153 resultados para Healthcare cloud
Resumo:
Background Positive attitudes of healthcare staff towards people with dementia promote higher quality care, although little is known about important factors that underlie positive attitudes. Key aims of this project were to explore the relationships between staff attitudes towards dementia, self-confidence in caring for people with dementia, experience and dementia education and training. Method A brief online survey was developed and widely distributed to registered nurses and allied health professionals working in Queensland in 2012. Regression analyses were performed to identify important predictors of self-confidence in caring for people with dementia and positive attitudes towards people with dementia. Results Five hundred and twenty-four surveys were completed by respondents working in a range of care settings across Queensland. Respondents were predominantly female (94.1%), and most were registered nurses (60%), aged between 41 and 60 years (65.6%). Around 40% regularly worked with people with dementia and high levels of self-confidence in caring for this population and positive attitudes towards people with dementia were reported. The majority of respondents (67%) had participated in a dementia education/training activity in the past 12 months. More experience working with people with dementia predicted greater self-confidence while recent participation in a dementia education/training and higher self-confidence in caring for a person with dementia significantly predicted more positive attitudes towards people with dementia. Conclusion These results confirm the importance of self-confidence and dementia education in fostering positive attitudes and care practices towards people with dementia. Our results also indicate that the demand for ongoing dementia education is high amongst health care workers and it is recommended that regular dementia education/ training be provided and promoted for all healthcare personnel who work with people with dementia.
Resumo:
The topic of “the cloud” has attracted significant attention throughout the past few years (Cherry 2009; Sterling and Stark 2009) and, as a result, academics and trade journals have created several competing definitions of “cloud computing” (e.g., Motahari-Nezhad et al. 2009). Underpinning this article is the definition put forward by the US National Institute of Standards and Technology, which describes cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction” (Garfinkel 2011, p. 3). Despite the lack of consensus about definitions, however, there is broad agreement on the growing demand for cloud computing. Some estimates suggest that spending on cloudrelated technologies and services in the next few years may climb as high as USD 42 billion/year (Buyya et al. 2009).
Resumo:
The geographic location of cloud data storage centres is an important issue for many organisations and individuals due to various regulations that require data and operations to reside in specific geographic locations. Thus, cloud users may want to be sure that their stored data have not been relocated into unknown geographic regions that may compromise the security of their stored data. Albeshri et al. (2012) combined proof of storage (POS) protocols with distance-bounding protocols to address this problem. However, their scheme involves unnecessary delay when utilising typical POS schemes due to computational overhead at the server side. The aim of this paper is to improve the basic GeoProof protocol by reducing the computation overhead at the server side. We show how this can maintain the same level of security while achieving more accurate geographic assurance.
Resumo:
Objective To describe the changing prevalence of healthcare- and community-associated MRSA. Methods Susceptibility phenotypes of MRSA were observed from 2000 to 2012 using routine susceptibility data. Phenotypic definitions of major clones were validated by genotyping isolates from a nested period prevalence survey in 2011. Results The predominant healthcare-associated (AUS-2/3 like) MRSA phenotype decreased from 42 to 14 isolates per million occasions of service in outpatients (P < 0.0001) and from 650 to 75 isolates per million accrued patient days in inpatients (P 0.0005), while the respective rates of the healthcare-related EMRSA-15 like phenotype increased from 1 to 19 in outpatients (P < 0.0001) and from 11 to 83 in inpatients (P < 0.0001) and those of the community-associated MRSA phenotype increased from 17 to 296 in outpatients (P < 0.0001) and from 71 to 486 in inpatients (P < 0.0001). When compared with single nucleotide polymorphism genotyping the AUS-2/3 like phenotype had a sensitivity and positive predictive value (PPV) for CC239 of 1 and 0.791 respectively, while the EMRSA-15 like phenotype had a sensitivity and PPV for CC22 of 0.903 and 0.774. PVL-positive CA-MRSA, predominantly ST93 and CC30, accounted for 60.8% of MRSA, while PVL-negative CA-MRSA, mainly CC5 and CC1, accounted for 21.4%. Conclusions The initially dominant healthcare-associated MRSA clone has been progressively replaced, mainly by four community-associated lineages.
Resumo:
AIMS: To investigate the evolutionary origins of Australian healthcare-associated (HCA) methicillin-resistant Staphylococcus aureus (MRSA) strains from a panel of historical isolates typed using current genotyping techniques. METHODS: Nineteen MRSA isolates from 1965 to 1981 were examined and antibiotic susceptibility profiles determined. Genetic characterisation included real-time (RT) polymerase chain reaction (PCR) assays to identify single nucleotide polymorhpism (SNP) clonal complexes (SNP CC) and sequence type (SNP ST), multi locus sequence typing (MLST) and staphylococcal chromosomal cassette mec typing. RESULTS: All SNP CC30 isolates belonged to a novel sequence type, ST2249. All SNP CC239 isolates were confirmed as ST239-MRSA-III, except for a new single locus variant of ST239, ST2275. A further new type, ST2276, was identified. CONCLUSIONS: The earliest MRSA examined from 1965 was confirmed as ST250-MRSA-I, consistent with archaic European types. Identification of ST1-MRSA-IV in 1981 is the earliest appearance of this clinically important lineage which manifested in Australia and the United States in the 1990s. A previously unknown multi-resistant clone, ST2249-MRSA-III, was identified from 1973. Gentamicin resistance first appeared in this novel strain from 1976 and not ST239 as previously suspected. Thus, ST2249 was present in the earliest phase of the HCA MRSA epidemic in eastern Australia and was perhaps related to the emergence of the globally epidemic strain ST239.
Resumo:
The music industry is going through a period of immense change brought about in part by the digital revolution. What is the role of music in the age of computers and the Internet? How has the music industry been transformed by the economic and technological upheavals of recent years, and how is it likely to change in the future? This thoroughly revised and updated new edition provides an international overview of the music industry and its future prospects in the world of global entertainment. Patrik Wikström illuminates the workings of the music industry, and captures the dynamics at work in the production of musical culture between the transnational media conglomerates, the independent music companies and the public. New to this second edition are expanded sections on the structure of the music industry, online business models and the links between social media and music. Engaging and comprehensive, The Music Industry will be a must-read for students and scholars of media and communication studies, cultural studies, popular music, sociology and economics.
Resumo:
Modern health information systems can generate several exabytes of patient data, the so called "Health Big Data", per year. Many health managers and experts believe that with the data, it is possible to easily discover useful knowledge to improve health policies, increase patient safety and eliminate redundancies and unnecessary costs. The objective of this paper is to discuss the characteristics of Health Big Data as well as the challenges and solutions for health Big Data Analytics (BDA) – the process of extracting knowledge from sets of Health Big Data – and to design and evaluate a pipelined framework for use as a guideline/reference in health BDA.
Resumo:
The purpose of this paper is to empirically examine the state of cloud computing adoption in Australia. I specifically focus on the drivers, risks, and benefits of cloud computing from the perspective of IT experts and forensic accountants. I use thematic analysis of interview data to answer the research questions of the study. The findings suggest that cloud computing is increasingly gaining foothold in many sectors due to its advantages such as flexibility and the speed of deployment. However, security remains an issue and therefore its adoption is likely to be selective and phased. Of particular concern are the involvement of third parties and foreign jurisdictions, which in the event of damage may complicate litigation and forensic investigations. This is one of the first empirical studies that reports on cloud computing adoption and experiences in Australia.
Resumo:
Cloud computing is a currently developing revolution in information technology that is disturbing the way that individuals and corporate entities operate while enabling new distributed services that have not existed before. At the foundation of cloud computing is the broader concept of converged infrastructure and shared services. Security is often said to be a major concern of users considering migration to cloud computing. This article examines some of these security concerns and surveys recent research efforts in cryptography to provide new technical mechanisms suitable for the new scenarios of cloud computing. We consider techniques such as homomorphic encryption, searchable encryption, proofs of storage, and proofs of location. These techniques allow cloud computing users to benefit from cloud server processing capabilities while keeping their data encrypted; and to check independently the integrity and location of their data. Overall we are interested in how users may be able to maintain and verify their own security without having to rely on the trust of the cloud provider.
Resumo:
This paper outlines some of the issues faced by School-Based Youth Health Nurses working in Queensland, in relation to the legal principles surrounding the provision of reproductive and sexual health advice. The paper outlines a number of specific issues faced by nurses working within this setting and considers the legal principles underpinning the issues concerning consent and confidentiality. The discussion in this paper demonstrates how the legal principles – which are often viewed as complex and uncertain by nurses working within this field – may be used as a guide to underpin good practice and compliance with the law. Although this paper is considered in the context of nurses working within Queensland, the principles and factors outlined are relevant to healthcare practitioners working within all Australian jurisdictions.
Resumo:
Introduction When it comes to sustainable economic development, it is hard to go past the thought of investment in information technology (IT). The foundation of sustainable economic development is sustainable infrastructure. This situation means that investment in IT is about developing sustainable IT infrastructure. An IT infrastructure is a set of IT tools on which organisations could develop applications to manage their varying business processes. At a national economic level, this is all about developing a national IT infrastructure to provide social and economic services to the various stakeholders. Current troubling economic times call for collaboration and centrality in IT infrastructure development. This notion has led to the idea of national broadband networks, sustainable telecommunication platforms, and national IT development plans and goals. However, these thoughts and actions do not directly impact the critical social and economic processes of organisations. That is, these thoughts set the tone and direction of actions
Resumo:
Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.
Resumo:
Enterprise resource planning (ERP) systems are rapidly being combined with “big data” analytics processes and publicly available “open data sets”, which are usually outside the arena of the enterprise, to expand activity through better service to current clients as well as identifying new opportunities. Moreover, these activities are now largely based around relevant software systems hosted in a “cloud computing” environment. However, the over 50- year old phrase related to mistrust in computer systems, namely “garbage in, garbage out” or “GIGO”, is used to describe problems of unqualified and unquestioning dependency on information systems. However, a more relevant GIGO interpretation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems based around ERP and open datasets as well as “big data” analytics, particularly in a cloud environment, the ability to verify the authenticity and integrity of the data sets used may be almost impossible. In turn, this may easily result in decision making based upon questionable results which are unverifiable. Illicit “impersonation” of and modifications to legitimate data sets may become a reality while at the same time the ability to audit any derived results of analysis may be an important requirement, particularly in the public sector. The pressing need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment is discussed in this paper. Some current and appropriate technologies currently being offered are also examined. However, severe limitations in addressing the problems identified are found and the paper proposes further necessary research work for the area. (Note: This paper is based on an earlier unpublished paper/presentation “Identity, Addressing, Authenticity and Audit Requirements for Trust in ERP, Analytics and Big/Open Data in a ‘Cloud’ Computing Environment: A Review and Proposal” presented to the Department of Accounting and IT, College of Management, National Chung Chen University, 20 November 2013.)
Resumo:
The concept of cloud computing services is appealing to the small and medium enterprises (SMEs), with the opportunity to acquire modern information technology resources as a utility and avoid costly capital investments in technology resources. However, the adoption of the cloud computing services presents significant challenges to the SMEs. The SMEs need to determine a path to adopting the cloud computing services that would ensure their sustainable presence in the cloud computing environment. Information about approaches to adopting the cloud computing services by the SMEs is fragmented. Through an interpretive design, we suggest that the SMEs need to have a strategic and incremental intent, understand their organizational structure, understand the external factors, consider the human resource capacity, and understand the value expectations from the cloud computing services to forge a successful path to adopting the cloud computing services. These factors would contribute to a model of cloud services for SMEs.