104 resultados para Veterans, Disabled


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Self-efficacy has two cognitive components, efficacy expectations and outcome expectations, and their influence on behavior change is synergistic. Efficacy expectation is effected by four main sources of information provided by direct and indirect experiences. The four sources of information are performance accomplishments, vicarious experience, verbal persuasion and self-appraisal. How to measure and develop interventions is an important issue at present. This article clearly analyzes the relationship between variables of the self-efficacy model and explains the implementation of self-efficacy enhancing interventions and instruments in order to test the model. Through the process of the use of theory and feasibility in clinical practice, it is expected that professional medical care personnel should firstly familiarize themselves with the self-efficiency model and concept, and then flexibly promote it in professional fields clinical practice, chronic disease care and health promotion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is the protocol for a review and there is no abstract. The objectives are as follows:The primary objective of the review is to assess the effectiveness of primary, secondary and tertiary intervention programmes utilised to reduce or prevent, or both, elderly abuse in organisational, institutional and community settings. We will also identify and report on adverse consequences or effects of the intervention/s in the review.The secondary objective is to investigate whether intervention?s effects are modified by types of abuse, types of participants, setting of intervention or cognitive status of the elderly.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports on an action-learning project conducted within the first year criminal justice curriculum in an Australian university. The project was initiated after an audit of first year units and student feedback revealed that there were gaps in the curriculum that possibly were disadvantaging certain groups of students, including mature, international, queer and disabled students, rendering them invisible. Official (university controlled student surveys and other feedback mechanisms) and anecdotal feedback found that at least some students in these groups felt disenfranchised; that is, unable to relate to either the subject mater, other students, or the university setting itself. As a school in which social justice provides the context for learning about criminal justice, first year subject coordinators as a group came to recognise the need for embedding diversity in the curriculum.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper argues that governments around the world need to take immediate coordinated action to reverse the 'book famine.' There are over 129 million book titles in the world, but persons with print disabilities can obtain less than 7% of these titles in formats that they can read. The situation is most acute in developing countries, where less than 1% of books are accessible. Two recent international developments – the United Nations Convention on the Rights of Persons with Disabilities (‘CRPD’) and the new Marrakesh Treaty to Facilitate Access to Published Works for Persons who are Blind, Visually Impaired, or otherwise Print Disabled (somewhat ironically nicknamed the ‘VIP Treaty’) – suggest that nation states are increasingly willing to take action to reverse the book famine. The Marrakesh Treaty promises to level out some of the disparity of access between people in developed and developing nations and remove the need for each jurisdiction to digitise a separate copy of each book. This is a remarkable advance, and suggests the beginnings of a possible paradigm shift in global copyright politicsmade all the more remarkable in the face of heated opposition by global copyright industry representatives. Now that the Marrakesh Treaty has been concluded, however, we argue that a substantial exercise of global political will is required to (a) invest the funds required to digitise existing books; and (b) avert any further harm by ensuring that books published in the future are made accessible upon their release.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

When a community already torn by an event such as a prolonged war, is then hit by a natural disaster, the negative impact of this subsequent disaster in the longer term can be extremely devastating. Natural disasters further damage already destabilised and demoralised communities, making it much harder for them to be resilient and recover. Communities often face enormous challenges during the immediate recovery and the subsequent long term reconstruction periods, mainly due to the lack of a viable community involvement process. In post-war settings, affected communities, including those internally displaced, are often conceived as being completely disabled and are hardly ever consulted when reconstruction projects are being instigated. This lack of community involvement often leads to poor project planning, decreased community support, and an unsustainable completed project. The impact of war, coupled with the tensions created by the uninhabitable and poor housing provision, often hinders the affected residents from integrating permanently into their home communities. This paper outlines a number of fundamental factors that act as barriers to community participation related to natural disasters in post-war settings. The paper is based on a statistical analysis of, and findings from, a questionnaire survey administered in early 2012 in Afghanistan.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis argues that an action in educational negligence should be available in Australia to provide a remedy for failure by schools and teachers to provide an adequate education as required by Australia’s human rights obligations. The thesis substantiates a duty of care to provide an adequate education under general principles of the law of negligence in appropriate cases. Although some protection exists for disabled students in Australia’s anti-discrimination and other legislation, non-disabled students are not afforded redress under existing causes of action. The educational negligence action provides a suitable remedy in an era of professional educational accountability.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Saudi Arabian education is undergoing substantial reform in the context of a nation transitioning from a resource-rich economy to a knowledge economy. Gifted students are important human resources for such developing countries. However, there are some concerns emanating from the international literature that gifted students have been neglected in many schools due to teachers’ attitudes toward them. The literature shows that future teachers also hold similar negative attitudes, especially those in Special Education courses who, as practicing teachers, are often responsible for supporting the gifted education process. The purpose of this study was to explore whether these attitudes are held by future special education teachers in Saudi Arabia, and how the standard gifted education course, delivered as part of their program, impacts on their attitudes toward gifted students. The study was strongly influenced by the Theory of Reasoned Action (Ajzen, 1980, 2012) and the Theory of Personal Knowledge (Polanyi, 1966), which both suggest that attitudes are related to people’s (i.e. teachers’) beliefs. A mixed methods design was used to collect quantitative and qualitative data from a cohort of students enrolled in a teacher education program at a Saudi Arabian university. The program was designed for students majoring in special education. The quantitative component of the study involved an investigation of a cohort of future special education teachers taking a semester-long course in gifted education. The data were primarily sourced from a standard questionnaire instrument modified in the Arabic language, and supplemented with questions that probed the future teachers’ attitudes toward gifted children. The participants, 90 special education future teachers, were enrolled in an introductory course about gifted education. The questionnaire contained 34 items from the "Opinions about the Gifted and Their Education" (Gagné, 1991) questionnaire, utilising a five-point Likert scale. The quantitative data were analysed through the use of descriptive statistics, Spearman correlation Coefficients, Paired Samples t-test, and Multiple Linear Regression. The qualitative component focussed on eight participants enrolled in the gifted education course. The primary source of the qualitative data was informed by individual semi-structured interviews with each of these participants. The findings, based on both the quantitative and qualitative data, indicated that the majority of future special education teachers held, overall, slightly positive attitudes toward gifted students and their education. However, the participants were resistant to offering special services for the gifted within the regular classroom, even when a comparison was made on equity grounds with disabled students. While the participants held ambivalent attitudes toward ability grouping, their attitudes were positive toward grade acceleration. Further, the majority agreed that gifted students are likely to be rejected by their teachers. Despite such judgments, they considered the gifted to be a valuable resource for Saudi society. Differences within the cohort were found when two variables emerged as potential predictors of attitude: age, experience, and participants’ hometown. The younger (under 25 years old) future special education teachers, with no internship or school practice experience, held more positive attitudes toward the gifted students, with respect to their general needs, than did the older participants with previous school experiences. Additionally, participants from a rural region were more resistant toward gifted education than future teachers from urban areas. The findings also indicated that the attitudes of most of the participants were significantly improved, as a result of the course, toward ability grouping such as special classes and schools, but remained highly concerned about differentiation within regular classrooms with either elitism or time pressure. From the findings, it can be confirmed that a lectured-based course can serve as a starting point from which to focus future teachers’ attention on the varied needs of the gifted, and as a conduit for learning about special services for the gifted. However, by itself, the course appears to have minimal influence on attitudes toward differentiation. As a consequence, there is merit in its redevelopment, and the incorporation of more practical opportunities for future teachers to experience the teaching of the gifted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aim: To establish associations with quality of life (QOL) of older people in long-term residential care facilities in two New Zealand cities. Methods: The outcome measure of QOL was the Life Satisfaction Index. We used multiple linear regression to explore how broad categories of factors might contribute to QOL. Results: A total of 599 people (median age of 85 years; 74% women) participated. Response rates were 85% for facilities and 83% for residents. A resident's QOL was significantly related to the QOL of co-residents. QOL was higher for people who were more positive about entry to residential care, more physically able, and not depressed, and for those with more family and emotional support. Conclusion: Attending to the circumstances around entry to residential care may enhance QOL, as may promoting physical activity, treating depression and ensuring older people remain emotionally connected to their families. In choosing a facility, noting the QOL of co-residents is important.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose Information on the use of psychotropic medications in adolescents with intellectual disability is scant. Such information can guide interventions to improve psychotropic medication use in this population. We investigated the prevalence of, and factors associated with, psychotropic medication use in adolescents with intellectual disability in Australia who live in the community. Methods Cross-sectional data were obtained from adolescents with intellectual disability living in the community in South East Queensland, Australia, between February 2007 and September 2010. Self-reported information on medication use was extracted from a health screening tool. Demographic and medical data were collected through parent/caregiver surveys. Medications were classified according to the Anatomical Therapeutic Chemical classification system. Psychopathology was assessed using the Developmental Behaviour Checklist Short Form. Logistic regression analysis was used to assess the association of demographic and medical characteristics with psychotropic medication use. Results There were 176 participants (median age = 16 years, range = 11–19 years; 55% male). Psychotropics were used by 20% of participants. Psychostimulants were the commonest psychotropic class, used by 9% of participants. Multipsychotropic prescribing was not common with only seven participants using more than one psychotropic agent. After adjusting for potentially confounding variables, use of psychotropic medications was significantly associated with male gender (adjusted odds ratio = 3.6; 95% confidence interval = 1.3–9.5) and having major behaviour problems (3.1; 1.1–8.9). Conclusions Adolescents with intellectual disability use a wide range of psychotropic medications. Being male and having major behaviour problems are associated with the use of psychotropic medications. Research examining the rationale for psychotropic prescribing in this population is needed. Copyright © 2013 John Wiley & Sons, Ltd.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent welfare reform in Australia has been constructed around the now-familiar principle of paid work and willingness to work as the fundamental marker of social citizenship. Beginning with the long-term unemployed in Australia in the mid 1990s, the scope of welfare reform has now extended to include people with a disability – which is a category of income support that has been growing in Australia. From the national government’s point of view this growth is a financial concern as it seeks to move as many people as possible into paid work to support the costs of an ageing population (DEWR, 2005). In doing so, the government has changed the meaning of disability in terms of eligibility for financial support from the state, and at the same time redefined the role of people with a disability with regard to work, and the role of the state with regard to the disabled. This has been a matter of some political contention in Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Why would disabled people want to re-engage, re-enact and re-envisage the everyday encounters in public spaces and places that cast them as ugly, strange, stare-worthy? In Disability, Public Space Performance and Spectatorship: Unconscious Performers, Bree Hadley examines the performance practices of disabled artists in the US, UK, Europe and Australasia who do exactly this. Operating in a live or performance art paradigm, artists like James Cunningham (Australia), Noemi Lakmaier (UK/Austria), Alison Jones (UK), Aaron Williamson (UK), Katherine Araniello (UK), Bill Shannon (US), Back to Back Theatre (Australia), Rita Marcalo (UK), Liz Crow (UK) and Mat Fraser (UK) all use installation and public space performance practices to re-stage their disabled identities in risky, guerilla-style works that remind passersby of their own complicity in the daily social drama of disability. In doing so, they draw spectators' attention to their own role in constructing Western concepts of disability. This book investigates the way each of us can become unconscious performers in a daily social drama that positions disability people as figures of tragedy, stigma or pity, and the aesthetics, politics and ethics of performance practices that intervene very directly in this drama. It constructs a framework for understanding the way spectators are positioned in these practices, and how they contribute to public sphere debates about disability today.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Guerrilla theatre tends, by its very definition, to pop up unpredictably – it interrupts what people might see as the proper or typical flow of time, place and space. The subversive tenor of such work means that questions about ‘what has happened’ tend to the decidedly less polite form of ‘WTF’ as passersby struggle to make sense of, and move on from, moments in which accustomed narratives of action and interaction no longer apply. In this paper I examine examples of guerrilla theatre by performers with disabilities in terms of these ruptures in time, and the way they prompt reflection, reconfigure relations, or recede into traditional relations again - focusing particularly on comedian Laurence Clark. Many performers with disabilities – Bill Shannon, Katherine Araniello, Aaron Williamson, Ju Gosling, and others – find guerrilla-style interventions in public places apposite to their aesthetic and political agendas. They prompt passersby to reflect on their relationship to people with disabilities. They can be recorded for later dissection and display, teaching people something about the way social performers, social spectators and society as a whole deal with disability. In this paper, as I unpack Clark's work, I note that the embarrassment that characterises these encounters can be a flag of an ethical process taking place for passersby. Caught between two moments in which time, roles and relationships suddenly fail to flow along the smooth routes of socially determined habits, passersbys’ frowns, gasps and giggles flag difficulties dealing with questions about their attitude to disabled people they do not now know how to answer. I consider the productivity, politics and performerly ethics of drawing passersby into such a process – a chaotic, challenging interstitial time in which a passersbys choices become fodder for public consumption – in such a wholly public way.