175 resultados para managing
Resumo:
BACKGROUND: Although many studies have shown that high temperatures are associated with an increased risk of mortality and morbidity, there has been little research on managing the process of planned adaptation to alleviate the health effects of heat events and climate change. In particular, economic evaluation of public health adaptation strategies has been largely absent from both the scientific literature and public policy discussion. OBJECTIVES: his paper aims to discuss how public health organizations should implement adaptation strategies, and how to improve the evidence base for policies to protect health from heat events and climate change. DISCUSSION: Public health adaptation strategies to cope with heat events and climate change fall into two categories: reducing the heat exposure and managing the health risks. Strategies require a range of actions, including timely public health and medical advice, improvements to housing and urban planning, early warning systems, and the assurance that health care and social systems are ready to act. Some of these actions are costly, and the implementation should be based on the cost-effectiveness analysis given scarce financial resources. Therefore, research is required not only on the temperature-related health costs, but also on the costs and benefits of adaptation options. The scientific community must ensure that the health co-benefits of climate change policies are recognized, understood and quantified. CONCLUSIONS: The integration of climate change adaptation into current public health practice is needed to ensure they increase future resilience. The economic evaluation of temperature-related health costs and public health adaptation strategies are particularly important for policy decisions.
Resumo:
This article examines how therapists and clients manage the therapeutic relationship in online psychotherapy. Our study focuses on early sessions of therapy involving 22 therapist-client pairs participating in online Cognitive Behavioural Therapy (CBT) for depression. Using Conversation Analysis (CA), we examine how therapists can orient to clients’ contributions, while also retaining control of the therapeutic trajectory. We report two practices that therapists can use, at their discretion, following clients’ responses to requests for information. The first, thanking, accepts clients’ responses, orienting to the neutral affective valence of those responses. The second, commiseration, orients to the negative affective valence of clients’ responses. We argue that both practices are a means by which therapists can simultaneously manage developing rapport, while also retaining control of the therapeutic process.
Resumo:
The generation of a correlation matrix from a large set of long gene sequences is a common requirement in many bioinformatics problems such as phylogenetic analysis. The generation is not only computationally intensive but also requires significant memory resources as, typically, few gene sequences can be simultaneously stored in primary memory. The standard practice in such computation is to use frequent input/output (I/O) operations. Therefore, minimizing the number of these operations will yield much faster run-times. This paper develops an approach for the faster and scalable computing of large-size correlation matrices through the full use of available memory and a reduced number of I/O operations. The approach is scalable in the sense that the same algorithms can be executed on different computing platforms with different amounts of memory and can be applied to different problems with different correlation matrix sizes. The significant performance improvement of the approach over the existing approaches is demonstrated through benchmark examples.
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.
Resumo:
This study analyses young gay men's identity management in social networking sites Gaydar and Facebook. It examines the expanded opportunities for identity management made available through the convergence of these spaces, as well as new privacy and safety concerns. Findings from this study are discussed in terms of their significance for gay men's digital culture, the approach to gay men's mental health taken by GLBT organisations and support groups, and within broader concerns around social networking sites and digital inequality.
Resumo:
TO THE EDITOR: It was with great interest that I read two recent articles by de Raaf et al1, and Bruera et al2. These authors are to be congratulated for completing two of the very few high quality randomized trials that evaluate complex interventions for managing fatigue in patients with advanced cancer. de Raaf et al conducted a non-blinded RCT with 152 patients with advanced cancer and reported significant reduction of fatigue in patients who received a nurse-led monitoring and protocol-guided treatment of physical symptoms compared with those who received usual care1. Patients who received this intervention experienced a significant improvement over time in general fatigue, at one-month follow-up and two-month follow-up. Another recent RCT conducted with 141 patients with advanced cancer by Bruera et al2 did not find any benefits of a nursing telephone intervention that involved systematic symptom assessment/management, medication review, psychosocial support and patient education in fatigue reduction, compared to those who received a control telephone intervention conducted by a non-professional...
Resumo:
Project Management (PM) as an academic field is relatively new in Australian universities. Moreover, the field is distributed across four main areas: business (management), built environment and construction, engineering and more recently ICT (information systems). At an institutional level, with notable exceptions, there is little engagement between researchers working in those individual areas. Consequently, an initiative was launched in 2009 to create a network of PM researchers to build a disciplinary base for PM in Australia. The initiative took the form of a bi-annual forum. The first forum established the constituency and spread of PM research in Australia (Sense et al., 2011). This special issue of IJPM arose out of the second forum, held in 2012, that explored the notion of an Australian perspective on PM. At the forum, researchers were invited to collaborate to explore issues, methodological approaches, and theoretical positions underpinning their research and to answer the question: is there a distinctly Australian research agenda which responds to the current challenges of large and complex projects in our region? From a research point of view, it was abundantly clear at the forum that many of the issues facing Australian researchers are shared around the world. However, what emerged from the forum as the Australian perspective was a set of themes and research issues that dominate the Australia research agenda.
Resumo:
For the past two decades the concept of managing individual difference in the workforce has been popular in many Western organizations, with calls to manage this "diversity" for the greater good of the organization and the\ individuals in it. Paradoxically, there is no agreed definition for this concept, and its description remains unclear and often contested (Jensen, Maznevski & Schneider 2011). Indeed, a range of terms is used, including diversity: diversity at work, managing diversity, diversity management, workplace diversity, productive diversity, and so forth. The foundation of the concept of managing diversity is the idea that an organization's workforce displays a range of “diverse” characteristics. The characteristics that are included under the heading Of "diversity" vary.
Resumo:
The market of building retrofits is increasingly more intensified as existing buildings are aging. The building retrofit projects involve existing buildings which impose constraints on stakeholders throughout the project process. They are also risky, complex, less predictable and difficult to be well planned with on-site waste becoming one of the critical issues. Small and Medium Enterprises (SMEs) carry out most of the work in retrofit projects as subcontractors, but they often do not have adequate resources to deal with the specific technical challenges and project risks related to waste. This paper first discusses the requirements of waste management in building retrofit projects considering specific project characteristics and work natures, and highlights the importance of involving SMEs in waste planning and management through an appropriate way. By utilizing semi-structured interviews, this research develops a process model for SMEs to be applied in waste management. A collaboration scenario is also developed for collaborative waste planning and management by SMEs as subcontractors and large companies as main contractors. Findings from the paper will promote coordination of project delivery and waste management in building retrofit projects, and improve the involvement and performance of SMEs in dealing with waste problems.
Resumo:
This paper compares the urbanization and planning in the two sunshine states of Florida and Queensland highlighting the similarities and differences, evaluates how effective the growth management programs have been, and examines the recent changes and the challenges they bring to the respective states.
Resumo:
Purpose The use of intravascular devices is associated with a number of potential complications. Despite a number of evidence-based clinical guidelines in this area, there continues to be nursing practice discrepancies. This study aims to examine nursing practice in a cancer care setting to identify nursing practice and areas for improvement respective to best available evidence. Methods A point prevalence survey was undertaken in a tertiary cancer care centre in Queensland, Australia. On a randomly selected day, four nurses assessed intravascular device related nursing practices and collected data using a standardized survey tool. Results 58 inpatients (100%) were assessed. Forty-eight (83%) had a device in situ, comprising 14 Peripheral Intravenous Catheters (29.2%), 14 Peripherally Inserted Central Catheters (29.2%), 14 Hickman catheters (29.2%) and six Port-a-Caths (12.4%). Suboptimal outcomes such as incidences of local site complications, incorrect/inadequate documentation, lack of flushing orders, and unclean/non intact dressings were observed. Conclusions This study has highlighted a number of intravascular device related nursing practice discrepancies compared with current hospital policy. Education and other implementation strategies can be applied to improve nursing practice. Following education strategies, it will be valuable to repeat this survey on a regular basis to provide feedback to nursing staff and implement strategies to improve practice. More research is required to provide evidence to clinical practice with regards to intravascular device related consumables, flushing technique and protocols.
Resumo:
In Australia, as elsewhere, universities are being encouraged to grow their postgraduate research candidature base while at the same time there is increasing pressure on resources with which to manage the burgeoning groups. In this environment HDR supervision strategies are seen as increasingly important as research managers seek the best possible ‘fit’ for an applicant: the candidate who will provide a sound return on investment and demonstrate endurance in the pursuit of a timely completion.