952 resultados para security development
Resumo:
The purpose of the research is to study the relationship between international drug interdiction policies and domestic politics in fragile democracies, and to demonstrate how international drug control policies and the use of force fit the rhetoric of war, are legitimized by the principles of a just war, but may also cause collateral damage and negative unintended consequences. The method used is a case study of the Dominican Republic. The research has found that international drug control regimes, primarily led by the U.S. and narrowly focused on interdiction, have influenced an increasingly militarized approach to domestic law enforcement in the Dominican Republic. The collateral damage caused by militarized enforcement comes in the form of negative perceptions of citizen security, loss of respect for the rule of law and due process, and low levels of civil society development. The drug war has exposed the need for significant reform of the institutions charged with carrying out enforcement, the police force and the judicial system in particular. The dissertation concludes that the extent of drug trafficking in the Dominican Republic is beyond the scope of domestic reform efforts alone, but that the programs implemented do show some potential for future success. The dissertation also concludes that the framework of warfare is not the most appropriate for the international problems of drug traffic and abuse. A broader, multipronged approach should be considered by world policy makers in order to address all conditions that allow drugs to flourish without infringing upon democratic and civil rights in the process.
Resumo:
Funding: The research presented in this manuscript was wholly funded by National Centre for the Replacement, Refinement and Reduction of Animals in Research (NC3Rs), https://www.nc3rs.org.uk/. ‘The Snail Assay as an Alternative to the Rodent Hershberger Assay for Detecting Androgens and Anti-androgens’ funding reference: G0900802/1 to SJ, EJR, CSJ, and LRN. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Resumo:
This work was supported by the Engineering and Physical Sciences Research Council [grant number EP/K006428/1]; and the European Regional Development Fund [grant number LUPS/ERDF/2010/4/1/0164].
Resumo:
Using survey data from 358 online customers, the study finds that the e-service quality construct conforms to the structure of a third-order factor model that links online service quality perceptions to distinct and actionable dimensions, including (1) website design, (2) fulfilment, (3) customer service, and (4) security/privacy. Each dimension is found to consist of several attributes that define the basis of e-service quality perceptions. A comprehensive specification of the construct, which includes attributes not covered in existing scales, is developed. The study contrasts a formative model consisting of 4 dimensions and 16 attributes against a reflective conceptualization. The results of this comparison indicate that studies using an incorrectly specified model overestimate the importance of certain e-service quality attributes. Global fit criteria are also found to support the detection of measurement misspecification. Meta-analytic data from 31,264 online customers are used to show that the developed measurement predicts customer behavior better than widely used scales, such as WebQual and E-S-Qual. The results show that the new measurement enables managers to assess e-service quality more accurately and predict customer behavior more reliably.
Resumo:
The postwar development of the Intelligence Services in Japan has been based on two contrasting models: the centralized model of the USA and the collegiality of UK, neither of which has been fully developed. This has led to clashes of institutional competencies and poor anticipation of threats towards national security. This problem of opposing models has been partially overcome through two dimensions: externally through the cooperation with the US Intelligence Service under the Treaty of Mutual Cooperation and Security; and internally though the pre-eminence in the national sphere of the Department of Public Safety. However, the emergence of a new global communicative dimension requires that a communicative-viewing remodeling of this dual model is necessary due to the increasing capacity of the individual actors to determine the dynamics of international events. This article examines these challenges for the Intelligence Services of Japan and proposes a reform based on this new global communicative dimension.
Resumo:
L’objectif de cette thèse était de contribuer à l’avancement des connaissances quant aux circonstances permettant une transmission intergénérationnelle du risque émanant de l’adversité maternelle et aux mécanismes sous-tendant cette transmission, dans quatre articles empiriques. Le premier visait à explorer la relation entre un historique d’adversité maternelle, la sécurité d’attachement mère-enfant et le tempérament de l’enfant. Les mères ont complété une entrevue semi-structurée portant sur leurs représentations d’attachement avec leurs parents, à 6 mois, et ont évalué le tempérament de leur enfant à 2 ans. La sécurité d’attachement fut également évaluée à 2 ans. Les résultats ont démontré que les enfants dont les mères rapportaient des niveaux supérieurs d’adversité présentaient de moins bons niveaux d’activité comportementale, uniquement lorsqu’ils avaient un attachement sécurisant avec leur mère. Ces résultats suggèrent une transmission intergénérationnelle des effets d’un historique d’adversité maternelle sur le tempérament des enfants. Le deuxième article visait à investiguer si le transporteur de sérotonine (5-HTTLPR) module la transmission de risque intergénérationnelle de l’adversité maternelle sur le tempérament des enfants. L’historique d’adversité maternelle fut évalué en combinant deux mesures auto-rapportées. Les mères ont également évalué le tempérament de leur enfant à 18 et à 36 mois. Le génotype des enfants fut extrait à 36 mois. Les résultats ont révélé un effet d’interaction entre l’adversité maternelle et le génotype de l’enfant sur le tempérament, suggérant une transmission intergénérationnelle des effets de l’adversité maternelle sur le fonctionnement émotionnel des enfants. Le troisième article visait à explorer la relation entre les difficultés d’adaptation psychosociale des mères, la sensibilité maternelle et les symptômes intériorisés de leurs enfants. Les mères ont complété plusieurs questionnaires desquels un score composite de difficultés d’adaptation psychosociale fut extrait. La sensibilité maternelle fut observée à 12 mois. Les symptômes intériorisés des enfants furent évalués par les deux parents à 2 et à 3 ans. Les résultats ont démontré qu’une augmentation des difficultés maternelles d’adaptation psychosociale étaient associée à davantage de symptômes intériorisés chez les enfants, mais seulement chez ceux dont les mères étaient moins sensibles. Ces résultats ont été observés par les mères à 2 ans et par les deux parents à 3 ans. Ces résultats suggèrent que les enfants peuvent être différemment affectés par l’adaptation émotionnelle de leur mère tout en mettant l’emphase sur le rôle protecteur de la sensibilité maternelle. Le quatrième article visait à investiguer les rôles médiateurs de la dépression et de la sensibilité maternelle dans la relation entre un historique d’adversité maternelle et le tempérament de l’enfant. L’historique d’adversité maternelle fut évalué en combinant deux mesures auto-rapportées. Les mères ont également rapporté leurs symptômes dépressifs à 6 mois. La sensibilité maternelle fut évaluée de façon concomitante. Les mères ont évalué le tempérament de leur enfant à 36 mois. Les résultats ont révélé une transmission intergénérationnelle des effets d’un historique d’adversité maternelle à la génération suivante suivant une médiation séquentielle passant d’abord par la dépression maternelle et ensuite par la sensibilité maternelle. Finalement, les résultats des quatre articles ont été intégrés dans la conclusion générale.
Resumo:
La prévalence importante des troubles d’adaptation au sein de la population d’enfants et d’adolescents du Québec appuient l’importance d’accorder une attention particulière aux piliers développementaux influençant leur trajectoire (Ministère de la Santé et des Services sociaux du Québec, 2002). Dans ce sens, des données longitudinales ont permis de statuer sur la nature de l’impact de la relation d’attachement entre le parent et l’enfant sur son adaptation ultérieure (Sroufe, Egeland, Carlson, & Collins, 2005). La sécurité d’attachement aurait un rôle protecteur, mais cette relation a aussi été identifiée comme le système le plus influent dans la compromission du développement de l’enfant (Cicchetti & Valentino, 2006). Parmi les interventions disponibles, le programme d’intervention Circle of Security Parenting (COS-P) (Powell, Cooper, Hoffman, & Marvin, 2009) s’avère particulièrement prometteur étant donnée la qualité de l’intégration théorique et clinique qui le sous-tend. Cependant, aucune donnée n’est encore disponible pour appuyer son efficacité au sein de la population québécoise dans un contexte de soins de première ligne. La présente étude vise ainsi à amorcer cette démarche avec un devis pré/post tests en explorant les effets du protocole d’intervention COS-P auprès de quatre mères et leur enfant d’âge préscolaire. À ces fins, des mesures cernant la fonction réflexive parentale et les dimensions des représentations de l’expérience affective du parent (Parent Development Interview – PDI; Aber, Slade, Berger, Bresgi & Kaplan, 1985) sont recueillies avant et après l’intervention. Les retombées de l’intervention sont aussi examinées chez les parents au niveau du stress parental (Parental Stress Index — PSI; Abidin, 1995; Bigras, LaFrenière, & Abidin, 1996) et au niveau des problèmes comportementaux et émotionnels chez les enfants (Child Behavior Checklist – CBCL; Achenbach & Rescorla, 2000). L’ensemble de ces données est analysé dans un premier temps avec perspective groupale et dans un deuxième temps, avec une perspective individuelle descriptive détaillant les résultats pour chaque participante. Les analyses ne permettent pas de démontrer une amélioration des représentations parentales et une augmentation de la fonction réflexive parentale, tel qu’attendu. Toutefois, le stress parental et les problèmes intériorisés des enfants diminuent, bien que de façon non significative. Il est proposé que l’effet de l’intervention soit compris en considérant le parent à l’intérieur d’un système dynamique, lui permettant de s’approprier l’intervention à travers un ensemble de facteurs qui lui sont propres. Des suggestions pour les études futures sont formulées en regard des constats méthodologiques et cliniques qui se dégagent de la présente étude notamment quant à la pertinence de mesures de relance (Navarro, manuscrit en préparation) et à la poursuite de la démonstration de l’efficacité du protocole avec un devis expérimental (Lemieux, manuscrit en préparation).
Resumo:
Thesis (Master's)--University of Washington, 2016-08
Resumo:
The discipline of counselling psychology continues to grow and change in response to social, economic and political pressures. It has been argued that its quest for a coherent and distinct identity, which emphasises the possibility of the coexistence of multiple approaches, creates an inherently uncertain and dilemmatic training environment that may hinder the development of trainees’ professional identities. In order to gain a deeper understanding of the issue at hand, the aim was to explore how final year trainees and newly qualified counselling psychologists constructed and made sense of their emerging professional identities and what experiences, past and present, they drew upon in the context of their training to shape those identities. Applying narrative inquiry to analyse eight open-ended interviews, eight preliminary themes were originally identified in participants’ narratives, which with further refinements lead to stories of struggle and marginalisation, growth and discovery, and power and resilience. Participants’ stories of struggle and marginalisation emerged in reference to early family dynamics and stressful life experiences, which seemed to also foster a strong identification with the counselling psychology profession, while stories of growth and discovery focused on the importance of having supportive figures, who helped to instill a sense of security and create an atmosphere of openness. It was in this learning environment that participants felt it was possible to develop a more resilient, empowered professional self, which allowed them to shed an earlier sense of struggle and vulnerability. However, where more of an emphasis was placed on power and resilience, there seemed to be less room for participants to express other feelings that came into conflict with their preferred sense of professional self. While there seems to be a need for a ‘safer’ climate, in which trainees could voice and acknowledge anxieties, vulnerabilities and limitations, addressing concerns around power and vulnerability that may be contributing to the silencing of particular voices and identities may be equally important if trainees are to develop coherent and distinct counselling psychologist identities.
Resumo:
This essay addresses the fundamental conceptual challenges which face the development of the Area of Freedom Security and Justice (AFSJ) in the post-Lisbon Treaty era. It argues that Onuf style constructivism is a valid lens with which to examine the development of the AFSJ to date, involving as it does the development of a shared understanding by practitioners, predominantly law enforcement and prosecution professionals, within the structures provided for them, in order to develop a completely new area of law and practice. While this approach will continue to need to be deployed in the development of further new operational areas, such as cybercrime, a new approach is now required, that of constitutionalism. A variety of forms of constitutionalism are then examined in order to establish their suitability as a mode of analysis for these developments.
Resumo:
The traditional process of filling the medicine trays and dispensing the medicines to the patients in the hospitals is manually done by reading the printed paper medicine chart. This process can be very strenuous and error-prone, given the number of sub-tasks involved in the entire workflow and the dynamic nature of the work environment. Therefore, efforts are being made to digitalise the medication dispensation process by introducing a mobile application called Smart Dosing application. The introduction of the Smart Dosing application into hospital workflow raises security concerns and calls for security requirement analysis. This thesis is written as a part of the smart medication management project at Embedded Systems Laboratory, A° bo Akademi University. The project aims at digitising the medicine dispensation process by integrating information from various health systems, and making them available through the Smart Dosing application. This application is intended to be used on a tablet computer which will be incorporated on the medicine tray. The smart medication management system include the medicine tray, the tablet device, and the medicine cups with the cup holders. Introducing the Smart Dosing application should not interfere with the existing process carried out by the nurses, and it should result in minimum modifications to the tray design and the workflow. The re-designing of the tray would include integrating the device running the application into the tray in a manner that the users find it convenient and make less errors while using it. The main objective of this thesis is to enhance the security of the hospital medicine dispensation process by ensuring the security of the Smart Dosing application at various levels. The methods used for writing this thesis was to analyse how the tray design, and the application user interface design can help prevent errors and what secure technology choices have to be made before starting the development of the next prototype of the Smart Dosing application. The thesis first understands the context of the use of the application, the end-users and their needs, and the errors made in everyday medication dispensation workflow by continuous discussions with the nursing researchers. The thesis then gains insight to the vulnerabilities, threats and risks of using mobile application in hospital medication dispensation process. The resulting list of security requirements was made by analysing the previously built prototype of the Smart Dosing application, continuous interactive discussions with the nursing researchers, and an exhaustive stateof- the-art study on security risks of using mobile applications in hospital context. The thesis also uses Octave Allegro method to make the readers understand the likelihood and impact of threats, and what steps should be taken to prevent or fix them. The security requirements obtained, as a result, are a starting point for the developers of the next iteration of the prototype for the Smart Dosing application.
Resumo:
Fisheries plays a significant and important part in the economy of the country contributing to foreign exchange, food security and employment creation. Lake Victoria contributes over 50% of the total annual fish catch. The purpose of fisheries management is to ensure conservation, protection, proper use, economic efficiency and equitable distribution of the fisheries resources both for the present and future generations through sustainable utilization. The earliest fisheries were mainly at the subsistence level. Fishing gear consisted of locally made basket traps, hooks and seine nets of papyrus. Fishing effort begun to increase with the introduction of more efficient flax gillnets in 1905. Fisheries management in Uganda started in 1914. Before then, the fishery was under some form of traditional management based on the do and don'ts. History shows that the Baganda had strong spiritual beliefs in respect of "god Mukasa" (god of the Lake) and these indirectly contributed to sustainable management of the lake. If a fisherman neglected to comply witt'l any of the ceremonies related to fishing he was expected to encounter a bad omen (Rev. Roscoe, 1965) However, with the introduction of the nylon gill nets, which could catch more fish, traditional management regime broke down. By 1955 the indigenous fish species like Oreochromis variabilis and Oreochromis esculentus had greatly declined in catches. Decline in catches led to introduction of poor fishing methods because of competition for fish. Government in an attempt to regulate the fishing irldustry enacted the first Fisheries Ordinance in 1951 and recruited Fisheries Officers to enforce them. The government put in place minimum net mesh-sizes and Fisheries Officers arrested fishermen without explaining the reason. This led to continued poor fishing practices. The development of government centred management systems led to increased alienation of resource users and to wilful disregard of specific regulations. The realisation of the problems faced by the central management system led to the recognition that user groups need to be actively involved in fisheries management if the systems are to be consistent with sustainable fisheries and be legitimate. Community participation in fisheries management under the Comanagement approach has been adopted in Lake Victoria including other water bodies.
Resumo:
The goal of this study was to examine the antecedents and correlates of children’s mental representations of attachment at 5 years (Attachment Story Completion Task, Bretherton, Ridgeway, & Cassidy, 1990; MacArthur Story Stem Battery, Bretherton, Oppenheim, Buchsbaum, Emde, & the MacArthur Narrative Group, 1990). Predictors included children’s attachment security with mothers and fathers assessed via the Attachment Q-Set (AQS, Waters, 1987) at 3 years, and parent-child narrative quality regarding positive and negative events at 5 years. Participants included 71 children and their mothers and fathers. Structural equation models (SEM) indicated that children’s attachment security exerted a significant indirect effect on children’s mental representations through parent-child narrative quality. Specifically, children’s attachment security with fathers was related to their mental representations via father-child reminiscing about positive events, and children’s attachment security with mothers was related to their mental representations via mother-child reminiscing about negative events. Results are discussed in terms of the development and implications of attachment relationships within the family context.
Resumo:
The traditional process of filling the medicine trays and dispensing the medicines to the patients in the hospitals is manually done by reading the printed paper medicinechart. This process can be very strenuous and error-prone, given the number of sub-tasksinvolved in the entire workflow and the dynamic nature of the work environment.Therefore, efforts are being made to digitalise the medication dispensation process byintroducing a mobile application called Smart Dosing application. The introduction ofthe Smart Dosing application into hospital workflow raises security concerns and callsfor security requirement analysis. This thesis is written as a part of the smart medication management project at EmbeddedSystems Laboratory, A˚bo Akademi University. The project aims at digitising the medicine dispensation process by integrating information from various health systems, and making them available through the Smart Dosing application. This application is intended to be used on a tablet computer which will be incorporated on the medicine tray. The smart medication management system include the medicine tray, the tablet device, and the medicine cups with the cup holders. Introducing the Smart Dosing application should not interfere with the existing process carried out by the nurses, and it should result in minimum modifications to the tray design and the workflow. The re-designing of the tray would include integrating the device running the application into the tray in a manner that the users find it convenient and make less errors while using it. The main objective of this thesis is to enhance the security of the hospital medicine dispensation process by ensuring the security of the Smart Dosing application at various levels. The methods used for writing this thesis was to analyse how the tray design, and the application user interface design can help prevent errors and what secure technology choices have to be made before starting the development of the next prototype of the Smart Dosing application. The thesis first understands the context of the use of the application, the end-users and their needs, and the errors made in everyday medication dispensation workflow by continuous discussions with the nursing researchers. The thesis then gains insight to the vulnerabilities, threats and risks of using mobile application in hospital medication dispensation process. The resulting list of security requirements was made by analysing the previously built prototype of the Smart Dosing application, continuous interactive discussions with the nursing researchers, and an exhaustive state-of-the-art study on security risks of using mobile applications in hospital context. The thesis also uses Octave Allegro method to make the readers understand the likelihood and impact of threats, and what steps should be taken to prevent or fix them. The security requirements obtained, as a result, are a starting point for the developers of the next iteration of the prototype for the Smart Dosing application.
Resumo:
Particular strengths of the MRC Needs for Care Assessment Schedule have been used to investigate the treatment status of patients with persistent psychiatric disability in ways that other needs assessment tools are unable to. One hundred and seventy-nine such patients from three settings; a private sector psychiatric hospital, two public sector day hospitals situated in the same town, and a high security hospital, were found to have a high level of need. Although there were differences between settings, overall these needs were well met in all three. The high level of persistent disability found amongst these patients could not be attributed to failure on the part of those treating them to use the best available methods, or to failures to comply or engage with treatment on the patient's part. In some two thirds of instances persistent disability was best explained by the fact that even the most suitable available treatments have to be considered only partially effective.