874 resultados para Routine Activity Theory
Resumo:
BACKGROUND: Tobacco industry interference has been identified as the greatest obstacle to the implementation of evidence-based measures to reduce tobacco use. Understanding and addressing industry interference in public health policy-making is therefore crucial. Existing conceptualisations of corporate political activity (CPA) are embedded in a business perspective and do not attend to CPA's social and public health costs; most have not drawn on the unique resource represented by internal tobacco industry documents. Building on this literature, including systematic reviews, we develop a critically informed conceptual model of tobacco industry political activity. METHODS AND FINDINGS: We thematically analysed published papers included in two systematic reviews examining tobacco industry influence on taxation and marketing of tobacco; we included 45 of 46 papers in the former category and 20 of 48 papers in the latter (n = 65). We used a grounded theory approach to build taxonomies of "discursive" (argument-based) and "instrumental" (action-based) industry strategies and from these devised the Policy Dystopia Model, which shows that the industry, working through different constituencies, constructs a metanarrative to argue that proposed policies will lead to a dysfunctional future of policy failure and widely dispersed adverse social and economic consequences. Simultaneously, it uses diverse, interlocking insider and outsider instrumental strategies to disseminate this narrative and enhance its persuasiveness in order to secure its preferred policy outcomes. Limitations are that many papers were historical (some dating back to the 1970s) and focused on high-income regions. CONCLUSIONS: The model provides an evidence-based, accessible way of understanding diverse corporate political strategies. It should enable public health actors and officials to preempt these strategies and develop realistic assessments of the industry's claims.
Resumo:
The purpose of this study was to assess the intention to exercise among ethnically and racially diverse community college students using the Theory of Planned Behavior (TPB). In addition to identifying the variables associated with motivation or intention of college students to engage in physical activity, this study tested the model of the Theory of Planned Behavior, asking: Does the TPB model explain intention to exercise among a racially/ethnically diverse group of college students? The relevant variables were the TPB constructs (behavioral beliefs, normative beliefs, and control beliefs), which combined to form a measure of intention to exercise. Structural Equation Modeling was used to test the predictive power of the TPB constructs for predicting intention to exercise. Following procedures described by Ajzen (2002), the researcher developed a questionnaire encompassing the external variables of student demographics (age, gender, work status, student status, socio-economic status, access to exercise facilities, and past behavior), major constructs of the TPB, and two questions from the Godin Leisure Time Questionnaire (GLTQ; Godin & Shephard, 1985). Participants were students (N = 255) who enrolled in an on-campus wellness course at an urban community college. The demographic profile of the sample revealed a racially/ethnically diverse study population. The original model that was used to reflect the TPB as developed by Ajzen was not supported by the data analyzed using SEM; however, a revised model that the researcher thought was theoretically a more accurate reflection of the causal relations between the TPB constructs was supported. The GLTQ questions were problematic for some students; those data could not be used in the modeling efforts. The GLTQ measure, however, revealed a significant correlation with intention to exercise (r = .27, p = .001). Post-hoc comparisons revealed significant differences in normative beliefs and attitude toward exercising behavior between Black students and Hispanic students. Compared to Black students, Hispanic students were more likely to (a) perceive “friends” as approving of them being physically active and (b) rate being physically active for 30 minutes per day as “beneficial”. No statistically significant difference was found among groups on overall intention to exercise.
Resumo:
Coronal jets represent important manifestations of ubiquitous solar transients, which may be the source of significant mass and energy input to the upper solar atmosphere and the solar wind. While the energy involved in a jet-like event is smaller than that of “nominal” solar flares and coronal mass ejections (CMEs), jets share many common properties with these phenomena, in particular, the explosive magnetically driven dynamics. Studies of jets could, therefore, provide critical insight for understanding the larger, more complex drivers of the solar activity. On the other side of the size-spectrum, the study of jets could also supply important clues on the physics of transients close or at the limit of the current spatial resolution such as spicules. Furthermore, jet phenomena may hint to basic process for heating the corona and accelerating the solar wind; consequently their study gives us the opportunity to attack a broad range of solar-heliospheric problems.
Resumo:
A simple but efficient voice activity detector based on the Hilbert transform and a dynamic threshold is presented to be used on the pre-processing of audio signals -- The algorithm to define the dynamic threshold is a modification of a convex combination found in literature -- This scheme allows the detection of prosodic and silence segments on a speech in presence of non-ideal conditions like a spectral overlapped noise -- The present work shows preliminary results over a database built with some political speech -- The tests were performed adding artificial noise to natural noises over the audio signals, and some algorithms are compared -- Results will be extrapolated to the field of adaptive filtering on monophonic signals and the analysis of speech pathologies on futures works
Resumo:
This paper is part of the Project “Adaptive thinking and flexible computation: Critical issues”. In this paper we discuss different perspectives of flexibility and adaptive thinking in literature. We also discuss the idea of proceptual thinking and how this idea is important in our perspective of adaptive thinking. The paper analyses a situation developed with a first grade classroom and its teacher named the day number. It is a daily activity at the beginning of the school day. It consists on to look for the date number and to think about different ways of writing it using the four arithmetic operations. The analyzed activity was developed on March 19, so the challenge was to write 19 in several ways. The data show the pupils’ enthusiasm and their efforts to find different ways of writing the number. Some used large numbers and division, which they were just starting to learn. The pupils presented symbolic expressions of 19, decomposing and recomposing it in a flexible manner.
Resumo:
Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
Researchers have demonstrated how engaging in rituals or ‘patterned’ behaviours can help people cope with stressful situations and significant life changes. However, limited knowledge exists on the role of ritual practices in prison and how federally incarcerated Canadian men use these rituals to deal with their imprisonment. To respond to this lacuna in the literature, transcripts from 56 semi-structured interviews with former male federal prisoners released on parole into Ontario, Canada, were analyzed for emergent themes identifying the purpose of ritual and routine practices across prisons with different security classifications. Findings reveal the effectiveness of rituals for managing and mitigating the stresses of incarceration, specifically that prisoners’ routine behaviours constitute a positive strategy of adaption to incarceration (e.g., alleviating stress and passing time) in preparation for life postincarceration (e.g., anticipatory socialization). Structural Ritualization Theory frames the analyses and implications presented in this study.
Resumo:
Abstract We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new 'Danger Theory' (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of 'grounding' the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
Receiving personalised feedback on body mass index and other health risk indicators may prompt behaviour change. Few studies have investigated men’s reactions to receiving objective feedback on such measures and detailed information on physical activity and sedentary time. The aim of my research was to understand the meanings different forms of objective feedback have for overweight/obese men, and to explore whether these varied between groups. Participants took part in Football Fans in Training, a gender-sensitised, weight loss programme delivered via Scottish Professional Football Clubs. Semi-structured interviews were conducted with 28 men, purposively sampled from four clubs to investigate the experiences of men who achieved and did not achieve their 5% weight loss target. Data were analysed using the principles of thematic analysis and interpreted through Self-Determination Theory and sociological understandings of masculinity. Several factors were vital in supporting a ‘motivational climate’ in which men could feel ‘at ease’ and adopt self-regulation strategies: the ‘place’ was described as motivating, whereas the ‘people’ (other men ‘like them’; fieldwork staff; community coaches) provided supportive and facilitative roles. Men who achieved greater weight loss were more likely to describe being motivated as a consequence of receiving information on their objective health risk indicators. They continued using self-monitoring technologies after the programme as it was enjoyable; or they had redefined themselves by integrating new-found activities into their lives and no longer relied on external technologies/feedback. They were more likely to see post-programme feedback as confirmation of success, so long as they could fully interpret the information. Men who did not achieve their 5% weight loss reported no longer being motivated to continue their activity levels or self-monitor them with a pedometer. Social support within the programme appeared more important. These men were also less positive about objective post-programme feedback which confirmed their lack of success and had less utility as a motivational tool. Providing different forms of objective feedback to men within an environment that has intrinsic value (e.g. football club setting) and congruent with common cultural constructions of masculinity, appears more conducive to health behaviour change.
Resumo:
We present ideas about creating a next generation Intrusion Detection System (IDS) based on the latest immunological theories. The central challenge with computer security is determining the difference between normal and potentially harmful activity. For half a century, developers have protected their systems by coding rules that identify and block specific events. However, the nature of current and future threats in conjunction with ever larger IT systems urgently requires the development of automated and adaptive defensive tools. A promising solution is emerging in the form of Artificial Immune Systems (AIS): The Human Immune System (HIS) can detect and defend against harmful and previously unseen invaders, so can we not build a similar Intrusion Detection System (IDS) for our computers? Presumably, those systems would then have the same beneficial properties as HIS like error tolerance, adaptation and self-monitoring. Current AIS have been successful on test systems, but the algorithms rely on self-nonself discrimination, as stipulated in classical immunology. However, immunologist are increasingly finding fault with traditional self-nonself thinking and a new ‘Danger Theory’ (DT) is emerging. This new theory suggests that the immune system reacts to threats based on the correlation of various (danger) signals and it provides a method of ‘grounding’ the immune response, i.e. linking it directly to the attacker. Little is currently understood of the precise nature and correlation of these signals and the theory is a topic of hot debate. It is the aim of this research to investigate this correlation and to translate the DT into the realms of computer security, thereby creating AIS that are no longer limited by self-nonself discrimination. It should be noted that we do not intend to defend this controversial theory per se, although as a deliverable this project will add to the body of knowledge in this area. Rather we are interested in its merits for scaling up AIS applications by overcoming self-nonself discrimination problems.
Resumo:
In this paper we study the effect of two distinct discrete delays on the dynamics of a Wilson-Cowan neural network. This activity based model describes the dynamics of synaptically interacting excitatory and inhibitory neuronal populations. We discuss the interpretation of the delays in the language of neurobiology and show how they can contribute to the generation of network rhythms. First we focus on the use of linear stability theory to show how to destabilise a fixed point, leading to the onset of oscillatory behaviour. Next we show for the choice of a Heaviside nonlinearity for the firing rate that such emergent oscillations can be either synchronous or anti-synchronous depending on whether inhibition or excitation dominates the network architecture. To probe the behaviour of smooth (sigmoidal) nonlinear firing rates we use a mixture of numerical bifurcation analysis and direct simulations, and uncover parameter windows that support chaotic behaviour. Finally we comment on the role of delays in the generation of bursting oscillations, and discuss natural extensions of the work in this paper.
Resumo:
Doutoramento em Economia.
Resumo:
We apply prospect theory to explain how personal and corporate bankruptcy laws affect risk perceptions of entrepreneurs at time of entry and therefore their growth ambitions. Previous theories have reached ambiguous conclusions as to whether countries with more debtor-friendly bankruptcy laws (i.e. laws that are more forgiving towards debtors in bankruptcy proceedings) are likely to have more entrepreneurs, or whether, creditorfriendly regimes have positive effects on new ventures via enhanced incentives for the supply of credit to entrepreneurs. Responding to this ambiguity, we apply prospect theory to propose that entrepreneurs do not attach the same significance to different elements of bankruptcy codes—and to explain which aspects of debtor-friendly bankruptcy laws matter more to entrepreneurs. Based on this, we derive and confirm hypotheses about the impact of aspects of bankruptcy codes on entrepreneurial activity using the Global Entrepreneurship Monitor combined with data on both personal and corporate bankruptcyregulations for 15 developed OECD countries. We use multilevel random coefficient logistic regressions to take account of the hierarchical nature of the data (country and individual levels). Because entrepreneurs and creditors are sensitive to different elements of the codes, there is scope for optimisation of the legal design of bankruptcy law to achieve both an adequate supply of credit and to encourage high-ambition entrepreneurship.
Resumo:
Ceria is an important component of catalysts for oxidation reactions that proceed through the Mars-van Krevelen mechanism, promoting activity. A paradigm example of this is the VOx–CeO2 system for oxidative dehydrogenation reactions, where vanadium oxide species are supported on ceria and a special synergy between them is behind the enhanced activity: reduction of the catalyst is promoted by ceria undergoing reduction. This leads to favourable oxygen vacancy formation and hydrogen adsorption energies—useful descriptors for the oxidation activity of VOx–CeO2 catalysts. In this paper, we examine if this promoting effect on ceria-based catalysts holds for other metal oxide modifiers and we investigate MnOn– and CrOn–CeO2(111) (n = 0 − 4) as examples. We show, combining density functional theory calculations and statistical thermodynamics that similarly to the vanadia modifier, the stable species in each case is MnO2– and CrO2–CeO2. Both show favourable energetics for oxygen vacancy formation and hydrogen adsorption, indicating that VO2–CeO2 is not the only system of this type that can have an enhanced activity for oxidation reactions. However, the mechanism involved in each case is different: CrO2–CeO2 shows similar properties to VO2–CeO2 with ceria reduction upon oxygen removal stabilising the 5+ oxidation state of Cr. In contrast, with MnO2–CeO2, Mn is preferentially reduced. Finally, a model system of VO2–Mg:CeO2 is explored that shows a synergy between VO2 modification and Mg doping. These results shed light on the factors involved in active oxidation catalysts based on supported metal oxides on ceria that should be taken into consideration in a rational design of such catalysts.
Resumo:
Este trabajo se inscribe en uno de los grandes campos de los estudios organizacionales: la estrategia. La perspectiva clásica en este campo promovió la idea de que proyectarse hacia el futuro implica diseñar un plan (una serie de acciones deliberadas). Avances posteriores mostraron que la estrategia podía ser comprendida de otras formas. Sin embargo, la evolución del campo privilegió en alguna medida la mirada clásica estableciendo, por ejemplo, múltiples modelos para ‘formular’ una estrategia, pero dejando en segundo lugar la manera en la que esta puede ‘emerger’. El propósito de esta investigación es, entonces, aportar al actual nivel de comprensión respecto a las estrategias emergentes en las organizaciones. Para hacerlo, se consideró un concepto opuesto —aunque complementario— al de ‘planeación’ y, de hecho, muy cercano en su naturaleza a ese tipo de estrategias: la improvisación. Dado que este se ha nutrido de valiosos aportes del mundo de la música, se acudió al saber propio de este dominio, recurriendo al uso de ‘la metáfora’ como recurso teórico para entenderlo y alcanzar el objetivo propuesto. Los resultados muestran que 1) las estrategias deliberadas y las emergentes coexisten y se complementan, 2) la improvisación está siempre presente en el contexto organizacional, 3) existe una mayor intensidad de la improvisación en el ‘como’ de la estrategia que en el ‘qué’ y, en oposición a la idea convencional al respecto, 4) se requiere cierta preparación para poder improvisar de manera adecuada.