959 resultados para Security Measures.
Resumo:
BACKGROUND: When an organization performs an integrated analysis of risks through its Occupational Health and Safety Management System, several steps are suggested to address the implications of the identified risks. Namely, the organization should make a detailed analysis of the monetary impact for the organization of each of the preventive measures considered. However, it is also important to perform an analysis of the impact of each measure on society (externalities). OBJECTIVE: The aim of this paper is to present a case study related to the application of the proposed economic evaluation methodology. METHODS: An analysis of the work accidents in a hospital has been made. Three of the major types of accidents have been selected: needle stings, falls and excessive strain. Following the risk assessment, some preventive measures have been designed. Subsequently, the Benefit/Cost ratio (B/C) of these measures has been calculated, both in financial terms (from the organization’s perspective) and in economic terms (including the benefits for the worker and for the Society). RESULTS: While the financial ratio is only advantageous in some cases, when the externalities are taken into account, the B/C ratio increases significantly. CONCLUSIONS: It is important to consider external benefits to make decisions concerning the implementation of preventive measures in Occupational Health and Safety projects
Resumo:
One hundred and twenty subjects with Chagas' cardiopathy and 120 non-infected subjects were randomly selected from first time claimants of sickness benefits in the National Institute of Social Security (INPS) in Goiás. Cases of Chagas' cardiopathy were defined based on serological test, history of residence in an endemic area and, clinical and/or electrocardiogram (ECG) alterations suggestive of Chagas' cardiomyopathy. Controls were defined as subjects with at least two negative serological tests. Case and controls were compared in the analysis for age, sex, place of birth, migration history, socio-economic level, occupation, physical exertion at work, age at affiliation and years of contribution to the social security scheme, clinical course of their disease and ECG abnormalities. Chagas' disease patients were younger than other subjects and predominantly of rural origin. Non-infected subjects presented a better socio-economic level, were performing more skilled activities and had less changes of job than cases. No important difference was observed in relation to age at affiliation to INPS. About 60% of cases have claimed for benefits within the first four years of contribution while among controls this proportion was 38.5%. Cases were involved, proportionally more than controls, in "heavy" activities. A risk of 2.3 (95%CL 1.5 - 4.6) and 1.8 (95%CL 1.2- 3.5) was obtained comparing respectively "heavy" and "moderate" physical activity against "light". A relative risk of 8.5 (95%CL 4.9 - 14.8) associated with the presence of cardiopathy was estimated comparing the initial sample of seropositive subjects and controls. A high relative risk was observed in relation to right bundle branch block (RR = 37.1 95%CL = 8.8 - 155.6) and left anterior hemiblock (RR = 4.4, 95%CL = 2.1 - 9.1).
Resumo:
There are many circumstances in which the effectiveness of preventive measures depends to a large extent on the compliance of the patient in changing his or her behavior or lifestyle. It is shown how economic techniques can be used (i) to describe the rationale of individuals and predict their behavior (Section 2); and (ii) to assess preventive measures that, by requiring a change of conduct, imply "costs" to the individual due to a decline in the quality of life (Appendix). Cigarette smoking and coronary heart disease are used as an illustration. While the analysis of Section 2 uses graphical techniques, a simple textbook-type of lifetime utility model with a mathematical emphasis is used in the Appendix. It is also shown that techniques often used to assess health care programs such as the QALYs (Quality-Adjusted Life Years) are inappropriate to the evaluation of preventive programs aiming at behavioral changes. Finally, topics that call for further research are indicated.
Resumo:
A família de especificações WS-* define um modelo de segurança para web services, baseado nos conceitos de claim, security token e Security Token Service (STS). Neste modelo, a informação de segurança dos originadores de mensagens (identidade, privilégios, etc.) é representada através de conjuntos de claims, contidos dentro de security tokens. A emissão e obtenção destes security tokens, por parte dos originadores de mensagens, são realizadas através de protocolos legados ou através de serviços especiais, designados de Security Token Services, usando as operações e os protocolos definidos na especificação WS-Trust. O conceito de Security Token Service não é usado apenas no contexto dos web services. Propostas como o modelo dos Information Cards, aplicável no contexto de aplicações web, também utilizam este conceito. Os Security Token Services desempenham vários papéis, dependendo da informação presente no token emitido. São exemplos o papel de Identity Provider, quando os tokens emitidos contêm informação de identidade, ou o papel de Policy Decision Point, quando os tokens emitidos definem autorizações. Este documento descreve o projecto duma biblioteca software para a realização de Security Token Services, tal como definidos na norma WS-Trust, destinada à plataforma .NET 3.5. Propõem-se uma arquitectura flexível e extensível, de forma a suportar novas versões das normas e as diversas variantes que os Security Token Services possuem, nomeadamente: o tipo dos security token emitidos e das claims neles contidas, a inferência das claims e os métodos de autenticação das entidades requerentes. Apresentam-se aspectos de implementação desta arquitectura, nomeadamente a integração com a plataforma WCF, a sua extensibilidade e o suporte a modelos e sistemas externos à norma. Finalmente, descrevem-se as plataformas de teste implementadas para a validação da biblioteca realizada e os módulos de extensão da biblioteca para: suporte do modelo associado aos Information Cards, do modelo OpenID e para a integração com o Authorization Manager.
Resumo:
One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors. We propose the use of Code Voting to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel to communicate the voter's vote between the voter and a trusted component attached to the voter's computer. Consequently, no one controlling the voter's computer can change the his/her's vote. The trusted component can then process the vote according to a cryptographic voting protocol to enable cryptographic verification at the server's side.
Resumo:
We have studied, in particular under normality of the implied random variables, the connections between different measures of risk such as the standard deviation, the W-ruin probability and the p-V@R. We discuss conditions granting the equivalence of these measures with respect to risk preference relations and the equivalence of dominance and efficiency of risk-reward criteria involving these measures. Then more specifically we applied these concepts to rigorously face the problem of finding the efficient set of de Finetti’s variable quota share proportional reinsurance.
Resumo:
Desde há alguns anos que têm vindo a ser mobilizados esforços para a elaboração de uma regulamentação técnica unificada aplicável a nível Europeu, os Eurocódigos Estruturais, a qual visa estabelecer uma harmonização da regulamentação a utilizar na construção civil, promovendo a eliminação de anteriores barreiras técnicas. Actualmente, no âmbito Nacional, encontramo-nos numa fase de transição da regulamentação técnica em vigor para o dimensionamento de Edifícios em Betão Armado, do Regulamento de Segurança e Acções para Estruturas de Betão Armado (RSA) e Regulamento de Estruturas de Betão Armado e Pré-Esforçado (REBAP) para os Eurocódigos Estruturais, sendo que neste período de transição se verifica a coexistência de ambos devido à ainda não publicação em Diário da República da nova regulamentação a adoptar. No presente trabalho procura-se verificar a segurança da estrutura de um edifício com laje fungiforme, situado em Faro, projectado segundo a regulamentação nacional em vigor (RSA/REBAP), através da aplicação dos Eurocódigos Estruturais, nomeadamente o EC0, EC1, EC2 e EC8. Este tipo de edifícios, em que a laje fungiforme é utilizada como elemento sísmico primário, não é totalmente abordada no EC8, a verificação de segurança será então efectuada considerando duas abordagens de análise distintas. Numa primeira abordagem de análise adopta-se a estrutura como sendo da Classe de Ductilidade Baixa (DCL) considerando todos os elementos como sísmicos primários, e numa segunda abordagem de análise assume-se uma maior ductilidade da estrutura (DCM) classificando alguns elementos como sísmicos secundários.
Resumo:
Mestrado em Intervenção Sócio-Organizacional na Saúde - Área de especialização: Políticas de Administração e Gestão de Serviços de Saúde.
Resumo:
Distribution systems are the first volunteers experiencing the benefits of smart grids. The smart grid concept impacts the internal legislation and standards in grid-connected and isolated distribution systems. Demand side management, the main feature of smart grids, acquires clear meaning in low voltage distribution systems. In these networks, various coordination procedures are required between domestic, commercial and industrial consumers, producers and the system operator. Obviously, the technical basis for bidirectional communication is the prerequisite of developing such a coordination procedure. The main coordination is required when the operator tries to dispatch the producers according to their own preferences without neglecting its inherent responsibility. Maintenance decisions are first determined by generating companies, and then the operator has to check and probably modify them for final approval. In this paper the generation scheduling from the viewpoint of a distribution system operator (DSO) is formulated. The traditional task of the DSO is securing network reliability and quality. The effectiveness of the proposed method is assessed by applying it to a 6-bus and 9-bus distribution system.
Resumo:
Urban Computing (UrC) provides users with the situation-proper information by considering context of users, devices, and social and physical environment in urban life. With social network services, UrC makes it possible for people with common interests to organize a virtual-society through exchange of context information among them. In these cases, people and personal devices are vulnerable to fake and misleading context information which is transferred from unauthorized and unauthenticated servers by attackers. So called smart devices which run automatically on some context events are more vulnerable if they are not prepared for attacks. In this paper, we illustrate some UrC service scenarios, and show important context information, possible threats, protection method, and secure context management for people.
Resumo:
Background: Poor nutritional status and worse health-related quality of life (QoL) have been reported in haemodialysis (HD) patients. The utilization of generic and disease specific QoL questionnaires in the same population may provide a better understanding of the significance of nutrition in QoL dimensions. Objective: To assess nutritional status by easy to use parameters and to evaluate the potential relationship with QoL measured by generic and disease specific questionnaires. Methods: Nutritional status was assessed by subjective global assessment adapted to renal patients (SGA), body mass index (BMI), nutritional intake and appetite. QoL was assessed by the generic EuroQoL and disease specific Kidney Disease Quality of Life-Short Form (KDQoL-SF) questionnaires. Results: The study comprised 130 patients of both genders, mean age 62.7 ± 14.7 years. The prevalence of undernutrition ranged from 3.1% by BMI ≤ 18.5 kg/m2 to 75.4% for patients below energy and protein intake recommendations. With the exception of BMI classification, undernourished patients had worse scores in nearly all QoL dimensions (EuroQoL and KDQoL-SF), a pattern which was dominantly maintained when adjusted for demographics and disease-related variables. Overweight/obese patients (BMI ≥ 25) also had worse scores in some QoL dimensions, but after adjustment the pattern was maintained only in the symptoms and problems dimension of KDQoL-SF (p = 0.011). Conclusion: Our study reveals that even in mildly undernourished HD patients, nutritional status has a significant impact in several QoL dimensions. The questionnaires used provided different, almost complementary perspectives, yet for daily practice EuroQoL is simpler. Assuring a good nutritional status, may positively influence QoL.
Resumo:
Copyright © 2013 Springer Netherlands.
Resumo:
Copyright 2013 Springer Netherlands.
Resumo:
Devido ao facto de hoje em dia a informação que é processada numa rede informática empresarial, ser cada vez mais de ordem confidencial, torna-se necessário que essa informação esteja o mais protegida possível. Ao mesmo tempo, é necessário que esta a informação esteja disponível com a devida rapidez, para os parceiros certos, num mundo cada vez mais globalizado. Com este trabalho pretende-se efectuar o estudo e implementação da segurança, numa pequena e genérica rede de testes, que facilmente seja extrapolada, para uma rede da dimensão, de uma grande empresa com potenciais ramificações por diversos locais. Pretende-se implementar/monitorização segurança quer externamente, (Internet service provider ISP) quer internamente (activos de rede, postos de trabalho/utilizadores). Esta análise é baseada na localização (local, wireless ou remota), e, sempre que seja detectada qualquer anomalia, seja identificada a sua localização, sendo tomadas automaticamente acções de protecção. Estas anomalias poderão ser geridas recorrendo a ferramentas open source ou comerciais, que façam a recolha de toda a informação necessária, e tomem acções de correcção ou alerta mediante o tipo de anomalia.
Resumo:
This article is is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. Attribution-NonCommercial (CC BY-NC) license lets others remix, tweak, and build upon work non-commercially, and although the new works must also acknowledge & be non-commercial.