Spelling suggestions: "subject:"De lla protection"" "subject:"De laa protection""
461 |
Implementation of the Acquired Rights DirectiveSargeant, Malcolm January 1997 (has links)
No description available.
|
462 |
Guardians of childhood : state, class and morality in a Sri Lankan bureaucracyAmarasuriya, Harini Nireka January 2011 (has links)
This thesis explores the everyday practices, relationships and interactions in a Probation Unit of the Department of Probation and Child Care Services in the Central Province in Sri Lanka. Using multi-sited ethnography and the ethnographer’s own experiences in this sector it examines how frontline workers at the Probation Unit engage and draw upon international and national development discourse, ideas and theories of children and childhood to engage with colleagues and clients. This thesis takes as its analytical starting point that state agencies are sites where global development discourse meets local practices. Simultaneously, they are sites where ideas and practices of nationalism, class, morality and professional identity are produced and reproduced. State sector employment is an important source of social mobility, gaining respectability and constructing a middle class identity. Thus, maintaining the ‘in-between’ position in relation to the upper and lower classes is an especially anxiety-ridden and challenging process for state bureaucrats. This shapes the particular characteristics of their nationalism, morality and professional identity and influences the way in which they translate policies and engage with institutional and bureaucratic procedures. This thesis examines this process in detail and illustrates its translocal nature. More explicitly it looks at the ways in which development discourse and practice is transformed by the forms of sociality that it engenders. The ethnography illustrates that this process allows for development policies and interventions to be co-opted in particular ways that articulate ideas and practices of nationalism, class, morality and professional identity. Through this cooption, the outcomes of development policies and interventions are transformed in unanticipated ways. The broader social and political process that transforms development policies and practices remains only partially visible to development projects and programmes. The complexity and in particular the historicity of social and political contexts remains outside development project logic and timelines. To understand the relationship between policy and practice or to evaluate development outcomes is meaningless if development is conceptualised as something that stands apart from society. What is most useful to understand, and indeed revealing, is how actors make meaning of development policies and programmes as part of everyday practices in historically situated social and political contexts. The thesis concludes that theorising, analysing or even critiquing development’s transformative potential is misleading as it fails to recognise that what is being transformed is development itself.
|
463 |
Investigation of immune quiescence: assessing the role of regulatory T cells and their link with IRF-1 in HIV-exposed sero-negative individualsAbdullahi, Abdirahman 05 January 2017 (has links)
Recent research of a cohort of HIV exposed sero-negative (HESN) female commercial sex workers in Nairobi has revealed an Immune Quiescent phenotype; characterized by reduced T cell activation and higher regulatory T cells (Tregs) in peripheral blood. HESN women also express lower levels of interferon regulatory factor-1 (IRF-1), a critical regulator known to negatively impact Treg development in mice. In this study, we analyzed the functional capacity of Tregs by an in vitro depletion assay and measured functionality by flow cytometry. Data showed Tregs suppressed CD4+ and CD8+ proliferation responses. We characterized the link between Tregs and IRF-1 in HESN and observed an inverse correlation between IRF-1 expression and Treg proportions. We also established reduced expression of IRF-1 in Tregs of healthy donors by flow cytometry. In a separate study, flow cytometric analysis of high-risk sex-workers revealed that CTLA-4 expression in memory CD4+cells, not Treg frequency, was associated with HIV seroconversion. / February 2017
|
464 |
Cyberciege scenario illustrating integrity risks to a military like facilityFielk, Klaus W. 09 1900 (has links)
Approved for public release; distribution is unlimited. / Note: the appendix file for this item is not available. / As the number of computer users continues to grow, attacks on assets stored on computer devices have increased. Despite an increase in computer security awareness, many users and policy makers still do not implement security principles in their daily lives. Ineffective education and the lack of personal experience and tacit understanding might be a main cause. The CyberCIEGE game can be used to convey requisite facts and to generate tacit understanding of general computer security concepts to a broad audience. This thesis asked if a Scenario Definition File (SDF) for the CyberCIEGE game could be developed to educate and train players in Information Assurance on matters related to information integrity in a networking environment. The primary educational concern is the protection of stored data. Another goal was to test whether the game engine properly simulates real world behavior. The research concluded that it is possible to create SDFs for the CyberCIEGE game engine to teach specifically about integrity issues. Three specific SDFs were developed for teaching purposes. Several SDFs were developed to demonstrate the game engine's ability to simulate real world behavior for specific, isolated educational goals. These tests led to recommendations to improve the game engine. / Lieutenant, German Navy
|
465 |
Interdicting electrical power gridsAlvarez, Rogelio E. 03 1900 (has links)
Approved for public release; distribution is unlimited / This thesis explores Benders decomposition for solving interdiction problems on electric power grids, with applications to analyzing the vulnerability of such grids to terrorist attacks. We refine and extend some existing optimization models and algorithms and demonstrate the value of our techniques using standard reliability test networks from IEEE. Our implementation of Benders decomposition optimally solves any problem instance, in theory. However, run times increase as Benders' cuts are added to the master problem, and this has prompted additional research to increase the decomposition's efficiency. We demonstrate empirical speed ups by dropping slack cuts, solving a relaxed master problem in some iterations, and using integer but not necessarily optimal master-problem solutions. These mixed strategies drastically reduce computation times. For example, in one test case, we reduce the optimality gap, and the time that it takes to achieve this gap, from 16% in 75 hours to 5% in 16 minutes. / FUNDED BY: 2002-GT-R-057 / Lieutenant Commander, United States Navy
|
466 |
Förundersökning och koncept-framtagning av kompletterande produkt till RSS fallskyddssystem : Möjliggörande applicering av RSS fallskyddssystem till tak med fotrännorDavidsson, Marcus January 2016 (has links)
Detta är en rapportering av ett examinationsprojekt inom högskoleingenjörsprogrammet i innovationsteknik och design. Uppdragsgivaren och projektbeställaren var Stefan Bäckström, VD för Roofac AB. Syftet med projektet var att göra en förundersökning om möjligheten att applicera RSS (Roof Safety Systems) fallskyddssystem på tak med fotrännor genom en tillbehörsprodukt. Denna förundersökning skulle därmed leda till en kunskapsbank och material som skulle kunna vara till nytta för vidare utvecklingsarbete av tillbehörsprodukten. Syftet var också att göra en bedömning kring potentialen att erhålla en prototyp som är tillräckligt bra att användas som en tillbehörsprodukt. Metoden att uppfylla syftet med projektet och uppnå de uppsatta målen har varit att använda PU-processen som har präglats i utbildningens olika projektarbeten. I planeringen av projektet har verktyg som WBS, PERT-schema, Gant-schema och projektmodell använts för att strukturera projektet. I förstudien har research, användarundersökning och analyser utförts för att samla kunskap och underlag till konceptframtagningsarbetet. Analyserna resulterade i en kravspecifikation som kan användas som ett underlag för utvärdering av genererade koncept. Även en mockup-modell av tak med fotränna har konstruerats för att underlätta testning och utvärdering av fysiska koncept-prototyper. Konceptframtagningsarbetet har utgjorts av idégenerering, konceptgenerering och konceptutvärdering. Idégenereringen baserades på tre idégenereringssessioner, en med ett gäng studenter, en med produktutvecklingsingenjörer på Semcon i Karlstad och en med uppdragsgivaren och kollega på Roofac. Utifrån idéerna genererades sedan CAD-modeller som användes till att generera koncept. Koncepten utvärderades sedan med hjälp av för- och nackdelslista och matris. Resultatet av utvärderingen blev tre slutgiltiga koncept. För att uppnå målet med att leverera en fysisk modell/prototyp att använda som uppvisningsmaterial under utställningen av projektet, avgränsades prototypframtagnings- och testningsarbetet med att gå vidare med den lämpligaste av de tre slutgiltiga koncepten. Från prototypframtagningen och testningen erhölls en fysisk modell av det koncept som valdes att gå vidare med efter konceptframtagningen. Denna modell användes tillsammans med en mockup-modell vid utställningen av projektet. Baserat på resultatet från förstudien, konceptframtagningen, prototypframtagningen samt mockupbygget har en kunskapsbank samt material erhållits att kunna använda i vidare arbeten. Utifrån detta anses därför att syftet med projektet vara uppfyllt.
|
467 |
The perception and management of pollution risks in Taiwan's electric utilitySung, Martin (Ming-Che) January 1999 (has links)
This thesis is the study of the perception and management of pollution risks in Taiwan's electric utility in terms of a social science paradigm of risk. It represents the first examination of Feng Shui belief impact on Taiwanese risk behaviour in electric risk settings. The deep seated culture and widespread practice of Feng Shui in traditional Chinese society would lead to the assumption that Feng Shui belief should strongly influence Taiwan risk behaviour. This empirical study research revealed that Feng Shui belief is much less important to Taiwanese risk behaviour than might have been thought. Most of the variation in electric risk acceptability resulted from the influence of social equity and justice. This study also examined the literature between Feng Shui and risk. What emerged from this is the notion that Feng Shui can be regarded as helpful complementary thinking in a social science paradigm of risk. This study suggests a number of important implications for Taipower Company and risk regulators. The choice about siting of a power plant should take account of the concept of Feng Shui the boundary rather than the concept of the fixed and administrative boundary. Implication also emerged in relation to social trust and the understanding of local residents' risk perception
|
468 |
The development of copyright law in the United Kingdom and the Republic of CameroonKonneh, Gasper Neba January 1995 (has links)
This work is on the history of copyright law in two jurisdictions: the United Kingdom and the Republic of Cameroon. It traces the origin and development of copyright protection in these jurisdictions, laying emphasis on the influence of international copyright on the development of copyright law in these two countries. It also focuses on the extent to which copyright laws in both countries have been amended over the years to enable it to catch up with advances in science and technology. As far as the development of copyright law in the United Kingdom is concerned, the major areas discussed include the system of royal copyright privileges in the fifteenth and sixteenth centuries and its role in the birth of the concept of literary property; the role of the Stationers' Company in the early development copyright; the historic Copyright Act of 1709 and its application in England and Scotland; the landmark case of Donaldson v. Beckett and its importance in the formulation of the concept of authors' rights and the demolition of common law copyright; the proliferation of copyright legislation in the eighteenth and nineteenth centuries; the consolidation of statutory copyright by the 1911 Copyright Act and, subsequently, the Copyright Act, 1956 and the Copyright, Designs and Patents Acts, 1988. Also discussed is the UK's adhesion to certain conventions in the area of copyright and neighbouring rights and the extent to which these conventions have influenced the development of its copyright law.
|
469 |
Protection du consommateur et commerce électronique : droit français, européen et tunisien. / Consumer protection and e-commerce : French, European and Tunisian law.Chemlali, Laroussi 29 November 2011 (has links)
Le commerce électronique B to C se popularise de plus en plus et le nombre de ses adeptes ne cesse de croître d'année en année. Ses avantages, pour les consommateurs, en termes de rapidité, de commodité et de proximité ne sont plus à prouver. Néanmoins, la particularité du medium utilisé pour effectuer des transactions en ligne et les spécificités de l'environnement électronique, notamment l'immatérialité, l'interactivité et l'internationalité influent considérablement sur la confiance des cyberconsommateurs en même temps qu'elles accroissent leur vulnérabilité, d'où la nécessité d'un cadre juridique adapté afin que l'essor du commerce électronique B to C ne néglige pas la protection des cyberconsommateurs. Conscients de cet impératif, les législateurs communautaire, français et tunisien, ont mis en place un certain nombre de mesures de nature à rassurer ces derniers et leur permettre de s'engager dans des transactions de commerce en ligne en toute confiance. Ces mesures sont de deux ordres : les unes sont destinées à assurer au cyberconsommateur une protection intrinsèque au processus de la transaction en ligne ; cette protection se manifeste en amont de la transaction, lors de la phase précontractuelle, mais également pendant la période contractuelle, c'est-à-dire au moment de la finalisation de la transaction en ligne et de son exécution. Les autres ont pour objectif de garantir au consommateur une protection extrinsèque au processus de la transaction du commerce électronique. Deux aspects sont, à cet égard, pris en compte : la protection des données à caractère personnel traitées dans le cadre d'une transaction en ligne et les aspects du droit international privé de la protection du cyberconsommateur. / B to C e-commerce is increasingly gaining popularity. The number of its followers has seen a drastic surge throughout the few recent years. Its advantages in terms of speed, convenience and proximity are not any more questionable by consumers. Nevertheless, the characteristic of this medium used to carry out online transactions as well as the specificities of the electronic environment - in particular the immateriality, the interactivity and internationality - influence considerably cyber-consumers confidence. Simultaneously, they increase their vulnerability. Thus, the need for an appropriate legal framework to regulate the rise of B to C e-commerce and protect cyber-consumers. Taking into account these requirement, community, French and Tunisian legislators set up a number of measures to reassure the latter and allow them to engage confidently in online commerce transactions. These measures have two targets: some of them were intended to grant cyber-consumers an intrinsic protection in the process of the online transaction. This protection is set to be an upstream transaction protection at the pre-contractual phase as well as during the contractual period; i.e. at the level of on line transaction finalization and execution. The others aim to guarantee the consumer an extrinsic protection throughout the process of e-commerce transaction. In this respect, two aspects are taken into account, namely: personal data processed during transactions and the aspects of private international law of cyber-consumer protection.
|
470 |
Ochrana spotřebitele v oblasti cestovního ruchu / Consumer protection in the area of tourismFrnochová, Lucie January 2010 (has links)
1 Consumer protection in tourism - abstract The purpose of my thesis is to analyse consumer protection in tourism in European Union law and in the Czech law. The reason for my research is the fact that tourism is currently one of the most important components of the economy of Member States and European Union institutions engaged more and more attention to tourist protection. The thesis is composed of four chapters, each of them dealing with different aspects of consumer protection in tourism. Chapter One is introductory and contains a description of the objectives of this thesis. Chapter Two deals with the sources of the law of consumer protection in the European Union and in Czech Republic. The chapter consists of two Subchapter. Subchapter One consist of two parts. Part One briefly describes the history of consumer protection in European Union and it focuses on the sources of primary law of European Union and the importance of consumer protection as one of the fundament policies of European Union. Part Two presents the sources of secondary law of European Union, therefore, directives and regulation governing consumer protection in different sectors. Subchapter Two describes the sources of Czech consumer protection law. Chapter Three is focused on costumer protections. The chapter consists of four...
|
Page generated in 0.1404 seconds