1,918 research outputs found

    Towards Managing and Understanding the Risk of Underwater Terrorism

    Get PDF
    This dissertation proposes a methodology to manage and understand the risk of underwater terrorism to critical infrastructures utilizing the parameters of the risk equation. Current methods frequently rely on statistical methods, which suffer from a lack of appropriate historical data to produce distributions and do not integrate epistemic uncertainty. Other methods rely on locating subject matter experts who can provide judgment and then undertaking an associated validation of these judgments. Using experimentation, data from unclassified successful, or near successful, underwater attacks are analyzed and instantiated as a network graph with the key characteristics of the risk of terrorism represented as nodes and the relationship between the key characteristics forming the edges. The values of the key characteristics, instantiated as the length of the edges, are defaulted to absolute uncertainty, the state where there is no information for, or against, a particular causal factor. To facilitate obtaining the value of the nodes, the Malice spectrum is formally defined which provides a dimensionless, methodology independent model to determine the value of any given parameter. The methodology produces a meta-model constructed from the relationships between the parameters of the risk equation, which determines a relative risk value

    Physical activity among cancer survivors : a literature review

    Full text link
    Aim Physical activity offers a variety of health benefits to cancer survivors, both during and post-treatment. The aim here is to review: the preferences of cancer survivors regarding exercise counselling and participation in a physical activity programme; adherence rates among cancer survivors to physical activity programmes; and predictors of adherence to exercise training.Methods Two electronic databases, Ovid MEDLINE(R) 1950 to Present with Daily Update and SCOPUS, were used to undertake literature searches for studies examining exercise preferences of adult cancer survivors, and physical activity programmes for adults at any point of the cancer trajectory.Results Studies suggest that, while physical activity levels are low among cancer survivors, most are interested in increasing their participation. Preferences and adherence to physical activity programmes differ across a range of demographic, medical, and behavioural variables, suggesting the importance of tailoring exercise programmes to patient-specific and disease-specific needs.Conclusions Current evidence supports the benefits of physical activity for improving risk factors associated with cancer prognosis. Physical activity programmes developed for oncology patients and cancer survivors need to take into account the needs of the target population in order to optimise adherence, outcomes, and long-term behavioural changes in this population

    A Generic Framework for Enforcing Security in Distributed Systems

    Get PDF
    A large extent of today's computer programs is distributed. For instance, services for backups, file storage, and cooperative work are now typically managed by distributed programs. The last two decades also brought a variety of services establishing social networks, from exchanging short messages to sharing personal information to dating. In each of the services, distributed programs process and store sensitive information about their users or the corporations their users work for. Secure processing of the sensitive information is essential for service providers. For instance, businesses are bound by law to take security measures against conflicts of interest. Beyond legal regulations, service providers are also pressed by users to satisfy their demands for security, such as the privacy of their profiles and messages in online social networks. In both instances, the prospect of security violations by a service provider constitutes a serious disadvantage and deters potential users from using the service. The focus of this thesis is on enabling service providers to secure their distributed programs by means of run-time enforcement mechanisms. Run-time enforcement mechanisms enforce security in a given program by monitoring, at run-time, the behavior of the program and by intervening when security violations are about to occur. Enforcing security in a distributed program includes securing the behavior of the individual agents of the distributed program as well as securing the joint behavior of all the agents. We present a framework for enforcing security in distributed programs. The framework combines tools and techniques for the specification, enforcement, and verification of security policies for distributed programs. For the specification of security policies, the framework provides the policy language CoDSPL. For generating run-time enforcement mechanisms from given security policies and applying these mechanisms to given distributed programs, the framework includes the tool CliSeAu. For the verification of generated enforcement mechanisms, the framework provides a formal model in the process algebra CSP. All three, the policy language, the tool, and the formal model allow for the distributed units of enforcement mechanisms to cooperate with each other. For supporting the specification of cooperating units, the framework provides two techniques as extensions of CoDSPL: a technique for specifying cooperation in a modular fashion and a technique for effectively cooperating in presence of race conditions. Finally, with the cross-lining technique of the framework, we devise a general approach for instrumenting distributed programs to apply an enforcement mechanism whose units can cooperate. The particular novelty of the presented framework is that the cooperation to be performed can be specified by the security policies and can take place even when the agents of the distributed program do not interact. This distinguishing feature of the framework enables one to specify and enforce security policies that employ a form of cooperation that suits the application scenario: Cooperation can be used when one's security requirements cannot be enforced in a fully decentralized fashion; but the overhead of cooperation can be avoided when no cooperation is needed. The case studies described in this thesis provide evidence that our framework is suited for enforcing custom security requirements in services based on third-party programs. In the case studies, we use the framework for developing two run-time enforcement mechanisms: one for enforcing a policy against conflicts of interest in a storage service and one for enforcing users' privacy policies in online social networks with respect to the sharing and re-sharing of messages. In both case studies, we experimentally verify the enforcement mechanisms to be effective and efficient, with an overhead in the range of milliseconds

    Tensions and Possibilities: A qualitative study of the views of nurse faculty training medical students to be Health Care Assistants

    Get PDF
    In the majority of pre-registration training programmes early theory is supported by later clinical learning. Unlike nursing, midwifery and the allied health professions, medical training often offers relatively little early clinical patient contact, though this does vary by medical school. To overcome this, recently, some medical schools offer patient-facing nurse training for the Care Certificate (CC) in the first year, but as yet little is known about how this is being received by nurses. We report on the experiences and perceptions of nurse-led faculty who led a pilot for first year medical students to gain the CC in the academic year 2019-20, in one UK medical school.  The qualitative study involved one-to-one in-depth semi-structured interviews with the course educators. Data were analysed using reflexive thematic analysis.  Seven faculty participated, sharing their delight at students’ willingness to embrace the CC. Five main themes arose: i) perceptions of doctors and nurses in the healthcare system; ii) affinity with the medical students; iii) benefits of the CC for medical students working as Health Care Assistants; iv) anxiety about teaching the medical students; and, v) uncertainty about whether this training should be compulsory.  We discovered that, nurses yearn for greater appreciation for their work by the medical workforce. These teachers felt this could be realised through this change within first year medical training. Many benefits were perceived as an outcome of this training for medical students, all members of the clinical team and most importantly for patients

    Horses / music by Gay Byron; words by Richard A. Whiting

    Get PDF
    Cover: drawing of three horses with riders in a race; photo of the Oriole Orchestra; description reads A Funny Fox Trot Song with Ukulele Accompaniment; Publisher: Leo Feist Inc. (New York)https://egrove.olemiss.edu/sharris_d/1073/thumbnail.jp

    BAGLSC Newsletter, Vol.1, No.1 (September 1984)

    Get PDF
    https://digitalcommons.usm.maine.edu/bangor_GLSC/1000/thumbnail.jp

    BAGLSC Newsletter, Vol.1, No.2 (October 1984)

    Get PDF
    https://digitalcommons.usm.maine.edu/bangor_GLSC/1001/thumbnail.jp
    corecore