267,258 research outputs found
Psychiatric monitoring of not guilty by reason of insanity outpatients
Individuals deemed Not Guilty by Reason of Insanity (NGRI) by the courts, under Article 20 of the Portuguese
Criminal Code, have often committed very serious crimes. It is unreasonable to consider that
these patients were usually kept without adequate supervision after the security measure had been
declared extinct. They often decompensated after leaving the institution where they complied with the
security measure, and/or relapsed to alcohol and drug abuse. Very often, severe repeated crime erupted
again. Considering this, there was an urgent need to keep a follow-up assessment of these patients in
order to prevent them from relapsing in crime. This work presents the results of a psychiatric follow-up
project with NGRI outpatients. The main goals of the project were: ensuring follow-up and appropriate
therapeutic responses for these patients, maintaining all individuals in a care network, and preventing
them from decompensating. The team consisted of a psychiatrist, a nurse, and a psychologist. Seventytwo
patients were monitored during two years. Results demonstrated the unequivocal need to follow up
decompensated patients after the court order is extinguished. Suggestions are presented for a better
framing and psychiatric follow-up of these patients
Indicators and methods for assessing the quality of logistic activity processes
Purpose: This article is aimed at identifying and evaluating the quality and safety indicators of processes in the logistics system and solving the problems of product control in the goodsâ distribution process. Design/Methodology/Approach: In order to assess the risks and quality of control methods in the goodsâ distribution processes, studies were carried out in the process of grain supply, on which the risk assessment was tested using the fault tree using a qualitative approach with a deductive logic, which allowed to identify events at the lower levels of the system. To evaluate the results when comparing various methods of monitoring the characteristics of products in the product distribution process certain statistical tools were used. The evaluation with comparative tests is required in order to determine the way of measuring products in the goods distribution logistics system. The study uses the methods of formalization, analysis, measurement, experimental and comparison. Findings: The considered risk assessment method and the given example allow us to recommend its use for the product distribution processes for various purposes. A technique is proposed for comparing various control methods based on statistical tools that can be recommended for various goodsâ distribution operations. Practical implications: The results of the study can be applied in practice to improve the quality of goodsâ distribution processes and reduce risks in the various supply chains. Originality/value: The main contribution of this study is to shift the emphasis on the assessment of processes in goodsâ distribution to the positions of a risk-based approach and the use of various statistical tools in logisticsâ activities.peer-reviewe
Rethinking De-Perimeterisation: Problem Analysis And Solutions
For businesses, the traditional security approach is the hard-shell model: an organisation secures all its assets using a fixed security border, trusting the inside, and distrusting the outside. However, as technologies and business processes change, this model looses its attractiveness. In a networked world, âinsideâ and âoutsideâ can no longer be clearly distinguished. The Jericho Forum - an industry consortium part of the Open Group â coined this process deperimeterisation and suggested an approach aimed at securing data rather than complete systems and infrastructures. We do not question the reality of de-perimeterisation; however, we believe that the existing analysis of the exact problem, as well as the usefulness of the proposed solutions have fallen short: first, there is no linear process of blurring boundaries, in which security mechanisms are placed at lower and lower levels, until they only surround data. To the contrary, we experience a cyclic process of connecting and disconnecting of systems. As conditions change, the basic trade-off between accountability and business opportunities is made (and should be made) every time again. Apart from that, data level security has several limitations to start with, and there is a big potential for solving security problems differently: by rearranging the responsibilities between businesses and individuals. The results of this analysis can be useful for security professionals who need to trade off different security mechanisms for their organisations and their information systems
Tracking Report 2011 Fifth & Pacific, India 980232266J
This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2011_Fifth_Pacific_TR_India_980232266J.pdf: 15 downloads, before Oct. 1, 2020
Recommended from our members
A theoretical model for the application of Web 2.0 in e-Government
Government organisations in many countries have started embracing modern technologies such as second generation web (Web 2.0) in an attempt to maximize on the benefits of these technologies as well as keeping up with the current trend. Nevertheless, the advancement and the adoption of these of technologies is in its initial stages in the public sector. Therefore, the research problem is that the literature surrounding the application of Web 2.0 is still highly tentative and exploratory. In particular, there is a lack of research exploring the application of Web 2.0 technologies in the context of local e-Government. This study aims to address this research problem by presenting a comprehensive decision-making tool to aid the effective application of Web 2.0 technologies amongst local government authorities (LGAs). In doing so, resulting in the development of a theoretical model that is underpinned by information systems evaluation criteria and impact factors of Web 2.0 from an internal organizational perspective. By addressing the research problem, this study will make a significant contribution to the normative literature by providing new insights of Web 2.0 technologies within the public sector. This will be of specific relevance to scholars, policy makers, LGAs and practitioners who are interested in the adoption of Web 2.0 technologies in an e-Government context. This paper presents the proposed theoretical model and is largely devoted to an explanation on the development of the model
- âŠ