258 resultados para privacy protection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we advocate for the continued need for consumer protection and fair trading regulation, even in competitive markets. For the purposes of this paper a ‘competitive market’ is defined as one that has low barriers to entry and exit, with homogenous products and services and numerous suppliers. Whilst competition is an important tool for providing consumer benefits, it will not be sufficient to protect at least some consumers, particularly vulnerable, low income consumers. For this reason, we argue, setting competition as the ‘end goal’ and assuming that consumer protection and consumer benefits will always follow, is a flawed regulatory approach. The ‘end goal’ should surely be consumer protection and fair markets, and a combination of competition law and consumer protection law should be applied in order to achieve those goals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a context where over-indebtedness and financial exclusion have been recognised as problems in Australia, it is undesirable that those who can least afford it, pay a high cost for short-term consumer credit. Evidence points to an increase in consumer debt in Australia and consequential over-indebtedness which has been shown to lead to a wide range of social problems.2 There is also evidence of financial exclusion, where consumers suffer a lack of access to mainstream financial services, and in Australia this is particularly the case with regard to access to safe and affordable credit.3 Financial exclusion can only exacerbate over-indebtedness, given that financially excluded, predominantly low income consumers , have been shown to turn to high cost credit to meet their short term credit needs. This is a problem that has been explored most recently in the Victorian Consumer Credit Review...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Apart from helmets, little is known about the effectiveness of motorcycle protective clothing in reducing injuries in crashes. The study aimed to quantify the association between usage of motorcycle clothing and injury in crashes. Methods and findings Cross-sectional analytic study. Crashed motorcyclists (n = 212, 71% of identified eligible cases) were recruited through hospitals and motorcycle repair services. Data was obtained through structured face-to-face interviews. The main outcome was hospitalization and motorcycle crash-related injury. Poisson regression was used to estimate relative risk (RR) and 95% confidence intervals for injury adjusting for potential confounders. Results Motorcyclists were significantly less likely to be admitted to hospital if they crashed wearing motorcycle jackets (RR = 0.79, 95% CI: 0.69–0.91), pants (RR = 0.49, 95% CI: 0.25–0.94), or gloves (RR = 0.41, 95% CI: 0.26–0.66). When garments included fitted body armour there was a significantly reduced risk of injury to the upper body (RR = 0.77, 95% CI: 0.66–0.89), hands and wrists (RR = 0.55, 95% CI: 0.38–0.81), legs (RR = 0.60, 95% CI: 0.40–0.90), feet and ankles (RR = 0.54, 95% CI: 0.35–0.83). Non-motorcycle boots were also associated with a reduced risk of injury compared to shoes or joggers (RR = 0.46, 95% CI: 0.28–0.75). No association between use of body armour and risk of fracture injuries was detected. A substantial proportion of motorcycle designed gloves (25.7%), jackets (29.7%) and pants (28.1%) were assessed to have failed due to material damage in the crash. Conclusions Motorcycle protective clothing is associated with reduced risk and severity of crash related injury and hospitalization, particularly when fitted with body armour. The proportion of clothing items that failed under crash conditions indicates a need for improved quality control. While mandating usage of protective clothing is not recommended, consideration could be given to providing incentives for usage of protective clothing, such as tax exemptions for safety gear, health insurance premium reductions and rebates.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objectives: To quantify the concordance of hospital child maltreatment data with child protection service (CPS) records and identify factors associated with linkage. Methods: Multivariable logistic regression analysis was conducted following retrospective medical record review and database linkage of 884 child records from 20 hospitals and the CPS in Queensland, Australia. Results: Nearly all children with hospital assigned maltreatment codes (93.1%) had a CPS record. Of these, 85.1% had a recent notification. 29% of the linked maltreatment group (n=113) were not known to CPS prior to the hospital presentation. Almost 1/3 of children with unintentional injury hospital codes were known to CPS. Just over 24% of the linked unintentional injury group (n=34) were not known to CPS prior to the hospital presentation but became known during or after discharge from hospital. These estimates are higher than the 2006/07 annual rate of 2.39% of children being notified to CPS. Rural children were more likely to link to CPS, and children were over 3 times more likely to link if the index injury documentation included additional diagnoses or factors affecting their health. Conclusions: The system for referring maltreatment cases to CPS is generally efficient, although up to 1 in 15 children had codes for maltreatment but could not be linked to CPS data. The high proportion of children with unintentional injury codes who linked to CPS suggests clinicians and hospital-based child protection staff should be supported by further education and training to ensure children at risk are being detected by the child protection system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: To assess the recall of media reports about vitamin D and associated factors. Methods: Analysis of cross-sectional telephone interview data (2,001 Queensland adults, 18-70 years) on vitamin D and personal sun protection, recall of media reports and participant characteristics. Results: 83.7% of participants had heard of vitamin D, 47.5% through the media. Only 513 (25.6%) participants recalled the media content within four main themes: vitamin D is beneficial/comes from the sun (47.0%); some people aren’t getting enough vitamin D, need more sun (27.9%); need to balance sun exposure and skin protection (11.5%); or other (13.6%). Only 65 of the 950 participants (6.8%) reported a change to their behaviour(s) due to the media report. Conclusion: Although the media were the main source of information about vitamin D for almost 50% of participants, recall of the content and direct effect on behaviour was low. Only a small minority recalled a balanced media report of beneficial and harmful aspects of sun exposure. Implications Health professionals often supply media with background information. To achieve best public health practice for sun protection and vitamin D, information to foster balanced media reports should be provided.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The relationship between the environment and human rights has long been recognised. It is now largely accepted that a ‘good’ environment is a necessary precondition for the enjoyment of a wide range of human rights, including the right to health, the right to an adequate standard of living, and even the right to life. It has even been suggested that as humans we all possess a right to live in an environment of a certain standard, based on the intrinsic value of the natural world to all human beings. In this context much has been written regarding the important role that the environment plays in human lives. This paper looks at the flip-side of this discussion, and examines what human rights can do for the environment. It is argued that, while there are valid criticisms for linking environmental protection too strongly to human needs, there is nonetheless much to be gained from using human rights law as a framework to achieve environmental protection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2001, amendments to the Migration Act 1958 (Cth) made possible the offshore processing of protection claims. The same amendments also foreshadowed the processing of claims by ‘offshore entry persons’ in Australia according to non-statutory procedures. After disbanding offshore processing the then Rudd Labor Government commenced processing of protection claims by ‘offshore entry persons’ in Australia under the Refugee Status Assessment process (RSA). The RSA process sought to substitute well established legislative criteria for the grant of a protection visa, as interpreted by the courts, with administrative guidelines and decision-making immune from judicial review. This approach was rejected by the High Court in the cases M61 and M69. This article analyses these developments in light of Australia’s international protection obligations, as well as considering the practical obstacles that continue to confront offshore entry persons as they pursue judicial review of adverse refugee status determinations after the High Court’s decision.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Patient privacy and confidentiality (PPaC) is an important consideration for nurses and other members of the health care team. Can a patient expect to have confidentiality and in particular privacy in the current climate of emergency health care? Do staff who work in the Emergency Department (ED) see confidentiality as an important factor when providing emergency care? These questions are important to consider. Methods: This is a two phased quality improvement project, developed and implemented over a six month period in a busy regional, tertiary referral ED. Results: Issues identified for this department included department design and layout, overcrowding due to patient flow and access block, staff practices and department policies which were also impacted upon by culture of the team, and use of space. Conclusions: Changes successful in improving this issue include increased staff awareness about PPaC, intercom paging prior to nursing handover to remove visitors during handover, one visitor per patient policy, designated places for handover, allocated bed space for patient reviews/assessment and a strategy to temporarily move the patient if procedures would have been undertaken in shared bed space. These are important issues when considering policy, practice and department design in the ED.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Notwithstanding the obvious potential advantages of information and communications technology (ICT) in the enhanced provision of healthcare services, there are some concerns associated with integration of and access to electronic health records. A security violation in health records, such as an unauthorised disclosure or unauthorised alteration of an individual's health information, can significantly undermine both healthcare providers' and consumers' confidence and trust in e-health systems. A crisis in confidence in any national level e-health system could seriously degrade the realisation of the system's potential benefits. In response to the privacy and security requirements for the protection of health information, this research project investigated national and international e-health development activities to identify the necessary requirements for the creation of a trusted health information system architecture consistent with legislative and regulatory requirements and relevant health informatics standards. The research examined the appropriateness and sustainability of the current approaches for the protection of health information. It then proposed an architecture to facilitate the viable and sustainable enforcement of privacy and security in health information systems under the project title "Open and Trusted Health Information Systems (OTHIS)". OTHIS addresses necessary security controls to protect sensitive health information when such data is at rest, during processing and in transit with three separate and achievable security function-based concepts and modules: a) Health Informatics Application Security (HIAS); b) Health Informatics Access Control (HIAC); and c) Health Informatics Network Security (HINS). The outcome of this research is a roadmap for a viable and sustainable architecture for providing robust protection and security of health information including elucidations of three achievable security control subsystem requirements within the proposed architecture. The successful completion of two proof-of-concept prototypes demonstrated the comprehensibility, feasibility and practicality of the HIAC and HIAS models for the development and assessment of trusted health systems. Meanwhile, the OTHIS architecture has provided guidance for technical and security design appropriate to the development and implementation of trusted health information systems whilst simultaneously offering guidance for ongoing research projects. The socio-economic implications of this research can be summarised in the fact that this research embraces the need for low cost security strategies against economic realities by using open-source technologies for overall test implementation. This allows the proposed architecture to be publicly accessible, providing a platform for interoperability to meet real-world application security demands. On the whole, the OTHIS architecture sets a high level of security standard for the establishment and maintenance of both current and future health information systems. This thereby increases healthcare providers‘ and consumers‘ trust in the adoption of electronic health records to realise the associated benefits.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A microgrid provides economical and reliable power to customers by integrating distributed resources more effectively. Islanded operation enables a continuous power supply for loads during a major grid disturbance. Reliability of a microgrid can be further increased by forming a mesh configuration. However, the protection of mesh microgrids is a challenging task. In this paper, protection schemes are discussed using current differential protection of a microgrid. The protection challenges associated with bi-directional power flow, meshed configuration, changing fault current level due to intermittent nature of DGs and reduced fault current level in an islanded mode are considered in proposing the protection solutions. Relay setting criterion and current transformer (CT) selection guidelines are also discussed. The results are verified using MATLAB calculations and PSCAD simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Client puzzles are moderately-hard cryptographic problems neither easy nor impossible to solve that can be used as a counter-measure against denial of service attacks on network protocols. Puzzles based on modular exponentiation are attractive as they provide important properties such as non-parallelisability, deterministic solving time, and linear granularity. We propose an efficient client puzzle based on modular exponentiation. Our puzzle requires only a few modular multiplications for puzzle generation and verification. For a server under denial of service attack, this is a significant improvement as the best known non-parallelisable puzzle proposed by Karame and Capkun (ESORICS 2010) requires at least 2k-bit modular exponentiation, where k is a security parameter. We show that our puzzle satisfies the unforgeability and difficulty properties defined by Chen et al. (Asiacrypt 2009). We present experimental results which show that, for 1024-bit moduli, our proposed puzzle can be up to 30 times faster to verify than the Karame-Capkun puzzle and 99 times faster than the Rivest et al.'s time-lock puzzle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the long term, with development of skill, knowledge, exposure and confidence within the engineering profession, rigorous analysis techniques have the potential to become a reliable and far more comprehensive method for design and verification of the structural adequacy of OPS, write Nimal J Perera, David P Thambiratnam and Brian Clark. This paper explores the potential to enhance operator safety of self-propelled mechanical plant subjected to roll over and impact of falling objects using the non-linear and dynamic response simulation capabilities of analytical processes to supplement quasi-static testing methods prescribed in International and Australian Codes of Practice for bolt on Operator Protection Systems (OPS) that are post fitted. The paper is based on research work carried out by the authors at the Queensland University of Technology (QUT) over a period of three years by instrumentation of prototype tests, scale model tests in the laboratory and rigorous analysis using validated Finite Element (FE) Models. The FE codes used were ABAQUS for implicit analysis and LSDYNA for explicit analysis. The rigorous analysis and dynamic simulation technique described in the paper can be used to investigate the structural response due to accident scenarios such as multiple roll over, impact of multiple objects and combinations of such events and thereby enhance the safety and performance of Roll Over and Falling Object Protection Systems (ROPS and FOPS). The analytical techniques are based on sound engineering principles and well established practice for investigation of dynamic impact on all self propelled vehicles. They are used for many other similar applications where experimental techniques are not feasible.