998 resultados para Secure base
Resumo:
Dissertação de Mestrado apresentada ao ISPA - Instituto Universitário
Resumo:
Dissertação apresentada à Escola Superior de Educação de Lisboa para obtenção do grau de mestre em Ciências da Educação - Especialidade Intervenção Precoce
Resumo:
Institutional rearing adversely affects children’s development, but the extent to which specific characteristics of the institutional context and the quality of care provided contribute to problematic development remains unclear. In this study, 72 preschoolers institutionalised for at least 6 months were evaluated by their caregiver using the Child Behavior Checklist and the Disturbances of Attachment Interview. Distal and proximate indices of institutional caregiving quality were assessed using both staff reports and direct observation. Results revealed that greater caregiver sensitivity predicted reduced indiscriminate behaviour and secure-base distortions. A closer relationship with the caregiver predicted reduced inhibited attachment behaviour. Emotional and behavioural problems proved unrelated to caregiving quality. Results are discussed in terms of (non)-shared caregiving factors that influence institutionalised children’s development.
Resumo:
This study was designed to assess sex-related differences in the selection of an appropriate strategy when facing novelty. A simple visuo-spatial task was used to investigate exploratory behavior as a specific response to novelty. The exploration task was followed by a visual discrimination task, and the responses were analyzed using signal detection theory. During exploration women selected a local searching strategy in which the metric distance between what is already known and what is unknown was reduced, whereas men adopted a global strategy based on an approximately uniform distribution of choices. Women's exploratory behavior gives rise to a notion of a secure base warranting a sense of safety while men's behavior does not appear to be influenced by risk. This sex-related difference was interpreted as a difference in beliefs concerning the likelihood of uncertain events influencing risk evaluation. Keywords: exploration, spontaneous strategies, sex differences, decision-making.
Resumo:
In this study, the influence of paternal involvement in caregiving on infant sociability was assessed using a strange situation paradigm adapted from the work of Ainsworth, Blehar, Waters, and Wall (1978). Thirty-seven families participated with their firstborn child (aged 12-14 months). According to the questionnaire, 20 nontraditional fathers were very involved in caretaking, and 17 fathers were less or not at all involved. Infant sociability was assessed using three of Ainsworth et al.'s rating scales: proximity or contact-seeking, avoidance, and distance interaction. Results indicated that infants of nontraditional fathers were globally more sociable with all their partners (father, mother, and stranger) than infants of traditional fathers. Furthermore, results suggested that it was not only the father-infant relationship or infant development which were affected by the amount of paternal involvement in daily caretaking but the family system as a whole. Indeed, infants from nontraditional families appeared to interact equally with their fathers and mothers in direct interaction. In addition, these infants interacted at a distance with a stranger as much in the presence of their fathers as in the presence of their mothers, thereby suggesting that both parents represented an equally secure base.
Resumo:
When we look to perform a work for developing a framework to create a business and take it correctly, there are always some persons looking as a challenge those bases and finding a mistake. The way to work in these situations is not a matter of law, is a matter of devoting time to identify these situations. It is always said that the evil goes a step ahead. The business ethics have been altered for quite time by some would-be entrepreneurs. These people have learned to play with business ethics to show your business as prosperous as something that is sought to highlight and adulterate their results quickly. Once the company reaches an international dimension, many companies take on global responsibility and, in these cases where you can see if the objective has been to obtain a rapid capital increase or growth is in line with its proportions. A business ethics is based on establishing a strong base so that interest is encouraged from an early time. Good staff, organizational level should be achieved and not only at the company but, out of the company too. Thus, you can create a secure base to convince potential investors and employees about the business. There are no freeways in business ethics and all fast track can be or a genius or leads to failure. We must find where these jumps are occurring, such errors or corrections to business ethics and their rules. Thus we can differentiate a company or an entrepreneur who is working correctly from the cloaking. Starting from the basics of business ethics and studying the different levels from the personal to the prospect that the company shows in the world. Lets see where these changes are occurring and how we can fight against them and anticipate the market to possible cases of fraud or strange movements seeking to attract the unwary
Resumo:
Pain self-efficacy and anxiety have each been shown to contribute substantially to pain intensity and pain-related disability. Although adult attachment theory has been related separately to chronic pain, anxiety, and self-efficacy, it has not before been investigated with either pain self-efficacy or anxiety in the context of chronic pain. This study investigated the interrelations between these aspects of the chronic pain experience and their relative contributions towards pain intensity and disability. A clinical sample of 152 chronic pain patients participated in this study, completing self-report measures of attachment, self-efficacy, pain intensity, and disability, prior to attending a multidisciplinary pain clinic. Results revealed that fearful and preoccupied (anxious) attachment categories were associated with low pain self-efficacy, while high scores on the attachment dimension of comfort with closeness were linked with high pain self-efficacy, particularly for males. Insecure attachment (whether defined in terms of categories or dimensions) was related to higher levels of anxiety. Pain self-efficacy proved a stronger predictor of pain intensity than did anxiety and was a stronger predictor of disability than pain intensity or anxiety. In addition, comfort with closeness moderated the associations between pain self-efficacy and disability, pain self-efficacy and pain intensity, and anxiety and disability. Together, these findings support the value of adopting an attachment theoretical approach in the context of chronic pain. Treatment considerations and future research directions are considered. (c) 2006 International Association for the Study of Pain. Published by Elsevier B.V. All rights reserved.
Resumo:
This qualitative study used grounded theory methods and purposeful sampling to explore perceptions on caring and being cared-for. Twenty-four adolescent male participants, identified as at-risk for school failure, completed a two phase interview process exploring these phenomena within three relationships; the relationship with the friend, with the most caring person they knew and with the teacher they felt cared for them. ^ Each participant was asked a predetermined set of open questions in an initial semi-structured interview. In addition each participant was encouraged to explore his own reflections on caring. A second interview allowed for member checking and for the participant to continue sharing his meaning of caring and being cared-for. ^ Line by line analysis with open, axial and selective coding was applied to interview transcripts along with a constant comparative method. Results indicated that the core category integrating all other categories was attachment bonding. Participants' stories manifested characteristics of proximity seeking, secure base, safe haven and distress upon involuntary separation from an attachment figure. ^ Strategies facilitating attachment bonding were influenced by the power positions of the relational players. Participants responded positively to the one-caring when they felt cared-for. Results further indicated that participants did not need to feel a sense of belonging in order to feel cared-for. Teacher behaviors indicating openness for authentic connections with students were specific to teacher's friendliness and professional competence. Teachers who nurtured feelings of being cared-for were uncommon in the participants' educational experience. ^ The number of adolescent males leaving high school prematurely is both a personal problem and a social problem. Despite a “mask” of indifference often exhibited by adolescent males at-risk for school failure, teachers might consider the social/emotional needs of these students when implementing the curriculum. In addition, policy makers might consider the social/emotional needs of this vulnerable population when developing programs meant to foster psychological well-being and connectedness for adolescent males at-risk for school failure. ^
Resumo:
Dissertação de Mestrado apresentada ao Instituto Superior de Psicologia Aplicada para obtenção de grau de Mestre na especialidade de Psicologia Clínica.
Resumo:
Dissertação de Mestrado apresentada no ISPA – Instituto Universitário para obtenção do grau de Mestre em Psicologia especialidade de Psicologia Clínica.
Resumo:
Dissertação de Mestrado apresentada no ISPA – Instituto Universitário para obtenção do grau de Mestre em Psicologia especialidade de Psicologia Clínica.
Resumo:
Mobile devices have become ubiquitous, allowing the integration of new information from a large range of devices. However, the development of new applications requires a powerful framework which simplifies their construction. JXME is the JXTA implementation for mobile devices using J2ME, its main value being its simplicity when creating peer-to-peer (P2P) applications on limited devices. On that regard, an issue that is becoming veryimportant in the recent times is being able to provide a security baseline to such applications. This paper analyzes the currentstate of security in JXME and proposes a simple security mechanism in order to protect JXME applications against a broad range of vulnerabilities.
Resumo:
Wireless Sensor Networks (WSN) are formed by nodes with limited computational and power resources. WSNs are finding an increasing number of applications, both civilian and military, most of which require security for the sensed data being collected by the base station from remote sensor nodes. In addition, when many sensor nodes transmit to the base station, the implosion problem arises. Providing security measures and implosion-resistance in a resource-limited environment is a real challenge. This article reviews the aggregation strategies proposed in the literature to handle the bandwidth and security problems related to many-to-one transmission in WSNs. Recent contributions to secure lossless many-to-one communication developed by the authors in the context of several Spanish-funded projects are surveyed. Ongoing work on the secure lossy many-to-one communication is also sketched.
Resumo:
Il y a des problemes qui semblent impossible a resoudre sans l'utilisation d'un tiers parti honnete. Comment est-ce que deux millionnaires peuvent savoir qui est le plus riche sans dire a l'autre la valeur de ses biens ? Que peut-on faire pour prevenir les collisions de satellites quand les trajectoires sont secretes ? Comment est-ce que les chercheurs peuvent apprendre les liens entre des medicaments et des maladies sans compromettre les droits prives du patient ? Comment est-ce qu'une organisation peut ecmpecher le gouvernement d'abuser de l'information dont il dispose en sachant que l'organisation doit n'avoir aucun acces a cette information ? Le Calcul multiparti, une branche de la cryptographie, etudie comment creer des protocoles pour realiser de telles taches sans l'utilisation d'un tiers parti honnete. Les protocoles doivent etre prives, corrects, efficaces et robustes. Un protocole est prive si un adversaire n'apprend rien de plus que ce que lui donnerait un tiers parti honnete. Un protocole est correct si un joueur honnete recoit ce que lui donnerait un tiers parti honnete. Un protocole devrait bien sur etre efficace. Etre robuste correspond au fait qu'un protocole marche meme si un petit ensemble des joueurs triche. On demontre que sous l'hypothese d'un canal de diusion simultane on peut echanger la robustesse pour la validite et le fait d'etre prive contre certains ensembles d'adversaires. Le calcul multiparti a quatre outils de base : le transfert inconscient, la mise en gage, le partage de secret et le brouillage de circuit. Les protocoles du calcul multiparti peuvent etre construits avec uniquements ces outils. On peut aussi construire les protocoles a partir d'hypoth eses calculatoires. Les protocoles construits a partir de ces outils sont souples et peuvent resister aux changements technologiques et a des ameliorations algorithmiques. Nous nous demandons si l'efficacite necessite des hypotheses de calcul. Nous demontrons que ce n'est pas le cas en construisant des protocoles efficaces a partir de ces outils de base. Cette these est constitue de quatre articles rediges en collaboration avec d'autres chercheurs. Ceci constitue la partie mature de ma recherche et sont mes contributions principales au cours de cette periode de temps. Dans le premier ouvrage presente dans cette these, nous etudions la capacite de mise en gage des canaux bruites. Nous demontrons tout d'abord une limite inferieure stricte qui implique que contrairement au transfert inconscient, il n'existe aucun protocole de taux constant pour les mises en gage de bit. Nous demontrons ensuite que, en limitant la facon dont les engagements peuvent etre ouverts, nous pouvons faire mieux et meme un taux constant dans certains cas. Ceci est fait en exploitant la notion de cover-free families . Dans le second article, nous demontrons que pour certains problemes, il existe un echange entre robustesse, la validite et le prive. Il s'effectue en utilisant le partage de secret veriable, une preuve a divulgation nulle, le concept de fantomes et une technique que nous appelons les balles et les bacs. Dans notre troisieme contribution, nous demontrons qu'un grand nombre de protocoles dans la litterature basee sur des hypotheses de calcul peuvent etre instancies a partir d'une primitive appelee Transfert Inconscient Veriable, via le concept de Transfert Inconscient Generalise. Le protocole utilise le partage de secret comme outils de base. Dans la derniere publication, nous counstruisons un protocole efficace avec un nombre constant de rondes pour le calcul a deux parties. L'efficacite du protocole derive du fait qu'on remplace le coeur d'un protocole standard par une primitive qui fonctionne plus ou moins bien mais qui est tres peu couteux. On protege le protocole contre les defauts en utilisant le concept de privacy amplication .
Resumo:
La seguridad agroalimentaria debe ser prioridad para los gobiernos de Brasil y Argentina, debido a que deben garantizar la producción y el abastecimiento de los alimentos básicos para las futuras generaciones, entendido como alimentos básicos aquellos que más se consumen, ya sea en su forma original o por medio de sus subproductos, estos productos son el trigo, el maíz y el arroz. El garantizar la producción y el abastecimiento de estos productos en el corto y largo plazo, implica entender cuáles de los procesos productivos aplicados en la realización de los productos base de alimentación no son compatibles con el medio ambiente, generando impactos negativos sobre este. Estos impactos ambientales generados a partir de la agricultura, son identificados como el uso excesivo de recursos naturales entre ellos el agua, así como su contaminación por agentes toxico como los agroquímicos y fertilizantes. Asimismo, el uso de estos agentes tóxicos, genera la infertilidad de los suelos afectando directamente la producción en el largo plazo. Entender los impactos ambientales, implica desarrollar estrategias transversales que le permitan a los garantizar un desarrollo sostenible a lo largo de todo el ciclo del producto; estas estrategias deben estar acompañadas por un rendimiento y eficiencia de los cultivos, de nada sirve implementar estrategias compatibles con el medio ambiente si no se cumple con el principal objetivo de la producción de estos producto, que es garantizar el abastecimiento y alimentación para las generaciones presentes y futuras.