258,779 research outputs found

    Quality education through Child-Friendly Schools: resource allocation for the protection of children’s rights

    Get PDF
    The paper discusses the idea and purpose of Child-Friendly Schools (CFSs) initiated by the UNICEF. It analyses the implications of CFSs in terms of improving children’s health and nutrition, promoting gender equality, protecting children’s rights, re-defining education quality and creating positive psycho-emotional environment at schools. Experience is now showing that a framework of rights-based, child-friendly schools can be a powerful tool for both helping to fulfill the rights of children and providing them an education of good quality. At the national level, for ministries, development agencies, and civil society organizations, the framework can be used as a normative goal for policies and programmes leading to child-friendly systems and environments, as a focus for collaborative programming leading to greater resource allocations for education, and as a component of staff training. At the community level, for school staff, parents, and other community members, the framework can serve as both a goal and a tool of quality improvement through localized self-assessment, planning, and management and as a means for mobilizing the community around education and child rights.resource allocation; staff retraining; quality enhancement; protection of childre's rights; enrollment numbers; teacher capacity amd morale; gender equality; health education; friendly environment; affordable and accessible education.

    Run-time generation, transformation, and verification of access control models for self-protection

    Get PDF
    Self-adaptive access control, in which self-* properties are applied to protecting systems, is a promising solution for the handling of malicious user behaviour in complex infrastructures. A major challenge in self-adaptive access control is ensuring that chosen adaptations are valid, and produce a satisfiable model of access. The contribution of this paper is the generation, transformation and verification of Role Based Access Control (RBAC) models at run-time, as a means for providing assurances that the adaptations to be deployed are valid. The goal is to protect the system against insider threats by adapting at run-time the access control policies associated with system resources, and access rights assigned to users. Depending on the type of attack, and based on the models from the target system and its environment, the adapted access control models need to be evaluated against the RBAC metamodel, and the adaptation constraints related to the application. The feasibility of the proposed approach has been demonstrated in the context of a fully working prototype using malicious scenarios inspired by a well documented case of insider attack

    Coordinated Autonomic Managers for Energy Efficient Date Centers

    Get PDF
    The complexity of today’s data centers has led researchers to investigate ways in which autonomic methods can be used for data center management. Autonomic managers try to monitor and manage resources to ensure that the components they manage are self-configuring, self-optimizing, self-healing and self-protecting (so called “self-*” properties). In this research, we consider autonomic management systems for data centers with a particular focus on making data centers more energy-aware. In particular, we consider a policy based, multi-manager autonomic management systems for energy aware data centers. Our focus is on defining the foundations – the core concepts, entities, relationships and algorithms - for autonomic management systems capable of supporting a range of management configurations. Central to our approach is the notion of a “topology” of autonomic managers that when instantiated can support a range of different configurations of autonomic managers and communication among them. The notion of “policy” is broadened to enable some autonomic managers to have more direct control over the behavior of other managers through changes in policies. The ultimate goal is to create a management framework that would allow the data center administrator to a) define managed objects, their corresponding managers, management system topology, and policies to meet their operation needs and b) rely on the management system to maintain itself automatically. A data center simulator that computes its energy consumption (computing and cooling) at any given time is implemented to evaluate the impact of different management scenarios. The management system is evaluated with different management scenarios in our simulated data center

    Response to Privacy as a Public Good

    Get PDF
    In the spirit of moving forward the theoretical and empirical scholarship on privacy as a public good, this response addresses four issues raised by Professors Fairfield and Engel’s article: first, their depiction of individuals in groups; second, suggestions for clarifying the concept of group; third, an explanation of why the platforms on which groups exist and interact needs more analysis; and finally, the question of what kind of government intervention might be necessary to protect privacy as a public good

    Fixing Food Safety: Protecting America's Food Supply From Farm-to-Fork

    Get PDF
    Provides an overview of the major concerns regarding U.S. food safety, including an ineffective regulatory system, and of food-borne disease threats. Includes lists of recent outbreaks, major causes of food-borne illnesses, and recommended solutions

    Advocacy Coalition Framework Lens on Pressing Healthcare Issues

    Full text link
    In deciding how to interpret and understand public policy, many experts use theories and frameworks to justify their reasoning. One of the most common avenue of viewing policy involves the advocacy coalition framework based on its broad applicability. This popular framework consists of banding like-minded individuals together into a coalition to advance the narrative by creating acceptable policies for their group. These coalitions normally include a wide range of professional backgrounds from interest groups, elected officials, researchers in academia. These groups utilize special events to influence subfields consisting of actors who decide the solutions for policy problems. Subfields normally are made up of key players employed in government institutions and private industrial groups who willingly agree to work toward a compromise with the goal to create policy acceptable for both sides (Cairney 2014) These coalitions influence the subfield in different ways through capitalizing on their influential power or by ignoring the alliances and mergers of the groups. This paper shall explore how advocacy coalition framework works for three pressing issues facing the healthcare industry. These three policies focus on drug pricing, heath data privacy and opioid liability. This paper will explore the policy in depth, provide historical context and the major players while outlining how the specific proposals fit in the framework as well as identifying the framework’s limitations with the policy

    The national security argument for protection of domestic industries

    Full text link
    Tracing the origin of the national security argument for protection of domestic industries to Adam Smith, Alexander Hamilton, and Friedrich List, we study its post-GATT applications with reference to Article XXI of the WTO. We compare the use of tariff, production/input subsidy, and government procurement as alternative instruments of protection from the perspective of economic efficiency and study the disapproval of inward FDI to gain insights into the underlying national security concerns. The case studies of a) the US tariffs on aluminum and steel, b) German disapproval of the acquisition of a technology firm Leifeld Metal Spinning by a Chinese firm, and c) US’ all out global effort to cripple China’s telecom equipment giant Huawei are presented for illustration

    The Architecture of Accreditation

    Get PDF
    Accreditation systems can be analyzed in terms of the designer’s choices in three dimensions. One dimension is purpose of accreditation, where purpose may relate to program quality or quality of outcomes. The second dimension consists of types of accreditation norms used to achieve these purposes. There are five principal types of norms available in this dimension: process-quality norms, output norms, power allocation norms, self-determination norms, and consumer-protection norms. The third dimension consists of degree of regulation, which includes prescriptiveness or extensiveness of regulation. A sound accreditation system will make choices along each of these three dimensions. Understanding the range of possible structures helps one design, revise, and effectively analyze accreditation systems
    • 

    corecore