526 resultados para misuse
Resumo:
A large fraction of papers in the climate literature includes erroneous uses of significance tests. A Bayesian analysis is presented to highlight the meaning of significance tests and why typical misuse occurs. The significance statistic is not a quantitative measure of how confident we can be of the ‘reality’ of a given result. It is concluded that a significance test very rarely provides useful quantitative information.
Resumo:
The misuse of personal protective equipment (PPE) during pesticide application was investigated among smallholders in Colombia. The integrative agent-centered (IAC) framework and a logistic regression approach were adopted. The results suggest that the descriptive social norm was significantly influencing PPE use. The following were also important: (1) having experienced pesticide-related health problems; (2) age; (3) the share of pesticide application carried out; and (4) the perception of PPE hindering work. Interestingly, the influence of these factors differed for different pieces of PPE. Since conformity to the social norm is a source of rigidity in the system, behavioral change may take the form of a discontinuous transition. In conclusion, five suggestions for triggering a transition towards more sustainable PPE use are formulated: (1) diversifying targets/tools; (2) addressing structural aspects; (3) sustaining interventions in the long-term; (4) targeting farmers’ learning-by-experience; and (5) targeting PPE use on a collective level.
Resumo:
The misuse of Personal Protective Equipment results in health risk among smallholders in developing countries, and education is often proposed to promote safer practices. However, evidence point to limited effects of education. This paper presents a System Dynamics model which allows the identification of risk-minimizing policies for behavioural change. The model is based on the IAC framework and survey data. It represents farmers' decision-making from an agent-oriented standpoint. The most successful intervention strategy was the one which intervened in the long term, targeted key stocks in the systems and was diversified. However, the results suggest that, under these conditions, no policy is able to trigger a self sustaining behavioural change. Two implementation approaches were suggested by experts. One, based on constant social control, corresponds to a change of the current model's parameters. The other, based on participation, would lead farmers to new thinking, i.e. changes in their decision-making structure.
Resumo:
Domestic gardens provide a significant component of urban green infrastructure but their relative contribution to eco-system service provision remains largely un-quantified. ‘Green infrastructure’ itself is often ill-defined, posing problems for planners to ascertain what types of green infrastructure provide greatest benefit and under what circumstances. Within this context the relative merits of gardens are unclear; however, at a time of greater urbanization where private gardens are increasingly seen as a ‘luxury’, it is important to define their role precisely. Hence, the nature of this review is to interpret existing information pertaining to gardens /gardening per se, identify where they may have a unique role to play and to highlight where further research is warranted. The review suggests that there are significant differences in both form and management of domestic gardens which radically influence the benefits. Nevertheless, gardens can play a strong role in improving the environmental impact of the domestic curtilage, e.g. by insulating houses against temperature extremes they can reduce domestic energy use. Gardens also improve localized air cooling, help mitigate flooding and provide a haven for wildlife. Less favourable aspects include contributions of gardens and gardening to greenhouse gas emissions, misuse of fertilizers and pesticides, and introduction of alien plant species. Due to the close proximity to the home and hence accessibility for many, possibly the greatest benefit of the domestic garden is on human health and well-being, but further work is required to define this clearly within the wider context of green infrastructure.
Resumo:
Around 40% of total energy consumption in the UK is consumed by creating comfortable indoor environment for occupants. Occupants’ behaviour in terms of achieving thermal comfort could have a significant impact on a building’s energy consumption. Therefore, understanding the interactions of occupants with their buildings would be essential to provide a thermal comfort environment that is less reliance on energy-intensive heating, ventilation and air-conditioning systems, to meet energysaving and carbon emission targets. This paper presents the findings of a year-long field study conducted in non-air-conditioned office buildings in the UK. Occupants’ adaptive responses in terms of technological and personal dimensions are dynamic processes which could vary with both indoor and outdoor thermal conditions. The adaptive behaviours of occupants in the surveyed building show substantial seasonal and daily variations. Our study shows that non-physical factors such as habit could influence the adaptive responses of occupants. However, occupants sometimes displayed inappropriate adaptive behaviour, which could lead to a misuse of energy. This paper attempts to illustrate how occupants would adapt and interact with their built environment and consequently contribute to development of a guide for future design/refurbishment of buildings and to develop energy management systems for a comfortable built environment.
Resumo:
Organizations introduce acceptable use policies to deter employee computer misuse. Despite the controlling, monitoring and other forms of interventions employed, some employees misuse the organizational computers to carry out their personal work such as sending emails, surfing internet, chatting, playing games etc. These activities not only waste productive time of employees but also bring a risk to the organization. A questionnaire was administrated to a random sample of employees selected from large and medium scale software development organizations, which measured the work computer misuse levels and the factors that influence such behavior. The presence of guidelines provided no evidence of significant effect on the level of employee computer misuse. Not having access to Internet /email away from work and organizational settings were identified to be the most significant influences of work computer misuse.
Resumo:
It is a known fact that some employees misuse the organizational computers to do their personal work such as sending emails, surfing the Internet, chatting, playing games. These activities not only waste productive time of employees but also bring a risk factor to the organization. This affects organizations in the software industry very much as almost all of their employees are connected to the Internet throughout them day./ By introducing an Acceptable Use Policy (AUP) for an organization, it is believed that the computer misuse by its employees could be reduced. In many countries Acceptable Use Policies are used and they have been studied with various perspectives. In Sri Lankan context research on these areas are scarce. This research explored the situation in Sri Lanka with respect to AUPs and their effectiveness./ A descriptive study was carried out to identify the large and medium scale software development organizations that had implemented computer usage guidelines for employees. A questionnaire was used to gather information regarding employee’s usual computer usage behavior. Stratified random sampling was employed to draw a representative sample from the population./ Majority of the organizations have not employed a written guideline on acceptable use of work computers. The study results did not provide evidence to conclude that the presence or non presence of an AUP has a significant difference in computer use behaviors of employees. A significant negative correlation was observed between level of awareness about AUP and misuse. Access to the Internet and organizational settings were identified as significant factors that influence employee computer misuse behavior.
Resumo:
This paper presents a novel application of virtual environments to assist in encouraging behavior change in individuals who misuse drugs or alcohol. We describe the user-centered design of a series of scenes to engage users in the identification of triggers and to encourage discussions about relevant coping skills. Results from the initial testing of this application with six service users showed variation in user responses. Results also suggested that the system should encourage group discussion and that it was linked to a small improvement in users’ confidence in understanding and identifying triggers.
Resumo:
Although there are signs of decline, homicides and traffic-related injuries and deaths in Brazil account for almost two-thirds of all deaths from external causes. In 2007, the homicide rate was 26.8 per 100 000 people and traffic-related mortality was 23.5 per 100 000. Domestic violence might not lead to as many deaths, but its share of violence-related morbidity is large. These are important public health problems that lead to enormous individual and collective costs. Young, black, and poor men are the main victims and perpetrators of community violence, whereas poor black women and children are the main victims of domestic violence. Regional differentials are also substantial. Besides the sociocultural determinants, much of the violence in Brazil has been associated with the misuse of alcohol and illicit drugs, and the wide availability of firearms. The high traffic-related morbidity and mortality in Brazil have been linked to the chosen model for the transport system that has given priority to roads and private-car use without offering adequate infrastructure. The system is often poorly equipped to deal with violations of traffic rules. In response to the major problems of violence and injuries, Brazil has greatly advanced in terms of legislation and action plans. The main challenge is to assess these advances to identify, extend, integrate, and continue the successful ones.
Resumo:
Objectives: The aim of the study was to analyze the impact of lifetime panic disorder (PD) diagnosis in a sample of patients with bipolar disorder type I (BPI), evaluating clinical and demographic variables. Methods: Ninety-five outpatients from the Bipolar Disorder Research Program at the Institute of Psychiatry of the University of Sao Paulo Medical School were enrolled. Twenty-seven BPI patients with PD were compared to 68 BPI patients without any anxiety disorders regarding clinical and demographic variables. Results: Compared to BPI patients without any anxiety disorders, patients with BPI + PD presented significantly higher number of mood episodes (18.9 +/- 13.8 vs 8.5 +/- 7.8; P < .001), depressive episodes (10.8 +/- 8.2 vs 4.6 +/- 4,8; P = .001), and manic episodes (7.4 +/- 7.3 vs 3.6 +/- 3.6; P = .008). Patients with BPI + PD had more frequently a depressive episode as their first one compared to BPI patients without anxiety disorders (94.1% vs 57.5%; P = .011). Patients with BPI + PD had more comorbidity with lifetime diagnosis of drug abuse or dependence (33.3% vs 8.8%; P = .010) and eating disorders (29.6% vs 6.0%; P = .004). Conclusions: The higher number of mood episodes in general presented by patients with BPI + PD when compared with BPI patients without any anxiety disorders, along with the higher frequencies of drug misuse and eating disorders, indicates that PD comorbidity is associated with a poorer Course and outcome of BPI. The higher frequency of depression as the onset mood episode and the higher number of manic episodes in the group with PD may have important treatment implications and should be further investigated. (C) 2009 Elsevier Inc. All rights reserved.
Resumo:
Background: Cognitive changes due to crack cocaine consumption remain unclear Methods: For clarification, 55 subjects were assigned to three groups: control group, crack cocaine current users, and ex-users. Participants were submitted to Mini-Mental State Examination (MMSE) and tasks evaluating executive functioning and verbal memory Mood state was also measured. Intergroup comparisons were carried out. Results: Control group performance on the MMSE was better than that of users and ex-users. Verbal memory performance for logical memory of users was impaired. Ex-users scored lower on DSST and Trail Making Test (Part B). Conclusion: Chronic crack cocaine use seems to disrupt general cognitive functioning (MMSE), verbal memory, and attentional resources, but findings suggest that some of these effects could be reversed by abstinence.
Resumo:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
Resumo:
The crisis that affected the capitalist states during the last decade of the 20th century, put an end to the period of greatest expansion of the state, demanding alterations that brought, especially in economic terms, the ideals of the liberal state. The main goal of these changes was to optimize the administration of the public service by introducing into it more efficiency, transparency, and morality because the state had shown to be incapable of attending the demands of the society and its way of doing was inefficient and did not reach out to the public interest. In Brazil, like in other part of the world, recent scandals of corruption and misuse of public funds put in doubt the efficiency of the financial control system. Like any other political system Brazil has a complex set of external and internal control, institutions that work to prevent misuse of public funds and identify responsibilities if bad use occurred. All these elements highlight the mechanisms of control of the public administration, which came to be seen as essential instruments for the improvement of the management of the public resources, targeting the collective interest. Therefore, along with the traditional mechanisms of power suppression, such as the system of checks and balances, social control arises. This, when used together with the monitoring exercised by public inspection agencies, is defined as horizontal accountability activated by civil society, in which citizens and institutions gather efforts in order to promote a more effective charge of responsibility from public agents and politicians in case of misconducts. This study aimed to identify the opportunities and limitations of social control exercised by the complaint under the TCE-RJ. The results point to the need to develop measures to guarantee the anonymity of denouncers, to simplify the forms of access the TCE-RJ and to improve information spread to the citizen.
Resumo:
Em virtude da ocorrência do fenômeno da globalização inúmeras sociedades passaram a ter seu controle exercido por outras pertencentes ao mesmo grupo econômico. Com o surgimento destas estruturas societárias hierarquizadas foi constatado um significativo crescimento no número de atos realizados com desvio ou abuso de poder por parte do detentor deste poder de comando, os quais dão ensejo, a priori, a caracterização do abuso de poder de controle. Os atos realizados com as características supracitadas podem ser encontrados em contratos de empréstimos celebrados entre sociedades pertencentes ao mesmo grupo econômico. Entretanto, cabe salientar que nem todos os contratos desta natureza devem ser vistos como sendo abusivos, ou seja, existem contratos envolvendo estes pares que podem ser considerados lícitos e legítimos. Diante desta constatação, serão analisadas através de um caso gerador as peculiaridades que um contrato de empréstimo envolvendo sociedades do mesmo grupo econômico necessita apresentar para que o mesmo seja considerado licito, e com isso o ato realizado pelo detentor do poder de controle não seja considerado abusivo. Por fim, poderemos diferenciar os contratos de empréstimos envolvendo sociedades do mesmo grupo econômico que deverão ser considerados como sendo lícitos e legítimos, dos contratos que acarretam prejuízos aos acionistas minoritários, ao mercado, bem como toda a sociedade, e que, portanto, deverão ser considerados abusivos.
Resumo:
Empresas de negócios, que são constantemente pressionados por inovação, têm na criação de conhecimento organizacional a base para a estratégia de sobrevivência. Muito desse conhecimento acumulado é tácito, encarnado em indivíduos e incorporado pela organização, e que é de difícil articulação. A necessária justificativa de um novo conhecimento torna a sua criação um processo muito frágil. Indivíduos podem sentir-se ameaçados em compartilhar insights, intuição, novas ideias, know-how, habilidades específicas, diante de devastadores mecanismos de controle social como ridículo, difamação e opróbrio, ou pela possibilidade de mau uso de um conhecimento útil e valioso. Por outro lado, com a criança logo ao nascer, e derivado do narcisismo primário, emerge a confiança básica que acompanha o indivíduo ao longo de sua existência, e que, portanto, pode levá-lo a compartilhar seus achados. Esta pesquisa, um ensaio teórico, explorou a relação entre a confiança e compartilhamento de conhecimento tácito nas organizações. Com abordagem multidisciplinar, aderente ao pensamento complexo, incorporou referenciais teóricos advindos de trabalhos de neo-schumpeterianos (Teoria Evolucionária), da sociologia e da psicologia. O percurso metodológico contemplou a busca de artigos em base de dados, leitura de resumos de artigos, busca de autores consagrados na literatura, consulta de autores referenciados nos artigos, leitura e análise de trabalhos selecionados. Mediante análise de conteúdo, que busca identificar o que está sendo dito a respeito do tema, foram criadas as seguintes categorias de análise: inovação, poder, teoria de criação de conhecimento organizacional e confiança humana. Cada uma dessas categorias compôs um capítulo desta dissertação. Embora a escassez de pesquisas empíricas relacionadas ao tema, a análise de conteúdo dos artigos examinados permitiram concluir que a confiança interpessoal mantém relação de poder simétrico entre indivíduos e assim é capaz de acessar o conhecimento tácito enraizado na mente de indivíduos. Dessa forma, com a pesquisa aqui apresentada, espera-se ter contribuído para a literatura e práticas organizacionais relacionadas à gestão de conhecimento. Por fim, foram relatadas limitações no trabalho e sugestões para futuras pesquisas.