185 resultados para Managing Mountain Bicycling
Resumo:
Little published information exists about the issues involved in conducting complex intravenous medication therapy in patients' homes. An ethnographic study of a local hospital-in-the-home program in the Australian Capital Territory explored this phenomenon to identify those factors that had an impact on the use of medicine in the home environment. This article focuses on one of the three themes identified in the study-Clinical Practice. Within this theme, topics related to the organization and management of intravenous medications, geography and diversity of patient caseload, and communication in the practice setting are discussed. These findings have important implications for policy development and establishment of a research agenda for hospital-in-the-home services.
Resumo:
To provide valuable industry information with human resource applications, this study aimed to identify the minimum level of competency required within organisations to manage occupational road risk. Senior managers from four Australian organisations participated in individual semi-structured interviews. These senior managers were responsible for a combined workforce of approximately 46,000 and a combined fleet of approximately 20,000. The managers assessed a list of 39 safety management tasks that had previously been identified as critical to the management of Occupational Health and Safety (OHS) performance within the construction industry. From this list the managers perceived that organisational personnel required competency in at least 14 of the safety tasks to meet a minimum standard of road risk management. Managers perceived that a full understanding of at least six of these tasks was critical. These six tasks comprised: hazard identification and control; providing OHS information and instruction; incident investigations; inspections of workplace and work tasks; researching and reporting on OHS issues and strategies; and applying legislative OHS requirements. It is hoped that the core competencies identified in this study may assist in the development of an internationally accepted competency framework for managing occupational road risks. This proposed competency framework could have many applications including guiding the design of job descriptions, training curriculums, and employee performance assessments. To build upon this study, the authors recommend future research be conducted to identify the key competencies required to manage occupational road safety across a broad range of organisational contexts.
Resumo:
This paper illustrates the complexity of pointing as it is employed in a design workshop. Using the method of interaction analysis, we argue that pointing is not merely employed to index, locate, or fix reference to an object. It also constitutes a practice for reestablishing intersubjectivity and solving interactional trouble such as misunderstandings or disagreements by virtue of enlisting something as part of the participants’ shared experience. We use this analysis to discuss implications for how such practices might be supported with computer mediation, arguing for a “bricolage” approach to systems development that emphasizes the provision of resources for users to collaboratively negotiate the accomplishment of intersubjectivity ra- ther than systems that try to support pointing as a specific gestural action.
Resumo:
Background: General practitioners (GPs) and nurses are ideally placed to address the significant unmet demand for the treatment of cannabis-related problems given the numbers of people who regularly seek their care. The aim of this study was to evaluate differences between GPs and nurses’ perceived knowledge, beliefs, and behaviors toward cannabis use and its screening and management. Methods: This study involved 161 nurses and 503 GPs who completed a survey distributed via conference satchels to delegates of Healthed seminars focused on topics relevant to women and children’s health. Differences between GPs and nurses were analyzed using χ2- tests and two-sample t-tests, while logistic regression examined predictors of service provision. Results: GPs were more likely than nurses to have engaged in cannabis-related service provision, but also more frequently reported barriers related to time, interest, and having more important issues to address. Nurses reported less knowledge, skills, and role legitimacy. Perceived screening skills predicted screening and referral to alcohol and other drug (AOD) services, while knowing a regular user increased the likelihood of referrals only. Conclusions: Approaches to increase cannabis-related screening and intervention may be improved by involving nurses, and by leveraging the relationship between nurses and doctors, in primary care.
Resumo:
The Queensland government planning policies actively encourage increased dwelling density, sustainable infill development and transit oriented development to maximise land use and minimise urban sprawl. One of the detriments of such a policy is the potential for intensified residential development to create conflict between lawfully operating existing industrial uses and residences. In particular the government is concerned that intensified urban development will increase the risk of litigation from landowners and tenants detrimentally affected by the emission of aerosols, fumes, light, noise, odour, particles or smoke from existing industrial premises.
Resumo:
Most commonly, residents are always arguing about the satisfaction of sustainability and quality of their high rise residential property. Often, all the shortcomings and weaknesses will be blamed on the developers without considering the lack of knowledge management from the residents themselves. It is important, therefore, to show that knowledge management of the residents should be taken into account in relation to the satisfactory and the quality of the high rise residential property. This paper aims to discuss the resident’s knowledge management level of the high rise residential property in showing that resident’s knowledge management is really important to maintain the property at least. To evaluate this situation, the questionnaire surveys are being conducted. The paper analyses and structures the social science research on the importance of knowledge as a resource. The survey evidence demonstrates that, the resident’s knowledge management level was highly related in having high quality and sustainable high rise residential property in Johor Bahru.
Resumo:
The focus of governments on increasing active travel has motivated renewed interest in cycling safety. Bicyclists are up to 20 times more likely to be involved in serious injury crashes than drivers so understanding the relationship among factors in bicyclist crash risk is critically important for identifying effective policy tools, for informing bicycle infrastructure investments, and for identifying high risk bicycling contexts. This study aims to better understand the complex relationships between bicyclist self reported injuries resulting from crashes (e.g. hitting a car) and non-crashes (e.g. spraining an ankle) and perceived risk of cycling as a function of cyclist exposure, rider conspicuity, riding environment, rider risk aversion, and rider ability. Self reported data from 2,500 Queensland cyclists are used to estimate a series of seemingly unrelated regressions to examine the relationships among factors. The major findings suggest that perceived risk does not appear to influence injury rates, nor do injury rates influence perceived risks of cycling. Riders who perceive cycling as risky tend not to be commuters, do not engage in group riding, tend to always wear mandatory helmets and front lights, and lower their perception of risk by increasing days per week of riding and by increasing riding proportion on bicycle paths. Riders who always wear helmets have lower crash injury risk. Increasing the number of days per week riding tends to decrease both crash injury and non crash injury risk (e.g. a sprain). Further work is needed to replicate some of the findings in this study.
Resumo:
BACKGROUND: Although many studies have shown that high temperatures are associated with an increased risk of mortality and morbidity, there has been little research on managing the process of planned adaptation to alleviate the health effects of heat events and climate change. In particular, economic evaluation of public health adaptation strategies has been largely absent from both the scientific literature and public policy discussion. OBJECTIVES: his paper aims to discuss how public health organizations should implement adaptation strategies, and how to improve the evidence base for policies to protect health from heat events and climate change. DISCUSSION: Public health adaptation strategies to cope with heat events and climate change fall into two categories: reducing the heat exposure and managing the health risks. Strategies require a range of actions, including timely public health and medical advice, improvements to housing and urban planning, early warning systems, and the assurance that health care and social systems are ready to act. Some of these actions are costly, and the implementation should be based on the cost-effectiveness analysis given scarce financial resources. Therefore, research is required not only on the temperature-related health costs, but also on the costs and benefits of adaptation options. The scientific community must ensure that the health co-benefits of climate change policies are recognized, understood and quantified. CONCLUSIONS: The integration of climate change adaptation into current public health practice is needed to ensure they increase future resilience. The economic evaluation of temperature-related health costs and public health adaptation strategies are particularly important for policy decisions.
Resumo:
This article examines how therapists and clients manage the therapeutic relationship in online psychotherapy. Our study focuses on early sessions of therapy involving 22 therapist-client pairs participating in online Cognitive Behavioural Therapy (CBT) for depression. Using Conversation Analysis (CA), we examine how therapists can orient to clients’ contributions, while also retaining control of the therapeutic trajectory. We report two practices that therapists can use, at their discretion, following clients’ responses to requests for information. The first, thanking, accepts clients’ responses, orienting to the neutral affective valence of those responses. The second, commiseration, orients to the negative affective valence of clients’ responses. We argue that both practices are a means by which therapists can simultaneously manage developing rapport, while also retaining control of the therapeutic process.
Resumo:
The generation of a correlation matrix from a large set of long gene sequences is a common requirement in many bioinformatics problems such as phylogenetic analysis. The generation is not only computationally intensive but also requires significant memory resources as, typically, few gene sequences can be simultaneously stored in primary memory. The standard practice in such computation is to use frequent input/output (I/O) operations. Therefore, minimizing the number of these operations will yield much faster run-times. This paper develops an approach for the faster and scalable computing of large-size correlation matrices through the full use of available memory and a reduced number of I/O operations. The approach is scalable in the sense that the same algorithms can be executed on different computing platforms with different amounts of memory and can be applied to different problems with different correlation matrix sizes. The significant performance improvement of the approach over the existing approaches is demonstrated through benchmark examples.
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.