896 resultados para Circle of Security


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Actualment seria impensable la existència d'una xarxa d'informació com Internet sense la existència dels motors de cerca. Gràcies a ells, qualsevol usuari tenim al nostre abast la possibilitat d'obtenir informació sobre qualsevol tema només enviant una consulta des dels nostres ordinadors i rebent una resposta en qüestió de segons. Entre els usuaris dels cercadors d'Internet és molt habitual que les consultes facin referència a la empresa on treballem, la ciutat on vivim, els llocs que visitem, o inclús sobre problemes que tenim o malalties que patim amb l'objectiu de trobar opinions, consells o solucions. En resum, els usuaris, a través de les nostres consultes, proporcionem a diari als motors de cerca informació sobre nosaltres mateixos i sobre la nostra identitat que, juntament amb la adreça IP de la màquina des d'on fem les nostres consultes, ens fa perdre l'anonimat dins dels seus sistemes. Sobre aquesta problemàtica és del que tracta el present Projecte de Final de Carrera. En ell s'ha implementat una solució de la proposta especificada per Alexandre Viejo i Jordi Castellà-Roca en la seva publicació "Using social networks to disort users' profiles generated by web search engines", en la qual es documenten una sèrie de protocols de seguretat i d'algorismes de protecció i distribució que garanteixen la privacitat de la identitat dels usuaris dins dels motors de cerca aprofitant per aquest fi la relació existent entre aquests usuaris a través de les xarxes socials.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Aquest projecte es proposa dissenyar i implementar un sistema de gestió d'historials mèdics per a ser usat remotament a través d'una xarxa de comunicacions, amb un èmfasi principal enl'assoliment d'un nivell de seguretat considerat alt.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

El projecte consisteix en una aplicació web que actua com un magatzem central d'arxius, on els usuaris es poden connectar via https des de qualsevol localització, independentment del grau de seguretat que implementi la seva estació, i enviar arxius encriptats o sense encriptar amb les garanties màximes de seguretat i confidencialitat. Els fitxers restarien emmagatzemats a un BBDD on posteriorment, només usuaris acreditats amb una clau AES d'ecriptació/desencriptació els podrien recuperar, també via HTTPS, i procedir a desencriptar-los a nivell local.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Desenvolupament d'un esquema criptogràfic per gestionar de forma segura els historials mèdics dels pacients através d'una xarxa de comunicacions. L'aplicació proporciona les propietatsbàsiques de seguretat que hem esmentat, a més de la propietat de no-repudique permet assegurar que una informació referent a una visita ha estat introduïda per un metge autoritzat i concret.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This leaflet is for anyone who wants to know more about Cognitive Behavioural Therapy (CBT).It discusses how it works, why it is used, its effects, its side-effects, and alternative treatments. If you can't find what you want here, there are sources of further information at the end of this leaflet. What is CBT? It is a way of talking about: ï,§ how you think about yourself, the world and other people ï,§ how what you do affects your thoughts and feelings. CBT can help you to change how you think ('Cognitive') and what you do ('Behaviour'). These changes can help you to feel better. Unlike some of the other talking treatments, it focuses on the 'here and now' problems and difficulties. Instead of focusing on the causes of your distress or symptoms in the past, it looks for ways to improve your state of mind now. When does CBT help? CBT has been shown to help with many different types of problems. These include: anxiety, depression, panic, phobias (including agoraphobia and social phobia), stress, bulimia, obsessive compulsive disorder, post-traumatic stress disorder, bipolar disorder and psychosis. CBT may also help if you have difficulties with anger, a low opinion of yourself or physical health problems, like pain or fatigue. How does it work? CBT can help you to make sense of overwhelming problems by breaking them down into smaller parts. This makes it easier to see how they are connected and how they affect you. These parts are: ï,§ A Situation - a problem, event or difficult situation. From this can follow: ï,§ Thoughts ï,§ Emotions ï,§ Physical feelings ï,§ Actions Each of these areas can affect the others. How you think about a problem can affect how you feel physically and emotionally. All these areas of life can connect like this: {5 Areas - click related link below} What happens in one of these areas can affect all the others. There are helpful and unhelpful ways of reacting to most situations, depending on how you think about it. The way you think can be helpful - or unhelpful. An example: If you go home feeling depressed, you'll probably brood on what has happened and feel worse. If you get in touch with the other person, there's a good chance you'll feel better about yourself. If you avoid the other person, you won't be able to correct any misunderstandings about what they think of you - and you will probably feel worse. This 'vicious circle' can make you feel worse. It can even create new situations that make you feel worse. You can start to believe quite unrealistic (and unpleasant) things about yourself. This happens because, when we are distressed, we are more likely to jump to conclusions and to interpret things in extreme and unhelpful ways. CBT can help you to break this vicious circle of altered thinking, feelings and behaviour. When you see the parts of the sequence clearly, you can change them - and so change the way you feel. CBT aims to get you to a point where you can 'do it yourself', and work out your own ways of tackling these problems. [For full factsheet â?" click on link above]This resource was contributed by the National Documentation Centre on Drug Use.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

L'objectiu d'aquest treball és dissenyar, i implementar, un sistema de joc electrònic de BlackJack remot, que ofereixi els jugadors un nivell de seguretat similar al que es pot tenir quan juguem en un casino tradicional.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

An easy-living home requires a full-sized bathroom on the main level. Family members will appreciate the extra space and guests of all ages and abilities will feel more welcome. At a minimum, you’ll need a five foot circle of open floor space for maneuvering a wheelchair between bathroom fixtures. A small powder room won’t work for guests who use walkers or wheelchairs. A shower stall—with no curb to step over—is more convenient than a tub for most guests. Make sure the doorway opening for the bathroom is at least 32 inches wide (preferably 36 inches). Universal design features, such as these, make homes better for everyone.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The aim of this research was to structure a conceptual model of hope and hopelessness based on dictionary definitions, and to verify this model on the basis of the experiences of the severely depressive and non-depressive elderly. This research has produced a substantive theory of hope and hopelessness which is based on the experiences of the depressive and non-depressive elderly, and on the concept analysis of hope and hopelessness based on English dictionary definitions. The patients who participated in the research were 65 years old and older men and women (n=22) who had been admitted to a psychiatric hospital because of major depression, and another group: the non-depressive elderly (n=21), who were recruited from the pensioners’ clubs. The data were collected in interviews using the Clinical Assessment Tool, developed by Farran, Salloway and Clark (1990) and Farran, Wilken and Popovich (1992), and it produced 553 pages of written text, which were analysed using the ATLAS/ti programme. ATLAS/ti is a tool for analysing qualitative data and is based on Grounded Theory. The medical and nursing records of the depressive elderly completed source triangulation. The concept analysis of hope and hopelessness was made on the basis of the definitions of English dictionaries (n=103), using semantic analysis and the ATLAS/ti programme. The most important hope-promoting factors were human relations, health and managing in everyday living. Autonomy, self-determination and feeling of security were highly appreciated among the elderly. Hopelessness, on the other hand, was most often associated with the same factors: human relations, health and everyday living. Especially, losses of significant others were experienced as strongly hope-diminishing. Old age had brought freedom from duties concerning others, but now, when you finally had an opportunity to enjoy yourself, you could not accomplish anything; you were clasped in the arms of total inability, depression had come. The most obvious difference in the life course of the depressive and nondepressive elderly was the abundance of traumatic experiences in the childhood and youth of the depressive elderly. The continuous circulation of fearful thoughts was almost touchable, and suicidality was described in connection with these thoughts. You were afraid to be awake and also to go to sleep. Managing day by day was the goal. The research produced the Basic Social Process (BSP) of hope: achieving - maintaining - losing, which expresses a continuous balancing between Being without and Being with. The importance of the object of hope was combined with the amount of hope and disappointment. The process of approaching defined the realisation of hope and the process of withdrawal that of losing. Joy and security versus grief and insecurity defined the Being with and Being without. Two core categories were found. The first one “If only I could�? reflects lack of energy, lack of knowledge, lack of courage and lack of ability. The other one “There is always a loophole�? reflects deliberate tracing of possibilities and the belief in finding solutions, and managing.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The financial revolution improved the British government s ability to borrow, andthus its ability to wage war. North andWeingast argued that it also permitted privateparties to borrow more cheaply and widely.We test these inferences with evidencefrom a London bank.We confirm that private bank credit was cheap in the earlyeighteenth century, but we argue that it was not available widely. Importantly, thegovernment reduced the usury rate in 1714, sharply reducing the circle of privateclients that could be served profitably.

Relevância:

80.00% 80.00%

Publicador:

Relevância:

80.00% 80.00%

Publicador:

Resumo:

La théorie de l'attachement est une théorie dyadique, par essence. Même si le père peut être reconnu comme une réelle figure d'attachement, en ce sens qu'il est susceptible de procurer à l'enfant une expérience de sécurité, la théorie reste essentiellement dyadique. Redéfinir la théorie de l'attachement dans une perspective triadique n'est pas sans poser des difficultés théoriques. Ace propos, nous suggérons une perspective inspirée par un concept d'écologie comportementale, celui de l'utilisation adaptative par les organismes d'informations publiques fournies par inadvertance par d'autres organismes, concept que nous étendrons à cette fin aux expressions émotionnelles. Nous proposons alors l'idée que dans la triade, chaque partenaire utilise ce type d'informations, fournies à la fois par chacun des autres partenaires ainsi que par les interactions ellesmêmes entre ces partenaires. L'utilisation de ces informations aurait, dans cette perspective, une fonction adaptative pour le maintien de la triade comme une entité soudée par des échanges d'expériences émotionnelles. The theory of attachment is essentially a dyadic theory. Even though the father is recognised as a real figure of attachment in that he brings a feeling of security to the child, basically the theory remains dyadic. Redefining the theory of attachment in a triadic perspective is not without raising difficult theoretical problems. This leads us to suggest a perspective inspired by the concept of ecological behaviour : the adaptative use of public information acquired inadvertently through other organisms, a concept applied here to emotional expression. We propose that in the triad each partner uses this type of information brought by the other partner as well as those very interactions between both partners. The use of information to maintain the triad as an entity bound by exchanges of emotional experience would be an adaptative function.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This bachelor's degree thesis deals with homomorphic public-key cryptography, or in other words cryptosystems with special addition properties. Such cryptosystems are widely used in real life situations, for instance to make electronic voting secure. In Chapter 1 a few basic algebra results and other key concepts are introduced. Chapters 2 and 3 contain the algorithms and properties of the two cryptosystems which are considered to be the best for e-voting: Paillier and Joye-Libert. The thesis is concluded in Chapter 4, by comparing running times of the two above-mentioned cryptosystems, in simulations of real-life e-voting systems, with up to tens of thousands of voters, and different levels of security. Through these simulations, we discern the situations where each of the two cryptosystems is preferable.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Si dans certains domaines (ex. les services de l'emploi) la co-production est bien implantée, elle paraît plus ardue dans d'autres types de services publics, comme la police. La co-production de la sécurité est-elle faisable ? Quelles sont les volontés de part et d'autre pour développer ce partenariat ? À l'aune de la police de proximité en Suisse et sur la base de données quantitatives et qualitatives, cet article apporte des résultats innovants. If in some administrations (eg. employment services) it is clearly well established, the co-production seems to be more difficult in other services, like the police. Thus, is the co-production of security services feasible ? Are both parties (police forces and citizens) ready for such a process ? In the light of community policing in Switzerland and on the basis of quantitative and qualitative data, this article will provide innovative results and research avenues in the field.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On that regard, an issue that is becoming veryimportant in the recent times is being able to provide a security baseline to such applications. This paper analyzes the currentstate of security in JXME and proposes a simple security mechanism in order to protect JXME applications against a broad range of vulnerabilities.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper describes the state of the art of secure ad hoc routing protocols and presents SEDYMO, a mechanism to secure a dynamic multihop ad hoc routing protocol. The proposed solution defeats internal and external attacks usinga trustworthiness model based on a distributed certification authority. Digital signatures and hash chains are used to ensure the correctness of the protocol. The protocol is compared with other alternatives in terms of security strength, energy efficiency and time delay. Both computational and transmission costs are considered and it is shown that the secure protocol overhead is not a critical factor compared to the high network interface cost.