391 resultados para denial


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work aims to understand the phenomenon of corruption in the Brazilian public sphere and its implications for society. It has brought concepts of corruption, and has referred to its highest incidence in the public sphere in the three levels of government (despite its infiltration also in the privative sector) and has called attention to two subjects which intertwine public administration (as a means of ordering social life) and corruption (as a form of denial to the collective welfare). Through literature search whose analysis shows that the phenomenon contains the entire country history, from discovery to present day it was found to be common several dictatorial and democratic political regimes. Finally, it has emphasized the importance and necessity of citizen participation in process, as well as the organization of civil society and media, in addition to highlighting the relevance of autonomy and independence of Powers set for its effective confrontation and fighting

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the need of the companies in becoming more competitive within the market, it arises an incessant search for selective human potential, with a high level of capacity and low rotativity, which motivation results in production raise, quality optimization and waste reduction. This scenario requires a strategy development which advantages the Human Resources Quality Management. This way, the model of the Human System Audit (HSA), developed by the Spanish researchers Ouijano and Navarro, presents itself as an important tool to diagnosis and evaluation, contemplating the environment where the organization is inserted, its strategies, its organizational design, its processes and its organizational effectiveness. In this sense, the present study has identified the existent relation between the professional satisfaction and the Organizational Culture, based in the model HSA. The research has been a quantitative-descriptive one and has had as population the technical-administrative workers from the Federal Center of Technical Education of Rio Grande do Norte (CEFET RN). The data collection has occurred during May, 2008, by means of the application of a questionnaire in the HSA model. The sample was composed by 167 subjects, distributed among the Five units of the institution. It was used the factorial analysis, with the extraction method of main components and orthogonal rotation varimax, in order to extract the dimensions of the satisfaction and of the organizational culture and the calculation of Cronbach s Alpha coefficient, to evaluate the reliability of these dimensions. The factorial analysis of the satisfaction indicators has identified four factors,, all of them showing significance: gratefulness and relationship , self-realization , stability and security and physical conditions and social benefits . The result of the factorial analysis with the indicators of the organizational culture has extracted four factors and among them, three of them have obtained significance: Personal Satisfaction Style , Competitive-Denial-Power Style and the Conventional-Dependent Style . After identifying the dimensions of the satisfaction and culture found at CEFET-RN, it has been notice the existence or not of relation among them, through the application of Pearson s coefficient. It has been verified that all of the dimensions of the Professional satisfaction are correlated with some dimension of the organizational culture, having in outstand position, with higher intensity, the relation between the culture style of Personal Satisfaction and the satisfaction factor referring to the self-realization

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ensuring the security of computers is a non-trivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emerged in the form of networks of hijacked zombie machines used to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These zombie machines are said to be infected with a dasiahotpsila - a malicious piece of software which is installed on a host machine and is controlled by a remote attacker, termed the dasiabotmaster of a botnetpsila. In this work, we use the biologically inspired dendritic cell algorithm (DCA) to detect the existence of a single hot on a compromised host machine. The DCA is an immune-inspired algorithm based on an abstract model of the behaviour of the dendritic cells of the human body. The basis of anomaly detection performed by the DCA is facilitated using the correlation of behavioural attributes such as keylogging and packet flooding behaviour. The results of the application of the DCA to the detection of a single hot show that the algorithm is a successful technique for the detection of such malicious software without responding to normally running programs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A ideia central deste estudo é de que «... raciocinar sobre factos e raciocinar sobre possibilidades e impossibilidades, baseia-se nos mesmos tipos de representações mentais e processos cognitivos» (Byrne, 1997, p. 107). Quer dizer que as pessoas raciocinam através da construção e revisão de modelos mentais (e.g., Johnson-Laird, Byrne, 1991). As condicionais contrafactuais requerem que os raciocinadores tenham em mente não apenas o que é suposto ser verdadeiro, mas também o que é supostamente verdadeiro mas factualmente falso (Byrne, 1997, p. 117; cf. Johnson-Laird, Byrne, 1991, pp. 72- -73). E a hipótese de que a representação inicial de uma condicional contrafactual é mais explícita do que a de uma condicional factual, permite prever que as inferências Modus Tollens e Negação do Antecedente deverão ser feitas com maior frequência a partir das condicionais contrafactuais do que das factuais. Byrne e Tasso (in press) encontraram evidência para esta hipótese. No estudo que apresentamos, também procuramos replicar esses resultados encontrados por Byrne e Tasso, e acrescentamos algumas hipóteses relacionadas com as latências para compreender os dois tipos de condicionais, e para escolher a conclusão. Utilizamos condicionais neutras do tipo «Se houve um círculo, então houve um triângulo», e apresentamos aos participantes os quatro silogismos condicionais no programa SUPERLAB.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These bots can be used in different malicious ways such as issuing distributed denial of services attacks to shutdown other networks and services, keystrokes logging, spamming, traffic sniffing cause serious disruption on networks and users. New bots use peer to peer (P2P) protocols start to appear as the upcoming threat to Internet security due to the fact that P2P bots do not have a centralized point to shutdown or traceback, thus making the detection of P2P bots is a real challenge. In response to these threats, we present an algorithm to detect an individual P2P bot running on a system by correlating its activities. Our evaluation shows that correlating different activities generated by P2P bots within a specified time period can detect these kind of bots.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of service and to obtain sensitive data such as password information. These compromised machines are said to be infected with malicious software termed a “bot”. In this paper, we investigate the correlation of behavioural attributes such as keylogging and packet flooding behaviour to detect the existence of a single bot on a compromised machine by applying (1) Spearman’s rank correlation (SRC) algorithm and (2) the Dendritic Cell Algorithm (DCA). We also compare the output results generated from these two methods to the detection of a single bot. The results show that the DCA has a better performance in detecting malicious activities.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The South Carolina Department of Consumer Affairs publishes an annual mortgage log report as a requirement of the South Carolina Mortgage Lending Act, which became effective on January 1, 2010. The mortgage log report analyzes the following data, concerning all mortgage loan applications taken: the borrower’s credit score, term of the loan, annual percentage rate, type of rate, and appraised value of the property. The mortgage log report also analyzes data required by the Home Mortgage Disclosure Act, including the following information: the loan type, property type, purpose of the loan, owner/occupancy status, loan amount, action taken, reason for denial, property location, gross annual income, purchaser of the loan, rate spread, HOEPA status, and lien status as well as the applicant and co-applicant’s race, ethnicity, and gender.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tese (doutorado)—Universidade de Brasília, Instituto de Ciências Humanas, Departamento de Geografia, Programa de Pós Graduação em Geografia, 2015.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação (mestrado)—Universidade de Brasília, Faculdade de Direito, Programa de Pós-Graduação em Direito, 2016.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Com o fim da Guerra Fria e a dissolução do Pacto Militar de Varsóvia, a Rússia deixou de ser uma ameaça à hegemonia militar norte-americana e da NATO. Assim, desde esse momento para cá que se tem assistido a um quase total acesso, livre de verdadeira oposição, a qualquer teatro de operações. Durante a Guerra do Golfo, em 1990-91, e posteriormente no Afeganistão e Iraque a partir de 2001, no que constituem os dois grandes conflitos armados pós-Guerra Fria, os EUA em conjunto com a NATO, conseguiram alcançar a vitória através de um total acesso operacional aos teatros de operações, e com um grau de ameaça bastante reduzido. Contudo, este cenário de ameaça reduzida e acesso global está claramente comprometido. Isto porque um sem número de meios e tecnologias têm sido desenvolvidas e aplicadas exatamente com este propósito. Assim, em 2003 surgiu o acrónimo A2/AD – “Anti-Access/Area Denial”, para qualificar estes meios e estratégias para os empregar, por forma a negar o acesso ao cenário de conflito, ou limitar a facilidade de movimentação no teatro de operações. Estas estratégias de A2/AD diminuem a capacidade de projeção de poder, negando a facilidade de movimentação e capacidade de ação, permitindo ainda uma miríade de abordagens operacionais. Os inúmeros adversários dos EUA/NATO não irão cometer os mesmos erros que Saddam Hussein cometeu na primeira Guerra do Golfo. Em particular, a China tem desenvolvido grande parte da sua capacidade de A2/AD com base em exemplos retirados deste conflito. A proliferação deste tipo de capacidades e meios ao longo de um espectro bastante significativo de atores estatais e não-estatais obriga a que tanto os EUA como a NATO desenvolvam formas inovadoras de lhes fazer face. As operações anfíbias poderão ser uma resposta bastante capaz a este cenário de A2/AD. A capacidade única de operar transversalmente em diversos domínios, com um custo relativamente baixo e juntando forças dos vários ramos, respondendo de forma rápida a qualquer situação e providenciando uma presença avançada num cenário de conflito tornam as Operações Anfíbias numa resposta bastante válida à questão estratégica do A2/AD.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tese (doutorado)—Universidade de Brasília, Instituto de Psicologia, Psicologia Clínica e Cultura, 2015.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tese (doutorado)—Universidade de Brasília, Instituto de Ciências Sociais, Centro de Pesquisa e Pós-Graduação sobre as Américas, Programa de Pós-Graduação em Estudos Comparados sobre as Américas, 2016.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Factors associated with and barriers to participation in Supplemental Nutrition Assistance Program (SNAP) and the effect participation has on food security, nutrition status, disease status and quality of life was investigated in a cross-sectional study including 175 HIV infected individuals. In addition, the effect of a targeted nutrition education on nutrition knowledge, readiness to dietary behavior change, nutrition status, disease status and quality of life was also investigated among a subset of the population (N = 45) in a randomized clinical control trial. SNAP participation rate was 70.3%, similar to the State of Florida and national participation rates. SNAP participation was positively and independently associated with being born in the US (P < 0.001), having monthly income less than $1000 (P = 0.006), and receiving antiretroviral treatment (P < 0.001). Participation barriers include denial of participation by program, recent incarceration, living in a shelter where participation is not allowed and unawareness of eligibility status. In regression analyses, SNAP participation was not significantly associated with improved food security, nutrition status, disease status and health related quality of life (HRQOL). Over half (56%) of the population experienced food insecurity and had inadequate intakes of half of the nutrients assessed. Illicit drug, alcohol and cigarette use were high in this population (31%, 55% and 63% respectively), and affected food security, nutrients intake, disease status and HRQOL. The nutrition education intervention resulted in a trend towards improvements nutrition knowledge, self-efficacy, and readiness to change without impacting nutrition status, disease state and quality of life. Food insecurity and other nutrition related issues, with implications for treatment, management and cost of HIV disease, continue to plague infected individuals living in poverty. More resources, including food and nutrition programs, specifically targeted towards this population are needed to address these issues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It is a widely acknowledged and often unquestioned fact that patriarchy and its modes of behaviour and social organization favour the appearance of trauma on the weakest (and defenceless) members of society: women. In the last decades, trauma seems to have taken the baton of typically female maladies such as 19th c. hysteria or 20th c. madness. Feminists in the 20th c. have long worked to prove the connection between the latter affections (and their reflection in literary texts) and patriarchal oppression or expectations of feminine behaviour and accordance to roles and rules. With Trauma Studies on the rise, the approach to the idea of the untold as related to femininity is manifold: on the one hand, is not trauma, which precludes telling about one’s own experience and keeps it locked not only from the others, but also from ourselves, the ultimate secrecy? On the other hand, when analyzing works that reflect trauma, one is astounded by the high number of them with a female protagonist and an almost all-female cast: in this sense, a ‘feminist’ reading is almost compulsory, in the sense that it is usually the author’s assumption that patriarchal systems of exploitation and expectations favour traumatic events and their outcome (silence and secrets) on the powerless, usually women. Often, traumatic texts combine feminism with other analytical discourses (one of the topics proposed for this panel): Toni Morrison’s study of traumatic responses in The Bluest Eye and Beloved cannot be untangled from her critique of slavery; just as much of Chicana feminism and its representations of rape and abuse (two main agents of trauma) analyze the nexus of patriarchy, new forms of post-colonialism, and the dynamics of power and powerlessness in ethnic contexts. Within this tradition that establishes the secrecies of trauma as an almost exclusively feminine characteristic, one is however faced with texts which have traumatized males as protagonists: curiously enough, most of these characters have suffered trauma through a typically masculine experience: that of war and its aftermath. By analyzing novels dealing with war veterans from Vietnam or the Second World War, the astounding findings are the frequent mixture of masculine or even ‘macho’ values and the denial of any kind of ‘feminine’ characteristics, combined with a very strict set of rules of power and hierarchy that clearly establish who is empowered and who is powerless. It is our argument that this replication of patriarchal modes of domination, which place the lowest ranks of the army in a ‘feminine’ situation, blended with the compulsory ‘macho’ stance soldiers are forced to adopt as army men (as seen, for example, in Philip Caputo’s Indian Country, Larry Heinemann’s Paco’s Story or Ed Dodge’s DAU: A Novel of Vietnam) furthers the onset and seriousness of ulterior trauma. In this sense, we can also analyze this kind of writing from a ‘feminist’ point of view, since the dynamics of über-patriarchal power established at the front at war-time deny any display of elements traditionally viewed as ‘feminine’ (such as grief, guilt or emotions) in soldiers. If trauma is the result of a game of patriarchal empowerment, how can feminist works, not only theoretical, but also fictional, overthrow it? Are ‘feminine’ characteristics necessary to escape trauma, even in male victims? How can feminist readings of trauma enhance our understanding of its dynamics and help produce new modes of interaction that transcend power and gender division as the basis for the organization of society?

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The success of childhood weight management programmes relies on family engagement. While attendance offers many benefits including the support to make positive lifestyle changes, the majority of families referred to treatment decline. Moreover, for those who do attend, benefits are often compromised by high programme attrition. This systematic review investigated factors influencing attendance at community-based lifestyle programmes among families of over-weight or obese children. A narrative synthesis approach was used to allow for the inclusion of quantitative, qualitative and mixed-method study designs. Thirteen studies met the inclusion criteria. Results suggest that parents provided the impetus for programme initiation, and this was driven largely by a concern for their child's psychological health and wellbeing. More often than not, children went along without any real reason or interest in attending. Over the course of the programme, however, children's positive social experiences such as having fun and making friends fostered the desire to continue. The stigma surrounding excess weight and the denial of the issue amongst some parents presented barriers to enrolment and warrant further study. This study provides practical recommendations to guide future policy makers, programme delivery teams and researchers in developing strategies to boost recruitment and minimise attrition.