866 resultados para (In)security feelings
Resumo:
Historical evidence shows that chemical, process, and Oil&Gas facilities where dangerous substances are stored or handled are target of deliberate malicious attacks (security attacks) aiming at interfering with normal operations. Physical attacks and cyber-attacks may generate events with consequences on people, property, and the surrounding environment that are comparable to those of major accidents caused by safety-related causes. The security aspects of these facilities are commonly addressed using Security Vulnerability/Risk Assessment (SVA/SRA) methodologies. Most of these methodologies are semi-quantitative and non-systematic approaches that strongly rely on expert judgment, leading to security assessments that are not reproducible. Moreover, they do not consider the synergies with the safety domain. The present 3-year research is aimed at filling the gap outlined by providing knowledge on security attacks, as well as rigorous and systematic methods supporting existing SVA/SRA studies suitable for the chemical, process, and Oil&Gas industry. The different nature of cyber and physical attacks resulted in the development of different methods for the two domains. The first part of the research was devoted to the development and statistical analysis of security databases that allowed to develop new knowledge and lessons learnt on security threats. Based on the obtained background, a Bow-Tie based procedure and two reverse-HazOp based methodologies were developed as hazard identification approaches for physical and cyber threats respectively. To support the quantitative estimation of the security risk, a quantitative procedure based on the Bayesian Network was developed allowing to calculate the probability of success of physical security attacks. All the developed methods have been applied to case studies addressing chemical, process and Oil&Gas facilities (offshore and onshore) proving the quality of the results that can be achieved in improving site security. Furthermore, the outcomes achieved allow to step forward in developing synergies and promoting integration among safety and security management.
Resumo:
Recent technological advancements have played a key role in seamlessly integrating cloud, edge, and Internet of Things (IoT) technologies, giving rise to the Cloud-to-Thing Continuum paradigm. This cloud model connects many heterogeneous resources that generate a large amount of data and collaborate to deliver next-generation services. While it has the potential to reshape several application domains, the number of connected entities remarkably broadens the security attack surface. One of the main problems is the lack of security measures to adapt to the dynamic and evolving conditions of the Cloud-To-Thing Continuum. To address this challenge, this dissertation proposes novel adaptable security mechanisms. Adaptable security is the capability of security controls, systems, and protocols to dynamically adjust to changing conditions and scenarios. However, since the design and development of novel security mechanisms can be explored from different perspectives and levels, we place our attention on threat modeling and access control. The contributions of the thesis can be summarized as follows. First, we introduce a model-based methodology that secures the design of edge and cyber-physical systems. This solution identifies threats, security controls, and moving target defense techniques based on system features. Then, we focus on access control management. Since access control policies are subject to modifications, we evaluate how they can be efficiently shared among distributed areas, highlighting the effectiveness of distributed ledger technologies. Furthermore, we propose a risk-based authorization middleware, adjusting permissions based on real-time data, and a federated learning framework that enhances trustworthiness by weighting each client's contributions according to the quality of their partial models. Finally, since authorization revocation is another critical concern, we present an efficient revocation scheme for verifiable credentials in IoT networks, featuring decentralization, demanding minimum storage and computing capabilities. All the mechanisms have been evaluated in different conditions, proving their adaptability to the Cloud-to-Thing Continuum landscape.
Resumo:
Embedded systems are increasingly integral to daily life, improving and facilitating the efficiency of modern Cyber-Physical Systems which provide access to sensor data, and actuators. As modern architectures become increasingly complex and heterogeneous, their optimization becomes a challenging task. Additionally, ensuring platform security is important to avoid harm to individuals and assets. This study primarily addresses challenges in contemporary Embedded Systems, focusing on platform optimization and security enforcement. The initial section of this study delves into the application of machine learning methods to efficiently determine the optimal number of cores for a parallel RISC-V cluster to minimize energy consumption using static source code analysis. Results demonstrate that automated platform configuration is not only viable but also that there is a moderate performance trade-off when relying solely on static features. The second part focuses on addressing the problem of heterogeneous device mapping, which involves assigning tasks to the most suitable computational device in a heterogeneous platform for optimal runtime. The contribution of this section lies in the introduction of novel pre-processing techniques, along with a training framework called Siamese Networks, that enhances the classification performance of DeepLLVM, an advanced approach for task mapping. Importantly, these proposed approaches are independent from the specific deep-learning model used. Finally, this research work focuses on addressing issues concerning the binary exploitation of software running in modern Embedded Systems. It proposes an architecture to implement Control-Flow Integrity in embedded platforms with a Root-of-Trust, aiming to enhance security guarantees with limited hardware modifications. The approach involves enhancing the architecture of a modern RISC-V platform for autonomous vehicles by implementing a side-channel communication mechanism that relays control-flow changes executed by the process running on the host core to the Root-of-Trust. This approach has limited impact on performance and it is effective in enhancing the security of embedded platforms.
Resumo:
To describe the clinical history of a child with aggressive behavior and recurring death-theme speech, and report the experience of the team of authors, who proposed an alternative to medication through the establishment of a protection network and the inter-sector implementation of the circle of security concept. A 5-year-old child has a violent and aggressive behavior at the day-care. The child was diagnosed by the healthcare center with depressive disorder and behavioral disorder, and was medicated with sertraline and risperidone. Side effects were observed, and the medications were discontinued. Despite several actions, such as talks, teamwork, psychological and psychiatric follow-up, the child's behavior remained unchanged. A unique therapeutic project was developed by Universidade Estadual de Campinas' Medical School students in order to establish a connection between the entities responsible for the child's care (daycare center, healthcare center, and family). Thus, the team was able to develop a basic care protection network. The implementation of the inter-sector circle of security, as well as the communication and cooperation among the teams, produced very favorable results in this case. This initiative was shown to be a feasible and effective alternative to the use of medication for this child.
Resumo:
OBJECTIVE: To compare the emotional response and level of anxiety of psychopathic murderers, non-psychopathic murderers, and nonpsychopathic non-criminals. METHOD: 110 male individuals aged over 18 years were divided into three groups: psychopathic murderers (n = 38); non-psychopathic murderers (n = 37) serving sentences for murder convictions in Maximum Security Prisons in the State of Sao Paulo; and non-criminal, non-psychopathic individuals (n = 35) according to the Psychopathy Checklist-Revised. The emotional response of subjects was assessed by heart rate variation and anxiety level (State-Trait Anxiety Inventory) after viewing standardized pictures depicting pleasant, unpleasant and neutral content from the International Affective Picture System. RESULTS: Psychopathic murderers presented lower anxiety levels and smaller heart rate variations when exposed to pleasant and unpleasant stimuli than nonpsychopathic murderers or non-psychopathic non-criminals. The results also demonstrated that the higher the score for factor 1 on the Psychopathy Checklist-Revised, the lower the heart rate variation and anxiety level. CONCLUSION: The results suggest that psychopathic murderers do not present variation in emotional response to different visual stimuli. Although the non-psychopathic murderers had committed the same type of crime as the psychopathic murderers, the former tended to respond with a higher level of anxiety and heart rate variation.
Resumo:
Com o objetivo de comparar a satisfação das mulheres com a experiência do parto em três modelos assistenciais, foi realizada pesquisa descritiva, com abordagem quantitativa, em dois hospitais públicos de São Paulo, um promovendo o modelo "Típico" e o outro com um centro de parto intra-hospitalar (modelo "CPNIH") e um peri-hospitalar (modelo "CPNPH"). A amostra foi constituída por 90 puérperas, 30 de cada modelo. A comparação entre os resultados referentes à satisfação das mulheres com o atendimento prestado pelos profissionais de saúde, com a qualidade da assistência e os motivos de satisfação e insatisfação, com a indicação ou recomendação dos serviços recebidos, com a sensação de segurança no processo e com as sugestões de melhorias, mostrou que o modelo CPHPH foi o melhor avaliado, vindo em seguida o CPNIH e por último o Típico. Conclui-se que o modelo peri-hospitalar de assistência ao parto deveria receber maior apoio do SUS, por se constituir em serviço em que as mulheres se mostram satisfeitas com a atenção recebida
Resumo:
Background: Acid soils comprise up to 50% of the world's arable lands and in these areas aluminum (Al) toxicity impairs root growth, strongly limiting crop yield. Food security is thereby compromised in many developing countries located in tropical and subtropical regions worldwide. In sorghum, SbMATE, an Al-activated citrate transporter, underlies the Alt(SB) locus on chromosome 3 and confers Al tolerance via Al-activated root citrate release. Methodology: Population structure was studied in 254 sorghum accessions representative of the diversity present in cultivated sorghums. Al tolerance was assessed as the degree of root growth inhibition in nutrient solution containing Al. A genetic analysis based on markers flanking Alt(SB) and SbMATE expression was undertaken to assess a possible role for Alt(SB) in Al tolerant accessions. In addition, the mode of gene action was estimated concerning the Al tolerance trait. Comparisons between models that include population structure were applied to assess the importance of each subpopulation to Al tolerance. Conclusion/Significance: Six subpopulations were revealed featuring specific racial and geographic origins. Al tolerance was found to be rather rare and present primarily in guinea and to lesser extent in caudatum subpopulations. Alt(SB) was found to play a role in Al tolerance in most of the Al tolerant accessions. A striking variation was observed in the mode of gene action for the Al tolerance trait, which ranged from almost complete recessivity to near complete dominance, with a higher frequency of partially recessive sources of Al tolerance. A possible interpretation of our results concerning the origin and evolution of Al tolerance in cultivated sorghum is discussed. This study demonstrates the importance of deeply exploring the crop diversity reservoir both for a comprehensive view of the dynamics underlying the distribution and function of Al tolerance genes and to design efficient molecular breeding strategies aimed at enhancing Al tolerance.
Resumo:
Certain areas of the city of Sao Paulo, as many others around the world, including in Lisbon, Barcelona and Buenos Aires, have been going through a process of requalification, in special the ones commonly known as old and/or traditional city. Regarding Sao Paulo, some exceptional actions have been taken downtown with investments in rehabilitation/requalification of areas that concentrated the historical, urbanistic and cultural heritages, such as Praca da S and its cathedral, as well as the revaluation/rehabilitation projects of other squares like Praca da Republica, other areas as the previously called Cracolandia (due to high consumption/deal of crack), known today as Nova Luz, besides propositions to reevaluate areas already modified, such as Vale do Anhangabau. In all propositions to modify sites, it is firstly underlined its deterioration, litter and the presence of low-income populations (passer-bys, street vendors or residents), generally stigmatized as ""potential suspects"", emphasizing danger and lack of security in those places. This belief, which has become consensual, results in that: public as well as private companies promote the rehabilitation of the areas basing their reasoning in the necessity of adding value to the existing urban heritage, although, as it will be discussed in this paper, part of this heritage might be destroyed in this very process, under the allegation that upon completion, the action would allow the social, cultural and economical revaluation/requalification of the area. This paper is intended to provide a contribution to this discussion.
Resumo:
Various molecular systems are available for epidemiological, genetic, evolutionary, taxonomic and systematic studies of innumerable fungal infections, especially those caused by the opportunistic pathogen C. albicans. A total of 75 independent oral isolates were selected in order to compare Multilocus Enzyme Electrophoresis (MLEE), Electrophoretic Karyotyping (EK) and Microsatellite Markers (Simple Sequence Repeats - SSRs), in their abilities to differentiate and group C. albicans isolates (discriminatory power), and also, to evaluate the concordance and similarity of the groups of strains determined by cluster analysis for each fingerprinting method. Isoenzyme typing was performed using eleven enzyme systems: Adh, Sdh, M1p, Mdh, Idh, Gdh, G6pdh, Asd, Cat, Po, and Lap (data previously published). The EK method consisted of chromosomal DNA separation by pulsed-field gel electrophoresis using a CHEF system. The microsatellite markers were investigated by PCR using three polymorphic loci: EF3, CDC3, and HIS3. Dendrograms were generated by the SAHN method and UPGMA algorithm based on similarity matrices (S(SM)). The discriminatory power of the three methods was over 95%, however a paired analysis among them showed a parity of 19.7-22.4% in the identification of strains. Weak correlation was also observed among the genetic similarity matrices (S(SM)(MLEE) x S(SM)(EK) x S(SM)(SSRs)). Clustering analyses showed a mean of 9 +/- 12.4 isolates per cluster (3.8 +/- 8 isolates/taxon) for MLEE, 6.2 +/- 4.9 isolates per cluster (4 +/- 4.5 isolates/taxon) for SSRs, and 4.1 +/- 2.3 isolates per cluster (2.6 +/- 2.3 isolates/taxon) for EK. A total of 45 (13%), 39(11.2%), 5 (1.4%) and 3 (0.9%) clusters pairs from 347 showed similarity (Si) of 0.1-10%, 10.1-20%, 20.1-30% and 30.1-40%, respectively. Clinical and molecular epidemiological correlation involving the opportunistic pathogen C. albicans may be attributed dependently of each method of genotyping (i.e., MLEE, EK, and SSRs) supplemented with similarity and grouping analysis. Therefore, the use of genotyping systems that give results which offer minimum disparity, or the combination of the results of these systems, can provide greater security and consistency in the determination of strains and their genetic relationships. (C) 2010 Elsevier B.V. All rights reserved.
Resumo:
Through the assessment of three decades of the Alcohol Program in Brazil, the paper shows that adequate public policies regarding biomass production can deliver direct benefits like energy security improvement, foreign exchange savings, and local employment generation, reduced urban air pollution and avoided CO(2) emissions. Moreover, the paper shows that Brazilian produced ethanol has faced economies of scale, technical progress and productivity gains and is no longer dependent on subsidies to be competitive. The paper also examines the potential in Brazil for fostering other biofuels, namely biodiesel obtained from vegetable oils, as well as their implications on sustainable energy development. (C) 2011 Elsevier Ltd. All rights reserved.
Resumo:
Objectives: Main Objective: to identify ethical problems in primary care according to nurses` and doctors` perceptions. Secondary Objective: to know ethical issues of patient-professional relationships in primary care. Design: Synthesis to integrate and reinterpret primary results of qualitative studies. Setting: Primary healthcare centers, Sao Paulo, SP, Brazil. Participants and/or context: Incidental sample of 34 nurses and 36 medical doctors working in primary healthcare centers selected by convenience. Methods: Individual, semi-structured interviews to identity situations considered as sources of ethical problems. The sample is socially representative of primary care health centers and professionals. Data collection assured discourse saturation. Hermeneutic-dialectical discourse analysis was used to study the results. Results: Patient-professional relationships and team work were the main sources of ethical problems. The most important problems were patient information, privacy, confidentiality, interpersonal relationship, linkage and patient autonomy. These issues reflect the recent changes in clinical relation ships and show the peculiarities of primary care with its continuous care which lasts a long time. Healthcare involves multiprofessional team work in the midst of the patient claims for autonomy. Good care of patients needs requires a relationship based on communication and cooperation, and includes feelings and values, with communication skills. Conclusions: Ethical problems in primary care are common situations. For quality and humane primary care the relationship should consist of dialogue, trust and cooperation. (C) 2009 Elsevier Espana, S.L. All rights reserved.
Resumo:
Objectives: to identify women`s feelings after early contact with their newborn infants in the delivery room, and to identify how health professionals involved in mother and infant care behave in the intrapartum setting. Design: a qualitative approach using semi-structured interviews and observation. Content analysis was used to derive the three themes that emerged from the interviews. Setting and participants: 23 postpartum women and their caregivers in a public maternity hospital in Ribeirao Preto, Brazil. Findings: three thematic categories emerged from the interviews: heightened fear, severe pain and intense conflict. The professionals` actions revealed that they have theoretical and practical abilities for humanisation of care, but their actions are fragmented. Final considerations: women can feel lonely, fearful and conflicted in the delivery room, and they also experience pain. Giving birth is a major event in a woman`s life, so it is important to facilitate a positive experience. Health professionals were found to display interventionist and impersonal attitudes; these influenced the potential choices of women at their first contact with their infant. Implications for practice: the focus of health care needs to extend beyond the institution. This means fewer normative actions performed by health professionals, enabling women to enjoy their early contact with their newborn infants. (C) 2010 Elsevier Ltd. All rights reserved.
Resumo:
Objective: to address the social aspects of pregnancy and the views of pregnant women regarding prenatal assistance in Brazil. Design: this qualitative study was focused on describing the Social Representations of prenatal care held by pregnant women. The discourse of the collective subject (DCS) framework was used to analyse the data collected, within the theoretical background of social representations, as proposed and developed by Serge Moscovici. Participants and setting: 21 pregnant women who were users of the publicly funded Brazilian unified health-care system and resided in the area served by its family health programme in a low- to middle-income neighbourhood on the outskirts of Campo Grande, the capital of the state of Mato Grosso do Sul, in southwestern Brazil. Data were collected by conducting in-depth, face-to-face interviews from January to October 2006. Findings: all participants were married. Formal education of the participants was less than five years in four cases, between five and eight years in six cases, and greater than 11 years in 10 cases. Nine participants had informal jobs and earned up to US$ 200 per month, four paricipants had administrative jobs and earned over US$ 500 per month, and eight participants did not work. No specific racial/ethnic background predominated. Lack of adherence to prenatal care allowed for the identification of two DCS themes: `organisation of prenatal care services` and `lifestyle features`. Key conclusions: the respondents were found to have negative feelings about pregnancy which manifest as many fears, including the fear of harming their children`s health, of being punished during labour, and of being reprimanded by health-care professionals for overlooking their prenatal care, in addition to the insecurity felt towards the infant and self. Implications for practice: the findings reveal that communication between pregnant women and healthcare professionals has been ineffective and that prenatal care has not been effective for the group interviewed-features that are likely to be found among other low- to middle-income groups living elsewhere in Brazil. (C) 2009 Elsevier Ltd. All rights reserved.
Resumo:
The increasing adoption of information systems in healthcare has led to a scenario where patient information security is more and more being regarded as a critical issue. Allowing patient information to be in jeopardy may lead to irreparable damage, physically, morally, and socially to the patient, potentially shaking the credibility of the healthcare institution. Medical images play a crucial role in such context, given their importance in diagnosis, treatment, and research. Therefore, it is vital to take measures in order to prevent tampering and determine their provenance. This demands adoption of security mechanisms to assure information integrity and authenticity. There are a number of works done in this field, based on two major approaches: use of metadata and use of watermarking. However, there still are limitations for both approaches that must be properly addressed. This paper presents a new method using cryptographic means to improve trustworthiness of medical images, providing a stronger link between the image and the information on its integrity and authenticity, without compromising image quality to the end user. Use of Digital Imaging and Communications in Medicine structures is also an advantage for ease of development and deployment.
Resumo:
The starting point of this thesis was a desire to explain the rapid demise in the popularity which the Communist Party enjoyed in Queensland during the second world war. Wartime Queensland gave the Australian Communist Party its highest state vote and six years later Queensland again gave the Communist Party its highest state vote - this time however, to ban the Party. From this I was led into exploring the changing policies, beliefs and strategies of the Party, as well as the many sub-groups on its periphery, and the shifts in public response to these. In 1939 Townsville elected Australia's first Communist alderman. Five years later, Bowen elected not only Australia's first but also the British Empire's first, Communist state government member. Of the five electorates the Australian Communist Party contested in the 1944 Queensland State elections, in none did the Party's candidate receive less than twenty per-cent of the formal vote. Not only was the Party seemingly enjoying considerable popular support but this was occurring in a State which, but for the Depression years (May 1929 - June 1932) had elected a Labor State Government at every state election since 1915. In the September 1951 Constitution Alteration Referendum, 'Powers To Deal With Communists and Communism', Queensland regist¬ered the nation's highest "Yes" majority - 55.76% of the valid vote. Only two other states registered a majority in favour of the referendum's proposals, Western Australia and Tasmania. As this research was undertaken it became evident that while various trends exhibited at the time, anti-Communism, the work of the Industrial Groups, Labor opportunism, local area feelings, ideological shifts of the Party, tactics of Communist-led unions, etc., were present throughout the entire period, they were best seen when divided into three chronological phases of the Party's history and popularity. The first period covers the consolidation of the Party's post-Depression popularity during the war years as it benefited from the Soviet Union's colossal contribution to the Allied war efforts, and this support continued for some six months or so after the war. Throughout the period Communist strength within the trade union movement greatly increased as did total Party membership. The second period was marked by a rapid series of events starting in March 1946, with Winston Churchill's "Official Opening" of the Cold War by his sweeping attack on Communism and Russia, at Fulton. Several days later the first of a series of long and bitter strikes in Communist-led unions occurred, as the Party mobil¬ized for what it believed would be a series of attacks on the working class from a ruling class, defending a capitalist system on the verge of an economic collapse. It was a period when the Party believed this ruling class was using Labor reformism as a last desperate 'carrot' to get workers to accept their lot within a capitalist economic framework. Out of the Meat Strike emerged the Industrial Groups, who waged not only a determined war against Communist trade union leadership but also encouraged the A.W.U.-influenced State Labor apparatus to even greater anti-Communist antagonisms. The Communist Party's increasing militancy and Labor's resistance to it, ended finally in the collapse of the Chifley Labor government. Characteristically the third period opens with the Communist Party making an another about-face, desperately trying to form an alliance with the Labor Party and curbing its former adventurist industrial policy, as it prepared for Menzies' direct assault. The Communist Party's activities were greatly reduced, a function of both a declining member-ship and, furthermore, a membership reluctant to confront an increasingly hostile society. In examining the changing policies, beliefs and strategies of the Party and the shifts in public response to these, I have tried to distinguish between general trends occurring within Australia and the national party, and trends peculiar to Queensland and the Queensland branch of the Party, The Communist Party suffered a decline in support and membership right across Australia throughout this period as a result of the national policies of the Party, and the changing nature of world politics. There were particular features of this decline that were peculiar to Queensland. I have, however, singled out three features of particular importance throughout the period for a short but more specifically detailed analysis, than would be possible in a purely chronological study: i.e. the Party's structure, the Party's ideological subservience to Moscow, and the general effect upon it of the Cold War.