989 resultados para PROACTIVE APPROACH


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Navigational safety analysis relying on collision statistics is often hampered because of low number of observations. A promising alternative approach that overcomes this problem is proposed in this paper. By analyzing critical vessel interactions this approach proactively measures collision risk in port waters. The proposed method is illustrated for quantitative measurement of collision risks in Singapore port fairways, and validated by examining correlations between the measured risks with those perceived by pilots. This method is an ethically appealing alternative to the collision-based analysis for fast, reliable and effective safety assessment, thus possesses great potential for managing collision risks in port waters.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This work project was conducted under a Direct Research internship (DRI) that consists on an individual dissertation established on a given organization. DRI has a problem solving format to an empirical question to be addressed, «Which country has the highest potential for the next step of XY internationalization process? ». In order to achieve the project’s purpose, it was conducted a scanning process using a top-down approach over an initial list of nine countries given by XY. To do so it was developed an international scanning framework based on different domains and weights that allowed to achieve the top two countries with highest potential. After an in depth analysis over the final set, it was recommended Switzerland as the best country to make the next step of XY internationalization in Europe.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system resources like the databases and the operating systems from the attacks of the unknown outsiders. Our approach plays a major role in detecting and managing vulnerabilities in complex computing systems. It allows enterprises to assess two primary tiers through a single interface as a vulnerability scanner tool which provides a secure system which is also compatible with the security compliance of the industry. It provides an overall view of the vulnerabilities in the database, by automatically scanning them with minimum overhead. It gives a detailed view of the risks involved and their corresponding ratings. Based on these priorities, an appropriate mitigation process can be implemented to ensure a secured system. The results show that our approach could effectively optimize the time and cost involved when compared to the existing systems

Relevância:

70.00% 70.00%

Publicador:

Resumo:

This paper presents a proactive approach to load sharing and describes the architecture of a scheme, Concert, based on this approach. A proactive approach is characterized by a shift of emphasis from reacting to load imbalance to avoiding its occurrence. In contrast, in a reactive load sharing scheme, activity is triggered when a processing node is either overloaded or underloaded. The main drawback of this approach is that a load imbalance is allowed to develop before costly corrective action is taken. Concert is a load sharing scheme for loosely-coupled distributed systems. Under this scheme, load and task behaviour information is collected and cached in advance of when it is needed. Concert uses Linux as a platform for development. Implemented partially in kernel space and partially in user space, it achieves transparency to users and applications whilst keeping the extent of kernel modifications to a minimum. Non-preemptive task transfers are used exclusively, motivated by lower complexity, lower overheads and faster transfers. The goal is to minimize the average response-time of tasks. Concert is compared with other schemes by considering the level of transparency it provides with respect to users, tasks and the underlying operating system.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Both lifestyle and geography make the delivery of consumer health information in the rural setting unique. The Planetree Health Resource Center in The Dalles, Oregon, has served the public in a rural setting for the past eight years. It is a community-based consumer health library, affiliated with a small rural hospital, Mid-Columbia Medical Center. One task of providing consumer health information in rural environments is to be in relationship with individuals in the community. Integration into community life is very important for credibility and sustainability. The resource center takes a proactive approach and employs several different outreach efforts to deepen its relationship with community members. It also works hard to foster partnerships for improved health information delivery with other community organizations, including area schools. This paper describes Planetree Health Resource Center's approach to rural outreach.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Research into complaints handling in the health care system has predominately focused on examining the processes that underpin the organisational systems. An understanding of the cognitive decisions made by patients that influence whether they are satisfied or dissatisfied with the care they are receiving has had limited attention thus far. This study explored the lived experiences of Queensland acute care patients who complained about some aspect of their inpatient stay. A purposive sample of sixteen participants was recruited and interviewed about their experience of making a complaint. The qualitative data gathered through the interview process was subjected to an Interpretative Phenomenological Analysis (IPA) approach, guided by the philosophical influences of Heidegger (1889-1976). As part of the interpretive endeavour of this study, Lazarus’ cognitive emotive model with situational challenge was drawn on to provide a contextual understanding of the emotions experienced by the study participants. Analysis of the research data, aided by Leximancer™ software, revealed a series of relational themes that supported the interpretative data analysis process undertaken. The superordinate thematic statements that emerged from the narratives via the hermeneutic process were ineffective communication, standards of care were not consistent, being treated with disrespect, information on how to complain was not clear, and perceptions of negligence. This study’s goal was to provide health services with information about complaints handling that can help them develop service improvements. The study patients articulated the need for health care system reform; they want to be listened to, to be acknowledged, to be believed, for people to take ownership if they had made a mistake, for mistakes not to occur again, and to receive an apology. For these initiatives to be fully realised, the paradigm shift must go beyond regurgitating complaints data metrics in percentages per patient contact, towards a concerted effort to evaluate what the qualitative complaints data is really saying. An opportunity to identify a more positive and proactive approach in encouraging our patients to complain when they are dissatisfied has the potential to influence improvements.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Six sigma has proven itself as a major quality initiative in the last two decades. It is a philosophy which provides a systematic approach to applying numerous tools in the framework of several quality improvement methodologies. The most widely used six sigma methodology is DMAIC, which is best suited for improving existing processes. In order to build quality into the product or service, a proactive approach like Design for Six Sigma (DFSS) is required. This paper provides an overview of DFSS, product innovation, and service innovation. The emphasis is on comparing how DFSS is applied differently in product and service innovation. This paper contributes by analysing the existing literature on DFSS in product and service innovation. The major findings are that the DFSS approach in services and products can be differentiated along the following three dimensions: methodology, characteristics, and technology.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Online fraud poses a significant problem to society in terms of its monetary losses and the devastating impact on victims. It also poses significant challenges to law enforcement agencies, regarding their ability to investigate crimes which are complex, occur in a virtual environment, incorporate multiple (often international) jurisdictions, and have a very low reporting rate. This paper examines the police response to online fraud. It argues that traditionally, fraud has received little attention and priority from police agencies and this is exacerbated in the online context. In contrast to this, the paper presents the example of Project Sunbird, a partnership between the West Australian Police and the West Australian Department of Commerce which has embraced the use of financial intelligence to proactively contact suspected victims of online fraud. This paper argues that a proactive approach to policing online fraud can have substantial positive effects for police and victims alike.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Malicious software (malware) have significantly increased in terms of number and effectiveness during the past years. Until 2006, such software were mostly used to disrupt network infrastructures or to show coders’ skills. Nowadays, malware constitute a very important source of economical profit, and are very difficult to detect. Thousands of novel variants are released every day, and modern obfuscation techniques are used to ensure that signature-based anti-malware systems are not able to detect such threats. This tendency has also appeared on mobile devices, with Android being the most targeted platform. To counteract this phenomenon, a lot of approaches have been developed by the scientific community that attempt to increase the resilience of anti-malware systems. Most of these approaches rely on machine learning, and have become very popular also in commercial applications. However, attackers are now knowledgeable about these systems, and have started preparing their countermeasures. This has lead to an arms race between attackers and developers. Novel systems are progressively built to tackle the attacks that get more and more sophisticated. For this reason, a necessity grows for the developers to anticipate the attackers’ moves. This means that defense systems should be built proactively, i.e., by introducing some security design principles in their development. The main goal of this work is showing that such proactive approach can be employed on a number of case studies. To do so, I adopted a global methodology that can be divided in two steps. First, understanding what are the vulnerabilities of current state-of-the-art systems (this anticipates the attacker’s moves). Then, developing novel systems that are robust to these attacks, or suggesting research guidelines with which current systems can be improved. This work presents two main case studies, concerning the detection of PDF and Android malware. The idea is showing that a proactive approach can be applied both on the X86 and mobile world. The contributions provided on this two case studies are multifolded. With respect to PDF files, I first develop novel attacks that can empirically and optimally evade current state-of-the-art detectors. Then, I propose possible solutions with which it is possible to increase the robustness of such detectors against known and novel attacks. With respect to the Android case study, I first show how current signature-based tools and academically developed systems are weak against empirical obfuscation attacks, which can be easily employed without particular knowledge of the targeted systems. Then, I examine a possible strategy to build a machine learning detector that is robust against both empirical obfuscation and optimal attacks. Finally, I will show how proactive approaches can be also employed to develop systems that are not aimed at detecting malware, such as mobile fingerprinting systems. In particular, I propose a methodology to build a powerful mobile fingerprinting system, and examine possible attacks with which users might be able to evade it, thus preserving their privacy. To provide the aforementioned contributions, I co-developed (with the cooperation of the researchers at PRALab and Ruhr-Universität Bochum) various systems: a library to perform optimal attacks against machine learning systems (AdversariaLib), a framework for automatically obfuscating Android applications, a system to the robust detection of Javascript malware inside PDF files (LuxOR), a robust machine learning system to the detection of Android malware, and a system to fingerprint mobile devices. I also contributed to develop Android PRAGuard, a dataset containing a lot of empirical obfuscation attacks against the Android platform. Finally, I entirely developed Slayer NEO, an evolution of a previous system to the detection of PDF malware. The results attained by using the aforementioned tools show that it is possible to proactively build systems that predict possible evasion attacks. This suggests that a proactive approach is crucial to build systems that provide concrete security against general and evasion attacks.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Public procurement is a potential lever for ensuring greater attention is given to ensuring minimum standards and effective employment rights in the workplace. Public sector purchasers may encourage or require private sector employers from whom they buy to adopt a proactive approach to ensuring fairness at work, focusing on organisational changes that the employer could make. This chapter explores whether and how far public procurement does, or could, influence whether – and how much – employment rights have an impact on employer policy and practice. It considers what public procurement offers as a strategy and what factors help to determine its effectiveness.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Purpose The success of measures to reduce long-term sickness absence (LTSA) in public sector organisations is contingent on organisational context. This realist evaluation investigates how interventions interact with context to influence successful management of LTSA. Methods Multi-method case study in three Health and Social Care Trusts in Northern Ireland comprising realist literature review, semi-structured interviews (61 participants), Process-Mapping and feedback meetings (59 participants), observation of training, analysis of documents. Results Important activities included early intervention; workplace-based occupational rehabilitation; robust sickness absence policies with clear trigger points for action. Used appropriately, in a context of good interpersonal and interdepartmental communication and shared goals, these are able to increase the motivation of staff to return to work. Line managers are encouraged to take a proactive approach when senior managers provide support and accountability. Hindering factors: delayed intervention; inconsistent implementation of policy and procedure; lack of resources; organisational complexity; stakeholders misunderstanding each other’s goals and motives. Conclusions Different mechanisms have the potential to encourage common motivations for earlier return from LTSA, such as employees feeling that they have the support of their line manager to return to work and having the confidence to do so. Line managers’ proactively engage when they have confidence in the support of seniors and in their own ability to address LTSA. Fostering these motivations calls for a thoughtful, diagnostic process, taking into account the contextual factors (and whether they can be modified) and considering how a given intervention can be used to trigger the appropriate mechanisms.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Il existe une nouvelle catégorie de technologie, les vaccins dérivés de plantes («VDPs»), qui englobe des produits qui ont un grand potentiel pour l’amélioration de la santé à l’échelle globale. Bien qu’ils ne soient pas encore disponibles pour le public, le développement des VDPs a progressé de façon telle qu’ils devraient être prêts à être mis en marché et distribués sous peu. Ainsi, c’est le moment idéal pour lancer un débat sur la meilleure façon de protéger cette nouvelle catégorie de technologie. Vu leur nature, les VDPs ne se qualifient pas parfaitement pour aucune forme de protection de propriété intellectuelle. En effet, un VDP est à la fois une variété de plante, une biotechnologie, un médicament et un produit qui vise spécifiquement les besoins de pays en voie de développement. Chacune de ces caractéristiques soulève ses propres problématiques en ce qui a trait à la propriété intellectuelle. C’est pourquoi il appert difficile d’identifier la forme de protection la plus adéquate et appropriée pour les VDPs. Cet article traite de la nature d’un VDP, des différentes catégories dans lesquelles il pourrait être classé, des différents types de systèmes de protection de propriété intellectuelle auxquels il pourrait être éligible ainsi que des problèmes qui pourraient être soulevés par tous ces éléments. Ces discussions visent à mettre l’accent sur le fait que nous avons affaire à une toute nouvelle catégorie d’innovation technologique. L’auteure est donc d’avis qu’une approche proactive est nécessaire pour discuter d’un système de protection de propriété intellectuelle en relation avec les VDPs. En ce moment, c’est l’inventeur qui choisi comment il protègera son invention. Les moyens employés par ce dernier pourraient être subséquemment modifiés ou annulés par une décision judiciaire mais comme plusieurs autres inventeurs d’une même catégorie de technologie auront probablement déjà adopté une stratégie de protection similaire, ce type de mesures judiciaire, très tard dans le processus, pourra avoir des résultats néfastes sur les détenteurs de droits. Le développement de lignes directrices d’entrée de jeu, avec l’aide d’un panel d’experts de préférence, peut contribuer à éviter les situations de confusion qui ont déjà été vécues avec l’application d’autres nouvelles technologies et qui devraient servir de leçon pour l’encadrement des VDPs.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

With increasing emphasis being placed on concentrating development in urban areas and improving the quality of life in British cities and towns, the importance of accommodating necessary development without compromising the valued heritage and architectural quality of urban areas is now becoming central to sustainable urban development. Urban conservation policy and practice has the potential to contribute to this and other aspects of sustainability. This paper explores this contribution and develops an analytical framework which draws out the key linkages between conservation area policy and sustainable development. The framework is then used to research the potential and actual contribution of urban conservation policy and practice in England, using a selective survey and two case studies (i.e. Winchester and Basingstoke). The main conclusions from the research are that: Conservation area policy can make a significant contribution to the principles of sustainable development; Most local planning authorities in England have not fully woken-up to this potential and have not developed policies or practices to address it; and Urban conservation policy needs to develop a more proactive approach in which local planning authorities actively guide and encourage new development with regard to use, design, layout, methods of construction, materials and energy efficiency.