225 resultados para Nursing - Study and teaching - Management
Resumo:
Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness measure for medical data. This thesis starts with the observation that existing EHR system proposals suer from six serious shortcomings that aect patients’ privacy and safety, and medical practitioners’ trust in EHR data: accuracy and privacy concerns over linking patients’ existing medical records; the inability of patients to have control over who accesses their private data; the inability to protect against inferences about patients’ sensitive data; the lack of a mechanism for evaluating the trustworthiness of medical data; and the failure of current healthcare workflow processes to capture and enforce patient’s privacy desires. Following an action research method, this thesis addresses the above shortcomings by firstly proposing an architecture for linking electronic medical records in an accurate and private way where patients are given control over what information can be revealed about them. This is accomplished by extending the structure and protocols introduced in federated identity management to link a patient’s EHR to his existing medical records by using pseudonym identifiers. Secondly, a privacy-aware access control model is developed to satisfy patients’ privacy requirements. The model is developed by integrating three standard access control models in a way that gives patients access control over their private data and ensures that legitimate uses of EHRs are not hindered. Thirdly, a probabilistic approach for detecting and restricting inference channels resulting from publicly-available medical data is developed to guard against indirect accesses to a patient’s private data. This approach is based upon a Bayesian network and the causal probabilistic relations that exist between medical data fields. The resulting definitions and algorithms show how an inference channel can be detected and restricted to satisfy patients’ expressed privacy goals. Fourthly, a medical data trustworthiness assessment model is developed to evaluate the quality of medical data by assessing the trustworthiness of its sources (e.g. a healthcare provider or medical practitioner). In this model, Beta and Dirichlet reputation systems are used to collect reputation scores about medical data sources and these are used to compute the trustworthiness of medical data via subjective logic. Finally, an extension is made to healthcare workflow management processes to capture and enforce patients’ privacy policies. This is accomplished by developing a conceptual model that introduces new workflow notions to make the workflow management system aware of a patient’s privacy requirements. These extensions are then implemented in the YAWL workflow management system.
Resumo:
The trend of diminished funding, demands for greater efficiency and higher public accountability have led to a rapid expansion of interest in the bibliometric assessment of research performance of universities. A pilot research is conducted to provide a preliminary overview of the research performance of the building and construction schools or departments through the analysis of bibliometric indicators including the journal impact factor (JIF) published by Institute for Scientific Information (ISI). The suitability of bibliometric evaluation approaches as a measure of research quality in building and construction management research field is discussed.
Resumo:
Efficient and effective urban management systems for Ubiquitous Eco Cities require having intelligent and integrated management mechanisms. This integration includes bringing together economic, socio-cultural and urban development with a well orchestrated, transparent and open decision-making system and necessary infrastructure and technologies. In Ubiquitous Eco Cities telecommunication technologies play an important role in monitoring and managing activities via wired and wireless networks. Particularly, technology convergence creates new ways in which information and telecommunication technologies are used and formed the backbone of urban management. The 21st Century is an era where information has converged, in which people are able to access a variety of services, including internet and location based services, through multi-functional devices and provides new opportunities in the management of Ubiquitous Eco Cities. This chapter discusses developments in telecommunication infrastructure and trends in convergence technologies and their implications on the management of Ubiquitous Eco Cities
Resumo:
This paper introduces a model to facilitate delegation, including ad-hoc delegation, in cross security domain activities. Specifically, this paper proposes a novel delegation constraint management model to manage and track delegation constraints across security domains. An algorithm to trace the authority of delegation constraints is introduced as well as an algorithm to form a delegation constraint set and detect/prevent potential conflicts. The algorithms and the management model are built upon a set of formal definitions of delegation constraints.
Resumo:
Operators of busy contemporary airports have to balance tensions between the timely flow of passengers, flight operations, the conduct of commercial business activities and the effective application of security processes. In addition to specific onsite issues airport operators liaise with a range of organisations which set and enforce aviation-related policies and regulations as well as border security agencies responsible for customs, quarantine and immigration, in addition to first response security services. The challenging demands of coordinating and planning in such complex socio-technical contexts place considerable pressure on airport management to facilitate coordination of what are often conflicting goals and expectations among groups that have standing in respect to safe and secure air travel. What are, as yet, significantly unexplored issues in large airports are options for the optimal coordination of efforts from the range of public and private sector participants active in airport security and crisis management. A further aspect of this issue is how airport management systems operate when there is a transition from business-as-usual into an emergency/crisis situation and then, on recovery, back to ‘normal’ functioning. Business Continuity Planning (BCP), incorporating sub-plans for emergency response, continuation of output and recovery of degraded operating capacity, would fit such a context. The implementation of BCP practices in such a significant high security setting offers considerable potential benefit yet entails considerable challenges. This paper presents early results of a 4 year nationally funded industry-based research project examining the merger of Business Continuity Planning and Transport Security Planning as a means of generating capability for improved security and reliability and, ultimately, enhanced resilience in major airports. The project is part of a larger research program on the Design of Secure Airports that includes most of the gazetted ‘first response’ international airports in Australia, key Aviation industry groups and all aviation-related border and security regulators as collaborative partners. The paper examines a number of initial themes in the research, including: ? Approaches to integrating Business Continuity & Aviation Security Planning within airport operations; ? Assessment of gaps in management protocols and operational capacities for identifying and responding to crises within and across critical aviation infrastructure; ? Identification of convergent and divergent approaches to crisis management used across Austral-Asia and their alignment to planned and possible infrastructure evolution.
Resumo:
This paper explores the stages of one student’s intellectual journey through a Doctor of Philosophy program of study in an Australian university. It outlines the theoretical and methodological insights made as she came to understand that data was discourse, entailing a politics and position of power that ran contrary to the aims of the study that the student was undertaking in and on her own community. The article is a reflective narrative produced from the experience of having to come to terms with some of the personal and professional tensions and contradictions that postgraduate study can, and maybe should, engender if it is to be any of real value.
Resumo:
To be scholarly in learning and teaching is rigorous academic work. It demands: currency and command of both discipline subject matter and educational theory; inquiring, methodical, and reflective approaches; the collection, evaluation and documentation of evidence of learning and teaching efficacy; and, optimally, entails participation in and communication among a community of teaching professionals. This chapter examines the author’s own practice in this regard to explicate the ‘how’ and ‘why’ of scholarly and scholarship approaches, as much as the ‘what’ and ‘where’ of that endeavour. In doing so, this meta‐analysis is made ‘community property’, in the same way that Shulman (1993: 6) exhorted we ‘change the status of teaching from private to community property’ so that teaching might be more greatly valued in the academy.
Resumo:
know personally. They also communicate with other members of the network who are the friends of their friends and may be friends of their friend’s network. They share their experiences and opinions within the social network about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Opinions, reputations and ecommendations will influence users' choice and usage of online resources. Recommendations may be received through a chain of friends of friends, so the problem for the user is to be able to evaluate various types of trust recommendations and reputations. This opinion or ecommendation has a great influence to choose to use or enjoy the item by the other user of the community. Users share information on the level of trust they explicitly assign to other users. This trust can be used to determine while taking decision based on any recommendation. In case of the absence of direct connection of the recommender user, propagated trust could be useful.
Resumo:
The importance of reflection in higher education, and across disciplinary fields is widely recognised. It is generally embedded in university graduate attributes, professional standards and course objectives. Furthermore, reflection is commonly included in assessment requirements in higher education subjects, often without necessary scaffolding or clear expectations for students. It is essential that academic staff have substantive knowledge and clear expectations about the aims of reflective activities, the most effective mode of representation, and appropriate teaching strategies to support students in deep, critical reflection. The paper argues the case for reflection to be represented in different modes, using discursive (language) or performative (symbolic practice) forms of expression according to disciplinary context and individual communicative strengths. It introduces key discursive and expressive elements that constitute different modes of representation in reflective tasks. This functional analysis of textual elements provides explicit knowledge for teaching and assessing multiple modes of reflection in higher education.
Resumo:
The intention of the analysis in this paper was to determine, from interviews with eleven early years’ teachers, what knowledge guided their teaching of moral behaviour. Six of the teachers defined moral behaviour in terms of social conventions only. Children’s learning was attributed by five of the teachers to incidental/contextual issues. Nine of the teachers used discussion of issues, in various contexts, as a way of teaching about social and moral issues. The majority of the teachers (n=7) gave the source of their knowledge of pedagogy as practical as opposed to theoretically informed. There was no clear relationship between their definitions, understanding of children’s learning, pedagogy or source of knowledge. Most of the teachers were using discussion, negotiation and reflection to develop the children’s moral and social behaviour. This is probably effective; however, it suggests a strong need for teaching of moral development to be given more prominence and addressed directly in in-service courses so that teachers are clear about their intentions and the most effective ways of achieving them.
Resumo:
In this chapter, Felicity McArdle provides a framework for planning,implementing and assessing quality experiences in the visual arts. She describes the importance of embedding Indigenous perspectives and knowledge in the curriculum and how to a build a repertoire of resources and practical ideas to assist children to become eff ective communicators through the use of symbol systems for meaning-making.