473 resultados para Personal Security.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper offers one explanation for the institutional basis of food insecurity in Australia, and argues that while alternative food networks and the food sovereignty movement perform a valuable function in building forms of social solidarity between urban consumers and rural producers, they currently make only a minor contribution to Australia’s food and nutrition security. The paper begins by identifying two key drivers of food security: household incomes (on the demand side) and nutrition-sensitive, ‘fair food’ agriculture (on the supply side). We focus on this second driver and argue that healthy populations require an agricultural sector that delivers dietary diversity via a fair and sustainable food system. In order to understand why nutrition-sensitive, fair food agriculture is not flourishing in Australia we introduce the development economics theory of urban bias. According to this theory, governments support capital intensive rather than labour intensive agriculture in order to deliver cheap food alongside the transfer of public revenues gained from rural agriculture to urban infrastructure, where the majority of the voting public resides. We chart the unfolding of the Urban Bias across the twentieth century and its consolidation through neo-liberal orthodoxy, and argue that agricultural policies do little to sustain, let alone revitalize, rural and regional Australia. We conclude that by observing food system dynamics through a re-spatialized lens, Urban Bias Theory is valuable in highlighting rural–urban socio-economic and political economy tensions, particularly regarding food system sustainability. It also sheds light on the cultural economy tensions for alternative food networks as they move beyond niche markets to simultaneously support urban food security and sustainable rural livelihoods.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study developed and tested a model of job uncertainty for survivors and victims of downsizing. Data were collected from three samples of employees in a public hospital, each representing three phases of the downsizing process: immediately before the announcement of the redeployment of staff, during the implementation of the downsizing, and towards the end of the official change programme. As predicted, levels of job uncertainty and personal control had a direct relationship with emotional exhaustion and job satisfaction. In addition, there was evidence to suggest that personal control mediated the relationship between job uncertainty and employee adjustment, a pattern of results that varied across each of the three phases of the change event. From the perspective of the organization’s overall climate, it was found that levels of job uncertainty, personal control and job satisfaction improved and/or stabilized over the downsizing process. During the implementation phase, survivors experienced higher levels of personal control than victims, but both groups of employees reported similar levels of job uncertainty. We discuss the implications of our results for strategically managing uncertainty during and after organizational change.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

I must admit that I approached the European Union-supported educational research 1995-2003: Briefing papers for policy makers with a sense of trepidation. As a researcher who defines himself as socially critical, I wondered about the dynamics of a policy document that was published by the bureaucracy that has, in some form, a vested interest in the structure and operation of education in its various guises. In turning my attention to this review, I decided to focus my attention on the third guiding question that argues education and training "are strongly interconnected with concerns that include citizenship and democratic participation, inequalities and social justice, cultural diversity and quality of life" (Millei, 2005). The Briefing Papers include recommendations on democracy and citizenship, social exclusion and equality, gender and dealing with mental illness in schools...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Lattice-based cryptographic primitives are believed to offer resilience against attacks by quantum computers. We demonstrate the practicality of post-quantum key exchange by constructing cipher suites for the Transport Layer Security (TLS) protocol that provide key exchange based on the ring learning with errors (R-LWE) problem, we accompany these cipher suites with a rigorous proof of security. Our approach ties lattice-based key exchange together with traditional authentication using RSA or elliptic curve digital signatures: the post-quantum key exchange provides forward secrecy against future quantum attackers, while authentication can be provided using RSA keys that are issued by today's commercial certificate authorities, smoothing the path to adoption. Our cryptographically secure implementation, aimed at the 128-bit security level, reveals that the performance price when switching from non-quantum-safe key exchange is not too high. With our R-LWE cipher suites integrated into the Open SSL library and using the Apache web server on a 2-core desktop computer, we could serve 506 RLWE-ECDSA-AES128-GCM-SHA256 HTTPS connections per second for a 10 KiB payload. Compared to elliptic curve Diffie-Hellman, this means an 8 KiB increased handshake size and a reduction in throughput of only 21%. This demonstrates that provably secure post-quantum key-exchange can already be considered practical.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper addresses the gap in economic theory underlying the multidimensional concept of food security and observed data by deriving a composite food security index using the latent class model. The link between poverty and food security is then examined using the new food security index and the robustness of the link is compared with two unidimensional measures often used in the literature. Using Vietnam as a case study, it was found that a weak link exists for the rural but not for the urban composite food security index. The unidimensional measures on the other hand show a strong link in both the rural and urban regions. The results on the link are also different and mixed when two poverty types given by persistent and transient poverty are considered. These findings have important policy implications for a targeted approach to addressing food security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Problems can occur in mentoring relationships if there is a “lack of mentoring skills on the part of the mentor” (Soutter, Kerr - Roubicek & Smith, 2000, p. 6), which includes the effectiveness of mentor’s personal attributes. There is little Australian research that analyses primary teachers’ personal attributes for mentoring; hence this study aims to examine preservice teachers’ perceptions of their mentors’ personal attributes. Specifically, this study focuses on mentors’ personal attributes in relation to their mentoring of primary science teaching....

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Testing the strategies of discourse and materiality, this practice-based and practice-led research experiments with how anonymous storytelling by vulnerable communities, like that of the sexual minorities and their allies in Malaysia, can better speak to their human rights issues without further subjecting them to personal attacks and targetted persecution. The research identifies the critical role of the voice in lending authenticity and credibility to first person narratives; and contextual credibility as a form of credibility which personal stories naturally aspire to achieve with audiences. Adopting a discursive view of persuasion and recognising too that the power of persuasion may in effect lie with those who receive these stories rather than with those who tell them, the insights and knowledge gained from the research informed the development of the field output, Persuasive Storytelling by Vulnerable Communities in Aggressive Contexts: A Human Rights Communication Framework.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the ever increasing amount of eHealth data available from various eHealth systems and sources, Health Big Data Analytics promises enticing benefits such as enabling the discovery of new treatment options and improved decision making. However, concerns over the privacy of information have hindered the aggregation of this information. To address these concerns, we propose the use of Information Accountability protocols to provide patients with the ability to decide how and when their data can be shared and aggregated for use in big data research. In this paper, we discuss the issues surrounding Health Big Data Analytics and propose a consent-based model to address privacy concerns to aid in achieving the promised benefits of Big Data in eHealth.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. In this paper, we take a step closer to the adoption of the Information Accountability protocols and demonstrate their functionality through an implementation in FluxMED, a customisable EHR system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This tutorial primarily focuses on the implementation of Information Accountability (IA) protocols defined in an Information Accountability Framework (IAF) in eHealth systems. Concerns over the security and privacy of patient information are one of the biggest hindrances to sharing health information and the wide adoption of eHealth systems. At present, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' (HCP) requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well-informed decisions and provide quality care. This conflict is evident in the review of Australia's PCEHR system and in recent studies of patient control of access to their eHealth information. In order to balance these requirements, the use of an Information Accountability Framework devised for eHealth systems has been proposed. Through the use of IA protocols, so-called Accountable-eHealth systems (AeH) create an eHealth environment where health information is available to the right person at the right time without rigid barriers whilst empowering the consumers with information control and transparency. In this half-day tutorial, we will discuss and describe the technical challenges surrounding the implementation of the IAF protocols into existing eHealth systems and demonstrate their use. The functionality of the protocols and AeH systems will be demonstrated, and an example of the implementation of the IAF protocols into an existing eHealth system will be presented and discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is a perceived tension in the relationship between the roles of art teacher and artist that led to the question: can an art teacher use their professional training and experience to establish an authentic artistic identity? This self-study tracked and analysed how the process of making her own art enabled an art teacher to also identify as an artist. Drawing on Lamina, the public exhibition of her multimedia artworks, the final exegesis proposes five conditions for art teachers in developing their own art practice: developing an identity as artist, using time and space mindfully, tolerating uncertainty, mentoring, and privileging the process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rigid security boundaries hinder the proliferation of eHealth. Through active audit logs, accountable-eHealth systems alleviate privacy concerns and enhance information availability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electric-motored personal mobility devices (PMDs) are appearing on Australian roads. While legal to import and own, their use is typically illegal for adult riders within the road transport system. However, these devices could provide an answer to traffic congestion by getting people out of cars for short trips (“first-and-last mile” travel). City of Ryde council, Macquarie University, and Transport for NSW examined PMD use within the road transport system. Stage 1 of the project examined PMD use within a controlled pedestrian environment on the Macquarie University campus. Three PMD categories were used: one-wheelers (an electric unicycle, the Solowheel); two-wheelers (an electric scooter, the Egret); and three-wheelers (the Qugo). The two-wheeled PMD was most effective in terms of flexibility. In contrast, the three-wheeled PMD was most effective in terms of speed. One-wheeled PMD riders were very satisfied with their device, especially at speed, but significant training and practice was required. Two-wheeled PMD riders had less difficulty navigating through pedestrian precincts and favoured the manoeuvrability of the device as the relative narrowness of the two-wheeled PMD made it easier to use on a diversity of path widths. The usability of all PMDs was compromised by the weight of the devices, difficulties in ascending steeper gradients, portability, and parking. This was a limited trial, with a small number of participants and within a unique environment. However, agreement has been reached for a Stage 2 extension into the Macquarie Park business precinct for further real-world trials within a fully functional road transport system.