493 resultados para economic security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Advances in Information and Communication Technologies have the potential to improve many facets of modern healthcare service delivery. The implementation of electronic health records systems is a critical part of an eHealth system. Despite the potential gains, there are several obstacles that limit the wider development of electronic health record systems. Among these are the perceived threats to the security and privacy of patients’ health data, and a widely held belief that these cannot be adequately addressed. We hypothesise that the major concerns regarding eHealth security and privacy cannot be overcome through the implementation of technology alone. Human dimensions must be considered when analysing the provision of the three fundamental information security goals: confidentiality, integrity and availability. A sociotechnical analysis to establish the information security and privacy requirements when designing and developing a given eHealth system is important and timely. A framework that accommodates consideration of the legislative requirements and human perspectives in addition to the technological measures is useful in developing a measurable and accountable eHealth system. Successful implementation of this approach would enable the possibilities, practicalities and sustainabilities of proposed eHealth systems to be realised.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This book explores the impacts of global economic, political and cultural shifts on various international legal frameworks and legal norms. The economic growth of states throughout Asia, South and Central America and Africa is having a profound effect on the dynamics of international relations, with a resulting impact on the operation and development of international law. This book examines the influence of emerging economies on international legal rules, institutions and processes. It describes recent and predicted changes in economic, political and cultural powers, flowing from the growth of emerging economies such as China, India, Brazil, South Africa and Russia, and analyses the influence of these changes on various legal frameworks and norms. Expert contributors drawn from a variety of fields, including international law, politics, environmental law, human rights, economics and finance, provide a broad analysis of the nature of the shifting global dynamic in its historical and contemporary contexts, and a range of perspectives on the impact of these changes as they relate to specific regimes and issues, including climate change regulation, collective security, indigenous rights, the rights of women and girls, environmental protection and foreign aid and development. The book provides a fresh and comprehensive analysis of an issue with extensive implications for international law and politics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a comprehensive formal security framework for key derivation functions (KDF). The major security goal for a KDF is to produce cryptographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context Information Attack (CCM) and Adaptive Chosen Public Inputs Attack(CPM); and another security model, previously defined by Krawczyk [6], which we refer to as Adaptive Chosen Context Information Attack(CCS). These security models are simulated using an indistinguisibility game. In addition we prove the relationships between these five security models and analyse KDFs using the framework (in the random oracle model).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The current global economic instability and the vulnerability of small island nations are providing the impetus for greater integration between the countries of the South Pacific region. This exercise is critical for their survival in today’s turbulent economic environment. Past efforts of regional integration in the South Pacific have not been very successful. Reasons attributed to this outcome include issues related to damage of sovereignty, and lack of a shared integration infrastructure. Today, the IT resources with collaborative capacities provide the opportunity to develop a shared IT infrastructure to facilitate integration in the South Pacific. In an attempt to develop a model of regional integration with an IT-backed infrastructure, we identify and report on the antecedents of the current stage of regional integration, and the stakeholders’ perceived benefits of an IT resources backed regional integration in the South Pacific. Employing a case study based approach, the study finds that while most stakeholders were positive about the potential of IT-backed regional integration, significant challenges exist that hinder the realisation of this model. The study finds that facilitating IT-backed regional integration requires enabling IT infrastructure, equitable IT development in the region, greater awareness on the potential of the modern IT resources, market liberalisation of the information and telecommunications sector and greater political support for IT initiatives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Food Sovereignty (food freedom) is about empowering people to develop their own local food system. Food Sovereignty challenges designers to enable people to innovate the local food system, rather than having a food system which is dictated by corporate interests and failed business ethics. Communities are realising the potential for design to assist in the innovation process, and add strategic value to potentially localise the food system. Design Led Innovation (DLI) offers a strategic framework to address large-scale cultural, systemic and economic changes. The DLI approach empowers communities to take organised action to achieve a healthy, prosperous and happy way of life. DLI can assist with business models in the business world and it is evident this approach can assist with creating social change too. This paper presents on an emerging research agenda aimed to assist designer’s focus from individuals and systems to communities and urban problems. This paper also presents the research proposition that DLI and service design coupled with social entrepreneurial ventures such as local food projects and creative community inventions, have the potential to enable social innovation for healthy and happy communities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Postnatal depression (PND) is a significant global health issue, which not only impacts maternal wellbeing, but also infant development and family structures. Mental health disorders represent approximately 14% of global burden of disease and disability, including low and middle-income countries (LMIC), and PND has direct relevance to the Millennium Development Goals of reducing child mortality, improving maternal health, and creating global partnerships (United Nations, 2012; Guiseppe, Becker & Farmer, 2011). Emerging evidence suggests that PND in LMIC is similar to, or higher than in high-income countries (HIC), however, less than 10% of LMIC have prevalence data available (Fisher, Cabral de Mello, & Izutsu 2009; Lund et al., 2011). Whilst a small number of studies on maternal mental disorders have been published in Vietnam, only one specifically focuses on PND in a hospital-based sample. Also, community based mental health studies and information on mental health in rural areas of Vietnam is still scarce. The purpose of this study was to determine the prevalence of PND, and its associated social determinants in postnatal women in Thua Thien Hue Province, Central Vietnam. In order to identify social determinants relevant to the Central Vietnamese context, two qualitative studies and one community survey were undertaken. Associations between maternal mental health and infant health outcomes were also explored. The study was comprised of three phases. Firstly, iterative, qualitative interviews with Vietnamese health professionals (n = 17) and postpartum women (n = 15) were conducted and analysed using Kleinman's theory of explanatory models to identify narratives surrounding PND in the Vietnamese context (Kleinman, 1978). Secondly, a participatory concept mapping exercise was undertaken with two groups of health professionals (n = 12) to explore perceived risk and protective factors for postnatal mental health. Qualitative phases of the research elucidated narratives surrounding maternal mental health in the Vietnamese context such as son preference, use of traditional medicines, and the popularity of confinement practices such as having one to three months of complete rest. The qualitative research also revealed the construct of depression was not widely recognised. Rather, postpartum changes in mood were conceptualised as a loss of 'vital strength' following childbirth or 'disappointment'. Most women managed postpartum changes in mood within the family although some sought help from traditional medicine practitioners or biomedical doctors. Thirdly, a cross-sectional study of twelve randomly selected communes (six urban, six rural) in Thua Thien Hue Province was then conducted. Overall, 465 women with infants between 4 weeks and six months old participated, and 431 questionnaires were analysed. Women from urban (n = 216) and rural (n = 215) areas participated. All eligible women completed a structured interview about their health, basic demographics, and social circumstances. Maternal depression was measured using the Edinburgh Postnatal Depression Scale (EPDS) as a continuous variable. Multivariate generalised linear regression was conducted using PASW Statistics version 18.0 (2009). When using the conventional EPDS threshold for probable depression (EPDS score ~ 13) 18.1% (n = 78) of women were depressed (Gibson, McKenzie-McHarg, Shakespeare, Price & Gray, 2009). Interestingly, 20.4% of urban women (n = 44) had EPDS scores~ 13, which was a higher proportion than rural women, where 15.8% (n = 34) had EPDS scores ~ 13, although this difference was not statistically significant: t(429) = -0.689, p = 0.491. Whilst qualitative narratives identified infant gender and family composition, and traditional confinement practices as relevant to postnatal mood, these were not statistically significant in multivariate analysis. Rather, poverty, food security, being frightened of your husband or family members, experiences of intimate partner violence and breastfeeding difficulties had strong statistical associations. PND was also associated with having an infant with diarrhoea in the past two weeks, but not infant malnutrition or acute respiratory infections. This study is the first to explore maternal mental health in Central Vietnam, and provides further evidence that PND is a universally experienced phenomenon. The independent social risk factors of depressive symptoms identified such as poverty, food insecurity, experiences of violence and powerlessness, and relationship adversity points to women in a context of social suffering which is relevant throughout the world (Kleinman, Das & Lock, 1997). The culturally specific risk factors explored such as infant gender were not statistically significant when included in a multivariable model. However, they feature prominently in qualitative narratives surrounding PND in Vietnam, both in this study and previous literature. It appears that whilst infant gender may not be associated with PND per se, the reactions of close relatives to the gender of the baby can adversely affect maternal wellbeing. This study used a community based participatory research approach (CBPR) (Israel.2005). This approach encourages the knowledge produced to be used for public health interventions and workforce training in the community in which the research was conducted, and such work has commenced. These results suggest that packages of interventions for LMIC devised to address maternal mental health and infant wellbeing could be applied in Central Vietnam. Such interventions could include training lay workers to follow up postpartum women, and incorporating mental health screening and referral into primary maternal and child health care (Pate! et al., 2011; Rahman, Malik, Sikander & Roberts, 2008). Addressing the underlying social determinants of PND through poverty reduction and violence elimination programs is also recommended.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The research addresses how an understanding of the fundamentals of economics will better inform general journalists who report on issues or events affecting rural and regional Australia. The research draws on practice-based experience of the author, formal economics studies, interviews with news editors from Australian television news organisations, and interviews from leading economists. A guidebook has also been written to help journalists apply economic theories to their reporting. The guidebook enables reporters to think strategically and consider the 'big picture' when they inform society about policies, commodity trade, the environment, or any issues involving rural and regional Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Whether by using electronic banking, by using credit cards, or by synchronising a mobile telephone via Bluetooth to an in-car system, humans are a critical part in many cryptographic protocols daily. We reduced the gap that exists between the theory and the reality of the security of these cryptographic protocols involving humans, by creating tools and techniques for proofs and implementations of human-followable security. After three human research studies, we present a model for capturing human recognition; we provide a tool for generating values called Computer-HUman Recognisable Nonces (CHURNs); and we provide a model for capturing human perceptible freshness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim Worldwide obesity levels have increased unprecedentedly over the past couple of decades. Although the prevalence, trends and associated socio-economic factors of the condition have been extensively reported in Western populations, less is known regarding South Asian populations. Methods A review of articles using Medline with combinations of the MeSH terms: 'Obesity', 'Overweight' and 'Abdominal Obesity' limiting to epidemiology and South Asian countries. Results Despite methodological heterogeneity and variation according to country, area of residence and gender , the most recent nationally representative and large regional data demonstrates that without any doubt there is a epidemic of obesity, overweight and abdominal obesity in South Asian countries. Prevalence estimates of overweight and obesity (based on Asian cut-offs: overweight ≥ 23 kg/m(2), obesity ≥ 25 kg/m(2)) ranged from 3.5% in rural Bangladesh to over 65% in the Maldives. Abdominal obesity was more prevalent than general obesity in both sexes in this ethnic group. Countries with the lowest prevalence had the highest upward trend of obesity. Socio-economic factors associated with greater obesity in the region included female gender, middle age, urban residence, higher educational and economic status. Conclusion South Asia is significantly affected by the obesity epidemic. Collaborative public health interventions to reverse these trends need to be mindful of many socio-economic constraints in order to provide long-term solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of the current study was to develop a measurement of information security culture in developing countries such as Saudi Arabia. In order to achieve this goal, the study commenced with a comprehensive review of the literature, the outcome being the development of a conceptual model as a reference base. The literature review revealed a lack of academic and professional research into information security culture in developing countries and more specifically in Saudi Arabia. Given the increasing importance and significant investment developing countries are making in information technology, there is a clear need to investigate information security culture from developing countries perspective such as Saudi Arabia. Furthermore, our analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. Our research aims to fill this gap by developing and validating a measurement model of information security culture, as well as developing initial understanding of factors that influence security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. In the qualitative phase, eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness, security compliance and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, policy maintenance, training and ethical conduct policies. These factors were confirmed by the literature review as being critical and important for the creation of security culture and formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model through Exploratory Factor Analysis (EFA), followed by Confirmatory Factor Analysis (CFA.) In addition, using Structural Equation Modelling (SEM) we were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture. The current study contributes to the existing body of knowledge in two major ways: firstly, it develops an information security culture measurement model; secondly, it presents empirical evidence for the nomological validity for the security culture measurement model and discovery of factors that influence information security culture. The current study also indicates possible future related research needs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study focuses on the managerial question “should social enterprises become more entrepreneurial?” It adapts the Covin and Slevin (1989) entrepreneurial orientation scale to measure the adoption of entrepreneurship by a social enterprise, and develops a scale that combines a Vincentian based focus to serve the poor with a propensity to take a more entrepreneurial approach toward business as a measure of a social value orientation (SVO).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background & Aims: Access to sufficient amounts of safe and culturally-acceptable foods is a fundamental human right. Food security exists when all people, at all times, have physical, social, and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Food insecurity therefore occurs when the availability or access to sufficient amounts of nutritionally-adequate, culturally-appropriate and safe foods, or, the ability to acquire such foods in socially-acceptable ways, is limited. Food insecurity may result in significant adverse effects for the individual and these outcomes may vary between adults and children. Among adults, food insecurity may be associated with overweight or obesity, poorer self-rated general health, depression, increased health-care utilisation and dietary intakes less consistent with national recommendations. Among children, food insecurity may result in poorer self or parent-reported general health, behavioural problems, lower levels of academic achievement and poor social outcomes. The majority of research investigating the potential correlates of food insecurity has been undertaken in the United States (US), where regular national screening for food insecurity is undertaken using a comprehensive multi-item measurement. In Australia, screening for food insecurity takes place on a three yearly basis via the use of a crude, single-item included in the National Health Survey (NHS). This measure has been shown to underestimate the prevalence of food insecurity by 5%. From 1995 – 2004, the prevalence of food insecurity among the Australian population remained stable at 5%. Due to the perceived low prevalence of this issue, screening for food insecurity was not undertaken in the most recent NHS. Furthermore, there are few Australian studies investigating the potential determinants of food insecurity and none investigating potential outcomes among adults and children. This study aimed to examine these issues by a) investigating the prevalence of food insecurity among households residing in disadvantaged urban areas and comparing prevalence rates estimated by the more comprehensive 18-item and 6-item United States Department of Agriculture (USDA) Food Security Survey Module (FSSM) to those estimated by the current single-item measure used for surveillance in Australia and b) investigating the potential determinants and outcomes of food insecurity, Methods: A comprehensive literature review was undertaken to investigate the potential determinants and consequences of food insecurity among developed countries. This was followed by a cross-sectional study in which 1000 households from the most disadvantaged 5% of Brisbane areas were sampled and data collected via mail-based survey (final response rate = 53%, n = 505). Data were collected for food security status, sociodemographic characteristics (household income, education, age, gender, employment status, housing tenure and living arrangements), fruit and vegetable intakes, meat and take-away consumption, presence of depressive symptoms, presence of chronic disease and body mass index (BMI) among adults. Among children, data pertaining to BMI, parent-reported general health, days away from school and activities and behavioural problems were collected. Rasch analysis was used to investigate the psychometric properties of the 18-, 10- and 6-item adaptations of the USDA-FSSM, and McNemar's test was used to investigate the difference in the prevalence of food insecurity as measured by these three adaptations compared to the current single-item measure used in Australia. Chi square and logistic regression were used to investigate the differences in dietary and health outcomes among adults and health and behavioural outcomes among children. Results were adjusted for equivalised household income and, where necessary, for indigenous status, education and family type. Results: Overall, 25% of households in these urbanised-disadvantaged areas reported experiencing food insecurity; this increased to 34% when only households with children were analysed. The current reliance on a single-item measure to screen for food insecurity may underestimate the true burden among the Australian population, as this measure was shown to significantly underestimate the prevalence of food insecurity by five percentage points. Internationally, major potential determinants of food insecurity included poverty and indicators of poverty, such as low-income, unemployment and lower levels of education. Ethnicity, age, transportation and cooking and financial skills were also found to be potential determinants of food insecurity. Among Australian adults in disadvantaged urban areas, food insecurity was associated with a three-fold increase in experiencing poorer self-rated general health and a two-to-five-fold increase in the risk of depression. Furthermore, adults from food insecure households were twoto- three times more likely to have seen a general practitioner and/or been admitted to hospital within the previous six months, compared to their food secure counterparts. Weight status and intakes of fruits, vegetables and meat were not associated with food insecurity. Among Australian households with children, those in the lowest tertile were over 16 times more likely to experience food insecurity compared to those in the highest tertile for income. After adjustment for equivalised household income, children from food insecure households were three times more likely to have missed days away from school or other activities. Furthermore, children from food insecure households displayed a two-fold increase in atypical emotions and behavioural difficulties. Conclusions: Food insecurity is an important public health issue and may contribute to the burden on the health care system through its associations with depression and increased health care utilisation among adults and behavioural and emotional problems among children. Current efforts to monitor food insecurity in Australia do not occur frequently and use a tool that may underestimate the prevalence of food insecurity. Efforts should be made to improve the regularity of screening for food insecurity via the use of a more accurate screening measure. Most of the current strategies that aim to alleviate food insecurity do not sufficiently address the issue of insufficient financial resources for acquiring food; a factor which is an important determinant of food insecurity. Programs to address this issue should be developed in collaboration with groups at higher risk of developing food insecurity and should incorporate strategies to address the issue of low income as a barrier to food acquisition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Multi-Objective optimization for designing of a benchmark cogeneration system known as CGAM cogeneration system has been performed. In optimization approach, the thermoeconomic and Environmental aspects have been considered, simultaneously. The environmental objective function has been defined and expressed in cost terms. One of the most suitable optimization techniques developed using a particular class of search algorithms known as; Multi-Objective Particle Swarm Optimization (MOPSO) algorithm has been used here. This approach has been applied to find the set of Pareto optimal solutions with respect to the aforementioned objective functions. An example of fuzzy decision-making with the aid of Bellman-Zadeh approach has been presented and a final optimal solution has been introduced.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.