834 resultados para security, usability, identity management, authentication, authorization
Resumo:
Knowledge-Based Management Systems enable new ways to process and analyse knowledge to gain better insights to solve a problem and aid in decision making. In the police force such systems provide a solution for enhancing operations and improving client administration in terms of knowledge management. The main objectives of every police officer is to ensure the security of life and property, promote lawfulness, and avert and distinguish wrongdoing. The administration of knowledge and information is an essential part of policing, and the police ought to be proactive in directing both explicit and implicit knowledge, whilst adding to their abilities in knowledge sharing. In this paper the potential for a knowledge based system for the Mauritius police was analysed, and recommendations were also made, based on requirements captured from interviews with several long standing officers, and surveying of previous works in the area.
Resumo:
The rise in population growth, as well as nutrient mining, has contributed to low agricultural productivity in Sub-Saharan Africa (SSA). A plethora of technologies to boost agricultural production have been developed but the dissemination of these agricultural innovations and subsequent uptake by smallholder farmers has remained a challenge. Scientists and philanthropists have adopted the Integrated Soil Fertility Management (ISFM) paradigm as a means to promote sustainable intensification of African farming systems. This comparative study aimed: 1) To assess the efficacy of Agricultural Knowledge and Innovation Systems (AKIS) in East (Kenya) and West (Ghana) Africa in the communication and dissemination of ISFM (Study I); 2) To investigate how specifically soil quality, and more broadly socio-economic status and institutional factors, influence farmer adoption of ISFM (Study II); and 3) To assess the effect of ISFM on maize yield and total household income of smallholder farmers (Study III). To address these aims, a mixed methodology approach was employed for study I. AKIS actors were subjected to social network analysis methods and in-depth interviews. Structured questionnaires were administered to 285 farming households in Tamale and 300 households in Kakamega selected using a stratified random sampling approach. There was a positive relationship between complete ISFM awareness among farmers and weak knowledge ties to both formal and informal actors at both research locations. The Kakamega AKIS revealed a relationship between complete ISFM awareness among farmers and them having strong knowledge ties to formal actors implying that further integration of formal actors with farmers’ local knowledge is crucial for the agricultural development progress. The structured questionnaire was also utilized to answer the query pertaining to study II. Soil samples (0-20 cm depth) were drawn from 322 (Tamale, Ghana) and 459 (Kakamega, Kenya) maize plots and analysed non-destructively for various soil fertility indicators. Ordinal regression modeling was applied to assess the cumulative adoption of ISFM. According to model estimates, soil carbon seemed to preclude farmers from intensifying input use in Tamale, whereas in Kakamega it spurred complete adoption. This varied response by farmers to soil quality conditions is multifaceted. From the Tamale perspective, it is consistent with farmers’ tendency to judiciously allocate scarce resources. Viewed from the Kakamega perspective, it points to a need for farmers here to intensify agricultural production in order to foster food security. In Kakamega, farmers with more acidic soils were more likely to adopt ISFM. Other household and farm-level factors necessary for ISFM adoption included off-farm income, livestock ownership, farmer associations, and market inter-linkages. Finally, in study III a counterfactual model was used to calculate the difference in outcomes (yield and household income) of the treatment (ISFM adoption) in order to estimate causal effects of ISFM adoption. Adoption of ISFM contributed to a yield increase of 16% in both Tamale and Kakamega. The innovation affected total household income only in Tamale, where ISFM adopters had an income gain of 20%. This may be attributable to the different policy contexts under which the two sets of farmers operate. The main recommendations underscored the need to: (1) improve the functioning of AKIS, (2) enhance farmer access to hybrid maize seed and credit, (3) and conduct additional multi-locational studies as farmers operate under varying contexts.
Resumo:
Introduction to Animal GRIN; Navigating the Database; Setting Up the Database (Super Users); Create Taxonomy Structure; Set Up Location Structure; Form Descriptions (All Users); Form Descriptions (Super Users); Entering Shipments; E-R Diagram for Incoming Orders; Entering Requests; Reports.
Resumo:
Historical evidence shows that chemical, process, and Oil&Gas facilities where dangerous substances are stored or handled are target of deliberate malicious attacks (security attacks) aiming at interfering with normal operations. Physical attacks and cyber-attacks may generate events with consequences on people, property, and the surrounding environment that are comparable to those of major accidents caused by safety-related causes. The security aspects of these facilities are commonly addressed using Security Vulnerability/Risk Assessment (SVA/SRA) methodologies. Most of these methodologies are semi-quantitative and non-systematic approaches that strongly rely on expert judgment, leading to security assessments that are not reproducible. Moreover, they do not consider the synergies with the safety domain. The present 3-year research is aimed at filling the gap outlined by providing knowledge on security attacks, as well as rigorous and systematic methods supporting existing SVA/SRA studies suitable for the chemical, process, and Oil&Gas industry. The different nature of cyber and physical attacks resulted in the development of different methods for the two domains. The first part of the research was devoted to the development and statistical analysis of security databases that allowed to develop new knowledge and lessons learnt on security threats. Based on the obtained background, a Bow-Tie based procedure and two reverse-HazOp based methodologies were developed as hazard identification approaches for physical and cyber threats respectively. To support the quantitative estimation of the security risk, a quantitative procedure based on the Bayesian Network was developed allowing to calculate the probability of success of physical security attacks. All the developed methods have been applied to case studies addressing chemical, process and Oil&Gas facilities (offshore and onshore) proving the quality of the results that can be achieved in improving site security. Furthermore, the outcomes achieved allow to step forward in developing synergies and promoting integration among safety and security management.
Resumo:
The thesis aims to present a comprehensive and holistic overview on cybersecurity and privacy & data protection aspects related to IoT resource-constrained devices. Chapter 1 introduces the current technical landscape by providing a working definition and architecture taxonomy of ‘Internet of Things’ and ‘resource-constrained devices’, coupled with a threat landscape where each specific attack is linked to a layer of the taxonomy. Chapter 2 lays down the theoretical foundations for an interdisciplinary approach and a unified, holistic vision of cybersecurity, safety and privacy justified by the ‘IoT revolution’ through the so-called infraethical perspective. Chapter 3 investigates whether and to what extent the fast-evolving European cybersecurity regulatory framework addresses the security challenges brought about by the IoT by allocating legal responsibilities to the right parties. Chapters 4 and 5 focus, on the other hand, on ‘privacy’ understood by proxy as to include EU data protection. In particular, Chapter 4 addresses three legal challenges brought about by the ubiquitous IoT data and metadata processing to EU privacy and data protection legal frameworks i.e., the ePrivacy Directive and the GDPR. Chapter 5 casts light on the risk management tool enshrined in EU data protection law, that is, Data Protection Impact Assessment (DPIA) and proposes an original DPIA methodology for connected devices, building on the CNIL (French data protection authority) model.
Resumo:
In modern society, security issues of IT Systems are intertwined with interdisciplinary aspects, from social life to sustainability, and threats endanger many aspects of every- one’s daily life. To address the problem, it’s important that the systems that we use guarantee a certain degree of security, but to achieve this, it is necessary to be able to give a measure to the amount of security. Measuring security is not an easy task, but many initiatives, including European regulations, want to make this possible. One method of measuring security is based on the use of security metrics: those are a way of assessing, from various aspects, vulnera- bilities, methods of defense, risks and impacts of successful attacks then also efficacy of reactions, giving precise results using mathematical and statistical techniques. I have done literature research to provide an overview on the meaning, the effects, the problems, the applications and the overall current situation over security metrics, with particular emphasis in giving practical examples. This thesis starts with a summary of the state of the art in the field of security met- rics and application examples to outline the gaps in current literature, the difficulties found in the change of application context, to then advance research questions aimed at fostering the discussion towards the definition of a more complete and applicable view of the subject. Finally, it stresses the lack of security metrics that consider interdisciplinary aspects, giving some potential starting point to develop security metrics that cover all as- pects involved, taking the field to a new level of formal soundness and practical usability.
Resumo:
Group work allows participants to pool their thoughts and examine difficulties from several angles. In these settings, it is possible to attempt things that an individual could not achieve, combining a variety of abilities and knowledge to tackle more complicated and large-scale challenges. That’s why nowadays collaborative work is becoming more and more widespread to solve complex innovation dilemmas. Since innovation isn’t a tangible thing, most innovation teams used to take decisions based on performance KPIs such as forecasted engagement, projected profitability, investments required, cultural impacts etc. Have you ever wondered the reason why sometimes innovation group processes come out with decisions which are not the optimal meeting point of all the KPIs? Has this decision been influenced by other factors? Some researchers account part of this phenomenon to the emotions in group-based interaction between participants. I will develop a literature review that is split into three parts: first, I will consider some emotions theories from an individual perspective; secondly, a wider view of collective interactions theories will be provided; lastly, I will supply some recent collective interaction empirical studies. After the theoretical and empirical gaps have been tackled, the study will additionally move forward with a methodological point of view, about the Circumplex Model, which is the model I used to evaluate emotions in my research. This model has been applied to SUGAR project, which is the biggest design thinking academy worldwide.
Resumo:
In this paper, a joint location-inventory model is proposed that simultaneously optimises strategic supply chain design decisions such as facility location and customer allocation to facilities, and tactical-operational inventory management and production scheduling decisions. All this is analysed in a context of demand uncertainty and supply uncertainty. While demand uncertainty stems from potential fluctuations in customer demands over time, supply-side uncertainty is associated with the risk of “disruption” to which facilities may be subject. The latter is caused by external factors such as natural disasters, strikes, changes of ownership and information technology security incidents. The proposed model is formulated as a non-linear mixed integer programming problem to minimise the expected total cost, which includes four basic cost items: the fixed cost of locating facilities at candidate sites, the cost of transport from facilities to customers, the cost of working inventory, and the cost of safety stock. Next, since the optimisation problem is very complex and the number of evaluable instances is very low, a "matheuristic" solution is presented. This approach has a twofold objective: on the one hand, it considers a larger number of facilities and customers within the network in order to reproduce a supply chain configuration that more closely reflects a real-world context; on the other hand, it serves to generate a starting solution and perform a series of iterations to try to improve it. Thanks to this algorithm, it was possible to obtain a solution characterised by a lower total system cost than that observed for the initial solution. The study concludes with some reflections and the description of possible future insights.
Resumo:
This article analyzes the historical, social and cognitive dimensions of the sociology of medicine in the construction of its identity, from Wolf Lepenies' perspective. It is understood that the construction of an identity does not end with the first historical manifestations, but is consolidated when it is institutionalized and structured as a field of knowledge by creating its own forms of cognitive expression. The text is divided into three parts: in the first the precursors are presented, highlighting the role played by some travelers, naturalists and folklore scholars, followed by social physicians-scientists and the first social scientists (1940-1969). In the second part, aspects of the consolidation of the social sciences in health are presented at two significant moments, namely the 1970s and 1980s. In the third part, the issues raised by the field are addressed in general terms. It is considered that once the main structural stages are in place there is still a need for the formation of new generations of social scientists in health. It is also essential to disseminate scientific production and to ensure that the relations are studied in depth and institutionalized with the sociological matrices on the one hand and with the field of health on the other.
Resumo:
In Brazil, malaria remains a disease of major epidemiological importance because of the high number of cases in the Amazonian Region. Plasmodium spp infections during pregnancy are a significant public health problem with substantial risks for the pregnant woman, the foetus and the newborn child. In Brazil, the control of malaria during pregnancy is primarily achieved by prompt and effective treatment of the acute episodes. Thus, to assure rapid diagnosis and treatment for pregnant women with malaria, one of the recommended strategy for low transmission areas by World Health Organization and as part of a strategy by the Ministry of Health, the National Malaria Control Program has focused on integrative measures with woman and reproductive health. Here, we discuss the approach for the prevention and management of malaria during pregnancy in Brazil over the last 10 years (2003-2012) using morbidity data from Malaria Health Information System. Improving the efficiency and quality of healthcare and education and the consolidation of prevention programmes will be challenges in the control of malaria during pregnancy in the next decade.
Resumo:
Thoracic injuries in general are of great importance due to their high incidence and high mortality. Thoracic impalement injuries are rare but severe due to the combination of cause, effect and result. This study's primary objective is to report the case of a young man who was impaled by a two-wheeled horse carriage shaft while crashing his motorcycle in a rural zone. An EMT-B ferry was called at the crash scene and a conscious patient was found, sustaining a severe impalement injury to the left hemithorax, suspended over the floor by the axial skeleton with the carriage shaft coming across his left chest. As a secondary objective, a literature review of thoracic impalement injuries is performed. Cases of thoracic impalement injury require unique and individualized care based on injury severity and affected organs. Reported protocols for managing impalement injuries are entirely anecdotal, with no uniformity on impaled patient's approach and management. In penetrating trauma, it is essential not to remove the impaled object, so that possible vascular lesions remain buffered by the object, avoiding major bleeding and exsanguination haemorrhage. Severed impaled thoracic patients should be transferred to a specialist centre for trauma care, as these lesions typically require complex multidisciplinary treatment. High-energy thoracic impalement injuries are rare and hold a high mortality rate, due to the complexity of trauma and associated injuries such as thoracic wall and lung lesions. Modern medicine still seems limited in cases of such seriousness, not always with satisfactory results.
Resumo:
To describe the clinical history of a child with aggressive behavior and recurring death-theme speech, and report the experience of the team of authors, who proposed an alternative to medication through the establishment of a protection network and the inter-sector implementation of the circle of security concept. A 5-year-old child has a violent and aggressive behavior at the day-care. The child was diagnosed by the healthcare center with depressive disorder and behavioral disorder, and was medicated with sertraline and risperidone. Side effects were observed, and the medications were discontinued. Despite several actions, such as talks, teamwork, psychological and psychiatric follow-up, the child's behavior remained unchanged. A unique therapeutic project was developed by Universidade Estadual de Campinas' Medical School students in order to establish a connection between the entities responsible for the child's care (daycare center, healthcare center, and family). Thus, the team was able to develop a basic care protection network. The implementation of the inter-sector circle of security, as well as the communication and cooperation among the teams, produced very favorable results in this case. This initiative was shown to be a feasible and effective alternative to the use of medication for this child.
Resumo:
12 Suppl 1
Resumo:
To develop recommendations for the diagnosis, management and treatment of lupus nephritis in Brazil. Extensive literature review with a selection of papers based on the strength of scientific evidence and opinion of the Commission on Systemic Lupus Erythematosus members, Brazilian Society of Rheumatology. 1) Renal biopsy should be performed whenever possible and if this procedure is indicated; and, when the procedure is not possible, the treatment should be guided with the inference of histologic class. 2) Ideally, measures and precautions should be implemented before starting treatment, with emphasis on attention to the risk of infection. 3) Risks and benefits of treatment should be shared with the patient and his/her family. 4) The use of hydroxychloroquine (preferably) or chloroquine diphosphate is recommended for all patients (unless contraindicated) during induction and maintenance phases. 5) The evaluation of the effectiveness of treatment should be made with objective criteria of response (complete remission/partial remission/refractoriness). 6) ACE inhibitors and/or ARBs are recommended as antiproteinuric agents for all patients (unless contraindicated). 7) The identification of clinical and/or laboratory signs suggestive of proliferative or membranous glomerulonephritis should indicate an immediate implementation of specific therapy, including steroids and an immunosuppressive agent, even though histological confirmation is not possible. 8) Immunosuppressives must be used during at least 36 months, but these medications can be kept for longer periods. Its discontinuation should only be done when the patient achieve and maintain a sustained and complete remission. 9) Lupus nephritis should be considered as refractory when a full or partial remission is not achieved after 12 months of an appropriate treatment, when a new renal biopsy should be considered to assist in identifying the cause of refractoriness and in the therapeutic decision.
Resumo:
Lingual thyroid gland is a rare clinical entity. The presence of an ectopic thyroid gland located at the base of the tongue may be presented with symptoms like dysphagia, dysphonia, and upper airway obstruction. We are introducing a case of an 8-year-old girl who had lingual thyroid that presented dysphagia and foreign body sensation in the throat. The diagnostic was reached with clinical examination, thyroid scintigraphy with Tc(99m) and ultrasound. A laryngoscopy was performed which confirmed a spherical mass at base of tongue. Investigation should include thyroid function tests. In this case we observed subclinical hypothyroidism. There are different types of surgical approaches for the treatment of this condition; however, the treatment with Levothyroxine Sodium allowed the stabilization of TSH levels and clinical improvement of symptoms in a follow-up of 2 years.