557 resultados para Dynamic security assessment
Resumo:
Student assessment is particularly important, and particularly controversial, because it is the means by which student achievement is determined. Reasonable adjustment to student assessment is of equal importance as the means of ensuring the mitigation, or even elimination, of disability related barriers to the demonstration of student achievement. The significance of reasonable adjustment is obvious in the later years of secondary school, and in the tertiary sector, because failure to adjust assessment may be asserted as the reason a student did not achieve as well as anticipated or as the reason a student was excluded from a course and, as a result, from future study and employment opportunities. Even in the early years of schooling, however, assessment and its management are a critical issue for staff and students, especially in an education system like Australia’s with an ever increasing emphasis on national benchmarks testing. This paper will explain the legislation which underpins the right to reasonable adjustment in education in Australian schools. It will give examples of the kinds of adjustment which may be made to promote equality of opportunity in the area of assessment. It will also consider some of the controversies which have confronted, or which, it may be speculated, are likely to confront Australian education institutions as they work towards compliance with reasonable adjustment laws.
Resumo:
With the growing significance of services in most developed economies, there is an increased interest in the role of service innovation in service firm competitive strategy. Despite growing literature on service innovation, it remains fragmented reflecting the need for a model that captures key antecedents driving the service innovation-based competitive advantage process. Building on extant literature and using thirteen in-depth interviews with CEOs of project-oriented service firms, this paper presents a model of innovation-based competitive advantage. The emergent model suggests that entrepreneurial service firms pursuing innovation carefully select and use dynamic capabilities that enable them to achieve greater innovation and sustained competitive advantage. Our findings indicate that firms purposefully use create, extend and modify processes to build and nurture key dynamic capabilities. The paper presents a set of theoretical propositions to guide future research. Implications for theory and practice are discussed. Finally, directions for future research are outlined.
Resumo:
Notwithstanding the obvious potential advantages of information and communications technology (ICT) in the enhanced provision of healthcare services, there are some concerns associated with integration of and access to electronic health records. A security violation in health records, such as an unauthorised disclosure or unauthorised alteration of an individual's health information, can significantly undermine both healthcare providers' and consumers' confidence and trust in e-health systems. A crisis in confidence in any national level e-health system could seriously degrade the realisation of the system's potential benefits. In response to the privacy and security requirements for the protection of health information, this research project investigated national and international e-health development activities to identify the necessary requirements for the creation of a trusted health information system architecture consistent with legislative and regulatory requirements and relevant health informatics standards. The research examined the appropriateness and sustainability of the current approaches for the protection of health information. It then proposed an architecture to facilitate the viable and sustainable enforcement of privacy and security in health information systems under the project title "Open and Trusted Health Information Systems (OTHIS)". OTHIS addresses necessary security controls to protect sensitive health information when such data is at rest, during processing and in transit with three separate and achievable security function-based concepts and modules: a) Health Informatics Application Security (HIAS); b) Health Informatics Access Control (HIAC); and c) Health Informatics Network Security (HINS). The outcome of this research is a roadmap for a viable and sustainable architecture for providing robust protection and security of health information including elucidations of three achievable security control subsystem requirements within the proposed architecture. The successful completion of two proof-of-concept prototypes demonstrated the comprehensibility, feasibility and practicality of the HIAC and HIAS models for the development and assessment of trusted health systems. Meanwhile, the OTHIS architecture has provided guidance for technical and security design appropriate to the development and implementation of trusted health information systems whilst simultaneously offering guidance for ongoing research projects. The socio-economic implications of this research can be summarised in the fact that this research embraces the need for low cost security strategies against economic realities by using open-source technologies for overall test implementation. This allows the proposed architecture to be publicly accessible, providing a platform for interoperability to meet real-world application security demands. On the whole, the OTHIS architecture sets a high level of security standard for the establishment and maintenance of both current and future health information systems. This thereby increases healthcare providers‘ and consumers‘ trust in the adoption of electronic health records to realise the associated benefits.
Resumo:
Postoperative fever in arthroplasty patients is common. The value of diagnostic workup of fever in this instance is of questionable utility. Studies have shown that blood cultures in this scenario add little to clinical management, but sample sizes have been small and the use of blood cultures in this setting continues. This study aimed to examine the value of blood cultures in the assessment of postoperative fever in a large arthroplasty population. The medical records of 101 patients who had 141 blood culture sets taken during a 2-year period were retrospectively analyzed. Of the 141 blood culture sets, only 2 returned positive results. These were both thought to be as a result of skin contamination at the time of venipuncture. No infectious sequelae occurred in either patient. We conclude that blood cultures have no role to play in the assessment of the febrile, otherwise asymptomatic arthroplasty patient in the early postoperative period.
Resumo:
Preterm infants commence breastfeeding when health-care professionals deem them to be ready. However, the optimal timing for commencement of breastfeeding is unclear. Currently, there is little guidance for neonatal care providers to decide when to initiate breastfeeding among preterm infants. A mixed-methods study was conducted to develop and test the Preterm Sucking Readiness (PTSR) scale in four phases. The first phase involved a chart audit to explore the use of age as a criterion by investigating when preterm infants meet feeding milestones as well as other factors that may affect an infant’s readiness to engage in nutritive sucking behaviour. The second phase utilised focus groups to explore and define how neonatal care providers decide when to commence breastfeeding. To gain consensus on the criteria mentioned by the focus groups, a Delphi survey was conducted in phase 3, involving neonatal providers across Australia and New Zealand. Phase 4 of the study involved an observational study that was used to test the six-item PTSR. The age at which specific feeding milestones were reached was consistent with what has been previously described in the literature. The chart audit showed that the time taken to the first feeding attempt in the preterm infant population was affected by gestational age at birth, birth weight, and specific interventions. Staff also considered age along with other criteria when deciding when to initiate feeding. Consensus on nine criteria for inclusion into the six-item PTSR was achieved using the Delphi technique. Three items of PTSR showed significant differences between the preterm and fullterm infant groups. Only two items, feeding-readiness behaviour and low pulse oximetry during handling, explained the variance in breastfeeding behaviour. The inter-rater variability ranged between moderate and very good for the PTSR items. The results of this study indicate the importance of assessing behavioural cues as an indication of breastfeeding readiness in the preterm infant population, once an infant is deemed physiologically stable. Age continues to be a factor in some clinicians' decisions to commence breastfeeding. However, age alone cannot be used to decide if an infant is ready to engage in breastfeeding. Further research is needed to confirm these findings.
Resumo:
Objective: To critically appraise the Biodex System 4 isokinetic dynamometer for strength assessment of children. Methods: Appraisal was based on experiences from two independent laboratories involving testing of 213 children. Issues were recorded and the manufacturer was consulted regarding appropriate solutions. Results: The dynamometer had insufficient height adjustment for alignment of the knee for some children, requiring the construction of padding to better fit the child within the dynamometer. Potential for entrapment of the non-testing leg was evident in the passive and eccentric modes and a leg bracket restraint was constructed. Automated gravity correction did not operate when protocols were linked or data was exported to an external device. Conclusions: Limitations were noted, some of which were applicable to knee strength testing in general and others which were specific to use with children. However, most of these obstacles could be overcome, making the Biodex System 4 suitable for assessment of knee strength in children.
Resumo:
Assessment for Learning (AfL) is an international assessment area of interest, yet, during 20 years of AfL research, the desired outcome of increased learner autonomy remains elusive. This article analyses AfL practices in classrooms as students negotiated identities as autonomous learners within a classroom community of practice. A sociocultural theoretical framework in formed the analysis of three case studies conducted in Queensland middle school classrooms. Key findings include the importance of the teacher–student relationship, viewing AfL as patterns of participation that develop expertise, and learner autonomy as a negotiated learner identity within each classroom context.
Resumo:
Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device.
Resumo:
The Pattern and Structure Mathematical Awareness Program(PASMAP) stems from a 2-year longitudinal study on students’ early mathematical development. The paper outlines the interview assessment the Pattern and Structure Assessment(PASA) designed to describe students’ awareness of mathematical pattern and structure across a range of concepts. An overview of students’ performance across items and descriptions of their structural development are described.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.