312 resultados para Qualitative Exchange


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: The purpose of the study was to explore why Aboriginal women participate in cancer screening programs but appear reluctant to following-up results, or accept medical advice about treatment. Methods: Interpretive ethnography, a qualitative methodology, was used to explore Aboriginal women’s perception of cancer, and the cultural context in which meaning was constructed and influenced treatment decision. Data collection, which occurred over two years, involved fieldwork, participant-observation, face-to-face interviews and focus groups, in two rural Aboriginal communities. Forty eight interviews were recorded from a cross section of the communities, including cancer survivors and patients, family members, health care providers and other women from the community. Results: Key findings were that Aboriginal women’s had a fearful and fatalistic attitude toward cancer, doubted the efficacy of treatment and carried an enduring ambivalence toward the authority of whiteman’s medicine. The women faced a dilemma of wanting access to cancer treatment options but feared entering hospital or clinics not attuned to their cultural needs. Conclusion: The findings highlight the need for a culture-centred approach that decentres the authority of conventional services and instead gives prominence to Aboriginal cultural values as a focal point in cancer control. It should be the responsibility of cancer nurses and others to engage with their local Aboriginal communities to build relationships that foster an exchange of learning about cultural differences that make a difference to how cancer control is practiced.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-AKE is presented based on the security models for group key exchange protocols and also taking into account the security requirements generally considered in the ciphertext policy attribute-based setting. We also extend the paradigm of hybrid encryption to the ciphertext policy attribute-based encryption schemes. A new primitive called encapsulation policy attribute-based key encapsulation mechanism (EP-AB-KEM) is introduced and a notion of chosen ciphertext security is de�ned for EP-AB-KEMs. We propose an EP-AB-KEM from an existing attribute-based encryption scheme and show that it achieves chosen ciphertext security in the generic group and random oracle models. We present a generic one-round AB-AKE protocol that satis�es our AKE-security notion. The protocol is generically constructed from any EP-AB-KEM that satis�es chosen ciphertext security. Instantiating the generic AB-AKE protocol with our EP-AB-KEM will result in a concrete one-round AB-AKE protocol also secure in the generic group and random oracle models.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A significant amount (ca. 15-25 GL/a) of PRW (Purified Recycled Water) from urban areas is foreseen as augmentation of the depleted groundwater resources of the Lockyer Valley (approx. 80 km west of Brisbane). Theresearch project uses field investigations, lab trials and modelling techniques to address the key challenges: (i) how to determine benefits of individual users from the augmentation of a natural common pool resource; (ii) how to minimise impacts of applying different quality water on the Lockyer soils, to creeks and on aquifier materials; (iii) how to minimuse mobilisation of salts in the unsaturated and saturated zones as a result of increased deep drainage; (iv) determination of potential for direct aquifer recharge using injection wells?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many randomised controlled trials (RCT) have been conducted using Piper methysticum (kava), however no qualitative research exploring the experience of taking kava during a clinical trial has previously been reported. ---------- Patients and methods: A qualitative research component (in the form of semi structured and open ended written questions) was incorporated into an RCT to explore the experiences of those participating in a clinical trial of kava. The written questions were provided to participants at weeks 2 and 3 (after randomisation, after each controlled phase). The researcher and participants were blinded as to whether they were taking kava or placebo. Two open ended questions were posed to elucidate their experiences from taking either kava or placebo. Thematic analysis was undertaken and researcher triangulation employed to ensure analytical rigour. Key themes after the kava phases were a reduction in anxiety and stress, and calming or relaxing mental effects. Other themes related to improvement in sleep and in somatic anxiety symptoms. ---------- Results: Kava use did not cause any serious adverse reactions although a few respondents reported nausea or other gastrointestinal side effects. This represents the first documented qualitative investigation of the experience of taking kava during a clinical trial. The primary themes involved anxiolytic and calming effects, with only a minor theme reflecting side effects. Our exploratory qualitative data was consistent with the significant quantitative results revealed in the study and provides additional support to suggest the trial results did not exclude any important positive or negative effects (at least as experienced by the trial participants).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Little is known about cancer survivors’ experiences with and preferences for exercise programmes offered during rehabilitation (immediately after cancer treatment). This study documented colorectal cancer survivors’ experiences in an exercise rehabilitation programme and their preferences for programme content and delivery. At the completion of 12-weeks of supervised exercise, 10 participants took part in one-on-one semi-structured interviews. Data from these interviews were coded, and themes were identified using qualitative software. Key findings were that most participants experienced improvements in treatment symptoms, including reduced fatigue and increased energy and confidence to do activities of daily living. They also reported that interactions with the exercise trainer and a flexible programme delivery were important aspects of the intervention. Most participants reported that they preferred having a choice of exercise, starting to exercise within a month after completing treatment, having supervision and maintaining a one-on-one format. Frustrations included scheduling conflicts and a lack of a transition out of the programme. The findings indicate that colorectal cancers experience benefits from exercise offered immediately after treatment and prefer individual attention from exercise staff. They further indicate directions for the implementation of future exercise programmes with this population.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Drawing on the belief-based framework of the Theory of Planned Behaviour, this study employs qualitative methodology involving individual and group interviews to examine the beliefs associated with regular physical activity performance among parents of young children (N = 40). The data were analysed using thematic content analysis. A range of advantages (e.g. improves parenting practices), disadvantages (e.g. interferes with commitments), barriers (e.g. time), and facilitators (e.g. social support) to performing physical activity are identified. Normative pressures are also identified as affecting parents’ activity behaviour. These identified beliefs can be used to inform interventions to challenge inactivity among this at-risk group.