexual interaction with their online contact, compared with participants with an adult contact. Additionally, the participants with youth contacts who reported consumption of child- and adolescent pornography also reported being more sexually aroused before the interaction, compared to the participants with youth contacts who did not report consumption of these kinds of pornography. We also found clear indications that the online sexual interaction had an alleviatory effect on reported levels of sadness, boredom and stress, independent of the age of the contact. Generally, the participants with youth and adult contacts reported deceiving their contacts as often and suggesting keeping the communication a secret from someone as often. Participants with a youth contact, however, reported using more persuasion techniques for online sexual purposes or for the purpose of an offline meeting, compared to those with an adult contact. In the chat rooms, we found that more indirect ways of future sexual communication (e.g., continuing chatting) was suggested by the chat room visitors that were under the assumption of interacting with youth aged 10 to 14, compared with more direct means (e.g., meeting offline). Survey participants with youth contacts who had used deception, suggested keeping the interactions a secret, and/or persuaded their contact by appealing to the contacts feelings of love and attachment for the participant had also more often engaged in cybersex with the contact. No other manipulative behaviors were associated with the other investigated solicitation outcomes (receiving a sexual picture, meeting offline, and engaging in sexual contact offline) within this group of participants. However, using deception, suggesting secrecy and using persuasion was also positively associated with certain solicitation outcomes within participants with an adult contact. In summary, adults’ solicitation of youth is much more frequent when observed in chat rooms than self-reported. Additionally, an underlying lowered sexual age preference seems to be a motivating factor on a group level in adults who solicit youth. We concluded that directed prevention efforts should be made on pedophiliarelated websites. Additionally, the role of situational factors, especially sexual arousal in persons with a pedo- or hebephilic sexual interest should be investigated further in the context of online sexual solicitation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Les cellules dendritiques (DC) sont parmi les premières cellules à rencontrer le virus d’immunodéficience humaine (VIH) au niveau des muqueuses. De plus, le fait que les DC sont, de manière directe ou indirecte par le virus et ses composantes, altérées tant par leur nombre, leur phénotype et leur fonction suggère leur implication dans les dérégulations des cellules B. Selon cette hypothèse, des études longitudinales impliquant des individus infectés au VIH-1 présentant différents profils de progression clinique menées dans notre laboratoire ont démontré que les altérations des cellules B sont concomitantes à une augmentation de l’expression de BLyS/BAFF dans le sang ainsi que par les DC myéloïdes (mDC) sanguines. De plus, lors de travaux antérieurs utilisant le modèle murin VIH-transgénique, les altérations des cellules B ont démontré une implication des DC et d’un excès de BLyS/BAFF, et ce, dépendamment du facteur négatif du VIH (Nef). Dans cette optique, nous investiguons dans cette présente étude l’implication de Nef dans la modulation du phénotype des DC ainsi que dans les dérégulations des cellules B. Chez tous les patients virémiques infectés au VIH-1, nous avons détecté la présence de Nef dans le plasma ainsi qu’au niveau des mDC et de leurs précurseurs d’origine monocytaire, tout au long du suivi de la progression clinique et au-delà de la thérapie antirétrovirale (ART). La surexpression de BLyS/BAFF est associée à la présence de Nef au niveau des mDC et de leur précurseur.. Des essais in vitro ont permis de démontrer l’induction d’un phénotype proinflammatoire par des mDC dérivés de monocytes lorsqu’en présence de Nef soluble, via l’augmentation de l’expression de BLyS/BAFF et de TNF-α, et où cet effet est bloqué par l’ajout de l’acide rétinoïque. Nos résultats suggèrent donc que Nef est impliquée dans le déclenchement et la persistance des dérégulations des cellules B retrouvées chez les individus infectés au VIH-1. Basé sur nos observations, une thérapie adjointe impliquant le blocage de BLyS/BAFF et/ou Nef pourrait contribuer au contrôle de l’inflammation et des altérations des cellules B. De plus, la quantification de Nef post-ART pourrait s’avérer utile dans l’évaluation du statut des réservoirs. Précédemment, nous avons démontré que les dérégulations des cellules B sanguines de ces mêmes individus présentant un profil de progression rapide et classique sont accompagnées par l’augmentation de la fréquence d’une population partageant des caractéristiques des cellules B transitionnelles immatures (TI) et des cellules B de la zone marginale (ZM), que nous avons nommé les cellules B précurseur de la ZM. Toutefois, cette population est préservée chez les contrôleurs élites, chez qui nous avons trouvé une diminution significative de la fréquence des cellules B de la ZM présentant des marqueurs phénotypiques plus matures. Récemment, ces cellules ont été associées à un potentiel de fonction régulatrice (Breg), motivant ainsi notre poursuite, dans cette étude, de la caractérisation de ces cellules B. Comme pour les individus non infectés au VIH-1, nous avons démontré que les cellules B matures de la ZM contrôlent leur capacité de production d’IL-10 chez les contrôleurs élites, contrairement à une augmentation chez les progresseurs rapides et classiques. Aussi, les cellules B précurseur de la ZM des contrôleurs élites fournissent une expression importante de LT-α lorsque comparés aux individus non infectés au VIH-1, alors que cet apport de LT-α est attribué aux cellules B TI chez les progresseurs. Le contrôle de la progression clinique semble associé à un ratio en faveur de LT-α vs IL-10 au niveau des cellules B précurseur de la ZM. Nos résultats suggèrent qu’un maintien de l’intégrité du potentiel régulateur ainsi qu’une expression augmentée de LT-α par les cellules B de première ligne, telles les populations de la ZM, sont impliqués dans le contrôle de la progression clinique du VIH-1, possiblement par leur contribution à la modulation et l’homéostasie immunitaire. De telles populations doivent être considérées lors de l’élaboration de vaccins, ces derniers cherchant à générer une réponse protectrice de première ligne et adaptative.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Travail dirigé présenté à la Faculté des sciences infirmières en vue de l'obtention du grade de Maître ès sciences (M. Sc.) en sciences infirmières option administration des services infirmiers

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La révision du code est un procédé essentiel quelque soit la maturité d'un projet; elle cherche à évaluer la contribution apportée par le code soumis par les développeurs. En principe, la révision du code améliore la qualité des changements de code (patches) avant qu'ils ne soient validés dans le repertoire maître du projet. En pratique, l'exécution de ce procédé n'exclu pas la possibilité que certains bugs passent inaperçus. Dans ce document, nous présentons une étude empirique enquétant la révision du code d'un grand projet open source. Nous investissons les relations entre les inspections des reviewers et les facteurs, sur les plans personnel et temporel, qui pourraient affecter la qualité de telles inspections.Premiérement, nous relatons une étude quantitative dans laquelle nous utilisons l'algorithme SSZ pour détecter les modifications et les changements de code favorisant la création de bogues (bug-inducing changes) que nous avons lié avec l'information contenue dans les révisions de code (code review information) extraites du systéme de traçage des erreurs (issue tracking system). Nous avons découvert que les raisons pour lesquelles les réviseurs manquent certains bogues était corrélées autant à leurs caractéristiques personnelles qu'aux propriétés techniques des corrections en cours de revue. Ensuite, nous relatons une étude qualitative invitant les développeurs de chez Mozilla à nous donner leur opinion concernant les attributs favorables à la bonne formulation d'une révision de code. Les résultats de notre sondage suggèrent que les développeurs considèrent les aspects techniques (taille de la correction, nombre de chunks et de modules) autant que les caractéristiques personnelles (l'expérience et review queue) comme des facteurs influant fortement la qualité des revues de code.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ants often form mutualistic interactions with aphids, soliciting honeydew in return for protective services. Under certain circumstances, however, ants will prey upon aphids. In addition, in the presence of ants aphids may increase the quantity or quality of honeydew produced, which is costly. Through these mechanisms, ant attendance can reduce aphid colony growth rates. However, it is unknown whether demand from within the ant colony can affect the ant-aphid interaction. In a factorial experiment, we tested whether the presence of larvae in Lasius niger ant colonies affected the growth rate of Aphis fabae colonies. Other explanatory variables tested were the origin of ant colonies (two separate colonies were used) and previous diet (sugar only or sugar and protein). We found that the presence of larvae in the ant colony significantly reduced the growth rate of aphid colonies. Previous diet and colony origin did not affect aphid colony growth rates. Our results suggest that ant colonies balance the flow of two separate resources from aphid colonies- renewable sugars or a protein-rich meal, depending on demand from ant larvae within the nest. Aphid payoffs from the ant-aphid interaction may change on a seasonal basis, as the demand from larvae within the ant colony waxes and wanes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: It has been shown that specific competence is necessary for preventing and managing conflicts in healthcare settings. The aim of this descriptive and correlation study was to investigate and compare the self-reported conflict management competence (CMC) of nursing students who were on the point of graduating (NSPGs), and the CMC of registered nurses (RNs) with professional experience. Methods: The data collection, which consisted of soliciting answers to items measuring CMC in the Nurse Professional Competence (NPC) Scale, was performed as a purposive selection of 11 higher education institutions (HEIs) in Sweden. Three CMC items from the NPC Scale were answered by a total of 569 nursing students who were on the point of graduating and 227 RN registered nurses with professional experience. Results: No significant differences between NSPGs and RNs were found, and both groups showed a similar score pattern, with the lowest score for the item: “How do you perceive your ability to develop the group and strengthen competence in conflict management and problem-solving, based on knowledge of group dynamics?”. RNs with long professional experience (>24 months) rated their overall CMC as significantly better than RNs with short (<24 months) professional experience did (p = .05). NSPGs who had experience of international studies during their nursing education reported higher CMC, compared with those who did not have this experience (p = .03). RNs who reported a high degree of utilisation of CMC during the previous month scored higher regarding self-reported overall CMC (p < .0001). Conclusions: Experience of international studies during nursing education, or long professional experience, resulted in higher self-reported CMC. Hence, the CMC items in the NPC Scale can be suitable for identifying self-reported conflict management competence among NSPGs and RNs

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research in the area of teacher training in English as a Foreign Language (CELANI, 2003, 2004, 2010; PAIVA, 2000, 2003, 2005; VIEIRA-ABRAHÃO, 2010) articulates the complexity of beginning teachers classroom contexts aligned with teaching language as a social and professional practice of the teacher in training. To better understand this relationship, the present study is based on a corpus of transcribed interviews and questionnaires applied to 28 undergraduate students majoring in Letters/English emphasis, at a public university located in the interior of the Western Amazon region, soliciting their opinions about the reforms made in the curriculum of this Major. Interviews and questionnaires were used as data collection instruments to trace a profile of the students organized in Group 1, with freshmen and sophomore undergraduates who are following the 2009 curriculum, and Group 2, with junior and senior undergraduates who are following the 2006 curriculum. The objectives are to identify, to characterize and to analyze the types of pronouns, roles and social actors represented in the opinions of these students in relation to their teacher training curriculum. The theoretical support focuses on the challenge of historical and contemporary routes from English teachers initial education programs (MAGALHÃES; LIBERALLI, 2009; PAVAN; SILVA, 2010; ALVAREZ, 2010; VIANA, 2011; PAVAN, 2012). Our theoretical perspective is based on the Systemic Functional Grammar of Halliday (1994), Halliday and Hasan (1989), Halliday and Matthiessen (2004), Eggins (1994; 2004) and Thompson (2004). We focus on the concept of the Interpersonal meaning, specifically regarding the roles articulated in the studies by Delu (1991), Thompson and Thetela (1995), and in the Portuguese language such as Ramos (1997), Silva (2006) and Cabral (2009). Moreover, we ascribe van Leeuwen s (1997; 2003) theory of Representation of Social Actors as a theoretical framework in order to identify the sociological aspect of social actors represented in the students discourse. Within this scenario, the analysis unfolds on three levels: grammatical (pronouns), semantic (roles), and discursive (social actors). For the analysis of interpersonal realizations present in the students opinions, we use the computational program WordSmith Tools (SCOTT, 2010) and its applications Wordlist and Concord to quantify the occurrences of the pronouns I, You and They, which characterize the roles and social actors of the corpus. The results show that the students assigned the following roles to themselves: (i) apprentice to express their initial process of English language learning; (ii) freshman to reveal their choice of Major in Letters/English emphasis; (iii) future teacher to relate their expectations towards a practicing professional. To assign the roles to professors in the major, the students used the metaphor of modality (I think) to indicate the relationship of teacher training, while they are in the role of a student and as a future teacher. From these evidences the representation of the students as social actors emerges in roles such as: (i) active roles; (ii) passive roles and (iii) personalized roles. The social actors represented in the opinions of the students reflect the inclusion of these roles assigned to the actions expressed about their experiences and expectations derived from their teacher training classroom

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As a consequence of domestication, dogs have a special readiness for communication with humans. We here investigate whether a dog might be able to acquire and consistently produce a set of arbitrary signs in her communication with humans, as was demonstrated in ""linguistic"" individuals of several species. A female mongrel dog was submitted to a training schedule in which, after basic command training and after acquiring the verbal labels of rewarding objects or activities, she learned to ask for such objects or activities by selecting lexigrams and pressing keys on a keyboard. Systematic records taken during spontaneous interaction with one of the experimenters showed that lexigrams were used in an appropriate, intentional way, in accordance with the immediate motivational context. The dog only utilized the keyboard in the experimenter`s presence and gazed to him more frequently after key pressing than before, an indication that lexigram use did have communicative content. Results suggest that dogs may be able to learn a conventional system of signs associated to specific objects and activities, functionally analogous to spontaneous soliciting behaviors and point to the potential fruitfulness of the keyboard/lexigram procedure for studying dog communication and cognition. This is the first report to systematically analyze the learning of arbitrary sign production in dogs.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Under President Ronald Reagan, the White House pursued a complex foreign policy towards the Contras, rebels in trying to overthrow the Sandinista regime in Nicaragua, in Nicaragua. In 1979, the leftist Sandinista government seized power in Nicaragua. The loss of the previous pro-United States Somoza military dictatorship deeply troubled the conservatives, for whom eradication of communism internationally was a top foreign policy goal. Consequently, the Reagan Administration sought to redress the policy of his predecessor, Jimmy Carter, and assume a hard line stance against leftist regimes in Central America. Reagan and the conservatives within his administration, therefore, supported the Contra through military arms, humanitarian aid, and financial contributions. This intervention in Nicaragua, however, failed to garner popular support from American citizens and Democrats. Consequently, between 1982 and 1984 Congress prohibited further funding to the Contras in a series of legislation called the Boland Amendments. These Amendments barred any military aid from reaching the Contras, including through intelligence agencies. Shortly after their passage, Central Intelligence Agency Director William Casey and influential members of Reagan¿s National Security Council (NSC) including National Security Advisor Robert McFarlane, NSC Aide Oliver North, and Deputy National Security Advisor John Poindexter cooperated to identify and exploit loopholes in the legislation. By recognizing the NSC as a non-intelligence body, these masterminds orchestrated a scheme in which third parties, including foreign countries and private donors, contributed both financially and through arms donations to sustain the Contras independently of Congressional oversight. This thesis explores the mechanism and process of soliciting donations from private individuals, recognizing the forces and actors that created a situation for covert action to continue without detection. Oliver North, the main actor of the state, worked within his role as an NSC bureaucrat to network with influential politicians and private individuals to execute the orders of his superiors and shape foreign policy. Although Reagan articulated his desire for the Contras to remain a military presence in Nicaragua, he delegated the details of policy to his subordinates, which allowed this scheme to flourish. Second, this thesis explores the individual donors, analyzing their role as private citizens in sustaining and encouraging the policy of the Reagan Administration. The Contra movement found non-state support from followers of the New Right, demonstrated through financial and organizational assistance, that allowed the Reagan Administration¿s statistically unpopular policy in Nicaragua to continue. I interpret these donors as politically involved, but politically philanthropic, individuals, donating to their charity of choice to further the principles of American freedom internationally in a Cold War environment. The thesis then proceeds to assess the balance of power between the executive and other political actors in shaping policy, concluding that the executive cannot act alone in the formulation and implementation of foreign policy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Faculty in the Department of Animal Science initiated soliciting of funds in 1987 to establish a permanent endowment to recognize the distinguished career and major contributions of Dr. Wise Burroughs, a distinguished professor in animal science at Iowa State University. The endowment was established in the Iowa State University Foundation in 1991. The purpose of the fund is to support research and graduate education in the areas of fundamental factors regulating growth in food-producing animals, with emphasis on ruminants; to enhance growth of animals with the goal of improving the competitive position of ruminants as food-producing animals; and to develop innovative approaches to ruminant nutrition and/or growth enhancement as a means to improve desirability of meat produced by food animals. Dr. Burroughs’ research resulted in important and significant developments in technology for modern production systems for beef cattle. He was widely known for his ability to communicate complex ideas and research results for use by those involved in the animal industry. The current Burroughs Team has established three research projects: 1) Ghrelin--How does ghrelin affect blood and body composition in rats?; 2) Use of 25- hydroxyvitamin D3 to improve tenderness of beef; 3) Redesigning beef cattle to have a more healthful fatty acid composition.