Secure

Distribution by Scientific Domains
Distribution within Humanities and Social Sciences

Terms modified by Secure

  • secure airway
  • secure attachment
  • secure base
  • secure environment
  • secure hospital
  • secure unit

  • Selected Abstracts


    Interest in Geriatric Medicine in Canada: How Can We Secure a Next Generation of Geriatricians?

    JOURNAL OF AMERICAN GERIATRICS SOCIETY, Issue 3 2006
    FRCP(C), Laura L. Diachun MEd
    In Canada, there is minimal training of geriatrics for physicians, a shortage of geriatricians, and extremely low numbers of students entering geriatrics. This study explored student interest in and barriers and enticements to geriatric medicine as a career choice. Medical students attending a university in Ontario, Canada, were surveyed in their first year (N=121), after a geriatric education session, and again in their second year (N=118) about their interest in a career in geriatrics. In the first year, less than 20% of students were interested in geriatrics; in the second year this decreased to 16%. In both years, female students were more interested than male students. Those students interested in geriatrics had higher hopes that their practice would involve primarily adults and seniors. Students not interested in geriatrics rated performing procedures and technical skills, not wanting to work with chronically ill patients, and caring for younger patients as important practice characteristics. Although the importance of prestige was low for all students, it was significantly higher for those not interested in geriatrics. Although changes to prestige, income, lifestyle, and length of residency training were identified as potential enticements to geriatrics, they were not major deterrents to a career in geriatrics. The findings suggest strategies that may affect student interest in geriatrics, such as increased and early student exposure to geriatrics with emphasis on fostering and nurturing student interest, consideration of various enticements to this specialty, and the development of health system,specific solutions to this problem. Knowledge of student and practice characteristics that increase the likelihood of selecting geriatrics as a specialty may allow for early identification and support of future geriatricians. [source]


    Autonomous straightening and traversing of shipboard helicopters

    JOURNAL OF FIELD ROBOTICS (FORMERLY JOURNAL OF ROBOTIC SYSTEMS), Issue 2 2006
    A. R. Feldman
    This paper describes an investigation into autonomous shipboard helicopter maneuvering and traversing operations using the Aircraft/Ship Integrated Secure and Traverse (ASIST) recovery and handling system developed by Indal Technologies, Inc. The ASIST system continuously monitors the aircraft's position and orientation and provides a means of actuation to maneuver the helicopter on deck. This allows the possibility for completely autonomous aircraft securing, maneuvering, and traversing capability. An autonomous maneuvering algorithm offers the potential for automatically selecting the optimal maneuvering sequence and executing it with greater efficiency and reliability than can be achieved by a human operator. The proposed method takes advantage of the position and orientation of the helicopter measured by the existing Helicopter Position Sensing Equipment thereby not requiring additional sensors on the actual helicopter. The paper presents the development and validation of the autonomous straightening and traversing algorithms using a nonlinear on-deck helicopter maneuvering simulation and the Carleton Experimental Shipboard Helicopter Interface Platform. [source]


    Cyclotron: a secure, isolated, virtual cycle-scavenging grid in the enterprise

    CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 3 2010
    Kevin Kane
    Abstract Cycle-scavenging grids appeal to organizations with large numbers of workstations that remain idle outside of normal working hours. This represents a potential source of grid computing cycles, but the security and isolation issues that come with the use of non-dedicated resources have slowed their adoption in the enterprise. In this paper we present Cyclotron, a prototype cycle-scavenging grid solution that leverages virtualization and a declarative security policy-based access control infrastructure, supporting flexible authorization rules and the constrained delegation of access rights, to address these requirements. Copyright © 2009 John Wiley & Sons, Ltd. [source]


    A Grid-enabled problem-solving environment for advanced reservoir uncertainty analysis

    CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 18 2008
    Zhou Lei
    Abstract Uncertainty analysis is critical for conducting reservoir performance prediction. However, it is challenging because it relies on (1) massive modeling-related, geographically distributed, terabyte, or even petabyte scale data sets (geoscience and engineering data), (2) needs to rapidly perform hundreds or thousands of flow simulations, being identical runs with different models calculating the impacts of various uncertainty factors, (3) an integrated, secure, and easy-to-use problem-solving toolkit to assist uncertainty analysis. We leverage Grid computing technologies to address these challenges. We design and implement an integrated problem-solving environment ResGrid to effectively improve reservoir uncertainty analysis. The ResGrid consists of data management, execution management, and a Grid portal. Data Grid tools, such as metadata, replica, and transfer services, are used to meet massive size and geographically distributed characteristics of data sets. Workflow, task farming, and resource allocation are used to support large-scale computation. A Grid portal integrates the data management and the computation solution into a unified easy-to-use interface, enabling reservoir engineers to specify uncertainty factors of interest and perform large-scale reservoir studies through a web browser. The ResGrid has been used in petroleum engineering. Copyright © 2008 John Wiley & Sons, Ltd. [source]


    Identification and authentication of integrated circuits

    CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 11 2004
    Blaise Gassend
    Abstract This paper describes a technique to reliably and securely identify individual integrated circuits (ICs) based on the precise measurement of circuit delays and a simple challenge,response protocol. This technique could be used to produce key-cards that are more difficult to clone than ones involving digital keys on the IC. We consider potential venues of attack against our system, and present candidate implementations. Experiments on Field Programmable Gate Arrays show that the technique is viable, but that our current implementations could require some strengthening before it can be considered as secure. Copyright © 2004 John Wiley & Sons, Ltd. [source]


    Theory of mind functioning in mentally disordered offenders detained in high security psychiatric care: its relationship to clinical outcome, need and risk

    CRIMINAL BEHAVIOUR AND MENTAL HEALTH, Issue 5 2007
    David Murphy
    Background,Theory of mind (ToM) refers to the cognitive mechanisms that allow us to infer our own mental states and those of others. Whilst ToM deficits are frequently observed among individuals with schizophrenia, little is known about their relationship to functional outcome. Aims,Among patients with schizophrenia in a high security hospital, to test whether ToM performance, in relation to other cognitive and clinical variables, is related to measures of subsequent clinical outcome. Methods,ToM was assessed using the modified advanced test (MAT) and the revised eyes task (RET). Outcome, including ongoing need and risk, was assessed using the HoNOS secure, CANFOR and HCR-20 respectively three years post ToM assessment. Results,Performance on the RET was the only variable to be significantly correlated with the symptom ratings of the HoNOS secure and the HCR-20 total scores. Performance on the RET also accounted for approximately half of the variance in the CANFOR ratings and a third in the risk management item ratings of the HCR-20. Age, number of years diagnosed with schizophrenia and other aspects of cognition were also significantly correlated with the HoNOS security scale. Conclusions,The results suggest that social perceptual ToM may be a useful prognostic indicator, but also that ToM impairments may represent an unmet need. Replication of the work with larger and more diverse samples of people with schizophrenia is necessary, as well as trials of therapeutic effort directed at improvement of ToM impairments. Copyright © 2007 John Wiley & Sons, Ltd. [source]


    The influence of attachment representation on parental perception and interpretation of infant emotions: A multilevel approach

    DEVELOPMENTAL PSYCHOBIOLOGY, Issue 5 2010
    Gottfried Spangler
    Abstract The aim of the study was to investigate parental perception and interpretation of infant emotional expression depending on their attachment representation. Forty-six parents' responses to infant pictures depicting positive, neutral, and negative emotions were assessed on the level of affective judgments (valence, arousal), mimic responses (facial muscle activity), and of the eyelid reflex (using the startle paradigm). Results revealed small differences between parents of different attachment representations with respect to their subjective evaluations. However, secure parents, as compared to insecure ones, showed a positive bias in their mimic responses to infant pictures. The modulation of the startle response indicated a negative evaluation of negative infant emotion expressions in dismissing parents, while an augmentation of the startle response to negative infant emotions could not be observed in secure and preoccupied parents. The findings highlight the role of attachment experiences for emotional information processing in parents and its consequences for parental behavior. © 2010 Wiley Periodicals, Inc. Dev Psychobiol 52: 411,423, 2010. [source]


    Components of Relationship Quality in Chimpanzees

    ETHOLOGY, Issue 9 2008
    Orlaith N. Fraser
    A novel approach to studying social relationships in captive adult chimpanzees (Pan troglodytes) was taken by using principal components analysis (PCA) to extract three key components of relationship quality from nine behavioural variables. Based on the loadings of the behavioural variables, the components appeared to match previously hypothesized critical aspects of social relationships and were therefore labelled Value, Compatibility and Security. The effects of kinship, sex combination, age difference and time spent together on each of the relationship quality components were analysed. As expected, kin were found to have more valuable, compatible and secure relationships than non-kin. Female,female dyads were found to be more compatible than male,male or mixed-sex dyads, whereas the latter were found to be most secure. Partners of a similar age were found to have more secure and more valuable relationships than those with a larger age gap. Individuals that were together in the group for longer were more valuable and more compatible, but their relationships were found to be less secure than individuals that were together in the group for a shorter time. Although some of the results may be unexpected based on chimpanzee socio-ecology, they fit well overall with the history and social dynamics of the study group. The methods used confer a significant advantage in producing quantitative composite measures of each component of relationship quality, obtained in an objective manner. These findings therefore promote the use of such measures in future studies requiring an assessment of the qualities of dyadic social relationships. [source]


    Workers, worries and welfare states: Social protection and job insecurity in 15 OECD countries

    EUROPEAN JOURNAL OF POLITICAL RESEARCH, Issue 2 2007
    CHRISTOPHER J. ANDERSON
    Based on data on people's attitudes toward their job as well as levels of and kinds of social protection collected in 15 OECD countries, it shows that there are distinct manifestations of job insecurity that are affected differently by distinct aspects of social protection programs. While the analysis shows that social protection measures reduce employment insecurity, it also reveals that overall levels welfare state generosity do not have any systematic effect on whether workers feel secure. The article's findings suggest the need to decompose the different components of employment insecurity as well as disaggregate national systems of social protection when examining the impact of welfare states on job insecurity. [source]


    Holding onto power: effects of powerholders' positional instability and expectancies on interactions with subordinates

    EUROPEAN JOURNAL OF SOCIAL PSYCHOLOGY, Issue 4 2006
    John Georgesen
    This study explores the effects of power, positional threat, and expectancies on interactions between powerholders and subordinates. Two hundred and forty-two participants were randomly assigned to power role (boss or employee). Bosses were further randomly assigned to levels of positional threat (power role secure or insecure) and expectancy regarding subordinates' problem-solving ability (negative or positive). Evidence for a self-fulfilling prophecy was obtained, such that dyads where bosses held negative expectancies of their subordinates rated the subordinate and experience most negatively and awarded less potential prize money to the subordinates. Expectancy interacted with positional threat in a consistent manner such that the most negative effects were obtained for dyads where bosses were both positionally threatened and held negative expectancies of subordinates. Implications for theories of power are discussed. Copyright © 2006 John Wiley & Sons, Ltd. [source]


    Links between Community Violence and the Family System: Evidence from Children's Feelings of Relatedness and Perceptions of Parent Behavior,

    FAMILY PROCESS, Issue 3 2002
    Michael Lynch Ph.D.
    In this study, we examined some of the ways in which broader ecological systems may influence the organization of behavior within the family system. Specifically, links between exposure to community violence and children's relationships with maternal caregivers were investigated in a sample of 127 urban children between the ages of 7 and 13 years. Children were asked to indicate whether they had been exposed to a wide variety of violent events. In addition, their feelings of relatedness and separation anxiety, and their perceptions of maternal behavior were assessed. It was expected that exposure to community violence would be associated with feeling less secure with caregivers. Consistent with predictions from ecological-transactional theory, data supported this hypothesis. Children who reported that they had been exposed to high levels of community violence also indicated that they felt less positive affect when with their caregiver, were dissatisfied with how close they felt to her, felt more separation anxiety, and reported more negative maternal behavior than children exposed to less violence. Findings are discussed in terms of how violence may affect the family system and the protective function of human attachment. [source]


    THEIR SPACE: SECURITY AND SERVICE WORKERS IN A BRAZILIAN GATED COMMUNITY,

    GEOGRAPHICAL REVIEW, Issue 4 2008
    JACQUELYN CHASE
    ABSTRACT. This study examines the role of service workers in creating a secure landscape in a zone of gated communities near Belo Horizonte, Brazil. Most research on gated communities emphasizes their segregation and formal security apparatuses. In fact, gated communities interact with surrounding rural settlements because they draw their service employees from them. Security emerges from informal relationships of trust that property owners establish with service workers. Gardeners, especially, enable homeowners to project their property investment to others through landscaping. Equally of importance, a manicured garden conveys the message that a home is receiving daily attention,and is secure,even if the owner is not present. The study probes this interdependence from the point of view of gardeners in the context of one gated community in an area south of Belo Horizonte and the attempts by members of its homeowners association to minimize the sense of fear they associate with the Brazilian city. [source]


    Compositional constraints on the equation of state and thermal properties of the lower mantle

    GEOPHYSICAL JOURNAL INTERNATIONAL, Issue 1 2001
    Frank D. Stacey
    SUMMARY By extrapolating the lower mantle equation of state (EoS) to P=0, T=290 K, we determine the EoS parameters that are compatible with a mixture of (Mg, Fe)SiO3 perovskite (with a small admixture of Al2O3), (Mg, Fe)O magnesiowüstite and CaSiO3 perovskite in arbitrary proportions and with arbitrary Fe/(Fe+Mg) ratio. The parameters fitted are density, ,, adiabatic incompressibility, KS, and its pressure derivative, K,S,(,KS/,P)S. The first stage is adiabatic extrapolation to P=0, T=T0, that is, to the foot of the lower mantle adiabat, at which K,0(T0) is allowed to have any value between 3.8 and 4.6, and 1500 K,T0,2000 K. It is important to use an equation for which the lower mantle fitting does not prescribe K,0(T0) and this rules out the third-order Birch theory, which gives a seriously wrong value. The further extrapolation to 290 K at P=0 uses thermodynamic relationships with maximum generality, allowing all of the following thermoelastic parameters to be arbitrary functions of temperature: K;,; Grüneisen parameter, ,;q=(, ln ,/, ln V)T, where V is volume; volume coefficient of thermal expansion, ,; adiabatic Anderson,Grüneisen parameter, ,S=(1/,) (, ln KS/,T)P; and the mixed P, T derivative (,K,S/,T)P. The heat capacity at constant volume, CV, is assumed to follow the Debye function, so , is controlled by that. The temperature dependences of the dimensionless parameters ,, q and ,S at P=0 are slight. We find , to be precisely independent of T at constant V. The parameter dK,0/dT increases strongly with T, as well as with the assumed value of K,0(T0), where K,0 is K,S at P=0. The fitting disallows significant parameter ranges. In particular, we find solutions only if K,0(T0),4.2 and the 290 K value of K,0 for Mg perovskite is less than 3.8. Conclusions about composition are less secure, partly because of doubt about individual mineral properties. The volume of magnesiowüstite is found to be between 10 and 25 per cent for respective T0 values of 2000 and 1500 K, but the Ca-perovskite volume is no more than 6 per cent and has little influence on the other conclusions. The resulting overall Fe/(Fe+Mg) ratio is 0.12 to 0.15. Although this ratio is higher than expected for a pyrolite composition, the ratio depends critically on the assumed mineral densities; some adjustment of the mineral mix may need to be considered. [source]


    Barriers to provision of dental care in long-term care facilities: the confrontation with ageing and death

    GERODONTOLOGY, Issue 3 2005
    Ina Nitschke
    Objective:, The aim of the study was to reveal barriers to providing dental care for residents in long-term care (LTC) facilities. Design:, Participants were selected randomly from the dentist register in Berlin and Saxony, Germany. The sample consisted of 60 self-employed and 60 employed dentists, a further 60 dentists worked in their own dental practice but also part-time in an LTC facility. In semi-structured interviews a questionnaire with 36 statements concerning working conditions, administration and cost, insecurity concerning treatment decisions as well as confrontation with ageing and death was employed. Subsequently, the study participants were asked to rank the four dimensions concerning their impact on the decision against providing dental care in an LTC facility. Results:, The random sample was representative in age and gender for the dental register in Berlin and Saxony. Fifty-six per cent of the participants (63% of the men and 51% of the women; 52% of the self-employed, 60% of the employed and 56% of the consultant dentists) indicated unfavourable working conditions as biggest obstacle in providing dental care in an LTC-facility. Thirty-two per cent of participants rated administration and cost, 7% the insecurity in treatment decisions as major hindrance. Only 5% of the participants rated the confrontation with age and death as substantial barrier. There were no age and gender differences. Dentists in Berlin seemed more concerned about administration and cost of a consultancy activity and less secure in their therapy decisions than the colleagues from Saxony (p < 0.001). Dentists who work partly in LTC facilities were the least concerned about the confrontation with ageing and death (not significant), employed dentist showed the least secure in their treatment decisions (p > 0.001). Conclusion:, It can be concluded that the awareness of infra-structural and financial aspects in providing dental care in LTC facilities should be raised with health politicians and that these aspects should be considered when inaugurating or re-structuring the consultancy services to LTC facilities. Further it would be desirable to establish more postgraduate training programmes to increase clinical and ethical competence in the area of gerodontology. [source]


    Keeping your globally mobile employees healthy, safe, and secure

    GLOBAL BUSINESS AND ORGANIZATIONAL EXCELLENCE, Issue 1 2009
    Myles Druckman
    Companies are sending higher numbers of older employees to difficult or dangerous locations, which increases the chances of a medical event where healthcare services are least available. Business travelers and international assignees and their employers need to adequately assess and prepare for such possibilities. The author describes five key processes that will help companies perform duty of care and minimize risks to the employee and company alike; the elements of a best-practice international preassignment health program to ensure assignees are fit for work in locations with high medical risk; and the five responsibilities of globally mobile employees for protecting their health and getting medical help if they need it. © 2009 Wiley Periodicals, Inc. [source]


    The Modern State and its Adversaries

    GOVERNMENT AND OPPOSITION, Issue 1 2006
    Helen Thompson
    The modern state would be a crisis if consent to long-established sites of authoritative rule were breaking down, previously capable states were unable to command coercive power, and if the demands of international and supra-national institutions had enforceable claims against historically sovereign states. There is no general crisis of the modern state. The states of most developed countries are secure as sites of authoritative rule, and the military power commanded by the American state is unprecedented. However, the external sovereignty of many poor and small states is diminishing. The cause is not ,globalization' but the policies of the world's dominant state. [source]


    The Advent of the Secret Ballot in Britain and France, 1789,1914: From Public Assembly to Private Compartment

    HISTORY, Issue 308 2007
    MALCOLM CROOK
    These days the secret ballot is taken for granted and it is often seen as the natural complement of universal, democratic suffrage. Its emergence, however, was just as contested and varied as the franchise and raised similar issues concerning the nature and practice of citizenship. This article focuses on the emergence of the secret ballot in Britain and France, two countries with a long history of parliamentary and local elections. In Britain, the secret ballot was introduced in 1872, while in France, which introduced universal male suffrage in 1848, it was as late as 1913 before envelope and polling booth rendered the vote completely secure. This study documents the varied polling practices employed in both countries prior to the onset of the secret ballot. It also highlights the contentious nature of polling reform. For some, the secret ballot was regarded as a means of safeguarding electoral independence and eliminating corruption. Others, including radicals, argued quite the opposite: that secret voting was an affront to honourable, public-spirited citizenship. In the end, full secrecy was achieved as part of the broader process of domesticating and disciplining the exercise of a mass franchise. [source]


    The value of formative investment in organizational federations

    HUMAN COMMUNICATION RESEARCH, Issue 1 2001
    AJ Flanagin
    Public goods theories highlight an incentive system that rewards ,free riding' on the contributions of early contributors toward collective actions. However, because such theories focus on creation of the good, they may underestimate returns that accrue to early contributors subsequent to the good's realization. The concept of formative investment is introduced here to describe the extent to which organizations help to create public goods such as interorganizational linkages like participatory federations. Data from the CEOs of 48 organizations involved in a participatory federation were used to assess how an organization's level of formative investment is related to later patterns of dependency and interaction among federation members. Findings suggest that from a long-term perspective, and for goods that involve communication and interaction, the incentive structure may not be so favorable for free riders. To the extent that organizations with high formative investment have the capability to envision the future and communicate that vision to potential federation partners, they may be able to both reduce free riding and secure for themselves advantageous positions in the subsequent network of relations. [source]


    The infant protection system in France: How does it work?,

    INFANT MENTAL HEALTH JOURNAL, Issue 1 2008
    Antoine Guedeney
    The French system for protection of infants and toddlers relies on the collaboration of several different partners for preventing, screening, assessing, intervening in, and treating cases of infant abuse and neglect. This article first provides a brief historic overview and some data about the protection of infants in France, with data focused on the Parisian area. We then describe the tasks and interconnections of these different agencies and administrations, and offer some reflections on the actual functioning of the system. Finally, some suggestions for changes are provided. Discussion should begin on a theoretical level regarding whether we should continue with institutionalization of infants for long periods of time, as is still the case in Paris. Discussion also should take place regarding which is the higher priority when infants and children are in situations of danger, abuse, and/or neglect of infants: (a) the hope of reestablishing parental rights or (b) the need of the infant for a secure and stable attachment relationship. The process of evaluating parental caregiving skills would benefit from more clinical observation as well as structured methods of assessment. [source]


    Culturally sensitive assessment of attachment in children aged 18,40 months in a South African township

    INFANT MENTAL HEALTH JOURNAL, Issue 6 2006
    KLAUS MINDE
    The objective of our work is to study the possible relevance nonwestern cultural traditions have on the concordance of attachment patterns assessed in mothers and their young children. The attachment of 46 toddlers and their mothers, living in a black township in Johannesburg, South Africa, was assessed using scores derived from mother-child observations in the home (Attachment Q-Sort) and an interview (Working Model of the Child Interview). Mothers also had a semistructured psychiatric interview. Agreement between home observations and interview ratings was 29% for secure and 71% for insecure attachment when U.S.-developed scoring criteria for the interview were used. Agreement increased to 81% for secure and 67% for insecure attachment when the same protocols were rescored, using a culturally modified scoring system, developed by local cultural experts. This study suggests that verbal representations of attachment patterns are more influenced by cultural traditions than are actual parent-child interactions. [source]


    Maternal unresolved attachment status impedes the effectiveness of interventions with adolescent mothers

    INFANT MENTAL HEALTH JOURNAL, Issue 3 2005
    Greg Moran
    Children of adolescent mothers are at risk for a variety of developmental difficulties. In the present study, the effectiveness of a brief intervention program designed to support adolescent mothers' sensitivity to their infants' attachment signals was evaluated. Participants were adolescent mothers and their infants who were observed at 6, 12, and 24 months of age. The intervention conducted by clinically trained home visitors consisted of eight home visits between 6 and 12 months in which mothers were provided feedback during the replay of videotaped play interactions. At 12 months, 57% of the mother,infant dyads in the intervention group and 38% of the comparison group dyads were classified as secure in the Strange Situation. Seventy-six percent of the mothers in the intervention group maintained sensitivity from 6 to 24 months compared with 54% of the comparison mothers. Further analyses indicated that the intervention was effective primarily for mothers who were not classified as Unresolved on the Adult Attachment Interview. [source]


    AQS security scores: What do they represent?

    INFANT MENTAL HEALTH JOURNAL, Issue 3 2004
    A study in construct validation
    In a sample of 129 Dutch 15-month-old infants, attachment security was assessed both with the Attachment Q-Set (AQS; Waters, 1995) and with a short version of Ainsworth, Blehar, Waters, and Wall's (1978) Strange Situation (SSS). Infants classified as secure using the SSS had significantly higher AQS scores than insecure and disorganized infants in particular. At the AQS item level, disorganized infants were described as significantly more noncompliant, fussy, and angry relative to secure infants. When security as assessed using the SSS was controlled, the observed quality of parental interactive behavior, parental ego-resilience, high levels of infant task orientation and pleasure, and low levels of infant anger proneness were found to explain significant and unique portions of the variance in the AQS security scores. The apparently unfavorable set of characteristics associated with low AQS security scores suggests such scores to predict later developmental problems. ©2004 Michigan Association for Infant Mental Health. [source]


    Attachment in low-SES rural Appalachian infants: Contextual, infant, and maternal interaction risk and protective factors

    INFANT MENTAL HEALTH JOURNAL, Issue 6 2001
    Margaret Fish
    Attachment classifications were obtained for 95 low-socioeconomic-status (SES) rural Appalachian infants in the Strange Situation procedure at 15 months. The distribution of secure (B) and insecure (A, C, D) infants was similar to other low-SES samples and significantly different from low-risk samples. Levels of contextual and infant risk, together with maternal responsiveness to crying and pattern of sensitivity from 4 to 9 months, predicted attachment security. High social support, when examined as a protective factor, related to reduced contextual risk, but not to increased likelihood of security. Exploratory discriminant function analyses showed that infants in secure relationships differed in positive directions on contextual and maternal interactional factors. Insecure-organized (A and C) infants experienced contextual and maternal interaction risks, while insecure-disorganized (D) infants were best distinguished by infant characteristics, including greater likelihood of being male and low use of mother as a secure base at 9 months. ©2001 Michigan Association for Infant Mental Health. [source]


    Dental hygienists' views on communicative factors and interpersonal processes in prevention and treatment of periodontal disease

    INTERNATIONAL JOURNAL OF DENTAL HYGIENE, Issue 3 2010
    J Stenman
    To cite this article: Int J Dent Hygiene,8, 2010; 213,218 DOI: 10.1111/j.1601-5037.2010.00459.x Stenman J, Wennström JL, Abrahamsson KH. Dental hygienists' views on communicative factors and interpersonal processes in prevention and treatment of periodontal disease. Abstract:, Objective:, The aim of this study was to explore views of DHs on communicative issues and interpersonal processes of importance in the prevention and treatment of periodontal disease. Method:, The qualitative method of Grounded Theory (GT) was chosen for data sampling and analysis. Audio-taped and open-ended interviews were conducted with 17 dental hygienists. The interviews were transcribed verbatim and analysed in a hierarchical coding process, according to the principles of GT. Result:, In the analysis a core category was identified as ,to be successful in information and oral health education and managing desirable behavioural changes'. The core concept was related to four additional categories and dimensions; (i) ,to establish a trustful relationship with the patient', (ii) ,to present information about the oral health status and to give oral hygiene instructions', (iii) ,to be professional in the role as a dental hygienist' and (iv) ,to have a supportive working environment in order to feel satisfaction with the work and to reach desirable treatment results'. Conclusion:, The results describe a psychosocial process that elucidates the importance of building a trustful relationship with the patient, feeling secure in one's professional role as a DH and last but not least, the importance of having support from colleagues and the clinical manager to be successful in the prevention and treatment of periodontal diseases. [source]


    An efficient dynamic group key agreement protocol for imbalanced wireless networks

    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 4 2010
    Yun-Hsin Chuang
    Owing to the popularity of wireless networks, the group key agreement (GKA) design is critical for providing secure group communications over an insecure wireless channel. In 2005, Nam et al. proposed a GKA protocol for imbalanced wireless networks in which an imbalanced wireless network consists of many mobile nodes with limited computing capability and a powerful node with less restriction. In 2007, Tseng showed that Nam et al.'s protocol is not a contributory GKA, while he also proposed a new GKA protocol. However, neither GKA protocol is concerned with dynamic member joining/leaving. This is an important functionality of GKA, especially for a wireless network environment. In this paper, we propose a dynamic group key agreement protocol for imbalanced wireless networks, and show that it requires less computation cost for dynamic member joining/leaving as compared to the previously proposed protocols. We also show that the proposed protocol is provably secure against passive attacks under the decision Diffie,Hellman problem and the hash function assumptions. Furthermore, by the pre-shared two-party key between a mobile node and the powerful node in the existing imbalanced wireless networks, we propose a generalized GKA protocol that requires only several hash functions. Copyright © 2010 John Wiley & Sons, Ltd. [source]


    The meaning of good and bad care in the community care: older people's lived experiences

    INTERNATIONAL JOURNAL OF OLDER PEOPLE NURSING, Issue 3 2009
    Ingrid From MSc
    In spite of a considerable body of research in the past decades on what does or does not constitute good care for older people, there are still few studies addressing this question in which older people narrate their experiences of being dependent on community care. This study was therefore carried out aiming to explore older people's lived experiences of what good and bad care meant to them, when it was offered by community care services. Nineteen older persons in three Swedish communities participated in the study, which used a phenomenological,hermeneutic approach. Data were collected through unstructured interviews and Colaizzi's framework was utilized in the analysis of the data. The key theme arising from the analysis was that of being encountered as a human being by caregivers who, through the provision of safe and secure care, provide opportunities for living life as usual. When any of these circumstances are lacking, bad care will be the consequence. As the general intention in society is to ensure good quality of care to older people as well as others, the findings in our study should have important implications for providers of community care for older people. [source]


    Governing Terror: The State of Emergency of Biopolitical Emergence

    INTERNATIONAL POLITICAL SOCIOLOGY, Issue 1 2007
    MICHAEL DILLON
    This paper argues that western security practices are as biopolitical as they are geopolitical. Explaining that biopolitical security practices revolve around "life" as species existence, the paper explores how biopoliticized security practices secure by instantiating a general economy of the contingent throughout all the processes of reproductive circulation that impinge upon species existence. For this reason, "Governing Terror" does not merely reference the massive global security effort that is now devoted to governing terror. It observes how western security practices are themselves now also governed by a widespread fear of terror. It locates that fear in the way that western biopolitics has long adopted "the contingent" as its principle of formation. Here, "the real" is understood and experienced differently, as a general economy of emergence: "life" understood as constant nonlinear adaptation and change. The paper concludes that the state of emergency, which governs western politics of security at the beginning of the twenty-first century is not that of Carl Schmitt or Giorgio Agamben. The state of emergency which governs western security politics is the emergency of emergent life itself. [source]


    (A-)typical and (in-)secure?

    INTERNATIONAL SOCIAL SECURITY REVIEW, Issue 4 2008
    "non-standard" forms of employment in Europe, Social protection
    Abstract Atypical forms of employment (part-time work, mini-jobs, fixed-term contracts and solo self-employment) have gained in importance overall in recent years in many European countries. They are often part of an irregular career pattern and carry a high risk of unemployment. In a 6-country comparison (Germany, the United Kingdom, the Netherlands, Italy, Denmark and Poland) we consider whether and in what way national social protection laws cover the various forms of non-standard employment and the specific risks these entail. Significant variations were found in coverage standards and practices between countries as well as substantial variability within countries in their responses to different types of non-standard employment. A need for further and improved coordination of both social legislation and tax law is identified. [source]


    Jus Post Bellum: Just War Theory and the Principles of Just Peace

    INTERNATIONAL STUDIES PERSPECTIVES, Issue 4 2006
    ROBERT E. WILLIAMS JR.
    What happens following a war is important to the moral judgments we make concerning warfare, just as the intentions going in and the means used are. There has, however, been inadequate attention paid to considerations of jus post bellum in the just war tradition. This essay seeks to contribute to recent efforts to develop jus post bellum principles by first noting some of the ways that jus ad bellum and jus in bello considerations serve to constrain what can legitimately be done after war. We argue, however, that the constraints grounded in traditional just war theory do not offer sufficient guidance for judging postwar behavior and that principles grounded in the concept of human rights are needed to complete our understanding of what constitutes a just war. A just peace exists when the human rights of those involved in the war, on both sides, are more secure than they were before the war. [source]


    Designing Police: Interpol and the Study of Change in International Organizations

    INTERNATIONAL STUDIES QUARTERLY, Issue 4 2005
    Michael Barnett
    On those rare occasions when scholars of international organizations (IOs) consider the issue of change, they typically highlight the centrality of states. Although states are important for understanding when and why there is a change in the tasks, mandate, and design of IO, IOs themselves can initiate change. Drawing from sociological institutional and resource dependence approaches, in this article we treat IOs as strategic actors that can choose among a set of strategies in order to pursue their goals in response to changing environmental pressures and constraints that potentially threaten their relevance and resource base. We delineate six strategies,acquiescence, compromise, avoidance, defiance, manipulation, and strategic social construction, and suggest that the strategic choice by IOs is contingent on the level of both organizational insecurity and the congruence between the content of environmental pressures and organizational culture. We emphasize how IOs must make a trade-off between acquiring the resources necessary to survive and be secure, on the one hand, and maintaining autonomy, on the other. We apply this framework to the case of Interpol, investigating how different calculations of these trade-offs led Interpol staff to adopt different strategies depending on its willingness to accept, resist, or initiate changes that demand conformity to external pressures. [source]