Вы находитесь на странице: 1из 9

How research help cure HIV?

Related article#1

An analysis of social support exchanges in online


HIV/AIDS self-help growth
Constantinos K.Coursari

Abstract
Hundreds of thousands of people sharing concerns about
HIV/AIDS have taken advantage of online self-help groups to
exchange resources and support. Little research so far has focused
on the nature and content of actual messages exchanged by group
members. To provide an in-depth understanding of social support
exchanges in online HIV/AIDS self-help groups, this study
identifies and analyzes the dimensions and corresponding
frequencies of exchanged social support as well as the group
interactions facilitating those exchanges. A total of 5000 postings
created within a 1 year period were randomly selected from a
selected online HIV/AIDS forum. Content analysis was then
conducted to assess the types and proportions of exchanged social
support. A thematic analysis of the postings that could not be
categorized with the adopted coding system was performed to find
further patterns of positive group interactions. The results show
that information support (41.6%) and emotional support (16.0%)
were exchanged most frequently, followed by network support
(6.8%) and esteem support exchanges (6.4%), whereas tangible
assistance was quite rare (0.8%). The authors also suggest that
three types of group interactions including sharing personal
experience, expression of gratitude, and offering congratulations
can facilitate social support exchanges among group member
Related article#2
Treating AIDS: Dilemmas of unequal access in
Ugand
SR Whyte, MA Whyte, L Meinert, B Kyaddondo

Abstract
The price of antiretroviral (ARV) medicines in Uganda has fallen
dramatically in recent years and more people are under treatment. By mid-
2003 it was estimated that 10 000 people were taking ARVs. Drawing on
participant observation, qualitative interviews, work with key informants and
document reviews, we seek to map out the channels through which ARVs
are being made available to people and to describe and assess the social
implications of the present system of distribution. Four channels of access
to ARV medicines were common in mid-2003: (i) Medicines were provided
free in structured research and treatment programmes funded by donors,
but only to those who lived in a defined catchment area and met inclusion
criteria. (ii) Gazetted treatment centres provided drugs on a fee-for-service
basis; these urban-based institutions account for the largest number of
drugs dispensed. (iii) Private practitioners, mainly based in Kampala,
provided discrete treatment for those who could afford it. (iv) Finally,
medicines were ‘facilitated' along informal networks, supplying friends and
relatives on a less regular basis, sometimes for free, sometimes for cash.
However, access to ARVs remains highly uneven. We argue that cheaper
drugs make possible different kinds of access, different qualities of care,
and a growing awareness of inequity. Because the price of drugs has fallen
drastically, middle-class families now have the possibility of buying them.
But this requires tough prioritising and many cannot follow the regimen
regularly. Health workers must consider whether patients will be able to
purchase the drugs or not. In a kind of popular social pharmacy, people
assess who can and should and does get access to ARVs.
Further research should examine the whole range of ARV
access channels in different countries and the associated
patterns of social differentiation and exclusions.

Related article#1
Combating Terrorism: The Challenge of Measuring
Effectiveness
Perl, Raphael
Abstract : This report is designed to assist congressional policy
makers in understanding and applying broad-based objective criteria
when evaluating progress in the nation's efforts to combat terrorism.
It is not intended to define specific, in-depth, metrics for measuring
progress against terrorism. How one perceives and measures
progress is central to formulating and implementing anti-terror
strategy. Perception has a major impact, as well, on how nations
prioritize and allocate resources. On the flip side, the parameters
used to measure progress can set the framework for the
measurement of failure. The measurement process is also
inextricably linked to strategies. Progress is possible using diverse
strategies, under very different approaches. The goals of terrorists
and those who combat them are often diametrically opposed, but may
also be tangential, with both sides achieving objectives and making
progress according to their different measurement systems. Within
the context of these competing views and objectives, terrorist activity
may be seen as a process that includes discrete, quantum-like
changes or jumps that often underscore its asymmetric and nonlinear
nature. An approach that looks at continuous metrics such as lower
numbers of casualties may indicate success, while at the same time
the terrorists may be redirecting resources towards vastly more
devastating projects. Policy makers may face considering the pros
and cons of reallocating more of the nation's limited resources away
from ongoing defensive projects and towards preventing the next
quantum jump of terrorism, even if this means accepting losses.
Measurement of progress, or lack thereof, may be framed in terms of
incidents, attitudes, and trends. A common pitfall of governments
seeking to demonstrate success in anti-terrorist measure over
reliance on quantitative indicators, such as the amount of money
spent on anti-terror efforts.
How technologies help measuring terrorists attack?

Related article#2
Countering Terrorism through Information and Privacy
Protection Technologies

Robert Popp ; John Poindexter

Abstract:
This article describes a vision for countering terrorism through
information and privacy-protection technologies. This vision was
initially imagined as part of a research and development (R&D)
agenda sponsored by DARPA in 2002 in the form of the information
awareness office (IAO) and the total information awareness (TIA)
program. It includes a critical focus and commitment to delicately
balancing national security objectives with privacy and civil liberties.
We strongly believe that the two don't conflict and that the ultimate
solution lies in utilizing information technologies for
counterterrorism along with privacy-protection technologies to
safeguard civil liberties, and twining them together with coordinated
policies that bind them to their intended use

Published in: IEEE Security & Privacy ( Volume: 4 , Issue: 6 ,


Nov.-Dec. 2006 )
Page(s): 18 - 27
Date of Publication: Nov.-Dec. 2006
ISSN Information:
INSPEC Accession Number: 9247462
DOI: 10.1109/MSP.2006.147
Publisher: IEEE
Economic conditions and terrorism
ByS. BROCK BLOMBERG, GREGORY D. HESS AND AKILA WEERAPANA

Related article#3

Economic conditions and terrorism

By S. BROCK BLOMBERG, GREGORY D. HESS AND AKIL


WEERAPANA

ABSTRACT

In this paper, we develop and explore the


implications of an economic model that links the
incidence of terrorism in a country to the economic
circumstances facing that country. We briefly
sketch out a theory, in the spirit of Tornell (1998),
that describes terrorist activities as being initiated
by groups that are unhappy with the current
economic status quo, yet unable to bring about
drastic political and institutional changes that can
improve their situation. Such groups with limited
access to opportunity may find it rational to engage
in terrorist activities. The result is then a pattern of
reduced economic activity and increased terrorism.
In contrast, an alternative environment can emerge
where access to economic resources is more
abundant and terrorism is reduced. Our empirical
results are consistent with the theory. We find that
for democratic, high income countries, economic
contractions (i.e. recessions) can provide the spark
for increased probabilities of terrorist activities.

How do cloud technology help data strong?


Cloud computing: the nexus of strategy and
technology
Peter Ross, Michael Blumenstein
Journal of Business Strategy
ISSN: 0275-6668
Publication date: 12 July 2013
Related article#1
Abstract

Purpose
The purpose of this paper is to analyse the
impact of Cloud technologies on
management practices and business
strategies. It considers the role of human
resource management (HRM) departments
in supporting the organisational changes
required for the introduction and integration
of Cloud business strategies.

Related rticle#2

Literature review: Cloud Computing –Security Issues,


Solution and Technologies

Rajani Sharma, Rajender Kumar Trive

Abstract— Cloud computing has grabbed the spotlight in the year


2013 at a conference in San Francisco, with vendors providing
plenty of products and services that equip IT with controls to
bring order to cloud chaos. Cloud computing trend is increasing
rapidly so to make cloud computing more popular the very first
step for the organization is to identify exact area where the cloud
related threats lie. At an unusual pace, cloud computing has
transformed business and government. And this created new
security challenges. The development of the cloud service model
provide business – supporting technology in a more efficient way
than ever before .the shift from server to service based
technology brought a drastic change in computing technology.
However these developments have created new security
vulnerabilities, including security issues whose full impressions are
still rising. This paper presents an overview and study of cloud
computing, with several security threats, security issues,
currently used cloud technologies and security solutions.
Original Article

Cloud Computing in Support of Supply Chain


Information System Infrastructure:
Understanding When to go to the Cloud
Casey G. Cegielski Benjamin T. Hazen

Dianne J. Hall
First published: 24 July 2013

https://doi.org/10.1111/j.1745-493x.2012.03287.x

Related article#3
Abstract
Research suggests that there are other, more granular factors within the
domain of innovation diffusion theory that influence the adoption of
technological innovations. In this study, the circumstances that affect a
firm's intention to adopt cloud computing technologies in support of its
supply chain operations are investigated by considering tenets of classical
diffusion theory as framed within the context of the information processing
view. We posit that various aspects of an organization and its respective
environment represent both information processing requirements and
capacity, which influence the firm's desire to adopt certain information
technology innovations. We conducted an empirical study using a survey
method and regression analysis to examine our theoretical model. The
results suggest that business process complexity, entrepreneurial culture
and the degree to which existing information systems embody compatibility
and application functionality significantly affect a firm's propensity to adopt
cloud computing technologies. The findings support our theoretical
development and suggest complementarities between innovation diffusion
theory and the information processing view. We encourage other scholars to
refine our model in future supply chain innovation diffusion research. The
findings of this study might also be used by industry professionals to aid in
making more informed adoption decisions in regard to cloud computing
technologies in support of the supply chain.

Вам также может понравиться