111 |
IoT Security Assessment of a Home Security CameraHjärne, Nina, Kols, Ida January 2021 (has links)
The amount of IoT devices in society is increasing.With this increase there is an inherently higher risk of hackersexploiting the vulnerabilities of such a device, accessing sensitivepersonal information. The objective of this project was to assessthe security level of a home security camera through findingvulnerabilities and exploiting them. The method used for thiswas to analyze the system and its communication, threat modelthe system to identify threats, perform vulnerability analysisand exploit the vulnerabilities through penetration testing. Theattacks on the system did not succeed and the system wasdeclared secure in the vulnerability analysis. From the aspectstested in this project, it can be assumed that safety precautionshave been taken to secure the home security camera frommalicious hackers. / Antalet IoT-produkter i samhället ökar ochmed fler och fler uppkopplade produkter i våra hem ökarrisken att hackare utnyttjar produkters sårbarheter för ondaavsikter, till exempel för att komma åt känslig personlig data.Målet med det här projektet var att hitta sårbarheter i ensäkerhetskamera för hemmet, attackera dem och utifrån resultatetbedöma hur säker produkten är. Detta gjordes genomatt analysera systemet och dess kommunikation, göra en hotmodellför att identifiera hot, genomföra sårbarhetsanalys ochsedan penetrationstesta hoten. Hackningsattackerna misslyckadesoch produkten bedömdes som säker i sårbarhetsanalysen.Utifrån de aspekter som testades i projektet kunde det bedömasatt grundläggande säkerhetsåtgärder vidtagits för att skyddasäkerhetskameran från hackare. / Kandidatexjobb i elektroteknik 2021, KTH, Stockholm
|
112 |
Computational frameworks to nominate context-specific vulnerabilities and therapeutic opportunities through pre-clinical Bladder Cancer modelsCantore, Thomas 01 February 2024 (has links)
During the past few decades, the landscape of available therapeutic interventions for cancer treatment has widely expanded, boosted mainly by immunotherapy progress and the precision oncology paradigm. The extensive use of pre-clinical models in cancer research has led to the discovery of new effective treatment options for patients. Despite the notable advancements, some cancer types have found minor benefits from the use of precision-oncology interventions. Characterized by a heterogeneous molecular landscape, bladder cancer is one of the most frequent cancer types in which standard-of- care treatments involve surgical operations accompanied by broad-spectrum chemotherapy. My research stems from the need for precision oncology interventions in bladder cancer and specifically focuses on the development of computational frameworks to guide the discovery of new therapeutic opportunities. This work first introduces the exploration of possible therapeutic interventions in 9p21.3 depleted bladder tumors through the analysis of an in-house large High-Content Drug Screening that tested 2,349 compounds. By combining cell count changes and morphological quantitative features extracted from fluorescence images, we nominate cytarabine as a putative candidate eliciting specific cytotoxic effects in an engineered 9p21.3 depleted bladder cancer model compared to an isogenic wild-type clone. Focusing on the development of computational methodologies to nominate robust context-specific vulnerabilities, I further describe PRODE (PROtein interactions informed Differential Essentiality), an analytical workflow that integrates protein-protein interaction data and Loss of Function screening data. I extensively tested PRODE against the most commonly used and alternative methodologies and demonstrated its superior performance when classifying reference essential and context-essential genes collected from experimental and literature sources. Furthermore, we applied PRODE to a real case scenario, seeking essential genes selectively in the context of HER2+ Breast Cancer tumors. Finally, I report the computational analyses performed on Patient-Derived Organoids (PDOs) established from a bladder cancer cohort. PDOs are demonstrated as informative models when assessing the therapeutic sensitivity of patients to drugs. Overall, this research highlights novel precision-oncology applications by ad-hoc computational analyses that address key open technical and biological challenges in the field of bladder cancer and beyond.
|
113 |
Cyber-security protection techniques to mitigate memory errors exploitationMarco Gisbert, Héctor 04 November 2016 (has links)
Tesis por compendio / [EN] Practical experience in software engineering has demonstrated that the goal of
building totally fault-free software systems, although desirable, is impossible
to achieve. Therefore, it is necessary to incorporate mitigation techniques in
the deployed software, in order to reduce the impact of latent faults.
This thesis makes contributions to three memory corruption mitigation
techniques: the stack smashing protector (SSP), address space layout
randomisation (ASLR) and automatic software diversification.
The SSP is a very effective protection technique used against stack buffer
overflows, but it is prone to brute force attacks, particularly the dangerous
byte-for-byte attack. A novel modification, named RenewSSP, has been proposed
which eliminates brute force attacks, can be used in a completely transparent
way with existing software and has negligible overheads. There are two
different kinds of application for which RenewSSP is especially beneficial:
networking servers (tested in Apache) and application launchers (tested on
Android).
ASLR is a generic concept with multiple designs and implementations. In this
thesis, the two most relevant ASLR implementations of Linux have been analysed
(Vanilla Linux and PaX patch), and several weaknesses have been found. Taking
into account technological improvements in execution support (compilers and
libraries), a new ASLR design has been proposed, named ASLR-NG, which
maximises entropy, effectively addresses the fragmentation issue and removes a
number of identified weaknesses. Furthermore, ASLR-NG is transparent to
applications, in that it preserves binary code compatibility and does not add
overheads. ASLR-NG has been implemented as a patch to the Linux kernel 4.1.
Software diversification is a technique that covers a wide range of faults,
including memory errors. The main problem is how to create variants,
i.e. programs which have identical behaviours on normal inputs but
where faults manifest differently. A novel form of automatic variant
generation has been proposed, using multiple cross-compiler suites and
processor emulators.
One of the main goals of this thesis is to create applicable results.
Therefore, I have placed particular emphasis on the development of real
prototypes in parallel with the theoretical study. The results of this thesis
are directly applicable to real systems; in fact, some of the results have
already been included in real-world products. / [ES] La creación de software supone uno de los retos más complejos para el
ser humano ya que requiere un alto grado de abstracción. Aunque se ha
avanzado mucho en las metodologías para la prevención de los fallos
software, es patente que el software resultante dista mucho de ser
confiable, y debemos asumir que el software que se produce no está
libre de fallos. Dada la imposibilidad de diseñar o implementar
sistemas libres de fallos, es necesario incorporar técnicas de
mitigación de errores para mejorar la seguridad.
La presente tesis realiza aportaciones en tres de las principales
técnicas de mitigación de errores de corrupción de memoria: Stack
Smashing Protector (SSP), Address Space Layout Randomisation (ASLR) y
Automatic Software Diversification.
SSP es una técnica de protección muy efectiva contra
ataques de desbordamiento de buffer en pila, pero es sensible a ataques de
fuerza bruta, en particular al peligroso ataque denominado byte-for-byte.
Se ha propuesto una novedosa modificación del SSP, llamada RenewSSP,
la cual elimina los ataques de fuerza bruta. Puede ser usada
de manera completamente transparente con los programas existentes sin
introducir sobrecarga. El RenewSSP es especialmente beneficioso en dos áreas de
aplicación: Servidores de red (probado en Apache) y
lanzadores de aplicaciones eficientes (probado en Android).
ASLR es un concepto genérico, del cual hay multitud de diseños e
implementaciones. Se han analizado las dos implementaciones más
relevantes de Linux (Vanilla Linux y PaX patch), encontrándose en
ambas tanto debilidades como elementos mejorables. Teniendo en cuenta
las mejoras tecnológicas en el soporte a la ejecución (compiladores y
librerías), se ha propuesto un nuevo diseño del ASLR, llamado
ASLR-NG, el cual: maximiza la entropía, soluciona el problema de la
fragmentación y elimina las debilidades encontradas. Al igual que la
solución propuesta para el SSP, la nueva propuesta de ASLR es
transparente para las aplicaciones y compatible a nivel
binario sin introducir sobrecarga. ASLR-NG ha sido implementado como
un parche del núcleo de Linux para la versión 4.1.
La diversificación software es una técnica que cubre una amplia gama
de fallos, incluidos los errores de memoria. La principal dificultad
para aplicar esta técnica radica en la generación de las
"variantes", que son programas que tienen un comportamiento idéntico
entre ellos ante entradas normales, pero tienen un comportamiento
diferenciado en presencia de entradas anormales. Se ha propuesto una
novedosa forma de generar variantes de forma automática a partir de un
mismo código fuente, empleando la emulación de sistemas.
Una de las máximas de esta investigación ha sido la aplicabilidad de
los resultados, por lo que se ha hecho especial hincapié en el
desarrollo de prototipos sobre sistemas reales a la par que se llevaba
a cabo el estudio teórico. Como resultado, las propuestas de esta
tesis son directamente aplicables a sistemas reales, algunas de ellas
ya están siendo explotadas en la práctica. / [CA] La creació de programari suposa un dels reptes més complexos per al ser humà ja
que requerix un alt grau d'abstracció. Encara que s'ha avançat molt en les
metodologies per a la prevenció de les fallades de programari, és palès que el
programari resultant dista molt de ser confiable, i hem d'assumir que el
programari que es produïx no està lliure de fallades. Donada la impossibilitat
de dissenyar o implementar sistemes lliures de fallades, és necessari
incorporar tècniques de mitigació d'errors per a millorar la seguretat.
La present tesi realitza aportacions en tres de les principals tècniques de
mitigació d'errors de corrupció de memòria: Stack Smashing Protector (SSP),
Address Space Layout Randomisation (ASLR) i Automatic Software
Diversification.
SSP és una tècnica de protecció molt efectiva contra atacs de desbordament de
buffer en pila, però és sensible a atacs de força bruta, en particular al
perillós atac denominat byte-for-byte.
S'ha proposat una nova modificació del SSP, RenewSSP, la qual elimina els atacs
de força bruta. Pot ser usada de manera completament transparent amb els
programes existents sense introduir sobrecàrrega. El RenewSSP és especialment
beneficiós en dos àrees d'aplicació: servidors de xarxa (provat en Apache) i
llançadors d'aplicacions eficients (provat en Android).
ASLR és un concepte genèric, del qual hi ha multitud de dissenys i
implementacions. S'han analitzat les dos implementacions més rellevants de
Linux (Vanilla Linux i PaX patch), trobant-se en ambdues tant debilitats com
elements millorables. Tenint en compte les millores tecnològiques en el suport
a l'execució (compiladors i llibreries), s'ha proposat un nou disseny de
l'ASLR: ASLR-NG, el qual, maximitza l'entropia, soluciona el problema de
la fragmentació i elimina les debilitats trobades. Igual que la solució
proposada per al SSP, la nova proposta d'ASLR és transparent per a les
aplicacions i compatible a nivell binari sense introduir sobrecàrrega. ASLR-NG
ha sigut implementat com un pedaç del nucli de Linux per a la versió 4.1.
La diversificació de programari és una tècnica que cobrix una àmplia gamma de
fa\-llades, inclosos els errors de memòria. La principal dificultat per a aplicar
esta tècnica radica en la generació de les "variants", que són programes que
tenen un comportament idèntic entre ells davant d'entrades normals, però tenen
un comportament diferenciat en presència d'entrades anormals. S'ha proposat una
nova forma de generar variants de forma automàtica a partir d'un mateix codi
font, emprant l'emulació de sistemes.
Una de les màximes d'esta investigació ha sigut l'aplicabilitat dels resultats,
per la qual cosa s'ha fet especial insistència en el desenrotllament de
prototips sobre sistemes reals al mateix temps que es duia a terme l'estudi
teòric. Com a resultat, les propostes d'esta tesi són directament aplicables
a sistemes reals, algunes d'elles ja estan sent explotades en la pràctica. / Marco Gisbert, H. (2015). Cyber-security protection techniques to mitigate memory errors exploitation [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/57806 / Compendio
|
114 |
Implementation of a Trusted I/O Processor on a Nascent SoC-FPGA Based Flight Controller for Unmanned Aerial SystemsKini, Akshatha Jagannath 26 March 2018 (has links)
Unmanned Aerial Systems (UAS) are aircraft without a human pilot on board. They are comprised of a ground-based autonomous or human operated control system, an unmanned aerial vehicle (UAV) and a communication, command and control (C3) link between the two systems. UAS are widely used in military warfare, wildfire mapping, aerial photography, etc primarily to collect and process large amounts of data. While they are highly efficient in data collection and processing, they are susceptible to software espionage and data manipulation. This research aims to provide a novel solution to enhance the security of the flight controller thereby contributing to a secure and robust UAS. The proposed solution begins by introducing a new technology in the domain of flight controllers and how it can be leveraged to overcome the limitations of current flight controllers.
The idea is to decouple the applications running on the flight controller from the task of data validation. The authenticity of all external data processed by the flight controller can be checked without any additional overheads on the flight controller, allowing it to focus on more important tasks. To achieve this, we introduce an adjacent controller whose sole purpose is to verify the integrity of the sensor data. The controller is designed using minimal resources from the reconfigurable logic of an FPGA. The secondary I/O processor is implemented on an incipient Zynq SoC based flight controller. The soft-core microprocessor running on the configurable logic of the FPGA serves as a first level check on the sensor data coming into the flight controller thereby forming a trusted boundary layer. / Master of Science / UAV is an aerial vehicle which does not carry a human operator, uses aerodynamic forces to lift the vehicle and is controlled either autonomously by an onboard computer or remotely controlled by a pilot on ground. The software application running on the onboard computer is known as flight controller. It is responsible for guidance and trajectory tracking capabilities of the aircraft.
A UAV consists of various sensors to measure parameters such as orientation, acceleration, air speed, altitude, etc. A sensor is a device that detects or measures a physical property. The flight controller continuously monitors the sensor values to guide the UAV along a specific trajectory.
Successful maneuvering of a UAV depends entirely on the data from sensors, thus making it vulnerable to sensor data attacks using fabricated physical stimuli. These kind of attacks can trigger an undesired response or mask the occurrence of actual events. In this thesis, we propose a novel approach where we perform a first-level check on the incoming sensor data using a dedicated low cost hardware designed to protect data integrity. The data is then forwarded to the flight controller for further access and processing.
|
115 |
Rôle de la collaboration famille-école dans la relation entre les caractéristiques sociodémographiques des familles et les difficultés de comportement des enfants de maternelleSavard, Aurélie January 2016 (has links)
Résumé : Les enfants de maternelle dont la préparation scolaire est limitée risquent de présenter des difficultés comportementales nuisibles à leur adaptation ultérieure. L’implication des parents à l’école, plus précisément la collaboration famille-école (CFE), peut représenter un facteur de protection favorisant l’adaptation de l’enfant tout au long de son parcours scolaire. Les écrits scientifiques suggèrent que la CFE jouerait un rôle important dans l’explication des difficultés de comportement, surtout auprès des enfants provenant de familles défavorisées. Cette étude porte sur le rôle de la CFE dans l’explication des difficultés de comportement intériorisé et extériorisé des enfants de maternelle qui présentaient des lacunes sur le plan de leur préparation scolaire. Les analyses de régression linéaire montrent que pour l’ensemble des familles de l’échantillon (n=47), plus il y a de communication entre le parent et l’enseignant, plus il y a présence de comportements extériorisés et intériorisés. Par contre, la CFE modère la relation entre un indice d’adversité constitué du cumul de cinq facteurs de risque sociodémographiques et les difficultés de comportement intériorisé. Ainsi, chez les familles défavorisées, une communication plus fréquente est associée à moins de comportements de type intériorisé. / Abstract : Children with limited school readiness are at risk for behavioral problems, which impact their school adjustment. Parents’ involvement in school, such as family-school partnership (FSP), may be a protective factor improving child's adaptation throughout their school career. Literature shows the important role of the FSP in reducing behavioral difficulties, especially for children from disadvantaged families. This study aims to explain child externalizing and internalizing behavior problems in kindergarten through FSP in children showing a limited school readiness. Linear regressions show that a frequent communication between the parent and the teacher is associate with a greater presence of externalizing and internalizing behaviors for the whole sample (n=47). However, FSP moderates the relationship between the demographics vulnerabilities and internalized child behavior problem in kindergarten. Indeed, for disadvantaged families, when there is a more frequent communication, children have less internalized behaviors.
|
116 |
Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web. / Web applications vulnerability analysis and intrusion detection systems assessmentAkrout, Rim 18 October 2012 (has links)
Avec le développement croissant d’Internet, les applications Web sont devenues de plus en plus vulnérables et exposées à des attaques malveillantes pouvant porter atteinte à des propriétés essentielles telles que la confidentialité, l’intégrité ou la disponibilité des systèmes d’information. Pour faire face à ces malveillances, il est nécessaire de développer des mécanismes de protection et de test (pare-feu, système de détection d’intrusion, scanner Web, etc.) qui soient efficaces. La question qui se pose est comment évaluer l’efficacité de tels mécanismes et quels moyens peut-on mettre en oeuvre pour analyser leur capacité à détecter correctement des attaques contre les applications web.Dans cette thèse nous proposons une nouvelle méthode, basée sur des techniques de clustering de pages Web, qui permet d’identifier les vulnérabilités à partir de l’analyse selon une approche boîte noire de l’application cible. Chaque vulnérabilité identifiée est réellement exploitée ce qui permet de s’assurer que la vulnérabilité identifiée ne correspond pas à un faux positif. L’approche proposée permet également de mettre en évidence différents scénarios d’attaque potentiels incluant l’exploitation de plusieurs vulnérabilités successives en tenant compte explicitement des dépendances entre les vulnérabilités.Nous nous sommes intéressés plus particulièrement aux vulnérabilités de type injection de code, par exemple les injections SQL. Cette méthode s’est concrétisée par la mise en oeuvre d’un nouveau scanner de vulnérabilités et a été validée expérimentalement sur plusieurs exemples d’applications vulnérables. Nous avons aussi développé une plateforme expérimentale intégrant le nouveau scanner de vulnérabilités, qui est destinée à évaluer l’efficacité de systèmes de détection d’intrusions pour des applications Web dans un contexte qui soit représentatif des menaces auxquelles ces applications seront confrontées en opération. Cette plateforme intègre plusieurs outils qui ont été conçus pour automatiser le plus possible les campagnes d’évaluation. Cette plateforme a été utilisée en particulier pour évaluer deux techniques de détection d’intrusions développées par nos partenaires dans le cadre d’un projet de coopération financé par l’ANR, le projet DALI. / With the increasing development of Internet, Web applications have become increasingly vulnerable and exposed to malicious attacks that could affect essential properties such as confidentiality, integrity or availability of information systems. To cope with these threats, it is necessary to develop efficient security protection mechanisms and testing techniques (firewall, intrusion detection system,Web scanner, etc..). The question that arises is how to evaluate the effectiveness of such mechanisms and what means can be implemented to analyze their ability to correctly detect attacks against Webapplications.This thesis presents a new methodology, based on web pages clustering, that is aimed at identifying the vulnerabilities of a Web application following a black box analysis of the target application. Each identified vulnerability is actually exploited to ensure that the identified vulnerability does not correspond to a false positive. The proposed approach can also highlight different potential attack scenarios including the exploitation of several successive vulnerabilities, taking into account explicitly the dependencies between these vulnerabilities. We have focused in particular on code injection vulnerabilities, such asSQL injections. The proposed method led to the development of a new Web vulnerability scanner and has been validated experimentally based on various vulnerable applications.We have also developed an experimental platform integrating the new web vulnerability scanner, that is aimed at assessing the effectiveness of Web applications intrusion detection systems, in a context that is representative of the threats that such applications face in operation. This platform integrates several tools that are designed to automate as much as possible the evaluation campaigns. It has been used in particular to evaluate the effectiveness of two intrusion detection techniques that have been developed by our partners of the collaborative project DALI, funded by the ANR, the French National Research Agency
|
117 |
AUXÍLIO-RECLUSÃO Um olhar a partir dos sujeitos encarcerados, seus familiares e técnicos do sistema prisionalBonini, Rejane Maria Nalério 28 February 2011 (has links)
Made available in DSpace on 2016-03-22T17:26:26Z (GMT). No. of bitstreams: 1
rejane1].pdf: 865016 bytes, checksum: 4b625b8e4fd332e5ed87a5323eb4128d (MD5)
Previous issue date: 2011-02-28 / Social welfare s detention auxiliary benefit, as an instrument of social protection, is
on the Brazilian Federal Constitution, aimed at the ones who depend on the
beneficiary who is in prison and, therefore, cannot provide his family s subsistence.
Historical changes in western societies highlighted the drastic increase of the
imprisoned population, with the correlated amplification of families and individuals
vulnerabilities. As a mechanism to face institutional, social and penal vulnerabilities,
a study on the detention auxiliary benefit was accomplished, in order to search for
the meaning attributed by individuals and their families under a state protection
policy. Another highlighted aspect is the perception of technicians referring to the
benefit and their performance in their operations. In this perspective, the study
promotes visibility to the expropriation imposed to actors in imprisonment context, to
the alienation of law and the importance of the detention auxiliary benefit to families
and individuals for the rescue of dignity and citizenship / O benefício previdenciário auxílio-reclusão, como um instrumento de proteção social,
está previsto na Constituição Federal Brasileira, destinado aos dependentes do
segurado recolhido à prisão e impossibilitado de prover a subsistência de sua
família. As mudanças ocorridas historicamente nas sociedades ocidentais marcaram
o drástico aumento da população carcerária, com a correlata ampliação das
vulnerabilidades das famílias e dos indivíduos. Como mecanismo de enfrentamento
das vulnerabilidades institucional, social e penal foi realizado um estudo acerca do
benefício auxílio-reclusão, com o objetivo de buscar o significado que os indivíduos e
as famílias lhe atribuem sob o referencial de uma política de proteção do Estado.
Outro aspecto destacado é a percepção dos técnicos acerca do benefício e atuação
na sua operacionalidade. Nesse sentido o estudo dá visibilidade às desapropriações
que são impostas aos atores no contexto de encarceramento, às diversas
alienações do direito e a importância do auxílio-reclusão para as famílias e
indivíduos no resgate da dignidade e cidadania
|
118 |
Psicologia na Escola e rede de prote??o ? inf?ncia e adolesc?ncia: enfrentando vulnerabilidades / School Psychology and childhood and adolescence protection network: facing vulnerabilitiesDias, Carolina Nascimento 14 February 2017 (has links)
Submitted by SBI Biblioteca Digital (sbi.bibliotecadigital@puc-campinas.edu.br) on 2017-04-07T12:43:48Z
No. of bitstreams: 1
CAROLINA NASCIMENTO DIAS.pdf: 3650487 bytes, checksum: 5d87f328d4db538c054ae394b216ede4 (MD5) / Made available in DSpace on 2017-04-07T12:43:48Z (GMT). No. of bitstreams: 1
CAROLINA NASCIMENTO DIAS.pdf: 3650487 bytes, checksum: 5d87f328d4db538c054ae394b216ede4 (MD5)
Previous issue date: 2017-02-14 / Conselho Nacional de Pesquisa e Desenvolvimento Cient?fico e Tecnol?gico - CNPq / This study deals with the relation between full-time public school and the childhood and adolescence network protection in the northeast region in Campinas, Brazil. This research?s goal is to investigate how this relation happens and what is the school psychology?s role when facing this scenario. Starting from the comprehension concerning social politics and the need of children and adolescents? full protection and considering them as human beings with rights, we aim at discourse about politics? intersectoriality, thus the network may act by means of breaking with the vulnerabilities concerning children and their families. Based on the studies from the Critical Psychology and the Dialectical Historic Materialism we have been present at the school and the community through the ECOAR Project ? Convenience Action and Reflection Space. The region?s mapping was made to delimit the existing services on the territory, also there were conversations with teachers and managers, observation on the TDCs (Collective Teacher Work), there were meetings with the families and the protection network, analysis of student?s folders who are accompanied by some network service and interviews with the Pedagogical Counsellor at the school. All the procedures previously described were registered in diaries by the ECOAR team and the data was considered by means of constructive-interpretative analysis. The results found from the sources analyzed showed a disarticulation inside the network, the existence of a pathologizing and medicalized culture in the services, the tendency of blaming families for children?s conditions and at last the need for changes inside the institutions so it will be possible to have intersectoral articulation. We understand that in this scenario, school psychology acting possibilities are diverse, as long as professionals in this area are aware of the contractions on the capitalist system and by doing so they adopt practices based on cooperation and dialogues, aiming at enhancing each other and adding up efforts to build, together, an education capable to dialogue with life demands from Brazilian population. / O presente trabalho aborda a rela??o entre uma escola p?blica de educa??o integral e os demais equipamentos da rede de prote??o ? inf?ncia e adolesc?ncia na regi?o noroeste de Campinas, tendo como objetivo de pesquisa analisar como acontece essa rela??o. A partir da compreens?o acerca das pol?ticas sociais e da necessidade de prote??o integral das crian?as e adolescentes, considerando-os como seres de direitos, discorremos sobre a intersetorialidade das pol?ticas para que a rede atue de forma a romper com a vulnerabilidade das crian?as e suas fam?lias. Partindo das contribui??es da Psicologia Cr?tica e do Materialismo Hist?rico Dial?tico, estivemos presente na escola e na comunidade por meio do Projeto ECOAR ? Espa?o de Conviv?ncia A??o e Reflex?o. Foi realizado mapeamento da regi?o, demarcando os servi?os existentes no territ?rio, conversas com professores e gestores, presen?a nos TDCs (Trabalho Docente Coletivo), reuni?es com fam?lias e com profissionais da rede de prote??o, an?lise das pastas de estudantes que s?o acompanhados por algum servi?o da rede e entrevista com o Orientador Pedag?gico da escola. Todos os procedimentos descritos foram registrados em di?rios de campo pela equipe do ECOAR e os dados foram considerados por meio da an?lise construtivo-interpretativa. Os resultados encontrados a partir da an?lise das fontes demonstraram a desarticula??o da rede, a exist?ncia de uma cultura patologizante e medicalizante nos servi?os, a tend?ncia em se responsabilizar as fam?lias pelas condi??es das crian?as e a necessidade de que haja mudan?as no cotidiano das institui??es para que a articula??o intersetorial aconte?a. Percebemos que as possibilidades de atua??o da psicologia escolar diante deste cen?rio s?o diversas, desde que, cientes das contradi??es presente no sistema capitalista, adotemos pr?ticas baseadas na coopera??o e di?logo, visando fortalecermos uns aos outros e somando esfor?os para construirmos, juntos, uma educa??o que dialogue com as demandas de vida da popula??o brasileira.
|
119 |
Intervenções assistidas por animais com crianças em contextos de vulnerabilidade social: utilizando o método photovoice / Assisted interventions by animals with children in contexts of social vulnerability: using the method photovoicePereira, Viviane Ribeiro 20 January 2017 (has links)
Submitted by Aline Batista (alinehb.ufpel@gmail.com) on 2018-03-29T14:52:26Z
No. of bitstreams: 2
license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Dissertacao_Viviane_Ribeiro_Pereira.pdf: 4549226 bytes, checksum: e19206a1b56da2d23bb09ecb54f31a4a (MD5) / Made available in DSpace on 2018-04-03T18:42:11Z (GMT). No. of bitstreams: 2
Dissertacao_Viviane_Ribeiro_Pereira.pdf: 4549226 bytes, checksum: e19206a1b56da2d23bb09ecb54f31a4a (MD5)
license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Previous issue date: 2017-01-20 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / O presente estudo objetivou compreender as contribuições das Intervenções Assistidas por Animais (IAAS) na percepção da criança em contextos de vulnerabilidade social, por meio do método photovoice. Neste estudo, entende-se “crianças em vulnerabilidade social” as vítimas de abandono, violência física, psicológica, e emocional. Trata-se de uma esquisa participativa de abordagem qualitativa, realizada em uma escola pública da rede municipal de ensino da cidade de Pelotas, no estado do Rio Grande do Sul/Brasil. As atividades lúdicas com os cães foram desenvolvidas no espaço escolar (quadra de esportes). Os participantes deste estudo foram cinco crianças, na faixa etária entre 6 e 9 anos, cursando do 1º ao 4º ano do ensino fundamental. Os cães fazem parte do Projeto de Extensão do Curso de Medicina Veterinária da Universidade Federal de Pelotas/UFPel, conhecido na comunidade como Projeto Pet Terapia, com aprovação no COCEPE sob nº 52702026. A coleta de dados ocorreu entre os meses de junho e julho de 2016. Foi utilizado o método photovoice, que possibilitou aos participantes fazerem registros de suas percepções em relação às IAAS através da foto. A escolha desta metodologia se deu por entender-se que as crianças precisam ser vistas e ouvidas nas pesquisas, possibilitando que ganhem voz através das suas narrativas visuais. Para analisar os dados, utilizou-se a Análise Temática, da qual emergiu o tema: “O olhar da criança sobre a intervenção lúdica com os cães”. A metodologia empregada permitiu que a criança pudesse externalizar seus medos e anseios de forma descontraída, lúdica e divertida, por meio do ato de fotografar. O photovoice mostrou ser um instrumento valioso para estudos cujo o objetivo é tornar a criança protagonista de suas histórias de vida. Constatou- se que as IAAS, aliadas ao método photovoice, elevou a autoestima e a autoconfiança das crianças, observado durante os momentos de brincadeiras entre elas e os cães. Acariciar e afagar o cão foi um incremento importante para a redução do estresse e da ansiedade. A presença dele promoveu um conforto emocional e atmosfera acolhedora. Além de estimular o vínculo de amizade entre o grupo, melhorou a relação com seus pares. Neste sentido, pretende-se com os resultados obtidos neste estudo contribuir para divulgação desta abordagem terapêutica e apoiar a sua utilização como uma forma eficiente e inovadora, para promover as ações de cuidado à saúde de crianças em contextos de vulnerabilidade social. / The present study aimed to understand the contributions of Assisted Interventions by animals (AIA) in the perception of the child in contexts of social vulnerability, through photovoice method. In this study, “children with social vulnerability” are considered the victims of abandonment, physical, psychological and emotional violence. It is a Qualitative participatory research, realized in a public school of the municipal school of
Pelotas, in the State of Rio Grande do Sul/Brazil. Playful activities with the dogs were
developed in the school space (sports court). The participants of this study, there were five children, aged between 6 and 9 years, studying from 1st to 4th
year of elementary school. The dogs are part of the extension project of the Veterinary Medicine course at the Federal University of Pelotas/UFPel, known in the community as project Pet therapy, with approval in COCEPE number 52702026. Data collection happen between the months of June/July 2016, we used the photovoice method, which enabled the participants make records of their perceptions about the IAAS via the photo. The choice of this methodology took place since we understand that children need to be seen and heard on the research, this method enables they win voice through their visual narratives. To analyze the date using the thematic analysis, from which emerged the theme: “The look of the child about the playful intervention with dog”. The methodology employed allowed the child could outsource their fears and desires so relaxed, playful and fun, through the Act of shooting. The photovoice method increased the self-esteem and self-confidence of children, observed during the moments of banter between them and dogs. Caressing and stroking the dog was an important increment to the reduction of stress and anxiety, his presence promoted a emotional
comfort and cozy atmosphere, besides stimulating the bond of friendship between the group, improved relationship with their peers. In this sense it is intended with results obtained in this study contribute to dissemination of this therapeutic approach and support its use as a efficient and innovative contributions to promote the actions of the health care of children in contexts of social vulnerability.
|
120 |
On Self-Declared Caliph Ibrahim’s December 2015 Speech: Further Evidence for Critical Vulnerabilities in the Crumbling CaliphateKamolnick, Paul 02 January 2016 (has links)
Excerpt: On December 26, 2015 a 24-minute audio message was released by the Islamic State Organization’s (ISO) official media arm al-Furqan.
|
Page generated in 0.0488 seconds