950 resultados para Attachment Security
Resumo:
In most European countries Social Security (SS) systems are characterized as Pay-asyou- go systems. Their sustainability is being challenged with demographic changes, namely population ageing. Portugal’s population is ageing rapidly being one of the countries where this problem is more critical. With the growing debate on this topic several public choice models have been developed so as to explain SS size. In this work project there is an attempt to understand whether these models contribute to better explain Social security expenditure with pensions (SSEP) and to establish the need of finding ways to reduce present commitment with pension expenditure in Portugal.
Resumo:
The recent massive inflow of refugees to the European Union (EU) raises a number of unanswered questions on the economic impact of this phenomenon. To examine these questions, we constructed an overlapping-generations model that describes the evolution of the skill premium and of the welfare benefit level in relevant European countries, in the aftermath of an inflow of asylum-seekers. In our simulation, relative wages of skilled workers increase between 8% and 11% in the period of the inflow; their subsequent time path is dependent on the initial skill premium. The entry of migrants creates a fiscal surplus of about 8%, which can finance higher welfare benefits in the subsequent periods. These effects are weaker in a scenario where refugees do not fully integrate into the labor market.
Resumo:
Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.
Resumo:
Within the framework of state security policy, the focus of this dissertation are the relations between how new security threats are perceived and the policy planning and bureaucratic implementation that are designed to address them. In addition, this thesis explores and studies some of the inertias that might exist in the core of the state apparatus as it addresses new threats and how these could be better managed. The dissertation is built on five thematic and interrelated articles highlighting different aspects of when new significant national security threats are detected by different governments until the threats on the policy planning side translate into protective measures within the society. The timeline differs widely between different countries and some key aspects of this process are also studied. One focus concerns mechanisms for adaptability within the Intelligence Community, another on the policy planning process within the Cabinet Offices/National Security Councils and the third focus is on the planning process and how policy is implemented within the bureaucracy. The issue of policy transfer is also analysed, revealing that there is some imitation of innovation within governmental structures and policies, for example within the field of cyber defence. The main findings of the dissertation are that this context has built-in inertias and bureaucratic seams found in most government bureaucratic machineries. As much of the information and planning measures imply security classification of the transparency and internal debate on these issues, alternative assessments become limited. To remedy this situation, the thesis recommends ways to improve the decision-making system in order to streamline the processes involved in making these decisions. Another special focus of the thesis concerns the role of the public policy think tanks in the United States as an instrument of change in the country’s national security decision-making environment, which is viewed from the perspective as being a possible source of new ideas and innovation. The findings in this part are based on unique interviews data on how think tanks become successful and influence the policy debate in a country such as the United States. It appears clearly that in countries such as the United States think tanks smooth the decision making processes, and that this model with some adaptations also might be transferrable to other democratic countries.
Resumo:
An 1897 receipt from the Security, Loan & Savings Company to the Grand Central Hotel Co. for $15.00
Resumo:
During the 1980's and for much of the 1990's, many countries in the Asia Pacific were renowned for their economic development and prosperity. The Asian tigers were a source of great interest for many economists and international investors. The 1997 Asian financial crisis, however, dramatically altered the growth and the performance of these economies. The crisis sent several ofAsia's best performing economies on a downward spiral from which many have yet to fully recover. The crisis exposed the financial and the political weaknesses ofmany countries in the region. Moreover, the crisis severely affected the wellbeing and the security ofmany ofthe region's citizens. This text will examine the economic crisis in greater detail and explore current debates in the study of international relations theory. More specifically, this paper will examine recent challenges posed to traditional international relations theory and address alternative approaches to this field of study. This paper will examine Critical theory and its role in shifting the referent object of security from the state to the individual. In this context, this paper will also assess Critical theory's role in enabling such issues as gender and human security to find a place on the agendas of international relations scholars and foreign policy makers. The central focus ofthis study will be the financial crisis and its impact on human security in the Southeast Asia. Furthermore, this paper will assess the recovery efforts ofthe domestic governments, international organizations and various Canadian sponsored initiatives in the context ofhuman security.
Resumo:
Polyclonal antibodies prepared against the two glycoproteins (Mr 100 and 85 kDa) involved in recognition and attachment of the mycoparasite, Piptocephalis virginiana, to its hosts, Mortierella pusilla and Phascolomyces articulosus, susceptible and resistant, respectively, were employed to localize the antigens at their cell surfaces. Indirect immunocytochemical technique using secondary antibodies labelled with either FITC or gold particles as probes, were used. FITC-Iabelled antibodies revealed a discontinous pattern of fluorescence on the hyphae of MortlerelLa pusilla and no fluorescence on the hyphae of Phascolomyces articulosus. Intensity of fluorescence was high in the germinating spores of both the fungi. Fluoresence could be observed on P. articulosus hyphae pretreated with a commercial proteinase. Fluorescence was not observed on either hyphae or germinating spores of the nonhost M0 r tie re11 a ca ndelabrum and the mycoparasite P. virginiana. Antibodies labelled with gold conjugate showed a different pattern of antigen localization on the hyphal walls of the susceptible and resistant hosts. Patches of gold particles were observed allover the whole cell wall of the susceptible host but only on the inner cell wall layer of the resistant host. Cell wall fragments of the susceptible host but not those of the resistant host, previously incubated with the antibodies inhibited attachment of the mycoparasite. Implications of preferential localization of the antigen in the resistant host and its absence in the nonhost are described.
Resumo:
Cell surface proteins obtained by alkaline extraction from isolated cell walls of Mortierella pusilla and M. candelabrum, host and nonhost, respectively, to the mycoparasite, Piptocephalis virginiana, were tested for their ability to agglutinate mycoparasite spores. The host cell wall protein extract had a high agglutinating activity (788 a.u. mg- t ) as compared with the nonhost extract (21 a.li. mg- t ). SDS-polyacrylamide gel electrophoresis of the cell wall proteins revealed four protein bands, a, b, c, and d (Mr 117, 100, 85 and 64 kd, respectively) at the host surface, but not at the nonhost surface, except for the faint band c. Deletion of proteins b or c from the host cell wall protein extract significantly reduced its agglutinating activity. Proteins band c, obtained as purified preparations by a series of procedures, were shown to be two glycoproteins. Carbohydrate analysis by gas chromatography demonstrated that glucose and Nacetylglucosamine were the major carbohydrate components of the glycoproteins. It was further shown that the agglutinating activity of the pure preparation containing both band c was 500-850 times that of the single glycoproteins, suggesting the involvement of both glycoproteins in agglutination. The results suggest that the glycoproteins band c are the two subunits of agglutinin present at the host cell surface. The two glycoproteins band c purified from the host cell wall protein extract were further examined after various treatments for their possible role in agglutination, attachment and appressorium formation by the mycoparasite. Results obtained by agglutination and attachment tests showed: (1) the two glycoprotein-s are not only an agglutinin responsible for the mycoparasite spore agglutination, but may also serve as a receptor for the specific recognition, attachment and appressorium formation by the mycoparasite; (2) treatment of the rnycoparasite spores with various sugars revealed that arabinose, glucose and N-acetylglucosamine inhibited the agglutination and attachment activity of the glycoproteins, however, the relative percentage of appressorium formation was not affected by the above sugars; (3) the two glycoproteins are relatively stable with respect to their agglutinin and receptor functions. The present results suggest that the agglutination and attachment may be mediated directly by certain sugars present at the host and mycoparasite cell surfaces while the appressorlum formation may be the response of complementary combinations of both sugar and protein, the two parts of the glycoproteins at the interacting surfaces of two fungi.
Resumo:
Failed and fragile states that result from intrastate war pose severe threats to the security of both the international system and individual states alike. In the post-Cold War era, the international community has come to recognize the reality of these threats and the difficulty involved in ending violence and building sustainable peace in failed and fragile states. This work focuses upon the development of a comprehensive strategy for sustainable peace-building by incorporating the tenets of the human security doctrine into the peace-building process. Through the use of case studies of The Former Yugoslav Republic of Macedonia and East Timor, the development and refinement of the doctrine of human security will occur, as well as, an understanding of how and where human security fits into the sustainable peace-building equation. The end result of the analysis is the development of a hierarchical pyramid formation that brings together human security and peace-building into one framework that ultimately creates the foundation and structure of sustainable peace-building. With the development of a sustainable peace-building structure based upon the human security doctrine, the role of Canada in the support of sustainable peace-building is analyzed in relation to the form and level of involvement that Canada undertakes and contributes to in the implementation and support of sustainable peace-building initiatives. Following from this, recommendations are provided regarding what role(s) Canada should undertake in the sustainable peace-building process that take into consideration the present and likely future capabilities of Canada to be involved in various aspects of the peace-building process. ii This paper outlines the need for a peace-building strategy that is designed to be sustainable in order that failed and fragile states resulting from intrastate conflict do not regress or collapse back into a condition of civil war, and subsequently designs such a strategy. The linking of peace-building and human security creates the required framework from which sustainable peace-building is derived. Creating sustainable peace is necessary in order to increase the likelihood that both present and future generations existing in failed and fragile states will be spared from the scourge of intrastate war.
Resumo:
The purpose of this study was to replicate and extend a motivational model of problem drinking (Cooper, Frone, Russel, & Mudar, 1995; Read, Wood, Kahler, Maddock & Tibor, 2003), testing the notion that attachment is a common antecedent for both the affective and social paths to problem drinking. The model was tested with data from three samples, first-year university students (N=679), students about to graduate from university (N=206), and first-time clients at an addiction treatment facility (N=21 1). Participants completed a battery of questionnaires assessing alcohol use, alcohol-related consequences, drinking motives, peer models of alcohol use, positive and negative affect, attachment anxiety and attachment avoidance. Results underscored the importance of the affective path to problem drinking, while putting the social path to problem drinking into question. While drinking to cope was most prominent among the clinical sample, coping motives served as a risk factor for problem drinking for both individuals identified as problem drinkers and university students. Moreover, drinking for enhancement purposes appeared to be the strongest overall predictor of alcohol use. Results of the present study also supported the notion that attachment anxiety and avoidance are antecedents for the affective path to problem drinking, such that those with higher levels of attachment anxiety and avoidance were more vulnerable to experiencing adverse consequences related to their drinking, explained in terms of diminished affect regulation. Evidence that nonsecure attachment is a potent predictor of problem drinking was also demonstrated by the finding that attachment anxiety was directly related to alcohol-related consequences over and above its indirect relationship through affect regulation. However, results failed to show that attachment anxiety or attachment avoidance increased the risk of problem drinking via social influence.
Resumo:
Please consult the paper edition of this thesis to read. It is available on the 5th Floor of the Library at Call Number: Z 9999 P65 D53 2007
Resumo:
While service-learning is often said to be beneficial for all those involved—students, community members, higher education institutions, and faculty members—there are relatively few studies of the attraction to, and effect of, service-learning on faculty members. Existing studies have tended to use a survey design, and to be based in the United States. There is a lack of information on faculty experiences with service-learning in Ontario or Canada. This qualitative case study of faculty experiences with service-learning was framed through an Appreciative Inquiry social constructionist approach. The data were drawn from interviews with 18 faculty members who belong to a Food Security Research Network (FSRN) at a university in northern Ontario, reports submitted by the network, and personal observation of a selection of network-related events. This dissertation study revealed how involvement with service-learning created opportunities for faculty learning and growth. The focus on food security and a commitment to the sustainability of local food production was found to be an ongoing attraction to service-learning and a means to engage in and integrate research and teaching on matters of personal and professional importance to these faculty members. The dissertation concludes with a discussion of the FSRN’s model and the perceived value of a themed, transdisciplinary approach to service-learning. This study highlights promising practices for involving faculty in service-learning and, in keeping with an Appreciative Inquiry approach, depicts a view of faculty work at its best.
Resumo:
Printed blank of Statement of Security Form naming the bond as Jones County Texas Bonds for the purpose of building a courthouse. It is made out to S.D. Woodruff and dated June 12, 1885. An envelope addressed to Mr. S.D. Woodruff is also included. The postmarks are Kansas, 1885 and St. Catharines, June 13, 1885.
Resumo:
This thesis takes liberation to be supreme knowledge of the unity underlying the world of multiplicity. This knowledge is always already attained, so all are eternally liberated, but it is unrecognized in ordinary experience. We will look at the Bhagavad-Gītā to consider why this is so. When Arjuna saw Kṛṣṇa’s imperishable Self, he saw all beings standing as one in Kṛṣṇa; thus, he was confronted by supreme knowledge. But he was overwhelmed with fear and confusion and took refuge in blindness. I argue that Arjuna was not prepared to face recognition because he was unpractised in non-attachment. Attached to his subjectivity, he trembled in the face of unity. The supreme goal is standing firm in recognition while living in the world.
Resumo:
International human rights law, international humanitarian law, international refugee law and international criminal law: each chapter of this corpus stands as a fundamental defense against assaults on our common humanity… The very power of these rules lies in the fact that they protect even the most vulnerable, and bind even the most powerful. No one stands so high as to be above the reach of their authority. No one falls so low as to be below the guard of their protection. Sergio Vieira de Mello, United Nations General Assembly, November 2002.