922 resultados para self-protection against reforms


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter shows that apart from changes at the systemic and institutional levels, successful reform implementation struggles with a gradual change in academic beliefs, attitudes and behaviours. Currently, visions of the university proposed by the Polish academic community and visions of it proposed by Polish reformers and policymakers (within ongoing reforms) are worlds apart. I shall study recent reforms in the context of specific academic self--protective narratives being produced in the last two decades (at the collective level of the academic profession) and in the context of the Ivory Tower university ideals predominant at the individual level (as studied comparatively through a large--scale European survey of the academic profession). Institutions change both swiftly, radically – and slowly, gradually. Research literature on institutional change until recently was focused almost exclusively on the role of radical changes caused by external shocks, leading to radical institutional reconfigurations. And research literature about the gradual, incremental institutional change have been emergent for about a decade and a half now (Mahoney and Thelen 2010; Streeck and Thelen 2005, 2009; Thelen 2003). Polish higher education provides interesting empirical grounds to test institutional theories. Both types of transformations (radical and gradual) may lead to equally permanent changes in the functioning of institutions, equally deep transformations of their fundamental rules, norms and operating procedures. Questions about institutional change are questions about characteristics of institutions undergoing changes. Endogenous institutional change is as important as exogenous change (Mahoney and Thelen 2010: 3). Moments in which there emerge opportunities of performing deep institutional reforms are short (in Poland these moments occurred in 2009-2012), and between them there are long periods of institutional stasis and stability (Pierson 2004: 134-135). The premises of theories of institutional change can be applied systematically to a system of higher education which shows an unprecedented rate of change and which is exposed to broad, fundamental reform programmes. There are many ways to discuss the Kudrycka reforms - and "constructing Polish universities as organizations" (rather than traditional academic "institutions") is one of more promising. In this account, Polish universities are under construction as organizations, and under siege as institutions. They are being rationalized as organizations, following instrumental rather than institutional logics. Polish academics in their views and attitudes are still following an institutional logic, while Polish reforms are following the new (New Public Management-led) instrumental logics. Both are on a collision course about basic values. Reforms and reformees seem to be worlds apart. I am discussing the the two contrasting visions of the university and describing the Kudrycka reforms as the reistitutionalization of the research mission of Polish universities. The core of reforms is a new level of funding and governance - the intermediary one (and no longer the state one), with four new peer-run institutions, with the KEJN, PKA and NCN in the lead. Poland has been beginning to follow the "global rules of the academic game" since 2009. I am also discussing two academic self-protection modes agains reforms: (Polish) "national academic traditions" and "institutional exceptionalism" (of Polish HE). Both discourses prevailed for two decades, none seems socially (and politically) acceptable any more. Old myths do not seem to fit new realities. In this context I am discussing briefly and through large-scale empirical data the low connectedness to the outside world of Polish HE institutions, low influence of the government on HE policies and the low level of academic entrepreneurialism, as seen through the EUROAC/CAP micro-level data. The conclusion is that the Kudrycka reforms are an imporant first step only - Poland is too slow in reforms, and reforms are both underfunded and inconsistent. Poland is still accumulating disadvantages as public funding and university reforms have not reached a critical point. Ever more efforts lead to ever less results, as macro-level data show. Consequently, it may be useful to construct universities as organizations in Poland to a higher degree than elsewhere in Europe, and especially in Western Europe.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Epipolythiodioxopiperazine toxins are secreted by a range of fungi, including Leptosphaeria maculans, which produces sirodesmin, and Aspergillus fumigatus, which produces gliotoxin. The L. maculans biosynthetic gene cluster for sirodesmin includes an ABC transporter gene, sirA. Disruption of this gene led to increased secretion of sirodesmin into the medium and an altered ratio of sirodesmin to its immediate precursor. The transcription pattern of a peptide synthetase that catalyses an early step in sirodesmin biosynthesis was elevated in the sirA mutant by 47% over a 7-day period. This was consistent with the finding that the transporter mutant had elevated sirodesmin levels. Despite increased production of sirodesmin, the sit-A mutant was more sensitive to both sirodesmin and gliotoxin. The putative gliotoxin transporter gene, gliA, (a major facilitator superfamily transporter) from A.fumigatus complemented the tolerance of the L. maculans sirA mutant to gliotoxin, but not to sirodesmin. The results indicate that SirA contributes to self-protection against sirodesmin in L. maculans and suggest a transporter other than SirA is primarily responsible for efflux of endogenously produced sirodesmin. (C) 2004 Elsevier Inc. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A new United States (U.S.) self-supporting low-profile bednet was designed by Walter Reed Army Institute of Research in collaboration with Breakthrough Technologies. The bednet incorporated permethrin-impregnated screening into a frame that erected automatically when removed from its bag. The new U.S. bednet was compared with the current Australian Defense Force (ADF) mosquito bednet at Buka Island, North Solomons Province, Papua New Guinea, in March 1999. At the time of the test, Anopheles farauti Laveran was the most abundant biting mosquito. Both bednet types provided > 97.8% protection compared with an unprotected collector. The untreated U.S. Army prototype bednet provided better protection than the untreated ADF bednet against mosquitoes entering the bednet during the night.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We have investigated the lipid polylysine core peptide (LCP) system as a self-adjuvanting group A streptococcal (GAS) vaccine delivery approach. LCP constructs were synthesised incorporating peptides from the M protein conserved carboxy terminal C-repeat region, the amino terminal type-specific region and from both of these regions. Immunisation with the constructs without adjuvant led to the induction of peptide-specific serum IgG antibody responses, heterologous opsonic antibodies, and complete protection from GAS infection. These data indicate that protective immunity to GAS infection can be evoked using the self-adjuvanting LCP system, and point to the potential application of this system in human mucosal GAS vaccine development. (c) 2005 Elsevier Ltd. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In 1986 the then United States Secretary of State George Shultz asserted that: It is absurd to argue that international law prohibits us from capturing terrorists in international waters or airspace; from attacking them on the soil of other nations, even for the purpose of rescuing hostages; or from using force against states that support, train and harbor terrorists or guerrillas. At that time the United States’ claim of a right to use military force in self-defence against terrorism2 received little support from other states.3 The predominant view then was that terrorist attacks committed by private or non-state actors were a form of criminal activity to be combated through domestic and international criminal justice mechanisms. The notion that such terrorist acts should be treated as ‘armed attacks’ triggering a victim state’s right of self-defence was not accepted by the majority of states. To suggest, as Shultz had done, that a state not directly responsible for terrorist acts could have its territorial integrity violated by military action targeting terrorists located within that state, was a controversial proposition in 1986. However, some fifteen years later, when the United States and a coalition of allies launched a military campaign in Afghanistan following the 11 September 2001 (hereafter ‘9/11’) terrorist attacks, there was virtually unanimous international support for the use of force.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The development of vaccines to combat pathogens that infect across mucosal surfaces has been a major goal of vaccine research. Successful mucosal vaccination requires the co-administration of adjuvants that can overcome the state of immune tolerance normally associated with mucosal application of proteins. In the case of oral immunization, delivery systems are also required to protect vaccine antigens against destruction by gastric pH and digestive enzymes. Furthermore, adjuvants used for mucosal delivery must be free of neurotoxic effects like those induced by the commonly used experimental mucosal adjuvant cholera toxin. Maintenance of the "cold chain" is also essential for the effectiveness of any vaccine and adjuvants/delivery systems that enhance the stability of a vaccine would offer a significant advantage. Needle-free methods of vaccination that induce protective immunity at multiple mucosal surfaces are also desirable for rapid vaccination of large populations. In the present study we show that transcutaneous immunization (TCI) using Lipid C, a novel lipid-based matrix originally developed for oral immunization, containing soluble Helicobacter sonicate significantly reduces the gastric bacterial burden in mice following gastric challenge with live Helicobacter pylori. Protection is associated with the production of splenic gamma interferon and gastric IgA and was achieved without the co-administration of potent and potentially toxic adjuvants, although protection was further enhanced by inclusion of CpG-ODN and cholera toxin in the lipid delivery system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Chlamydia trachomatis is a major cause of sexually transmitted diseases worldwide. There currently is no vaccine to protect against chlamydial infection of the female reproductive tract. Vaccine development has predominantly involved using the murine model, however infection of female guinea pigs with Chlamydia caviae more closely resembles chlamydial infection of the human female reproductive tract, and presents a better model to assess potential human chlamydial vaccines. We immunised female guinea pigs intranasally with recombinant major outer membrane protein (r-MOMP) combined with CpG-10109 and cholera toxin adjuvants. Both systemic and mucosal immune responses were elicited in immunised animals. MOMP-specific IgG and IgA were present in the vaginal mucosae, and high levels of MOMP-specific IgG were detected in the serum of immunised animals. Antibodies from the vaginal mucosae were also shown to be capable of neutralising C. caviae in vitro. Following immunisation, animals were challenged intravaginally with a live C. caviae infection of 102 inclusion forming units. We observed a decrease in duration of infection and a significant (p<0.025) reduction in infection load in r-MOMP immunised animals, compared to animals immunised with adjuvant only. Importantly, we also observed a marked reduction in upper reproductive tract (URT) pathology in r-MOMP immunised animals. Intranasal immunisation of female guinea pigs with r-MOMP was able to provide partial protection against C. caviae infection, not only by reducing chlamydial burden but also URT pathology. This data demonstrates the value of using the guinea pig model to evaluate potential chlamydial vaccines for protection against infection and disease pathology caused by C. trachomatis in the female reproductive tract.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Volunteering is a very important part of life in Australia with an estimated 36% of the adult population volunteering in 2010. Voluntary work generates economic benefits, addresses community needs and develops the social networks that form the backbone of civil society. Without volunteers, many essential services would either cease to exist or become too expensive for many people to afford. These volunteers, who by definition are not in receipt of any remuneration for their work and services, are exposed to personal injury and to legal liability in the discharge of their functions. It is therefore appropriate that statutory protection is extended to volunteers and that volunteer organisations procure public liability and personal accident cover where possible. However, given the patchwork quilt of circumstances where statutory or institutional cover is available to volunteers and the existence of many and diverse exclusions, it is important to have regard also to what scope a volunteer may have to avail themselves of protection against liability for volunteering activity by relying upon their own personal insurance cover. This article considers the extent of private insurance cover and its availability to volunteers under home and contents insurance and under comprehensive motor vehicle insurance. The most common policies in the Australian market are examined and the uncertain nature of protection against liability afforded by these policies is discussed. This uncertainty could be reduced should the Federal Government through amendments to the Insurance Contracts Regulations standardise the circumstances and extent to which liability protection was afforded to an insured holding home and contents insurance and comprehensive motor vehicle insurance cover.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This review examines the multiple levels of pre-existing immunity in the upper and lower female reproductive tract. In addition, we highlight the need for further research of innate and adaptive immune protection of mucosal surfaces in the female reproductive tract. Innate mechanisms include the mucus lining, a tight epithelial barrier and the secretion of antimicrobial peptides and cytokines by epithelial and innate immune cells. Stimulation of the innate immune system also serves to bridge the adaptive arm resulting in the generation of pathogen-specific humoral and cell-mediated immunity. Less understood are the multiple components that act in a coordinated way to provide a network of ongoing protection. Innate and adaptive immunity in the human female reproductive tract are influenced by the stage of menstrual cycle and are directly regulated by the sex steroid hormones, progesterone and estradiol. Furthermore, the effect of hormones on immunity is mediated both directly on immune and epithelial cells and indirectly by stimulating growth factor secretion from stromal cells. The goal of this review is to focus on the diverse aspects of the innate and adaptive immune systems that contribute to a unique network of protection throughout the female reproductive tract.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The immune system in the female reproductive tract (FRT) does not mount an attack against HIV or other sexually transmitted infections (STI) with a single endogenously produced microbicide or with a single arm of the immune system. Instead, the body deploys dozens of innate antimicrobials to the secretions of the female reproductive tract. Working together, these antimicrobials along with mucosal antibodies attack many different viral, bacterial and fungal targets. Within the FRT, the unique challenges of protection against sexually transmitted pathogens coupled with the need to sustain the development of an allogeneic fetus have evolved in such a way that sex hormones precisely regulate immune function to accomplish both tasks. The studies presented in this review demonstrate that estradiol and progesterone secreted during the menstrual cycle act both directly and indirectly on epithelial cells and other immune cells in the reproductive tract to modify immune function in a way that is unique to specific sites throughout the FRT. As presented in this review, studies from our laboratory and others demonstrate that the innate immune response is under hormonal control, varies with the stage of the menstrual cycle, and as such is suppressed at mid-cycle to optimize conditions for successful fertilization and pregnancy. In doing so, a window of STI vulnerability is created during which potential pathogens including HIV enter the reproductive tract to infect host targets.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Pakistan is widely known and appreciated in the world for its history, Islamic culture and norms. Since the creation of Pakistan, it inherited poverty in its roots. There are many reasons for poverty but one lies on the shoulder of women who are 50% of the total population of Pakistan. On the apex of it, women do not take part in the development of Pakistan because when they step out of their homes, they suffer a lot of problems. These problems are a hurdle in their active participation in development .Government has tried to create an environment for those women, who suffer different problems. Harassment of women at work place is one of those problems which discourage women in taking active part in economic and social development of society. Women Activists, from the last decade, were working for the protection of woman’s right at workplace and they succeeded in formulation of Harassment Act 2010. Since law is ineffective without its proper mechanism of implementation, steps should be taken for its proper implementation mechanism. This article aims to provide information about the provisions of law, related to the harassment of women at workplace with an attempt to explore the effectiveness of its implementation. The study was conducted in twin cities of Pakistan, Islamabad and Rawalpindi. Interviews were conducted with the employees and employers of organizations, educational institutions, women activists, NGOs workers, lawyers, judges and some law enforcement officers. Group discussions were also held with teachers, students of Human rights and religious personalities. This report focuses on the implementation mechanism of new legislation in Pakistan. It also highlights some important facts related to its enforcement.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The incorporation of dUMP during replication or the deamination of cytosine in DNA results in the occurrence of uracils in genomes. To maintain genomic integrity, uracil DNA glycosylases (UDGs) excise uracil from DNA and initiate the base-excision repair pathway. Here, we cloned, purified and biochemically characterized a family 5 UDG, UdgB, from Mycobacterium smegmatis to allow us to use it as a model organism to investigate the physiological significance of the novel enzyme. Studies with knockout strains showed that compared with the wild-type parent, the mutation rate of the udgB(-) strain was approximately twofold higher, whereas the mutation rate of a strain deficient in the family 1 UDG (ung(-)) was found to be similar to 8.4-fold higher. Interestingly, the mutation rate of the double-knockout (ung(-)ludgB(-)) strain was remarkably high, at similar to 19.6-fold. While CG to TA mutations predominated in the ung(-) and ung(-)/udgb(-) strains, AT to GC mutations were enhanced in the udgB(-) strain. The ung(-)/udgB(-) strain was notably more sensitive to acidified nitrite and hydrogen peroxide stresses compared with the single knockouts (ung(-) or udgB(-)). These observations reveal a synergistic effect of UdgB and Ung in DNA repair, and could have implications for the generation of attenuated strains of Mycobacterium tuberculosis.