471 resultados para posts


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article makes a contribution to a growing number of works that discuss affect and social media. I use Freudian affect theory to analyse user posts on the public Site Governance Facebook page. Freud’s work may help us to explore the affectivity within the user narratives and I suggest that they are expressions of alienation, dispossession and powerlessness that relate to the users’ relations with Facebook as well as to their internal and wider social relations. The article thus introduces a new angle on studies of negative user experiences that draws on psychoanalysis and critical theory.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND: Eighty per cent of Malawi's 8 million children live in rural areas, and there is an extensive tiered health system infrastructure from village health clinics to district hospitals which refers patients to one of the four central hospitals. The clinics and district hospitals are staffed by nurses, non-physician clinicians and recently qualified doctors. There are 16 paediatric specialists working in two of the four central hospitals which serve the urban population as well as accepting referrals from district hospitals. In order to provide expert paediatric care as close to home as possible, we describe our plan to task share within a managed clinical network and our hypothesis that this will improve paediatric care and child health.

PRESENTATION OF THE HYPOTHESIS: Managed clinical networks have been found to improve equity of care in rural districts and to ensure that the correct care is provided as close to home as possible. A network for paediatric care in Malawi with mentoring of non-physician clinicians based in a district hospital by paediatricians based at the central hospitals will establish and sustain clinical referral pathways in both directions. Ultimately, the plan envisages four managed paediatric clinical networks, each radiating from one of Malawi's four central hospitals and covering the entire country. This model of task sharing within four hub-and-spoke networks may facilitate wider dissemination of scarce expertise and improve child healthcare in Malawi close to the child's home.

TESTING THE HYPOTHESIS: Funding has been secured to train sufficient personnel to staff all central and district hospitals in Malawi with teams of paediatric specialists in the central hospitals and specialist non-physician clinicians in each government district hospital. The hypothesis will be tested using a natural experiment model. Data routinely collected by the Ministry of Health will be corroborated at the district. This will include case fatality rates for common childhood illness, perinatal mortality and process indicators. Data from different districts will be compared at baseline and annually until 2020 as the specialists of both cadres take up posts.

IMPLICATIONS OF THE HYPOTHESIS: If a managed clinical network improves child healthcare in Malawi, it may be a potential model for the other countries in sub-Saharan Africa with similar cadres in their healthcare system and face similar challenges in terms of scarcity of specialists.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A multi-sectorial regime of protection including international treaties, conservation and security measures, demand reduction campaigns and quasi-military interventions has been established to protect rhinos. Despite these efforts, the poaching of rhinos and trafficking of rhino horn continue unabated. This dissertation asks why the illegal market in rhinoceros horn is so resilient in spite of the myriad measures employed to disrupt it. A theoretical approach grounded in the sociology of markets is applied to explain the structure and functioning of the illegal market. The project follows flows of rhino horn from the source in southern Africa to illegal markets in Southeast Asia. The multi-sited ethnography included participant observations, interviews and focus groups with 416 informants during fourteen months of fieldwork. The sample comprised of, amongst others, convicted and active rhino poachers, smugglers and kingpins, private rhino breeders and hunting outfitters, African and Asian law enforcement officials, as well as affected local communities and Asian consumers. Court files, CITES trade data, archival materials, newspaper reports and social media posts were also analysed to supplement findings and to verify and triangulate data from interviews, focus groups and observations. Central to the analysis is the concept of “contested illegality”, a legitimization mechanism employed by market participants along the different segments of the horn supply chain. These actors' implicit or explicit contestation of the state-sponsored label of illegality serves as a legitimising and enabling mechanism, facilitating participation in gray or illegal markets for rhino horn. The research identified fluid interfaces between legal, illegal and gray markets, with recurring actors who have access to transnational trade structures, and who also possess market and product knowledge, as well as information about the regulatory regime and its loopholes. It is against the background of colonial, apartheid and neoliberal exploitation and marginalization of local communities that a second argument is introduced: the path dependency of conservation paradigms. Underpinning rhino conservation and regulation are archaic and elitist conservation regimes that discount the potential for harmonious relationships between local communities and wildlife. The increasing militarization of anti-poaching measures and green land grabs are exacerbating the rhino problem by alienating communities further from conservation areas and wild animals. The third argument looks at how actors deal with coordination problems in transnational illegal markets. Resolving the coordination problems of cooperation, value and competition are considered essential to the operation of formal markets. It is argued that the problem of security provides an additional and crucial obstacle to actors transacting in markets. The systematic analysis of flows between the researched sites of production, distribution and consumption of rhino horn shows that the social embeddedness of actors facilitates the flourishing of illegal markets in ways that escape an effective enforcement of CITES regulations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Esta tese foi produzida no Programa de Pós -Graduação em Educação em Ciências : Química da Vida e Saúde , na linha de pesquisa "Educação científica : implicações das práticas científicas na constituição dos sujeitos ". O objetivo desta pesquisa é analisar a rede de enunciações sobre o sexting em alguns materiais (reportagens, programas televisivos, postagens em blogs e comentários realizados por leitores dos sites) presentes na internet e investigar as condições de emergência da prática do sexting. O sexting é um termo criado nos Estados Unidos da América, que deriva das expressões sex (sexo) e texting (envio de mensagens). Esse conceito descreve uma prática social e cultural que está sendo difundida mundialmente: esta consiste em produzir e enviar fotos e vídeos sexuais, sensuais e eróticos entre conhecidos/as, amigos/as, namorados/as, “ficantes” etc.. Nesta pesquisa, utilizamos como aporte teórico os estudos de Pierre Lévy, André Lemos, Paula Sibilia, Guy Debord, Hannah Arendt, Michel Foucault e Zygmunt Bauman. Tais autores ajudam-nos a pensar que o sexting emerge devido a alguns acontecimentos sociais, culturais, históricos etc., que vêm provocando alguns deslocamentos em nossa sociedade. Para proceder com tal pesquisa, utilizamos a internet como campo empírico. Em nossa busca, encontramos 48 artefatos culturais que discutem, de alguma forma, sobre sexting. Dentre estes, 37 comentam sobre vídeos caseiros que mostram relações sexuais, 8 discutem sobre o fenômeno sexting e 3 debatem sobre a produção de fotos sensuais. Para análise dos dados, utilizamos algumas ferramentas foucaultianas, especialmente os conceitos de discurso, dispositivo e enunciado. Ao olharmos os materiais, percebemos que os/os adolescentes vêm se utilizando das tecnologias digitais para visibilizarem a sua sexualidade, o que nos dá indícios de que estas vêm possibilitando a constituição de jornalistas cidadãos/ãs. Além disso, evidenciamos que as fotos e vídeos dos/as adolescentes foram produzidos em comum acordo entre eles/as. Muitos dessas fotos e vídeos, foram disseminados pelos próprios sujeitos que aderiram a essa prática. Assim, a exposição da sexualidade, por meio do sexting, tem sido realizada com o propósito de adquirir visibilidade e de tornar-se a personalidade do momento. Entendemos que essa vontade de escancarar a sexualidade, por meio das tecnologias digitais, está vinculada à sociedade do espetáculo, que manifesta a necessidade de tornar-se visível. Além disso, notamos que essa prática está relacionada à escola, pois muitos dos casos relatados ocorreram no interior dessa instituição ou tiveram uma repercussão nesse ambiente. Em muitos casos, a escola era culpabilizada pelos casos de sexting que envolviam seus/sua alunos/as. No entanto, são os pais o foco de maiores críticas pela mídia massiva, pois, para essa instância, são estes os maiores responsáveis pela disciplinarização desses corpos. Evidenciou-se também que os/as praticantes do sexting sofreram micropenalidades, as quais tinham como objetivo corrigir suas condutas. Nesse sentido, entendemos o sexting como uma atualização do dispositivo da sexualidade, pois este coloca a sexualidade – a qual, durante a modernidade sólida, constituía-se como algo exclusivamente do âmbito privado – em evidência nos espaços públicos. Ao mesmo tempo, verificamos que algumas práticas disciplinares ainda buscam governar e normalizar a sexualidade dos sujeitos. A análise do material empírico possibilitou-nos verificar dois enunciados que fazem parte do discurso do sexting. O primeiro destes é que, na contemporaneidade, aparecer é uma condição de existência; o outro é que a sexualidade é entendida como algo que deve ser regulado, governado e normalizado. Consideramos importante centrarmos os estudos no sexting, pois entendemos que essa prática vem contribuindo para o surgimento de outros modos de viver e entender a sexualidade, pois o sexting enquadra a sexualidade como algo a ser exibido e mostrado para todos/as.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A restauração de dentes endodonciados é um verdadeiro desafio perante as inúmeras possibilidades restauradoras que atualmente se apresentam. A decisão na escolha da melhor restauração para dentes posteriores endodonciados, com intuito de promover uma reabilitação estética e funcional, com menor prejuízo possível dos tecidos dentais e com maior longevidade é portanto, bastante complexa. Este estudo faz uma revisão de literatura para inter-relacionar o planeamento, a posição do dente na arcada e o tecido dentário remanescente com os diversos tipos de restauração (direta ou indireta). Avalia também a necessidade da colocação ou não de espigão e o seu tipo, assim como os tipos de cimentos utilizados durante o procedimento restaurador. Para tal foi efetuada uma pesquisa bibliográfica recorrendo aos motores de busca de MEDLINE, LILACS e PubMED, entre 2000 e 2015, com as seguintes palavras-chaves: “endodontically treated teeth”, “teeth restoration”, “tooth structure”, “post use”, “post materials”, “resin-based composite”, “ceramic”, “tooth fracture”, “cusp coverage”, “bicuspid”, “weakened teeth”, “cavity preparation design”. Concluiu-se que o sucesso de uma restauração em dentes posteriores endodonciados está na interpretação inicial do prognóstico antes mesmo do inicio do tratamento endodôntico e que quantidade e qualidade do tecido remanescente e o tipo de forças que incidirão no dente em questão, serão aspectos importantes na escolha do tipo de restauração e sua longevidade.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A utilização de espigões em dentes tratados endodonticamente é um dos temas mais estudados em Medicina Dentária. As opiniões são divergentes em relação aos procedimentos clínicos e materiais a serem utilizados para a colocação e remoção de espigões. O objetivo deste trabalho foi realizar uma revisão bibliográfica de forma a organizar conceitos e princípios clínicos para melhor esclarecer os fatores que determinam a necessidade de colocação, utilização e escolha do tipo de espigão, sua cimentação e técnicas para a remoção. Foram analisadas as características e propriedades dos cimentos de fosfato de zinco, ionômero de vidro, cimentos resinosos de polimerização química, polimerização dupla, foto-polimerizável e os sistemas adesivos etch and rinse, self etch e autoadesivos, bem como as técnicas para a remoção de espigões cimentados com diferentes cimentos e sistemas adesivos para depois acessar o remanescente de guta percha para o retratamento endodôntico. Foi feita uma pesquisa bibliográfica na base de dados electrónica PubMed, Google Scholar e RCAAP com as seguintes palavras chave: “Espigões”; “Retratamento Endodôntico”; “Ionómero de Vidro”; “Fosfato de Zinco”; “Cimentos Resinosos”; “Posts”; “Endodontic Retreatment”; “Glass Ionomer”; Zinc-phosphate”; “Resin Cements"; “Push Out Test”; “Posts AND Removal”. Concluiu-se que a cimentação de espigões pré-fabricados de fibra de vidro com cimentos resinosos de dupla polimerização associados aos sistemas adesivos self etch estão gradualmente substituindo os outros tipos de espigões e demais cimentos e possibilitam restaurar o dente de forma adequada e duradoura. E o uso de ultrassons apresenta maior eficácia e segurança na remoção dos espigões.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While news stories are an important traditional medium to broadcast and consume news, microblogging has recently emerged as a place where people can dis- cuss, disseminate, collect or report information about news. However, the massive information in the microblogosphere makes it hard for readers to keep up with these real-time updates. This is especially a problem when it comes to breaking news, where people are more eager to know “what is happening”. Therefore, this dis- sertation is intended as an exploratory effort to investigate computational methods to augment human effort when monitoring the development of breaking news on a given topic from a microblog stream by extractively summarizing the updates in a timely manner. More specifically, given an interest in a topic, either entered as a query or presented as an initial news report, a microblog temporal summarization system is proposed to filter microblog posts from a stream with three primary concerns: topical relevance, novelty, and salience. Considering the relatively high arrival rate of microblog streams, a cascade framework consisting of three stages is proposed to progressively reduce quantity of posts. For each step in the cascade, this dissertation studies methods that improve over current baselines. In the relevance filtering stage, query and document expansion techniques are applied to mitigate sparsity and vocabulary mismatch issues. The use of word embedding as a basis for filtering is also explored, using unsupervised and supervised modeling to characterize lexical and semantic similarity. In the novelty filtering stage, several statistical ways of characterizing novelty are investigated and ensemble learning techniques are used to integrate results from these diverse techniques. These results are compared with a baseline clustering approach using both standard and delay-discounted measures. In the salience filtering stage, because of the real-time prediction requirement a method of learning verb phrase usage from past relevant news reports is used in conjunction with some standard measures for characterizing writing quality. Following a Cranfield-like evaluation paradigm, this dissertation includes a se- ries of experiments to evaluate the proposed methods for each step, and for the end- to-end system. New microblog novelty and salience judgments are created, building on existing relevance judgments from the TREC Microblog track. The results point to future research directions at the intersection of social media, computational jour- nalism, information retrieval, automatic summarization, and machine learning.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last two centuries many major cities have undergone large-scale modernisation that has led to the growing sense of homogenisation associated with such locales across the globe. The fractal logic that is at the heart of so many urban settings, where the whole system is made up of parts that are identical to the whole, seems to serve in making anonymous everyday experiences. Public transport and its corresponding street furniture, if thoughtfully designed and planned, has the potential to form an integral element in the promotion of a sense of identity, interconnectedness and flow within a city. Furthermore, bus stops, benches, litter bins, curb-sides, posts and pavements, to mention a few, offer interesting cases to consider how people truly engage with contemporary urban spaces. These objects—part of routine and made familiar—are elements of daily lives that are ingredients towards visual and multi-modal experiences. In addition, these are places where individuals encounter sociality and materiality in ordinary and sometimes extraordinary ways. This paper uses a visual ethnographic approach towards exploring the human traces of routine activities that have an impact on the cityscape. An Investigation of these details found within the urban landscape lead us towards understanding how we engage with and navigate cities. This is essentially an urban archaeological study that looks to reveal how non-designed phenomenon in urban places can contribute to our image of a city, providing a reflection on homogeneity within the built environment. Our visual ethnography focuses on six major cities: two each in Britain, Europe and North America. The findings of this work illustrate through visual analyses three key characteristics: first, how urban spaces are transformed intentionally and unintentionally; second, how transformations are practical, functional, beautiful and sometimes ridiculous; third, how transformations reveal values around visual and multi-modal experiences inherent to people.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Problem This dissertation presents a literature-based framework for communication in science (with the elements partners, purposes, message, and channel), which it then applies in and amends through an empirical study of how geoscientists use two social computing technologies (SCTs), blogging and Twitter (both general use and tweeting from conferences). How are these technologies used and what value do scientists derive from them? Method The empirical part used a two-pronged qualitative study, using (1) purposive samples of ~400 blog posts and ~1000 tweets and (2) a purposive sample of 8 geoscientist interviews. Blog posts, tweets, and interviews were coded using the framework, adding new codes as needed. The results were aggregated into 8 geoscientist case studies, and general patterns were derived through cross-case analysis. Results A detailed picture of how geoscientists use blogs and twitter emerged, including a number of new functions not served by traditional channels. Some highlights: Geoscientists use SCTs for communication among themselves as well as with the public. Blogs serve persuasion and personal knowledge management; Twitter often amplifies the signal of traditional communications such as journal articles. Blogs include tutorials for peers, reviews of basic science concepts, and book reviews. Twitter includes links to readings, requests for assistance, and discussions of politics and religion. Twitter at conferences provides live coverage of sessions. Conclusions Both blogs and Twitter are routine parts of scientists' communication toolbox, blogs for in-depth, well-prepared essays, Twitter for faster and broader interactions. Both have important roles in supporting community building, mentoring, and learning and teaching. The Framework of Communication in Science was a useful tool in studying these two SCTs in this domain. The results should encourage science administrators to facilitate SCT use of scientists in their organization and information providers to search SCT documents as an important source of information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this research was to analyze the content posted by Municipal and State Tourism Organizations (DMO) of the twelve headquarters cities and States of the FIFA 2014 World Cup in their fanpages on Facebook, Were used the reference studies of Torres (2009), Gabriel (2009), Safko and Brake (2010) and Barefoot and Szabo (2010 ). In the first stage, the official Facebook fanpages were identified, then posts published between June 1st and July 31st of 2013, period from pre to post-event FIFA Confederations Cup Brazil 2013 were collected. The data analysis method employed was content analysis from the perspective of Bardin (2011), which is divided into: i) pre-analysis using dedicated softwares, phase ii) material exploration and iii) treatment of results, inference and interpretation. It was observed that the DMOs analyzed publish diversified information to users, including actions addressed to the abovementioned event.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Human relationships have long been studied by scientists from domains like sociology, psychology, literature, etc. for understanding people's desires, goals, actions and expected behaviors. In this dissertation we study inter-personal relationships as expressed in natural language text. Modeling inter-personal relationships from text finds application in general natural language understanding, as well as real-world domains such as social networks, discussion forums, intelligent virtual agents, etc. We propose that the study of relationships should incorporate not only linguistic cues in text, but also the contexts in which these cues appear. Our investigations, backed by empirical evaluation, support this thesis, and demonstrate that the task benefits from using structured models that incorporate both types of information. We present such structured models to address the task of modeling the nature of relationships between any two given characters from a narrative. To begin with, we assume that relationships are of two types: cooperative and non-cooperative. We first describe an approach to jointly infer relationships between all characters in the narrative, and demonstrate how the task of characterizing the relationship between two characters can benefit from including information about their relationships with other characters in the narrative. We next formulate the relationship-modeling problem as a sequence prediction task to acknowledge the evolving nature of human relationships, and demonstrate the need to model the history of a relationship in predicting its evolution. Thereafter, we present a data-driven method to automatically discover various types of relationships such as familial, romantic, hostile, etc. Like before, we address the task of modeling evolving relationships but don't restrict ourselves to two types of relationships. We also demonstrate the need to incorporate not only local historical but also global context while solving this problem. Lastly, we demonstrate a practical application of modeling inter-personal relationships in the domain of online educational discussion forums. Such forums offer opportunities for its users to interact and form deeper relationships. With this view, we address the task of identifying initiation of such deeper relationships between a student and the instructor. Specifically, we analyze contents of the forums to automatically suggest threads to the instructors that require their intervention. By highlighting scenarios that need direct instructor-student interactions, we alleviate the need for the instructor to manually peruse all threads of the forum and also assist students who have limited avenues for communicating with instructors. We do this by incorporating the discourse structure of the thread through latent variables that abstractly represent contents of individual posts and model the flow of information in the thread. Such latent structured models that incorporate the linguistic cues without losing their context can be helpful in other related natural language understanding tasks as well. We demonstrate this by using the model for a very different task: identifying if a stated desire has been fulfilled by the end of a story.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Con el objetivo de aplicar un programa de capacitación personal para mejorar conocimientos y prácticas sobre el control de la tuberculosis y mejorar la captación de sintomáticos respiratorios. Materiales y métodos: con un diseño cuasi experimental se incluyeron 63 profesionales sanitarios: 33 médicos, 17 odontólogos, 11 enfermeras y 2 obstetrices, distribuidos en 29 unidades operativas; 2 Centros de Salud, 16 subcentros de Salud y 12 puestos de Salud, pertenecientes al Ministerio de Salud Pública. Se aplicó un tes de 20 preguntas para evaluar conocimientos y prácticas antes de la intervención y otro de igual numero para medir el efecto de la intervención después de cumplir el programa de capacitación. Resultados: antes de la intervención, el promedio de respuestas correctas fue de 35,8 ± 4,3 (entre 23 y 56). El incremento de conocimientos fue significativo (p= 0,0001). La captación de sintomáticos respiratorios se incrementó en un 17% en los dos trimestres posteriores a la capacitación, RR 7,8 (IC95% 1,8-32,9) P=0,0003. En cuarto trimestre descendió a los valores pre intervención. Implicaciones: un programa de capacitación permanente sobre control de la Tuberculosis es una estrategia válida para mejorar los conocimientos y las prácticas sanitarias tendientes a incrementar la captación de sintomáticos respiratorios como la mejor medida para detectar la enfermedad

Relevância:

10.00% 10.00%

Publicador:

Resumo:

C3S2E '16 Proceedings of the Ninth International C* Conference on Computer Science & Software Engineering

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The text analyses the intelligence activity against Poland in the period 1944-1989. The paper also contains a case study, i.e. an analysis of the American intelligence service activity held against Poland. While examining the research thesis, the author used the documents and analyses prepared by the Ministry of Internal Affairs. In order to best illustrate the point, the author presented a number of cases of persons who spied for the USA, which was possible thanks to the analysis of the training materials of the Ministry of Internal Affairs directed to the officers of the Security Service and the Citizens’ Militia. The text tackles the following issues: (1) to what extent did the character of the socio-political system influence the number of persons convicted for espionage against Poland in the period under examination?, (2) what was the level of interest of the foreign intelligence services in Poland before the year 1990?, (3) is it possible to indicate the specificity of the U.S. intelligence activity against Poland? 1) The analysis of data indicates that the period 1946-1956 witnessed a great number of convictions for espionage, which is often associated with the peculiar political situation in Poland of that time. Up to 1953, the countries of the Eastern bloc had reproduced the Stalin’s system, which only ceased due to the death of Stalin himself. Since then, the communist systems gradually transformed into the system of nomenklatura. Irrespective of these changes, Poland still witnessed a wave of repressions, which resulted from the threats continuously looming over the communist authorities – combating the anti-communist underground movement, fighting with the Ukrainian Insurgent Army, the Polish government-in-exile, possible revisionism of borders, social discontent related to the socio-political reforms. Hence, a great number of convictions for espionage at that time could be ascribed to purely political sentences. Moreover, equally significant was the fact that the then judicial practice was preoccupied assessing negatively any contacts and relations with foreigners. This excessive number of convictions could ensue from other criminal-law provisions, which applied with respect to the crimes against the State, including espionage. What is also important is the fact that in the Stalin’s period the judiciary personnel acquired their skills and qualifications through intensive courses in law with the predominant spirit of the theory of evidence and law by Andrey Vyshinsky. Additionally, by the decree of 1944 the Penal Code of the Polish Armed Forces was introduced; the code envisaged the increase in the number of offences classified as penalised with death penalty, whereas the high treason was subject to the military jurisdiction (the civilians were prosecuted in military courts till 1955; the espionage, however, still stood under the military jurisdiction). In 1946, there was introduced the Decree on particularly dangerous crimes in the period of the State’s recovery, which was later called a Small Penal Code. 2) The interest that foreign intelligence services expressed in relation to Poland was similar to the one they had in all countries of Eastern and Central Europe. In the case of Poland, it should be noted that foreign intelligence services recruited Polish citizens who had previously stayed abroad and after WWII returned to their home country. The services also gathered information from Poles staying in immigrant camps (e.g. in FRG). The activity of the American intelligence service on the territory of FRG and West Berlin played a key role. The documents of the Ministry of Internal Affairs pointed to the global range of this activity, e.g. through the recruitment of Polish sailors in the ports of the Netherlands, Japan, etc. In line with the development in the 1970s, espionage, which had so far concentrated on the defence and strategic sectors, became focused on science and technology of the People’s Republic of Poland. The acquisition of collaborators in academic circles was much easier, as PRL opened to academic exchange. Due to the system of visas, the process of candidate selection for intelligence services (e.g. the American) began in embassies. In the 1980s, the activity of the foreign intelligence services concentrated on the specific political situation in Poland, i.e. the growing significance of the “Solidarity” social movement. 3) The specificity of the American intelligence activity against Poland was related to the composition of the residency staff, which was the largest in comparison to other Western countries. The wide range of these activities can be proved by the quantitative data of convictions for espionage in the years 1944-1984 (however, one has to bear in mind the factors mentioned earlier in the text, which led to the misinterpretation of these data). Analysing the data and the documents prepared by the Ministry of Internal Affairs, one should treat them with caution, as, frequently, the Polish counter-intelligence service used to classify the ordinary diplomatic practice and any contacts with foreigners as espionage threats. It is clearly visible in the language of the training materials concerned with “secret service methods of the intelligence activity” as well as in the documents on operational activities of the Security Service in relation to foreigners. The level of interest the USA had in Poland was mirrored in the classification of diplomatic posts, according to which Warsaw occupied the second place (the so-called Group “B”) on the three-point scale. The CIA experienced spectacular defeats during their activity in Poland: supporting the Polish underground anti-communist organisation Freedom and Independence and the so-called Munich-Berg episode (both cases took place in the 1950s). The text focuses only on selected issues related to the espionage activities against Poland. Similarly, the analysis of the problem has been based on selected sources, which has limited the research scope - however, it was not the aim of the author to present the espionage activity against Poland in a comprehensive way. In order to assess the real threat posed by the espionage activity, one should analyse the case of persons convicted for espionage in the period 1944-1989, as the available quantitative data, mentioned in the text, cannot constitute an explicit benchmark for the scale of espionage activity. The inaccuracies in the interpretation of data and variables, which can affect the evaluation of this phenomenon, have been pointed out in the text.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tese (doutorado)—Universidade de Brasília, Faculdade de Educação, Programa de Pós-graduação em Educação, 2016.