844 resultados para Network Architectures and Security


Relevância:

100.00% 100.00%

Publicador:

Resumo:

EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Geleophysic (GD) and acromicric dysplasia (AD) belong to the acromelic dysplasia group and are both characterized by severe short stature, short extremities, and stiff joints. Although AD has an unknown molecular basis, we have previously identified ADAMTSL2 mutations in a subset of GD patients. After exome sequencing in GD and AD cases, we selected fibrillin 1 (FBN1) as a candidate gene, even though mutations in this gene have been described in Marfan syndrome, which is characterized by tall stature and arachnodactyly. We identified 16 heterozygous FBN1 mutations that are all located in exons 41 and 42 and encode TGFβ-binding protein-like domain 5 (TB5) of FBN1 in 29 GD and AD cases. Microfibrillar network disorganization and enhanced TGFβ signaling were consistent features in GD and AD fibroblasts. Importantly, a direct interaction between ADAMTSL2 and FBN1 was demonstrated, suggesting a disruption of this interaction as the underlying mechanism of GD and AD phenotypes. Although enhanced TGFβ signaling caused by FBN1 mutations can trigger either Marfan syndrome or GD and AD, our findings support the fact that TB5 mutations in FBN1 are responsible for short stature phenotypes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

OBJECTIVES: In this study, we investigated the structural plasticity of the contralesional motor network in ischemic stroke patients using diffusion magnetic resonance imaging (MRI) and explored a model that combines a MRI-based metric of contralesional network integrity and clinical data to predict functional outcome at 6 months after stroke. METHODS: MRI and clinical examinations were performed in 12 patients in the acute phase, at 1 and 6 months after stroke. Twelve age- and gender-matched controls underwent 2 MRIs 1 month apart. Structural remodeling after stroke was assessed using diffusion MRI with an automated measurement of generalized fractional anisotropy (GFA), which was calculated along connections between contralesional cortical motor areas. The predictive model of poststroke functional outcome was computed using a linear regression of acute GFA measures and the clinical assessment. RESULTS: GFA changes in the contralesional motor tracts were found in all patients and differed significantly from controls (0.001 ≤ p < 0.05). GFA changes in intrahemispheric and interhemispheric motor tracts correlated with age (p ≤ 0.01); those in intrahemispheric motor tracts correlated strongly with clinical scores and stroke sizes (p ≤ 0.001). GFA measured in the acute phase together with a routine motor score and age were a strong predictor of motor outcome at 6 months (r(2) = 0.96, p = 0.0002). CONCLUSION: These findings represent a proof of principle that contralesional diffusion MRI measures may provide reliable information for personalized rehabilitation planning after ischemic motor stroke. Neurology® 2012;79:39-46.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: Several European HIV observational data bases have, over the last decade, accumulated a substantial number of resistance test results and developed large sample repositories, There is a need to link these efforts together, We here describe the development of such a novel tool that allows to bind these data bases together in a distributed fashion for which the control and data remains with the cohorts rather than classic data mergers.METHODS: As proof-of-concept we entered two basic queries into the tool: available resistance tests and available samples. We asked for patients still alive after 1998-01-01, and between 180 and 195 cm of height, and how many samples or resistance tests there would be available for these patients, The queries were uploaded with the tool to a central web server from which each participating cohort downloaded the queries with the tool and ran them against their database, The numbers gathered were then submitted back to the server and we could accumulate the number of available samples and resistance tests.RESULTS: We obtained the following results from the cohorts on available samples/resistance test: EuResist: not availableI11,194; EuroSIDA: 20,71611,992; ICONA: 3,751/500; Rega: 302/302; SHCS: 53,78311,485, In total, 78,552 samples and 15,473 resistance tests were available amongst these five cohorts. Once these data items have been identified, it is trivial to generate lists of relevant samples that would be usefuI for ultra deep sequencing in addition to the already available resistance tests, Saon the tool will include small analysis packages that allow each cohort to pull a report on their cohort profile and also survey emerging resistance trends in their own cohort,CONCLUSIONS: We plan on providing this tool to all cohorts within the Collaborative HIV and Anti-HIV Drug Resistance Network (CHAIN) and will provide the tool free of charge to others for any non-commercial use, The potential of this tool is to ease collaborations, that is, in projects requiring data to speed up identification of novel resistance mutations by increasing the number of observations across multiple cohorts instead of awaiting single cohorts or studies to reach the critical number needed to address such issues.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Työn tarkoituksena on selvittää minkälaisen verkoston Aker Yards Oy, kokonaistoimittajat ja kokonaistoimittajien alihankkijat muodostavat. Lisäksi arvioidaan verkostoriskit, joita Aker Yards Oy kohtaa toimiessaan verkostossa. Tutkimus suoritettiin tekemällä kysely verkostossa oleville kokonaistoimittajille sekä haastattelemalla kuutta henkilöä Aker Yards Oy:stä. Suhteita ja verkostoa analysoitiin tutkimalla verkoston yksittäisiä toimijoita sekä näiden välisiä suhteita. Riskejä analysoitiin tarkastelemalla niiden tunnistettuja syitä. Työn tuloksena on verkostokuva, joka piirrettiin kyselytulosten perusteella. Suhteiden ja verkoston analyysillä päädyttiin tehtäviin, joita Aker Yards Oy:n johdon tulisi toteuttaa, jotta verkostosta ja yksittäisistä toimittajista saataisiin irti mahdollisimman paljon. Lisäksi suhteita ja verkostoa käsiteltiin niiden tuloksellisen johtamisen näkökulmasta. Riskianalyysista saatiin tuloksena uhkaavimpien riskien arviointi.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Prosessitietoliikenneverkko toimii mm. energian tuotannon, siirron ja jakelun käytönvalvontajärjestelmien tiedonsiirron alustana. Tietoliikenneverkkojen rooli osana yrityksen operatiivisia prosesseja kasvaa järjestelmäuusintojen myötä ja järjestelmien tehokas hyödyntäminen vaatii luotettavat sekä nopeat tietoverkot. Uusittavien järjestelmien tietoliikenneratkaisut perustuvat pääsääntöisesti Ethernetpohjaiseen TCP/IP-verkkotekniikkaan. Tällä hetkellä prosessijärjestelmien tiedonsiirtoyhteydet kenttälaitteiden ja valvomojärjestelmien välillä on pääsääntöisesti toteutettu PCM-siirtojärjestelmällä tai kiinteän yhteyden modeemeilla. Käytössä oleva PCM-tekniikka on elinkaarensa loppupuolella ja tiedonsiirtonopeudet sekä liityntärajapinnat eivät täytä nykyaikaisten prosessijärjestelmien tiedonsiirto¬vaatimuksia. Työssä käytiin läpikeskeisimmät Ethernet-tekniikkaan ja TCP/IP-protokollaperheeseen liittyvät standardit ja verkon aktiivilaitteet. Vaatimusmäärittelyissä selvitettiin Helsingin Energian eri liiketoimintayksiköiden tarpeita sekä energia-alan lainsäädännön vaatimuksia prosessitietoliikenneverkolle. Tarpeiden ja vaatimusten pohjalta verrattiin kolmea eri vaihtoehtoista verkkotekniikkaa: kytkintekniikkaa, reititintekniikkaa ja MPLS-tekniikkaa. Vertailun perusteella valitulla verkkotekniikalla tehtiin suunnitelma avoimesta, valmistajasta riippumattomasta standardeihin perustuvasta yritystason Ethernet-pohjaisesta TCP/IP prosessiverkkoratkaisusta. Johtopäätöksissä pohditaan valitun ratkaisun käytettävyyttä, tietoturvaa sekä toimenpiteitä niiden kehittämiseksi.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Langattomien tiedonsiirtotekniikoiden kehittyessä mielenkiinto niiden soveltamiseen teollisuudessa on kasvanut. Langattoman tiedonsiirron avulla voidaan korvata perinteiset kaapeliratkaisut ja samalla mahdollistaa uusia, lisäarvoa toiminnalle tuovia sovelluksia. Tavoitteena on kustannussäästöjen lisäksi tuotannon tehostaminen paremman tiedonkeruun ja joustavamman käyttöympäristön avulla. Kaukolämpöjärjestelmän osien väliset etäisyydet ovat useimmiten niin pitkiä, ettei lyhyen kantaman langattomia tekniikoita voida hyödyntää. Tämän työn perusteella realistisina vaihtoehtoina ovat toistaiseksi yleisten matkapuhelinverkkojen hyödyntäminen sekä radiolinkit, mutta tulevaisuudessa uudet langattomat verkkotekniikat voivat mahdollistaa ulkopuolisista operaattoreista riippumattoman mobiilin tiedonsiirtojärjestelmän toteuttamisen koko kaukolämpöjärjestelmän alueelle. Työn aikana havaittiin myös, että uusien sovellusalueiden kanssa on vielä entistäkin tärkeämpää kiinnittää huomiota huolelliseen suunnitteluun, kustannuslaskelmiin sekä tietoturvaan, jotta voidaan toteuttaa luotettava, edullinen ja toimivalangaton tiedonsiirtojärjestelmä.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The regulation of electricity transmission and distribution business is an essential issue for any electricity market; it is widely introduced in developed electricity markets of Great Britain, Scandinavian countries and United States of America and other. Those markets which were liberalized recently also need well planned regulation model to be chosen and implemented. In open electricity markets the sectors of electricity distribution and transmission remain monopolies, so called "natural monopolies", as introducing the competition into these sectors in most cases appears to be inefficient. Thatis why regulation becomes very important as its main tasks are: to set reasonable tariffs for customers, to ensure non-discriminating process of electricity transmission and distribution, at the same time to provide distribution companies with incentives to operate efficiently and the owners of the companies with reasonable profits as well; the problem of power quality should be solved at the same time. It should be mentioned also, that there is no incentive scheme which will be suitable for any conditions, that is why it is essential to study differentregulation models in order to form the best one for concrete situation. The aim of this Master's Thesis is to give an overview over theregulation of electricity transmission and distribution in Russia. First, the general information about theory of regulation of natural monopolies will be described; the situation in Russian network business and the importance of regulation process for it will be discussed next. Then there is a detailed description ofexisting regulatory system and the process of tariff calculation with an example. And finally, in the work there is a brief analysis of problems of present scheme of regulation, an attempt to predict the following development of regulationin Russia and the perspectives and risks connected to regulation which could face the companies that try to enter Russian electricity market (such as FORTUM OY).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Forensic intelligence is a distinct dimension of forensic science. Forensic intelligence processes have mostly been developed to address either a specific type of trace or a specific problem. Even though these empirical developments have led to successes, they are trace-specific in nature and contribute to the generation of silos which hamper the establishment of a more general and transversal model. Forensic intelligence has shown some important perspectives but more general developments are required to address persistent challenges. This will ensure the progress of the discipline as well as its widespread implementation in the future. This paper demonstrates that the description of forensic intelligence processes, their architectures, and the methods for building them can, at a certain level, be abstracted from the type of traces considered. A comparative analysis is made between two forensic intelligence approaches developed independently in Australia and in Europe regarding the monitoring of apparently very different kind of problems: illicit drugs and false identity documents. An inductive effort is pursued to identify similarities and to outline a general model. Besides breaking barriers between apparently separate fields of study in forensic science and intelligence, this transversal model would assist in defining forensic intelligence, its role and place in policing, and in identifying its contributions and limitations. The model will facilitate the paradigm shift from the current case-by-case reactive attitude towards a proactive approach by serving as a guideline for the use of forensic case data in an intelligence-led perspective. A follow-up article will specifically address issues related to comparison processes, decision points and organisational issues regarding forensic intelligence (part II).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

CONTEXT: Increased altruism, self-transcendence, and quests for meaning in life (MiL) have been found in palliative care (PC) patients and their families who experience the finiteness of life. Similar changes were observed in healthy subjects who were experimentally confronted with their mortality. OBJECTIVES: The study investigated how daily experiences of the transitoriness of life influence PC health care professionals' (HCPs) values, MiL, and religiousness. METHODS: In a cross-sectional study, the Schwartz Value Survey, the Schedule for Meaning in Life Evaluation, and the Idler Index of Religiosity were used to investigate personal values, MiL, and private religiousness. HCPs working in PC (confronted with death) were compared with a control group of HCPs working at maternity wards (MWs) using multivariate models. Differences were considered to be statistically significant at P < 0.05. RESULTS: Seventy PC- and 70 MW-HCPs took part in the study (response rate 74.0%). No differences between the groups were found in overall MiL satisfaction scores. PC-HCPs were significantly more religious than MW-HCPs; they listed spirituality and nature experience more often as areas in which they experience MiL. Furthermore, hedonism was more important for PC-HCPs, and they had higher scores in openness-to-change values (stimulation and self-direction). MW-HCPs were more likely to list family as a MiL area. They assigned more importance to health and scored higher in conservation values (conformity and security). Duration of professional experience did not influence these results. CONCLUSION: Basic differences in values, MiL, and religiousness between PC-HCPs and MW-HCPs might have influenced the choice of working environment because no effect of job duration was observed. Longitudinal research is needed to confirm this hypothesis.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The major objective of this thesis is to describe and analyse how a railcarrier is engaged in an intermodal freight transportation network through its role and position. Because of the fact that the role as a conceptualisation has a lot of parallels with the position, both these phenomena are evaluated theoretically and empirically. VR Cargo (a strategical business unitof the Finnish railway company VR Ltd.) was chosen to be the focal firm surrounded by the actors of the focal net. Because of the fact that networks are sets of relationships rather than sets of actors, it is essential to describe the dimensions of the relationships created through the time thus having a past, presentand future. The roles are created during long common history shared by the actors especially when IM networks are considered. The presence of roles is embeddedin the tasks, and the future is anchored to the expectations. Furthermore, in this study role refers to network dynamics, and to incremental and radical changes in the network, in a similar way as position refers to stability and to the influences of bonded structures. The main purpose of the first part of the study was to examine how the two distinctive views that have a dominant position in modern logistics ¿ the network view (particularly IMP-based network approach) and the managerial view (represented by Supply Chain Management) differ, especially when intermodalism is under consideration. In this study intermodalism was defined as a form of interorganisational behaviour characterized by the physical movement of unitized goods with Intermodal Transport Units, using more than one mode as performed by the net of operators. In this particular stage the study relies mainly on theoretical evaluation broadened by some discussions with the practitioners. This is essential, because the continuous dialogue between theory and practice is highly emphasized. Some managerial implications are discussed on the basis of the theoretical examination. A tentative model for empirical analysis in subsequent research is suggested. The empirical investigation, which relies on the interviews among the members in the focal net, shows that the major role of the focal company in the network is the common carrier. This role has some behavioural and functional characteristics, such as an executive's disclosure expressing strategic will attached with stable and predictable managerial and organisational behaviour. Most important is the notion that the focal company is neutral for all the other operators, and willing to enhance and strengthen the collaboration with all the members in the IM network. This also means that all the accounts are aimed at being equal in terms of customer satisfaction. Besides, the adjustments intensify the adopted role. However, the focal company is also obliged tosustain its role as it still has a government-erected right to maintain solely the railway operations on domestic tracks. In addition, the roles of a dominator, principal, partner, subcontractor, and integrator were present appearing either in a dyadic relationship or in net(work) context. In order to reveal differentroles, a dualistic interpretation of the concept of role/position was employed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Neuronal dynamics are fundamentally constrained by the underlying structural network architecture, yet much of the details of this synaptic connectivity are still unknown even in neuronal cultures in vitro. Here we extend a previous approach based on information theory, the Generalized Transfer Entropy, to the reconstruction of connectivity of simulated neuronal networks of both excitatory and inhibitory neurons. We show that, due to the model-free nature of the developed measure, both kinds of connections can be reliably inferred if the average firing rate between synchronous burst events exceeds a small minimum frequency. Furthermore, we suggest, based on systematic simulations, that even lower spontaneous inter-burst rates could be raised to meet the requirements of our reconstruction algorithm by applying a weak spatially homogeneous stimulation to the entire network. By combining multiple recordings of the same in silico network before and after pharmacologically blocking inhibitory synaptic transmission, we show then how it becomes possible to infer with high confidence the excitatory or inhibitory nature of each individual neuron.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Present book collects some of the thoughts developed during the 5 years (2004-2009) of work in the frame of the CHALLENGE project, "The Changing Landscape of European Liberty and Security". The project has related academic knowledge and research with the analysis of the policies and practices of the member States of the European Union [EU] around the couple liberty and security

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis addresses the issue of the moving boundaries between family and friends' roles in personal networks, adopting a life-course perspective and using Switzerland as a case study. In a period of major changes in personal life happening in contemporary Western societies, understanding the organization of personal networks intertwined with the unfolding of individual life courses is of prime importance in facing new challenges with regard to social integration. The data stem from a representative national survey carried out in 2011 named Family tiMes, including 803 individuals born either in 1950-1955 or in 1970-1975. An innovative research design was adopted, combing cross-sectional ego-centered network data and retrospective longitudinal life-course data. The results show continuing boundaries between family and friends' roles and that family keeps a prominent role in personal networks despite the notable importance of friendship ties. One relationship stands out above all, that with the partner, followed quite a few steps behind by those with children. Regarding life courses, de-standardization tendencies were found in family formation and also a persistent gendering of occupational trajectories. Two kinds of life trajectories are particularly intertwined with personal networks, co-residence and partnership trajectories, both related to the unfolding of family life. In particular, transition to parenthood functions as a turning point in individuals' lives, deeply transforming their sociability. Finally, a twofold pluralization process was identified, affecting simultaneously the organization of personal networks and the unfolding of individual life courses. This thesis contributes to the literature on the sociology of family and personal life, and to fruitful interlinkage between the network approach and the life-course perspective.