834 resultados para security, usability, identity management, authentication, authorization
Resumo:
The response of some Argentine workers to the 2001 crisis of neoliberalism gave rise to a movement of worker-recovered enterprises (empresas recuperadas por sus trabajadores or ERTs). The ERTs have emerged as former employees took over the control of generally fraudulently bankrupt factories and enterprises. The analysis of the ERT movement within the neoliberal global capitalist order will draw from William Robinson’s (2004) neo-Gramscian concept of hegemony. The theoretical framework of neo-Gramscian hegemony will be used in exposing the contradictions of capitalism on the global, national, organizational and individual scales and the effects they have on the ERT movement. The ERT movement has demonstrated strong level of resilience, despite the numerous economic, social, political and cultural challenges and limitations it faces as a consequence of the implementation of neoliberalism globally. ERTs have shown that through non-violent protests, democratic principles of management and social inclusion, it is possible to start constructing an alternative social order that is based on the cooperative principles of “honesty, openness, social responsibility and caring for others” (ICA 2007) as opposed to secrecy, exclusiveness, individualism and self-interestedness. In order to meet this “utopian” vision, it is essential to push the limits of the possible within the current social order and broaden the alliance to include the organized members of the working class, such as the members of trade unions, and the unorganized, such as the unemployed and underemployed. Though marginal in number and size, the members of ERTs have given rise to a model that is worth exploring in other countries and regions burdened by the contradictory workings of capitalism. Today, ERTs serve as living proofs that workers too are capable of successfully running businesses, not capitalists alone.
Resumo:
Madagascar’s terrestrial and aquatic ecosystems have long supported a unique set of ecological communities, many of whom are endemic to the tropical island. Those same ecosystems have been a source of valuable natural resources to some of the poorest people in the world. Nevertheless, with pride, ingenuity and resourcefulness, the Malagasy people of the southwest coast, being of Vezo identity, subsist with low development fishing techniques aimed at an increasingly threatened host of aquatic seascapes. Mangroves, sea grass bed, and coral reefs of the region are under increased pressure from the general populace for both food provisions and support of economic opportunity. Besides purveyors and extractors, the coastal waters are also subject to a number of natural stressors, including cyclones and invasive, predator species of both flora and fauna. In addition, the aquatic ecosystems of the region are undergoing increased nutrient and sediment runoff due, in part, to Madagascar’s heavy reliance on land for agricultural purposes (Scales, 2011). Moreover, its coastal waters, like so many throughout the world, have been proven to be warming at an alarming rate over the past few decades. In recognizing the intimate interconnectedness of the both the social and ecological systems, conservation organizations have invoked a host of complimentary conservation and social development efforts with the dual aim of preserving or restoring the health of both the coastal ecosystems and the people of the region. This paper provides a way of thinking more holistically about the social-ecological system within a resiliency frame of understanding. Secondly, it applies a platform known as state-and-transition modeling to give form to the process. State-and-transition modeling is an iterative investigation into the physical makeup of a system of study as well as the boundaries and influences on that state, and has been used in restorative ecology for more than a decade. Lastly, that model is sited within an adaptive management scheme that provides a structured, cyclical, objective-oriented process for testing stakeholders cognitive understanding of the ecosystem through a pragmatic implementation and monitoring a host of small-scale interventions developed as part of the adaptive management process. Throughout, evidence of the application of the theories and frameworks are offered, with every effort made to retool conservation-minded development practitioners with a comprehensive strategy for addressing the increasingly fragile social-ecological systems of southwest Madagascar. It is offered, in conclusion, that the seascapes of the region would be an excellent case study worthy of future application of state-and-transition modeling and adaptive management as frameworks for conservation-minded development practitioners whose multiple projects, each with its own objective, have been implemented with a single goal in mind: preserve and protect the state of the supporting environment while providing for the basic needs of the local Malagasy people.
Resumo:
File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.
Resumo:
This article gives an overview of trends in policy on the functions and role of social work in French society over the past twenty years. The author suggests several reasons for the current feeling of crisis of professional identity among professionals and the complexities of the political demands made on social work. These are analysed as a consequence of the specific French context of decentralisation of the State and of the multitude of approaches to organisation and to professional training programs. On a broader level, it seems that French social work reflects many characteristics of “modernity” being concerned with difficulties in defining a clear identity, lack of a clear territorial and institutional base (or “disembeddedness” to borrow Giddens term) and difficulties in finding a clear voice to make its values heard in an increasingly politicised arena of public debate.
Resumo:
We examine the impact of identity preferences on the interrelation between incentives and performance measurement. In our model, a manager identifies with an organization and loses utility to the extent that his actions conflict with effort-standards issued by the principal. Contrary to prior arguments in the literature, we find conditions under which a manager who identifies strongly with the organization receives stronger incentives and faces more performance evaluation reports than a manager who does not identify with the organization. Our theory predicts that managers who experience events that boost their identification with the firm can decrease their effort in short-term value creation. We also find that firms are more likely to employ less precise but more congruent performance measures, such as stock prices, when contracting with managers who identify little with the organization. In contrast, they use more precise but less congruent measures, such as accounting earnings, when contracting with managers who identify strongly with the firm.
Resumo:
Distinguishing organic and conventional products is a major issue of food security and authenticity. Previous studies successfully used stable isotopes to separate organic and conventional products, but up to now, this approach was not tested for organic grassland hay and soil. Moreover, isotopic abundances could be a powerful tool to elucidate differences in ecosystem functioning and driving mechanisms of element cycling in organic and conventional management systems. Here, we studied the delta N-15 and delta C-13 isotopic composition of soil and hay samples of 21 organic and 34 conventional grasslands in two German regions. We also used Delta delta N-15 (delta N-15 plant - delta N-15 soil) to characterize nitrogen dynamics. In order to detect temporal trends, isotopic abundances in organic grasslands were related to the time since certification. Furthermore, discriminant analysis was used to test whether the respective management type can be deduced from observed isotopic abundances. Isotopic analyses revealed no significant differences in delta C-13 in hay and delta C-13 in both soil and hay between management types, but showed that delta C-13 abundances were significantly lower in soil of organic compared to conventional grasslands. delta C-15 values implied that management types did not substantially differ in nitrogen cycling. Only delta C-13 in soil and hay showed significant negative relationships with the time since certification. Thus, our result suggest that organic grasslands suffered less from drought stress compared to conventional grasslands most likely due to a benefit of higher plant species richness, as previously shown by manipulative biodiversity experiments. Finally, it was possible to correctly classify about two third of the samples according to their management using isotopic abundances in soil and hay. However, as more than half of the organic samples were incorrectly classified, we infer that more research is needed to improve this approach before it can be efficiently used in practice.
Resumo:
OBJECTIVE Hunger strikers resuming nutritional intake may develop a life-threatening refeeding syndrome (RFS). Consequently, hunger strikers represent a core challenge for the medical staff. The objective of the study was to test the effectiveness and safety of evidence-based recommendations for prevention and management of RFS during the refeeding phase. METHODS This was a retrospective, observational data analysis of 37 consecutive, unselected cases of prisoners on a hunger strike during a 5-y period. The sample consisted of 37 cases representing 33 individual patients. RESULTS In seven cases (18.9%), the hunger strike was continued during the hospital stay, in 16 episodes (43.2%) cessation of the hunger strike occurred immediately after admission to the security ward, and in 14 episodes (37.9%) during hospital stay. In the refeed cases (n = 30), nutritional replenishment occurred orally, and in 25 (83.3%) micronutrients substitutions were made based on the recommendations. The gradual refeeding with fluid restriction occurred over 10 d. Uncomplicated dyselectrolytemia was documented in 12 cases (40%) within the refeeding phase. One case (3.3%) presented bilateral ankle edemas as a clinical manifestation of moderate RFS. Intensive medical treatment was not necessary and none of the patients died. Seven episodes of continued hunger strike were observed during the entire hospital stay without medical complications. CONCLUSIONS Our data suggested that seriousness and rate of medical complications during the refeeding phase can be kept at a minimum in a hunger strike population. This study supported use of recommendations to optimize risk management and to improve treatment quality and patient safety in this vulnerable population.
Resumo:
Ensuring sustainable use of natural resources is crucial for maintaining the basis for our livelihoods. With threats from climate change, disputes over water, biodiversity loss, competing claims on land, and migration increasing worldwide, the demands for sustainable land management (SLM) practices will only increase in the future. For years already, various national and international organizations (GOs, NGOs, donors, research institutes, etc.) have been working on alternative forms of land management. And numerous land users worldwide – especially small farmers – have been testing, adapting, and refining new and better ways of managing land. All too often, however, the resulting SLM knowledge has not been sufficiently evaluated, documented and shared. Among other things, this has often prevented valuable SLM knowledge from being channelled into evidence-based decision-making processes. Indeed, proper knowledge management is crucial for SLM to reach its full potential. Since more than 20 years, the international WOCAT network documents and promotes SLM through its global platform. As a whole, the WOCAT methodology comprises tools for documenting, evaluating, and assessing the impact of SLM practices, as well as for knowledge sharing, analysis and use for decision support in the field, at the planning level, and in scaling up identified good practices. In early 2014, WOCAT’s growth and ongoing improvement culminated in its being officially recognized by the UNCCD as the primary recommended database for SLM best practices. Over the years, the WOCAT network confirmed that SLM helps to prevent desertification, to increase biodiversity, enhance food security and to make people less vulnerable to the effects of climate variability and change. In addi- tion, it plays an important role in mitigating climate change through improving soil organic matter and increasing vegetation cover. In-depth assessments of SLM practices from desertification sites enabled an evaluation of how SLM addresses prevalent dryland threats. The impacts mentioned most were diversified and enhanced production and better management of water and soil degradation, whether through water harvesting, improving soil moisture, or reducing runoff. Among others, favourable local-scale cost-benefit relationships of SLM practices play a crucial role in their adoption. An economic analysis from the WOCAT database showed that land users perceive a large majority of the technologies as having benefits that outweigh costs in the long term. The high investment costs associated with some practices may constitute a barrier to adoption, however, where appropriate, short-term support for land users can help to promote these practices. The increased global concerns on climate change, disaster risks and food security redirect attention to, and trigger more funds for SLM. To provide the necessary evidence-based rationale for investing in SLM and to reinforce expert and land users assessments of SLM impacts, more field research using inter- and transdisciplinary approaches is needed. This includes developing methods to quantify and value ecosystem services, both on-site and off-site, and assess the resilience of SLM practices, as currently aimed at within the EU FP7 projects CASCADE and RECARE.