123 resultados para control over life


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Abstract Background The quantum increases in home Internet access and available online health information with limited control over information quality highlight the necessity of exploring decision making processes in accessing and using online information, specifically in relation to children who do not make their health decisions. Objectives To understand the processes explaining parents’ decisions to use online health information for child health care. Methods Parents (N = 391) completed an initial questionnaire assessing the theory of planned behaviour constructs of attitude, subjective norm, and perceived behavioural control, as well as perceived risk, group norm, and additional demographic factors. Two months later, 187 parents completed a follow-up questionnaire assessing their decisions to use online information for their child’s health care, specifically to 1) diagnose and/or treat their child’s suspected medical condition/illness and 2) increase understanding about a diagnosis or treatment recommended by a health professional. Results Hierarchical multiple regression showed that, for both behaviours, attitude, subjective norm, perceived behavioural control, (less) perceived risk, group norm, and (non) medical background were the significant predictors of intention. For parents’ use of online child health information, for both behaviours, intention was the sole significant predictor of behaviour. The findings explain 77% of the variance in parents’ intention to treat/diagnose a child health problem and 74% of the variance in their intentions to increase their understanding about child health concerns. Conclusions Understanding parents’ socio-cognitive processes that guide their use of online information for child health care is important given the increase in Internet usage and the sometimes-questionable quality of health information provided online. Findings highlight parents’ thirst for information; there is an urgent need for health professionals to provide parents with evidence-based child health websites in addition to general population education on how to evaluate the quality of online health information.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The professional project of social work assumes a particular orientation to human agency on the part of social workers. Specifically, the social work educational literature focusing on the nature of the profession suggests that social workers exert considerable control over the means and ends of their practice. In this paper we ask whether this assumption is warranted. While we conceptualise this issue as relevant to the entire spectrum of professional social work practice, here we discuss our claim in relation to social workers adopting policy activist roles. We suggest that the actual engagement of social workers in policy practice and political change in liberal democracies is muted and we canvas a number of reasons that help explain why this is the case. We canvas the impact of naive conceptualisations of what we call the ‘heroic agency’ of social work identity as employed in texts used in pre-service social work education. Specifically we pose the thesis that new social work graduates, when immersed into the organisational rationalities of reconfigured ‘welfare states’, may experience a considerable mismatch between the promise of being a social change agent and their experience as a beginning practitioner, making it difficult for them to confidently articulate their political identity and purpose.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We conducted an exploratory study of a mobile energy monitoring tool: The Dashboard. Our point of departure from prior work was the emphasis of end-user customisation and social sharing. Applying extensive feedback, we deployed the Dashboard in real-world conditions to socially linked research participants for a period of five weeks. Participants were encouraged to devise, construct, place, and view various data feeds. The aim of our study was to test the assumption that participants, having control over their Dashboard configuration, would engage, and remain engaged, with their energy feedback throughout the trial. Our research points to a set of design issues surrounding the adoption and continued use of such tools. A novel finding of our study is the impact of social links between participants and their continued engagement with the Dashboard. Our results also illustrate the emergence of energy-voyeurism, a form of social energy monitoring by peers.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This study examined emotional climate in relation to the teaching and learning of grade 7 science. A multi-method and multi-theoretic approach used sociocultural frameworks as a foundation for interpretive research, conversation analysis, prosody analysis, and studies of nonverbal conduct. Emotional climate varied continuously throughout a lesson. Dialogues occurred and afforded learning when interactions between the teacher and students were fluent and included humour and collective effervescence. Emotional climate was negatively valenced when the teacher and/or students endeavoured to establish and maintain power by restricting others’ participation to spectator roles. The teacher’s endeavours to maintain and establish control over students were potentially detrimental to teaching and learning, teachers and learners. This type of teaching gradually evolved into a form we referred to as cranky teaching, whereby the teacher and her students showed signs of frustration and the enacted teaching and learning roles lacked fluency. The methods we pioneered in the present study might be helpful for other teachers who wish to participate in research on their classes to ascertain what works and should be strengthened, and identify practices and rituals that are deleterious and in need of change.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Information privacy is a crucial aspect of eHealth. Appropriate privacy management measures are therefore essential for its success. However, traditional measures for privacy preservation such as rigid access controls (i.e., preventive measures) are not suitable to eHealth because of the specialised and information - intensive nature of healthcare itself, and the nature of the information. Healthcare professionals (HCP) require easy, unrestricted access to as much information as possible towards making well - informed decisions. On the other end of the scale however, consumers (i.e., patients) demand control over their health information and raise concerns for privacy arising from internal activities (i.e., information use by HCPs). A proper balance of these competing concerns is vital for the implementation of successful eHealth systems. Towards reaching this balance, we propose an information accountability framework (IAF) for eHealth systems.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

As a result of growing evidence regarding the effects of environmental characteristics on the health and wellbeing of people in healthcare facilities (HCFs), more emphasis is being placed on, and more attention being paid to, the consequences of design choices in HCFs. Therefore, we have critically reviewed the implications of key indoor physical design parameters, in relation to their potential impact on human health and wellbeing. In addition, we discussed these findings within the context of the relevant guidelines and standards for the design of HCFs. A total of 810 abstracts, which met the inclusion criteria, were identified through a Pubmed search, and these covered journal articles, guidelines, books, reports and monographs in the studied area. Of these, 231 full publications were selected for this review. According to the literature, the most beneficial design elements were: single-bed patient rooms, safe and easily cleaned surface materials, sound-absorbing ceiling tiles, adequate and sufficient ventilation, thermal comfort, natural daylight, control over temperature and lighting, views, exposure and access to nature, and appropriate equipment, tools and furniture. The effects of some design elements, such as lighting (e.g. artificial lighting levels) and layout (e.g. decentralized versus centralized nurses’ stations), on staff and patients vary, and “the best design practice” for each HCF should always be formulated in co-operation with different user groups and a multi-professional design team. The relevant guidelines and standards should also be considered in future design, construction and renovations, in order to produce more favourable physical indoor environments in HCFs.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Research Question: What relationships exist between general self efficacy, locus of control and the nursing practice environment and caring efficacy and job satisfaction? Background: Important characteristics of current nursing practice include nurses having the ability to develop and continue therapeutic relationships with patients, nurses having autonomy and control over the practice environment and nurses having more involvement in decision making. In addition, employee satisfaction is enhanced when organisations offer access to authority. Despite this, nurses continue to complain of feeling powerless in their ability to make decisions. Sample: The study population and criteria for selection included Registered Nurses in Australia who were at the time members of an Australian professional and industrial organisation. Methods: A cross-sectional survey was undertaken. Data analysis was conducted using descriptive and bivariate statistics, and structural equation modelling. Results: The model fit the data well (χ² = 2.3594, χ²/df = 2.3594 and CFI = 0.9987). Twenty four percent of variation in caring efficacy (CE) can be accounted for by general self-efficacy (GSE); work locus of control (WLC) and practice environment (PE) and 62% of the variation in job satisfaction (JS) can be accounted for by GSE, WLC and PE. All pathways were found to be significant except PE to CE. GSE positively explained CE (β = 0.38). WLC was negatively related to CE i.e., as CE scores increased WLC scores decreased (β = -0.23). Further testing of the model found CE was positively related to GSE (βZ = 0.38, p < 0.001) and negatively related to WLC (βZ = - 0.23, p = 0.001). PE was not significantly associated with CE (βZ = - 0.01, p = 0.85). JS was explained by PE, which was positively related (βZ = 0.69, p = < 0.001); GSE which was negatively related (βZ - 0 .09, p < 0.001) and WLC, which was also negatively related (βZ = - 0.20, p < 0.001). Implications for Practice Nursing and organisational leaders should ensure the development of strategies for professional development and orientation programmes which may enhance nurses’ ability to develop caring relationships and express caring behaviours to their patients and as a result improve organisational and patient outcomes. Nursing shortages and turnover rates are associated with job satisfaction and the nursing practice environment. Improving the nursing environment can produce benefits to the health system such as better job satisfaction, improved workforce retention and better patient outcomes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how protect their own privacy through online mechanisms. What is required is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting user’s personal information. The research has posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online information systems.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Current literature warns organisations about a global ageing phenomenon. Workplace ageing is causing a diminishing work pool which has consequences for a sustainable workforce in the future. This phenomenon continues to impact on local government councils in Australia. Australia has one of the world’s most rapidly ageing populations, and there is evidence that Australian local government councils are already resulting in an unsustainable workforce. Consequently, this research program investigated the role of older workers in the Queensland local government workplace in enabling them to extend their working lives towards transitional employment and a sustainable workforce in the future. Transitional Employment is intended as a strategy for enabling individuals to have greater control over their employment options and their employability during the period leading to their final exit from the workforce. There was no evidence of corporate support for older workers in Queensland local government councils other than tokenistic government campaigns encouraging organisations to "better value their older workers". (Queensland Government, 2007d, p.6). TE is investigated as a possible intervention for older workers in the future. The international and national literature review reflected a range of matters impacting on current older workers in the workforce and barriers preventing them from accessing services towards extending their employment beyond the traditional retirement age (60 years) as defined by the Australian Government; an age when individuals can access their superannuation. Learning and development services were identified as one of those barriers. There was little evidence of investment in or consistent approaches to supporting older workers by organisations. Learning and development services appeared at best to be ad hoc, reactive to corporate productivity and outputs with little recognition of the ageing phenomenon (OECD, 2006, p.23) and looming skills and labour shortages (ALGA, 2006, p. 19). Themes from the literature review led to the establishment of three key research questions: 1. What are the current local government workforce issues impacting on skills and labour retention? 2. What are perceptions about the current workplace environment? And, 3. What are the expectations about learning and development towards extending employability of older workers within the local government sector? The research questions were explored by utilising three qualitative empirical studies, using some numerical data for reporting and comparative analysis. Empirical Study One investigated common themes for accessing transitional employment and comprised two phases. A literature review and Study One data analysis enabled the construction of an initial Transitional Employment Model which includes most frequent themes. Empirical Study Two comprised focus groups to further consider those themes. This led to identification of issues impacting the most on access to learning and development by older workers and towards a revised TEM. Findings presented majority support for transitional employment as a strategy for supporting older workers to work beyond their traditional retirement age. Those findings are presented as significant issues impacting on access to transitional employment within the final 3-dimensionsal TEM. The model is intended as a guide for responding to an ageing workforce by local government councils in the future. This study argued for increased and improved corporate support, particularly for learning and development services for older workers. Such support will enable older workers to maintain their employability and extend their working lives; a sustainable workforce in the future.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Several randomized trials have found behavior change programs delivered via text messaging to be efficacious to improve preventive health behaviors such as physical activity and stopping smoking; however few have assessed its value in skin cancer prevention or early detection. The HealthyTexts study enrolled 678 participants 18–42 years, and assigned them to receive 21 text messages about skin cancer prevention, skin self-examination or physical activity(attention control) over the course of one year. Baseline data have been collected and outcomes will be assessed at three months and twelve months post intervention. The trial aims to increase the mean overall sun protection habits index score from 2.3 to 2.7 with a standard deviation of 0.5 (effect size of 0.5) and the proportion of people who conduct a whole-body skin self-examination by an absolute 10%. This paper describes the study design and participants' baseline characteristics. In addition, participants' goals for their health, and strategies they apply to achieve those goals are summarized.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Predicate encryption is a new primitive that supports flexible control over access to encrypted data. We study predicate encryption systems, evaluating a wide class of predicates. Our systems are more expressive than the existing attribute-hiding systems in the sense that the proposed constructions support not only all existing predicate evaluations but also arbitrary conjunctions and disjunctions of comparison and subset queries. Toward our goal, we propose encryption schemes supporting multi-inner-product predicate and provide formal security analysis. We show how to apply the proposed schemes to achieve all those predicate evaluations.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper examines the extent to which patients who have been diagnosed as having terminal cancer choose to use non-medical therapies. In particular it is concerned with the illness behaviour of patients who are receiving conventional cytotoxic drug and radiation treatments, who also decide to use a wide range of ‘alternative’ medications and therapies. The paper discusses the findings of a study of 152 patients with metastatic cancer that examined the extent to which they used alternative cancer therapies, as well as the beliefs and attitudes they have about their cancer, its treatment, and the practitioners providing that treatment. Four groups of users of alternative therapies, who differ according to their commitment to and the type of therapies they use, were identified. Results of logistic regression analyses indicate that those using alternative therapies were different in range of social attitudes. These differences were primarily their greater reported ‘will to live’ and desire for control over treatment decisions, and the differing beliefs they hold about their disease.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Gelatin-methacrylamide (gelMA) hydrogels are shown to support chondrocyte viability and differentiation and give wide ranging mechanical properties depending on several cross-linking parameters. Polymer concentration, UV exposure time, and thermal gelation prior to UV exposure allow for control over hydrogel stiffness and swelling properties. GelMA solutions have a low viscosity at 37 °C, which is incompatible with most biofabrication approaches. However, incorporation of hyaluronic acid (HA) and/or co-deposition with thermoplastics allows gelMA to be used in biofabrication processes. These attributes may allow engineered constructs to match the natural functional variations in cartilage mechanical and geometrical properties.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Rises recorded for girls’ violence in countries like Australia, Canada, United Kingdom and United States have been hotly contested. One view is these rising rates of violence are an artefact of new forms of policy, policing, criminalisation and social control over young women. Another view is that young women may indeed have become more violent as they have increasingly participated in youth subcultural activities involving gangs and drugs, and cyber‐cultural activities that incite and reward girls’ violence. Any comprehensive explanation will need to address how a complex interplay of cultural, social, behavioural, and policy responses contribute to these rises. This article argues that there is no singular cause, explanation or theory that accounts for the rises in adolescent female violence, and that many of the simple explanations circulating in popular culture are driven by an anti‐feminist ideology. By concentrating on females as victims of violence and very rarely as perpetrators, feminist criminology has for the most part ducked the thorny issue of female violence, leaving a discursive space for anti‐feminist sentiment to reign. The article concludes by arguing the case for developing a feminist theory of female violence.