Spelling suggestions: "subject:"posi"" "subject:"osi""
1 |
Suppression of osteoblast phenotype in the marrow mesenchymal stem cell by nuclear receptor PPARγ2Rahman, Sima 27 December 2011 (has links)
No description available.
|
2 |
IT-Security Investment ModelsWolff, Janik January 2010 (has links)
No description available.
|
3 |
IT-Security Investment ModelsWolff, Janik January 2010 (has links)
No description available.
|
4 |
The d/Deaf social worker body as multiplicity: a feminist poststructural autoethnography of deafness and hearing. / Deaf social worker body as multiplicityJezewski, Meghan Maria Jadwiga 19 July 2012 (has links)
As a feminist poststructural autoethnography of deafness in social work workplaces, this thesis sets out to map d/Deafness as a cracked subjectivity. Using the work of Rosi Braidotti and Gilles Deleuze and Félix Guattari, I draw out configurations of d/Deafness as lack or cultural minority and split them apart. By positioning d/Deafness on a plane of immanence and employing specificity, I explore d/Deafness as a subjectivity constituted through space, place, time and encounters with other bodies. I argue that the constitution of material and cultural experiences of d/Deafness as specific allows for the articulation of spaces in between Deafness and hearing, disability and ability as spaces in and of themselves in order to think the new as well as to crack up fixed binaries informing traditional notions of what specific bodies can do. / Graduate
|
5 |
"Jag drar mig tillbaka i glappet, som också är en spricka" : Ett nomadiskt subjekt blir till i Nina Bouraouis SauvageHedenäs, Malin January 2020 (has links)
In this essay called I withdraw into the gap, which is also a crevice. A nomadic subject comes into being in Nina Bouraoui’s Sauvage, I investigate which aspects in the novel play an important part in relation to the protoganist Alya’s process of becoming a subject in the passage from childhood to adulthood. Through Rosi Braidotti’s theories on the nomadic becoming of a subject I investigate a becoming that is nonunitary, non-linear and constantly changing. This becoming happens in the novel between affects like fear, violence, desire and different experiences of time, and also through a non-chronological narrative and a language which can both deceive, and create the world. My results show that becoming in Sauvage is about being aware of the outside boundaries and one’s own position in relation to those. For Alya, fear and desire work as transformative and transgressional aspects. In between her affective body and the world which tries to force its boundaries on her, she finds that in between those outside images and her inner affective response, there is a space, a gap, and in the movement between is where she becomes who she is in a process that is a constant negotiation. The subject that emerges in the end of the novel is not a unitary subject, but a nomadic one, that is constantly changing and becoming.
|
6 |
Den formlösa kroppen – En väg ut : Kropp, rum och språk i Stina Aronsons Feberboken / The Shapeless Body – A Way OutBeck-Remnes, Alice January 2020 (has links)
No description available.
|
7 |
Unsubstantial Territories : Nomadic Subjectivity as Criticism of Psychoanalysis in Virginia Woolf's The WavesBelov, Andrey January 2019 (has links)
This essay looks at subjectivity in Virginia Woolf’s The Waves employing a psychoanalytic approach and using the theories of Gilles Deleuze and Félix Guattari. Woolf’s relation to the theories of her contemporary Sigmund Freud was unclear. Psychoanalytic scholarship on Woolf’s writings, nevertheless, established itself in 1980’s as a dominant scholarly topic and has been growing since. However, the rigidity and medicalizing discourse of psychoanalysis make it poorly compatible with Woolf’s feminist, anti-individualist writing. This essay is a reading of The Waves, in which psychoanalytic theory is infused with a Deleuzo-Guattarian approach. The theories of psychoanalyst Jacques Lacan, and especially his concept of the Other, together with Rosi Braidotti’s concept of nomadic subjectivity, are used as relevant tools for thinking about subjectivity in the context of The Waves. The resultant reading is a criticism of psychoanalysis. In this reading, two characters are looked at in detail: Percival and Bernard. Percival emerges as the Lacanian Other, who, situated at the central nexus of power, symbolises the tyrannies of individuality and masculinity. Simultaneously, Percival is detached from the metaphysical world of the novel. His death marks a shift from oppressive individuality towards nomadic subjectivity. For Bernard, nomadic subjectivity is a flight from the dead and stagnating centre towards periphery, where new ethics can be negotiated. The essay concludes with the implications of such reading: the affirmation of nomadic subjectivity makes the Deleuzo-Guattarian approach more relevant in the context of Woolf, whereas psychoanalytic striving towards structure, dualism, and focus on pathology are rejected as incompatible with her texts.
|
8 |
Att sjunka in i ovetenhet : Nomadiska subjekt, humanism och posthumanism i Kerstin Ekmans Hunden (1986) och Löpa varg (2021)Törning Skoglund, Robin January 2024 (has links)
This thesis aims to discuss how we should understand concepts such as humanism and posthumanism through readings of Kerstin Ekman’s Hunden (1986) and Löpa varg (2021). In particular it explores the concepts in relation to the core values such as ”respecting the environment” and ”western humanism” that features in the Swedish curriculum. I do so by using Rosi Briadotti’s theories on nomadic subjects and Malin Alkestrand’s didactic potential. Seeing Kerstin Ekman as a writer who problematize our understanding of humanism and posthumanism in relation to nature relies on the scholarly findings of primarily Linda Haverty Rugg, Marie Öhman and Anna-Karin Jonasson. In the first part of the analysis I argue for an understanding of the character Ulf in Löpa varg as a nomadic subject from whoms subjectivity a struggle between the humanism and the posthumanism arises, in relation to the attacks he encounters. The second part of the analysis focuses on Hunden and I ascertain an understanding of the novels conflict as a subjective becoming that the canine main protagonist Den gråe undergoes. Through this we see an argument of the nature’s flora and fauna as bearers of a soul in their own right. The third and final part of the analysis ties the found themes and motifs together and ponders how they could be used in the classroom. The focal take-away from the analysis is that a combination of humanistic and posthumanistic values reigns in the novels. Sometimes the nodes of knowing and unknowing needs to be blurred to navigate through life, if life’s objective is respecting both nature and the humans therein.
|
9 |
Adding value to business performance through cost benefit analyses of information security investments : MBA-thesis in marketingCardholm, Lucas January 2007 (has links)
<p>The purpose of this thesis is to present an approach for good practice with regards to using cost benefit analysis (CBA) as a value-adding activity in the information security investment process for large enterprises. The approach is supported by empirical data.</p><p>From a MIO model perspective, this report is focused on the phase of strategic choices regarding organization, i.e. trying to find optimal investments for efficient operations. To assess, improve and monitor the operational effectiveness and management’s internal control environment is essential in today’s business execution. Executive management and boards are increasingly looking for an information security governance framework that encompasses information technology and information security: a single framework through which all information assets and activities within the organisation can be governed, to provide the optimum capability for meeting the organisation’s objectives, in terms of functionality and security.</p><p>The investment decision is one of the most visible and controversial key decisions in an enterprise. Some projects are approved, others are bounced, and the rest enter the organisational equivalent of suspended animation with the dreaded request from the decision makers to “redo the business case” or “provide more information.”</p><p>The concept of cost benefit analyses of information security helps management to make decisions on which initiatives to fund with how much, as there needs to be an approach for measuring and comparing different alternatives and how they meet business objectives of the enterprise. Non-financial metrics are identified using different approaches: governance effectiveness, risk analysis, business case analysis or game theory. The financial performance metrics are driven by the main value disciplines of an enterprise. These lead to the use of formulas enabling the measurement of asset utilisation, profit or growth: ROI (ROIC), NPV, IRR (MIRR), FCF, DCF, Payback Period, TCO, TBO, EVA, and ROSI.</p><p>The author shows research in the field of good corporate governance and the investment approval process, as well as case studies from two multinational enterprises. The case from Motorola demonstrates how IT governance principles are equally applicable to information security governance, while the case from Ericsson demonstrates how an information security investment decision can be supported by performing a cost benefit analysis using traditional marketing approaches of business case analysis (BCA) and standard financial calculations.</p><p>The suggested good practice presented in this thesis is summarised in four steps:</p><p>1. Understand main rationale for the security investment</p><p>2. Identify stakeholders and strategic goals</p><p>3. Perform Cost Benefit Analysis (non-financial and financial performance metrics)</p><p>4. Validate that the results are relevant to stakeholders and strategic goals</p><p>DISCLAIMER</p><p>This report is intended for academic training only and should not be used for any other purposes. The contents are not to be considered legal or otherwise professional advice. No liability is taken, whatsoever, by the author.</p>
|
10 |
Adding value to business performance through cost benefit analyses of information security investments : MBA-thesis in marketingCardholm, Lucas January 2007 (has links)
The purpose of this thesis is to present an approach for good practice with regards to using cost benefit analysis (CBA) as a value-adding activity in the information security investment process for large enterprises. The approach is supported by empirical data. From a MIO model perspective, this report is focused on the phase of strategic choices regarding organization, i.e. trying to find optimal investments for efficient operations. To assess, improve and monitor the operational effectiveness and management’s internal control environment is essential in today’s business execution. Executive management and boards are increasingly looking for an information security governance framework that encompasses information technology and information security: a single framework through which all information assets and activities within the organisation can be governed, to provide the optimum capability for meeting the organisation’s objectives, in terms of functionality and security. The investment decision is one of the most visible and controversial key decisions in an enterprise. Some projects are approved, others are bounced, and the rest enter the organisational equivalent of suspended animation with the dreaded request from the decision makers to “redo the business case” or “provide more information.” The concept of cost benefit analyses of information security helps management to make decisions on which initiatives to fund with how much, as there needs to be an approach for measuring and comparing different alternatives and how they meet business objectives of the enterprise. Non-financial metrics are identified using different approaches: governance effectiveness, risk analysis, business case analysis or game theory. The financial performance metrics are driven by the main value disciplines of an enterprise. These lead to the use of formulas enabling the measurement of asset utilisation, profit or growth: ROI (ROIC), NPV, IRR (MIRR), FCF, DCF, Payback Period, TCO, TBO, EVA, and ROSI. The author shows research in the field of good corporate governance and the investment approval process, as well as case studies from two multinational enterprises. The case from Motorola demonstrates how IT governance principles are equally applicable to information security governance, while the case from Ericsson demonstrates how an information security investment decision can be supported by performing a cost benefit analysis using traditional marketing approaches of business case analysis (BCA) and standard financial calculations. The suggested good practice presented in this thesis is summarised in four steps: 1. Understand main rationale for the security investment 2. Identify stakeholders and strategic goals 3. Perform Cost Benefit Analysis (non-financial and financial performance metrics) 4. Validate that the results are relevant to stakeholders and strategic goals DISCLAIMER This report is intended for academic training only and should not be used for any other purposes. The contents are not to be considered legal or otherwise professional advice. No liability is taken, whatsoever, by the author.
|
Page generated in 0.0415 seconds