888 resultados para Addictive behaviours management


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: The aim of this literature review is to identify the role of probiotics in the management of enteral tube feeding (ETF) diarrhoea in critically ill patients.---------- Background: Diarrhoea is a common gastrointestinal problem seen in ETF patients. The incidence of diarrhoea in tube fed patients varies from 2% to 68% across all patients. Despite extensive investigation, the pathogenesis surrounding ETF diarrhoea remains unclear. Evidence to support probiotics to manage ETF diarrhoea in critically ill patients remains sparse.---------- Method: Literature on ETF diarrhoea and probiotics in critically ill, adult patients was reviewed from 1980 to 2010. The Cochrane Library, Pubmed, Science Direct, Medline and the Cumulative Index of Nursing and Allied Health Literature (CINAHL) electronic databases were searched using specific inclusion/exclusion criteria. Key search terms used were: enteral nutrition, diarrhoea, critical illness, probiotics, probiotic species and randomised clinical control trial (RCT).---------- Results: Four RCT papers were identified with two reporting full studies, one reporting a pilot RCT and one conference abstract reporting an RCT pilot study. A trend towards a reduction in diarrhoea incidence was observed in the probiotic groups. However, mortality associated with probiotic use in some severely and critically ill patients must caution the clinician against its use.---------- Conclusion: Evidence to support probiotic use in the management of ETF diarrhoea in critically ill patients remains unclear. This paper argues that probiotics should not be administered to critically ill patients until further research has been conducted to examine the causal relationship between probiotics and mortality, irrespective of the patient's disease state or projected prophylactic benefit of probiotic administration.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sustainability decisions and their impacts may be among the greatest challenges facing the world in the 21st century (Davos 2000). Apart from adaptation on the part of established organizations these challenges are arguably going to require solutions developed by new actors However, young ventures have only recently begun generating research interest within sustainability literature (Shepherd et al. 2009). In particular, little is known about resource behaviours of these ventures and how they adapt to substantial resource constraints. One promising theory that has been identified as a way that some entrepreneurs manage constraints is bricolage: a construct defined as “making do by applying combinations of the resources at hand to new problems and opportunities” (Baker and Nelson 2005: 333). Bricolage may be critical as the means of continued venture success as these ventures are frequently developed in severe resource constraint, owing to higher levels of technical sophistication (Rothaermel and Deeds 2006). Further, they are often developed by entrepreneurs committed to personal and social goals of resourcefulness, including values that focus on conservation rather than consumption of resources (Shepherd et al. 2009). In this paper, using seven novel cases of high potential sustainability firms from CAUSEE we consider how constraints impact resource behaviours and further illustrate and extend bricolage domains previously developed by Baker and Nelson (2005) with recommendations for theory and practice provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Climate change is becoming increasingly apparent that is largely caused by human activities such as asset management processes, from planning to disposal, of property and infrastructure. One essential component of asset management process is asset identification. The aims of the study are to identify the information needed in asset identification and inventory as one of public asset management process in addressing the climate change issue; and to examine its deliverability in developing countries’ local governments. In order to achieve its aims, this study employs a case study in Indonesia. This study only discusses one medium size provincial government in Indonesia. The information is gathered through interviews of the local government representatives in South Sulawesi Province, Indonesia and document analysis provided by interview participants. The study found that for local government, improving the system in managing their assets is one of emerging biggest challenge. Having the right information in the right place and at the right time are critical factors in response to this challenge. Therefore, asset identification as the frontline step in public asset management system is holding an important and critical role. Furthermore, an asset identification system should be developed to support the mainstream of adaptation to climate change vulnerability and to help local government officers to be environmentally sensitive. Finally, findings from this study provide useful input for the policy makers, scholars and asset management practitioners to develop an asset inventory system as a part of public asset management process in addressing the climate change.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose To identify the challenges faced by local government in Indonesia when adopting a Public Asset Management Framework. Design A Case Study in South Sulawesi Provincial Government was used as the approach to achieving the research objective. The case study involved two data collection techniques - interviews and document analysis. Findings The result of the study indicates there are significant challenges that the Indonesian local government need to manage when adopting a public asset management framework. Those challenges are: absence of an institutional and legal framework to support the asset management application; non-profit principle of public assets; multiple jurisdictions involved in the public asset management processes; the complexity of local government objectives; unavailability of data for managing public property; and limited human resources. Research Limitation This research is limited to one case study. It is a preliminary study from larger research that uses multiple case studies. The main research also investigates opportunities for local government by adopting and implementing public asset management. Originality/Value Findings from this study provide useful input for the policy makers, academics and asset management practitioners in Indonesia to establish a public asset management framework resulting in efficient and effective organizations, as well as an increase of public services quality. This study has a potential application for other developing countries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Questionnaires and interviews were conducted with employees and senior managers from three Australian organisations to explore the relationship between perceived managerial ownership of safety responsibilities and occupational road safety. It was found that the perceived authority of the person primarily responsible for managing road risks and perceived shared ownership of safety tasks were both significant independent predictors of safer driving behaviours. It was identified that the position of the person accepting primary risk management responsibilities was typically a member of the OHS team and typically in a management position. The extent that ownership was shared across members within the researched organisations varied, with personnel from OHS and fleet management typically accepting partial ownership of managing occupational road risks. Based on the findings, several recommendations are made to assist practitioners in managing occupational road risks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Violence in health care has been widely reported and health care workers, particularly nurses in acute care settings, are ill-equipped to manage patients who exhibit aggressive traits. Aim: The aim of this systematic review was to establish best practice in the prevention and management of aggressive behaviours in patients admitted to acute hospital settings. Data Sources: An extensive search of the major databases was conducted from 1990 to 2007. The search included published and unpublished studies and papers in English. Review Methods: This review considered any quantitative research study design that evaluated the effectiveness of interventions in the prevention and management of patients who exhibit aggressive behaviours in an acute hospital setting. Each included study was quality assessed by two independent reviewers and data were extracted using the relevant tools developed by the Joanna Briggs Institute. Results: Ten studies met the inclusion criteria and were included in the review. The evidence identified from the studies includes: the benefit of education and training of acute care nurses in aggression management techniques; use of “as required” medications is effective in minimising harm to patients and staff; and that specific interventions such as physical restraint may play a role in managing aggressive behaviours from patients in the acute care setting. Conclusions: This review makes several recommendations for the prevention and management of aggressive behaviours in acute hospital patients. However, due to the lack of high-quality studies conducted in the acute care setting there is huge scope for future research in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose - This paper seeks to examine the complex relationships between urban planning, infrastructure management, sustainable urban development, and to illustrate why there is an urgent need for local governments to develop a robust planning support system which integrates with advance urban computer modelling tools to facilitate better infrastructure management and improve knowledge sharing between the community, urban planners, engineers and decision makers. Design/methodology/approach - The methods used in this paper includes literature review and practical project case observations. Originality/value - This paper provides an insight of how the Brisbane's planning support system established by Brisbane City Council has significantly improved the effectiveness of urban planning, infrastructure management and community engagement through better knowledge management processes. Practical implications - This paper presents a practical framework for setting up a functional planning support system within local government. The integration of the Brisbane Urban Growth model, Virtual Brisbane and the Brisbane Economic Activity Monitoring (BEAM) database have proven initially successful to provide a dynamic platform to assist elected officials, planners and engineers to understand the limitations of the local environment, its urban systems and the planning implications on a city. With the Brisbane's planning support system, planners and decision makers are able to provide better planning outcomes, policy and infrastructure that adequately address the local needs and achieve sustainable spatial forms.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Proactive communication management instead of mortification in the glare of hostile media attention became the theme of a four-day training program for multi-cultural community leaders, the object of this research. The program in Brisbane from December 2009 through to February this year was conducted under auspices of a Community Media Link grant program shared by Griffith University and the Queensland Ethnic Communities Council, together with Journalism academics from the Queensland University of Technology. Twenty-eight participants from 23 organisations took part, with a team of nine facilitators from the host organisations, and guest presenters from the news media. This paper reviews the process, taking into account: its objectives, to empower participants by showing how Australian media operate and introducing participants to journalists; pedagogical thrust, where overview talks, with role play seminars with guest presenters from the media, were combined with practice in interviews and writing for media; and outcomes, assessed on the basis of participants’ responses. The research methodology is qualitative, in that the study is based on discussions to review the planning and experience of sessions, and anonymous, informal feed-back questionnaires distributed to the participants. Background literature on multiculturalism and community media was referred to in the study. The findings indicate positive outcomes for participants from this approach to protection of persons unversed in living in the Australian “mediatised” environment. Most affirmed that the “production side” perspective of the exercise had informed and motivated them effectively, such that henceforth they would venture far more into media management, in their community leadership roles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the empirical comparison of seven machine learning algorithms in texture classification with application to vegetation management in power line corridors. Aiming at classifying tree species in power line corridors, object-based method is employed. Individual tree crowns are segmented as the basic classification units and three classic texture features are extracted as the input to the classification algorithms. Several widely used performance metrics are used to evaluate the classification algorithms. The experimental results demonstrate that the classification performance depends on the performance matrix, the characteristics of datasets and the feature used.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents a comprehensive discussion of vegetation management approaches in power line corridors based on aerial remote sensing techniques. We address three issues 1) strategies for risk management in power line corridors, 2) selection of suitable platforms and sensor suite for data collection and 3) the progress in automated data processing techniques for vegetation management. We present initial results from a series of experiments and, challenges and lessons learnt from our project.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A range of interventions are being implemented in Australia to apprehend and deter drug driving behaviour, in particular the recent implementation of random roadside drug testing procedures in Queensland. Given this countermeasure has a strong deterrence foundation, it is of interest to determine whether deterrence-based perceptual factors are influencing this offending behaviour or whether self-reported drug driving is heavily dependent upon illicit substance consumption levels and past offending behaviour. This study involves a sample of Queensland motorists (N = 898) who completed a self-report questionnaire that collected a range of information, including drug driving and drug consumption practices, conviction history, and perceptual deterrence factors. The aim was to examine what factors influence current drug driving behaviours. Analysis of the collected data revealed that approximately 20% of participants reported drug driving at least once in the last six months. Overall, there was considerable variability in the respondents' perceptions regarding the certainty, severity and swiftness of legal sanctions, although the largest proportion of the sample did not consider such sanctions to be certain, severe or swift. In regard to predicting those who intended to drug drive again in the future, a combination of perceptual and behavioural-based factors were associated with such intentions. However, a closer examination revealed that behaviours, rather than perceptions, proved to have a greater level of influence on the current sample's future intentions to offend. This paper further outlines the major findings of the study and highlights that multi-modal interventions are most likely required to reduce the prevalence of drug driving on public roads.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study conceptualizes, operationalises and validates the concept of Knowledge Management Competence as a four-phase multidimensional formative index. Employing survey data from 310 respondents representing 27 organizations using the SAP Enterprise System Financial module, the study results demonstrate a large, significant, positive relationship between Knowledge Management Competence and Enterprise Systems Success (ES-success, as conceived by Gable Sedera and Chan (2008)); suggesting important implications for practice. Strong evidence of the validity of Knowledge Management Competence as conceived and operationalised, too suggests potential from future research evaluating its relationships with possible antecedents and consequences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this paper is to provide a review of the theoretical and research literature on the ways in which financial planning can enhance well-being. In reviewing the literature, the paper develops a conceptual framework for thinking about the extended value of financial planning, beyond financial outcomes, by examining the process of planning in the financial domain and its relationship to life satisfaction, living an intentional life, attainment of life goals, and the development of a sense of mastery. An essential element of psychological well-being is engagement in life tasks and roles. Planning can be considered a life management strategy that enables individuals to control and structure their lives. Having meaningful goals and the plans to achieve those goals enable individuals to experience higher levels of life engagement and well-being (MacLeod et al., 2008). Recent research on well-being suggests that domain-specific behaviours contribute to domain-specific satisfactions, which in turn contribute to an individual’s overall satisfaction with life (Easterlin, 2003; 2006). Thus changes in domain satisfaction, such as financial satisfaction, are likely to effect changes in life satisfaction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Engineering graduates of today are required to adapt to a rapidly changing work environment. In particular, they are expected to demonstrate enhanced capabilities in both mono-disciplinary and multi-disciplinary teamwork environments. Engineering education needs, as a result, to further focus on developing group work capabilities amongst engineering graduates. Over the last two years, the authors trialed various group work strategies across two engineering disciplines. In particular, the effect of group formation on students' performance, task management, and social loafing was analyzed. A recently developed online teamwork management tool, Teamworker, was used to collect students' experience of the group work. Analysis showed that students who were allowed to freely allocate to any group were less likely to report loafing from other team members, than students who were pre-allocated to a group. It also showed that performance was more affected by the presence or absence of a leader in pre-allocated rather than free-allocated groups.