304 resultados para Meningococcal infections--Prevention
Resumo:
Although suicide deaths in Australia continue to decline since the peak of 2,720 suicide deaths in 1997, youth suicide and self-harm are a major health issue. In 2006, in the 20 to 24 year age group, suicide accounted for approximately 21% of all male deaths and 14% of all female deaths. There is a lack of solid data on the rates of suicide and self-harm among young people from refugee backgrounds. However, this population faces a significant number of post-resettlement stressors that may add to their vulnerability and increase their risk of suicide and self-harm. The NEXUS program is an innovative strategy developed by the Queensland Program of Assistance to Survivors of Torture and Trauma (QPASTT) that aims to reduce risk factors for suicide and self-harm and to promote protective factors among youth from refugee backgrounds living in Brisbane and Toowoomba. QPASTT is a non-government organisation that provides culturally appropriate support services to refugee and humanitarian entrants to Australia. QPASTT’s primary function is to provide counselling, advocacy support and community development activities for survivors of torture and trauma at an individual, family and community level. Since 2002 the NEXUS program has been developed and implemented by QPASTT. Since then, this multi-component program has been funded by the Commonwealth Department of Health and Ageing through the National Suicide Prevention Strategy (NSPS). NSPS funding of local community suicide prevention activities will contribute to the outcomes specified in the strategic framework: Living is for Everyone (LIFE): A framework for prevention of suicide and self-harm in Australia. The focus of this report is the evaluation of the NEXUS program conducted by QPASTT between August 2007 and May 2009.
Resumo:
This is the protocol for a review and there is no abstract. The objectives are as follows: To assess the effects of education programmes for skin cancer prevention in the general population. Description of the condition Skin cancer is a term that includes both melanoma and keratinocyte cancer. Keratinocyte cancer (also known as nonmelanoma skin cancer) generally refers to basal cell carcinoma (BCC) and squamous cell carcinoma (SCC), although it also includes other rare cutaneous neoplasms (Madan 2010). Skin cancer is the most common cancer in populations of predominantly fair-skinned people (Donaldson 2011; Lomas 2012; Stern 2010), with incidence increasing (Garbe 2009; Leiter 2012). There are variations in annual incidence rates between these populations, with Australia reporting the highest rate of skin cancer in the world (Lomas 2012). In 2012, the estimated age-standardised incidence rate for melanoma was almost 63 per 100,000 people for Australian men, and 40 per 100,000 people for Australian women (AIHW 2012). In Europe, incidence rates range from 10 to 15 per 100,000 people (Garbe 2009; Lasithiotakis 2006), with rates highest amongst men (Stang 2006). In the United States, incidence rates are approximately 18 per 100,000 people (Garbe 2009),with the highest rates reported forwomen (Bradford 2010). Keratinocyte cancer is much more common than melanoma. In 2012, the estimated Australian age-standardised rates for BCCand SCC were 884 and 387 per 100,000 people, respectively (Staples 2006). The cumulative three-year risk of developing a subsequent keratinocyte cancer is 18% for SCC and 44% for BCC (Marcil 2000).
Resumo:
E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.
Resumo:
This study is the first to examine the effectiveness of the Fun FRIENDS programme, a school-based, universal preventive intervention for early childhood anxiety and promotion of resilience delivered by classroom teachers. Participants (N = 488) included children aged 4–7 years attending 1 of 14 Catholic Education schools in Brisbane, Australia. The schools were randomly allocated to one of three groups, the intervention, active comparison and waitlist control group. Parents completed standardized measures of anxiety and behavioural inhibition (BI), resilience, social and emotional functioning and behaviour difficulties in addition to parental stress and anxiety, at pre- and post- and 12-month follow-up. Teachers also completed a parallel measure of social and emotional strength at the three time points. Comparable results were obtained for the intervention and comparison groups; however, the intervention group (IG) achieved greater reductions in BI, child behavioural difficulties and improvements in social and emotional competence. In addition, significant improvements in parenting distress and parent–child interactions were found for the IG, with gains maintained at 12-month follow-up. Teacher reports revealed more significant improvement in social and emotional competence for the IG. Clinical implications of the findings are discussed, along with limitations and directions for future research.
Resumo:
Sexual harassment remains a widespread workplace phenomenon, despite laws that proscribe it. Drawing initially on a typology from the violence prevention literature that conceptualizes prevention and response approaches according to when they occur, the paper synthesizes strategies identified in literature addressing workplace sexual harassment, as well as other workplace injustices or grievances. The paper utilizes this previous research to develop a framework of sexual harassment prevention strategies along two dimensions: functions and timing. The framework offers a research-informed set of organization-wide preventative and remedial approaches, a systemic approach to what is often seen as an individual problem, and a means to better focus interventions that are often disparate and unco-ordinated. The paper also highlights important areas for future research including a stronger focus on longer-term (tertiary) corrective actions.
Resumo:
Objective: The study aimed to examine the difference in response rates between opt-out and opt-in participant recruitment in a population-based study of heavy-vehicle drivers involved in a police-attended crash. Methods: Two approaches to subject recruitment were implemented in two different states over a 14-week period and response rates for the two approaches (opt-out versus opt-in recruitment) were compared. Results: Based on the eligible and contactable drivers, the response rates were 54% for the optout group and 16% for the opt-in group. Conclusions and Implications: The opt-in recruitment strategy (which was a consequence of one jurisdiction’s interpretation of the national Privacy Act at the time) resulted in an insufficient and potentially biased sample for the purposes of conducting research into risk factors for heavy-vehicle crashes. Australia’s national Privacy Act 1988 has had a long history of inconsistent practices by state and territory government departments and ethical review committees. These inconsistencies can have profound effects on the validity of research, as shown through the significantly different response rates we reported in this study. It is hoped that a more unified interpretation of the Privacy Act across the states and territories, as proposed under the soon-to-be released Australian Privacy Principles will reduce the recruitment challenges outlined in this study.
Resumo:
A recent meta-analysis provides evidence supporting the universal application of school-based prevention programs for adolescent depression. The mechanisms underlying such successful interventions, however, are largely unknown. We report on a qualitative analysis of 109 Grade 9 students’ beliefs about what they gained from an evidence-based depression prevention intervention, the Resourceful Adolescent Program (RAP-A). Fifty-four percent of interviewees articulated at least one specific example of program benefit. A thematic analysis of responses revealed two major themes, improved interpersonal relationships and improved self-regulation, both stronger than originally assumed. A more minor theme also emerged—more helpful cognitions. It is postulated that both improved interpersonal relationships and improved self-regulation are likely to enhance one another, and more helpful cognitions may express its contribution through enhanced self-regulation. These findings broaden our understanding of the impact of depression prevention programs, beginning to illuminate how such programs benefit participants.
Resumo:
Background Sexually-transmitted pathogens often have severe reproductive health implications if treatment is delayed or absent, especially in females. The complex processes of disease progression, namely replication and ascension of the infection through the genital tract, span both extracellular and intracellular physiological scales, and in females can vary over the distinct phases of the menstrual cycle. The complexity of these processes, coupled with the common impossibility of obtaining comprehensive and sequential clinical data from individual human patients, makes mathematical and computational modelling valuable tools in developing our understanding of the infection, with a view to identifying new interventions. While many within-host models of sexually-transmitted infections (STIs) are available in existing literature, these models are difficult to deploy in clinical/experimental settings since simulations often require complex computational approaches. Results We present STI-GMaS (Sexually-Transmitted Infections – Graphical Modelling and Simulation), an environment for simulation of STI models, with a view to stimulating the uptake of these models within the laboratory or clinic. The software currently focuses upon the representative case-study of Chlamydia trachomatis, the most common sexually-transmitted bacterial pathogen of humans. Here, we demonstrate the use of a hybrid PDE–cellular automata model for simulation of a hypothetical Chlamydia vaccination, demonstrating the effect of a vaccine-induced antibody in preventing the infection from ascending to above the cervix. This example illustrates the ease with which existing models can be adapted to describe new studies, and its careful parameterisation within STI-GMaS facilitates future tuning to experimental data as they arise. Conclusions STI-GMaS represents the first software designed explicitly for in-silico simulation of STI models by non-theoreticians, thus presenting a novel route to bridging the gap between computational and clinical/experimental disciplines. With the propensity for model reuse and extension, there is much scope within STI-GMaS to allow clinical and experimental studies to inform model inputs and drive future model development. Many of the modelling paradigms and software design principles deployed to date transfer readily to other STIs, both bacterial and viral; forthcoming releases of STI-GMaS will extend the software to incorporate a more diverse range of infections.
Resumo:
This article explores the relationship between the Responsibility to Protect (R2P) and the pursuit of the so-called ‘Women, Peace and Security’ (WPS) agenda at the UN. We ask whether the two agendas should continue to be pursued separately or whether each can make a useful contribution to the other. We argue that while the history of R2P has not included language that deliberately evokes the protection of women and the promotion of gender in preventing genocide and mass atrocities, this does not preclude the R2P and WPS agendas becoming mutually reinforcing. The article identifies cross-cutting areas where the two agendas may be leveraged for the UN and member states to address the concerns of women as both actors in need of protection and active agents in preventing and responding to genocide and mass atrocities, namely in the areas of early warning.
Resumo:
Cheating detection in linear secret sharing is considered. The model of cheating extends the Tompa-Woll attack and includes cheating during multiple (unsuccessful) recovery of the secret. It is shown that shares in most linear schemes can be split into subshares. Subshares can be used by participants to trade perfectness of the scheme with cheating prevention. Evaluation of cheating prevention is given in the context of different strategies applied by cheaters.
Resumo:
The work investigates cheating prevention in secret sharing. It is argued that cheating is immune against cheating if the cheaters gain no advantage over honest participants by submitting invalid shares to the combiner. This work addresses the case when shares and the secret are taken from GF(pt). Two models are considered. The first one examines the case when cheaters consistently submit always invalid shares. The second modeldeal s with cheaters who submit a mixture of valid and invalid shares. For these two models, cheating immunity is defined, properties of cheating immune secret sharing are investigated and their constructions are given.
Resumo:
An increasing range of services are now offered via online applications and e-commerce websites. However, problems with online services still occur at times, even for the best service providers due to the technical failures, informational failures, or lack of required website functionalities. Also, the widespread and increasing implementation of web services means that service failures are both more likely to occur, and more likely to have serious consequences. In this paper we first develop a digital service value chain framework based on existing service delivery models adapted for digital services. We then review current literature on service failure prevention, and provide a typology of technolo- gies and approaches that can be used to prevent failures of different types (functional, informational, system), that can occur at different stages in the web service delivery. This makes a contribution to theory by relating specific technologies and technological approaches to the point in the value chain framework where they will have the maximum impact. Our typology can also be used to guide the planning, justification and design of robust, reliable web services.
Resumo:
Background. Interventions that prevent healthcare-associated infection should lead to fewer deaths and shorter hospital stays. Cleaning hands (with soap or alcohol) is an effective way to prevent the transmission of organisms, but rates of compliance with hand hygiene are sometimes disappointingly low. The National Hand Hygiene Initiative in Australia aimed to improve hand hygiene compliance among healthcare workers, with the goal of reducing rates of healthcare-associated infection. Methods. We examined whether the introduction of the National Hand Hygiene Initiative was associated with a change in infection rates. Monthly infection rates for healthcare-associated Staphylococcus aureus bloodstream infections were examined in 38 Australian hospitals across 6 states. We used Poisson regression and examined 12 possible patterns of change, with the best fitting pattern chosen using the Akaike information criterion. Monthly bed-days were included to control for increased hospital use over time. Results. The National Hand Hygiene Initiative was associated with a reduction in infection rates in 4 of the 6 states studied. Two states showed an immediate reduction in rates of 17% and 28%, 2 states showed a linear decrease in rates of 8% and 11% per year, and 2 showed no change in infection rates. Conclusions. The intervention was associated with reduced infection rates in most states. The failure in 2 states may have been because those states already had effective initiatives before the national initiative’s introduction or because infection rates were already low and could not be further reduced.
Resumo:
Background Detection of outbreaks is an important part of disease surveillance. Although many algorithms have been designed for detecting outbreaks, few have been specifically assessed against diseases that have distinct seasonal incidence patterns, such as those caused by vector-borne pathogens. Methods We applied five previously reported outbreak detection algorithms to Ross River virus (RRV) disease data (1991-2007) for the four local government areas (LGAs) of Brisbane, Emerald, Redland and Townsville in Queensland, Australia. The methods used were the Early Aberration Reporting System (EARS) C1, C2 and C3 methods, negative binomial cusum (NBC), historical limits method (HLM), Poisson outbreak detection (POD) method and the purely temporal SaTScan analysis. Seasonally-adjusted variants of the NBC and SaTScan methods were developed. Some of the algorithms were applied using a range of parameter values, resulting in 17 variants of the five algorithms. Results The 9,188 RRV disease notifications that occurred in the four selected regions over the study period showed marked seasonality, which adversely affected the performance of some of the outbreak detection algorithms. Most of the methods examined were able to detect the same major events. The exception was the seasonally-adjusted NBC methods that detected an excess of short signals. The NBC, POD and temporal SaTScan algorithms were the only methods that consistently had high true positive rates and low false positive and false negative rates across the four study areas. The timeliness of outbreak signals generated by each method was also compared but there was no consistency across outbreaks and LGAs. Conclusions This study has highlighted several issues associated with applying outbreak detection algorithms to seasonal disease data. In lieu of a true gold standard, a quantitative comparison is difficult and caution should be taken when interpreting the true positives, false positives, sensitivity and specificity.