557 resultados para goals
Resumo:
Security and privacy in electronic health record systems have been hindering the growth of e-health systems since their emergence. The development of policies that satisfy the security and privacy requirements of different stakeholders in healthcare has proven to be difficult. But, these requirements have to be met if the systems developed are to succeed in achieving their intended goals. Access control is a fundamental security barrier for securing data in healthcare information systems. In this paper we present an access control model for electronic health records. We address patient privacy requirements, confidentiality of private information and the need for flexible access for health professionals for electronic health records. We carefully combine three existing access control models and present a novel access control model for EHRs which satisfies requirements of electronic health records.
Resumo:
Zero energy buildings (ZEB) and zero energy homes (ZEH) are a current hot topic globally for policy makers (what are the benefits and costs), designers (how do we design them), the construction industry (can we build them), marketing (will consumers buy them) and researchers (do they work and what are the implications). This paper presents initial findings from actual measured data from a 9 star (as built), off-ground detached family home constructed in south-east Queensland in 2008. The integrated systems approach to the design of the house is analysed in each of its three main goals: maximising the thermal performance of the building envelope, minimising energy demand whilst maintaining energy service levels, and implementing a multi-pronged low carbon approach to energy supply. The performance outcomes of each of these stages are evaluated against definitions of Net Zero Carbon / Net Zero Emissions (Site and Source) and Net Zero Energy (onsite generation vs primary energy imports). The paper will conclude with a summary of the multiple benefits of combining very high efficiency building envelopes with diverse energy management strategies: a robustness, resilience, affordability and autonomy not generally seen in housing.
Resumo:
Subtropical south-east Queensland’s expanding population is expected to lead to a demand for an additional 754,000 dwellings by 2031. A legacy of poor housing design, minimal building regulations, an absence of building performance evaluation and various social and market factors has lead to a high and growing penetration of, and reliance on, air conditioners to provide comfort in this relatively benign climate. This reliance impacts on policy goals to adapt to and mitigate against global warming, electricity infrastructure investment and household resilience. Based on the concept of bioclimatic design, this field study scrutinizes eight non-air conditioned homes to develop a deeper understanding of the role of contemporary passive solar architecture in the delivery of thermally comfortable and resilient homes in the subtropics. These homes were found to provide inhabitants with an acceptable level of thermal comfort (18-28oC) for 77 – 97% of the year. Family expectations and experiences of comfort, and the various design strategies utilized were compared against the measured performance outcomes. This comparison revealed issues that limited quantification and implementation of design intent and highlighted factors that constrained system optimisation.
Resumo:
During the 1980s, terms such as interagency or multi-agency cooperation, collaboration, coordination, and interaction have became permanent features of both crime prevention rhetoric and government crime policy. The concept of having the government, local authorities, and the community working in partnership has characterized both left and right politics for over a decade. The U.S. National Advisory Commission on Criminal Justice Standards and Goals in the U.S.. Circulars 8/84 and 44/90 released by the U.K. Home Office, and the British Morgan Report-coupled with the launch of government strategies in France, the Netherlands, England and Wales, Australia, and, more recently, in Belgium, New Zealand, and Canada-have all emphasized the importance of agencies working together to prevent or reduce crime. This paper draws upon recent Australian research and critically analyzes multi-agency crime prevention. It suggests that agency conflicts and power struggles may be exacerbated by neo-liberal economic theory, by the politics of crime prevention management, and by policies that aim to combine situational and social prevention endeavors. Furthermore, it concludes that indigenous peoples are excluded by crime prevention strategies that fail to define and interpret crime and its prevention in culturally appropriate ways.
Resumo:
Client-side project manager face challenges in motivating project organisations to pursue exceptional design and construction performance. One approach to improving the motivation of project organisations is by offering a financial incentive reward for the achievement of voluntary performance standards above the minimum required standard. However, little investigation has been undertaken into the features of a successful incentive system as a part of an overall procurement strategy. In response to a lack of information available to client-side project managers tasked with the initial design of an incentive system, the paper explores motivation undera successful incentive and identifies key learnings for client-side project managers to consider when designing incentives. Our findings are based on the results of a large Australian case study which is interpreted against a conceptual framework based on both economic and psychological perspectives of motivation. The results suggest the motivation towards incentive goals is influenced by the value the project organisations place on the incentive reward as a commercial opportunity to increase their profit margins. However, perhaps more important are the relationship management processes that promote commitment to the project; and pride in the achievement of project goals. In the case study, these processes intensified the direct motivational effect of the incentive reward on offer. The findings also highlight the importance of ensuring that incentive goals and performance measurement processes remain relevant to the organisation throughout a project to continuously encourage motivation under changing project conditions.
Resumo:
This paper demonstrates an experimental study that examines the accuracy of various information retrieval techniques for Web service discovery. The main goal of this research is to evaluate algorithms for semantic web service discovery. The evaluation is comprehensively benchmarked using more than 1,700 real-world WSDL documents from INEX 2010 Web Service Discovery Track dataset. For automatic search, we successfully use Latent Semantic Analysis and BM25 to perform Web service discovery. Moreover, we provide linking analysis which automatically links possible atomic Web services to meet the complex requirements of users. Our fusion engine recommends a final result to users. Our experiments show that linking analysis can improve the overall performance of Web service discovery. We also find that keyword-based search can quickly return results but it has limitation of understanding users’ goals.
Resumo:
By 2020 Australia‟s National Digital Economy Strategy aims to increase household online participation and engage 12 per cent of all employees in teleworking arrangements. Achieving these goals is generally perceived as positive due to the reduced impact on the natural environment from less use of transport. However, this also will enable greater flexibility as to where people live and thus will impact upon the maintenance and formation of communities and on property use. This paper commences by clarifying what is Australia‟s internet economy before highlighting the impact of the internet on community formation and maintenance. The paper concludes by identifying what the achievement of these goals will mean for property use in the future.
Resumo:
Academically gifted students are recognised as possessing considerable achievement potential. Yet many gifted students fail to perform at a level commensurate with their ability. This phenomenon is known as underachievement and may have far-reaching personal and social costs. Underachievement is particularly prevalent during early adolescence, between the ages of 10 to 14 years, when declining levels of academic achievement are often apparent. Grouping for instructional purposes is advocated as a means of reducing underachievement for gifted students by providing opportunities for like-minded and like-ability individuals to learn together. Despite this, some gifted students continue to underachieve. For some, underachievement appears to be a deliberate choice making them a population of learners at-risk. This multiple case study examines the relationship between self-presentation and underachievement as experienced by three gifted adolescents. It reveals how students perceived and explained the discrepancy between their ability and performance. Further, the study identifies those self-presentation strategies adopted in response to underachievement. Findings may assist parents and educators to provide greater support for gifted adolescents.
Resumo:
Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.
Resumo:
Having a good automatic anomalous human behaviour detection is one of the goals of smart surveillance systems’ domain of research. The automatic detection addresses several human factor issues underlying the existing surveillance systems. To create such a detection system, contextual information needs to be considered. This is because context is required in order to correctly understand human behaviour. Unfortunately, the use of contextual information is still limited in the automatic anomalous human behaviour detection approaches. This paper proposes a context space model which has two benefits: (a) It provides guidelines for the system designers to select information which can be used to describe context; (b)It enables a system to distinguish between different contexts. A comparative analysis is conducted between a context-based system which employs the proposed context space model and a system which is implemented based on one of the existing approaches. The comparison is applied on a scenario constructed using video clips from CAVIAR dataset. The results show that the context-based system outperforms the other system. This is because the context space model allows the system to considering knowledge learned from the relevant context only.
Resumo:
It appears that few of the students holding ‘socially idealistic’ goals upon entering law school actually maintain these upon graduation. The critical legal narrative, which explains and seeks to act upon this shift in the graduate’s ‘legal identity’, posits that these ideals are repressed through power relations that create passive receptacles into which professional ideologies can be deposited, in the interests of those advantaged by the social and legal status quo. Using the work of Michel Foucault, this paper unpacks the assumptions underpinning this narrative, particularly its arguments about ideology, power, and the subject. In doing so, it will argue this narrative provides an untenable basis for political action within legal education. By interrogating this narrative, this paper provides a new way of understanding the construction of the legal identity through legal education, and a new basis for political action within law school.
Resumo:
“Spin” borrows idioms and metaphors from sports commentary and squeezes them into a single emotional rollercoaster. Accompanied by a driving soundtrack, text appears and disappears one word at a time. As the work progresses, multiple words fade in and out at the same time, filling the screen and testing our ability to read and assimilate these well-worn phrases. On the one hand, the work mimes some of what we enjoy about sport – its ability to take us to another place, to incite passion and emotion, and to enable us to share in common experiences, goals and desires. On the other hand, it plays up the hyperbolic language often associated with sports broadcasting. The very language that helps take us to another place, incite passion and make us feel part of something bigger than ourselves, is pushed to its extreme and starts to burst at the seams. This work was commissioned for “Kick Off: contemporary video art program” at Metricon Stadium, Gold Coast, and supported by Project Services, Department of Public Works, Queensland Government.
Resumo:
Most existing requirements engineering approaches focus on the modelling and specification of the IT artefacts ignoring the environment where the application is deployed. Although some requirements engineering approaches consider the stakeholder’s goals, they still focus on the IT artefacts’ specification. However, IT artefacts are embedded in a dynamic organisational environment and their design and specification cannot be separated from the environment’s constant evolution. Therefore, during the initial stages of a requirements engineering process it is advantageous to consider the integration of IT design with organisational design. We proposed the ADMITO (Analysis, Design and Management of IT and Organisations) approach to represent the dynamic relations between social and material entities, where the latter are divided into technological and organisational entities. In this paper we show how by using ADMITO in a concrete case, the Queensland Health Payroll (QHP) case, it is possible to have an integrated representation of IT and organisational design supporting organisational change and IT requirements specification.
Resumo:
The National Road Safety Strategy 2011-2020 outlines plans to reduce the burden of road trauma via improvements and interventions relating to safe roads, safe speeds, safe vehicles, and safe people. It also highlights that a key aspect in achieving these goals is the availability of comprehensive data on the issue. The use of data is essential so that more in-depth epidemiologic studies of risk can be conducted as well as to allow effective evaluation of road safety interventions and programs. Before utilising data to evaluate the efficacy of prevention programs it is important for a systematic evaluation of the quality of underlying data sources to be undertaken to ensure any trends which are identified reflect true estimates rather than spurious data effects. However, there has been little scientific work specifically focused on establishing core data quality characteristics pertinent to the road safety field and limited work undertaken to develop methods for evaluating data sources according to these core characteristics. There are a variety of data sources in which traffic-related incidents and resulting injuries are recorded, which are collected for a variety of defined purposes. These include police reports, transport safety databases, emergency department data, hospital morbidity data and mortality data to name a few. However, as these data are collected for specific purposes, each of these data sources suffers from some limitations when seeking to gain a complete picture of the problem. Limitations of current data sources include: delays in data being available, lack of accurate and/or specific location information, and an underreporting of crashes involving particular road user groups such as cyclists. This paper proposes core data quality characteristics that could be used to systematically assess road crash data sources to provide a standardised approach for evaluating data quality in the road safety field. The potential for data linkage to qualitatively and quantitatively improve the quality and comprehensiveness of road crash data is also discussed.
Resumo:
Compound pelvic fractures are deemed to be one of the most severe orthopaedic injuries with an extremely high morbidity and mortality. After the initial resuscitation phase the prevention of pelvic sepsis is one of the main treatment goals for patients with an open pelvic fracture. If there is a suspicion of a rectal injury or if the wounds are in the perineal area, The Princess Alexandra Hospital's management plan includes early faecal diversion combined with vigorous soft tissue debridement, VAC(®) therapy and (if indicated) external fixation of the pelvic fracture. We present our flowchart for the treatment of trauma patients with compound pelvic fractures illustrated by a case report describing a 32 year old patient who sustained an open pelvic ring injury in a workplace accident. The aim of this paper is to underline the importance of a safe, straightforward approach to compound pelvic fractures.