973 resultados para Personal Security.
Resumo:
Background
Providing palliative care in long-term care (LTC) homes is an area of growing importance. As a result, attention is being given to exploring effective palliative care learning strategies for personal support workers (PSWs) who provide the most hands-on care to LTC residents.
AimThe purpose of this intervention was to explore hospice visits as an experiential learning strategy to increase the capacity of PSWs in palliative care, specifically related to their new learning, and how they anticipated this experience changed their practices in LTC.
DesignThis study utilised a qualitative descriptive design.
MethodsEleven PSWs from four Ontario LTC homes were sent to their local hospice to shadow staff for one to two days. After the visit, PSWs completed a questionnaire with open-ended questions based on critical reflection. Data were analysed using thematic content analysis.
ResultsPSWs commented on the extent of resident-focused care at the hospice and how palliative care interventions were tailored to meet the needs of residents. PSWs were surprised with the lack of routine at the hospice but felt that hospice staff prioritised their time effectively in order to meet family and client care needs. Some PSWs were pleased to see how well integrated the PSW role is on the community hospice team without any hierarchical relationships. Finally, PSWs felt that other LTC staff would benefit from palliative care education and becoming more comfortable with talking about death and dying with other staff, residents and family members.
ConclusionThis study highlighted the benefits of PSWs attending a hospice as an experiential learning strategy. Future work is needed to evaluate this strategy using more rigorous designs as a way to build capacity within PSWs to provide optimal palliative care for LTC residents and their family members.
Implications for practicePSWs need to be recognised as important members within the interdisciplinary team. PSWs who shadow staff at hospices view this experience as a positive strategy to meet their learning needs related to palliative care.
Resumo:
On 26 December 2003 an Israeli activist was shot by the Israeli Army while he was participating in a demonstration organized by Anarchists Against the Wall (AAtW) in the West Bank. This was the first time Israeli Soldiers have deliberately shot live bullets at a Jewish-Israeli activist. This paper is an attempt to understand the set of conditions, the enveloping frameworks, and the new discourses that have made this event, and similar shootings that soon followed, possible. Situating the actions of AAtW within a much wider context of securitization—of identities, movements, and bodies—we examine strategies of resistance which are deployed in highly securitized public spaces. We claim that an unexpected matrix of identity in which abnormality is configured as security threat render the bodies of activists especially precarious. The paper thus provides an account of the new rationales of security technologies and tactics which increasingly govern public spaces.
Resumo:
This study explored the experiences of informal carers who were aged 65 years and over. It has been estimated that 15 per cent of those aged 65 or over provide some form of informal care in England. Despite a growing literature on the involvement of older people in research, there is a paucity of literature on the involvement of older carers. In this study, older carers were identified via a General Practice (GP) register in one urban medical practice. Data was collected through a series of focus groups, which were transcribed and analysed using
thematic analysis. Every carer aged 55 or over and registered with the medical practice was invited to take part in the study. Four female carers and one male carer took part in the study (age range 65-83). Themes that emerged during data analysis included, 1) managing things in an emergency, 2) feeling valued because they took part in the research and 3) the day-to-day reality of living with social exclusion. GP registers provide a valuable tool for identifying older
carers who may otherwise be difficult to engage in research. However, persuading GPs to engage with qualitative research may be a challenge.
Resumo:
This letter proposes several relay selection policies for secure communication in cognitive decode-and-forward (DF) relay networks, where a pair of cognitive relays are opportunistically selected for security protection against eavesdropping. The first relay transmits the secrecy information to the destination,
and the second relay, as a friendly jammer, transmits the jamming signal to confound the eavesdropper. We present new exact closed-form expressions for the secrecy outage probability. Our analysis and simulation results strongly support our conclusion that the proposed relay selection policies can enhance the performance of secure cognitive radio. We also confirm that the error floor phenomenon is created in the absence of jamming.
Resumo:
Cognitive radio has emerged as an essential recipe for future high-capacity high-coverage multi-tier hierarchical networks. Securing data transmission in these networks is of utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver. The secondary receiver and the eavesdropper are equipped with multiple antennas, and passive eavesdropping is considered where the channel state information of the eavesdropper’s channel is not available at the secondary transmitter. We present new closedform expressions for the exact and asymptotic secrecy outage probability. Our results reveal the impact of the primary network on the secondary network in the presence of a multi-antenna wiretap channel.
Resumo:
This paper critically interrogates how borders are produced by scientists, engineers and security experts in advance of the actual deployment of technical devices they develop. This paper explores the prior stages of translation and decision-making as a socio-technical device is conceived and developed. Drawing on in-depth interviews, observations and ethnographic research of the EU-funded Handhold project (consisting of nine teams in five countries), it explores how assumptions about the way security technologies will and should perform at the border shape the way that scientists, engineers, and security experts develop a portable, integrated device to detect CBRNE threats at borders. In disaggregating the moments of sovereign decision making across multiple sites and times, this paper questions the supposed linearity of how science comes out of and feeds back into the world of border security. An interrogation of competing assumptions and understandings of security threats and needs, of competing logics of innovation and pragmatism, of the demands of differentiated temporalities in detection and interrogation, and of the presumed capacities, behaviours, and needs of phantasmic competitors and end-users reveals a complex, circulating and co-constitutive process of device development that laboratises the border itself. We trace how sovereign decisions are enacted as assemblages in the antecedent register of device development itself through the everyday decisions of researchers in the laboratory, and the material components of the Handhold device itself.
Resumo:
Invited talk, representing the Royal Society
Resumo:
Cyber threats in Supervisory Control and Data Acquisition (SCADA) systems have the potential to render physical damage and jeopardize power system operation, safety and stability. SCADA systems were originally designed with little consideration of escalating cyber threats and hence the problem of how to develop robust intrusion detection technologies to tailor the requirements of SCADA is an emerging topic and a big challenge. This paper proposes a stateful Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method to improve the cyber-security of SCADA systems using the IEC 60870-5-104 protocol which is tailored for basic telecontrol communications. The proposed stateful protocol analysis approach is presented that is designed specifically for the IEC 60870-5-104 protocol. Finally, the novel intrusion detection approach are implemented and validated.
Resumo:
Security is a critical concern around the world. Since resources for security are always limited, lots of interest have arisen in using game theory to handle security resource allocation problems. However, most of the existing work does not address adequately how a defender chooses his optimal strategy in a game with absent, inaccurate, uncertain, and even ambiguous strategy profiles' payoffs. To address this issue, we propose a general framework of security games under ambiguities based on Dempster-Shafer theory and the ambiguity aversion principle of minimax regret. Then, we reveal some properties of this framework. Also, we present two methods to reduce the influence of complete ignorance. Our investigation shows that this new framework is better in handling security resource allocation problems under ambiguities.