54,858 research outputs found

    Proceedings of International Workshop "Global Computing: Programming Environments, Languages, Security and Analysis of Systems"

    Get PDF
    According to the IST/ FET proactive initiative on GLOBAL COMPUTING, the goal is to obtain techniques (models, frameworks, methods, algorithms) for constructing systems that are flexible, dependable, secure, robust and efficient. The dominant concerns are not those of representing and manipulating data efficiently but rather those of handling the co-ordination and interaction, security, reliability, robustness, failure modes, and control of risk of the entities in the system and the overall design, description and performance of the system itself. Completely different paradigms of computer science may have to be developed to tackle these issues effectively. The research should concentrate on systems having the following characteristics: • The systems are composed of autonomous computational entities where activity is not centrally controlled, either because global control is impossible or impractical, or because the entities are created or controlled by different owners. • The computational entities are mobile, due to the movement of the physical platforms or by movement of the entity from one platform to another. • The configuration varies over time. For instance, the system is open to the introduction of new computational entities and likewise their deletion. The behaviour of the entities may vary over time. • The systems operate with incomplete information about the environment. For instance, information becomes rapidly out of date and mobility requires information about the environment to be discovered. The ultimate goal of the research action is to provide a solid scientific foundation for the design of such systems, and to lay the groundwork for achieving effective principles for building and analysing such systems. This workshop covers the aspects related to languages and programming environments as well as analysis of systems and resources involving 9 projects (AGILE , DART, DEGAS , MIKADO, MRG, MYTHS, PEPITO, PROFUNDIS, SECURE) out of the 13 founded under the initiative. After an year from the start of the projects, the goal of the workshop is to fix the state of the art on the topics covered by the two clusters related to programming environments and analysis of systems as well as to devise strategies and new ideas to profitably continue the research effort towards the overall objective of the initiative. We acknowledge the Dipartimento di Informatica and Tlc of the University of Trento, the Comune di Rovereto, the project DEGAS for partially funding the event and the Events and Meetings Office of the University of Trento for the valuable collaboration

    Manipulative techniques in political election campaign advertising: experience of Ukraine (Маніпулятивні прийоми у політичній передвиборчій рекламі: досвід України)

    Get PDF
    The article embraces the scope of the techniques used in manipulation of public opinion by candidates in the election process of Ukraine during the period of 2004-2012. The main focus is on the political election campaign advertising, revealing its meaning as communicative activity and as a process that mostly always is accompanied by the use of manipulative techniques. Based on the author's analysis of election campaigns and works of Ukrainian scholars, there were also determined manipulative methods and techniques that were most actively used during the last election cycles (У статті розкрито особливості використання прийомів маніпуляції суспільною свідомістю суб’єктами виборчих процесів в Україні у 2004-2012 рр. Основна увагу зосереджено на політичній передвиборчій рекламі; розкривається її зміст як комунікативної діяльності та процесу, який фактично завжди супроводжується використанням маніпулятивних технологій. На основі авторського аналізу виборчих кампаній та праць українських вчених, визначено маніпулятивні методики та прийоми, які найактивніше використовувалися під час останніх виборчих циклів

    Barriers to modern contraceptive methods uptake among young women in Kenya: a qualitative study

    Get PDF
    Background: Young women in Kenya experience a higher risk of mistimed and unwanted pregnancy compared to older women. However, contraceptive use among youth remains low. Known barriers to uptake include side effects, access to commodities and partner approval. Methods: To inform a youth focussed behaviour change communication campaign, Population Services Kenya developed a qualitative study to better understand these barriers among young women. The study was carried out in Nyanza, Coast, and Central regions. Within these regions, urban or peri-urban districts were purposively selected based on having contraceptive prevalence rate close to the regional average and having a population with low socioeconomic profiles. In depth interviews were conducted with a sample of sexually active women aged 15–24, both users and non-users, that were drawn from randomly selected households. Results: All the respondents in the study were familiar with modern methods of contraception and most could describe their general mechanisms of action. Condoms were not considered as contraception by many users. Contraception was also associated with promiscuity and straying. Fear of side effects and adverse reactions were a major barrier to use. The biggest fear was that a particular method would cause infertility. Many fears were based on myths and misconceptions. Young women learn about both true side effects and myths from their social networks. Conclusion: Findings from this research confirm that awareness and knowledge of contraception do not necessarily translate to use. The main barriers to modern contraceptive uptake among young women are myths and misconceptions. The findings stress the influence of social network approval on the use of family planning, beyond the individual’s beliefs. In such settings, family planning programming should engage with the wider community through mass and peer campaign strategies. As an outcome from this study, Population Services Kenya developed a mass media campaign to address key myths and misconceptions among youth

    Understanding Menstrual Hygiene Management and Human Rights

    Get PDF
    The practitioner's guide explains how women's and girls' ability to manage their menstruation hygienically, and with normalcy and dignity, enables women and girls to enjoy certain human rights. For example, it addresses the rights to education, health, and water and sanitation, and how they relate to menstrual hygiene management. For years, human rights organizations have documented how periods, and the poor policy and programmatic support for managing menstruation, have a negative impact on women's and girls' human rights. Decisions about the operation of refugee camps, detention centers, schools, and workplaces that affect the way periods are dealt with directly affect human rights. With too little support to handle their periods, women and girls have reported staying home from school, missing work, banishment by families, and humiliating treatment in their communities. People who work in development and aid organizations may see this bad treatment but lack effective tools to address it. The new practitioners guide will help them use a human rights framework to bring these problems to light, and resolve them

    Rape Messaging

    Get PDF
    When feminists began advocating for rape reform in the 1970s, the rape message was clear: rape was not a crime to be taken seriously because women lie. After decades of criminal law reform, the legal requirement that a woman vigorously resist a man’s sexual advances to prove that she was raped has largely disappeared from the statute books, and, in theory, rape shield laws make a woman’s prior sexual history irrelevant. Yet, despite what the law dictates, rape law reforms have not had a “trickle-down” effect, where changes in law lead to changes in attitude. Women are still believed to be vindictive shrews so police continue to code rape allegations as “unfounded,” and prosecutors continue to elect not to prosecute many rape cases. To many, “no” can sometimes still mean “yes.” In short, criminal law reforms have only marginally succeeded at deterring rape and increasing conviction rates for rape. At the same time, criminal law reforms have entrenched gender norms and endorsed the message that acquaintance rapes are less worthy of harsh punishment. This Article argues against further ex post criminal law reforms and posits that efforts should shift to ex ante public health interventions. This Article draws from recent successful experiences with public health interventions in destigmatizing AIDS and denormalizing tobacco and advocates for a robust public health campaign to denormalize rape. It presents a detailed proposal for changing rape messaging, denormalizing rape, and ensuring better outcomes for victims

    Design Ltd.: Renovated Myths for the Development of Socially Embedded Technologies

    Full text link
    This paper argues that traditional and mainstream mythologies, which have been continually told within the Information Technology domain among designers and advocators of conceptual modelling since the 1960s in different fields of computing sciences, could now be renovated or substituted in the mould of more recent discourses about performativity, complexity and end-user creativity that have been constructed across different fields in the meanwhile. In the paper, it is submitted that these discourses could motivate IT professionals in undertaking alternative approaches toward the co-construction of socio-technical systems, i.e., social settings where humans cooperate to reach common goals by means of mediating computational tools. The authors advocate further discussion about and consolidation of some concepts in design research, design practice and more generally Information Technology (IT) development, like those of: task-artifact entanglement, universatility (sic) of End-User Development (EUD) environments, bricolant/bricoleur end-user, logic of bricolage, maieuta-designers (sic), and laissez-faire method to socio-technical construction. Points backing these and similar concepts are made to promote further discussion on the need to rethink the main assumptions underlying IT design and development some fifty years later the coming of age of software and modern IT in the organizational domain.Comment: This is the peer-unreviewed of a manuscript that is to appear in D. Randall, K. Schmidt, & V. Wulf (Eds.), Designing Socially Embedded Technologies: A European Challenge (2013, forthcoming) with the title "Building Socially Embedded Technologies: Implications on Design" within an EUSSET editorial initiative (www.eusset.eu/

    Health and Reproductive Rights Portfolio: A Look Back at the Last 14 Years of Thematic Grantmaking and Recommendations for Moving Forward

    Get PDF
    In an effort to ensure that the HRR thematic area remains relevant to women's needs and reflect current and emerging issues that affect health and reproductive rights of women in Africa, AWDF commissioned an independent consultant to conduct an evaluation of the thematic HRR area. This report is an abridged version of the findings from that assessment
    corecore