• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 208
  • 30
  • 30
  • 28
  • 22
  • 20
  • 6
  • 6
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • Tagged with
  • 479
  • 140
  • 115
  • 65
  • 58
  • 56
  • 51
  • 50
  • 50
  • 48
  • 42
  • 40
  • 38
  • 37
  • 36
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
341

Cadeia logística segura brasileira: suprimento internacional de carne bovina industrializada e rastreabilidade. / Brazilian secure supply chain: processed beef supply and traceability.

Maria Lídia Rebello Pinho Dias 26 March 2012 (has links)
O presente trabalho de pesquisa modela a cadeia de suprimentos brasileira da carne bovina industrializada destinada ao mercado internacional e aspectos do conjunto normativo incidente sobre este setor. Por meio desta modelagem, são apresentados os requisitos para um sistema de controle e integração das informações em tempo real em frigoríficos exportadores que atenda as exigências do poder público e de parceiros comerciais, além das principais necessidades do próprio frigorífico. Este trabalho de pesquisa apresenta, também, a arquitetura de hardware, de software e a metodologia do sistema operacional proposto, além dos benefícios advindos de sua eventual implementação. Este sistema, ora denominado Cadeia Logística Segura para Exportação de Carne Bovina Industrializada (CLSECB) contém as informações necessárias para a gestão do frigorífico, o controle de qualidade do produto, o trâmite burocrático da mercadoria, através da aplicação de dispositivos de identificação por rádio frequência (RFID) e do sistema operacional proposto. O CLSECB, portanto, permite identificar o produto (individualmente e/ou por lotes), associar informações ao produto (tanto sobre sua qualidade quanto sobre sua procedência), coletar e transmitir essas informações de forma rápida, eficiente e segura. Deste modo, o CLSECB é um sistema que, se implementado, permitirá a rastreabilidade total dentro do processo de industrialização e, será um avanço para a rastreabilidade total ao longo de toda a cadeia de suprimentos da carne bovina industrializada. Tais realizações, por fim, aproximam a cadeia de suprimentos da carne bovina industrializada dos ideais do programa Brasil-ID, do objetivo de obter uma linha azul para a exportação deste produto e do objetivo de expandir os mercados existentes e conquistar novos mercados internacionais. / This research work models the Brazilian supply chain of industrialized beef destined to the international market and regulatory aspects regarding this sector. Through this modeling, the requirements are presented for a system that controls and integrates information in real-time around beef producer exporters that meets the demands of the Government and business partners, including the main needs of the industry itself. This research work also presents the hardware and the software architecture and the methodology of a proposed operating system, including the benefits obtained from its eventual implementation. Thus, the proposed system, called Secure Supply Chain for the Export of Processed Beef (CLSECB Cadeia Logística Segura para Exportação de Carne Bovina Industrializada), contains the necessary information to the management of the industry, the quality control of the product, the bureaucratic processes of goods through the application of Radio-Frequency Identification (RFID) devices and the proposed operation system. The CLSECB allows the identification of the product (individually and/or by sets), the association of the products information (being it by its quality or by its precedence) and the collection and transmission of this information in a fast, efficient and secure way. Summarizing, the CLSECB is a system that, if implemented, will allow full traceability through the whole Brazilian supply chain of industrialized beef to exportation. Such accomplishments, bring together the Brazilian supply chain of industrialized beef and the ideals of the Brazil-ID program, the goal to obtain a blue channel to the exportation of this product and the target to expand existing markets and conquer new international markets.
342

Cadeia logística segura brasileira: suprimento internacional de carne bovina industrializada e rastreabilidade. / Brazilian secure supply chain: processed beef supply and traceability.

Dias, Maria Lídia Rebello Pinho 26 March 2012 (has links)
O presente trabalho de pesquisa modela a cadeia de suprimentos brasileira da carne bovina industrializada destinada ao mercado internacional e aspectos do conjunto normativo incidente sobre este setor. Por meio desta modelagem, são apresentados os requisitos para um sistema de controle e integração das informações em tempo real em frigoríficos exportadores que atenda as exigências do poder público e de parceiros comerciais, além das principais necessidades do próprio frigorífico. Este trabalho de pesquisa apresenta, também, a arquitetura de hardware, de software e a metodologia do sistema operacional proposto, além dos benefícios advindos de sua eventual implementação. Este sistema, ora denominado Cadeia Logística Segura para Exportação de Carne Bovina Industrializada (CLSECB) contém as informações necessárias para a gestão do frigorífico, o controle de qualidade do produto, o trâmite burocrático da mercadoria, através da aplicação de dispositivos de identificação por rádio frequência (RFID) e do sistema operacional proposto. O CLSECB, portanto, permite identificar o produto (individualmente e/ou por lotes), associar informações ao produto (tanto sobre sua qualidade quanto sobre sua procedência), coletar e transmitir essas informações de forma rápida, eficiente e segura. Deste modo, o CLSECB é um sistema que, se implementado, permitirá a rastreabilidade total dentro do processo de industrialização e, será um avanço para a rastreabilidade total ao longo de toda a cadeia de suprimentos da carne bovina industrializada. Tais realizações, por fim, aproximam a cadeia de suprimentos da carne bovina industrializada dos ideais do programa Brasil-ID, do objetivo de obter uma linha azul para a exportação deste produto e do objetivo de expandir os mercados existentes e conquistar novos mercados internacionais. / This research work models the Brazilian supply chain of industrialized beef destined to the international market and regulatory aspects regarding this sector. Through this modeling, the requirements are presented for a system that controls and integrates information in real-time around beef producer exporters that meets the demands of the Government and business partners, including the main needs of the industry itself. This research work also presents the hardware and the software architecture and the methodology of a proposed operating system, including the benefits obtained from its eventual implementation. Thus, the proposed system, called Secure Supply Chain for the Export of Processed Beef (CLSECB Cadeia Logística Segura para Exportação de Carne Bovina Industrializada), contains the necessary information to the management of the industry, the quality control of the product, the bureaucratic processes of goods through the application of Radio-Frequency Identification (RFID) devices and the proposed operation system. The CLSECB allows the identification of the product (individually and/or by sets), the association of the products information (being it by its quality or by its precedence) and the collection and transmission of this information in a fast, efficient and secure way. Summarizing, the CLSECB is a system that, if implemented, will allow full traceability through the whole Brazilian supply chain of industrialized beef to exportation. Such accomplishments, bring together the Brazilian supply chain of industrialized beef and the ideals of the Brazil-ID program, the goal to obtain a blue channel to the exportation of this product and the target to expand existing markets and conquer new international markets.
343

Securing wireless sensor and vehicular networks / Sécurité des réseaux de capteurs et des communications véhiculaires

Ben Jaballah, Wafa 08 January 2014 (has links)
Les Réseaux de Capteurs Sans Fils (RCSFs) et les réseaux véhiculaires sont de plus en plus répandus, et déployés dans des domaines d’applications variés tels que la santé, la surveillance environnementale, les applications d’alerte d’accident, et les applications militaires. Cependant, ces réseaux peuvent être sujets à des attaques, ce qui empêche leur utilisation à grande échelle. Cette thèse étudie la sécurité des communications pour les réseaux de capteurs sans fils, et les communications inter-véhiculaires. Dans ce but, nous abordons quatre aspects importants. La première étude porte sur l’authentification des messages diffusés dans les réseaux de capteurs. Nous nous concentrons sur les principaux schémas à base de divulgation de clés d’authentification. Nous démontrons que le délai de divulgation de clé induit un délai d’authentification, ce qui pourrait conduire à une attaque de mémoire de déni de service. Nous proposons ensuite deux protocoles d’authentification de la source dans les RCSFs, pour surmonter la vulnérabilité des solutions existantes. Les schémas proposés garantissent la gestion efficace de la mémoire tampon du récepteur, en utilisant un mécanisme d’authentification par niveau, et une structure de Filtre de Bloom afin de réduire le coût de communication. Ensuite, nous validons nos protocoles en utilisant l’outil de vérification AVISPA, et nous les évaluons avec des expérimentations dans l’environment TinyOS. Nous confirmons que ces protocoles fournissent un service d’authentification de la source tout en respectant les contraintes de RCSFs. La seconde étude porte sur le problème de stockage au niveau des capteurs. Nous considérons en particulier l’attaque d’authentification différée “Delayed Authentication Compromise” (DAC) dans les RCSFs, qui permet à un attaquant d’utiliser une clé déjà divulguée pour signer d’autres messages. Nous montrons d’abord que les systèmes récemment proposés qui sont résistants également à l’attaque DAC sont vulnérables aussi à deux types d’attaques: attaque de permutation de commandes (où un adversaire prétend “permuter” deux messages au fil du temps), et l’attaque de rejet de commandes (où un adversaire semble “cacher” un message envoyé par la station de base). Nous proposons ensuite une nouvelle solution d’authentification. Notre analyse montre que notre solution est efficace pour détecter à la fois l’attaque de permutation de commandes et l’attaque de rejet de commandes, — et en même temps — est plus efficace (en termes de communication et de calcul) que les solutions existantes. xxiDans la troisième étude, nous considérons le problème de la sécurité de la gestion des clés dans les réseaux de capteurs. Nous présentons de nouveaux schémas d’authentification à base de clés symétriques qui présentent un faible coût d’authentification et de communication. Nos systèmes sont construits en intégrant un mécanisme de réputation, un filtre de Bloom, et un arbre binaire de clés pour la distribution et la mise à jour des clés d’authentification. Nos schémas d’authentification sont efficaces en matière de communication et de consommation de l’énergie. La quatrième étude porte sur la sécurité des communications véhiculaires. Nous nous concentrons sur les applications d’alerte d’accident. Nous analysons les menaces pour un ensemble d’algorithmes. Nous démontrons que ces systèmes sont vulnérables à l’attaque d’injection d’une fausse position, à l’attaque de rejeu de message d’alerte, et à l’attaque d’interruption de message d’alerte. Ensuite, nous proposons des contre-mesures à ces menaces. Nous avons donc proposé une solution qui est à la fois rapide et sécurisée pour les applications d’alerte d’accident : Un algorithme rapide et sécurisé pour la diffusion des messages en multi-saut (FS-MBA). Enfin, nous confirmons l’efficacité et la faisabilité des différents protocoles en effectuant un ensemble de simulations sous le simulateur NS-2. / Wireless sensor and vehicular networks play an important role in critical military and civil applications, and pervade our daily life. However, security concerns constitute a potential stumbling block to the impeding wide deployment of sensor networks and vehicular communications. This dissertation studies communication security for Wireless Sensor Networks (WSNs), and vehicular communication. To this aim, we address four important aspects. The first study addresses broadcast authentication in WSNs. We focus on key disclosure based schemes. We demonstrate that key disclosure delay induces an authentication delay, which could lead to a memory DoS attack. We then propose two broadcastauthentication protocols for WSNs, which overcome the security vulnerability of existingsolutions. The proposed schemes guarantee the efficient management of receiver’s buffer, by employing a staggered authentication mechanism, and a Bloom filter data structure to reduce the communication overhead. We also validate our protocols under the AVISPA model checking tool, and we evaluate them with experiments under TinyOS. Our findings are that these protocols provide source authentication service while respecting the WSN constraints.The second study addresses the storage issue in WSNs, in particular the Delayed AuthenticationCompromise attack (DAC). We first demonstrate that recently proposed schemes, which also address the DAC issue are vulnerable to two kinds of attacks: switch command attack (where an adversary pretends to “switch” two messages over time), and drop command attack (where an adversary just pretends to “hide” a message sent from the broadcaster). As a countermeasure against these attacks, we propose a new solution for broadcast authentication. Our analysis shows that our solution is effective in detecting both switch command and drop command attack, and—at the same time—is more efficient (in terms of both communication and computation) than the state of the art solutions.In the third study, we address key management security in WSNs. We present novel symmetric-key-based authentication schemes which exhibit low computation and communication authentication overhead. Our schemes are built upon the integration of a reputation mechanism, a Bloom filter, and a key binary tree for the distribution and updating of the auxviii thentication keys. Our schemes are lightweight and efficient with respect to communication and energy overhead. The fourth study addresses security in vehicular communications. We focus on fast multi hop broadcast applications. We analyze the security threats of state of the art vehicular based safety applications. We demonstrate that these schemes are vulnerable to the position cheating attack, the replay broadcast message attack, and the interrupting forwarding attack. Then, we propose countermeasures for these threats. We hence propose a complete solution which is both fast and secure in broadcasting safety related messages: Fast and Secure Multi-hop Broadcast Algorithm (FS-MBA). Finally, we confirm the efficiency and feasibility of our proposals using an extensive set of simulations under NS-2 Simulator.
344

Traçabilité sécurisée embarquée : authentification autonome d'objets et de systèmes embarqués / Embedded and secure traceability : autonomous authentication of objects and of embedded systems

Idrissa, Abdourhamane 20 September 2012 (has links)
L'authentification homme-machine est une problématique largement développée pour les télécommunications. Une authentification dans le sens "machine-homme" permettra d'assurer l'utilisateur humain assermenté du fonctionnement intègre d'une machine lors, par exemple, d'une session de vote électronique ou d'une vérification d'objet en traçabilité sécurisée. Cette thèse se focalise sur la traçabilité sécurisée sans accès (systématique) à un canal de communication. Nous décrivons différentes techniques d'authentification de produits manufacturés en nous concentrant sur une méthode de caractérisation de motifs imprimés. Pour effectivement authentifier un objet, nous montrons qu'un agent vérifieur doit s'assurer de l'intégrité du tiers et du système électronique utilisée pour la vérification. Cependant l'authenticité du système électronique lui-même reste à vérifier. La question que nous adressons alors est la suivante : comment un être humain peut-il se convaincre de l'intégrité et de l'authenticité d'un système embarqué dans un mode hors ligne ? Nous définissons deux familles de solutions. Dans la première, l'utilisateur fait appel, pour les calculs, à un dispositif auxiliaire tandis que dans la seconde l'utilisateur ne fait usage que d'un papier et d'un crayon. Pour chacune des deux familles, nous proposons un protocole d'authentification d'un système embarqué dont la puce, typiquement un FPGA ou un microcontrôleur, dépend de la configuration ou de la programmation d'une mémoire RAM / "Human-to-Machine" authentication is widely developed for modern telecommunications. A "Machine-to-Human" authentication will ensure the trusted human user about the integrity of the machine, for example during an electronic voting session or object verification in secure traceability. This work is focused on secure traceability without any systematic access to a communication network. We depict different technics for goods authentication and we focus on a method based on the characterization of printed patterns. To completely authenticate an object, we show that a human verifier has to be confident in the integrity of the third party and the electronic system involved in the verification phase. However, the authenticity of the electronic system itself has also to be verified. We address here the following question : how a human being can convince himself about the integrity and the authenticity of an embedded system in an off-line environment ? We propose two groups of solutions. In the first one, an auxiliary electronic device is used to perform computing operations. In the second one, the human capability (memory and computational abilities) is exploited. In each group, we propose a protocol to authenticate embedded systems for which the chip (typically an FPGA (Field Programmable Gate Array) or a microcontroller) is initialized according to the configuration or programming of its RAM memory
345

Åland som språksamhälle : Språk och språkliga attityder på Åland ur ett ungdomsperspektiv / The Åland Islands as a Language Environment : Languages and Language Attitudes from an Adolescent Perspective

Allardt Ljunggren, Barbro January 2008 (has links)
<p>The present thesis deals with Åland, i.e. the Åland Islands, as a language environment. Its main focus is on the language attitudes of adolescents. The status, role and use of Swedish, Finnish and English are topical. Its main part consists of an empirical study, which is based on an extensive questionnaire answered by students in grade 9 of primary school and in the second grade of the (theoretical) secondary school in Åland.</p><p>The thesis includes a description of Åland as a language environment. The legal framework making Åland an autonomous region in Finland with Swedish as the only official language is presented. Language policies in Åland are compared with those of Sweden and Finland (outside of Åland). Special treatment is given to the school as a linguistic environment and recent language related debate in Åland.</p><p>The central questions in the questionnaire relate to language choice, media habits, subjective estimations of the respondents’ own language competence and language attitudes in a broad sense.</p><p>Six hypotheses based on a model of secure and insecure majorities and minorities as well as the Interactive Acculturation Model are postulated and treated.</p><p>The results of the empirical study reveal very strong feelings of affinity towards Åland. Attitudes towards English and English-speakers are in general positive. The results reveal somewhat ambivalent attitudes towards Finnish and Finland. Many variables show a tendency among the respondents to favour Sweden ahead of Finland and negative attitudes towards Finnish but there are also other conflicting results. The respondents who have parents who speak Finnish to them display more positive attitudes towards Finnish and Finland. These differences between the groups are statistically significant. However, the group with a Finnish language background also displays its strongest feelings of affinity towards Åland.</p>
346

Influence and Invisibility : Tenants in Housing Provision in Mwanza City, Tanzania

Cadstedt, Jenny January 2006 (has links)
A high proportion of urban residents in Tanzanian cities are tenants who rent rooms in privately owned houses in unplanned settlements. However, in housing policy and in urban planning rental tenure gets very little attention. This study focuses on the reasons for and consequences of this discrepancy between policy and practice. Perspectives and actions of different actors involved in the housing provision process in Mwanza City, Tanzania, have been central to the research. The examined actors are residents in various housing tenure forms as well as government officials and representatives at different levels, from the neighbourhood level to UN-Habitat. The main methods have been interviews and discussions with actors as well as studies of policy documents, laws and plans. Among government actors, private rental tenure is largely seen as an issue between landlords and tenants. Tanzanian housing policy focuses more on land for housing than on shelter. This means that house-owners who control land have a more important role in urban planning and policies than tenants have. In Tanzania in general and in Mwanza in particular, housing policy focuses on residents’ involvement in upgrading unplanned areas by organising in Community Based Organisations. This means that owners who live for a longer period in an area benefit more from settlement improvements than tenants. Tenants are relatively mobile and do not take for granted that they will stay in the same house for long. This raises the question of tenants’ possibilities to influence as well as their rights as citizens as compared to that of owners. The question of citizens’ rights for dwellers in informal settlements has received increased attention during the last years in international housing policy discussions. There is an evident need to intensify and diversify this discussion.
347

Åland som språksamhälle : Språk och språkliga attityder på Åland ur ett ungdomsperspektiv / The Åland Islands as a Language Environment : Languages and Language Attitudes from an Adolescent Perspective

Allardt Ljunggren, Barbro January 2008 (has links)
The present thesis deals with Åland, i.e. the Åland Islands, as a language environment. Its main focus is on the language attitudes of adolescents. The status, role and use of Swedish, Finnish and English are topical. Its main part consists of an empirical study, which is based on an extensive questionnaire answered by students in grade 9 of primary school and in the second grade of the (theoretical) secondary school in Åland. The thesis includes a description of Åland as a language environment. The legal framework making Åland an autonomous region in Finland with Swedish as the only official language is presented. Language policies in Åland are compared with those of Sweden and Finland (outside of Åland). Special treatment is given to the school as a linguistic environment and recent language related debate in Åland. The central questions in the questionnaire relate to language choice, media habits, subjective estimations of the respondents’ own language competence and language attitudes in a broad sense. Six hypotheses based on a model of secure and insecure majorities and minorities as well as the Interactive Acculturation Model are postulated and treated. The results of the empirical study reveal very strong feelings of affinity towards Åland. Attitudes towards English and English-speakers are in general positive. The results reveal somewhat ambivalent attitudes towards Finnish and Finland. Many variables show a tendency among the respondents to favour Sweden ahead of Finland and negative attitudes towards Finnish but there are also other conflicting results. The respondents who have parents who speak Finnish to them display more positive attitudes towards Finnish and Finland. These differences between the groups are statistically significant. However, the group with a Finnish language background also displays its strongest feelings of affinity towards Åland.
348

PROVIZ: an integrated graphical programming, visualization and scripting framework for WSNs

Kumbakonam Chandrasekar, Ramalingam 01 April 2013 (has links)
Wireless Sensor Networks (WSNs) are rapidly gaining popularity in various critical domains like health care, critical infrastructure, and climate monitoring, where application builders have diversified development needs. Independent of the functionalities provided by the WSN applications, many of the developers use visualization, simulation, and programming tools. However, these tools are designed as separate stand-alone applications, which force developers to use multiple tools. This situation often poses confusion and hampers an efficient development experience. To avoid the complexity of using multiple tools, a new, extensible, multi-platform, scalable, and open-source framework called PROVIZ is designed. PROVIZ is an integrated visualization and programming framework with the following features: PROVIZ 1) visualizes sensor nodes and WSN traffic by parsing the data received either from a packet sniffer (e.g., a sensor-based sniffer, or a commercial TI SmartRF 802.15.4 packet sniffer), or from a simulator (e.g., OMNeT); 2) visualizes a heterogeneous WSN consisting of different sensor nodes sending packets with different packet payload formats; and 3) provides a programming framework, which provides a graphical and script-based programming functionality, for developing WSN applications. Also, PROVIZ includes built-in extensible visual demo deployment capabilities that allow users to quickly craft network scenarios and share them with other users. Additionally, a secure and energy efficient wireless code dissemination protocol, named SIMAGE, was developed. SIMAGE is used by PROVIZ to wirelessly reprogram the sensor nodes. SIMAGE uses a link quality cognizant adaptive packet-sizing technique along with energy-efficient encryption protocols for secure and efficient code dissemination. In this thesis, the various features of PROVIZ's visualization and programming framework are explained, the functionality and performance of SIMAGE protocol is described, an example WSN security attack scenario is analyzed, and how PROVIZ can be used as a visual debugging tool to identify the security attack and aid in providing a software fix are discussed.
349

Individers betydelse för kunskapsöverföring i en organisation : En studie om hinder och möjligheter till lärande på Metso Paper Karlstad AB / The Importance of Individuals for Transferring Knowledge in Organizations : A study of obstacles and possibilities for learning at Metso Paper Karlstad AB

Carlsson, Linda January 2007 (has links)
Companies learn through their employees. In this paper I make research into how knowledge transfer and learning occur at Metso Paper Karlstad AB, which is a partly project based organization. The result is that there are many factors that affect the knowledge transfer in a company. Knowledge transfer occurs mainly between individuals within the company, but also between departments and other actors outside the company. In the gaps between these actors, there is a risk that knowledge is not transferred, which is an obstacle to learning. A great deal of the knowledge transfer and the learning is carried out through individual’s own drive and motivation. I have found that individuals have different motives for transferring or not transferring knowledge. There are types of individuals that understand and act in the interest of the company but also those who act in their own interest, such as power or career. The willingness to transfer knowledge is also affected by the feeling of being secure, both as an individual but also in the employment. These aspects are presented in a model in the paper. There are also individuals that have resigned and do not have a specific interest neither for the company nor their own career, which is a more passive attitude. A mapping of these different types of individuals can help the company to choose the correct actions to be made, in purpose to increase the knowledge transfer. Some general activities that affect knowledge transfer are the understanding of the management of the importance of transferring knowledge and to work in long-term. It is important that the employees understand their role in the total process of the company, and also their role as bearer of knowledge. Increased interactions between departments and internal training sessions based on real competence gaps will most likely stimulate the transferring between departments. / Företag lär genom sina medarbetare. Med denna uppsats vill jag undersöka hur kunskapsöverföring och lärande sker hos Metso Paper Karlstad AB, en organisation med delvis projektbaserat arbetssätt. Resultatet av undersökningen är att det finns många faktorer som påverkar kunskapsöverföringen inom företag. Kunskapsöverföring sker mellan individer, mellan avdelningar och mellan övriga aktörer. I ”glappen” mellan alla dessa aktörer föreligger risk att kunskap inte överförs vilket således är hinder för lärande. Mycket av kunskapsöverföringen och lärandet sker idag utifrån individers egen drivkraft och motivation. Jag funnit att individer har olika motiv för att överföra kunskap eller att inte överföra. Det finns individer som förstår och agerar för företagets bästa men även de som agerar utifrån sina egna syften, vilket kan vara makt och karriär. Viljan att överföra kunskap påverkas även av hur trygg eller otrygg man känner sig i sin yrkesroll och i sin anställning. Därutöver tillkommer de individer som resignerat och inte intresserar sig vare sig för företagets bästa eller för egen vinning, de har en mera passiv hållning. Dessa faktorer presenteras i en modell i uppsatsen. En kartläggning av omfattningen av dessa olika typer av individer kan hjälpa företaget att välja rätt insatser för att öka kunskapsöverföringen. Några generella aktiviteter som påverkar kunskapsöverföring inom företag är ledningens förståelse av betydelsen att överföra kunskap och långsiktighet i arbetet. Det är även viktigt att medarbetarna förstår sin roll i företagets process men även sin roll som bärare av kunskap. Ökad interaktion mellan avdelningar och behovsanpassade interna utbildningar stimulerar sannolikt kunskapsöverföring mellan avdelningar.
350

Särskilda ungdomshem och vårdkedjor : Om ungdomar, kön, klass och etnicitet / Secure units and chains of care : Youth, gender, class and ethnicity

Andersson Vogel, Maria January 2012 (has links)
This thesis follows a group of youths placed in secure unit care who have participated in a chain-of-care project aiming to better plan their discharge and aftercare. The overall aim of the thesis is to link a detailed description of these young people with an analysis of the project they participated in, and to undertake one- and two-year follow-up studies. Analytic focus is on the significance of gender, class and ethnicity. The study is mainly based on structured interviews performed at the secure units upon entry into care, discharge and at a one-year follow up. Data have also been used from criminal records and interviews with project staff. When entering care, these youths exhibited extensive problems in both family conditions and own behaviour. The major problem in boys was criminality while girls reported poor mental health. Professionals judge youth of foreign background as more criminal than youth of Swedish background despite a lack of difference in self-reported data. Some difference is also noticeable regarding class. Analysis of the project shows that out-of-home care was the most frequent intervention after leaving secure unit care, while other interventions were difficult to uphold over time. Few girls received help with their mental health problems. At the one-year follow up, the youths reported an overall better situation, although extensive problems still remained. Above all, girls’ mental health problems remained as before. At the 2-year follow up the study group was compared with a control group in order to investigate effects of the project regarding criminality and recommitment to secure unit care. The comparison shows that the project had no effect. This is discussed in relation to poor organization and the difficulty of adjusting a project like this to the target group, along with the substantial part played by gender, class and ethnicity in how the youth are construed and treated.

Page generated in 0.0386 seconds