15,500 research outputs found

    Categories and foundational ontology: A medieval tutorial

    Get PDF
    Foundational ontologies, central constructs in ontological investigations and engineering alike, are based on ontological categories. Firstly proposed by Aristotle as the very ur- elements from which the whole of reality can be derived, they are not easy to identify, let alone partition and/or hierarchize; in particular, the question of their number poses serious challenges. The late medieval philosopher Dietrich of Freiberg wrote around 1286 a tutorial that can help us today with this exceedingly difficult task. In this paper, I discuss ontological categories and their importance for foundational ontologies from both the contemporary perspective and the original Aristotelian viewpoint, I provide the translation from the Latin into English of Dietrich's De origine II with an introductory elaboration, and I extract a foundational ontology–that is in fact a single-category one–from this text rooted in Dietrich's specification of types of subjecthood and his conception of intentionality as causal operation

    Preferentialism and the conditionality of trade agreements. An application of the gravity model

    Get PDF
    Modern economic growth is driven by international trade, and the preferential trade agreement constitutes the primary fit-for-purpose mechanism of choice for establishing, facilitating, and governing its flows. However, too little attention has been afforded to the differences in content and conditionality associated with different trade agreements. This has led to an under-considered mischaracterisation of the design-flow relationship. Similarly, while the relationship between trade facilitation and trade is clear, the way trade facilitation affects other areas of economic activity, with respect to preferential trade agreements, has received considerably less attention. Particularly, in light of an increasingly globalised and interdependent trading system, the interplay between trade facilitation and foreign direct investment is of particular importance. Accordingly, this thesis explores the bilateral trade and investment effects of specific conditionality sets, as established within Preferential Trade Agreements (PTAs). Chapter one utilises recent content condition-indexes for depth, flexibility, and constraints on flexibility, established by DĂŒr et al. (2014) and Baccini et al. (2015), within a gravity framework to estimate the average treatment effect of trade agreement characteristics across bilateral trade relationships in the Association of Southeast Asian Nations (ASEAN) from 1948-2015. This chapter finds that the composition of a given ASEAN trade agreement’s characteristic set has significantly determined the concomitant bilateral trade flows. Conditions determining the classification of a trade agreements depth are positively associated with an increase to bilateral trade; hereby representing the furthered removal of trade barriers and frictions as facilitated by deeper trade agreements. Flexibility conditions, and constraint on flexibility conditions, are also identified as significant determiners for a given trade agreement’s treatment effect of subsequent bilateral trade flows. Given the political nature of their inclusion (i.e., the appropriate address to short term domestic discontent) this influence is negative as regards trade flows. These results highlight the longer implementation and time frame requirements for trade impediments to be removed in a market with higher domestic uncertainty. Chapter two explores the incorporation of non-trade issue (NTI) conditions in PTAs. Such conditions are increasing both at the intensive and extensive margins. There is a concern from developing nations that this growth of NTI inclusions serves as a way for high-income (HI) nations to dictate the trade agenda, such that developing nations are subject to ‘principled protectionism’. There is evidence that NTI provisions are partly driven by protectionist motives but the effect on trade flows remains largely undiscussed. Utilising the Gravity Model for trade, I test Lechner’s (2016) comprehensive NTI dataset for 202 bilateral country pairs across a 32-year timeframe and find that, on average, NTIs are associated with an increase to bilateral trade. Primarily this boost can be associated with the market access that a PTA utilising NTIs facilitates. In addition, these results are aligned theoretically with the discussions on market harmonisation, shared values, and the erosion of artificial production advantages. Instead of inhibiting trade through burdensome cost, NTIs are acting to support a more stable production and trading environment, motivated by enhanced market access. Employing a novel classification to capture the power supremacy associated with shaping NTIs, this chapter highlights that the positive impact of NTIs is largely driven by the relationship between HI nations and middle-to-low-income (MTLI) counterparts. Chapter Three employs the gravity model, theoretically augmented for foreign direct investment (FDI), to estimate the effects of trade facilitation conditions utilising indexes established by Neufeld (2014) and the bilateral FDI data curated by UNCTAD (2014). The resultant dataset covers 104 countries, covering a period of 12 years (2001–2012), containing 23,640 observations. The results highlight the bilateral-FDI enhancing effects of trade facilitation conditions in the ASEAN context, aligning itself with the theoretical branch of FDI-PTA literature that has outlined how the ratification of a trade agreement results in increased and positive economic prospect between partners (Medvedev, 2012) resulting from the interrelation between trade and investment as set within an improving regulatory environment. The results align with the expectation that an enhanced trade facilitation landscape (one in which such formalities, procedures, information, and expectations around trade facilitation are conditioned for) is expected to incentivise and attract FDI

    Queer spies in British Cold War culture: literature, film, theatre and television

    Get PDF
    This PhD thesis investigates how male homosexuality has been represented in British spy fiction from the 1950s to the 2010s in multiple media: literature, film, television and theatre. Due mainly to the betrayal of the Cambridge Spy ring around the middle of the century, British culture has associated spies with homosexuality, while the wider Anglophone world was in the grip of a homophobic atmosphere created by McCarthy's Red Scare. My thesis explores how this history is reflected in the spy genre from the Cold War to the present, in which male homosexuality and secret agency intersect as “queer”, in so far as they were both considered to be discreet and criminal, existing outside of the heteronormative order. By following multiple texts across media and time, I discuss how some writers, television and film directors and actors update queer identity in spy fiction, creating a shifting image of queer spies through decades. I refer to the findings of adaptation studies and queer studies, along with numerous studies on spy fiction. I conclude that the interrelation of different media has contributed to the re-drawing of queer identity in spy fiction. These developments have enabled the spies' queer identity to transcend its pejorative history in British culture, towards its more flexible and pliant sense which is designated by the term's modern usage. I also discuss that spies’ homosexuality has been represented as a fleeting ghost in most of the texts examined, hovering on the margins of pages and screen. Although homosexuality is not “the love that dare not speak its name” anymore, clandestine queer spies have been preserved as spectral others in the genre for many years. Spy fiction is a cultural repository retaining the memory of violence inflicted against those who have been called “queer” in twentieth century Britain, and the spectral nature of queer spies narrates this history reaching back to the Oscar Wilde trial in 1895, from which point British queer identity as we know now developed. This thesis benefits the study of spy fiction by filling a gap in the investigation of homosexual representation. It also contributes to the field of gender studies of literature, film, television, and theatre by illustrating queer history in a genre which has not received a great deal of focus on its representation of homosexuality. Spy fiction occupies a central position in British popular culture, and by exploring this genre in terms of homosexuality, this research will identify the role which same-sex desire has historically played in the British cultural imagination

    Defining Service Level Agreements in Serverless Computing

    Get PDF
    The emergence of serverless computing has brought significant advancements to the delivery of computing resources to cloud users. With the abstraction of infrastructure, ecosystem, and execution environments, users could focus on their code while relying on the cloud provider to manage the abstracted layers. In addition, desirable features such as autoscaling and high availability became a provider’s responsibility and can be adopted by the user\u27s application at no extra overhead. Despite such advancements, significant challenges must be overcome as applications transition from monolithic stand-alone deployments to the ephemeral and stateless microservice model of serverless computing. These challenges pertain to the uniqueness of the conceptual and implementation models of serverless computing. One of the notable challenges is the complexity of defining Service Level Agreements (SLA) for serverless functions. As the serverless model shifts the administration of resources, ecosystem, and execution layers to the provider, users become mere consumers of the provider’s abstracted platform with no insight into its performance. Suboptimal conditions of the abstracted layers are not visible to the end-user who has no means to assess their performance. Thus, SLA in serverless computing must take into consideration the unique abstraction of its model. This work investigates the Service Level Agreement (SLA) modeling of serverless functions\u27 and serverless chains’ executions. We highlight how serverless SLA fundamentally differs from earlier cloud delivery models. We then propose an approach to define SLA for serverless functions by utilizing resource utilization fingerprints for functions\u27 executions and a method to assess if executions adhere to that SLA. We evaluate the approach’s accuracy in detecting SLA violations for a broad range of serverless application categories. Our validation results illustrate a high accuracy in detecting SLA violations resulting from resource contentions and provider’s ecosystem degradations. We conclude by presenting the empirical validation of our proposed approach, which could detect Execution-SLA violations with accuracy up to 99%

    The crisis of cultural authority in museums : contesting human remains in the collections of Britain

    Get PDF
    Museums in Britain have displayed and researched human remains since the eighteenth century. However, in the last two decades human remains in collections have become subject to claims and controversies. Firstly, human remains associated with acquisition during the colonial period have become increasingly difficult to retain and have been transfered to culturally affiliated overseas indigenous groups. Secondly, a group of British Pagans have formed to make claims on ancient human remains in collections. Thirdly, human remains that are not requested by any community group, and of all ages, have become the focus of concerns expressed about their treatment by members of the profession. A discourse arguing for 'respect' has emerged, which argues that all human remains should be treated with new care. The claims made on human remains have been vigourously but differentially contested by members of the sector, who consider the human remains to be unique research objects. This thesis charts the influences at play on the contestation over human remains and examines its construction. The academic literature tends to understand changes to museums as a result of external factors. This thesis argues that this problem is influenced by a crisis of legitimacy and establishes that there are strong internal influences. Through a weak social constructionist approach I demonstrate that the issue has been promoted by influential members of the sector as part of a broader attempt to distance themselves from their foundational role, as a consequence of a crisis of cultural authority stimulated by external and internal factors. The symbolic character of human remains in locating this problem is informed by the unique properties of dead bodies and is influenced by the significance of the body as a scientific object; its association with identity work and as a site of political struggle, in the high modem period

    The Reputations of Sir Francis Burdett

    Get PDF

    Development and evaluation of a treatment package for men with an intellectual disability who sexually offend

    Get PDF
    Sex offending in the general population has been a focus of interest for some time due to the damaging nature of the behaviour, and the need to reduce recidivism. Theoretical and clinical advances (Finke1hor, 1986; HM Prison Service, 1996; Marshall, Anderson, & Fernandez, 1999; Serran & Marshall, 2010) in treatment for sex offenders in the general population have been extended to men with an intellectual disability at risk of sexual offending (Lindsay, 2009). The purpose of this project is to develop and evaluate the SOTSEC-ID version cftrus model. Participants are adult males from 15 different locations across England and Wales, with an intellectual disability or borderline cognitive functioning and who have committed sexual offences. A pilot study clarified assessments and procedures, and individual data over several years is presented. A qualitative study using Interpretive Phenomenological Analysis (JP A) illustrates the 'meaning making' of participants' treatment experience through six major themes. A reliability and validity study assesses the four main quantitative measures, QACSO, SAKA, SOSAS, and VESA, finding limited support for criterion validity for the SOSAS and SAKA, excellent inter-rater reli"ability for all four main measures, and good to excellent inter-rater reliability on all but the SAKA Finally, a quantitative study, in collaboration with the wider SOTSEC-ID group, uses a repeated measures design to compare the QACSO, SOSAS and SAKA across pre-group, post-group and follow. up. Significant main effects and post-hoc comparisons were in the predicted direction for all measures. A range of information on demographic, clinical and criminogenic factors including offending during treatment or follow-up are also presented. A recidivism rate of 12.3% over a year was calculated for the sample. The treatment model and collaborative framework is recommended for wider adoption

    Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations

    Get PDF
    Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs), which have become highly crucial IT assets that require significant security efforts to safeguard patients’ information. Individuals who have legitimate access to an organisation’s assets to perform their day-to-day duties but intentionally or unintentionally violate information security policies can jeopardise their organisation’s information security efforts and cause significant legal and financial losses. In the information security (InfoSec) literature, several studies emphasised the necessity to understand why employees behave in ways that contradict information security requirements but have offered widely different solutions. In an effort to respond to this situation, this thesis addressed the gap in the information security academic research by providing a deep understanding of the problem of medical practitioners’ behavioural justifications to violate information security policies and then determining proper solutions to reduce this undesirable behaviour. Neutralisation theory was used as the theoretical basis for the research. This thesis adopted a mixed-method research approach that comprises four consecutive phases, and each phase represents a research study that was conducted in light of the results from the preceding phase. The first phase of the thesis started by investigating the relationship between medical practitioners’ neutralisation techniques and their intention to violate information security policies that protect a patient’s privacy. A quantitative study was conducted to extend the work of Siponen and Vance [1] through a study of the Saudi Arabia healthcare industry. The data was collected via an online questionnaire from 66 Medical Interns (MIs) working in four academic hospitals. The study found that six neutralisation techniques—(1) appeal to higher loyalties, (2) defence of necessity, (3) the metaphor of ledger, (4) denial of responsibility, (5) denial of injury, and (6) condemnation of condemners—significantly contribute to the justifications of the MIs in hypothetically violating information security policies. The second phase of this research used a series of semi-structured interviews with IT security professionals in one of the largest academic hospitals in Saudi Arabia to explore the environmental factors that motivated the medical practitioners to evoke various neutralisation techniques. The results revealed that social, organisational, and emotional factors all stimulated the behavioural justifications to breach information security policies. During these interviews, it became clear that the IT department needed to ensure that security policies fit the daily tasks of the medical practitioners by providing alternative solutions to ensure the effectiveness of those policies. Based on these interviews, the objective of the following two phases was to improve the effectiveness of InfoSec policies against the use of behavioural justification by engaging the end users in the modification of existing policies via a collaborative writing process. Those two phases were conducted in the UK and Saudi Arabia to determine whether the collaborative writing process could produce a more effective security policy that balanced the security requirements with daily business needs, thus leading to a reduction in the use of neutralisation techniques to violate security policies. The overall result confirmed that the involvement of the end users via a collaborative writing process positively improved the effectiveness of the security policy to mitigate the individual behavioural justifications, showing that the process is a promising one to enhance security compliance
    • 

    corecore