15,500 research outputs found
Recommended from our members
Ensuring Access to Safe and Nutritious Food for All Through the Transformation of Food Systems
Categories and foundational ontology: A medieval tutorial
Foundational ontologies, central constructs in ontological investigations and engineering alike, are based on ontological categories. Firstly proposed by Aristotle as the very ur- elements from which the whole of reality can be derived, they are not easy to identify, let alone partition and/or hierarchize; in particular, the question of their number poses serious challenges. The late medieval philosopher Dietrich of Freiberg wrote around 1286 a tutorial that can help us today with this exceedingly difficult task. In this paper, I discuss ontological categories and their importance for foundational ontologies from both the contemporary perspective and the original Aristotelian viewpoint, I provide the translation from the Latin into English of Dietrich's De origine II with an introductory elaboration, and I extract a foundational ontologyâthat is in fact a single-category oneâfrom this text rooted in Dietrich's specification of types of subjecthood and his conception of intentionality as causal operation
Preferentialism and the conditionality of trade agreements. An application of the gravity model
Modern economic growth is driven by international trade, and the preferential trade agreement constitutes the primary fit-for-purpose mechanism of choice for establishing, facilitating, and governing its flows. However, too little attention has been afforded to the differences in content and conditionality associated with different trade agreements. This has led to an under-considered mischaracterisation of the design-flow relationship. Similarly, while the relationship between trade facilitation and trade is clear, the way trade facilitation affects other areas of economic activity, with respect to preferential trade agreements, has received considerably less attention. Particularly, in light of an increasingly globalised and interdependent trading system, the interplay between trade facilitation and foreign direct investment is of particular importance.
Accordingly, this thesis explores the bilateral trade and investment effects of specific conditionality sets, as established within Preferential Trade Agreements (PTAs).
Chapter one utilises recent content condition-indexes for depth, flexibility, and constraints on flexibility, established by DĂŒr et al. (2014) and Baccini et al. (2015), within a gravity framework to estimate the average treatment effect of trade agreement characteristics across bilateral trade relationships in the Association of Southeast Asian Nations (ASEAN) from 1948-2015. This chapter finds that the composition of a given ASEAN trade agreementâs characteristic set has significantly determined the concomitant bilateral trade flows. Conditions determining the classification of a trade agreements depth are positively associated with an increase to bilateral trade; hereby representing the furthered removal of trade barriers and frictions as facilitated by deeper trade agreements. Flexibility conditions, and constraint on flexibility conditions, are also identified as significant determiners for a given trade agreementâs treatment effect of subsequent bilateral trade flows. Given the political nature of their inclusion (i.e., the appropriate address to short term domestic discontent) this influence is negative as regards trade flows. These results highlight the longer implementation and time frame requirements for trade impediments to be removed in a market with higher domestic uncertainty.
Chapter two explores the incorporation of non-trade issue (NTI) conditions in PTAs. Such conditions are increasing both at the intensive and extensive margins. There is a concern from developing nations that this growth of NTI inclusions serves as a way for high-income (HI) nations to dictate the trade agenda, such that developing nations are subject to âprincipled protectionismâ. There is evidence that NTI provisions are partly driven by protectionist motives but the effect on trade flows remains largely undiscussed. Utilising the Gravity Model for trade, I test Lechnerâs (2016) comprehensive NTI dataset for 202 bilateral country pairs across a 32-year timeframe and find that, on average, NTIs are associated with an increase to bilateral trade. Primarily this boost can be associated with the market access that a PTA utilising NTIs facilitates. In addition, these results are aligned theoretically with the discussions on market harmonisation, shared values, and the erosion of artificial production advantages. Instead of inhibiting trade through burdensome cost, NTIs are acting to support a more stable production and trading environment, motivated by enhanced market access. Employing a novel classification to capture the power supremacy associated with shaping NTIs, this chapter highlights that the positive impact of NTIs is largely driven by the relationship between HI nations and middle-to-low-income (MTLI) counterparts.
Chapter Three employs the gravity model, theoretically augmented for foreign direct investment (FDI), to estimate the effects of trade facilitation conditions utilising indexes established by Neufeld (2014) and the bilateral FDI data curated by UNCTAD (2014). The resultant dataset covers 104 countries, covering a period of 12 years (2001â2012), containing 23,640 observations. The results highlight the bilateral-FDI enhancing effects of trade facilitation conditions in the ASEAN context, aligning itself with the theoretical branch of FDI-PTA literature that has outlined how the ratification of a trade agreement results in increased and positive economic prospect between partners (Medvedev, 2012) resulting from the interrelation between trade and investment as set within an improving regulatory environment. The results align with the expectation that an enhanced trade facilitation landscape (one in which such formalities, procedures, information, and expectations around trade facilitation are conditioned for) is expected to incentivise and attract FDI
Recommended from our members
Co-design As Healing: Exploring The Experiences Of Participants Facing Mental Health Problems
This thesis is an exploration of the healing role of co-design in mental health. Although co-design projects conducted within mental health settings are rising, existing literature tends to focus on the object of design and its outcomes while the experiences of participants per se remain largely unexplored. The guiding research question of this study is not how we design things that improve mental health, but how co-designing, as an act, might do so.
The thesis presents two projects that were organized in collaboration with the mental health charity Islington Mind and the Psychosis Therapy Project (PTP) in London.
The project at Islington Mind used a structured design process inviting participants to design for wellbeing. A case study analysis provides insights on how participants were impacted, summarizing key challenges and opportunities.
The design at PTP worked towards creating a collective brief in an emergent fashion, finally culminating in a board game. The experiences of participants were explored through Interpretative Phenomenological Analysis (IPA), using semi-structured interview data. The analysis served to identify key themes characterising the experience of co-design such as contributing, connecting, thinking and intentioning. In addition, a mixed-methods analysis of questionnaires and interview data exploring participants' wellbeing, showed that all participants who engaged fairly consistently in the project improved after the project ended, although some participants' scores returned to baseline six months later.
Reflecting on both projects, an approach to facilitation within mental health is outlined, detailing how the dimensions of weaving and layered participation, nurturing mattering and facilitating attitudes interlace. This contribution raises awareness of tacit dimensions in the practice of facilitation, articulating the nuances of how to encourage and sustain meaningful and ethical engagement and offering insights into a range of tools. It highlights the importance of remaining reflexive in relation to attitudes and emotions and discusses practical methodological and ethical challenges and ways to resolve them which can be of benefit to researchers embarking on a similar journey.
The thesis also offers detailed insights on how methodologies from different fields were integrated into a whole, arguing for transparency and reflexivity about epistemological assumptions, and how underlying paradigms shift in an interdisciplinary context.
Based on the overall findings, the thesis makes a case for considering design as healing (or a designerly way of healing), highlighting implications at a systems, social and individual level. It makes an original contribution to our understanding of design, highlighting its healing character, and proposes a new way to support mental health. The participants in this study not only had increased their own wellbeing through co-designing, but were also empowered and contributed towards healing the world. Hence, the thesis argues for a unique, holistic perspective of design and mental health, recognizing the interconnectedness of the individual, social and systemic dimensions of the healing processes that are ignited
Queer spies in British Cold War culture: literature, film, theatre and television
This PhD thesis investigates how male homosexuality has been represented in British spy
fiction from the 1950s to the 2010s in multiple media: literature, film, television and
theatre. Due mainly to the betrayal of the Cambridge Spy ring around the middle of the
century, British culture has associated spies with homosexuality, while the wider
Anglophone world was in the grip of a homophobic atmosphere created by McCarthy's
Red Scare. My thesis explores how this history is reflected in the spy genre from the Cold
War to the present, in which male homosexuality and secret agency intersect as âqueerâ,
in so far as they were both considered to be discreet and criminal, existing outside of the
heteronormative order. By following multiple texts across media and time, I discuss how
some writers, television and film directors and actors update queer identity in spy fiction,
creating a shifting image of queer spies through decades. I refer to the findings of
adaptation studies and queer studies, along with numerous studies on spy fiction.
I conclude that the interrelation of different media has contributed to the re-drawing of queer identity in spy fiction. These developments have enabled the spies'
queer identity to transcend its pejorative history in British culture, towards its more
flexible and pliant sense which is designated by the term's modern usage. I also discuss
that spiesâ homosexuality has been represented as a fleeting ghost in most of the texts
examined, hovering on the margins of pages and screen. Although homosexuality is not
âthe love that dare not speak its nameâ anymore, clandestine queer spies have been
preserved as spectral others in the genre for many years. Spy fiction is a cultural
repository retaining the memory of violence inflicted against those who have been called
âqueerâ in twentieth century Britain, and the spectral nature of queer spies narrates this
history reaching back to the Oscar Wilde trial in 1895, from which point British queer
identity as we know now developed.
This thesis benefits the study of spy fiction by filling a gap in the investigation of
homosexual representation. It also contributes to the field of gender studies of literature,
film, television, and theatre by illustrating queer history in a genre which has not received
a great deal of focus on its representation of homosexuality. Spy fiction occupies a
central position in British popular culture, and by exploring this genre in terms of
homosexuality, this research will identify the role which same-sex desire has historically
played in the British cultural imagination
Defining Service Level Agreements in Serverless Computing
The emergence of serverless computing has brought significant advancements to the delivery of computing resources to cloud users. With the abstraction of infrastructure, ecosystem, and execution environments, users could focus on their code while relying on the cloud provider to manage the abstracted layers. In addition, desirable features such as autoscaling and high availability became a providerâs responsibility and can be adopted by the user\u27s application at no extra overhead.
Despite such advancements, significant challenges must be overcome as applications transition from monolithic stand-alone deployments to the ephemeral and stateless microservice model of serverless computing. These challenges pertain to the uniqueness of the conceptual and implementation models of serverless computing. One of the notable challenges is the complexity of defining Service Level Agreements (SLA) for serverless functions. As the serverless model shifts the administration of resources, ecosystem, and execution layers to the provider, users become mere consumers of the providerâs abstracted platform with no insight into its performance. Suboptimal conditions of the abstracted layers are not visible to the end-user who has no means to assess their performance. Thus, SLA in serverless computing must take into consideration the unique abstraction of its model.
This work investigates the Service Level Agreement (SLA) modeling of serverless functions\u27 and serverless chainsâ executions. We highlight how serverless SLA fundamentally differs from earlier cloud delivery models. We then propose an approach to define SLA for serverless functions by utilizing resource utilization fingerprints for functions\u27 executions and a method to assess if executions adhere to that SLA. We evaluate the approachâs accuracy in detecting SLA violations for a broad range of serverless application categories. Our validation results illustrate a high accuracy in detecting SLA violations resulting from resource contentions and providerâs ecosystem degradations. We conclude by presenting the empirical validation of our proposed approach, which could detect Execution-SLA violations with accuracy up to 99%
The crisis of cultural authority in museums : contesting human remains in the collections of Britain
Museums in Britain have displayed and researched human remains since the eighteenth century. However, in the last two decades human remains in collections have become subject to claims and controversies. Firstly, human remains associated with acquisition during the colonial period have become increasingly difficult to retain and have been transfered to culturally affiliated overseas indigenous groups. Secondly, a group of British Pagans have formed to make claims on ancient human remains in collections. Thirdly, human remains that are not requested by any community group, and of all ages, have become the focus of concerns expressed about their treatment by members of the profession. A discourse arguing for 'respect' has emerged, which argues that all human remains should be treated with new care. The claims made on human remains have been vigourously but differentially contested by members of the sector, who consider the human remains to be unique research objects. This thesis charts the influences at play on the contestation over human remains and examines its construction. The academic literature tends to understand changes to museums as a result of external factors. This thesis argues that this problem is influenced by a crisis of legitimacy and establishes that there are strong internal influences. Through a weak social constructionist approach I demonstrate that the issue has been promoted by influential members of the sector as part of a broader attempt to distance themselves from their foundational role, as a consequence of a crisis of cultural authority stimulated by external and internal factors. The symbolic character of human remains in locating this problem is informed by the unique properties of dead bodies and is influenced by the significance of the body as a scientific object; its association with identity work and as a site of political struggle, in the high modem period
Development and evaluation of a treatment package for men with an intellectual disability who sexually offend
Sex offending in the general population has been a focus of interest for some time due to the damaging nature of the behaviour, and the need to reduce recidivism. Theoretical and clinical advances (Finke1hor, 1986; HM Prison Service, 1996; Marshall, Anderson, & Fernandez, 1999; Serran & Marshall, 2010) in treatment for sex offenders in the general population have been extended to men with an intellectual disability at risk of sexual offending (Lindsay, 2009). The purpose of this project is to develop and evaluate the SOTSEC-ID version cftrus model. Participants are adult males from 15 different locations across England and Wales, with an intellectual disability or borderline cognitive functioning and who have committed sexual offences. A pilot study clarified assessments and procedures, and individual data over several years is presented. A qualitative study using Interpretive Phenomenological Analysis (JP A) illustrates the 'meaning making' of participants' treatment experience through six major themes. A reliability and validity study assesses the four main quantitative measures, QACSO, SAKA, SOSAS, and VESA, finding limited support for criterion validity for the SOSAS and SAKA, excellent inter-rater reli"ability for all four main measures, and good to excellent inter-rater reliability on all but the SAKA Finally, a quantitative study, in collaboration with the wider SOTSEC-ID group, uses a repeated measures design to compare the QACSO, SOSAS and SAKA across pre-group, post-group and follow. up. Significant main effects and post-hoc comparisons were in the predicted direction for all measures. A range of information on demographic, clinical and criminogenic factors including offending during treatment or follow-up are also presented. A recidivism rate of 12.3% over a year was calculated for the sample. The treatment model and collaborative framework is recommended for wider adoption
Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations
Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs), which have become highly crucial IT assets that require significant security efforts to safeguard patientsâ information. Individuals who have legitimate access to an organisationâs assets to perform their day-to-day duties but intentionally or unintentionally violate information security policies can jeopardise their organisationâs information security efforts and cause significant legal and financial losses. In the information security (InfoSec) literature, several studies emphasised the necessity to understand why employees behave in ways that contradict information security requirements but have offered widely different solutions. In an effort to respond to this situation, this thesis addressed the gap in the information security academic research by providing a deep understanding of the problem of medical practitionersâ behavioural justifications to violate information security policies and then determining proper solutions to reduce this undesirable behaviour. Neutralisation theory was used as the theoretical basis for the research. This thesis adopted a mixed-method research approach that comprises four consecutive phases, and each phase represents a research study that was conducted in light of the results from the preceding phase. The first phase of the thesis started by investigating the relationship between medical practitionersâ neutralisation techniques and their intention to violate information security policies that protect a patientâs privacy. A quantitative study was conducted to extend the work of Siponen and Vance [1] through a study of the Saudi Arabia healthcare industry. The data was collected via an online questionnaire from 66 Medical Interns (MIs) working in four academic hospitals. The study found that six neutralisation techniquesâ(1) appeal to higher loyalties, (2) defence of necessity, (3) the metaphor of ledger, (4) denial of responsibility, (5) denial of injury, and (6) condemnation of condemnersâsignificantly contribute to the justifications of the MIs in hypothetically violating information security policies. The second phase of this research used a series of semi-structured interviews with IT security professionals in one of the largest academic hospitals in Saudi Arabia to explore the environmental factors that motivated the medical practitioners to evoke various neutralisation techniques. The results revealed that social, organisational, and emotional factors all stimulated the behavioural justifications to breach information security policies. During these interviews, it became clear that the IT department needed to ensure that security policies fit the daily tasks of the medical practitioners by providing alternative solutions to ensure the effectiveness of those policies. Based on these interviews, the objective of the following two phases was to improve the effectiveness of InfoSec policies against the use of behavioural justification by engaging the end users in the modification of existing policies via a collaborative writing process. Those two phases were conducted in the UK and Saudi Arabia to determine whether the collaborative writing process could produce a more effective security policy that balanced the security requirements with daily business needs, thus leading to a reduction in the use of neutralisation techniques to violate security policies. The overall result confirmed that the involvement of the end users via a collaborative writing process positively improved the effectiveness of the security policy to mitigate the individual behavioural justifications, showing that the process is a promising one to enhance security compliance
- âŠ