288 resultados para public key replacement
Resumo:
Objective The 2010–2011 Queensland floods resulted in the most deaths from a single flood event in Australia since 1916. This article analyses the information on these deaths for comparison with those from previous floods in modern Australia in an attempt to identify factors that have contributed to those deaths. Haddon's Matrix, originally designed for prevention of road trauma, offers a framework for understanding the interplay between contributing factors and helps facilitate a clearer understanding of the varied strategies required to ensure people's safety for particular flood types. Methods Public reports and flood relevant literature were searched using key words ‘flood’, ‘fatality’, ‘mortality’, ‘death’, ‘injury’ and ‘victim’ through Google Scholar, PubMed, ProQuest and EBSCO. Data relating to reported deaths during the 2010–2011 Queensland floods, and relevant data of previous Australian flood fatality (1997–2009) were collected from these available sources. These sources were also used to identify contributing factors. Results There were 33 deaths directly attributed to the event, of which 54.5% were swept away in a flash flood on 10 January 2011. A further 15.1% of fatalities were caused by inappropriate behaviours. This is different to floods in modern Australia where over 90% of deaths are related to the choices made by individuals. There is no single reason why people drown in floods, but rather a complex interplay of factors. Conclusions The present study and its integration of research findings and conceptual frameworks might assist governments and communities to develop policies and strategies to prevent flood injury and fatalities.
Resumo:
OBJECTIVE: To synthesise the available evidence and estimate the comparative efficacy of control strategies to prevent total hip replacement (THR)-related surgical site infections (SSIs) using a mixed treatment comparison. DESIGN: Systematic review and mixed treatment comparison. SETTING: Hospital and other healthcare settings. PARTICIPANTS: Patients undergoing THR. PRIMARY AND SECONDARY OUTCOME MEASURES: The number of THR-related SSIs occurring following the surgical operation. RESULTS: 12 studies involving 123 788 THRs and 9 infection control strategies were identified. The strategy of 'systemic antibiotics+antibiotic-impregnated cement+conventional ventilation' significantly reduced the risk of THR-related SSI compared with the referent strategy (no systemic antibiotics+plain cement+conventional ventilation), OR 0.13 (95% credible interval (CrI) 0.03-0.35), and had the highest probability (47-64%) and highest median rank of being the most effective strategy. There was some evidence to suggest that 'systemic antibiotics+antibiotic-impregnated cement+laminar airflow' could potentially increase infection risk compared with 'systemic antibiotics+antibiotic-impregnated cement+conventional ventilation', 1.96 (95% CrI 0.52-5.37). There was no high-quality evidence that antibiotic-impregnated cement without systemic antibiotic prophylaxis was effective in reducing infection compared with plain cement with systemic antibiotics, 1.28 (95% CrI 0.38-3.38). CONCLUSIONS: We found no convincing evidence in favour of the use of laminar airflow over conventional ventilation for prevention of THR-related SSIs, yet laminar airflow is costly and widely used. Antibiotic-impregnated cement without systemic antibiotics may not be effective in reducing THR-related SSIs. The combination with the highest confidence for reducing SSIs was 'systemic antibiotics+antibiotic-impregnated cement+conventional ventilation'. Our evidence synthesis underscores the need to review current guidelines based on the available evidence, and to conduct further high-quality double-blind randomised controlled trials to better inform the current clinical guidelines and practice for prevention of THR-related SSIs.
Resumo:
2012 saw the publication of competing and complementary lines of Australian “classics”: “A&R Australian Classics” (HarperCollins) and “Text Classics” (Text Publishing). While Angus and Robertson were key in establishing a canon of Australian children’s classics in the twentieth century, it was the Text Classics line which included a selection of young people’s titles in their 2013. In turn, Penguin Australia launched a selection of “Australian Children’s Classics”. In so doing, these publishers were drawing on particular literary and visual cultural traditions in Australian children’s literature. Public assertions of a particular selection of children’s books reveals not only contemporary assumptions about desirable childhood experiences but about the operation of nostalgia therein. In encouraging Australian adults to judge books by their covers, such gestures imply that Australian children may be similarly understood. Importantly, the illusion of unity, sameness, and legibility which is promised by circumscribed canons of “classic” children’s literature may well imply a desire for similarly illusory, unified, legible, “classic” childhood. This paper attends to public attempts to materialise (and legitimise) a canon of classic Australian children’s literature. In particular, it considers the ways in which publishing, postage stamps, and book awards make visible a range of children’s books, but do so in order to either fix or efface the content or meaning of the books themselves. Moving between assertions of the best books for children from the 1980s to today, and of the social values circulated within those books, this paper considers the possibilities and problematics of an Australian children’s canon.
Resumo:
A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the other entity is dishonest. In this work, we present a system that allows users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Our proposal is different from previously published pseudonym systems, as in addition to standard notion of protecting privacy of an user, our system offers colligation between seemingly independent pseudonyms. This new property when combined with a trusted platform that stores a master secret key is extremely beneficial to an user as it offers a convenient way to generate a large number of pseudonyms using relatively small storage.
Resumo:
IT resources are indispensable in the management of Public Sector Organizations (PSOs) around the world. We investigate the factors that could leverage the IT resources in PSOs in developing economies. While research on ways to leverage IT resources in private sector organizations of developed countries is substantial, our understanding on ways to leverage the IT resources in the public sector in developing countries is limited. The current study aspires to address this gap in the literature by seeking to determine the key factors required to create process value from public sector IT investments in developing countries. We draw on the resource-centric theories to imply the nature of factors that could leverage the IT resources in the public sector. Employing an interpretive design, we identified three factors necessary for IT process value generation in the public sector. We discuss these factors and state their implications to theory and practice.
Resumo:
Despite ongoing ‘boom’ conditions in the Australian mining industry, women remain substantially and unevenly under-represented in the sector, as is the case in other resource-dependent countries. Building on the literature critiquing business-case rationales and strategies as a means to achieve women’s equality in the workplace, we examine the business case for employing more women as advanced by the Australian mining industry. Specifically, we apply a discourse analysis to seven substantial, publically-available documents produced by the industry’s national and state peak organizations between 2005 and 2013. Our study makes two contributions. First, we map the features of the business case at the sectoral rather than firm or workplace level and examine its public mobilization. Second, we identify the construction and deployment of a normative identity – ‘the ideal mining woman’ – as a key outcome of this business-case discourse. Crucially, women are therein positioned as individually responsible for gender equality in the workplace.
Resumo:
A key derivation function (KDF) is a function that transforms secret non-uniformly random source material together with some public strings into one or more cryptographic keys. These cryptographic keys are used with a cryptographic algorithm for protecting electronic data during both transmission over insecure channels and storage. In this thesis, we propose a new method for constructing a generic stream cipher based key derivation function. We show that our proposed key derivation function based on stream ciphers is secure if the under-lying stream cipher is secure. We simulate instances of this stream cipher based key derivation function using three eStream nalist: Trivium, Sosemanuk and Rabbit. The simulation results show these stream cipher based key derivation functions offer efficiency advantages over the more commonly used key derivation functions based on block ciphers and hash functions.
Resumo:
Public Transport Travel Time Variability (PTTV) is essential for understanding the deteriorations in the reliability of travel time, optimizing transit schedules and route choices. This paper establishes the key definitions of PTTV in which firstly include all buses, and secondly include only a single service from a bus route. The paper then analyzes the day-to-day distribution of public transport travel time by using Transit Signal Priority data. A comprehensive approach, using both parametric bootstrapping Kolmogorov-Smirnov test and Bayesian Information Creation technique is developed, recommends Lognormal distribution as the best descriptor of bus travel time on urban corridors. The probability density function of Lognormal distribution is finally used for calculating probability indicators of PTTV. The findings of this study are useful for both traffic managers and statisticians for planning and analyzing the transit systems.
Resumo:
Education in the 21st century demands a model for understanding a new culture of learning in the face of rapid change, open access data and geographical diversity. Teachers no longer need to provide the latest information because students themselves are taking an active role in peer collectives to help create it. This paper examines, through an Australian case study entitled ‘Design Minds’, the development of an online design education platform as a key initiative to enact a government priority for statewide cultural change through design-based curriculum. Utilising digital technology to create a supportive community, ‘Design Minds’ recognises that interdisciplinary learning fostered through engagement will empower future citizens to think, innovate, and discover. This paper details the participatory design process undertaken with multiple stakeholders to create the platform. It also outlines a proposed research agenda for future measurement of its value in creating a new learning culture, supporting regional and remote communities, and revitalising frontline services. It is anticipated this research will inform ongoing development of the online platform, and future design education and research programs in K-12 schools in Australia.
Resumo:
This paper outlines the progress by the JoMeC (Journalism, Media & Communication) Network in developing TLO (Threshold Learning Outcome) statements for Bachelor-level university programs in the disciplines of Journalism, Public Relations and Media & Communications Studies. The paper presents the finalised TLO statement for Journalism, and outlines moves to engage discipline-based groups to further develop preliminary TLOs for Public Relations and Media & Communication Studies. The JoMeC Network was formed in 2011, in response to requirements that from 2014 all degrees and qualifications at Australian universities would be able to demonstrate that they comply with the threshold learning standards set by the Australian Qualifications Framework (AQF). The AQF’s threshold standards define the minimum types and levels of knowledge, skills and capabilities that a student must demonstrate in order to graduate. The Tertiary Education Quality and Standards Agency (TEQSA) will use the AQF’s threshold standards as a key tool in recording and assessing the performance of higher educational institutions, and determining whether they should be registered as Australian Higher Education Providers under the Higher Education Standards Framework. The Office of Learning & Teaching (OLT) places the onus on discipline communities to collaborate in order to develop and ‘own’ the threshold learning standards that can be considered the minimum learning outcomes of university-level programs in that field. With the support of an OLT Grant, the JoMeC Network’s prime goal has been to develop three sets of discipline-specific TLOs – one each for the Journalism, Public Relations, and Media & Communications Studies disciplines. This paper describes the processes of research, consultation, drafting and ongoing revision of the TLO for Journalism. It outlines the processes that the JoMeC Network has taken in developing a preliminary TLO draft to initiate discussion of Public Relations and Media & Communication Studies. The JoMeC Network plans to hand management of further development of these TLOs to scholars within the discipline who will engage with academics and other stakeholders to develop statements that the respective disciplines can embrace and ‘own’.
Resumo:
Kenya aims to prepare for both public and private Reduced Emission from Deforestation and Degradation (REDD+) investment flows. This chapter examines how current Kenyan law can be used as a starting point for building a regulatory regime to support public sector finance. For present purposes, ‘public sector finance’ is defined as money flowing from multilateral international institutions and bi-lateral donor funds. Key issues addressed by this chapter • The nature and form of public sector finance for REDD+ in Kenya. • The management and laws relating to public funds in Kenya; • Mechanisms that can be utilised to manage risk associated with REDD+ investments with a focus on Kenyan anti-corruption laws and policies; • The regulatory regime for distributing the benefits from REDD+ investment to relevant forest stakeholders.
Resumo:
Public Space is important to the overall health and wellbeing of children and young people in allowing them to explore their local and wider community, meet up with friends, get some exercise and feel included in the society in which they live. A problem exists in the capacity of modern, urban public space to genuinely accommodate children and young people’s need to experience excitement and fun in what has been termed “unprogrammed space” (Lynch 1977:71), or simply to ‘hang out’ in unstructured social space, with control by civic authorities a key concern. For many children and young people, their experiences of attempting to use public space are sometimes marred by the denial of everyday rights and courtesies, in youth ‘unfriendly’ spaces and this is often the case in shopping centres in Australia as expolored in this paper.
Resumo:
Traditional towns of the Kathmandu Valley boast a fine provision of public spaces in their neighbourhoods. Historically, a hierarchy of public space has been distributed over the entire town with each neighbourhood centered around more or less spacious public squares. However, rapid growth of these towns over the past decades has resulted in haphazard development of new urban areas with little provision of public space. Recent studies indicate that the loss of public space is a major consequence of the uncontrolled urban growth of the Kathmandu Valley and its new neighbourhoods. This paper reviews the current urban growth of the Kathmandu Valley and its impact on the development of public space in new neighbourhoods. The preliminary analysis of the case study of three new neighbourhoods shows that the formation and utilization of neighbourhood public space exhibit fundamental differences from those found in the traditional city cores. The following key issues are identified in this paper: a) Governance and regulations have been a challenge to regulate rapid urban growth; b) The current pattern of neighbourhood formation is found to be different from that of traditional neighbourhoods due to the changes with rapid urban development; c) Public spaces have been compromised in both planned and unplanned new neighbourhoods in terms of their quantity and quality; d) The changing provision of public space has contributed to its changing use and meaning; and e) The changing demographic composition, changing society and life style have had direct impact on the declining use of public space. Moreover, the management of public spaces remains a big challenge due to their changing nature and the changing governance. The current transformation public space does not appear to be conducive, and has led to adversely changing social environment of the new neighbourhoods.
Resumo:
Governments, authorities, and organisations dedicate significant resources to encourage communities to prepare for and respond to natural hazards such as cyclones, earthquakes, floods, and bushfires. However, recent events, media attention, and ongoing academic research continue to highlight cases of non-compliance including swift water rescues. Individuals who fail to comply with instructions issued during natural hazards significantly impede the emergency response because they divert resources to compliance-enforcement and risk the lives of emergency service workers who may be required to assist them. An initial investigation of the field suggests several assumptions or practices that influence emergency management policy, communication strategy, and community behaviours during natural hazards: 1) that community members will comply with instructions issued by governments and agencies that represent the most authoritative voice, 2) that communication campaigns are shaped by intuition rather than evidence-based approaches (Wood et al., 2012), and 3) that emergency communication is linear and directional. This extended abstract represents the first stage of a collaborative research project that integrates industry and cross-disciplinary perspectives to provide evidence-based approaches for emergency and risk communication during the response and recovery phases of a natural hazard. Specifically, this abstract focuses on the approach taken and key elements that will form the development of a typology of compliance-gaining messages during the response phase of natural hazards, which will be the focus of the conference presentation.
Resumo:
In this age of ever-increasing information technology (IT) driven environments, governments/or public sector organisations (PSOs) are expected to demonstrate the business value of the investment in IT and take advantage of the opportunities offered by technological advancements. Strategic alignment (SA) emerged as a mechanism to bridge the gap between business and IT missions, objectives, and plans in order to ensure value optimisation from investment in IT and enhance organisational performance. However, achieving and sustaining SA remains a challenge requiring even more agility nowadays to keep up with turbulent organisational environments. The shared domain knowledge (SDK) between the IT department and other diverse organisational groups is considered as one of the factors influencing the successful implementation of SA. However, SDK in PSOs has received relatively little empirical attention. This paper presents findings from a study which investigated the influence of SDK on SA within organisations in the Australian public sector. The developed research model examined the relationship of SDK between business and IT domains with SA using a survey of 56 public sector professionals and executives. A key research contribution is the empirical demonstration that increasing levels of SDK between IT and business groups leads to increased SA.