267,258 research outputs found

    Psychiatric monitoring of not guilty by reason of insanity outpatients

    Get PDF
    Individuals deemed Not Guilty by Reason of Insanity (NGRI) by the courts, under Article 20 of the Portuguese Criminal Code, have often committed very serious crimes. It is unreasonable to consider that these patients were usually kept without adequate supervision after the security measure had been declared extinct. They often decompensated after leaving the institution where they complied with the security measure, and/or relapsed to alcohol and drug abuse. Very often, severe repeated crime erupted again. Considering this, there was an urgent need to keep a follow-up assessment of these patients in order to prevent them from relapsing in crime. This work presents the results of a psychiatric follow-up project with NGRI outpatients. The main goals of the project were: ensuring follow-up and appropriate therapeutic responses for these patients, maintaining all individuals in a care network, and preventing them from decompensating. The team consisted of a psychiatrist, a nurse, and a psychologist. Seventytwo patients were monitored during two years. Results demonstrated the unequivocal need to follow up decompensated patients after the court order is extinguished. Suggestions are presented for a better framing and psychiatric follow-up of these patients

    Indicators and methods for assessing the quality of logistic activity processes

    Get PDF
    Purpose: This article is aimed at identifying and evaluating the quality and safety indicators of processes in the logistics system and solving the problems of product control in the goods’ distribution process. Design/Methodology/Approach: In order to assess the risks and quality of control methods in the goods’ distribution processes, studies were carried out in the process of grain supply, on which the risk assessment was tested using the fault tree using a qualitative approach with a deductive logic, which allowed to identify events at the lower levels of the system. To evaluate the results when comparing various methods of monitoring the characteristics of products in the product distribution process certain statistical tools were used. The evaluation with comparative tests is required in order to determine the way of measuring products in the goods distribution logistics system. The study uses the methods of formalization, analysis, measurement, experimental and comparison. Findings: The considered risk assessment method and the given example allow us to recommend its use for the product distribution processes for various purposes. A technique is proposed for comparing various control methods based on statistical tools that can be recommended for various goods’ distribution operations. Practical implications: The results of the study can be applied in practice to improve the quality of goods’ distribution processes and reduce risks in the various supply chains. Originality/value: The main contribution of this study is to shift the emphasis on the assessment of processes in goods’ distribution to the positions of a risk-based approach and the use of various statistical tools in logistics’ activities.peer-reviewe

    Rethinking De-Perimeterisation: Problem Analysis And Solutions

    Get PDF
    For businesses, the traditional security approach is the hard-shell model: an organisation secures all its assets using a fixed security border, trusting the inside, and distrusting the outside. However, as technologies and business processes change, this model looses its attractiveness. In a networked world, “inside” and “outside” can no longer be clearly distinguished. The Jericho Forum - an industry consortium part of the Open Group – coined this process deperimeterisation and suggested an approach aimed at securing data rather than complete systems and infrastructures. We do not question the reality of de-perimeterisation; however, we believe that the existing analysis of the exact problem, as well as the usefulness of the proposed solutions have fallen short: first, there is no linear process of blurring boundaries, in which security mechanisms are placed at lower and lower levels, until they only surround data. To the contrary, we experience a cyclic process of connecting and disconnecting of systems. As conditions change, the basic trade-off between accountability and business opportunities is made (and should be made) every time again. Apart from that, data level security has several limitations to start with, and there is a big potential for solving security problems differently: by rearranging the responsibilities between businesses and individuals. The results of this analysis can be useful for security professionals who need to trade off different security mechanisms for their organisations and their information systems

    Tracking Report 2011 Fifth & Pacific, India 980232266J

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2011_Fifth_Pacific_TR_India_980232266J.pdf: 15 downloads, before Oct. 1, 2020
    • 

    corecore