960 resultados para revised
Resumo:
In the current thesis, the reasons for the differential impact of Holocaust trauma on Holocaust survivors, and the differential intergenerational transmission of this trauma to survivors’ children and grandchildren were explored. A model specifically related to Holocaust trauma and its transmission was developed based on trauma, family systems and attachment theories as well as theoretical and anecdotal conjecture in the Holocaust literature. The Model of the Differential Impact of Holocaust Trauma across Three Generations was tested firstly by extensive meta-analyses of the literature pertaining to the psychological health of Holocaust survivors and their descendants and secondly via analysis of empirical study data. The meta-analyses reported in this thesis represent the first conducted with research pertaining to Holocaust survivors and grandchildren of Holocaust survivors. The meta-analysis of research conducted with children of survivors is the first to include both published and unpublished research. Meta-analytic techniques such as meta-regression and sub-set meta-analyses provided new information regarding the influence of a number of unmeasured demographic variables on the psychological health of Holocaust survivors and descendants. Based on the results of the meta-analyses it was concluded that Holocaust survivors and their children and grandchildren suffer from a statistically significantly higher level or greater severity of psychological symptoms than the general population. However it was also concluded that there is statistically significant variation in psychological health within the Holocaust survivor and descendant populations. Demographic variables which may explain a substantial amount of this variation have been largely under-assessed in the literature and so an empirical study was needed to clarify the role of demographics in determining survivor and descendant mental health. A total of 124 participants took part in the empirical study conducted for this thesis with 27 Holocaust survivors, 69 children of survivors and 28 grandchildren of survivors. A worldwide recruitment process was used to obtain these participants. Among the demographic variables assessed in the empirical study, aspects of the survivors’ Holocaust trauma (namely the exact nature of their Holocaust experiences, the extent of family bereavement and their country of origin) were found to be particularly potent predictors of not only their own psychological health but continue to be strongly influential in determining the psychological health of their descendants. Further highlighting the continuing influence of the Holocaust was the finding that number of Holocaust affected ancestors was the strongest demographic predictor of grandchild of survivor psychological health. Apart from demographic variables, the current thesis considered family environment dimensions which have been hypothesised to play a role in the transmission of the traumatic impact of the Holocaust from survivors to their descendants. Within the empirical study, parent-child attachment was found to be a key determinant in the transmission of Holocaust trauma from survivors to their children and insecure parent-child attachment continues to reverberate through the generations. In addition, survivors’ communication about the Holocaust and their Holocaust experiences to their children was found to be more influential than general communication within the family. Ten case studies (derived from the empirical study data set) are also provided; five Holocaust survivors, three children of survivors and two grandchildren of survivors. These cases add further to the picture of heterogeneity of the survivor and descendant populations in both experiences and adaptations. It is concluded that the legacy of the Holocaust continues to leave its mark on both its direct survivors and their descendants. Even two generations removed, the direct and indirect effects of the Holocaust have yet to be completely nullified. Research with Holocaust survivor families serves to highlight the differential impacts of state-based trauma and the ways in which its effects continue to be felt for generations. The revised and empirically tested Model of the Differential Impact of Holocaust Trauma across Three Generations presented at the conclusion of this thesis represents a further clarification of existing trauma theories as well as the first attempt at determining the relative importance of both cognitive, interpersonal/interfamilial interaction processes and demographic variables in post-trauma psychological health and transmission of traumatic impact.
Resumo:
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.
Resumo:
We report the long term outcome of the flangeless, cemented all polyethylene Exeter cup at a mean of 14.6 years (range 10-17) after operation. Of the 263 hips in 243 patients, 122 hips are still in situ, 112 patients (119 hips) have died, eighteen hips were revised, and three patients (four hips) had moved abroad and were lost to follow-up (1.5%). Radiographs demonstrated two sockets had migrated and six more had radiolucent lines in all three zones. The Kaplan Meier survivorship at 15 years with endpoint revision for all causes is 89.9% (95% CI 84.6 to 95.2%) and for aseptic cup loosening or lysis 91.7% (CI 86.6 to 96.8%). In 210 hips with a diagnosis of primary osteoarthritis survivorship for all causes is 93.2% (95% CI 88.1 to 98.3%), and for aseptic cup loosening 95.0% (CI 90.3 to 99.7%). The cemented all polyethylene Exeter cup has an excellent long-term survivorship.
Resumo:
Grassland management affects soil organic carbon (SOC) storage and can be used to mitigate greenhouse gas emissions. However, for a country to assess emission reductions due to grassland management, there must be an inventory method for estimating the change in SOC storage. The Intergovernmental Panel on Climate Change (IPCC) has developed a simple carbon accounting approach for this purpose, and here we derive new grassland management factors that represent the effect of changing management on carbon storage for this method. Our literature search identified 49 studies dealing with effects of management practices that either degraded or improved conditions relative to nominally managed grasslands. On average, degradation reduced SOC storage to 95% +/- 0.06 and 97% +/- 0.05 of carbon stored under nominal conditions in temperate and tropical regions, respectively. In contrast, improving grasslands with a single management activity enhanced SOC storage by 14% 0.06 and 17% +/- 0.05 in temperate and tropical regions, respectively, and with an additional improvement(s), storage increased by another 11% +/- 0.04. We applied the newly derived factor coefficients to analyze C sequestration potential for managed grasslands in the U.S., and found that over a 20-year period changing management could sequester from 5 to 142 Tg C yr(-1) or 0.1 to 0.9 Mg C ha(-1) yr(-1), depending on the level of change. This analysis provides revised factor coefficients for the IPCC method that can be used to estimate impacts of management; it also provides a methodological framework for countries to derive factor coefficients specific to conditions in their region.
Resumo:
Thoroughly revised and updated, this popular book provides a comprehensive yet easy to read guide to modern contact lens practice. Beautifully re-designed in a clean, contemporary layout, this second edition presents relevant and up-to-date information in a systematic manner, with a logical flow of subject matter from front to back. This book wonderfully captures the ‘middle ground’ in the contact lens field … somewhere between a dense research-based tome and a basic fitting guide. As such, it is ideally suited for both students and general eye care practitioners who require a practical, accessible and uncluttered account of the contact lens field. Contents Part 1 Introduction Historical perspective. The anterior eye Visual optics Clinical instruments Part 2 Soft contact lenses Soft lens materials Soft lens manufacture Soft lens optics Soft lens measurement Soft lens design and fitting Soft toric lens design and fitting Soft lens care systems Part 3 Rigid contact lenses Rigid lens materials Rigid lens manufacture Rigid lens optics Rigid lens measurement Rigid lens design and fitting Rigid toric lens design and fitting Rigid lens care systems Part 4 Lens replacement modalities Unplanned lens replacement Daily soft lens replacement Planned soft lens replacement Planned rigid lens replacement Part 5 Special lenses and fitting considerations Scleral lenses Tinted lenses Presbyopia Continuous wear Sport Keratoconus High ametropia Paediatric fitting Therapeutic applications Post-refractive Surgery Post-keratoplasty Orthokeratology Diabetes Part 6 Patient examination and management History taking Preliminary examination Patient education Aftercare Complications Digital imaging Compliance Practice management Appendices Index
Resumo:
Textual cultural heritage artefacts present two serious problems for the encoder: how to record different or revised versions of the same work, and how to encode conflicting perspectives of the text using markup. Both are forms of textual variation, and can be accurately recorded using a multi-version document, based on a minimally redundant directed graph that cleanly separates variation from content.
Resumo:
The Queensland University of Technology badges itself as “a university for the real world”. For the last decade the Law Faculty has aimed to provide its students with a ‘real world’ degree, that is, a practical law degree. This has seen skills such as research, advocacy and negotiation incorporated into the undergraduate degree under a University Teaching & Learning grant, a project that gained international recognition and praise. In 2007–2008 the Law Faculty undertook another curriculum review of its undergraduate law degree. As a result of the two year review, QUT’s undergraduate lawdegree has fewer core units, a focus on first year student transition, scaffolding of law graduate capabilities throughout the degree,work integrated learning and transition to the workplace. The revised degree commenced implementation in 2009. This paper focuses on the “real world” approach to the degree achieved through the first year programme, embedding and scaffolding law graduate capabilities through authentic and valid assessment and work integrated learning.
Resumo:
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a client to solve some moderately hard problem before being granted access to a resource. However, recent client puzzle difficulty definitions (Stebila and Ustaoglu, 2009; Chen et al., 2009) do not ensure that solving n puzzles is n times harder than solving one puzzle. Motivated by examples of puzzles where this is the case, we present stronger definitions of difficulty for client puzzles that are meaningful in the context of adversaries with more computational power than required to solve a single puzzle. A protocol using strong client puzzles may still not be secure against DoS attacks if the puzzles are not used in a secure manner. We describe a security model for analyzing the DoS resistance of any protocol in the context of client puzzles and give a generic technique for combining any protocol with a strong client puzzle to obtain a DoS-resistant protocol.
Resumo:
Increasingly, large amounts of public and private money are being invested in education and as a result, schools are becoming more accountable to stakeholders for this financial input. In terms of the curriculum, governments worldwide are frequently tying school funding to students‟ and schools‟ academic performances, which are monitored through high-stakes testing programs. To accommodate the resultant pressures from these testing initiatives, many principals are re-focussing their school‟s curriculum on the testing requirements. Such a re-focussing, which was examined critically in this thesis, constituted an externally facilitated rapid approach to curriculum change. In line with previously enacted change theories and recommendations from these, curriculum change in schools has tended to be a fairly slow, considered, collaborative process that is facilitated internally by a deputy-principal (curriculum). However, theoretically based research has shown that such a process has often proved to be difficult and very rarely successful. The present study reports and theorises the experiences of an externally facilitated process that emerged from a practitioner model of change. This case study of the development of the controlled rapid approach to curriculum change began by establishing the reasons three principals initiated curriculum change and why they then engaged an outsider to facilitate the process. It also examined this particular change process from the perspectives of the research participants. The investigation led to the revision of the practitioner model as used in the three schools and challenged the current thinking about the process of school curriculum change. The thesis aims to offer principals and the wider education community an alternative model for consideration when undertaking curriculum change. Finally, the thesis warns that, in the longer term, the application of study‟s revised model (the Controlled Rapid Approach to Curriculum Change [CRACC] Model) may have less then desirable educational consequences.
Resumo:
Up to fifty per cent of individuals with Alcohol use disorders (AUD) also have alexithymia a personality construct hypothesized to be related to attachment difficulties. The relationship between alexithymia, craving, anxious attachment and alcohol-dependence severity was examined in 254 patients participating in a Cognitive-Behavioral Therapy (CBT) program for alcohol-dependence. Participants completed the Toronto Alexithymia Scale (TAS-20), the Obsessive Compulsive Drinking Scale (OCDS), the Revised Adult Attachment Anxiety Subscale (RAAS-Anxiety) and the Alcohol Use Disorder Identification Test (AUDIT). MANOVA indicated that individuals with alexithymia reported significantly higher levels of total OCDS, obsessive thoughts about alcohol, and compulsive drinking urges and behavior, compared to the non-alexithymic group. Regression analyses found that anxious attachment partially mediated the relationship between alexithymia and craving. Anxious attachment may be a potential treatment target to reduce alcohol consumption in those with alcohol-dependence and alexithymia. Research Highlights ► There were significant relationships of alexithymia, craving and anxious attachment. ► Alexithymic alcoholics reported higher levels of craving and alcoholism severity. ► Anxious attachment partially mediated the relationship of alexithymia and craving.
Resumo:
Attachment theory has been conceptualised as an affect regulation theory, proposing that attachment is associated with the expression and recognition of emotions as well as interpersonal functioning. Previous research has reported affect regulation difficulties in substance use disorders and addiction has been considered an attachment disorder. However, scarce empirical research exists on the relationship of attachment in relation to affect regulation and interpersonal functioning in those with substance use problems. Thus, the objective of the present study was to investigate potential associations between attachment, negative mood regulation (NMR) expectancies, fear of intimacy and self-differentiation in substance abusers. The revised adult attachment scale (RAAS), the NMR expectancies scale, the fear of intimacy scale and the differentiation of self inventory were administered to a sample of 100 substance use disorder inpatients. Attachment accounted for significant variance in NMR expectancies and was also a strong predictor of fear of intimacy. The predictive utility of attachment also extended to self-differentiation, suggesting that attachment was strongly related to overall self-differentiation score, Emotional reactivity, Emotional cut-off and I position. These findings support attachment theory suggesting that attachment is associated with and predicts affect regulation abilities and difficulties in interpersonal functioning in a sample of substance use disorder inpatients. The inclusion and assessment of attachment appears to be important in the development of treatment programmes for substance abusing individuals.
Resumo:
In today's technological age, fraud has become more complicated, and increasingly more difficult to detect, especially when it is collusive in nature. Different fraud surveys showed that the median loss from collusive fraud is much greater than fraud perpetrated by a single person. Despite its prevalence and potentially devastating effects, collusion is commonly overlooked as an organizational risk. Internal auditors often fail to proactively consider collusion in their fraud assessment and detection efforts. In this paper, we consider fraud scenarios with collusion. We present six potentially collusive fraudulent behaviors and show their detection process in an ERP system. We have enhanced our fraud detection framework to utilize aggregation of different sources of logs in order to detect communication and have further enhanced it to render it system-agnostic thus achieving portability and making it generally applicable to all ERP systems.
Resumo:
This paper reveals the interior landscapes of selected contemporary Australian films, such as The Caterpillar Wish and Bad Boy Bubby, to develop a number of thematic influences on the manner in which domestic and private lives are constructed through filmic imagination. The research uncovers the conditions that contribute to particular scenographic representations of the humble interiors that act as both backdrop and performer to subtle and often troubled narratives. Such readings are informed by the theoretical works of writer Gertrude Stein, among others, who explore the relationships between the scenographic third dimension and the fourth dimensional performance in the representation of narrative space. A further theoretical thread lies in Giuliana Bruno’s work on the tension between private and public filmic space, which is explored through the public outing of intensely private spaces generated through narratives framed by the specificities of found interiors. Beyond the interrogation of qualities of imagined filmic space is the condition whereby locations, once transformed by the event of movie making are consequently forever revised. These altered conditions subsequently reinvest the lives of those who return to the location with layered narratives of occupation. Situationally, the now reconverted interior performs as contributor to subsequent private inhabitation, even if only as imagined space. The possibility here is that the qualities of the original may be superimposed and recontextualised to invest post-produced interiors with the qualities of the other space as imagined. This reading of film space explores new theoretical design scenarios for imagined and everyday interior landscapes.
Resumo:
Global Business Today is focused on the fundamentals of international business. Not only does this text provide coverage of the strategic imperatives of operating IB out of a small, dependent economy but it also builds a thorough worldwide orientation. In this edition, international business Graduate Attributes have been integrated throughout and there is topical discussion of issues such as the Doha round of trade negotiation, climate change and the rise of China and India. The authors recognise that case studies reinforce relevance and have therefore included either entirely new or significantly revised cases in every chapter. With a concise treatment of the crucial elements of an IB course, Global Business Today is the ideal text for a first subject in international busines