896 resultados para Circle of Security


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Recent efforts to implement gender mainstreaming in the field of security sector reform have resulted in an international policy discourse on gender and security sector reform (GSSR). Critics have challenged GSSR for its focus on 'adding women' and its failure to be transformative. This article contests this assessment, demonstrating that GSSR is not only about 'adding women', but also, importantly, about 'gendering men differently' and has important albeit problematic transformative implications. Drawing on poststructuralist and postcolonial feminist theory, I propose a critical reading of GSSR policy discourse in order to analyse its built-in logics, tensions and implications. I argue that this discourse establishes a powerful 'grid of intelligibility' that draws on gendered and racialized dualisms to normalize certain forms of subjectivity while rendering invisible and marginalizing others, and contributing to reproduce certain forms of normativity and hierarchy. Revealing such processes of discursive in/exclusion and marginalized subjectivities can serve as a starting point to challenge and transform GSSR practice and identify sites of contestation.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

BACKGROUND: Primary care physicians underestimate the prevalence of domestic violence and community violence. Victims are therefore at risk of further episodes of violence, with psychological and physical consequences. We used an interview to assess the prevalence of domestic and community violence among Swiss natives and foreigners. In a follow-up study, we evaluated the consequences of the interview for the positive patients. METHODS: We evaluated the prevalence of violence by use of a questionnaire in an interview, in an academic general internal medicine clinic in Switzerland. In a follow-up, we evaluated the consequences of the interview for positive patients. The participants were 38 residents and 446 consecutive patients. Questionnaires were presented in the principal language spoken by our patients. They addressed sociodemographics, present and past violence, the security or lack of security felt by victims of violence, and the patients' own violence. Between 3 and 6 months after the first interview, we did a follow-up of all patients who had reported domestic violence in the last year. RESULTS: Of the 366 patients included in the study, 36 (9.8%) reported being victims of physical violence during the last year (physicians identified only 4 patients out of the 36), and 34/366 (9.3%) reported being victims of psychological violence. Domestic violence was responsible for 67.3% of the cases, and community violence for 21.8%. In 10.9% of the cases, both forms of violence were found. Of 29 patients who reported being victims of domestic violence, 22 were found in the follow-up. The frequency of violence had diminished (4/22) or the violence had ceased (17/22). CONCLUSION: The prevalence of violence is high; domestic violence is more frequent than community violence. There was no statistically significant difference between the Swiss and foreign patients' responses related to the rates of violence. Patients in a currently violent relationship stated that participating in the study helped them and that the violence decreased or ceased a few months later.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Over the years, transfusion medicine has been faced to many different problems, notably those related to transmission of pathogens. Major progresses have been accomplished in terms of security. However, nowadays, the discipline is confronted to the day-to-day variability and availability of blood products. More and more donors are excluded from blood donation due to various reasons, and the donor selection criteria have increased over the years, influencing the number of donors able to give blood. This paradox represents one of the constraints that transfusion medicine should resolve in the future. This paper presents some aspects either common or different between France and Switzerland.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Objective: The objective of this study was to investigate the opinions of women regarding the satisfaction about the quality of maternity care received. We hope to establish whether health care technology increases satisfaction or whether it actually interferes with the construction of personal satisfaction in the process of care. Design and setting: Information was gathered using the focus group technique. The area of study comprised the post-natal groups run as part of the Sexual and Reproductive Health Programme of the Catalan Health Authority. (Spain) Participants: Five focus groups were held between May 2006 and July 2007. Findings: Quality of care is a complex concept in which a number of independent core features can be identified. We have grouped these core features into three basic categories. Safety: the hospital and its technological facilities, and the technical expertise of health professionals. The other two main pillars of quality of care are the human dimension of the relationship between the carers and the patient, and finally the structural aspects that determine the context in which the heath care is provided. Key conclusions and implications for practice: The mothers of our study feel satisfied with healthcare technology and view it as a source of security; technology become indispensable features in order to reduce the anxiety provoked by the perceived lack of confidence in their ability as mothers. In this study, women, both during pregnancy and especially when giving birth, believe their feelings and values should be understood by professionals, from whom they seek empathy and a personal commitment, and not just information.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Objective: The objective of this study was to investigate the opinions of women regarding the satisfaction about the quality of maternity care received. We hope to establish whether health care technology increases satisfaction or whether it actually interferes with the construction of personal satisfaction in the process of care. Design and setting: Information was gathered using the focus group technique. The area of study comprised the post-natal groups run as part of the Sexual and Reproductive Health Programme of the Catalan Health Authority. (Spain) Participants: Five focus groups were held between May 2006 and July 2007. Findings: Quality of care is a complex concept in which a number of independent core features can be identified. We have grouped these core features into three basic categories. Safety: the hospital and its technological facilities, and the technical expertise of health professionals. The other two main pillars of quality of care are the human dimension of the relationship between the carers and the patient, and finally the structural aspects that determine the context in which the heath care is provided. Key conclusions and implications for practice: The mothers of our study feel satisfied with healthcare technology and view it as a source of security; technology become indispensable features in order to reduce the anxiety provoked by the perceived lack of confidence in their ability as mothers. In this study, women, both during pregnancy and especially when giving birth, believe their feelings and values should be understood by professionals, from whom they seek empathy and a personal commitment, and not just information.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Peer-reviewed

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Security issues in telecommunication networks have become more important due to the development of the industry. The number of network elements and services has increased in the radio network as in the core network side, which has increased the number of security related issues. Ericsson has developed an OSS-RC product for operation and maintenance porpoises into the telecommunication networks. OSS-RC is used in a number of telecommunications operators, which have Ericsson's products used in their telecommunication networks. Ericsson provides product installation and maintenance support and guidance, but despite this, the product may have security related issues, either due to lack of following the instructions, human error or defect in the product itself or in a third party products attached. Ericsson’s Operation and Maintenance Security Service for OSS-RC networks aims to provide tools for checking the security level of the O&M product so that it meets all requirements and Ericsson’s own security related rules. Each customer has a unique telecommunications network structure and services, and so the security service has to be to create individually depending on the customer. The purpose of this thesis is to define the basic instructions for creating the security service for different customers.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The structural change of society from product-based business to service- and further to need-based business has caused the fact that work for environmental issues has spread from conventional factories and environmentally harmful production to concern services and offices as well. Almost every company has an office, so a relatively small environmental burden caused by an individual office grows remarkable already at the state level and globally even more. Motivation to work for environmental issues in an individual office could be challenging even without the fact that wasted environmental impacts bound also wasted costs. Besides cost savings, a concretely greener image of a company has its value in the B2Cas well as in the B2B-field. Consumers and clients are more and more conscious of environmental issues and demand concrete actions instead of speeches, good thoughts and meaningless certifications. Internal work for environmental issues at a strategy level is not sufficient, so operational environmental management is needed for changing old practices. This research is about the effects of operative environmental management on the greening process of an office-based business. The research is outlined to concern the operative work in the office including field sales. Target was to concretely lower the environmental impacts of Lyreco Finland and to find cost savings directly by changing the operative practices in the office and also indirectly by affecting the level of environmental knowledge of the personnel. During the greening process, the aim was also to create concrete arguments for marketing as well. The circle of greening process, which was especially created for this diploma work, was used as a method. The circle divides a year to themes and sections separated by factors of environmental impacts. Separation is based on Brett Wills’ thoughts of seven green wastes (Wills, Brett. The Green Intensions. 2009) and follows it uneasily. The circle aimed at ensuring evolutionary growth of knowledge instead of being revolutionary in the changing process. Committing personnel to the process from its start by asking ideas from them and giving them clear directions was an important part of the research of operative management. Because of working from distance, communication with personnel was operated by frequent training days and weekly greening notes via emails and intranet. Also availability for communication was an important task because of the telecommuting. Research results of this work show that operative environmental management in an officebased business today is mostly management of change. When the strategic environmental friendliness is taken into a concrete level, the most important individual factor is motivating the operating personnel. Research shows that evolutionary change is found being an efficient way to make a change. Also understanding one´s own impact on the environmental burden and on the whole greening process clearly motivates the personnel. Results show that in the operative realization of the greening process, clear directions of new working practices, being as concrete as possible, and committing personnel to follow them make the process more effective. The operative environmental management and the cycle of the greening process decrease the environmental burden and save costs. The concrete results could be used as believable arguments in marketing and therefore exploited in communication with interest groups. Commitment of the management is also one of the key factors of success in the greening process. In this research, changes in the business field by a company trade took the focus of the management away from the greening process and made the process more inefficient by decreasing the amount of training days. The circle of greening process will be used as a tool in the future, as well, and therefore it will help observe environmental impacts of a company and increase sustainable development. Commitment of management to the evolutionary environmental work helps the operating personnel lower environmental impacts, decrease costs and build a concretely greener image.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Increase of computational power and emergence of new computer technologies led to popularity of local communications between personal trusted devices. By-turn, it led to emergence of security problems related to user data utilized in such communications. One of the main aspects of the data security assurance is security of software operating on mobile devices. The aim of this work was to analyze security threats to PeerHood, software intended for performing personal communications between mobile devices regardless of underlying network technologies. To reach this goal, risk-based software security testing was performed. The results of the testing showed that the project has several security vulnerabilities. So PeerHood cannot be considered as a secure software. The analysis made in the work is the first step towards the further implementation of PeerHood security mechanisms, as well as taking into account security in the development process of this project.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Objective: this study aims to explore the experience of Brazilian surgeons on Unintentionally Retained Foreign Bodies (RFB) after surgical procedures. Methods: A questionnaire was sent to surgeons by electronic mail, between March and July 2012. The questions analyzed their experience with foreign bodies (FB), foreign bodies' types, clinical manifestations, diagnoses, risk factors and legal implications. Results: in the 2872 eligible questionnaires, 43% of the surgeons asserted that they had already left FB and 73% had removed FB in one or more occasions, totalizing 4547. Of these foreign bodies, 90% were textiles, 78% were discovered in the first year and 14% remained asymptomatic. Among doctors with less than five years after graduation, 36% had already left a FB. The most frequently surgical procedures mentioned were the elective (57%) and routine (85%) ones. Emergency (26%), lack of counting (25%) and inadequate conditions of work contributed (12.5%) to the occurrence. In 46% of the cases patients were alerted about the FB, and 26% of them sued the doctors or the institution. Conclusions: challenging medical situations, omission of security protocols and inadequate work conditions contributed to RFB. However, RFB occurs mostly in routine procedures such as cesarean or cholecystectomy, and at the beginning of the professional career, highlighting, particularly in poorest countries, the need for primary prevention. Textiles predominated causing clinical repercussions and they were diagnosed in the first postoperative months. Surgeons were sued in 11.3% of the RFB cases.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The political environment of security and defence has changed radically in the Western industrialised world since the Cold War. As a response to these changes, since the beginning of the twenty-first century, most Western countries have adopted a ‘capabilities-based approach’ to developing and operating their armed forces. More responsive and versatile military capabilities must be developed to meet the contemporary challenges. The systems approach is seen as a beneficial means of overcoming traps in resolving complex real -world issues by conventional thinking. The main objectives of this dissertation are to explore and assess the means to enhance the development of military capabilities both in concept development and experimentation (CD&E) and in national defence materiel collaboration issues. This research provides a unique perspective, a systems approach, to the development areas of concern in resolving complex real-world issues. This dissertation seeks to increase the understanding of the military capability concept both as a whole and with in its life cycle. The dissertation follows the generic functionalist systems methodology by Jackson. The methodology applies a comprehensive set of constitutive rules to examine the research objectives. This dissertation makes contribution to current studies about military capability. It presents two interdepen dent conceptual capability models: the comprehensive capability meta-model (CCMM) and the holistic capability life cycle model (HCLCM). These models holistically and systematically complement the existing, but still evolving, understanding of military capability and its life cycle. In addition, this dissertation contributes to the scientific discussion of defence procurement in its broad meaning by introducing the holistic model about the national defence materiel collaboration between the defence forces, defence industry and academia. The model connects the key collaborative mechanisms, which currently work in isolation from each other, and take into consideration the unique needs of each partner. This dissertation contributes empirical evidence regarding the benefits of enterprise architectures (EA) to CD&E. The EA approach may add value to traditional concept development by increasing the clarity, consistency and completeness of the concept. The most important use considered for EA in CD&E is that it enables further utilisation of the concept created in the case project.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Cyber security is one of the main topics that are discussed around the world today. The threat is real, and it is unlikely to diminish. People, business, governments, and even armed forces are networked in a way or another. Thus, the cyber threat is also facing military networking. On the other hand, the concept of Network Centric Warfare sets high requirements for military tactical data communications and security. A challenging networking environment and cyber threats force us to consider new approaches to build security on the military communication systems. The purpose of this thesis is to develop a cyber security architecture for military networks, and to evaluate the designed architecture. The architecture is described as a technical functionality. As a new approach, the thesis introduces Cognitive Networks (CN) which are a theoretical concept to build more intelligent, dynamic and even secure communication networks. The cognitive networks are capable of observe the networking environment, make decisions for optimal performance and adapt its system parameter according to the decisions. As a result, the thesis presents a five-layer cyber security architecture that consists of security elements controlled by a cognitive process. The proposed architecture includes the infrastructure, services and application layers that are managed and controlled by the cognitive and management layers. The architecture defines the tasks of the security elements at a functional level without introducing any new protocols or algorithms. For evaluating two separated method were used. The first method is based on the SABSA framework that uses a layered approach to analyze overall security of an organization. The second method was a scenario based method in which a risk severity level is calculated. The evaluation results show that the proposed architecture fulfills the security requirements at least at a high level. However, the evaluation of the proposed architecture proved to be very challenging. Thus, the evaluation results must be considered very critically. The thesis proves the cognitive networks are a promising approach, and they provide lots of benefits when designing a cyber security architecture for the tactical military networks. However, many implementation problems exist, and several details must be considered and studied during the future work.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

An Autonomous Mobile Robot battery driven, with two traction wheels and a steering wheel is being developed. This Robot central control is regulated by an IPC, which controls every function of security, steering, positioning localization and driving. Each traction wheel is operated by a DC motor with independent control system. This system is made up of a chopper, an encoder and a microcomputer. The IPC transmits the velocity values and acceleration ramp references to the PIC microcontrollers. As each traction wheel control is independent, it's possible to obtain different speed values for each wheel. This process facilities the direction and drive changes. Two different strategies for speed velocity control were implemented; one works with PID, and the other with fuzzy logic. There were no changes in circuits and feedback control, except for the PIC microcontroller software. Comparing the two different speed control strategies the results were equivalent. However, in relation to the development and implementation of these strategies, the difficulties were bigger to implement the PID control.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

An investor can either conduct independent analysis or rely on the analyses of others. Stock analysts provide markets with expectations regarding particular securities. However, analysts have different capabilities and resources, of which investors are seldom cognizant. The local advantage refers to the advantage stemming from cultural or geographical proximity to securities analyzed. The research has confirmed that local agents are generally more accurate or produce excess returns. This thesis tests the investment value of the local advantage regarding Finnish stocks via target price data. The empirical section investigates the local advantage from several aspects. It is discovered that local analysts were more focused on certain sectors generally located close to consumer markets. Market reactions to target price revisions were generally insignificant with the exception to local positive target prices. Both local and foreign target prices were overly optimistic and exhibited signs of herding. Neither group could be identified as a leader or follower of new information. Additionally, foreign price change expectations were more in line with the quantitative models and ideas such as beta or return mean reversion. The locals were more accurate than foreign analysts in 5 out of 9 sectors and vice versa in one. These sectors were somewhat in line with coverage decisions and buttressed the idea of local advantage stemming from proximity to markets, not to headquarters. The accuracy advantage was dependent on sample years and on the measure used. Local analysts ranked magnitudes of price changes more accurately in optimistic and foreign analysts in pessimistic target prices. Directional accuracy of both groups was under 50% and target prices held no linear predictive power. Investment value of target prices were tested by forming mean-variance efficient portfolios. Parallel to differing accuracies in the levels of expectations foreign portfolio performed better when short sales were allowed and local better when disallowed. Both local and non-local portfolios performed worse than a passive index fund, albeit not statistically significantly. This was in line with previously reported low overall accuracy and different accuracy profiles. Refraining from estimating individual stock returns altogether produced statistically significantly higher Sharpe ratios compared to local or foreign portfolios. The proposed method of testing the investment value of target prices of different groups suffered from some inconsistencies. Nevertheless, these results are of interest to investors seeking the advice of security analysts.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The number of security violations is increasing and a security breach could have irreversible impacts to business. There are several ways to improve organization security, but some of them may be difficult to comprehend. This thesis demystifies threat modeling as part of secure system development. Threat modeling enables developers to reveal previously undetected security issues from computer systems. It offers a structured approach for organizations to find and address threats against vulnerabilities. When implemented correctly threat modeling will reduce the amount of defects and malicious attempts against the target environment. In this thesis Microsoft Security Development Lifecycle (SDL) is introduced as an effective methodology for reducing defects in the target system. SDL is traditionally meant to be used in software development, principles can be however partially adapted to IT-infrastructure development. Microsoft threat modeling methodology is an important part of SDL and it is utilized in this thesis to find threats from the Acme Corporation’s factory environment. Acme Corporation is used as a pseudonym for a company providing high-technology consumer electronics. Target for threat modeling is the IT-infrastructure of factory’s manufacturing execution system. Microsoft threat modeling methodology utilizes STRIDE –mnemonic and data flow diagrams to find threats. Threat modeling in this thesis returned results that were important for the organization. Acme Corporation now has more comprehensive understanding concerning IT-infrastructure of the manufacturing execution system. On top of vulnerability related results threat modeling provided coherent views of the target system. Subject matter experts from different areas can now agree upon functions and dependencies of the target system. Threat modeling was recognized as a useful activity for improving security.