848 resultados para Files concerning adoption
Resumo:
Indoor air pollution from combustion of solid fuels is the fifth leading contributor to disease burden in low-income countries. This, and potential to reduce environmental impacts, has resulted in emphasis on use of improved stoves. However, many efforts have failed to meet expectations and effective coverage remains limited. A disconnect exists between technologies, delivery methods, and long-term adoption. The purpose of this research is to develop a framework to increase long-term success of improved stove projects. The framework integrates sustainability factors into the project life-cycle. It is represented as a matrix and checklist which encourages consideration of social, economic, and environmental issues in projects. A case study was conducted in which an improved stove project in Honduras was evaluated using the framework. Results indicated areas of strength and weakness in project execution and highlighted potential improvements for future projects. The framework is also useful as a guide during project planning.
Resumo:
This thesis attempts to understand why people adopt or reject individual-use renewable energy technologies (IURET). I used factors from Everett Rogers' Diffusion of Innovation Theory to understand how people's perceptions towards the characteristics of a given IURET (such as price, compatibility, complexity, etc.), the characteristics of the individual adopter (such as innovativeness and environmental awareness), and the communication network (inter-personal communications and mass media) can influence adoption. An online questionnaire was sent to 101randomly selected Michigan households (using random digit dialing) to ask people whether or not they had adopted at least one IURET and to assess the above-mentioned factors from Rogers' theory. Data analysis was then conducted in SPSS using Chi-squared and binary logistic regression to determine the relationship between adoption behaviors (the dependent variable) and the factors from Rogers' theory (the independent variables) while controlling for education. The results show that Rogers' factors of price and observability and the control variable of education were all significant in explaining adoption but the other factors of Rogers' theory were not. For example, if individuals perceive the price of IURET to be reasonable or if they observe their neighbors using these technologies, then they are more likely to adopt. These results indicate that, if we want to promote greater adoption of IURET, we should focus our efforts on making the price of IURET more affordable through incentives and other mechanisms. Adopters should also be given some form of reward if they provide free demonstrations of their IURET in use to their neighbors to take advantage of the observability effects.
Resumo:
The purpose of Part I of this report is to determine the origin of the bentonite deposits, also to locate them with reference to section corners in the vicinity and to determine their extent. The field work for this report was done in the fall of 1933 and during the spring of 1934. The roads, geologic contacts, and culture in general were mapped with the use of an open sight alidade and plane table. Distances were determined on the roads by the speedometer on the automobile; the detailed survey in the immediate vicinity of the deposits was done with use of the Brunton compass and pacing. The purpose of Part II in this report is to determine if the bentonite deposits immediately west of Butte, Montana are of commercial importance and also to determine the use to which they are best suited.
Resumo:
This report discusses steps for the integration and adoption of information and communication technologies (ICT) in Uganda schools. Barriers of ICT adoption for teachers were determined through surveys at three schools in Eastern Uganda. Teachers identified lack of familiarity of ICT resources and lack of ICT skills as the two greatest barriers to ICT integration. Administrators and staffs were also interviewed to determine current resources. Through observations, interviews and collected data the report addresses two major ideas, promoting utilization of ICT resources and development of sustainable ICT programs. Promotion of utilization not only relies on overcoming the major barriers listed, but also developing a positive attitude of ICT. Sustainability is an issue reliant on all three groups of the school community; administration, staff and users.
Resumo:
File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.
Resumo:
We describe the use of log file analysis to investigate whether the use of CSCL applications corresponds to its didactical purposes. Exemplarily we examine the use of the web-based system CommSy as software support for project-oriented university courses. We present two findings: (1) We suggest measures to shape the context of CSCL applications and support their initial and continuous use. (2) We show how log files can be used to analyze how, when and by whom a CSCL system is used and thus help to validate further empirical findings. However, log file analyses can only be interpreted reasonably when additional data concerning the context of use is available.
Resumo:
This article makes use of institutional ethnography to research foster care and adoption by lesbians and gay men, drawing on the work of the feminist sociologist Dorothy E. Smith in order to demonstrate the investigation of social work institutional categories and the ‘relations of ruling’. Through an analysis of the ways in which ‘gender’ and the idea of the ‘gender role model’ is used within the assessment of gay and lesbian foster carers and adopters, the author shows how these categories are produced and used to police relationship forms and to identify ‘deviant instances’.
Resumo:
Open source software projects are multi-collaborative works incorporating the contributions of numerous developers who, in spite of publishing their code under a public license such as GPL, Apache or BSD, retain the copyright in their contributions. Having multiple copyright-owners can make the steering of a project difficult, if not impossible, as there is no ultimate authority able to take decisions relating to the maintenance and use of the project. This predicament can be remedied by centring the dispersed copyrights in a single authority via contributor agreements. Whether to introduce contributor agreements, and if so in which form, is a pressing question for many emerging, but also for established projects. The current paper provides an insight into the ethos of different projects and their reason for adopting or rejecting particular contributor agreements. It further examines the exact set-up of the contributor agreements used and concludes that smart drafting can blur the difference between CAAs and CLAs to a considerable extent, manoeuvring them into a legal grey area. To avoid costly litigation to test the legal enforceability of individual clauses, this paper proposes the establishment of an international committee comprised of developers, product managers and lawyers interested in finding a common terminology that may serve as a foundation for every contributor agreement
Resumo:
OBJECTIVES The authors sought to examine the adoption of transcatheter aortic valve replacement (TAVR) in Western Europe and investigate factors that may influence the heterogeneous use of this therapy. BACKGROUND Since its commercialization in 2007, the number of TAVR procedures has grown exponentially. METHODS The adoption of TAVR was investigated in 11 European countries: Germany, France, Italy, United Kingdom, Spain, the Netherlands, Switzerland, Belgium, Portugal, Denmark, and Ireland. Data were collected from 2 sources: 1) lead physicians submitted nation-specific registry data; and 2) an implantation-based TAVR market tracker. Economic indexes such as healthcare expenditure per capita, sources of healthcare funding, and reimbursement strategies were correlated to TAVR use. Furthermore, we assessed the extent to which TAVR has penetrated its potential patient population. RESULTS Between 2007 and 2011, 34,317 patients underwent TAVR. Considerable variation in TAVR use existed across nations. In 2011, the number of TAVR implants per million individuals ranged from 6.1 in Portugal to 88.7 in Germany (33 ± 25). The annual number of TAVR implants performed per center across nations also varied widely (range 10 to 89). The weighted average TAVR penetration rate was low: 17.9%. Significant correlation was found between TAVR use and healthcare spending per capita (r = 0.80; p = 0.005). TAVR-specific reimbursement systems were associated with higher TAVR use than restricted systems (698 ± 232 vs. 213 ± 112 implants/million individuals ≥ 75 years; p = 0.002). CONCLUSIONS The authors' findings indicate that TAVR is underutilized in high and prohibitive surgical risk patients with severe aortic stenosis. National economic indexes and reimbursement strategies are closely linked with TAVR use and help explain the inequitable adoption of this therapy.