983 resultados para Functional Requirements for Bibliographic Records (FRBR)
Resumo:
Theawareness that fossil fuels exist in limited quantities has stimulated research into energy production from renewable sources. Future energy sources! should! be! plentiful! with! negligible! impact! on! the! environment.! Hydrogen!has!the!potential!to!satisfy!these!requirements.!Nevertheless,!current! methods! of! H2! production! rely! on! nonOrenewable! resources.! Biological! H2! production! from! sunlight! or! biomass! is! an! appealing! alternative! to! current! production!methods.!!(...)
Resumo:
RESUMO - Objetivo: Caraterizar e analisar o acesso dos utentes inscritos no Agrupamento de Centros de Saúde Lisboa Central ao serviço de urgência do hospital de referência (Hospital de S. José). Metodologia: O presente estudo é do tipo observacional, descritivo, transversal e exploratório. A análise da informação incidiu sobre a base de dados cedida pelo CHLC que continha os registos de todas as admissões do ano de 2014 referentes ao Serviço de Urgência Polivalente do CHLC, foram analisados 81928 episódios e 15042 episódios referentes a utentes frequentadores. Resultados: A proximidade ao SU é um fator que potencia a procura de cuidados hospitalares urgentes, no entanto, o facto de o utente não possuir médico de família não se encontra relacionado com a procura do serviço de urgência. Metades das admissões são consideradas “pouco urgentes” (pulseira verde), não existindo uma variação significativa entre as unidades funcionais e o tipo de modelo das mesmas (UCSP ou USF) no que respeita à procura das urgências por parte dos seus utentes. Conclui-se ainda que o horário de funcionamento dos CSP encontra-se de acordo com as necessidades dos utentes considerando que a maior procura de cuidados urgentes ocorre durante o horário de funcionamento dos centros de saúde. Conclusões: A procura de cuidados hospitalares urgentes por parte dos utentes do ACES Lisboa Central é significativa e maioritariamente injustificada do ponto de vista clínico, pelo que revela-se necessário repensar nas estratégias ao nível dos CSP para responder às efetivas necessidades em saúde.
Resumo:
This paper presents and discusses the results of the serviciability and use condition tests carried on an innovative solution for partitions, designated AdjustMembrane developed within a research project. The proposed system is a modular non-loadbearing wall, tensioned between the pavements and ceiling slabs, which are used as anchoring elements. It allows several advantages, related with the weight reduction to achieve a good sustainable performance, such as the reduction of construction costs, energy, and materials, and it is easy to recycle and to reuse, allowing self-construction. Apart from a general presentation of the partition technology, this paper presents and discusses the results of experimental tests carried out. From the results obtained, it is possible to conclude that the solution fulfils the requirements for this typology of wall in terms of resistance to horizontal loads induced by soft and hard body impacts.
Resumo:
Mutations of the Ectodysplasin-A (EDA) gene are generally associated with the syndrome hypohidrotic ectodermal dysplasia (MIM 305100), but they can also manifest as selective, non-syndromic tooth agenesis (MIM300606). We have performed an in vitro functional analysis of six selective tooth agenesis-causing EDA mutations (one novel and five known) that are located in the C-terminal tumor necrosis factor homology domain of the protein. Our study reveals that expression, receptor binding or signaling capability of the mutant EDA1 proteins is only impaired in contrast to syndrome-causing mutations, which we have previously shown to abolish EDA1 expression, receptor binding or signaling. Our results support a model in which the development of the human dentition, especially of anterior teeth, requires the highest level of EDA-receptor signaling, whereas other ectodermal appendages, including posterior teeth, have less stringent requirements and form normally in response to EDA mutations with reduced activity.
Resumo:
AbstractOBJECTIVEIdentify whether Heart Failure (HF) is a predictor of functional dependence for Basic Activities of Daily Living (BADL) in hospitalized elderly.METHODSWe investigated medical records and assessed dependence to BADL (by the Katz Index) of 100 elderly admitted to a geriatric ward of a university hospital. In order to verify if HF is a predictor of functional dependence, linear regression analyzes were performed.RESULTSThe prevalence of HF was 21%; 95% of them were dependent for BADLs. Bathing was the most committed ADL. HF is a predictor of dependence in hospitalized elderlies, increasing the chance of functional decline by 5 times (95% CI, 0.94-94.48), the chance of functional deterioration by 3.5 times (95% CI, 1.28-11.66; p <0.02) and reducing 0.79 points in the Katz Index score (p <0.05).CONCLUSIONHF is a dependency predictor of ADL in hospitalized elderly, who tend to be more dependent, especially for bathing.
Resumo:
The DRG classification provides a useful tool for the evaluation of hospital care. Indicators such as readmissions and mortality rates adjusted for the hospital Casemix could be adopted in Switzerland at the price of minor additions to the hospital discharge record. The additional information required to build patients histories and to identify the deaths occurring after hospital discharge is detailed.
Resumo:
The estrogen-responsive element (ERE) present in the 5'-flanking region of the Xenopus laevis vitellogenin (vit) gene B1 has been characterized by transient expression analysis of chimeric vit-tk-CAT (chloramphenicol acetyltransferase) gene constructs transfected into the human estrogen-responsive MCF-7 cell line. The vit B1 ERE behaves like an inducible enhancer, since it is able to confer estrogen inducibility to the heterologous HSV thymidine kinase (tk) promoter in a relative position- and orientation-independent manner. In this assay, the minimal B1 ERE is 33 bp long and consists of two 13 bp imperfect palindromic elements both of which are required for the enhancer activity. A third imperfect palindromic element is present further upstream within the 5'-flanking region of the gene but is unable to confer hormone responsiveness by itself. Similarly, neither element forming the B1 ERE can alone confer estrogen inducibility to the tk promoter. However, in combinations of two, all three imperfect palindromes can act cooperatively to form a functional ERE. In contrast a single 13 bp perfect palindromic element, GGTCACTGTGACC, such as the one found upstream of the vit gene A2, is itself sufficient to act as a fully active ERE. Single point mutations within this element abolish estrogen inducibility, while a defined combination of two mutations converts this ERE into a glucocorticoid-responsive element.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
This manual provides a set of procedural rules and regulations for use in functionally classifying all roads and streets in Iowa according to the character of service they are intended to provide. Functional classification is a requirement of the 1973 Code of Iowa (Chapter 306) as amended by Senate File 1062 enacted by the 2nd session of the 65th General Assembly of Iowa. Functional classification is defined as the grouping of roads and streets into systems according to the character of service they will be expected to provide, and the assignment of jurisdiction over each class to the governmental unit having primary interest in each type of service. Stated objectives of the legislation are: "Functional classification will serve the legislator by providing an equitable basis for determination of proper source of tax support and providing for the assignment of financial resources to the governmental unit having responsibility for each class of service. Functional classification promotes the ability of the administrator to effectively prepare and carry out long range programs which reflect the transportation needs of the public." All roads and streets in legal existence will be classified. Instructions are also included in this manual for a continuous reporting to the Highway Commission of changes in classification and/or jurisdiction resulting from new construction, corporation line changes, relocations, and deletions. This continuous updating of records is absolutely essential for modern day transportation planning as it is the only possible way to monitor the status of existing road systems, and consequently determine adequacy and needs with accuracy.
Resumo:
Prolyl oligopeptidases cleave peptides on the carboxy side of internal proline residues and their inhibition has potential in the treatment of human brain disorders. Using our docking program fitted, we have designed a series of constrained covalent inhibitors, built from a series of bicyclic scaffolds, to study the optimal shape required for these small molecules. These structures bear nitrile functional groups that we predicted to covalently bind to the catalytic serine of the enzyme. Synthesis and biological assays using human brain-derived astrocytic cells and endothelial cells and human fibroblasts revealed that these compounds act as selective inhibitors of prolyl oligopeptidase activity compared to prolyl-dipeptidyl-aminopeptidase activity, are able to penetrate the cells and inhibit intracellular activities in intact living cells. This integrated computational and experimental study shed light on the binding mode of inhibitors in the enzyme active site and will guide the design of future drug-like molecules.
Resumo:
Today's business environment has become increasingly unexpected and fast changing because of the global competition. This new environment requires the companies to organize their control differently, e.g. by logistic process thinking. Logistic process thinking in software engineering applies the principles of production process to immaterial products. Processes must be optimized, so that every phase adds value to the customer, and the lead times can be cut shorter to meet the new customer requirements. The purpose of this thesis is to examine and optimize the testing processes of software engineering concentrating on module testing, functional testing and their interface. The concept of logistic process thinking is introduced through production process, value added model and process management. Also theory of testing based on literature is presented, concentrating on module testing and functional testing. The testing processes of the Case Company are presented together with the project models in which they are implemented. The real life practices in module testing and functional testing and their interface are examined through interviews. These practices are analyzed against the processes and the testing theory, through which ideas for optimizing the testing process are introduced. The project world of the Case Company is also introduced together with two example testing projects in different life cycle phases. The examples give a view of how much effort of the project is put in different types of testing.
Resumo:
Terrestrial Trunked Radio (TETRA) on moderni digitaalinen matkapuhelinjärjestelmän standardi, joka on suunniteltu täyttämään erityisesti viranomaisten vaativat tarpeet turvallisuuden ja luotettavuuden suhteen. Ohjelmiston testaus on tärkeä osa sen laadun takaamiseksi. Testaus on jaettu useisiin vaiheisiin ja se kattaa koko ohjelmiston elinkaaren: ohjelmiston kehittelystä alkaen asiakkaalle lähetettyyn valmiiseen tuotteeseen saakka. Toiminnallisuustestauksen suorittaa joko ohjelmiston suunnittelijat tai erillinen testausryhmä käyttäen Nokia TETRA-järjestelmän testauslaboratoriota. Testauksen tarkoituksena on varmistaa, että ohjelmisto, sen aliohjelmat ja ominaisuudet täyttävät niille annetut toiminnalliset ja laadulliset vaatimukset. Tämä diplomityö antaa yleiskuvan toiminnallisuustestausprosessista Nokia TETRA järjestelmän laboratoriossa. Se tarjoaa esimerkkitestitapauksen avulla kokonaiskuvan siitä, kuinka toiminnallisuustestausprosessi suoritetaan alusta loppuun.
Resumo:
NlmCategory="UNASSIGNED">This Perspective discusses the pertinence of variable dosing regimens with anti-vascular endothelial growth factor (VEGF) for neovascular age-related macular degeneration (nAMD) with regard to real-life requirements. After the initial pivotal trials of anti-VEGF therapy, the variable dosing regimens pro re nata (PRN), Treat-and-Extend, and Observe-and-Plan, a recently introduced regimen, aimed to optimize the anti-VEGF treatment strategy for nAMD. The PRN regimen showed good visual results but requires monthly monitoring visits and can therefore be difficult to implement. Moreover, application of the PRN regimen revealed inferior results in real-life circumstances due to problems with resource allocation. The Treat-and-Extend regimen uses an interval based approach and has become widely accepted for its ease of preplanning and the reduced number of office visits required. The parallel development of the Observe-and-Plan regimen demonstrated that the future need for retreatment (interval) could be reliably predicted. Studies investigating the observe-and-plan regimen also showed that this could be used in individualized fixed treatment plans, allowing for dramatically reduced clinical burden and good outcomes, thus meeting the real life requirements. This progressive development of variable dosing regimens is a response to the real-life circumstances of limited human, technical, and financial resources. This includes an individualized treatment approach, optimization of the number of retreatments, a minimal number of monitoring visits, and ease of planning ahead. The Observe-and-Plan regimen achieves this goal with good functional results. Translational Relevance: This perspective reviews the process from the pivotal clinical trials to the development of treatment regimens which are adjusted to real life requirements. The article discusses this translational process which- although not the classical interpretation of translation from fundamental to clinical research, but a subsequent process after the pivotal clinical trials - represents an important translational step from the clinical proof of efficacy to optimization in terms of patients' and clinics' needs. The related scientific procedure includes the exploration of the concept, evaluation of security, and finally proof of efficacy.
Resumo:
Insulin secretion from pancreatic β cells plays a central role in the control of blood glucose levels. The amount of insulin released by β cells is precisely adjusted to match organism requirements. A number of conditions that arise during life, including pregnancy and obesity, can result in a decreased sensitivity of insulin target tissues and a consequent rise in insulin needs. To preserve glucose homoeostasis, the augmented insulin demand requires a compensatory expansion of the pancreatic β cell mass and an increase in its secretory activity. This compensatory process is accompanied by modifications in β cell gene expression, although the molecular mechanisms underlying the phenomenon are still poorly understood. Emerging evidence indicates that at least part of these compensatory events may be orchestrated by changes in the level of a novel class of gene regulators, the microRNAs. Indeed, several of these small, non-coding RNAs have either positive or negative impacts on β cell proliferation and survival. The studies reviewed here suggest that the balance between the actions of these two groups of microRNAs, which have opposing functional effects, can determine whether β cells expand sufficiently to maintain blood glucose levels in the normal range or fail to meet insulin demand and thus lead, as a consequence, towards diabetes manifestation. A better understanding of the mechanisms governing changes in the microRNA profile will open the way for the development of new strategies to prevent and/or treat both type 2 and gestational diabetes.
Resumo:
The thesis discusses the regulation of foodstuffs and medicines, and particularly the regulation of functional foods. Legal systems investigated are the EU and China. Both are members of the WTO and Codex Alimentarius, which binds European and Chinese rules together. The study uses three Chinese berries as case examples of how product development faces regulation in practice. The berries have traditional uses as herbal medicines. Europe and China have similar nutrition problems to be resolved, such as obesity, cardiovascular disease, and diabetes. The three berries might be suitable raw materials for functional foods. Consumer products with health-enhancing functions, such as lowering blood pressure, might legally be classifi ed either as foodstuffs or medicines. The classifi cation will depend on functions and presentation of the product. In our opinion, food and medicine regulation should come closer together so the classifi cation issue would no longer be an issue. Safety of both foodstuffs and medicines is strictly regulated. With medicines, safety is a more relative concept, where benefi ts of the product are compared to side-effects in thorough scientifi c tests and trials. Foods, on the other hand, are not allowed to have side-effects. Hygiene rules and rules on the use of chemicals apply. In China, food safety is currently at focus as China has had several severe food scandals. Newly developed foods are called novel foods, and are specifi cally regulated. The current European novel food regulation from 1997 treats traditional third country products as novel. The Chinese regulation of 2007 also defi nes novel foods as something unfamiliar to a Chinese consumer. The concepts of novel food thus serve a protectionist purpose. As regards marketing, foods are allowed to bear health claims, whereas medicines bear medicinal claims. The separation is legally strict: foods are not to be presented as having medicinal functions. European nutrition and health claim regulation exists since 2006. China also has its regulation on health foods, listing the permitted claims and how to substantiate them. Health claims are allowed only on health foods. The European rules on medicines include separate categories for herbal medicines, traditional herbal medicines, and homeopathic medicines, where there are differing requirements for scientifi c substantiation. The scientifi c and political grounds for the separate categories provoke criticism. At surface, the Chinese legal system seems similar to the European one. To facilitate trade, China has enacted modern laws. Laws are needed as the country moves from planned economy to market economy: ‘rule of law’ needs to replace ‘rule of man’. Instead of being citizens, Chinese people long were subordinates to the Emperor. Confucius himself advised to avoid confl ict. Still, Chinese people do not and cannot always trust the legal system, as laws are enforced in an inconsistent manner, and courts are weak. In China, there have been problems with confl icting national and local laws. In Europe, the competence of the EU vs. the competence of the Member States is still not resolved, even though the European Commission often states that free trade requires harmonisation. Food and medicine regulation is created by international organisations, food and medicine control agencies, standards agencies, companies and their organisations. Regulation can be divided in ‘hard law’ and ‘soft law’. One might claim that hard law is in crisis, as soft law is gaining importance. If law is out of fashion, regulation certainly isn’t. In the future, ‘law’ might mean a process where rules and incentives are created by states, NGOs, companies, consumers, and other stakeholders. ‘Law’ might thus refer to a constant negotiation between public and private actors. Legal principles such as transparency, equal treatment, and the right to be heard would still be important.