997 resultados para Attachment Security
Resumo:
Les histoires d'attachement à compléter de Bretherton et Ridgeway (1990) constituent un moyen d'évaluer les narratifs d'enfants dès l'âge de 3 ans. Dans le présent article, nous présentons un Q-sort permettant de coder ces productions enfantines. Des scores à 4 dimensions d'attachement (sécurité, désactivation, hyperactivation, désorganisation) peuvent être obtenus grâce à une comparaison des réponses du sujet à celles de prototypes. Par ailleurs, une analyse en composantes principales a permis de définir 6 échelles, correspondant chacune à un aspect spécifique du jeu. Certains aspects des narratifs semblent influencés par le sexe et l'âge de l'enfant, mais non par son QI. Des exemples d'application du Q-sort sont présentés, notamment pour l'étude de la transmission intergénérationnelle des stratégies d'attachement ou pour l'étude de l'implication des représentations et des capacités narratives en matière de psychopathologie. Bretherton and Ridgeway's (1990) attachment story completion task allows for the assessment of child narratives as early as 3 years of age. In the present article, we present a Q-sort for the coding of these child productions. Scores on 4 attachment dimensions (security, deactivation, hyperactivation, disorganization) can be computed by comparing participants' responses to those of each prototype. Following a principal components analysis, 6 scales have been defined, each one corresponding to some specific aspects of child play. Certain aspects of child narratives seem to be influenced by gender and age, but not by IQ. Examples of possible applications of the Q-sort are presented, such as its use in the study of intergenerational transmission of attachment strategies or the study of the role of representations and narrative competence in psychopathology.
Resumo:
Recent efforts to implement gender mainstreaming in the field of security sector reform have resulted in an international policy discourse on gender and security sector reform (GSSR). Critics have challenged GSSR for its focus on 'adding women' and its failure to be transformative. This article contests this assessment, demonstrating that GSSR is not only about 'adding women', but also, importantly, about 'gendering men differently' and has important albeit problematic transformative implications. Drawing on poststructuralist and postcolonial feminist theory, I propose a critical reading of GSSR policy discourse in order to analyse its built-in logics, tensions and implications. I argue that this discourse establishes a powerful 'grid of intelligibility' that draws on gendered and racialized dualisms to normalize certain forms of subjectivity while rendering invisible and marginalizing others, and contributing to reproduce certain forms of normativity and hierarchy. Revealing such processes of discursive in/exclusion and marginalized subjectivities can serve as a starting point to challenge and transform GSSR practice and identify sites of contestation.
Resumo:
Aquest projecte inclou una aproximació als conceptes de RFID i targetes contactless centrant-se en l’ampliament usat MIFARE Classic chip. L’objectiu principal es mostrar el seu funcionament i les seves vulnerabilitats, així com alguns exemples pràctics fent una anàlisi de diferents serveis que les utilitzen.
Resumo:
Gene transfer in eukaryotic cells and organisms suffers from epigenetic effects that result in low or unstable transgene expression and high clonal variability. Use of epigenetic regulators such as matrix attachment regions (MARs) is a promising approach to alleviate such unwanted effects. Dissection of a known MAR allowed the identification of sequence motifs that mediate elevated transgene expression. Bioinformatics analysis implied that these motifs adopt a curved DNA structure that positions nucleosomes and binds specific transcription factors. From these observations, we computed putative MARs from the human genome. Cloning of several predicted MARs indicated that they are much more potent than the previously known element, boosting the expression of recombinant proteins from cultured cells as well as mediating high and sustained expression in mice. Thus we computationally identified potent epigenetic regulators, opening new strategies toward high and stable transgene expression for research, therapeutic production or gene-based therapies.
Resumo:
The global human population is expected to reach ∼9 billion by 2050. Feeding this many people represents a major challenge requiring global crop yield increases of up to 100%. Microbial symbionts of plants such as arbuscular mycorrhizal fungi (AMF) represent a huge, but unrealized resource for improving yields of globally important crops, especially in the tropics. We argue that the application of AMF in agriculture is too simplistic and ignores basic ecological principals. To achieve this challenge, a community and population ecology approach can contribute greatly. First, ecologists could significantly improve our understanding of the determinants of the survival of introduced AMF, the role of adaptability and intraspecific diversity of AMF and whether inoculation has a direct or indirect effect on plant production. Second, we call for extensive metagenomics as well as population genomics studies that are crucial to assess the environmental impact that introduction of non-local AMF may have on native AMF communities and populations. Finally, we plead for an ecologically sound use of AMF in efforts to increase food security at a global scale in a sustainable manner.
Resumo:
Uusien mobiilien laitteiden ja palveluiden kehitys ovat herättäneet yritysten mielenkiinnon soveltaa langattomia sovelluksia omassa liiketoiminnassaan. Erilaisten tekniikoiden myötä myös mahdollisuuksien kirjo on laajentumassa, mikä johtaa erilaisten verkkojen ja laitteiden yhtenäiselle hallinnalle asetettavien vaatimusten kasvuun. Yritysten siirtyessä soveltamaan uusia langattomia palveluita ja sovelluksia on myös huomioon otettavaa sovellusten sekä palveluiden vaatima tietoturva ja sen hallittavuus. Tutkimuksessa esitetään langattoman sähköisen liiketoiminnan määritelmä sekä kyseisien teknologioiden käyttöä edistävät tekijät. Tutkimus luo viitekehyksen yrityksen langattomien teknologioiden käytölle ja siihen olennaisesti vaikuttavista tekijöistä. Viitekehystä on käytetty todelliseen esimerkkiin, liikkuva myyntihenkilö, kyseisten teknologioiden, palveluiden, tietoturvan ja hallittavuuden näkökulmasta. Johtopäätöksinä on arvioitu mobiilien ja langattomien teknologioiden sekä palveluiden, tietoturvan ja hallittavuuden tilaa ja analysoimalla niitä tulevaa ajatellen.
Resumo:
This article envisions the use of context-awareness to improve single sign-on solutions (SSO) for mobile users. The attribute-based SSO is expected to increase users' perceived ease of use of the system and service providers' authentication security of the application. From these two features we derive two value propositions for a new business model for mobile platforms. The business model can be considered as an instantiation of the privacy-friendly business model pattern presented in our previous work, reinforcing our claim that privacy-friendly value propositions are possible and can be used to obtain a competitive advantage.
Resumo:
Elektroninen kaupankäynti ja pankkipalvelut ovat herättäneet toiminnan jatkuvuuden kannalta erittäin kriittisen kysymyksen siitä, kuinka näitä palveluja pystytään suojaamaan järjestäytynyttä rikollisuutta ja erilaisia hyväksikäyttöjä vastaan.
Resumo:
Tutkimuksen tavoitteena oli muodostaa viitekehys sijoittajaviestinnän strategian muodostamiseen ja soveltaa viitekehystä käytännössä. Tutkimusongelma nousi case-yrityksestä, SSH Communications Security Oyj:stä, joka listautui vuoden 2000 lopussa. Teoreettinen viitekehys perustuu aikaisempaan kirjallisuuteen sijoittajaviestinnästä, strategian kehittämisestä ja rahoitusteoriasta. Rahoitusteorian alueet, joita käsiteltiin tutkimuksessa ovat; vapaaehtoinen tiedottaminen, markkinatehokkuus ja agenttiteoria. Tutkimuksen empiirinen osa toteutettiin soveltamalla teoreettista viitekehystä case yritykseen. Empiirisessä osuudessa käytiin läpi seuraavat vaiheet; nykyisen tilan ulkoinen ja sisäinen analyysi, tavoitteiden asettaminen ja sijoittajaviestintä strategia ehdotuksen muodostaminen case yritykseen. Tutkielman viimeinen kappale kokoaa tärkeimmät löydökset, pohtii työn teoreettista kontribuutiota ja liikkeenjohdollisia kytköksiä sekä esittää tutkimuksen herättämiä ehdotuksia jatkotutkimuksille
Resumo:
Multicast is one method to transfer information in IPv4 based communication. Other methods are unicast and broadcast. Multicast is based on the group concept where data is sent from one point to a group of receivers and this remarkably saves bandwidth. Group members express an interest to receive data by using Internet Group Management Protocol and traffic is received by only those receivers who want it. The most common multicast applications are media streaming applications, surveillance applications and data collection applications. There are many data security methods to protect unicast communication that is the most common transfer method in Internet. Popular data security methods are encryption, authentication, access control and firewalls. The characteristics of multicast such as dynamic membership cause that all these data security mechanisms can not be used to protect multicast traffic. Nowadays the protection of multicast traffic is possible via traffic restrictions where traffic is allowed to propagate only to certain areas. One way to implement this is packet filters. Methods tested in this thesis are MVR, IGMP Filtering and access control lists which worked as supposed. These methods restrict the propagation of multicast but are laborious to configure in a large scale. There are also a few manufacturerspecific products that make possible to encrypt multicast traffic. These separate products are expensive and mainly intended to protect video transmissions via satellite. Investigation of multicast security has taken place for several years and the security methods that will be the results of the investigation are getting ready. An IETF working group called MSEC is standardizing these security methods. The target of this working group is to standardize data security protocols for multicast during 2004.
Resumo:
Mobile technologies have brought about major changes in police equipment and police work. If a utopian narrative remains strongly linked to the adoption of new technologies, often formulated as 'magic bullets' to real occupational problems, there are important tensions between their 'imagined' outcomes and the (unexpected) effects that accompany their daily 'practical' use by police officers. This article offers an analysis of police officers' perceptions and interactions with security devices. In so doing, it develops a conceptual typology of strategies for coping with new technology inspired by Le Bourhis and Lascoumes: challenging, neutralizing and diverting. To that purpose, we adopt an ethnographic approach that focuses on the discourses, practices and actions of police officers in relation to three security devices: the mobile digital terminal, the mobile phone and the body camera. Based on a case study of a North American municipal police department, the article addresses how these technological devices are perceived and experienced by police officers on the beat.
Resumo:
An international conference of psychology of religion, organised at the University of Lausanne (Switzerland) on 16 May 2012, took up the theme: "Attachment, psychopathology, and religion". Four speakers were invited: Pehr Granvist, Andrew Gumley, Isabelle Rieben, and Pascal Roman. Their reworked contributions are gathered in this special section of Mental Health, Religion, & Culture. The goal of this special section is to re-examine the whole of this subject of the bond between attachment and religion and/or spirituality in the cases of those persons suffering from mental health disorders.
Resumo:
Many studies on spirituality in psychosis have shown that, compared to a nonclinical population, patients make more use of spiritual beliefs/religious practices to deal with their problems. Our research question was to test whether attachment to spiritual figures could be a good explanation for religious coping strategies in patients with psychosis. First, adult attachment was investigated in 28 patients with chronic psychosis and 18 controls, using the Adult Attachment Interview. Diagnostic evaluations were performed with the Structured Clinical Interview for the Diagnostic and Statistical Manual of Mental Disorders (4th edition, Text Revision) Axis I disorders and symptomatic evaluation with the Brief Psychiatric Rating Scale. Results also show a high prevalence of insecure avoidant attachment in patients, and suggest that a significant part of religious coping might be explained by the theory of attachment (64% of the patients, 78% of controls). The implications of these results are interpreted in light of correspondence and compensation hypotheses.