987 resultados para Personal Security.


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The concept of ontological security has a remarkable echo in the current sociology to describe emotional status of men of late modernity. However, the concept created by Giddens in the eighties has been little used in empirical research covering various sources of risk or uncertainty. In this paper, a scale for ontological security is proposed. To do this, we start from the results of a research focused on the relationship between risk, uncertainty and vulnerability in the context of the economic crisis in Spain. These results were produced through nine focus groups and a telephone survey with standardized questionnaire applied to a national sample of 2,408 individuals over 18 years. This work is divided into three main sections. In the fi rst, a scale has been built from the results of the application of different items present in the questionnaire used. The second part explores the relationships of the scale obtained with the variables further approximate the emotional dimensions of individuals. The third part observes the variables that contribute to changes in the scale: These variables show the structural feature of the ontological security.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-08

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The discipline of counselling psychology continues to grow and change in response to social, economic and political pressures. It has been argued that its quest for a coherent and distinct identity, which emphasises the possibility of the coexistence of multiple approaches, creates an inherently uncertain and dilemmatic training environment that may hinder the development of trainees’ professional identities. In order to gain a deeper understanding of the issue at hand, the aim was to explore how final year trainees and newly qualified counselling psychologists constructed and made sense of their emerging professional identities and what experiences, past and present, they drew upon in the context of their training to shape those identities. Applying narrative inquiry to analyse eight open-ended interviews, eight preliminary themes were originally identified in participants’ narratives, which with further refinements lead to stories of struggle and marginalisation, growth and discovery, and power and resilience. Participants’ stories of struggle and marginalisation emerged in reference to early family dynamics and stressful life experiences, which seemed to also foster a strong identification with the counselling psychology profession, while stories of growth and discovery focused on the importance of having supportive figures, who helped to instill a sense of security and create an atmosphere of openness. It was in this learning environment that participants felt it was possible to develop a more resilient, empowered professional self, which allowed them to shed an earlier sense of struggle and vulnerability. However, where more of an emphasis was placed on power and resilience, there seemed to be less room for participants to express other feelings that came into conflict with their preferred sense of professional self. While there seems to be a need for a ‘safer’ climate, in which trainees could voice and acknowledge anxieties, vulnerabilities and limitations, addressing concerns around power and vulnerability that may be contributing to the silencing of particular voices and identities may be equally important if trainees are to develop coherent and distinct counselling psychologist identities.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The human factor is often recognised as a major aspect of cyber-security research. Risk and situational perception are identified as key factors in the decision making process, often playing a lead role in the adoption of security mechanisms. However, risk awareness and perception have been poorly investigated in the field of eHealth wearables. Whilst end-users often have limited understanding of privacy and security of wearables, assessing the perceived risks and consequences will help shape the usability of future security mechanisms. This paper present a survey of the the risks and situational awareness in eHealth services. An analysis of the lack of security and privacy measures in connected health devices is described with recommendations to circumvent critical situations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Public agencies are increasingly required to collaborate with each other in order to provide high-quality e-government services. This collaboration is usually based on the service-oriented approach and supported by interoperability platforms. Such platforms are specialized middleware-based infrastructures enabling the provision, discovery and invocation of interoperable software services. In turn, given that personal data handled by governments are often very sensitive, most governments have developed some sort of legislation focusing on data protection. This paper proposes solutions for monitoring and enforcing data protection laws within an E-government Interoperability Platform. In particular, the proposal addresses requirements posed by the Uruguayan Data Protection Law and the Uruguayan E-government Platform, although it can also be applied in similar scenarios. The solutions are based on well-known integration mechanisms (e.g. Enterprise Service Bus) as well as recognized security standards (e.g. eXtensible Access Control Markup Language) and were completely prototyped leveraging the SwitchYard ESB product.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Collecting and analyzing consumer data is essential in today’s data-driven business environment. However, consumers are becoming more aware of the value of the information they can provide to companies, thereby being more reluctant to share it for free. Therefore, companies need to find ways to motivate consumers to disclose personal information. The main research question of the study was formed as “How can companies motivate consumers to disclose personal information?” and it was further divided into two subquestions: 1) What types of benefits motivate consumers to disclose personal information? 2) How does the disclosure context affect the consumers’ information disclosure behavior? The conceptual framework consisted of a classification of extrinsic and intrinsic benefits, and moderating factors, which were recognized on the basis of prior research in the field. The study was conducted by using qualitative research methods. The primary data was collected by interviewing ten representatives from eight companies. The data was analyzed and reported according to predetermined themes. The findings of the study confirm that consumers can be motivated to disclose personal information by offering different types of extrinsic (monetary saving, time saving, self-enhancement, and social adjustment) and intrinsic (novelty, pleasure, and altruism) benefits. However, not all the benefits are equally useful ways to convince the customer to disclose information. Moreover, different factors in the disclosure context can either alleviate or increase the effectiveness of the benefits and the consumers’ motivation to disclose personal information. Such factors include the consumer’s privacy concerns, perceived trust towards the company, the relevancy of the requested information, personalization, website elements (especially security, usability, and aesthetics of a website), and the consumer’s shopping motivation. This study has several contributions. It is essential that companies recognize the most attractive benefits regarding their business and their customers, and that they understand how the disclosure context affects the consumer’s information disclosure behavior. The likelihood of information disclosure can be increased, for example, by offering benefits that meet the consumers’ needs and preferences, improving the relevancy of the asked information, stating the reasons for data collection, creating and maintaining a trustworthy image of the company, and enhancing the quality of the company’s website.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Esta ponencia expone unas reflexiones sobre el prestigio y la dignidad profesional de la bibliotecología en el estado de Nuevo León, México. Analiza y critica: a) la falta de categorías profesionales en Nuevo León en contraste con la UNAM; menciona también como varios bibliotecologos del IMSS Nuevo Leon lucharon porque se tipificara en el contrato colectivo la categoria de Bibliotecologo Profesional y cuya lucha ganaron; b) las actitudes represoras y dictatoriales por parte de las mafias administrativas y academicas de las principales universidades que no permiten la superacion de las amplias mayorias de bibliotecologos y que censuran la libertad de expresion y pensamiento en Nuevo Leon; c) aboga porque los bibliotecologos deban tener mistica de servicio como si se tratara de un "apostolado" en contra del "monetarismo" o "mercenarismo" que en la actualidad mueve a los bibliotecologos nuevoleoneses. En el aspecto gremial critica la charlataneria y oportunimo demagogico de gremios como los de AMBAC de Nuevo Leon, que se aprovechan de las ineptitudes de los gobiernos en todos los niveles en materia bibliotecaria y utilizan las desgracias naturales apelando a sentimentalismos de la gente solo para salir en la foto y en la prensa, pero sin analizar, criticar ni denunciar las fallas estructurales de fondo del Estado mexicano y de los tres niveles de gobierno. ABSTRACT This paper analyses some reflections about the professional prestige and dignity of librarianship in the state of Nuevo Leon, Mexico. It analyses and criticises: a) the lack of professional categories for librarians with B.A.s or Masters degrees in Nuevo Leon, in contrast, for example with Mexico’s National Autonomous University (UNAM); it also assesses how several librarians with B.A. undergraduate degrees from the Mexican National Institute of Social Security (IMSS) the national health service system) in the Nuevo Leon state-wide fought to obtain a Professional B.A. Undergraduate Degre Librarian Labor Cagegory status to be signed and included in the labor IMSS union collective contract and how eventually they won; b) it also criticises the repressive and dictatorial attitudes on the side of the top managerial and academic mafias from the major Nuevo Leon universities who do not allow free and equal academic and professional development opportunities of the vast majorities of librarians with or without B.A. degrees and whom also censor their freedom of expression and thought in Nuevo Leon librarianship; c) it advocates for librarians to have an honest service mystique as if they were doing a sort of "apostleship" against the "monetarist" and "mercenarist" practices that currently practice librarians in Nuevo Leon state. As for the library guild activities, it criticises the demogogical charlatanism and opportunism of guilds such as AMBAC (standing from the Mexico-wide Mexican Library Association, Nuevo Leon chapter), where their leaders only take advantage of the ineptitudes of the three levels of the Mexican government (municipal, state, and federal) on library issues, and they use the natural disasters against libraries or librarians by appealing to people’s sentimentalisms just to appear themselves in the picture and in the press, but without analysing, criticising and denouncing the deep structural faults underneath the Mexican State, and from all the three levels of the Mexican governments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The key functional operability in the pre-Lisbon PJCCM pillar of the EU is the exchange of intelligence and information amongst the law enforcement bodies of the EU. The twin issues of data protection and data security within what was the EU’s third pillar legal framework therefore come to the fore. With the Lisbon Treaty reform of the EU, and the increased role of the Commission in PJCCM policy areas, and the integration of the PJCCM provisions with what have traditionally been the pillar I activities of Frontex, the opportunity for streamlining the data protection and data security provisions of the law enforcement bodies of the post-Lisbon EU arises. This is recognised by the Commission in their drafting of an amending regulation for Frontex , when they say that they would prefer “to return to the question of personal data in the context of the overall strategy for information exchange to be presented later this year and also taking into account the reflection to be carried out on how to further develop cooperation between agencies in the justice and home affairs field as requested by the Stockholm programme.” The focus of the literature published on this topic, has for the most part, been on the data protection provisions in Pillar I, EC. While the focus of research has recently sifted to the previously Pillar III PJCCM provisions on data protection, a more focused analysis of the interlocking issues of data protection and data security needs to be made in the context of the law enforcement bodies, particularly with regard to those which were based in the pre-Lisbon third pillar. This paper will make a contribution to that debate, arguing that a review of both the data protection and security provision post-Lisbon is required, not only in order to reinforce individual rights, but also inter-agency operability in combating cross-border EU crime. The EC’s provisions on data protection, as enshrined by Directive 95/46/EC, do not apply to the legal frameworks covering developments within the third pillar of the EU. Even Council Framework Decision 2008/977/JHA, which is supposed to cover data protection provisions within PJCCM expressly states that its provisions do not apply to “Europol, Eurojust, the Schengen Information System (SIS)” or to the Customs Information System (CIS). In addition, the post Treaty of Prüm provisions covering the sharing of DNA profiles, dactyloscopic data and vehicle registration data pursuant to Council Decision 2008/615/JHA, are not to be covered by the provisions of the 2008 Framework Decision. As stated by Hijmans and Scirocco, the regime is “best defined as a patchwork of data protection regimes”, with “no legal framework which is stable and unequivocal, like Directive 95/46/EC in the First pillar”. Data security issues are also key to the sharing of data in organised crime or counterterrorism situations. This article will critically analyse the current legal framework for data protection and security within the third pillar of the EU.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

La presente investigación pretendió incorporar el uso intensivo de TIC en los procedimientos establecidos y necesarios en los procesos de generación, distribución y control de la energía, lo que se expresa en un manual para el sistema de gestión humana de la organización analizada. La investigación partió de un levantamiento de un estado del arte, continuó con la realización de un análisis de actitudes y aptitudes de los colaboradores, basado en propuestas teóricas y mejores prácticas existentes del medio, y, por último, concluyó con un manual de gestión humana en el que se indican las competencias en los diferentes perfiles de la organización para el uso de TIC y su aplicación, con el propósito de alinearse con las perspectivas y objetivos de la organización analizada al tener como base la perdurabilidad y la competitividad de la misma.

Relevância:

20.00% 20.00%

Publicador: