123 resultados para private provider
Resumo:
Purpose: With the increasing interest in Public Private Partnership (PPP) there is a need to investigate the factors contributing to successful delivery of PPP projects. Design/methodology/approach: An empirical questionnaire survey was conducted in Hong Kong and Australia. The survey respondents were asked to rate eighteen factors which contribute to delivering successful PPP projects. Findings: The findings from this survey were further compared with the results achieved by a previous researcher (Li, 2003) in a similar survey conducted in the United Kingdom. The comparison showed that amongst the top five success factors ranked by Hong Kong respondents, three were also ranked highly by the Australians and British. These success factors included: ‘Commitment and responsibility of public and private sectors’; ‘Strong and good private consortium’; and ‘Appropriate risk allocation and risk sharing’. Originality/value: These success factors were therefore found to be important for contributing to successful PPP projects irrespective of geographical locations.
Resumo:
Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness measure for medical data. This thesis starts with the observation that existing EHR system proposals suer from six serious shortcomings that aect patients’ privacy and safety, and medical practitioners’ trust in EHR data: accuracy and privacy concerns over linking patients’ existing medical records; the inability of patients to have control over who accesses their private data; the inability to protect against inferences about patients’ sensitive data; the lack of a mechanism for evaluating the trustworthiness of medical data; and the failure of current healthcare workflow processes to capture and enforce patient’s privacy desires. Following an action research method, this thesis addresses the above shortcomings by firstly proposing an architecture for linking electronic medical records in an accurate and private way where patients are given control over what information can be revealed about them. This is accomplished by extending the structure and protocols introduced in federated identity management to link a patient’s EHR to his existing medical records by using pseudonym identifiers. Secondly, a privacy-aware access control model is developed to satisfy patients’ privacy requirements. The model is developed by integrating three standard access control models in a way that gives patients access control over their private data and ensures that legitimate uses of EHRs are not hindered. Thirdly, a probabilistic approach for detecting and restricting inference channels resulting from publicly-available medical data is developed to guard against indirect accesses to a patient’s private data. This approach is based upon a Bayesian network and the causal probabilistic relations that exist between medical data fields. The resulting definitions and algorithms show how an inference channel can be detected and restricted to satisfy patients’ expressed privacy goals. Fourthly, a medical data trustworthiness assessment model is developed to evaluate the quality of medical data by assessing the trustworthiness of its sources (e.g. a healthcare provider or medical practitioner). In this model, Beta and Dirichlet reputation systems are used to collect reputation scores about medical data sources and these are used to compute the trustworthiness of medical data via subjective logic. Finally, an extension is made to healthcare workflow management processes to capture and enforce patients’ privacy policies. This is accomplished by developing a conceptual model that introduces new workflow notions to make the workflow management system aware of a patient’s privacy requirements. These extensions are then implemented in the YAWL workflow management system.
Resumo:
Introduction The Australian Nurse Practitioner Project (AUSPRAC) was initiated to examine the introduction of nurse practitioners into the Australian health service environment. The nurse practitioner concept was introduced to Australia over two decades ago and has been evolving since. Today, however, the scope of practice, role and educational preparation of nurse practitioners is well defined (Gardner et al, 2006). Amendments to specific pre-existing legislation at a State level have permitted nurse practitioners to perform additional activities including some once in the domain of the medical profession. In the Australian Capital Territory, for example 13 diverse Acts and Regulations required amendments and three new Acts were established (ACT Health, 2006). Nurse practitioners are now legally authorized to diagnose, treat, refer and prescribe medications in all Australian states and territories. These extended practices differentiate nurse practitioners from other advanced practice roles in nursing (Gardner, Chang & Duffield, 2007). There are, however, obstacles for nurse practitioners wishing to use these extended practices. Restrictive access to Medicare funding via the Medicare Benefit Scheme (MBS) and the Pharmaceutical Benefit Scheme (PBS) limit the scope of nurse practitioner service in the private health sector and community settings. A recent survey of Australian nurse practitioners (n=202) found that two-thirds of respondents (66%) stated that lack of legislative support limited their practice. Specifically, 78% stated that lack of a Medicare provider number was ‘extremely limiting’ to their practice and 71% stated that no access to the PBS was ‘extremely limiting’ to their practice (Gardner et al, in press). Changes to Commonwealth legislation is needed to enable nurse practitioners to prescribe medication so that patients have access to PBS subsidies where they exist; currently patients with scripts which originated from nurse practitioners must pay in full for these prescriptions filled outside public hospitals. This report presents findings from a sub-study of Phase Two of AUSPRAC. Phase Two was designed to enable investigation of the process and activities of nurse practitioner service. Process measurements of nurse practitioner services are valuable to healthcare organisations and service providers (Middleton, 2007). Processes of practice can be evaluated through clinical audit, however as Middleton cautions, no direct relationship between these processes and patient outcomes can be assumed.
Resumo:
This research focuses on exploring the links between sport, Indigenous self determination and deeper engagement within mainstream Australia especially with regard to the issue of promoting healthy lifestyles and the role of governance, through sport governance. Against all social, economic and health criteria Indigenous Australians are disadvantaged – despite government attention and financial input. It is well understood that education is a basis to better health, employment and lifestyle (Furneaux and Brown, 2008). However, many of the issues confronting Indigenous people have not responded to conventional government approaches based on program development and policy initiatives from single organisations (Ryan et al 2006). As a consequence, new approaches that both tap into the specific interests of Indigenous people and better engage them in the process of governance are required. The case material of the research focuses on the Australian Football League (AFL) Kickstart program.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
This paper introduces Sapporo World Window, a screen-based application that is currently under development for the new underway passage at the centre of Sapporo City. There are ten large public screens installed in the space, displaying user-generated videos about various aspects of the city and a real-time map that visualises users’ interaction with the city. The application aims to engage the general public by functioning as a unique ‘point of connection’ for socio-cultural and technological interactions, making the space a lively social place where people can have meaningful experiences of interacting with people and places of Sapporo through mobile phones (keitai) and the public screens in the space. This paper first outlines the contextual background and key concept for the application’s design. Then the paper discusses the user interaction processes, technical specifications, and interface design, followed by the conclusions and outlook.
Resumo:
We examine the impact of continuous disclosure regulatory reform on the likelihood, frequency and qualitative characteristics of management earnings forecasts issued in New Zealand’s low private litigation environment. Using a sample of 720 earnings forecasts issued by 94 firms listed on the New Zealand Exchange before and after the reform (1999–2005), we provide strong evidence of significant changes in forecasting behaviour in the post-reform period. Specifically, firms were more likely to issue earnings forecasts to pre-empt earnings announcements and, in contrast to findings in other legal settings, those earnings forecasts exhibited higher frequency and improved qualitative characteristics (better precision and accuracy). An important implication of our findings is that public regulatory reforms may have a greater benefit in a low private litigation environment and thus add to the global debate about the effectiveness of alternative public regulatory reforms of corporate requirements.
Resumo:
This paper reveals the interior landscapes of selected contemporary Australian films, such as The Caterpillar Wish and Bad Boy Bubby, to develop a number of thematic influences on the manner in which domestic and private lives are constructed through filmic imagination. The research uncovers the conditions that contribute to particular scenographic representations of the humble interiors that act as both backdrop and performer to subtle and often troubled narratives. Such readings are informed by the theoretical works of writer Gertrude Stein, among others, who explore the relationships between the scenographic third dimension and the fourth dimensional performance in the representation of narrative space. A further theoretical thread lies in Giuliana Bruno’s work on the tension between private and public filmic space, which is explored through the public outing of intensely private spaces generated through narratives framed by the specificities of found interiors. Beyond the interrogation of qualities of imagined filmic space is the condition whereby locations, once transformed by the event of movie making are consequently forever revised. These altered conditions subsequently reinvest the lives of those who return to the location with layered narratives of occupation. Situationally, the now reconverted interior performs as contributor to subsequent private inhabitation, even if only as imagined space. The possibility here is that the qualities of the original may be superimposed and recontextualised to invest post-produced interiors with the qualities of the other space as imagined. This reading of film space explores new theoretical design scenarios for imagined and everyday interior landscapes.
Resumo:
The ad hoc growth of administrative controls on land use has produced an information management problem. Land registries face growing demands to record on the Torrens register particulars of rights, obligations and restrictions created under public law statutes, in order to reduce information costs, promote compliance and inform planning. As sustainable management of land and natural resources will require more legislative regulation, this paper proposes a framework of principles for the more coherent and consistent management of public law controls on private land use.
Resumo:
Background: A key element of graduated driver licensing systems is the level of support provided by parents. In mid-2007 changes were made to Queensland’s graduated driver licensing system, including amendments to the learner licence with one of the more significant changes requiring learners to record 100 hours of supervised driving practice in a logbook. Prior to mid-2007, there was no minimum supervision requirement. Aims: The aim of this study was to document the experiences of the supervisors of Queensland learner drivers after the changes made to the graduated driver licensing system in mid-2007. Methods: The sample of 552 supervisors of learner drivers was recruited using a combination of convenience and snowball sampling techniques. The internet survey was open for completion between July 2009 and May 2010 and took approximately 15 to 20 minutes for participants to complete. Results: For 59.7 per cent of the participants, this was the first time that they had supervised a learner driver. For 63.2 per cent, they classified themselves as the main supervisor for the learner driver. Participants provided an average of 79.62 hours of supervision (sd = 92.38), while other private supervisors provided 34.89 hours of supervision (sd = 41.74) to the same learner and professional driving instructors 18.55 hours of supervision (sd = 27.54). The vast majority of supervisors recorded all or most of the practice that they provided their learner driver in their log book with most supervisors indicating that they believed that the hours recorded in the learner’s logbook were either accurate or very accurate. While many supervisors stated that they did not receive any advice regarding the supervision of learner drivers, some had received advice from others such as friends or through discussions with a professional driving instructor. Discussion and conclusions: While graduated driver licensing systems implicitly encourage the involvement of parents and other private supervisors, these people tend not to be systematically involved. As demonstrated in this study, private supervisors provide a significant amount of supervised practice and seek to record this practice accurately and honestly in the learner’s logbook. However, even though a significant number of participants reported that this was the first time that they had supervised a learner driver, they accessed little support or guidance for their role. This suggests a need to more overtly encourage and support the role of private supervisors for learner drivers.
Resumo:
PPP is a general term covering all contracted relationships between the public and private sectors to produce a public asset or to deliver a public service. Its major advantage lies in utilising resources from the private sector to alleviate some of the financial burdens of the government. The Asian financial turmoil in the late 1990s has imposed enormous pressure on the budget of the Hong Kong Special Administrative Region (HKSAR) Government. With a continuous outcry for better public services due to the rapid development of Hong Kong, alternative financing models need to be sought to ensure sustainability. Hong Kong has the advantage of being the international gateway to Mainland China, and with this benefit has attracted overseas enterprises to base their offices in Hong Kong for the Asian market. Obviously the private sector has much to contribute. The HKSAR Government has realised the benefits of using PPP in Hong Kong as well as the success achieved overseas. But a more thorough research is needed to develop the most suitable practice of PPP in terms of project nature, project complexity, project type and project scale under which PPP is most appropriate for Hong Kong. This paper provides an initial report of a research project being funded by the Research Grants Council (RGC) of the HKSAR. The project aims to evaluate the benefits and risks of PPP adopted in Australia and the United Kingdom, and from these previous experiences to develop a best practice framework for implementing PPP in Hong Kong. It firstly reports on the status of PPP development trend and the hands-on experiences which have been drawn in these countries. Qualitative and quantitative research methods applied in conducting the research are discussed. The likely impacts of the study are highlighted. It is believed that the construction industry and the government would benefit a lot as a result of this study, and further procurement and project financing options would be opened up for delivering better future public service.
Resumo:
This article explores the way in which a major Australian radiology organization implemented a complex accounting information system and how workers in the 72 radiology practises that had to use it resisted the change. The study reports on the issues that led to the circumvention of the system by individuals and, after only three years, complete withdrawal of the accounting information system by the parent organization. This article has implications for firms in the health care and other sectors considering implementing new accounting information systems. Organizations need to incorporate change management techniques and provide open communication to all stakeholders to minimize disruption and potential problems.
Resumo:
The way in which private schools use rhetoric in their communications offers important insights into how these organizational sites persuade audiences and leverage marketplace advantage in the context of contemporary educational platforms. Through systemic analysis of rhetorical strategies employed in 65 ‘elite’ school prospectuses in Australia, this paper contributes to understandings of the ways schools’ communications draw on broader cultural politics in order to shape meanings and interactions among organizational actors. We identify six strategies consistently used by schools to this end: identification, juxtapositioning, bolstering or self-promotion, partial reporting, self-expansion, and reframing or reversal. We argue that, in the context of marketization and privatization discourses in twenty-first-century western education, these strategies attempt to subvert potentially threatening discourses, in the process actively reproducing broader economic and social privilege and inequalities.