862 resultados para Context-based


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Dissertação de Doutoramento em Estudos da Criança, apresentada ao Instituto de Estudos da Criança, Universidade do Minho,sob orientação da Professora Doutora Júlia Oliveira Formosinho. Disponível em http://hdl.handle.net/1822/7085

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Cette thèse a pour objet de comprendre la question du mariage forcé vécu par des femmes immigrantes vivant au Québec et, les réponses politiques, législatives et sociales qu’on y apporte. De façon plus spécifique, il s’agit de mettre à jour la diversité des situations et des significations que recouvre la notion de mariage forcé pour tenter d’en dégager des éléments de définition et de compréhension. La thèse vise également à identifier les conséquences spécifiques qui découlent d’un mariage forcé pour les femmes immigrantes vivant au Québec, et enfin, d’analyser les réponses politiques, législatives et sociales visant le mariage forcé au Canada et au Québec afin de prévenir, dépister et d’en protéger ses victimes en contexte interculturel. S’appuyant sur un corpus de dix entrevues avec des femmes immigrantes vivant, ayant vécu ou menacées d’un mariage forcé et de dix-huit informateurs clés intervenant auprès d’elles et provenant de différents milieux de pratique (police, justice, santé services sociaux et communautaires), une analyse intersectionnelle a permis de révéler toute la complexité des mariages forcés due notamment aux interrelations entre des systèmes d’oppression et des vulnérabilités multiples. La recension des écrits et nos résultats indiquent que certains éléments caractérisent les mariages forcés. Premièrement, la préservation de l’honneur patriarcal qui problématise et contrôle le comportement des femmes en ce qui à trait notamment à leur vie sexuelle, mais aussi sociale. Deuxièmement, le fait que le mariage forcé soit un moyen de poursuivre des intérêts plus souvent collectifs qu’individuels. Dimension collective qui devra nécessairement être prise en considération lors des solutions à apporter à cette problématique. Troisièmement, le rôle des femmes (mères, belles-mères et autres femmes de la communauté culturelle d’appartenance) dans l’arrangement des mariages, mais également dans la surveillance et le contrôle de tous les faits et gestes des autres femmes. i Quatrièmement, le potentiel d’agresseurs multiples, y compris la communauté elle-même, dans les actes de violence commis avant, pendant et, le cas échéant, après le mariage. Une autre dimension qui devra elle aussi être prise en compte lors de l’inter- vention. Cinquièmement, le potentiel d’exploitation sexuelle (viol conjugal, grossesses forcées), physique (mauvais traitements, blessures), psychologique (pressions, manipulations) ou encore économique (travail forcé, privation d’autonomie financière). L’ensemble de ces résultats a permis de cerner certains besoins liés à l’intervention, en terme de prévention, de dépistage et de protection des victimes de mariage forcé.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

O presente relatório, surge no âmbito, do 3.º Curso de Mestrado em Enfermagem com Área de Especialização em Enfermagem Comunitária realizado na Escola Superior de Saúde de Portalegre – Instituto Politécnico de Portalegre. A partir da Metodologia de Planeamento em Saúde, descrevemos, analisamos e re-flectimos com base nas competências definidas para o enfermeiro especialista de saúde comunitária sobre um conjunto de acções de educação para a saúde, relacionadas com a sexualidade na adolescência e implementadas em contexto escolar. Deste modo, com base nos problemas e necessidades identificadas, interviemos jun-to de 205 alunos a frequentar o 8.º e o 11.º de Escolaridade e com idades compreendidas entre os 13 e os 20 anos. Foram realizadas nove sessões de educação para a saúde, que tiveram uma avalia-ção positiva de 98,1%.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". If adversaries can intercept this information, they can monitor the trajectory path and capture the location of the source node. This research stems from the recognition that the wide applicability of mWSNs will remain elusive unless a trajectory privacy preservation mechanism is developed. The outcome seeks to lay a firm foundation in the field of trajectory privacy preservation in mWSNs against external and internal trajectory privacy attacks. First, to prevent external attacks, we particularly investigated a context-based trajectory privacy-aware routing protocol to prevent the eavesdropping attack. Traditional shortest-path oriented routing algorithms give adversaries the possibility to locate the target node in a certain area. We designed the novel privacy-aware routing phase and utilized the trajectory dissimilarity between mobile nodes to mislead adversaries about the location where the message started its journey. Second, to detect internal attacks, we developed a software-based attestation solution to detect compromised nodes. We created the dynamic attestation node chain among neighboring nodes to examine the memory checksum of suspicious nodes. The computation time for memory traversal had been improved compared to the previous work. Finally, we revisited the trust issue in trajectory privacy preservation mechanism designs. We used Bayesian game theory to model and analyze cooperative, selfish and malicious nodes' behaviors in trajectory privacy preservation activities.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

One of the e-learning environment goal is to attend the individual needs of students during the learning process. The adaptation of contents, activities and tools into different visualization or in a variety of content types is an important feature of this environment, bringing to the user the sensation that there are suitable workplaces to his profile in the same system. Nevertheless, it is important the investigation of student behaviour aspects, considering the context where the interaction happens, to achieve an efficient personalization process. The paper goal is to present an approach to identify the student learning profile analyzing the context of interaction. Besides this, the learning profile could be analyzed in different dimensions allows the system to deal with the different focus of the learning.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Human Computer Interaction (HCl) is to interaction between computers and each person. And context-aware (CA) is very important one of HCI composition. In particular, if there are sequential or continuous tasks between users and devices, among users, and among devices etc, it is important to decide the next action using right CA. And to take perfect decision we have to get together all CA into a structure. We define that structure is Context-Aware Matrix (CAM) in this article. However to make exact decision is too hard for some problems like low accuracy, overhead and bad context by attacker etc. Many researcher has been studying to solve these problems. Moreover, still it has weak point HCI using in safety. In this Article, we propose CAM making include best selecting Server in each area. As a result, moving users could be taken the best way.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Involving groups in important management processes such as decision making has several advantages. By discussing and combining ideas, counter ideas, critical opinions, identified constraints, and alternatives, a group of individuals can test potentially better solutions, sometimes in the form of new products, services, and plans. In the past few decades, operations research, AI, and computer science have had tremendous success creating software systems that can achieve optimal solutions, even for complex problems. The only drawback is that people don’t always agree with these solutions. Sometimes this dissatisfaction is due to an incorrect parameterization of the problem. Nevertheless, the reasons people don’t like a solution might not be quantifiable, because those reasons are often based on aspects such as emotion, mood, and personality. At the same time, monolithic individual decisionsupport systems centered on optimizing solutions are being replaced by collaborative systems and group decision-support systems (GDSSs) that focus more on establishing connections between people in organizations. These systems follow a kind of social paradigm. Combining both optimization- and socialcentered approaches is a topic of current research. However, even if such a hybrid approach can be developed, it will still miss an essential point: the emotional nature of group participants in decision-making tasks. We’ve developed a context-aware emotion based model to design intelligent agents for group decision-making processes. To evaluate this model, we’ve incorporated it in an agent-based simulator called ABS4GD (Agent-Based Simulation for Group Decision), which we developed. This multiagent simulator considers emotion- and argument based factors while supporting group decision-making processes. Experiments show that agents endowed with emotional awareness achieve agreements more quickly than those without such awareness. Hence, participant agents that integrate emotional factors in their judgments can be more successful because, in exchanging arguments with other agents, they consider the emotional nature of group decision making.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Dissertation presented at the Faculdade de Ciências e Tecnologia da Universidade Nova de Lisboa to obtain the Master degree in Electrical and Computer Engineering.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

IEEE International Conference on Pervasive Computing and Communications (PerCom). 23 to 26, Mar, 2015, PhD Forum. Saint Louis, U.S.A..

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Magdeburg, Univ., Fak. für Informatik, Diss., 2008

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Tämän Pro gradu-tutkielman tavoitteena olirakentaa esiymmärrys sosiaalisen pääoman roolista ja mittaamisesta uuden teknologian start-up yrityksissä. Pääasiallisena tarkoituksena tässä tutkimuksessa olilöytää sosiaalisen pääoman ja start-up yrityksen tuloksellisuuden välille yhdistävä tekijä. Tutkimuksen empiirinen aineisto kerättiin pääasiallisesti kuuden OKO Venture Capitalin sijoitusportfolioon sisältyvien case-yritysten kvalitatiivisten teemahaastatteluiden sekä kvantitatiivisten kyselylomakkeiden avulla. Kvalitatiivisten haastatteluiden tulosten perusteella sosiaalisen pääoman ja tuloksellisuuden välille löytyi yhdistävä tekijä, jota käytettiin myöhemmin hyväksi kvantitatiivisessa kyselylomakkeessa. Tämän tutkielman tulokset osoittivat, että startegisen päätöksenteon kautta sosiaalinen pääoma vaikuttaa osittain start-up yritysten tuloksellisuuteen. Manageriaalisesti tärkempi löydös tässä tutkimuksessa oli kuitenkin se, että sosiaalista pääomaa voidaan käyttää hyväksi ennustettaessa uuden teknologian start-up yritysten tulevaisuuden kassavirtoja.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper we discuss the main privacy issues around mobile business models and we envision new solutions having privacy protection as a main value proposition. We construct a framework to help analyze the situation and assume that a third party is necessary to warrant transactions between mobile users and m-commerce providers. We then use the business model canvas to describe a generic business model pattern for privacy third party services. This pattern is then illustrated in two different variations of a privacy business model, which we call privacy broker and privacy management software. We conclude by giving examples for each business model and by suggesting further directions of investigation

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Bandura (1986) developed the concept of moral disengagement to explain how individuals can engage in detrimental behavior while experiencing low levels of negative feelings such as guilt-feelings. Most of the research conducted on moral disengagement investigated this concept as a global concept (e.g., Bandura, Barbaranelli, Caprara, & Pastorelli, 1996; Moore, Detert, Klebe Treviño, Baker, & Mayer, 2012) while Bandura (1986, 1990) initially developed eight distinct mechanisms of moral disengagement grouped into four categories representing the various means through which moral disengagement can operate. In our work, we propose to develop measures of this concept based on its categories, namely rightness of actions, rejection of personal responsibility, distortion of negative consequences, and negative perception of the victims, and which is not specific a particular area of research. Through our measures, we aim at better understanding the cognitive process leading individuals to behave unethically by investigating which category plays a role in explaining unethical behavior depending on the situations in which individuals are. To this purpose, we conducted five studies to develop the measures and to test its predictive validity. Particularly, we assessed the ability of the newly developed measures to predict two types of unethical behaviors, i.e. discriminatory behavior and cheating behavior. Confirmatory Factor analyses demonstrated a good fit of the model and findings generally supported our predictions.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In the context of the evidence-based practices movement, the emphasis on computing effect sizes and combining them via meta-analysis does not preclude the demonstration of functional relations. For the latter aim, we propose to augment the visual analysis to add consistency to the decisions made on the existence of a functional relation without losing sight of the need for a methodological evaluation of what stimuli and reinforcement or punishment are used to control the behavior. Four options for quantification are reviewed, illustrated, and tested with simulated data. These quantifications include comparing the projected baseline with the actual treatment measurements, on the basis of either parametric or nonparametric statistics. The simulated data used to test the quantifications include nine data patterns in terms of the presence and type of effect and comprising ABAB and multiple baseline designs. Although none of the techniques is completely flawless in terms of detecting a functional relation only when it is present but not when it is absent, an option based on projecting split-middle trend and considering data variability as in exploratory data analysis proves to be the best performer for most data patterns. We suggest that the information on whether a functional relation has been demonstrated should be included in meta-analyses. It is also possible to use as a weight the inverse of the data variability measure used in the quantification for assessing the functional relation. We offer an easy to use code for open-source software for implementing some of the quantifications.