898 resultados para Security Analysis
Resumo:
OBJECTIVE Identify spatial distribution patterns of the proportion of nonadherence to tuberculosis treatment and its associated factors.METHODS We conducted an ecological study based on secondary and primary data from municipalities of the metropolitan area of Buenos Aires, Argentina. An exploratory analysis of the characteristics of the area and the distributions of the cases included in the sample (proportion of nonadherence) was also carried out along with a multifactor analysis by linear regression. The variables related to the characteristics of the population, residences and families were analyzed.RESULTS Areas with higher proportion of the population without social security benefits (p = 0.007) and of households with unsatisfied basic needs had a higher risk of nonadherence (p = 0.032). In addition, the proportion of nonadherence was higher in areas with the highest proportion of households with no public transportation within 300 meters (p = 0.070).CONCLUSIONS We found a risk area for the nonadherence to treatment characterized by a population living in poverty, with precarious jobs and difficult access to public transportation.
Resumo:
Trabalho apresentado no âmbito do Mestrado em Engenharia Informática, como requisito parcial para obtenção do grau de Mestre em Engenharia Informática
Resumo:
Dissertation submitted in partial fulfillment of the requirements for the Degree of Master of Science in Geospatial Technologies.
Resumo:
Dissertação para obtenção do Grau de Mestre em Engenharia Informática
Resumo:
ABSTRACT - The Patient Protection and Affordable Care Act shook the foundations of the US health system, offering all Americans access to health care by changing the way the health insurance industry works. As President Obama signed the Act on 23 March 2010, he said that it stood for “the core principle that everybody should have some basic security when it comes to their health care”. Unlike the U.S., the Article 64 of the Portuguese Constitution provides, since 1976, the right to universal access to health care. However, facing a severe economic crisis, Portugal has, under the supervision of the Troika, a tight schedule to implement measures to improve the efficiency of the National Health Service. Both countries are therefore despite their different situation, in a conjuncture of reform and the use of new health management measures. The present work, using a qualitative research methodology examines the Affordable Care Act in order to describe its principles and enforcement mechanisms. In order to describe the reality in Portugal, the Portuguese health system and the measures imposed by Troika are also analyzed. The intention of this entire analysis is not only to disclose the innovative U.S. law, but to find some innovative measures that could serve health management in Portugal. Essentially we identified the Exchanges and Wellness Programs, described throughout this work, leaving also the idea of the possibility of using them in the Portuguese national health system.
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Economics from the NOVA – School of Business and Economics
Resumo:
A producer of 5.4 M bbl/d, totalling almost half of the consumption of the entire European Union, the Gulf of Guinea is a fundamental lifeline and maritime link between Europe, the Americas and Africa. Geographically positioned as a staging post for transit originating in Latin America and coupled with its relatively porous borders, the region is also the perfect stepping stone for contraband heading to European shores. While blessed with an enviable wealth of marine and mineral resources, the region is also plagued by an ever-increasing spectre of maritime piracy; accounting for around 30% of incidents in African waters from 2003 to 2011. It is for these reasons that this research centres around the issues of maritime security in the Gulf of Guinea, with a particular focus on the first two decades of the 21st century. This research looks to examine the overall picture of the present state of play in the area, before going on to provide an analysis of potential regional developments in maritime security. This research begins with the analysis of concepts/phenomena that have played a notable role in the shaping of the field of maritime security, namely Globalisation and security issues in the post-Cold War era. The ensuing chapter then focuses in on the Gulf of Guinea and the issues dominating the field of maritime security in the region. The penultimate chapter presents a SWOT analysis, undertaken as part of this research with the aim of correlating opinions from a variety of sectors/professions regarding maritime security in the Gulf of Guinea. The final chapter builds upon the results obtained from the abovementioned SWOT analysis, presenting a series of potential proposals/strategies that can contribute to the field of maritime security in the region over the coming years. This research draws to a close with the presentation of conclusions taken from this particular investigation, as well as a final overview of the earlier presented proposals applicable to the field of maritime security during the second decade of the 21st century.
Resumo:
This thesis provides a complete analysis of the Standard Capital Requirements given by Solvency II for a real insurance portfolio. We analyze the investment portfolio of BPI Vida e Pensões, an insurance company affiliated with a Portuguese bank BPI, both at security, sub-portfolio and asset class levels. By using the Standard Formula from EIOPA, Total SCR amounts to 239M€. This value is mostly explained by Market and Default Risk whereas the former is driven by Spread and Concentration Risks. Following the methodology of Leblanc (2011), we examine the Marginal Contribution of an asset to the SCR which allows for the evaluation of the risks of each security given its characteristics and interactions in the portfolio. The top contributors to the SCR are Corporate Bonds and Term Deposits. By exploring further the composition of the portfolio, our results show that slight changes in allocation of Term and Cash Deposits have severe impacts on the total Concentration and Default Risks, respectively. Also, diversification effects are very relevant by representing savings of 122M€. Finally, Solvency II represents an opportunity for the portfolio optimization. By constructing efficient frontiers, we find that as the target expected return increases, a shift from Term Deposits/ Commercial Papers to Eurozone/Peripheral and finally Equities occurs.
Resumo:
I test the Duffie, Gârleanu, and Pedersen hypothesis that security prices incorporate expected future securities lending income. To determine whether institutional investors anticipate gains from future lending of securities, I examine their trading behavior around loan-fee increases. The evidence suggests that institutions buy shares in response to an increase in lending fees, and that this could explain the premium associated with high- lending-fee stocks. Expected future lending income affects stock prices, although the effect seems to be attenuated by the negative information that arises from short selling.
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.
Resumo:
Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.
Resumo:
Dissertação de Mestrado em Estratégia
Resumo:
This article addresses the normative dilemma located within the application of `securitization,’ as a method of understanding the social construction of threats and security policies. Securitization as a theoretical and practical undertaking is being increasingly used by scholars and practitioners. This scholarly endeavour wishes to provide those wishing to engage with securitization with an alternative application of this theory; one which is sensitive to and self-reflective of the possible normative consequences of its employment. This article argues that discussing and analyzing securitization processes have normative implications, which is understood here to be the negative securitization of a referent. The negative securitization of a referent is asserted to be carried out through the unchallenged analysis of securitization processes which have emerged through relations of exclusion and power. It then offers a critical understanding and application of securitization studies as a way of overcoming the identified normative dilemma. First, it examines how the Copenhagen School’s formation of securitization theory gives rise to a normative dilemma, which is situated in the performative and symbolic power of security as a political invocation and theoretical concept. Second, it evaluates previous attempts to overcome the normative dilemma of securitization studies, outlining the obstacles that each individual proposal faces. Third, this article argues that the normative dilemma of applying securitization can be avoided by firstly, deconstructing the institutional power of security actors and dominant security subjectivities and secondly, by addressing countering or alternative approaches to security and incorporating different security subjectivities. Examples of the securitization of international terrorism and immigration are prominent throughout.
Resumo:
Since the early nineties, several hundreds of Chinese immigrants have settled in what has become known as the 'Chinese wholesalers area'. For the past two years, Chinese wholesalers in Aubervilliers have been calling on public authorities to address the problem of street robberies and violent thefts, which they experience on a daily basis. Yet, they have been encouraged by the authorities to ensure their own protection, by - amongst other things - installing surveillance cameras to film the streets. This is illegal according to French legislation on camera surveillance. Knowing this, why have surveillance cameras been adopted as a solution? This question guides the ethnographic analysis presented here of a situation where the installation of surveillance cameras was locally negotiated by the main actors involved - namely, the wholesalers' representatives and the police.
Resumo:
This paper analyses the extent to which individual and workplacecharacteristics and regional policies influence the use and duration ofparental leave in Spain. The research is based on a sample of 125,165people, and 6,959 parental leaves stemming from the ‘Sample ofWorking Life Histories’ (SWLH), 2006. The SWLH consists of administrative register data which include information from threedifferent sources: Social Security, Municipality and Income TaxRegisters. We adopt a simultaneous equations approach to analyse theuse (logistic regression) and duration (event history analysis) ofparental leave, which allows us to control for endogeneity and censoredobservations. We argue that the Spanish parental leave scheme increases gender and social inequalities insofar as reinforces genderrole specialization, and only encourages the reconciling of work andfamily life among workers with a good position in the labour market(educated employees with high and stable working status).