426 resultados para PERSONAL IDENTITY


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia has new national legislation - the Personal Property Securities Act 2009 (Cth) and the Personal Property Securities Regulations 2010 – which commenced operation on 30 January 2012. The policy objectives of the new legislation are to increase certainty and consistency and to reduce complexity and cost. To achieve this, the legislation treats like transactions alike, by focusing on substance over form, and so removes distinctions between security interests which have been based on their structure. Differences based on the location or nature of the secured property and the debtor’s legal form, as an individual or company, have also disappeared. We now have one single national scheme and one national electronic registration system for all security interests throughout Australia. The Act applies to security interests in tangible and intangible personal property, including those based on some form of title retention which are not security interests under the general law. This legislation rationalises previous laws and bring about substantial changes to this area of law. This paper seeks to explain the principal changes and their implications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: Effective management of chronic diseases such as prostate cancer is important. Research suggests a tendency to use self-care treatment options such as over-the-counter (OTC) complementary medications among prostate cancer patients. The current trend in patient-driven recording of health data in an online Personal Health Record (PHR) presents an opportunity to develop new data-driven approaches for improving prostate cancer patient care. However, the ability of current online solutions to share patients' data for better decision support is limited. An informatics approach may improve online sharing of self-care interventions among these patients. It can also provide better evidence to support decisions made during their self-managed care. AIMS: To identify requirements for an online system and describe a new case-based reasoning (CBR) method for improving self-care of advanced prostate cancer patients in an online PHR environment. METHOD: A non-identifying online survey was conducted to understand self-care patterns among prostate cancer patients and to identify requirements for an online information system. The pilot study was carried out between August 2010 and December 2010. A case-base of 52 patients was developed. RESULTS: The data analysis showed self-care patterns among the prostate cancer patients. Selenium (55%) was the common complementary supplement used by the patients. Paracetamol (about 45%) was the commonly used OTC by the patients. CONCLUSION: The results of this study specified requirements for an online case-based reasoning information system. The outcomes of this study are being incorporated in design of the proposed Artificial Intelligence (Al) driven patient journey browser system. A basic version of the proposed system is currently being considered for implementation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A review of the 6th APT focusing on the work and performance of Rohan Wealleans

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Decades of research has now produced a rich description of the destruction child sexual assault (CSA) can cause in an individual’s life. Post-Traumatic Stress Disorder (PTSD), Dissociative Identity Disorder, Borderline Personality Disorder, depression, anxiety, Panic Disorder, intimacy issues, substance abuse, self-harm, and suicidal ideation and attempts, are some of the negative outcomes that have been attributed to this type of traumatic experience. Psychology's tendency to dwell within a pathological paradigm, along with popular media who espouse a similar rhetoric, would lead to the belief that once exposed to CSA, an individual is forever at the mercy of dealing with a massive array of accompanying negative effects. While the possibility of these outcomes in those who have experienced CSA is not at all denied, it is also timely to consider an alternative paradigm that up until now has received a paucity of attention in the sexual assault literature. That is to say, not only do people have the ability to work through the painful and personal impacts of CSA, but for some people the process of recovery may provide a catalyst for positive life changes that have been termed post-traumatic growth (Tedeschi & Calhoun, 1995). To begin with in this chapter, the negative sequale’ of childhood sexual assault it discussed initially. Inherent to this discussion are questions of measurement and definitions of sexual assault. The chapter highlights ways in which the term CSA has been defined and hence operationalised in research, and the myriad problems, confusions, and inconclusive findings that have plagued the sexual assault literature. Following this is a review of the sparse literature that has conceptualised CSA from a more salutogenic (Antonovsky, 1979) theoretical orientation. It is argued that a salutogenic approach to intervention and to research in this area, provides a more useful way of promoting healing and the gaining of wisdom, but importantly does not negate the very real distress that may accompany growth. This chapter will then present a case study to elucidate the theoretical and empirical literature discussed using the words of a survivor. Finally, the chapter concludes with implications for therapeutic practice, which includes some practical ways in which to promote adaptation to life within the context of having survived this insidious crime.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Previous studies have enabled exact prediction of probabilities of identity-by-descent (IBD) in randommating populations for a few loci (up to four or so), with extension to more using approximate regression methods. Here we present a precise predictor of multiple-locus IBD using simple formulas based on exact results for two loci. In particular, the probability of non-IBD X ABC at each of ordered loci A, B, and C can be well approximated by XABC = XABXBC/XB and generalizes to X123. . .k = X12X23. . .Xk-1,k/ Xk-2, where X is the probability of non-IBD at each locus. Predictions from this chain rule are very precise with population bottlenecks and migration, but are rather poorer in the presence of mutation. From these coefficients, the probabilities of multilocus IBD and non-IBD can also be computed for genomic regions as functions of population size, time, and map distances. An approximate but simple recurrence formula is also developed, which generally is less accurate than the chain rule but is more robust with mutation. Used together with the chain rule it leads to explicit equations for non-IBD in a region. The results can be applied to detection of quantitative trait loci (QTL) by computing the probability of IBD at candidate loci in terms of identity-by-state at neighboring markers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: As an increasing number of Taiwanese people live out the final stages of their lives with chronic and complex conditions. Care decisions at the end of life can also be complex, overwhelming and stressful for an individual, family and health professionals. Understanding individuals’ wishes for end-of-life care and factors which influence individuals' decisions is important so that the provision of quality end-of-life care for all can be promoted and ensured.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research examines the effects of expectation (perceived attractiveness) on satisfaction, place identity, and place dependence. Place identity and place dependence are viewed as relational components of choice and relate to deeper needs. This study proposes that these two relational components depend on transactional expectations, which are emergent and determined by past experiences and visitor goals. In a theoretically elaborated and tested Structural Equation Model (SEM) this study assumes that these relationships vary according to intentions to return. The study addresses the conditions under which loyalty intentions influence the deeper place attachments (place identity and place dependence) that visitors associate with attractive cultural and natural destinations. The model is tested on a sample of 504 international tourists visiting Tanzania during fall 2010, and explains 59% of variance in the predicted dependent variables. The results are linked to a discussion on loyalty programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Hare v Mount Isa City Council [2009] QDC 39 McGill DCJ examined the scope of s 27(1) of the Personal Injuries Proceedings Act 2002 (Qld) and its interpretation by the Court of Appeal in Haug v Jupiters Ltd [2008] 1 Qd R 276. The judge expressed a number of concerns about the Act and the Regulation made under it, that are worthy of consideration by the Legislature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Motivated by growing considerations of the scale, severity and risks associated with human exposure to indoor particulate matter, this work reviewed existing literature to: (i) identify state-of-the-art experimental techniques used for personal exposure assessment; (ii) compare exposure levels reported for domestic/school settings in different countries (excluding exposure to environmental tobacco smoke and particulate matter from biomass cooking in developing countries); (iii) assess the contribution of outdoor background vs indoor sources to personal exposure; and (iv) examine scientific understanding of the risks posed by personal exposure to indoor aerosols. Limited studies assessing integrated daily residential exposure to just one particle size fraction, ultrafine particles, show that the contribution of indoor sources ranged from 19-76%. This indicates a strong dependence on resident activities, source events and site specificity, and highlights the importance of indoor sources for total personal exposure. Further, it was assessed that 10-30% of the total burden-of-disease from particulate matter exposure was due to indoor generated particles, signifying that indoor environments are likely to be a dominant environmental factor affecting human health. However, due to challenges associated with conducting epidemiological assessments, the role of indoor generated particles has not been fully acknowledged, and improved exposure/risk assessment methods are still needed, together with a serious focus on exposure control.