858 resultados para Security issues
Resumo:
Issues of vital criminological research and policy significance abound in the global South, with important implications for South/North relations and for global security and justice. Having a theoretical framework capable of appreciating the significance of this global dynamic will contribute to criminology being able to better understand the challenges of the present and the future. We employ southern theory in a reflexive (and not a reductive) way to elucidate the power relations embedded in the hierarchal production of criminological knowledge that privileges theories, assumptions and methods based largely on empirical specificities of the global North. Our purpose is not to dismiss the conceptual and empirical advances in criminology, but to more usefully de-colonize and democratize the toolbox of available criminological concepts, theories and methods. As a way of illustrating how southern criminology might usefully contribute to better informed responses to global justice and security, this article examines three distinct projects that could be developed under such a rubric. These include, firstly, certain forms and patterns of crime specific to the global periphery; secondly, the distinctive patterns of gender and crime in the global south shaped by diverse cultural, social, religious and political factors and lastly the distinctive historical and contemporary penalities of the global south and their historical links with colonialism and empire building.
Resumo:
With the ever increasing amount of eHealth data available from various eHealth systems and sources, Health Big Data Analytics promises enticing benefits such as enabling the discovery of new treatment options and improved decision making. However, concerns over the privacy of information have hindered the aggregation of this information. To address these concerns, we propose the use of Information Accountability protocols to provide patients with the ability to decide how and when their data can be shared and aggregated for use in big data research. In this paper, we discuss the issues surrounding Health Big Data Analytics and propose a consent-based model to address privacy concerns to aid in achieving the promised benefits of Big Data in eHealth.
Resumo:
The world has experienced a large increase in the amount of available data. Therefore, it requires better and more specialized tools for data storage and retrieval and information privacy. Recently Electronic Health Record (EHR) Systems have emerged to fulfill this need in health systems. They play an important role in medicine by granting access to information that can be used in medical diagnosis. Traditional systems have a focus on the storage and retrieval of this information, usually leaving issues related to privacy in the background. Doctors and patients may have different objectives when using an EHR system: patients try to restrict sensible information in their medical records to avoid misuse information while doctors want to see as much information as possible to ensure a correct diagnosis. One solution to this dilemma is the Accountable e-Health model, an access protocol model based in the Information Accountability Protocol. In this model patients are warned when doctors access their restricted data. They also enable a non-restrictive access for authenticated doctors. In this work we use FluxMED, an EHR system, and augment it with aspects of the Information Accountability Protocol to address these issues. The Implementation of the Information Accountability Framework (IAF) in FluxMED provides ways for both patients and physicians to have their privacy and access needs achieved. Issues related to storage and data security are secured by FluxMED, which contains mechanisms to ensure security and data integrity. The effort required to develop a platform for the management of medical information is mitigated by the FluxMED's workflow-based architecture: the system is flexible enough to allow the type and amount of information being altered without the need to change in your source code.
Resumo:
Drivers behave in different ways, and these different behaviors are a cause of traffic disturbances. A key objective for simulation tools is to correctly reproduce this variability, in particular for car-following models. From data collection to the sampling of realistic behaviors, a chain of key issues must be addressed. This paper discusses data filtering, robustness of calibration, correlation between parameters, and sampling techniques of acceleration-time continuous car-following models. The robustness of calibration is systematically investigated with an objective function that allows confidence regions around the minimum to be obtained. Then, the correlation between sets of calibrated parameters and the validity of the joint distributions sampling techniques are discussed. This paper confirms the need for adapted calibration and sampling techniques to obtain realistic sets of car-following parameters, which can be used later for simulation purposes.
Resumo:
Considerable work has been undertaken to determine an economical process to provide sugarcane trash as a fuel for cogeneration. This paper reviews efforts to provide that trash fuel by harvesting, transporting and processing the trash with the cane. Harvesting trash with the cane has the advantage that cane that would otherwise be lost by extracting it with the trash is captured and sugar can be produced from that cane. Transporting trash with the cane significantly reduces the bulk density of the cane, requiring substantial changes and costs to cane transport. Shredding the trash at the harvester and compacting the cane in the bin prior to transport are possible methods to increase the bulk density but both have considerable cost. Processing trash through the sugar factory with the cane significantly reduces sugar recovery and sugar quality. Although considerable knowledge has been gained of these effects and further analysis has provided insights into their causes, much more work is required before whole crop harvesting and transport is an economically viable means of trash recovery.
Resumo:
Aims To discuss ethical issues that may arise in using WWA to monitor illicit drug use in the general population and in entertainment precincts, prisons, schools and work-places. Method Review current applications of WWA and identify ethical and social issues that may be raised with current and projected future uses of this method. Results Wastewater analysis (WWA) of drug residues is a promising method of monitoring illicit drug use that may overcome some limitations of other monitoring methods. When used for monitoring purposes in large populations, WWA does not raise major ethical concerns because individuals are not identified and the prospects of harming residents of catchment areas are remote. When WWA is used in smaller catchment areas (entertainment venues, prisons, schools or work-places) their results could, possibly, indirectly affect the occupants adversely. Researchers will need to take care in reporting their results to reduce media misreporting. Fears about possible use of WWA for mass individual surveillance by drug law enforcement officials are unlikely to be realized, but will need to be addressed because they may affect public support adversely for this type of research. Conclusions Using wastewater analysis to monitor illicit drug use in large populations does not raise major ethical concerns, but researchers need to minimize possible adverse consequences in studying smaller populations, such as workers, prisoners and students.
Resumo:
This article is based on a historical-comparative policy and discourse analysis of the principles underpinning the Australian disability income support system. It determines that these principles rely on a conception of disability that sustains a system of coercion and paternalism that perpetuates disability and referred to as disablism. The article examines the construction of disability in Australian income support across four major historical epochs spanning the period 1908-2007. Contextualisation of the policy trajectory and discourses of the contemporary disability pension regime for the time period 2008-now is also provided. Two major themes were found to have interacted with the ideology of disablism. This article argues that a non-disabling provision based on social citizenship, rather than responsible or productive citizenship, counters the tendency for authoritarian and paternal approaches. [Abridged]
Resumo:
In this chapter, we explore the 'darker' faces of international business (IB). Over a decade ago, Eden and Len way (2001) raised the need for examining both the 'bright' and the 'dark' side of globalization in order to achieve a better understanding of the concept and of its impact on IB activities. In doing this, they posited the multinational enterprise (MNE) as the 'key agent' and 'f.1ee' of globalization and discussed, primarily, the relationship between MNEs and nation-states as the central interf.1ce of its impact. Additionally, they posited that, by and large, the community of IB scholars positioned themselves at the bright end of the globalization spectrum, seeing it as essentially positive, whilst most non-governmental organizations (NGOs) and international political economy (IPE) academics set themselves at the dark end. Whilst they acknowledged their own 'bright side' tendencies, they called for a more nuanced consideration of MNEs as what they referred to as the Janus bee' of globalization.
Resumo:
Background: Many preterm neonates display difficulty establishing suck-feeding competence in the weeks following birth. Ineffective management of transitional feeding issues may cause patient complications, and can contribute to increased length of stay. Aims: Given that many neonatal nurseries appear to vary in their neonatal feeding management practices, the aim of this study was to investigate and document the routine level of support and intervention currently provided for preterm neonates with transitional feeding issues across the various level II (special care) nurseries (SCNs) in Queensland, Australia. Methods: A questionnaire was mailed to all Queensland SCNs in 2005 (n = 36). The questionnaire contained a series of closed-choice and short-answer questions designed to obtain information from each SCN regarding their current practices for managing transitional feeding issues in preterm neonates. Results were confirmed during a follow-up phone call. Results: Responses were obtained from 29 SCNs (80.6%). None of these nurseries reported having any formal, written policies regarding the management of transitional feeding issues in preterm neonates. Wide variations were reported in relation to the suck-feeding assessments and interventions used by staff within the various SCNs. Of the 29 nurseries, 4 (13.8%) reported using checklists or assessments to judge readiness for suck-feeds, and 5 (17.2%) reported using pulse oximetry to judge tolerance of suck-feeding attempts. Eighteen SCNs (62.1%) reported offering some form of active intervention to assist neonates with transitional feeding issues, with the most common intervention techniques reported being non-nutritive sucking during tube feeds, pre-feeding oral stimulation, and actively pacing suck-feeds. Twenty-two SCNs (75.4%) reported having access to a lactation consultant to assist mothers with breastfeeding issues. Conclusions: Differences were reported in the routine management of transitional feeding issues in preterm neonates across the various SCNs in Queensland. It is suggested that evidence based guidelines need to be developed, and that, in order to do this, further research studies are required to determine current best practice, as well as to answer remaining questions. © 2008 Elsevier Ireland Ltd. All rights reserved.
Resumo:
Rigid security boundaries hinder the proliferation of eHealth. Through active audit logs, accountable-eHealth systems alleviate privacy concerns and enhance information availability.
Resumo:
There is a well-founded ethical concern in the present regarding the question Ήow can we include everybody's voice equally in the framing of reviews?' This paper is a response to the complexities that inhere in that question. It is not about Review of Educational Research (RER) as a specific site but about the systems of reasoning that construct the opening question about reviews and that suggest possible answers, including the response: 'What is voice?'
Resumo:
Many software applications extend their functionality by dynamically loading libraries into their allocated address space. However, shared libraries are also often of unknown provenance and quality and may contain accidental bugs or, in some cases, deliberately malicious code. Most sandboxing techniques which address these issues require recompilation of the libraries using custom tool chains, require significant modifications to the libraries, do not retain the benefits of single address-space programming, do not completely isolate guest code, or incur substantial performance overheads. In this paper we present LibVM, a sandboxing architecture for isolating libraries within a host application without requiring any modifications to the shared libraries themselves, while still retaining the benefits of a single address space and also introducing a system call inter-positioning layer that allows complete arbitration over a shared library’s functionality. We show how to utilize contemporary hardware virtualization support towards this end with reasonable performance overheads and, in the absence of such hardware support, our model can also be implemented using a software-based mechanism. We ensure that our implementation conforms as closely as possible to existing shared library manipulation functions, minimizing the amount of effort needed to apply such isolation to existing programs. Our experimental results show that it is easy to gain immediate benefits in scenarios where the goal is to guard the host application against unintentional programming errors when using shared libraries, as well as in more complex scenarios, where a shared library is suspected of being actively hostile. In both cases, no changes are required to the shared libraries themselves.
Resumo:
The identification of safety hazards and risks and their associated control measures provides the foundation for any safety program and essentially determines the scope, content and complexity of an effective occupational health and safety management system. In the case of work-related road safety (WRRS), there is a gap within current knowledge, research and practice regarding the holistic assessment of WRRS safety systems and practice. In order to mitigate this gap, a multi-level process tool for assessing WRRS safety systems was developed from extensive consultation, practice and informed by theoretical models and frameworks. Data collection for the Organisational Driving Safety Systems Analysis (ODSSA) tool utilised a case study methodology and included multiple information sources: such as documents, archival records, interviews, direct observations, participant observations, and physical artefacts. Previous trials and application of the ODSSA has indicated that the tool is applicable to a wide range of organisational fleet environments and settings. This paper reports on the research results and effectiveness of the ODSSA tool to assess WRRS systems across a large organisation that recently underwent considerable organisational change, including amalgamation of multiple organisations. The outcomes of this project identified considerable differences in the degree by which the organisation addressed WRRS across their vehicle fleet operations and provided guidelines for improving organisations’ WRRS systems. The ODSSA tool was pivotal in determining WRRS system deficiencies and provided a platform to inform mitigation and improvement strategies.
Resumo:
In this paper we explore some of the ethical issues associated with conducting Ethnographic Action Research (Tacchi, 2004; Tacchi et al., 2003) for understanding and facilitating distributed collaboration. Ethnography and action research are increasingly popular qualitative approaches to researching computer-supported collaboration and we are applying them together in a project within a distributed research centre. We identify ethical principles applied to the conduct of research in Australia and we briefly describe a number of ethical problems that arise due to the nature of Ethnographic Action Research.