858 resultados para Bus and Car relationship
Resumo:
Résumé Cette étude examine les changements précoces dans le Style Défensif Maladaptatif (SDM), le développement de l'alliance thérapeutique et la relation entre le SDM et l'alliance au cours d'une psychothérapie psychodynamique ultra-brève. Soixante-huit patients ambulatoires du centre de consultation psychiatrique et psychothérapique ont bénéficié d'une intervention psychodynamique en quatre séances. Les mesures des défenses et de l'alliance étaient effectuées à la première et à la dernière séance. Les patients qui ont débuté l'intervention avec une alliance faible et qui l'ont terminée avec une alliance haute (groupe de patients avec une alliance de croissance linéaire) ont diminué leur utilisation de défenses maladaptatives de manière significative au cours de la thérapie, alors que ce n'a pas été le cas pour les patients des groupes à alliances haute-stable et basse-stable. Les résultats ont montré qu'à la fin de l'intervention, le SDM et l'alliance étaient corrélés pour tous les patients. Cette corrélation intéressait plus particulièrement le groupe avec une alliance de croissance linéaire. Ces résultats suggèrent, que le développement de l'alliance thérapeutique reflètent le travail de collaboration entre le patient et son thérapeute alors qu'ils essayent de mieux comprendre les causes de la crise du patient. Cette compréhension peut aider à réduire les défenses initialement activées pour permettre au patient de se défendre de l'anxiété et d'un sentiment de détresse. Abstract This study examined the early change in Maladaptive Defense Style (MDS), the development of the Therapeutic Alliance, and the relationship between MDS and alliance, in a short psychodynamic intervention. Sixty-eight outpatients from a psychiatric clinic completed a four-session psychodynamic intervention. Defense and alliance measures were collected at the intake and the final session. Patients who began the intervention with a poor alliance but ended with a good alliance (linear growth therapeutic alliance group) significantly decreased their use of maladaptive defenses over the course of therapy, while patients in the high and low alliance groups did not. Results showed that at the end of the intervention, MDS and alliance were related across all patients. This relation concerned particularly the linear growth therapeutic alliance profile. These results suggest that the developing therapeutic alliance might reflect the collaborative work between the patient and the therapist as they try to understand the causes of the crisis. This understanding might help reduce maladaptive defenses that were initially activated to ward off anxiety and distress.
Resumo:
BACKGROUND: High-sensitivity C-reactive protein (hs-CRP) is associated with several cardiovascular risk factors (CVRF) and with renal function markers. However, these associations have not been examined in populations in the African region. We analyzed the distribution of hs-CRP and the relationship with a broad set of CVRF, renal markers and carotid intima-media thickness (IMT), in the Seychelles (African region). METHODS: We conducted a survey in the population aged 25-64years (n=1255, participation rate: 80.2%). Analyses were restricted to persons of predominantly African descent (n=1011). RESULTS: Mean and median hs-CRP serum concentrations (mg/l) were 3.1 (SD 7.6) and 1.4 (IQR 0.7-2.9) in men and 4.5 (SD 6.7) and 2.2 (IQR 1.0-5.4) in women (p<0.001 for difference between men and women). hs-CRP was significantly associated with several conventional CVRF, and particularly strongly with markers of adiposity. With regards to renal markers, hs-CRP was strongly associated with cystatin C and with microalbuminuria but not with creatinine. hs-CRP was not associated with IMT. CONCLUSIONS: Serum concentration of hs-CRP was significantly associated with sex, several CVRF and selected renal function markers, which extends similar findings in Europe and in North America to a population in the African region. These findings can contribute to guide recommendations for the use of hs-CRP in clinical practice in the region.
Resumo:
The remaining phosphorus (Prem) has been used for estimating the phosphorus buffer capacity (PBC) of soils of some Brazilian regions. Furthermore, the remaining phosphorus can also be used for estimating P, S and Zn soil critical levels determined with PBC-sensible extractants and for defining P and S levels to be used not only in P and S adsorption studies but also for the establishment of P and S response curves. The objective of this work was to evaluate the effects of soil clay content and clay mineralogy on Prem and its relationship with pH values measured in saturated NaF solution (pH NaF). Ammonium-oxalate-extractable aluminum exerts the major impacts on both Prem and pH NaF, which, in turn, are less dependent on soil clay content. Although Prem and pH NaF have consistent correlation, the former has a soil-PBC discriminatory capacity much greater than pH NaF.
Resumo:
The role of autophagy and its relationship with apoptosis in Alzheimer disease (AD) pathogenesis is poorly understood. Disruption of autophagy leads to buildup of incompletely digested substrates, amyloid-β (Aβ) peptide accumulation in vacuoles and cell death. Aβ, in turn, has been found to affect autophagy. Thus, Aβ might be part of a loop in which it is both the substrate of altered autophagy and its cause. Given the relevance of different soluble forms of Aβ1-42 in AD, we have investigated whether monomers and oligomers of the peptide have a differential role in causing altered autophagy and cell death. Using differentiated SK-N-BE neuroblastoma cells, we found that monomers hamper the formation of the autophagic BCL2-BECN1/Beclin 1 complex and activate the MAPK8/JNK1-MAPK9/JNK2 pathway phosphorylating BCL2. Monomers also inhibit apoptosis and allow autophagy with intracellular accumulation of autophagosomes and elevation of levels of BECN1 and LC3-II, resulting in an inhibition of substrate degradation due to an inhibitory action on lysosomal activity. Oligomers, in turn, favor the formation of the BCL2-BECN1 complex favoring apoptosis. In addition, they cause a less profound increase in BECN1 and LC3-II levels than monomers without affecting the autophagic flux. Thus, data presented in this work show a link for autophagy and apoptosis with monomers and oligomers, respectively. These studies are likely to help the design of novel disease modifying therapies.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
WE USED A MURINE MODEL OF TRANSIENT FOCAL CEREBRAL ISCHEMIA TO STUDY: 1) in vivo DTI long-term temporal evolution of the apparent diffusion coefficient (ADC) and diffusion fractional anisotropy (FA) at days 4, 10, 15 and 21 after stroke 2) ex vivo distribution of a plasticity-related protein (GAP-43) and its relationship with the ex vivo DTI characteristics of the striato-thalamic pathway (21 days). All animals recovered motor function. In vivo ADC within the infarct was significantly increased after stroke. In the stroke group, GAP-43 expression and FA values were significantly higher in the ipsilateral (IL) striatum and contralateral (CL) hippocampus compared to the shams. DTI tractography showed fiber trajectories connecting the CL striatum to the stroke region, where increased GAP43 and FA were observed and fiber tracts from the CL striatum terminating in the IL hippocampus.Our data demonstrate that DTI changes parallel histological remodeling and recovery of function.
Resumo:
Experimental results of a new controller able to support bidirectional power flow in a full-bridge rectifier with boost-like topology are obtained. The controller is computed using port Hamiltonian passivity techniques for a suitable generalized state space averaging truncation system, which transforms the control objectives, namely constant output voltage dc-bus and unity input power factor, into a regulation problem. Simulation results for the full system show the essential correctness of the simplifications introduced to obtain the controller, although some small experimental discrepancies point to several aspects that need further improvement.
Resumo:
We assessed the 15-year trends in the distribution of body mass index (BMI) and the prevalence of overweight in the Seychelles (Indian Ocean, African Region) and the relationship with socio-economic status (SES). Three population-based examination surveys were conducted in 1989, 1994 and 2004. Occupation was categorized as 'labourer', 'intermediate' or 'professional'. Education was also assessed in 1994 and 2004. Between 1989 and 2004, mean BMI increased markedly in all sex and age categories (overall: 0.16 kg m(-2) per calendar year, which corresponds to 0.46 kg per calendar year). The prevalence of overweight (including obesity, BMI >or= 25 kg m(-2)) increased from 29% to 52% in men and from 50% to 67% in women. The prevalence of obesity (BMI >or= 30 kg m(-2)) increased from 4% to 15% in men and from 23% to 34% in women. Overweight was associated inversely with occupation in women and directly in men in all surveys. In multivariate analysis, overweight was associated similarly (direction and magnitude) to occupation and education. In conclusion, the increasing prevalence of overweight and obesity over time in all age, sex and SES categories suggests large-scale changes in societal obesogenic factors. The sex-specific association of SES with overweight suggests that prevention measures should be tailored accordingly.
Resumo:
Abstract The research problem in the thesis deals with improving the responsiveness and efficiency of logistics service processes between a supplier and its customers. The improvement can be sought by customizing the services and increasing the coordination of activities between the different parties in the supply chain. It is argued that to achieve coordination the parties have to have connections on several levels. In the framework employed in this research, three contexts are conceptualized at which the linkages can be planned: 1) the service policy context, 2) the process coordination context, and 3) the relationship management context. The service policy context consists of the planning methods by which a supplier analyzes its customers' logistics requirements and matches them with its own operational environment and efficiency requirements. The main conclusion related to the service policy context is that it is important to have a balanced selection of both customer-related and supplier-related factors in the analysis. This way, while the operational efficiency is planned a sufficient level of service for the most important customers is assured. This kind of policy planning involves taking multiple variables into the analysis, and there is a need to develop better tools for this purpose. Some new approaches to deal with this are presented in the thesis.The process coordination context and the relationship management context deal with the issues of how the implementation of the planned service policies can be facilitated in an inter-organizational environment. Process coordination includes typically such mechanisms as control rules, standard procedures and programs, but inhighly demanding circumstances more integrative coordination mechanisms may be necessary. In the thesis the coordination problems in third-party logistics relationship are used as an example of such an environment. Relationship management deals with issues of how separate companies organize their relationships to improve the coordination of their common processes. The main implication related to logistics planning is that by integrating further at the relationship level, companies can facilitate the use of the most efficient coordination mechanisms and thereby improve the implementation of the selected logistics service policies. In the thesis, a case of a logistics outsourcing relationship is used to demonstrate the need to address the relationship issues between the service provider andthe service buyer before the outsourcing can be done.The dissertation consists of eight research articles and a summarizing report. The principal emphasis in the articles is on the service policy planning context, which is the main theme of six articles. Coordination and relationship issues are specifically addressed in two of the papers.
Establishing intercompany relationships: Motives and methods for successful collaborative engagement
Resumo:
This study explores the early phases of intercompany relationship building, which is a very important topic for purchasing and business development practitioners as well as for companies' upper management. There is a lot ofevidence that a proper engagement with markets increases a company's potential for achieving business success. Taking full advantage of the market possibilities requires, however, a holistic view of managing related decision-making chain. Most literature as well as the business processes of companies are lacking this holism. Typically they observe the process from the perspective of individual stages and thus lead to discontinuity and sub-optimization. This study contains a comprehensive introduction to and evaluation of literature related to various steps of the decision-making process. It is studied from a holistic perspective ofdetermining a company's vertical integration position within its demand/ supplynetwork context; translating the vertical integration objectives to feasible strategies and objectives; and operationalizing the decisions made through engagement with collaborative intercompany relationships. The empirical part of the research has been conducted in two sections. First the phenomenon of intercompany engagement is studied using two complementary case studies. Secondly a survey hasbeen conducted among the purchasing and business development managers of several electronics manufacturing companies, to analyze the processes, decision-makingcriteria and success factors of engagement for collaboration. The aim has been to identify the reasons why companies and their management act the way they do. As a combination of theoretical and empirical research an analysis has been produced of what would be an ideal way of engaging with markets. Based on the respective findings the study concludes by proposing a holistic framework for successful engagement. The evidence presented throughout the study demonstrates clear gaps, discontinuities and limitations in both current research and in practical purchasing decision-making chains. The most significant discontinuity is the identified disconnection between the supplier selection process and related criteria and the relationship success factors.
Resumo:
Online learning provides the opportunity to work on academic tasks at any time at the same time as doing other activities, such as using in web 2.0 tools. This study identifies factors that contribute to success in online learning from the students¿ perspective and their relationship with time patterns. A survey of learning outputs was used to find relationships between students¿ satisfaction, knowledge acquisition and knowledge transfer with time for working on academic tasks. In this study, 199 students from a university in Mexico completed the survey. Findings suggest that knowledge transfer has a significant association with the number of hours online per day, hours spent on social networks and the use made of e-learning during working hours. Learner satisfaction has a strong relationship with the time in years a learner has been using the Internet and the number of hours devoted to the course per week. The findings of this research will be helpful for faculty and instructional designers for implementing learning strategies.
Resumo:
Helicobacter pylori is an important human pathogen associated with serious gastric diseases. Owing to its medical importance and close relationship with its human host, understanding genomic patterns of global and local adaptation in H. pylori may be of particular significance for both clinical and evolutionary studies. Here we present the first such whole genome analysis of 60 globally distributed strains, from which we inferred worldwide population structure and demographic history and shed light on interesting global and local events of positive selection, with particular emphasis on the evolution of San-associated lineages. Our results indicate a more ancient origin for the association of humans and H. pylori than previously thought. We identify several important perspectives for future clinical research on candidate selected regions that include both previously characterized genes (e.g., transcription elongation factor NusA and tumor necrosis factor alpha-inducing protein Tipα) and hitherto unknown functional genes.
Resumo:
Background: A holistic perspective on health implies giving careful consideration to the relationship between physical and mental health. In this regard the present study sought to determine the level of Positive Mental Health (PMH) among people with chronic physical health problems, and to examine the relationship between the observed levels of PMH and both physical health status and socio-demographic variables. Methods: The study was based on the Multifactor Model of Positive Mental Health (Lluch, 1999), which comprises six factors: Personal Satisfaction (F1), Prosocial Attitude (F2), Self-control (F3), Autonomy (F4), Problem-solving and Self-actualization (F5), and Interpersonal Relationship Skills (F6). The sample comprised 259 adults with chronic physical health problems who were recruited through a primary care center in the province of Barcelona (Spain). Positive mental health was assessed by means of the Positive Mental Health Questionnaire (Lluch, 1999). Results: Levels of PMH differed, either on the global scale or on specific factors, in relation to the following variables: age: global PMH scores decreased with age (r=-0.129; p=0.038); b) gender: men scored higher on F1 (t=2.203; p=0.028) and F4 (t=3.182; p=0.002), while women scored higher on F2 (t -3.086; p=0.002) and F6 (t=-2.744; p=0.007); c) number of health conditions: the fewer the number of health problems the higher the PMH score on F5 (r=-0.146; p=0.019); d) daily medication: polymedication patients had lower PMH scores, both globally and on various factors; e) use of analgesics: occasional use of painkillers was associated with higher PMH scores on F1 (t=-2.811; p=0.006). There were no significant differences in global PMH scores according to the type of chronic health condition. The only significant difference in the analysis by factors was that patients with hypertension obtained lower PMH scores on the factor Autonomy (t=2.165; p=0.032). Conclusions: Most people with chronic physical health problems have medium or high levels of PMH. The variables that adversely affect PMH are old age, polypharmacy and frequent consumption of analgesics. The type of health problem does not influence the levels of PMH. Much more extensive studies with samples without chronic pathology are now required in order to be able to draw more robust conclusions.
Resumo:
Tutkielman tavoitteena on määritellä keskeiset ja sopivat asiakasportfoliomallit ja asiakasmatriisit asiakassuhteen määrittämiseen. Tutkimus keskittyy asiakassuhteen arvottamiseen ja avainasiakkaiden määrittämiseen kohdeyrityksessä. Keskeisimmät ja sopivimmat asiakasportfliomallit huomioidaan asiakkaiden arvioinnissa. Tutkielman teoriaosassa esitellään tunnetuimmat ja käytetyimmät asiakasportfoliomallit ja matriisit alan kirjallisuuden perusteella. Tämän lisäksi asiakasportfoliomalleihin yhdistetään näkökulmia suhdemarkkinoinnin, asiakkuuksien johtamisen ja tuoteportfolioiden teorioista. Keskeisimmät kirjallisuuden lähteet ovat johtamisen ja markkinoinnin alalta. Tutkielman empiriaosassa esitellään kohdeyritys ja sen tämän hetkinen asiakassuhteiden johtamiskäytäntö. Lisäksi tehdään parannusehdotuksia kohdeyrityksen nykyiseen asiakassuhteiden arvottamismenetelmään jotta asiakassuhteiden arvon laskeminen vastaisi mahdollisimman hyvin kohdeyrityksen nykyisiä tarpeita. Asiakassuhteen arvon määrittämiseksi käytetään myös fokusryhmähaastattelua. Avainasiakkaat määritellään ja tilannetta havainnollistetaan sijoittamalla avainasiakkaat asiakasportfolioon.
Resumo:
Aim: Obesity and smoking are major CVD risk factors and may be associated with other unfavourable lifestyle behaviours. Our aim was to investigate the significance of obesity, heavy smoking, and both combined in terms of prevalence trends and their relationship with other lifestyle factors. Methods: We used data from the population-based cross-sectional Swiss Health Survey (5 waves, 1992-2012) comprising 85,575 individuals aged 18 years. Height, weight, and smoking status were self-reported. We used multinomial logistic regression to analyse differences in lifestyle for the combinations of BMI category and smoking status, focusing on obese and heavy smokers. We defined normal-weight never smokers as reference.