974 resultados para Software Security
Resumo:
In most European countries Social Security (SS) systems are characterized as Pay-asyou- go systems. Their sustainability is being challenged with demographic changes, namely population ageing. Portugal’s population is ageing rapidly being one of the countries where this problem is more critical. With the growing debate on this topic several public choice models have been developed so as to explain SS size. In this work project there is an attempt to understand whether these models contribute to better explain Social security expenditure with pensions (SSEP) and to establish the need of finding ways to reduce present commitment with pension expenditure in Portugal.
Resumo:
RESUMO: Objetivo Principal • Determinar a consistência da utilização dos instrumentos de avaliação da capacidade intelectual – escalas de Griffiths e WISC III – no enquadramento dos domínios e dos qualificadores da CIF-CJ, restrita às funções mentais do corpo. Objetivo secundário: • Estudar a efetividade e concordância inter-observador da aplicação da CIF, com base na leitura dos dados obtidos em avaliação efetuada com os instrumentos referidos, por duas observadoras independentes, em contexto de articulação saúde, respetivamente educação e segurança social Métodos • Estudo observacional, descritivo, transversal e prospetivo. • Foi estudada uma amostra de conveniência 355 crianças, num período de três anos (Maio de 2010 a 30 de Abril de 2013), com patologia da área da pediatria do neurodesenvolvimento (total de 4000 consultas) no Centro de Desenvolvimento (CD) do Hospital de Dona Estefânia (HDE), Centro Hospitalar de Lisboa Central, EPE (CHLC, EPE). • Critérios de inclusão: crianças de ambos os sexos, observadas no CD do HDE, CHLC (primeiras consultas e consultas de reavaliação) com idade ≥12 meses e ≤17 anos e incapacidade intelectual definida de acordo com os critérios da DSM-IV-TR, DSM 5 e CID-10. • Critérios de exclusão: crianças com autismo, perturbações específicas da linguagem, hiperatividade, défice de atenção e concentração, défices sensoriais congénitos (baixa visão e ou audição), ou com outros diagnósticos de perturbações de neurodesenvolvimento. • O estudo teve duas fases: na primeira, a investigadora principal colheu ou atualizou a história clínica, observou clinicamente as crianças solicitando os exames complementares considerados necessários e foi efetuada avaliação psicológica com os instrumentos adiante descritos, pela mesma psicóloga clínica, devidamente credenciada, e com larga experiência nas escalas referidas. Com base nos dados colhidos, quer por observação direta, quer através dos resultados das escalas Griffiths e WISC – III, a investigadora aplicou a CIF-CJ, circunscrita aos domínios e funções (variáveis): 1. FUNÇÕESMENTAIS GLOBAIS (b110- Funções da consciência, b114- Funções da orientação no espaço e no tempo, b117 – Funções intelectuais, b122- Funções psicossociais globais, b125- Funções intrapessoais, b126- Funções do temperamento e da personalidade); 2.FUNÇÕES MENTAIS ESPECÌFICAS (b140- funções da atenção, b147- Funções psicomotoras, b152- Funções emocionais, b156- Funções da perceção, b163- Funções cognitivas básicas, b164- Funções cognitivas de nível superior, b167- Funções mentais da linguagem 3. FUNÇÕES DA VOZ E DA FALA (b320- Funções da articulação, b330- Funções da fluência e do ritmo da fala). Numa segunda fase, foi solicitada a colaboração de duas co-investigadoras, com formação específica nas escalas utilizadas e na CIF-CJ, a aplicação da CIF nos mesmos domínios e funções. Estas observadoras não efetuaram observações diretas das crianças envolvidas. • Para efetuar a análise estatística e analisar a relação entre os qualificadores (0 a 4) das variáveis da CIF em estudo (b117, b122, b147, b163, b164, b167, b320 e b330) e os instrumentos psicométricos (escalas de Griffiths e WISC III), que constitui a primeira parte do estudo, recorreu-se à técnica estatística não paramétrica do coeficiente de correlação de Spearman, que quantifica a intensidade e sinal da eventual correlação existente entre as variáveis em estudo. • Para determinar as correlações referentes à segunda parte do estudo, foram utilizados os programas SPSS®, (IBM SPSS Statistics) e Statistica® (StatSoft, Inc., 2011). STATISTICA (data analysis software system, version 10. www.statsoft.com.), tendo-se dado preferência aos gráficos deste último. Resultados 1. Observou-se um predomínio do sexo masculino (relação de 1:1,9); relativamente à idade no momento de avaliação, 242 crianças (68,1%) tinham entre zero e seis anos e, dentro destas, a maioria (189) situava-se entre os três e os seis anos. 2. De acordo com a DSM-IV e DSM-5, 261 (73,4%) crianças apresentavam incapacidade intelectual ligeira. 3. A avaliação da competência intelectual pelas escalas de Ruth Griffiths e WISC III (QI), revelaram correlação negativa predominantemente forte e muito forte (índice de Spearman) com os qualificadores das funções do corpo estudadas (funções mentais, mentais específicas e da voz). Os resultados obtidos pela co-investigadora A foram sobreponíveis aos da investigadora principal. Os resultados obtidos pela co-investigadora B revelaram correlação negativa moderada e forte, correlação inferior à da investigadora principal; Conclusões Os resultados permitem inferir que as escalas de Ruth Griffiths e WISC-III são instrumentos adequados para caracterizar a incapacidade intelectual na CIF-CJ; a concordância inter-observador, moderada, nos qualificadores atribuídos nas funções em análise pela investigadora e co-investigadoras, permite concluir que as escalas de Ruth Griffiths e WISC IIIl são bons instrumentos para caracterizar os qualificadores nos domínios e funções estudados, por diferentes grupos de profissionais ligados à infância. Subsistem dificuldades na diferenciação entre qualificadores, designadamente entre os qualificadores 1 e 2, o que tem necessariamente implicações na elegibilidade das crianças para os apoios preconizados pelo DL 3/2008. ------------------------ ABSTRACT: Main objective • To determine the consistency of the use of assessment tools for intellectual ability - Griffiths and WISC III scales - in the context of domains and qualifiers for the ICF-CY, restricted to the mental functions of the body. Secondary objective • Studying the effectiveness and inter-observer concordance concerning the application of the ICF, based on the data recovered from the assessment made with the mentioned instruments, carried out by two independent observers including their perspective on health, education and social security. Methods • Observational, descriptive, cross-sectional and prospective study. • A convenience sample of 355 children was studied over a period of three years (May 2010 to April 2013), with a pathology in the area of pediatric neurodevelopment – intellectual disability (total of 4000 consultations, including first consultations and revaluations) were observed in the Development Centre (CD) in Hospital de Dona Estefânia (HDE), Centro Hospitalar de Lisboa Central, EPE (CHLC). • Inclusion criteria: children of both sexes aged ≥12 months and years ≤17 and intellectual disability defined according to the criteria in the DSM-IV-TR, DSM 5 and ICD-10. • Exclusion criteria: children with autism; specific language impairment, hyperactivity; attention deficit disorder; severe birth sensory deficits (eg, impaired vision and hearing); amongst other diagnoses for neurodevelopmental disorders. • The study was conducted in two phases: in the first phase the principal investigator collected or updated medical history, clinically observed children requesting additional investigations if she deemed necessary. Psychological evaluation was performed by a single, duly licensed clinical psychologist with extensive experience in the referred scales using the instruments described below. Based on data collected, either by direct observation or through the results of Griffiths scales and WISC - III, the researcher applied the ICF-CY confined to the following fields and functions (variables): 1. GLOBAL MENTAL FUNCTIONS (b110- functions of consciousness, b114- Functions referring to space and time orientation , b117 - intellectual functions, b122- global psychosocial functions, b125- intrapersonal functions, b126- functions related to temperament and personality); 2. SPECIFIC MENTAL FUNCTIONS ( b140- attention functions, b147-psychomotor functions, b152- Emotional functions, b156- perception functions, b163- basic cognitive functions and cognitive functions b164- top level b167- language related mental functions. ) 3. VOICE AND SPEECH FUNCTIONS (b320-articulation functions, b330- fluency and rhythm of speech functions). • In the second phase, two co-investigators, with specific training on the scales used and the ICF-CY have applied the ICF in the domains and functions mentioned above, based on the scales results. These co-investigators did not make any direct observation of the studied children. • To perform the statistical analysis and analyze the relationship between the qualifiers (0-4) of the variables in the ICF study (b117, b122, b147, B163, B164, b167, b320 and B330) and psychometric instruments (Griffiths scale and WISC III), which is the first part of the study, the statistical technique of non-parametric Spearman correlation coefficient was used, which quantifies the strength and sign of the possible correlation between the variables under study. • For submission of correlations related to the second part of the study, SPSS (IBM SPSS) and Statistica (StatSoft, Inc., 2011) programs were used. STATISTICA (data analysis software system, version 10 www.statsoft.com.). Preference was given to graphs computed in Statistica. Results • Male predominated (ratio of 1: 1.9). 242 children (68.1% of the sample) were aged between zero and six years and, among these, the majority (189) was aged largest number between three and six years. • According to the DSM-IV and DSM-5, 261 (73.4%) children had mild intellectual disability. The correlation between the assessment of intellectual competence by Ruth Griffiths scales and WISC III (QI), was predominantly negative strong and very strong correlation with the qualifiers of body functions studied (specific mental functions, mental and voice functions using Spearman index). The levels of correlation obtained by the co-investigatores were in agreeance with the results from the principal investigator. The results obtained by co-investigator B showed moderate to strong negative correlation, levels that were lower to the those registered by the principal investigator; Conclusions These results indicate that Ruth Griffiths and WISC-III scales are adequate tools to characterize intellectual disability in the ICF-CY; moderate inter-observer agreement in the qualifiers assigned the functions under analysis by the researcher and co-researchers, shows that the scales are also good tools to measure CIF qualifyers by diferent technicians with different professional orientations, related to children. However, there are still difficulties in differentiating qualifiers, namely between qualifiers 1/2 and 3/4, which necessarily has implications for the eligibility of children for the state support advocated by the Portuguese Decret Law 3/2008.
Resumo:
Introduction. The genera Enterococcus, Staphylococcus and Streptococcus are recognized as important Gram-positive human pathogens. The aim of this study was to evaluate the performance of Vitek 2 in identifying Gram-positive cocci and their antimicrobial susceptibilities. Methods. One hundred four isolates were analyzed to determine the accuracy of the automated system for identifying the bacteria and their susceptibility to oxacillin and vancomycin. Results. The system correctly identified 77.9% and 97.1% of the isolates at the species and genus levels, respectively. Additionally, 81.8% of the Vitek 2 results agreed with the known antimicrobial susceptibility profiles. Conclusion. Vitek 2 correctly identified the commonly isolated strains; however, the limitations of the method may lead to ambiguous findings.
Resumo:
I test the Duffie, Gârleanu, and Pedersen hypothesis that security prices incorporate expected future securities lending income. To determine whether institutional investors anticipate gains from future lending of securities, I examine their trading behavior around loan-fee increases. The evidence suggests that institutions buy shares in response to an increase in lending fees, and that this could explain the premium associated with high- lending-fee stocks. Expected future lending income affects stock prices, although the effect seems to be attenuated by the negative information that arises from short selling.
Resumo:
Software Product Line (SPL) engineering aims at achieving efficient development of software products in a specific domain. New products are obtained via a process which entails creating a new configuration specifying the desired product’s features. This configuration must necessarily conform to a variability model, that describes the scope of the SPL, or else it is not viable. To ensure this, configuration tools are used that do not allow invalid configurations to be expressed. A different concern, however, is making sure that a product addresses the stakeholders’ needs as best as possible. The stakeholders may not be experts on the domain, so they may have unrealistic expectations. Also, the scope of the SPL is determined not only by the domain but also by limitations of the development platforms. It is therefore possible that the desired set of features goes beyond what is possible to currently create with the SPL. This means that configuration tools should provide support not only for creating valid products, but also for improving satisfaction of user concerns. We address this goal by providing a user-centric configuration process that offers suggestions during the configuration process, based on the use of soft constraints, and identifying and explaining potential conflicts that may arise. Suggestions help mitigating stakeholder uncertainty and poor domain knowledge, by helping them address well known and desirable domain-related concerns. On the other hand, automated conflict identification and explanation helps the stakeholders to understand the trade-offs required for realizing their vision, allowing informed resolution of conflicts. Additionally, we propose a prototype-based approach to configuration, that addresses the order-dependency issues by allowing the complete (or partial) specification of the features in a single step. A subsequent resolution process will then identify possible repairs, or trade-offs, that may be required for viabilization.
Resumo:
The recent massive inflow of refugees to the European Union (EU) raises a number of unanswered questions on the economic impact of this phenomenon. To examine these questions, we constructed an overlapping-generations model that describes the evolution of the skill premium and of the welfare benefit level in relevant European countries, in the aftermath of an inflow of asylum-seekers. In our simulation, relative wages of skilled workers increase between 8% and 11% in the period of the inflow; their subsequent time path is dependent on the initial skill premium. The entry of migrants creates a fiscal surplus of about 8%, which can finance higher welfare benefits in the subsequent periods. These effects are weaker in a scenario where refugees do not fully integrate into the labor market.
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.
Resumo:
Os estudos da satisfação e lealdade do cliente em ambiente Business-to-Business têm emergido devido ao interesse práctico e académico. Recorreu-se a um caso práctico de uma empresa de software internacional, ESRI, a operar em Portugal com modelo de negócio B2B e comportamento de compra extensivo. Desenvolveu-se um modelo estrutural com 11 variáveis latentes: lealdade; satisfação; imagem; atmosfera; cooperação; adaptação; processos; tecnologia; orientação ao cliente; competências; colaboradores e comunicação. Foram analisadas 304 respostas ao questionário de satisfação e de seguida aplicou-se o modelo a seis grupos de clientes segmentados de acordo com a contribuição do cliente para as receitas e o comportamento no processo de decisão de compra. Recorreu-se a modelos SEM (Structural Equation Modelling) com estimação dos parâmetros através da metodologia PLS (partial Least Squares). Os resultados mostram nos seis segmentos, que os valores da empresa, a cooperação através da competência dos colaboradores e da orientação ao cliente e a tecnologia são factores mais importantes para a satisfação e lealdade dos clientes.
Resumo:
Security risk management is by definition, a subjective and complex exercise and it takes time to perform properly. Human resources are fundamental assets for any organization, and as any other asset, they have inherent vulnerabilities that need to be handled, i.e. managed and assessed. However, the nature that characterize the human behavior and the organizational environment where they develop their work turn these task extremely difficult, hard to accomplish and prone to errors. Assuming security as a cost, organizations are usually focused on the efficiency of the security mechanisms implemented that enable them to protect against external attacks, disregarding the insider risks, which are much more difficult to assess. All these demands an interdisciplinary approach in order to combine technical solutions with psychology approaches in order to understand the organizational staff and detect any changes in their behaviors and characteristics. This paper intends to discuss some methodological challenges to evaluate the insider threats and its impacts, and integrate them in a security risk framework, that was defined according to the security standard ISO/IEC_JTC1, to support the security risk management process.
Resumo:
Information security is concerned with the protection of information, which can be stored, processed or transmitted within critical information systems of the organizations, against loss of confidentiality, integrity or availability. Protection measures to prevent these problems result through the implementation of controls at several dimensions: technical, administrative or physical. A vital objective for military organizations is to ensure superiority in contexts of information warfare and competitive intelligence. Therefore, the problem of information security in military organizations has been a topic of intensive work at both national and transnational levels, and extensive conceptual and standardization work is being produced. A current effort is therefore to develop automated decision support systems to assist military decision makers, at different levels in the command chain, to provide suitable control measures that can effectively deal with potential attacks and, at the same time, prevent, detect and contain vulnerabilities targeted at their information systems. The concept and processes of the Case-Based Reasoning (CBR) methodology outstandingly resembles classical military processes and doctrine, in particular the analysis of “lessons learned” and definition of “modes of action”. Therefore, the present paper addresses the modeling and design of a CBR system with two key objectives: to support an effective response in context of information security for military organizations; to allow for scenario planning and analysis for training and auditing processes.
Resumo:
This work was supported by FCT (Fundação para a Ciência e Tecnologia) within Project Scope (UID/CEC/00319/2013), by LIP (Laboratório de Instrumentação e Física Experimental de Partículas) and by Project Search-ON2 (NORTE-07-0162- FEDER-000086), co-funded by the North Portugal Regional Operational Programme (ON.2 - O Novo Norte), under the National Strategic Reference Framework, through the European Regional Development Fund.
Resumo:
An increasing number of m-Health applications are being developed benefiting health service delivery. In this paper, a new methodology based on the principle of calm computing applied to diagnostic and therapeutic procedure reporting is proposed. A mobile application was designed for the physicians of one of the Portuguese major hospitals, which takes advantage of a multi-agent interoperability platform, the Agency for the Integration, Diffusion and Archive (AIDA). This application allows the visualization of inpatients and outpatients medical reports in a quicker and safer manner, in addition to offer a remote access to information. This project shows the advantages in the use of mobile software in a medical environment but the first step is always to build or use an interoperability platform, flexible, adaptable and pervasive. The platform offers a comprehensive set of services that restricts the development of mobile software almost exclusively to the mobile user interface design. The technology was tested and assessed in a real context by intensivists.
Resumo:
Tese de Doutoramento em Tecnologias e Sistemas de Informação