81 |
Att hitta akilleshälen : sårbarhetsanalyser till stöd för militär planering / Finding the Achilles’ heel : vulnerability analyses in support of military planningMagnét, Erik January 2018 (has links)
Enligt gällande västliga militära planeringsdoktriner, inklusive den svenska som den formuleras i Svensk planerings och ledningsmetod (SPL), är tyngdpunktsanalyser av såväl motståndaren som den egna sidan avgörande steg i planeringsprocesserna på både strategisk och operativ nivå. Tyngdpunkten kan anfallas eller påverkas direkt eller indirekt, i det ideala fallet genom att slå mot kritiska sårbarheter. Kritiska sårbarheter kan ofta vara av teknisk karaktär, vilket historiska erfarenheter visar. Bristande teknisk förståelse riskerar därmed leda till att kritiska sårbarheter hos fienden inte exploateras och att våra egna inte skyddas. De nyckelfaktorer som bygger upp tyngdpunkten ska enligt doktrinerna identifieras genom systemanalys. Beskrivningarna av vad en systemanalys är eller hur denna kan genomföras saknar dock både tillräckligt djup och tydlighet för att kunna användas praktiskt och ge önskad kvalitet. Detta riskerar att ge stora konsekvenser för den fortsatta planeringen. I uppsatsen föreslås en utvecklad metod för tyngdpunktsanalys, med fokus på hur de kritiska sårbarheterna identifieras och värderas. Metodens huvudsakliga moment är modellering och klassificering, där klassificeringsmomentet sker med en föreslagen metod som hämtat stöd från såväl verkansprocessen som civil forskning om systemsårbarheter. Metoden operationaliseras i uppsatsen och prövas i en fallstudie med två fall. Slutsatserna från undersökningen indikerar att den föreslagna metoden är användbar och har förklaringskraft i de undersökta fallen. För att analysen av kritiska sårbarheter ska nå tillräcklig kvalitet krävs djupa systemkunskaper och inte minst resurser i form av personal och tid. Den föreslagna metoden behöver prövas i sin helhet för att utvärdera den praktiska användbarheten. / According to contemporary western military doctrines, and Swedish doctrine is no exception, analyses of the centers of gravity of enemy and friendly forces are vital steps in the planning process at the strategic and operational levels of war. Centers of gravity might be attacked or influenced directly or indirectly, ideally by targeting critical vulnerabilities. Critical vulnerabilities are often of a technical nature, as shown by historical experience. A lack of technical understanding might lead to enemy vulnerabilities not being exploited and our own not being adequately protected. According to doctrine, a center of gravity’s key factors should be identified through systems analysis of enemy and friendly forces. However, descriptions of what these analyses are, or how they should be conducted, lack sufficient depth and clarity to be used in practice and provide sufficient quality. This is likely to have negative consequences for continued planning. This thesis proposes a developed method for center of gravity analysis, focusing on the identification and evaluation of critical vulnerabilities. The main elements of the method are modeling and classification, where the classification is conducted using a proposed method, supported by a method within the targeting process, and by civilian research into system vulnerabilities. The full method is operationalized in the thesis and tested in a two-case study. The conclusions from the study indicate that the proposed method is usable and has explanatory value in the cases studied. To achieve sufficient quality in the analysis of critical vulnerabilities, in-depth systems knowledge and, not least, resources in terms of staff and time are required. The proposed method needs to be tested in its entirety to evaluate its practical usability.
|
82 |
An Evaluation of Florida Gulf Coast University's Residence Life Staff Member's Hurricane PreparednessFloto, Erin 02 July 2014 (has links)
Florida Gulf Coast University (FGCU) is located along the coast of the Gulf of Mexico in southern Florida, in an area vulnerable to hurricane strikes. At FGCU, The Office of Housing and Residence Life (OHRL) is responsible for three locations on- and off-campus where students reside in apartment or suite-style housing. Due to the large number of students with varying backgrounds, the OHRL staff members have become essential personnel during severe weather events that may cause safety concerns for the residents living in OHRL housing locations. This study's purpose is to assess the Residence Life staff on their level of preparedness in the event of a hurricane strike, including carrying out severe weather procedures and maintaining the safety of residents. After running multiple regression analyses, bivariate correlations, and t-tests, this study indicates that those with a higher hurricane knowledge and experience score were more likely to be females and that one's preparedness confidence was the single independent variable found to have a relationship with, and was considered a predicting variable for, the dependent variable (preparedness as an RA/RD). Further analysis was done to consider specific answers on RA's and RD's knowledge of FGCU procedures in comparison to recent campus emergency management studies to consider the overall effectiveness of their procedures. Findings indicate that improvements can be made in the areas concerning their knowledge of when to evacuate, their duties for evacuation, and how the university communicates information. This study and survey can be adapted further to expand on student vulnerabilities to include a more broad range of students, schools and teacher's vulnerabilities, and expanded to include more natural hazards.
|
83 |
Empirically Driven Investigation of Dependability and Security Issues in Internet-Centric SystemsHuynh, Toan Nguyen Duc 06 1900 (has links)
The Web, being the most popular component of the Internet, has been transformed from a static information-serving medium into a fully interactive platform. This platform has been used by developers to create web applications rivaling traditional desktop systems. Designing, developing and evaluating these applications require new or modified methodologies, techniques and tools because of the different characteristics they exhibit. This dissertation discusses two important areas for developing and evaluating these applications: security and data mining.
In the security area, a survey using a process similar to the Goal Question Metric approach examines the properties of web application vulnerabilities. Using results from the survey, a white-box approach to identify web applications vulnerabilities is proposed. Although the approach eliminates vulnerabilities during the development process, it does not protect existing web applications that have not utilized the approach. Hence, an Anomaly-based Network Intrusion Detection System, called AIWAS, is introduced. AIWAS protects web applications through the analysis of interactions between the users and the web applications. These interactions are classified as either benign or malicious; malicious interactions are prevented from reaching the web applications under protection.
In the data mining area, the method of reliability estimation from server logs is examined in detail. This examination reveals the fact that the session workload is currently obtained using a constant Session Timeout Threshold (STT) value. However, each website is unique and should have its own STT value. Hence, an initial model for estimating the STT is introduced to encourage future research on sessions to use a customized STT value per website. This research on the STT leads to a deeper investigation of the actual session workload unit. More specifically, the distributional properties of the session workload are re-examined to determine whether the session workload can be described as a heavy-tailed distribution. / Software Engineering and Intelligent Systems
|
84 |
Seismic Vulnerabilities And Risks For Urban Mitigation Planning In TurkeySonmez Saner, Tugce 01 February 2013 (has links) (PDF)
Chronic seismic hazards and resulting secondary impacts as natural conditions of the country, and loss of robust building and prudent settlement practices as aggravated by rapid population growth make cities the most vulnerable geographical and social entities in Turkey. In contrast, Turkish disaster policy is solely focused on post-disaster issues and no incentives or provision exist to encourage risk analysis or risk mitigation approaches, despite current international efforts.
For the development of risk reduction policies an essential step is to prioritize settlements according to their vulnerability levels. This could be determined by hazard probabilities and attributes of the building stock of each settlement. Measurement of vulnerability levels allows the ordering of settlements into risk categories.
Vulnerability levels of settlements are then assumed to depend on a number of attributes of cities to explore if vulnerability could be related to a set of urban properties. Results of statistical analyses indicate that total building loss is related to the ratio of population over the total number of buildings in mid-range settlements, and directly related to population in metropolitan cities. Relative loss on the other hand is related with rate of agglomeration and development index in almost every size category of settlements.
Observations provide guiding principles for effective mitigation practices in Turkey by ordering settlements and offer means of differential implementation. These could contribute to improved safety measures in urban standards, building codes, building supervision procedures, insurance systems, investment priorities, and Law (6306) on Redevelopment of Areas under Disaster Risk.
|
85 |
Empirically Driven Investigation of Dependability and Security Issues in Internet-Centric SystemsHuynh, Toan Nguyen Duc Unknown Date
No description available.
|
86 |
Analyse de code et processus d'évaluation des composants sécurisés contre l'injection de faute / Code analysis and evaluation process for vulnerability detection against fault injection on secure hardwareDureuil, Louis 12 October 2016 (has links)
Dans le domaine des cartes à puce, les analyses de vulnérabilité demandent d’être à la pointe de l’art en termes d’attaques et de techniques de protection. Une attaque classique est l’injection de fautes, réalisée au niveau matériel notamment par des techniques laser. Pour anticiper les impacts possibles de ce type d'attaque, certaines analyses sont menées au niveau logiciel. Il est donc fortement d’actualité de pouvoir définir des critères et proposer des outils automatiques permettant d’évaluer la robustesse d’une application à ce type d’attaque, d’autant plus que les techniques d’attaques matérielles permettent maintenant d’enchaîner plusieurs attaques (spatiales ou temporelles) au cours d’une exécution. En effet, des travaux de recherche récents évaluent l'impact des contre-mesures face à ce type d'attaque[1], ou tentent de modéliser les injections de faute au niveau C[2]. Le sujet de thèse proposé s'inscrit dans cette problématique, avec néanmoins la particularité novatrice de s'intéresser au couplage des analyses statique et dynamique dans le cas des injections de fautes effectuées au niveau binaire. Un des objectifs de la thèse est d'offrir un cadre paramétrable permettant de simuler des attaques par faute telles qu'elles peuvent être réalisées par le laboratoire CESTI-LETI au niveau matériel. Il faudra donc proposer un modèle intermédiaire générique permettant de spécifier des contraintes réelles comme par exemple les différents types de mémoires (RAM, EEPROM, ROM), qui peuvent induire des fautes permanentes ou volatiles. Concilier les analyses statiques du code et l'injection de fautes dynamiques devra permettre de maîtriser la combinatoire des exécutions et de guider l'analyse à l'aide de patterns d'attaques. À ce titre, on sera amené à proposer une taxonomie des attaques et de nouvelles modélisations d'attaques. Il faudra également adapter les outils d'analyse statique aux conséquences de l'injection dynamique de fautes, qui peut modifier profondément le code en changeant l'interprétation des instructions, ce qui a un effet similaire à la génération de code à l'exécution. Ce sujet de thèse s'inscrit dans la stratégie d'innovation du CESTI-LETI et pourra aboutir à un vérificateur automatique de code utilisable par les évaluateurs du CESTI-LETI. [1] A. Séré, J-L. Lanet et J. Iguchi-Cartigny. « Evaluation of Countermeasures Against Fault Attacks on Smart Cards ». en. In : International Journal of Security and Its Applications 5.2 (2011). [2] Xavier Kauffmann-Tourkestansky. « Analyses sécuritaires de code de carte à puce sous attaques physiques simulées ». Français. THESE. Université d’Orléans, nov. 2012. url : http://tel.archives-ouvertes.fr/tel-00771273. / Vulnerability detections for smart cards require state of the art methods both to attack and to protect the secure device. A typical type of attack is fault injection, most notably performed by means of laser techniques. To prevent some of the consequences of this kind of attacks, several analyses are conducted at the software level. Being able to define criteria and to propose automated tools that can survey the robustness of an application to fault injection is thus nowadays a hot topic, even more so since the hardware attack techniques allow today an attacker to perform several attacks in a single software execution. Indeed, recent research works evaluate the effectiveness of counter-measures against fault injection[1], or attempt to develop models of fault injection at the C level[2]. This thesis project addresses the issue of multiple faults injection, albeit by adding the distinctive aspect of static and dynamic analysis interaction in a context of binary-level fault injection. An objective of the thesis is to achieve a configurable framework to simulate fault injections in the way they are currently performed by the CESTI-LETI laboratory on the actual hardware. To do so we will develop a generic intermediate model that will allow us to specify hardware constraints, such as the various kinds of memories (RAM, EEPROM, ROM), whose different properties can induce either permanent or volatile faults. Combining the static code analysis with dynamic fault injections should prevent the combinatory explosion of the executiions while attack patterns will guide the analysis. A taxonomy of attacks and new attack modelisations could emerge from this work. An adaption of the tools for static analysis is also required, because dynamic fault injection can deeply change the code by modifying the interpretation of the instructions, in a similar manner to dynamic compilation. This thesis project falls within the CESTI-LETI's innovation strategy, et could lead to an automated code verifier that could be used by the CESTI-LETI evaluation specialists. [1] A. Séré, J-L. Lanet et J. Iguchi-Cartigny. « Evaluation of Countermeasures Against Fault Attacks on Smart Cards ». en. In : International Journal of Security and Its Applications 5.2 (2011). [2] Xavier Kauffmann-Tourkestansky. « Analyses sécuritaires de code de carte à puce sous attaques physiques simulées ». Français. THESE. Université d’Orléans, nov. 2012. url : http://tel.archives-ouvertes.fr/tel-00771273.
|
87 |
Estudo sobre a topologia das redes criminaisCunha, Bruno Requião da January 2017 (has links)
Nesta tese investigam-se três pontos ligados a fragilidades topológicas de grafos e suas aplicações a redes complexas reais e, em especial, a redes de relacionamentos criminais. Na primeira etapa, apresenta-se in abstracto um método inédito e eficiente de fragmentação de redes complexas por módulos. O procedimento identifica em primeiro lugar comunidades topológicas por meio da qual a rede pode ser representada usando algoritmos heurísticos de extração de comunidades. Então, somente os nós que participam de ligaçõees inter-comunitaárias são removidos em ordem decrescente de sua centralidade de intermediação. Ilustra-se o método pela aplicação a uma variedade de redes reais nas áreas social, de infraestrutura, e biológica. Mostra-se que a abordagem por módulos supera ataques direcionados a vértices baseados somente no ordenamento de índices de centralidade, com ganhos de eficiência fortemente relacionados à modularidade da rede.No segundo momento, introduzem-se os conceitos de robustez e fragilidade de redes generalizadas para avaliar o quanto um determinado sistema se comporta frente a ataques incompletos. Ainda, avalia-se o desempenho (relação entre robustez e custo computacional) de diversos ataques sequenciais e simultâneos a redes modulares por meio de uma medida empírica que chamamos de performance. Mostra-se por meio de redes artificiais de referência e de redes reais que para sistemas altamente modulares a estratégia de fragmentação por módulos apresenta um desempenho até 10 vezes superior aos demais ataques. Na última etapa, explora-se com maior profundidade a natureza subjacente de redes reais de relacionamentos criminais. Apresenta-se uma rede única e sem precedentes construída pela Polícia Federal Brasileira consistindo de mais de 35.000 relacionamentos entre 24.000 indivíduos. Os dados foram coletados entre abril e agosto de 2013 e consistem em informações fornecidas diretamente pelos investigadores responsáveis de cada caso. O sistema apresenta características típicas de redes sociais, porém é bem mais “escuro"que o comportamento típico, com baixos níveis tanto de densidade de arestas quanto de eficiência de rede. Além do mais, o sistema é extremamente modular o que implica ser possível desmantelar toda a rede de crimes federais brasileiros com a remoção de aproximadamente 2% dos indivíduos escolhidos conforme a prescrição do método modular. Também, a rede é controlável no sentido da teoria matemática de controle, significando que com acesso a aproximadamente 20% dos nós é possível, em tese, levar qualquer variável dinâmica de um estado inicial a um estado final arbitrário em um tempo finito. Exibi-se tambám uma análise topológica e de fragilidades de uma segunda rede criminal relacionada a investigações da Polícia Federal. Trata-se de um fórum online destinado à prática de crimes cibernéticos na chamada camada profunda da internet (deep web). (Continuação ) Após a coleta dos dados foi possível construir uma rede de relacionamentos com quase 10.000 indivíduos. Comparou-se, entãoo, a estratégia usada de fato pela Polícia Federal durante a Operação Darknet com a previsão teórica de ataques topológicos à rede criminal e mostrou-se que ataques dirigidos por grau teriam fragmentado o sistema de maneira quase 15 vezes mais eficiente. Por outro lado, esta rede não é modular apesar de novamente apresentar uma arquitetura mais “escura" que o usual. Por termo, demonstra-se que os ataques por arestas estão diretamente relacionados ao aprisionamento enquanto que a ressocialização e/ou morte dos indivíduos é melhor interpretada como a remoção por vértices. Destarte, comprovou-se que de um ponto de vista topológico a ressocialização é de fato mais eficiente em reduzir a criminalidade do que o aprisionamento. Contudo, na rede de crimes federais estudada essa diferenca é muito pequena, de tal modo que ambas as políticas poderiam, em tese, ser aplicadas a fim de se combater eficientemente o sistema criminoso. / In this thesis we investigate three points connected to topological fragilities of graphs and their applications to real complex networks and, in particular, to networks of criminal relationships. In the first step, we present an unprecedented and efficient method of fragmentation of complex networks by modules. Firstly, the procedure identifies topological communities through which the network can be represented using heuristic communities extraction algorithms. After that, only the nodes that bridge communities are removed in descending order of their betweenness centrality . We illustrate the method by the applying it to a variety of real networks in the social, infrastructure, and biological fields. We show that the modular approach outperforms attacks traditional attacks based only on the ordering of centrality indexes, with efficiency gains strongly related to the modularity of the network. In the second moment, we introduce the concepts of generalized robustness and fragility of networks to evaluate how much a certain system behaves in the face of incomplete attacks. Also, we evaluate the relation between robustness and computational cost of several sequential and simultaneous attacks to modular networks by means of an empirical measure that we call performance. In this sense, we show through artificial and real networks that for highly modular systems the strategy of fragmentation by modules presents a performance up to 10 times superior to traditional attacks. In the last step, we explore in more depth the underlying nature of real networks of criminal relationships. We present a unique and unprecedented network built by the Brazilian Federal Police consisting of more than 35,000 relationships among 24,000 individuals. The data were collected between April and August 2013 and consist of information provided directly by the investigators responsible for each case. The system has typical characteristics of social networks, but is much "darker"than traditional social networks, with low levels of edge density and network efficiency. Moreover, the network is extremely modular which implies that it is possible to dismantle all the network of Brazilian federal crimes with the removal of approximately 2% of the individuals chosen according to the modular method. Also the network is controllable in the sense of the mathematical control theory, meaning that with access only to 20% of nodes it is possible, In theory, to take any dynamic variable from an initial state to an arbitrary final state in a finite time. We also show a topological analysis of a second criminal network related to Federal Police investigations. This is an online forum for cybercrime in the so-called deep web. After the data collection, it was possible to build a network of relationships with almost 10,000 individuals. We then compared the strategy actually used by the Federal Police during Operation Darknet with the theoretical prediction of topological attacks on the criminal network and showed that degree-based attacks would have fragmented the system almost 15 times more efficiently. On the other hand, this network is not modular despite presenting a "darker"architecture than usual. As a last result, this particular system is not controllable in practical terms. We finish the study by showing that edge attacks are directly related to the imprisonment whereas the resocialization and/or death of the individuals is better interpreted as the removal of vertices. Thus, we prove that from a topological point of view resocialization is in fact more efficient in reducing crime rates than imprisonment. However, in the network of federal crimes studied here this difference is very small, so that both policies could in theory be applied in order to combat effectively the criminal system.
|
88 |
Os passos indesejáveis: um estudo do contexto sociocultural do uso e usuários de crack nas cidades do Rio de Janeiro e Nova Iorque. / The steps of the undesirables: an study of the sociocultural context of the crack cocaine use and users at the cities of Rio de Janeiro and New York.Danielle de Carvalho Vallim 11 June 2015 (has links)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / A presente tese desenvolveu um olhar sobre o indivíduo que consome crack abusivamente nas cidades do Rio de Janeiro e Nova Iorque, especialmente os que se encontravam em situação de vulnerabilidade social. Neste sentido, buscou-se conhecer de que forma o processo de vulnerabilidade social corroborou para o uso abusivo da droga, concentrando, principalmente, o foco sobre os que se encontravam em condição marginal, especialmente aqueles que viviam em situação de rua, residindo nas cenas de uso. Rio de Janeiro e Nova Iorque foram escolhidas por apresentarem população usuária abusiva de crack em número considerável. Por isso, pretendeu-se analisar se os perfis socioculturais desses sujeitos se assemelhariam. Foram analisados significados complexos e conotações socioculturais que exerciam influências significativas nas motivações ao consumo abusivo da droga. Sendo assim, nas páginas que seguem, objetiva-se aprofundar a compreensão sobre os fenômenos sociais que interagem com ou sobre o uso abusivo de crack e com seus usuários, tendo como base o respeito aos indivíduos investigados. O processo de elaboração da pesquisa desenvolveu-se por meio da técnica de observação participante, história de vida e aplicação de entrevistas semi-estruturadas a usuários desta droga em ambas as cidades. Tanto no Rio de Janeiro, quanto em Nova Iorque, o perfil sociocultural dos participantes apresentou-se de forma semelhante: indivíduos socialmente marginalizados, excluídos, vítimas de racismo, preconceito, miséria, pobreza, conflitos familiares e rodeados pelos efeitos de políticas proibicionistas, assim como repressão policial e encarceramento. Pode-se afirmar que o processo de vulnerabilidade sofrido por esses indivíduos tornou-se evidente na vivência de problemas sociais anteriores ao consumo de crack. Estes problemas ampliaram-se na medida em que esses sujeitos se tornaram usuários abusivos, principalmente, frente ao estigma e à exclusão consequentes do fardo de serem drogados, cracudos ou crackheads, o que salientou ainda mais o rompimento dos vínculos sociais, na maioria dos casos, já enfraquecidos. Os resultados demonstraram que, embora sejam de cidades de diferentes países, com realidades econômicas, culturais e sociais distintas, a população usuária abusiva de crack se assemelha no que se refere aos aspectos especialmente as falhas - sociais, culturais e econômicas no processo de organização de vida, fortalecendo os argumentos em torno das dimensões socioculturais do uso. / This thesis is a investigation of the individual which consumes crack cocaine abusively at the cities of Rio de Janeiro and New York, especially those which were in social vulnerable situation. In this sense, was seen to know how the social vulnerability process corroborated to the abuse of drugs, focusing mainly on those who were marginalized, especially those living on the streets, at the spots of drug use. Rio de Janeiro and new york were chosen by the fact that there is a population of crack cocaine users in considerable numbers. Therefore, the aim was to analyze if the socio-cultural profiles of these subjects would resemble. Complex meanings and sociocultural connotations which exercised significant influence in the motivations of the abusive drug use were analyzed. Thus, in the pages that follow, the objective is to deepen the understanding of social phenomena that interact with or over the abusive use of crack cocaine and their users, based on respect for individuals investigated. The research process was developed through participant observation technique, life history and application of semi-structured interviews with crack cocaine users in both cities. Was discovered that both in Rio de Janeiro, as in new york, the socio-cultural profile of the participants were similar: socially marginalized people, excluded, victims of racism, prejudice, misery, poverty, family conflict and surrounded by the effects of prohibitionist policies and police repression and incarceration. It can be said that the vulnerability process of these individuals was presented in the life experience before to crack cocaine use. These problems have widened the extent that these subjects became abusive users, especially because the stigma and consequent exclusion of the "burden" of being , "cracudos" or "crackheads", which further emphasized the rupture of social links, in most cases, already weakened. The results show that, while the cities of different countries with economic, cultural and social realities different, the abusive users population of crack cocaine is similar with regard to the aspects - especially the failures - social, cultural and economic in the process of life organization, strengthening the arguments around the sociocultural dimensions of use.
|
89 |
Degradação ambiental e uso das terras do município de Princesa Isabel – PB.SILVA, Dalva Damiana Estevam da. 08 May 2018 (has links)
Submitted by Emanuel Varela Cardoso (emanuel.varela@ufcg.edu.br) on 2018-05-08T20:03:40Z
No. of bitstreams: 1
DALVA DAMIANA ESTEVAM DA SILVA – DISSERTAÇÃO (PPGEG) 2017.pdf: 8357707 bytes, checksum: a9ec4576952d53738a67d21cc74133e5 (MD5) / Made available in DSpace on 2018-05-08T20:03:40Z (GMT). No. of bitstreams: 1
DALVA DAMIANA ESTEVAM DA SILVA – DISSERTAÇÃO (PPGEG) 2017.pdf: 8357707 bytes, checksum: a9ec4576952d53738a67d21cc74133e5 (MD5)
Previous issue date: 2017-02-23 / O município de Princesa Isabel localiza-se no Estado da Paraíba, na Mesorregião do Sertão Paraibano e Microrregião da Serra do Teixeira. O presente estudo teve como objetivo analisar a degradação ambiental e o uso das terras do município de Princesa Isabel-PB, com vistas a contribuir para o entendimento de questões sociais, econômicas e ambientais. A metodologia baseou-se na utilização de técnicas de geoprocessamento e processamento digital de imagens de satélite, com a análise temporal de imagens orbitais TM/Landsat-5 e TM/Landsat-8 para os anos de 1985 e 2015, buscando compreender a dinâmica da degradação ambiental no município neste período. Além disso, foram aplicados questionários para verificar as vulnerabilidades e a percepção ambiental dos moradores do entorno da bacia hidráulica do açude Jatobá II. Os resultados evidenciam que a degradação diminuiu, os principais fatores
para essa ocorrência foram a seca recorrente na região que fez com que as pessoas migrassem para a zona urbana e a busca de emprego e melhores condições vida. Entretanto, no entorno da bacia são desenvolvidas atividades antrópicas, cujas técnicas são tradicionais com desmatamento em áreas declivosas e queimadas, agravando o assoreamento no açude Jatobá II, comprometendo o volume hídrico. Os índices de vulnerabilidade encontrados mostram uma situação de fragilidade da população frente a desastres. A vulnerabilidade socioeconômica apresentou índice muito alto de 50,0%, a vulnerabilidade tecnológica indicou índice considerado alto de 40,0% e a vulnerabilidade ambiental ou a seca encontrada foi considerada alta com 36,8%. Esses valores resultam da falta de informação, da pobreza e da inexistência de políticas públicas na área da bacia. Os estudos relacionados a essa temática
são importantes, para a identificação de áreas com degradação ambiental, bem como, auxiliam no planejamento e desenvolvimento de ações voltadas à mitigação e preservação dos recursos naturais. / The municipality of Princesa Isabel is located in the State of Paraíba, in the Meso-region of Sertão Paraibano and Micro-region of Serra do Teixeira. The objective of this study was to analyze the environmental degradation and land use in the municipality of Princesa Isabel-PB, in order to contribute to the understanding of social, economic and environmental issues. The methodology was based on the use of geoprocessing and digital processing of satellite images, with the temporal analysis of TM/Landsat-5 and TM/Landsat-8 orbital images of the years 1985 and 2015, in order to understand the dynamics of degradation in the municipality in this period. In addition, questionnaires were applied in order to verify the vulnerabilities and environmental perception of the residents that surrounds the hydraulic basin. The results indicate that the degradation decreased. The main factors for this occurrence were the recurrent drought in this region which caused people migration to urban area for a better life
conditions and employment. However, around the area that surrounds the basin, anthropic activities are developed, whose techniques are traditional with deforestation in burned and declining areas, aggravating the siltation in the Jatobá II dam, compromising the water volume. The vulnerability indexes indicates a fragile situation of the population facing disasters. The socioeconomic vulnerability showed a very high index of 50,0%, the technological vulnerability indicated a high index of 40,0% and the environmental vulnerability or drought found, was considered high with 36,8%. These values are results of the lack of information, poverty and lack of public policies in the basin’s area. Studies related to this theme are important for identification of areas with environmental degradation, as well as, help in the planning and development of actions on mitigation and preservation of natural resources.
|
90 |
Os passos indesejáveis: um estudo do contexto sociocultural do uso e usuários de crack nas cidades do Rio de Janeiro e Nova Iorque. / The steps of the undesirables: an study of the sociocultural context of the crack cocaine use and users at the cities of Rio de Janeiro and New York.Danielle de Carvalho Vallim 11 June 2015 (has links)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / A presente tese desenvolveu um olhar sobre o indivíduo que consome crack abusivamente nas cidades do Rio de Janeiro e Nova Iorque, especialmente os que se encontravam em situação de vulnerabilidade social. Neste sentido, buscou-se conhecer de que forma o processo de vulnerabilidade social corroborou para o uso abusivo da droga, concentrando, principalmente, o foco sobre os que se encontravam em condição marginal, especialmente aqueles que viviam em situação de rua, residindo nas cenas de uso. Rio de Janeiro e Nova Iorque foram escolhidas por apresentarem população usuária abusiva de crack em número considerável. Por isso, pretendeu-se analisar se os perfis socioculturais desses sujeitos se assemelhariam. Foram analisados significados complexos e conotações socioculturais que exerciam influências significativas nas motivações ao consumo abusivo da droga. Sendo assim, nas páginas que seguem, objetiva-se aprofundar a compreensão sobre os fenômenos sociais que interagem com ou sobre o uso abusivo de crack e com seus usuários, tendo como base o respeito aos indivíduos investigados. O processo de elaboração da pesquisa desenvolveu-se por meio da técnica de observação participante, história de vida e aplicação de entrevistas semi-estruturadas a usuários desta droga em ambas as cidades. Tanto no Rio de Janeiro, quanto em Nova Iorque, o perfil sociocultural dos participantes apresentou-se de forma semelhante: indivíduos socialmente marginalizados, excluídos, vítimas de racismo, preconceito, miséria, pobreza, conflitos familiares e rodeados pelos efeitos de políticas proibicionistas, assim como repressão policial e encarceramento. Pode-se afirmar que o processo de vulnerabilidade sofrido por esses indivíduos tornou-se evidente na vivência de problemas sociais anteriores ao consumo de crack. Estes problemas ampliaram-se na medida em que esses sujeitos se tornaram usuários abusivos, principalmente, frente ao estigma e à exclusão consequentes do fardo de serem drogados, cracudos ou crackheads, o que salientou ainda mais o rompimento dos vínculos sociais, na maioria dos casos, já enfraquecidos. Os resultados demonstraram que, embora sejam de cidades de diferentes países, com realidades econômicas, culturais e sociais distintas, a população usuária abusiva de crack se assemelha no que se refere aos aspectos especialmente as falhas - sociais, culturais e econômicas no processo de organização de vida, fortalecendo os argumentos em torno das dimensões socioculturais do uso. / This thesis is a investigation of the individual which consumes crack cocaine abusively at the cities of Rio de Janeiro and New York, especially those which were in social vulnerable situation. In this sense, was seen to know how the social vulnerability process corroborated to the abuse of drugs, focusing mainly on those who were marginalized, especially those living on the streets, at the spots of drug use. Rio de Janeiro and new york were chosen by the fact that there is a population of crack cocaine users in considerable numbers. Therefore, the aim was to analyze if the socio-cultural profiles of these subjects would resemble. Complex meanings and sociocultural connotations which exercised significant influence in the motivations of the abusive drug use were analyzed. Thus, in the pages that follow, the objective is to deepen the understanding of social phenomena that interact with or over the abusive use of crack cocaine and their users, based on respect for individuals investigated. The research process was developed through participant observation technique, life history and application of semi-structured interviews with crack cocaine users in both cities. Was discovered that both in Rio de Janeiro, as in new york, the socio-cultural profile of the participants were similar: socially marginalized people, excluded, victims of racism, prejudice, misery, poverty, family conflict and surrounded by the effects of prohibitionist policies and police repression and incarceration. It can be said that the vulnerability process of these individuals was presented in the life experience before to crack cocaine use. These problems have widened the extent that these subjects became abusive users, especially because the stigma and consequent exclusion of the "burden" of being , "cracudos" or "crackheads", which further emphasized the rupture of social links, in most cases, already weakened. The results show that, while the cities of different countries with economic, cultural and social realities different, the abusive users population of crack cocaine is similar with regard to the aspects - especially the failures - social, cultural and economic in the process of life organization, strengthening the arguments around the sociocultural dimensions of use.
|
Page generated in 0.0741 seconds