945 resultados para Farmer based organizations
Resumo:
Lung transplantation has now been performed for more than 30 years in patients with end-stage chronic obstructive pulmonary disease (COPD). This disease is the major indication for lung transplantation, involving more than one third of the procedures worldwide. Although lung transplantation in COPD patients has clearly shown a positive impact on lung function, exercise capacity and quality of life, the survival benefit remains difficult to ascertain. Several methodological difficulties, particularly the absence of classical randomised studies, make the analysis especially challenging. There is however indirect but convincing evidence that lung transplantation can, when appropriate selection criteria are applied, provide not only an active post-transplant lifestyle but also a survival benefit for patients with COPD.
Resumo:
This article examines the extent and limits of nonstate forms of authority in international relations. It analyzes how the information and communication technology (ICT) infrastructure for the tradability of services in a global knowledge-based economy relies on informal regulatory practices for the adjustment of ICT-related skills. By focusing on the challenge that highly volatile and short-lived cycles of demands for this type of knowledge pose for ensuring the right qualification of the labor force, the article explores how companies and associations provide training and certification programs as part of a growing market for educational services setting their own standards. The existing literature on non-conventional forms of authority in the global political economy has emphasized that the consent of actors, subject to informal rules and some form of state support, remains crucial for the effectiveness of those new forms of power. However, analyses based on a limited sample of actors tend toward a narrow understanding of the issues concerned and fail to fully explore the differentiated space in which non state authority is emerging. This article develops a three-dimensional analytical framework that brings together the scope of the issues involved, the range of nonstate actors concerned, and the spatial scope of their authority. The empirical findings highlight the limits of these new forms of nonstate authority and shed light on the role of the state and international governmental organizations in this new context.
Resumo:
OBJECTIVES: Intercountry comparability between studies on medication use in pregnancy is difficult due to dissimilarities in study design and methodology. This study aimed to examine patterns and factors associated with medications use in pregnancy from a multinational perspective, with emphasis on type of medication utilised and indication for use. DESIGN: Cross-sectional, web-based study performed within the period from 1 October 2011 to 29 February 2012. Uniform collection of drug utilisation data was performed via an anonymous online questionnaire. SETTING: Multinational study in Europe (Western, Northern and Eastern), North and South America and Australia. PARTICIPANTS: Pregnant women and new mothers with children less than 1 year of age. PRIMARY AND SECONDARY OUTCOME MEASURES: Prevalence of and factors associated with medication use for acute/short-term illnesses, chronic/long-term disorders and over-the-counter (OTC) medication use. RESULTS: The study population included 9459 women, of which 81.2% reported use of at least one medication (prescribed or OTC) during pregnancy. Overall, OTC medication use occurred in 66.9% of the pregnancies, whereas 68.4% and 17% of women reported use of at least one medication for treatment of acute/short-term illnesses and chronic/long-term disorders, respectively. The extent of self-reported medicated illnesses and types of medication used by indication varied across regions, especially in relation to urinary tract infections, depression or OTC nasal sprays. Women with higher age or lower educational level, housewives or women with an unplanned pregnancy were those most often reporting use of medication for chronic/long-term disorders. Immigrant women in Western (adjusted OR (aOR): 0.55, 95% CI 0.34 to 0.87) and Northern Europe (aOR: 0.50, 95% CI 0.31 to 0.83) were less likely to report use of medication for chronic/long-term disorders during pregnancy than non-immigrants. CONCLUSIONS: In this study, the majority of women in Europe, North America, South America and Australia used at least one medication during pregnancy. There was a substantial inter-region variability in the types of medication used.
Resumo:
New evidence shows that older adults need more dietary protein than do younger adults to support good health, promote recovery from illness, and maintain functionality. Older people need to make up for age-related changes in protein metabolism, such as high splanchnic extraction and declining anabolic responses to ingested protein. They also need more protein to offset inflammatory and catabolic conditions associated with chronic and acute diseases that occur commonly with aging. With the goal of developing updated, evidence-based recommendations for optimal protein intake by older people, the European Union Geriatric Medicine Society (EUGMS), in cooperation with other scientific organizations, appointed an international study group to review dietary protein needs with aging (PROT-AGE Study Group). To help older people (>65 years) maintain and regain lean body mass and function, the PROT-AGE study group recommends average daily intake at least in the range of 1.0 to 1.2 g protein per kilogram of body weight per day. Both endurance- and resistance-type exercises are recommended at individualized levels that are safe and tolerated, and higher protein intake (ie, ≥1.2 g/kg body weight/d) is advised for those who are exercising and otherwise active. Most older adults who have acute or chronic diseases need even more dietary protein (ie, 1.2-1.5 g/kg body weight/d). Older people with severe kidney disease (ie, estimated GFR <30 mL/min/1.73m(2)), but who are not on dialysis, are an exception to this rule; these individuals may need to limit protein intake. Protein quality, timing of ingestion, and intake of other nutritional supplements may be relevant, but evidence is not yet sufficient to support specific recommendations. Older people are vulnerable to losses in physical function capacity, and such losses predict loss of independence, falls, and even mortality. Thus, future studies aimed at pinpointing optimal protein intake in specific populations of older people need to include measures of physical function.
Resumo:
Macrophage migration inhibitory factor (MIF) is a homotrimeric multifunctional proinflammatory cytokine that has been implicated in the pathogenesis of several inflammatory and autoimmune diseases. Current therapeutic strategies for targeting MIF focus on developing inhibitors of its tautomerase activity or modulating its biological activities using anti-MIF neutralizing antibodies. Herein we report a new class of isothiocyanate (ITC)-based irreversible inhibitors of MIF. Modification by benzyl isothiocyanate (BITC) and related analogues occurred at the N-terminal catalytic proline residue without any effect on the oligomerization state of MIF. Different alkyl and arylalkyl ITCs modified MIF with nearly the same efficiency as BITC. To elucidate the mechanism of action, we performed detailed biochemical, biophysical, and structural studies to determine the effect of BITC and its analogues on the conformational state, quaternary structure, catalytic activity, receptor binding, and biological activity of MIF. Light scattering, analytical ultracentrifugation, and NMR studies on unmodified and ITC-modified MIF demonstrated that modification of Pro1 alters the tertiary, but not the secondary or quaternary, structure of the trimer without affecting its thermodynamic stability. BITC induced drastic effects on the tertiary structure of MIF, in particular residues that cluster around Pro1 and constitute the tautomerase active site. These changes in tertiary structure and the loss of catalytic activity translated into a reduction in MIF receptor binding activity, MIF-mediated glucocorticoid overriding, and MIF-induced Akt phosphorylation. Together, these findings highlight the role of tertiary structure in modulating the biochemical and biological activities of MIF and present new opportunities for modulating MIF biological activities in vivo.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
This research report presents an application of systems theory to evaluating intellectual capital (IC) as organization's ability for self-renewal. As renewal ability is a dynamic capability of an organization as a whole, rather than a static asset or an atomistic competence of separate individuals within the organization, it needs to be understood systemically. Consequently, renewal ability has to be measured with systemic methods that are based on a thorough conceptual analysis of systemic characteristics of organizations. The aim of this report is to demonstrate the theory and analysis methodology for grasping companies' systemic efficiency and renewal ability. The volume is divided into three parts. The first deals with the theory of organizations as self-renewing systems. In the second part, the principles of quantitative analysis of organizations are laid down. Finally, the detailed mathematics of the renewal indices are presented. We also assert that the indices produced by the analysis are an effective tool for the management and valuation of knowledge-intensive companies.
Resumo:
Requirements-relatedissues have been found the third most important risk factor in software projects and as the biggest reason for software project failures. This is not a surprise since; requirements engineering (RE) practices have been reported deficient inmore than 75% of all; enterprises. A problem analysis on small and low maturitysoftware organizations revealed two; central reasons for not starting process improvement efforts: lack of resources and uncertainty; about process improvementeffort paybacks.; In the constructive part of the study a basic RE method, BaRE, was developed to provide an; easy to adopt way to introduce basic systematic RE practices in small and low maturity; organizations. Based on diffusion of innovations literature, thirteen desirable characteristics; were identified for the solution and the method was implemented in five key components:; requirements document template, requirements development practices, requirements; management practices, tool support for requirements management, and training.; The empirical evaluation of the BaRE method was conducted in three industrial case studies. In; this evaluation, two companies established a completely new RE infrastructure following the; suggested practices while the third company conducted continued requirements document; template development based on the provided template and used it extensively in practice. The; real benefits of the adoption of the method were visible in the companies in four to six months; from the start of the evaluation project, and the two small companies in the project completed; their improvement efforts with an input equal to about one person month. The collected dataon; the case studies indicates that the companies implemented new practices with little adaptations; and little effort. Thus it can be concluded that the constructed BaRE method is indeed easy to; adopt and it can help introduce basic systematic RE practices in small organizations.
Resumo:
Diplomityössä tutkittiin innovaatioiden omaksumista organisaatioissa, ja tarkoituksena oli selvittää tekijät, jotka vaikuttivat omaksumisajankohtaan sekä luokitella yritykset omaksujaryhmiin. Työn empiirinen osuus tarkasteli yritysten internet-kotisivujen omaksumista. Tutkimuksen empiirinen aineisto kerättiin postikyselyn avulla, ja vastausprosentti kyselyssä oli melko hyvä (60%). Aikaisempien tutkimusten pohjalta muodostettiin eri tekijöille mittarit, jotka analyysien perusteella olivat erittäin luotettavia. Regressioanalyysia sovellettiin, kun pyrittiin selvittämään omaksumisajankohtaan vaikuttavia tekijöitä, ja klusterianalyysiä käytettiin apuna omaksujaluokkien muodostamisessa. Omaksujaluokkien väliset erot selvitettiin varianssianalyyseillä. Tutkimuksessa löydettiin kolme omaksumisajankohtaan vaikuttavaa tekijää: (1) innovaation koettu suhteellinen hyöty, (2) yritysjohdon sitoutuminen omaksumisprosessiin, sekä (3) yrityksen strategisten partnereiden määrä. Yritykset luokiteltiin neljään omaksujaluokkaan (innovaattorit, aikaiset omaksujat, aikainen enemmistö ja myöhäinen enemmistö) innovatiivisuuden perusteella. Innovatiivisuutta mitattiin kolmella indikaattorilla, jotka olivat: (1) ajankohta, jolloin yritys tuli tietoiseksi internet-sivuista, (2) ajankohta, jolloin tehtiin omaksumispäätös sekä (3) aika, joka kului internet-sivujen käyttöönottoon. Omaksujaluokkien välillä tunnistettiin lukuisia eroja eri ominaisuuksien suhteen.
Resumo:
OBJECTIVE: Low-grade chronic inflammation is one potential mechanism underlying the well-established association between major depressive disorder (MDD) and increased cardiovascular morbidity. Both aspirin and statins have anti-inflammatory properties, which may contribute to their preventive effect on cardiovascular diseases. Previous studies on the potentially preventive effect of these drugs on depression have provided inconsistent results. The aim of the present paper was to assess the prospective association between regular aspirin or statin use and the incidence of MDD. METHOD: This prospective cohort study included 1631 subjects (43.6% women, mean age 51.7 years), randomly selected from the general population of an urban area. Subjects underwent a thorough physical evaluation as well as semi-structured interviews investigating DSM-IV mental disorders at baseline and follow-up (mean duration 5.2 years). Analyses were adjusted for a wide array of potential confounders. RESULTS: Our main finding was that regular aspirin or statin use at baseline did not reduce the incidence of MDD during follow-up, regardless of sex or age (hazard ratios, aspirin: 1.19; 95%CI, 0.68-2.08; and statins: 1.25; 95%CI, 0.73-2.14; respectively). LIMITATIONS: Our study is not a randomized clinical trial and could not adjust for all potential confounding factors, information on aspirin or statin use was collected only for the 6 months prior to the evaluations, and the sample was restricted to subjects between 35 and 66 years of age. CONCLUSION: Our data do not support a large scale preventive treatment of depression using aspirin or statins in subjects aged from 35 to 66 years from the community.
Resumo:
Pygmy hunter-gatherers from Central Africa have shared a network of socioeconomic interactions with non-Pygmy Bantu speakers since agropastoral lifestyle spread across sub-Saharan Africa. Ethnographic studies have reported that their diets differ in consumption of both animal proteins and starch grains. Hunted meat and gathered plant foods, especially underground storage organs (USOs), are dietary staples for pygmies. However, scarce information exists about forager-farmer interaction and the agricultural products used by pygmies. Since the effects of dietary preferences on teeth in modern and past pygmies remain unknown, we explored dietary history through quantitative analysis of buccal microwear on cheek teeth in well-documented Baka pygmies. We then determined if microwear patterns differ among other Pygmy groups (Aka, Mbuti, and Babongo) and between Bantu-speaking farmer and pastoralist populations from past centuries. The buccal dental microwear patterns of Pygmy hunter-gatherers and non-Pygmy Bantu pastoralists show lower scratch densities, indicative of diets more intensively based on nonabrasive foodstuffs, compared with Bantu farmers, who consume larger amounts of grit from stoneground foods. The Baka pygmies showed microwear patterns similar to those of ancient Aka and Mbuti, suggesting that the mechanical properties of their preferred diets have not significantly changed through time. In contrast, Babongo pygmies showed scratch densities and lengths similar to those of the farmers, consistent with sociocultural contacts and genetic factors. Our findings support that buccal microwear patterns predict dietary habits independent of ecological conditions and reflect the abrasive properties of preferred or fallback foods such as USOs, which may have contributed to the dietary specializations of ancient human populations.
Resumo:
Tämä tutkielma käsittelee high-tech kokonaisratkaisun rakentamista kehitysmaiden ja humanitääristen organisaatioiden markkinoille. Tavoitteena on löytää ne komponentit joita case-yritys Mediburner Ltd:n polttouuni tarvitsee rinnalleen. Jotta täydentävien elementtien määritteleminen olisi mahdollista, pitää ensin selvittää keitä ovat asiakkaat, ja mitkä ovat heidän tarpeensa. Tutkimusmetodina käytetään kuvailevaa case-tutkimusta. Empiirinen materiaali kerättiin henkilökohtaisissa- ja puhelinkeskusteluissa. Niihin henkilöihin, joiden tavoittaminen oli aikaeron vuoksi hankalaa, otettiin yhteyttä sähköpostitse. Toinen tietolähde olivat dokumentit. Tutkielmassa käytettiin internetsivuja, sairaalajätehuoltoon liittyvien kansainvälisten konferenssien ja kenttätutkimusten raportteja sekä humanitääristen organisaatioiden suosituksia ja lehdistötiedotteita. Tulokseksi saatiin kymmenen tarvittavaa tukevien elementtien ryhmää: lisälaitteet, astiat jätteen keräilyyn ja tilapäiseen varastointiin, polttoaine, sähkö, logistiset ratkaisut, asennus ja käyttöönotto, huolto- ja korjauspalvelut, koulutus, help-desk –palvelu ja rahoitus. Lisäksi tarvitaan imago, joka konkretisoi tarjotun ratkaisun hyödyt. Yksi toimivan imagotyylin perusta voisi olla vastuullisuus.
Resumo:
Alcohol use is one of the leading modifiable morbidity and mortality risk factors among young adults. 2 parallel-group randomized controlled trial with follow-up at 1 and 6 months. Internet based study in a general population sample of young men with low-risk drinking, recruited between June 2012 and February 2013. Intervention: Internet-based brief alcohol primary prevention intervention (IBI). The IBI aims at preventing an increase in alcohol use: it consists of normative feedback, feedback on consequences, calorific value alcohol, computed blood alcohol concentration, indication that the reported alcohol use is associated with no or limited risks for health. Intervention group participants received the IBI. Control group (CG) participants completed only an assessment. Alcohol use (number of drinks per week), binge drinking prevalence. Analyses were conducted in 2014-2015. Of 4365 men invited to participate, 1633 did so; 896 reported low-risk drinking and were randomized (IBI: n = 451; CG: n = 445). At baseline, 1 and 6 months, the mean (SD) number of drinks/week was 2.4(2.2), 2.3(2.6), 2.5(3.0) for IBI, and 2.4(2.3), 2.8(3.7), 2.7(3.9) for CG. Binge drinking, absent at baseline, was reported by 14.4% (IBI) and 19.0% (CG) at 1 month and by 13.3% (IBI) and 13.0% (CG) at 6 months. At 1 month, beneficial intervention effects were observed on the number of drinks/week (p = 0.05). No significant differences were observed at 6 months. We found protective short term effects of a primary prevention IBI. Controlled-Trials.com ISRCTN55991918.
Resumo:
The thesis studies role based access control and its suitability in the enterprise environment. The aim is to research how extensively role based access control can be implemented in the case organization and how it support organization’s business and IT functions. This study points out the enterprise’s needs for access control, factors of access control in the enterprise environment and requirements for implementation and the benefits and challenges it brings along. To find the scope how extensively role based access control can be implemented into the case organization, firstly is examined the actual state of access control. Secondly is defined a rudimentary desired state (how things should be) and thirdly completed it by using the results of the implementation of role based access control application. The study results the role model for case organization unit, and the building blocks and the framework for the organization wide implementation. Ultimate value for organization is delivered by facilitating the normal operations of the organization whilst protecting its information assets.
Resumo:
Allostatic load (AL) is a marker of physiological dysregulation which reflects exposure to chronic stress. High AL has been related to poorer health outcomes including mortality. We examine here the association of socioeconomic and lifestyle factors with AL. Additionally, we investigate the extent to which AL is genetically determined. We included 803 participants (52% women, mean age 48±16years) from a population and family-based Swiss study. We computed an AL index aggregating 14 markers from cardiovascular, metabolic, lipidic, oxidative, hypothalamus-pituitary-adrenal and inflammatory homeostatic axes. Education and occupational position were used as indicators of socioeconomic status. Marital status, stress, alcohol intake, smoking, dietary patterns and physical activity were considered as lifestyle factors. Heritability of AL was estimated by maximum likelihood. Women with a low occupational position had higher AL (low vs. high OR=3.99, 95%CI [1.22;13.05]), while the opposite was observed for men (middle vs. high OR=0.48, 95%CI [0.23;0.99]). Education tended to be inversely associated with AL in both sexes(low vs. high OR=3.54, 95%CI [1.69;7.4]/OR=1.59, 95%CI [0.88;2.90] in women/men). Heavy drinking men as well as women abstaining from alcohol had higher AL than moderate drinkers. Physical activity was protective against AL while high salt intake was related to increased AL risk. The heritability of AL was estimated to be 29.5% ±7.9%. Our results suggest that generalized physiological dysregulation, as measured by AL, is determined by both environmental and genetic factors. The genetic contribution to AL remains modest when compared to the environmental component, which explains approximately 70% of the phenotypic variance.