178 resultados para Private ICT


Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: Public hospital EDs in Australia have become increasingly congested because of increasing demand and access block. Six per cent of ED patients attend private hospital EDs whereas 45% of the population hold private health insurance. OBJECTIVES: This study describes the patients attending a small selection of four private hospital EDs in Queensland and Victoria, and tests the feasibility of a private ED database. METHODS: De-identified routinely collected patient data were provided by the four participating private hospital and amalgamated into a single data set. RESULT: The mean age of private ED patients was 52 years. Males outnumbered females in all age groups except > 80 years. Attendance was higher on weekends and Mondays, and between 08.00 and 20.00 h. There were 6.6% of the patients triaged as categories 1 and 2, and 60% were categories 4 or 5. There were 36.4% that required hospital admission. Also, 96% of the patients had some kind of insurance. Furthermore, 72% were self-referred and 12% were referred by private medical practitioners. Approximately 25% arrived by ambulance. There were 69% that completed their ED treatment within 4 h. CONCLUSION: This study is the first public description of patients attending private EDs in Australia. Private EDs have a significant role to play in acute medical care and in providing access to private hospitals which could alleviate pressure on public EDs. This study demonstrates the need for consolidated data based on a consistent data set and data dictionary to enable system-wide analysis, benchmarking and evaluation

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PAFs are trusts to which taxpayers can make tax deductible donations.1 The term private ancillary fund is defined in the taxation legislation and has some similarities with the US private family foundation. This new arrangement allows families, businesses and individuals to create a tax effective closely held charitable trust which was not possible prior to the initiative. The sole purpose of a PAF must be to provide money, property or benefits to funds, authorities or institutions, which are deductible gift recipients (DGRs).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Australia, the decision to home educate is becoming increasingly popular (cf. Townsend, 2012). The popularity of home education is in spite of a large number of publically funded, financially affordable private and public schools that offer a range of educational alternatives to parents (cf. English, 2009). In spite of its increasing popularity, the reasons home education is chosen by Australian families is under-researched (cf. Jackson & Allan, 2010). This paper reports on a case study that set out to explore the reasons Australian parents choose to home educate and whether this decision is related to the choice of a private school in Australia. In-depth, qualitative interviews were conducted with a group of home education families in one of Australia’s most populated cities. Data were thematically analysed. The analysis revealed that there were similarities between the discourses of parents who privately educate and parents who home educate. In particular, it reveals the parents’ fears about schools, their negative experiences of schools and their hopes for their children’s futures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses the ethical consequences of employing virtual ethnography to observe human behaviour in open online communities. In this paper, we discuss the nature of the online community being studied as well as the lessons learned from both literature and also the ethical clearance application process undertaken by the research team. A key finding was that despite the community being open to the public, generally community members expected the research team to employ strategies similar to those required when dealing with a private community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"This book examines the growing trend of recognition and practices of CSR in private enterprises in developing countries. It identifies the challenges and deficiencies in these practices and proposes means for improvement. Based on a sound theoretical foundation, this book focusses on the case of Bangladesh and the ready-made garment industry to exemplify the described developments. After a brief introduction the book outlines the standards of Corporate Social Responsibility. It compares the trends in CSR practices both in developed and developing countries and then embarks on CSR practices in the private sector in Bangladesh to finally present a detailed analysis of CSR and its practices in the ready-made garment industry. The book not only compares developing countries with developed, but as well provides an assessment and analysis of different stages of CSR within the South Asian area."--published website

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper explores the concept of social exclusion as it impacts on young people within their local communities and the wider British, European and Australian context in terms of surveillance and other control measures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The thesis is a comparative study of ICTs and Internet use of Australian and Malaysian early childhood teachers in terms of their personal and professional comfort with ICTs, pedagogical beliefs, and their reported classroom practice. The study discovered teachers from both countries as relatively comfortable with digital technologies and the Internet, with most teachers held positive beliefs about ICT usage. The structural barriers in classrooms include lack of Internet access and the wide gap that exists between teachers’ positive beliefs and classroom practice. The study suggests the need for strategic and targeted professional development for teachers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Private-sector organizations play a critical role in shaping the food environments of individuals and populations. However, there is currently very limited independent monitoring of private-sector actions related to food environments. This paper reviews previous efforts to monitor the private sector in this area, and outlines a proposed approach to monitor private-sector policies and practices related to food environments, and their influence on obesity and non-communicable disease (NCD) prevention. A step-wise approach to data collection is recommended, in which the first (‘minimal’) step is the collation of publicly available food and nutrition-related policies of selected private-sector organizations. The second (‘expanded’) step assesses the nutritional composition of each organization's products, their promotions to children, their labelling practices, and the accessibility, availability and affordability of their products. The third (‘optimal’) step includes data on other commercial activities that may influence food environments, such as political lobbying and corporate philanthropy. The proposed approach will be further developed and piloted in countries of varying size and income levels. There is potential for this approach to enable national and international benchmarking of private-sector policies and practices, and to inform efforts to hold the private sector to account for their role in obesity and NCD prevention.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines art and artefact in the representation and recollection of deeply personal WWII women’s experiences as POW’s under the Japanese. This kind of treatment of internees in the Tjideng Women and Children’s internment camp (and others) in Batavia under the Japanese in WWII, stands in stark and brutal contrast to the idyllic life lived by many families up to that time in what was then known as the Dutch East Indies (Indonesia). The deprivation and brutality of the Japanese incarceration of these women and children evoked responses - not military, but certainly militant, if muted. Representations of those responses – as both art and artefact - may be found in the most unlikely places and unexpected forms - and are still being unearthed to this day. However close we might personally be to these artists and artisans, can we, as observers from a distance, ever truly comprehend through spoken or written words alone, the day-today realities of those extraordinary times?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recent scholarship has considered the implications of the rise of voluntary private standards in food and the role of private actors in a rapidly evolving, de-facto ‘mandatory’ sphere of governance. Standards are an important element of this globalising private sphere, but are an element that has been relatively peripheral in analyses of power in agri-food systems. Sociological thought has countered orthodox views of standards as simple tools of measurement, instead understanding their function as a governance mechanism that transforms many things, and people, during processes of standardisation. In a case study of the Australian retail supermarket duopoly and the proprietary standards required for market access this paper foregrounds retailers as standard owners and their role in third-party auditing and certification. Interview data from primary research into Australia’s food standards captures the multifaceted role supermarkets play as standard-owners, who are found to impinge on the independence of third-party certification while enforcing rigorous audit practices. We show how standard owners, in attempting to standardize the audit process, generate tensions within certification practices in a unique example of ritualism around audit. In examining standards to understand power in contemporary food governance, it is shown that retailers are drawn beyond standard-setting into certification and enforcement, that is characterized by a web of institutions and actors whose power to influence outcomes is uneven.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Proxy re-encryption (PRE) is a highly useful cryptographic primitive whereby Alice and Bob can endow a proxy with the capacity to change ciphertext recipients from Alice to Bob, without the proxy itself being able to decrypt, thereby providing delegation of decryption authority. Key-private PRE (KP-PRE) specifies an additional level of confidentiality, requiring pseudo-random proxy keys that leak no information on the identity of the delegators and delegatees. In this paper, we propose a CPA-secure PK-PRE scheme in the standard model (which we then transform into a CCA-secure scheme in the random oracle model). Both schemes enjoy highly desirable properties such as uni-directionality and multi-hop delegation. Unlike (the few) prior constructions of PRE and KP-PRE that typically rely on bilinear maps under ad hoc assumptions, security of our construction is based on the hardness of the standard Learning-With-Errors (LWE) problem, itself reducible from worst-case lattice hard problems that are conjectured immune to quantum cryptanalysis, or “post-quantum”. Of independent interest, we further examine the practical hardness of the LWE assumption, using Kannan’s exhaustive search algorithm coupling with pruning techniques. This leads to state-of-the-art parameters not only for our scheme, but also for a number of other primitives based on LWE published the literature.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

User-generated content plays a pivotal role in the current social media. The main focus, however, has been on the explicitly generated user content such as photos, videos and status updates on different social networking sites. In this paper, we explore the potential of implicitly generated user content, based on users’ online consumption behaviors. It is technically feasible to record users’ consumption behaviors on mobile devices and share that with relevant people. Mobile devices with such capabilities could enrich social interactions around the consumed content, but it may also threaten users’ privacy. To understand the potentials of this design direction we created and evaluated a low-fidelity prototype intended for photo sharing within private groups. Our prototype incorporates two design concepts, namely, FingerPrint and MoodPhotos that leverage users’ consumption history and emotional responses. In this paper, we report user values and user acceptance of this prototype from three participatory design workshops.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At Eurocrypt’04, Freedman, Nissim and Pinkas introduced a fuzzy private matching problem. The problem is defined as follows. Given two parties, each of them having a set of vectors where each vector has T integer components, the fuzzy private matching is to securely test if each vector of one set matches any vector of another set for at least t components where t < T. In the conclusion of their paper, they asked whether it was possible to design a fuzzy private matching protocol without incurring a communication complexity with the factor (T t ) . We answer their question in the affirmative by presenting a protocol based on homomorphic encryption, combined with the novel notion of a share-hiding error-correcting secret sharing scheme, which we show how to implement with efficient decoding using interleaved Reed-Solomon codes. This scheme may be of independent interest. Our protocol is provably secure against passive adversaries, and has better efficiency than previous protocols for certain parameter values.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In private placement transactions, issuing firms sell a block of securities to just a small group of investors at a discounted price. Non-participating shareholders suffer from ownership dilution and lose the opportunity to receive the discount. This thesis provides the first evidence on whether and how corporate governance can protect non-participating shareholders' interests. Results from an examination of 329 private placements issued by the top 250 Australian firms between 2002 and 2009 demonstrate that firms with higher governance quality are more likely to issue a share purchase plan (SPP) along with the private placement, thus providing greater protection to non-participating shareholders' interests.