323 resultados para contemporary Pacific
Resumo:
Background: Patients with chest pain contribute substantially to emergency department attendances, lengthy hospital stay, and inpatient admissions. A reliable, reproducible, and fast process to identify patients presenting with chest pain who have a low short-term risk of a major adverse cardiac event is needed to facilitate early discharge. We aimed to prospectively validate the safety of a predefined 2-h accelerated diagnostic protocol (ADP) to assess patients presenting to the emergency department with chest pain symptoms suggestive of acute coronary syndrome. Methods: This observational study was undertaken in 14 emergency departments in nine countries in the Asia-Pacific region, in patients aged 18 years and older with at least 5 min of chest pain. The ADP included use of a structured pre-test probability scoring method (Thrombolysis in Myocardial Infarction [TIMI] score), electrocardiograph, and point-of-care biomarker panel of troponin, creatine kinase MB, and myoglobin. The primary endpoint was major adverse cardiac events within 30 days after initial presentation (including initial hospital attendance). This trial is registered with the Australia-New Zealand Clinical Trials Registry, number ACTRN12609000283279. Findings: 3582 consecutive patients were recruited and completed 30-day follow-up. 421 (11•8%) patients had a major adverse cardiac event. The ADP classified 352 (9•8%) patients as low risk and potentially suitable for early discharge. A major adverse cardiac event occurred in three (0•9%) of these patients, giving the ADP a sensitivity of 99•3% (95% CI 97•9–99•8), a negative predictive value of 99•1% (97•3–99•8), and a specificity of 11•0% (10•0–12•2). Interpretation: This novel ADP identifies patients at very low risk of a short-term major adverse cardiac event who might be suitable for early discharge. Such an approach could be used to decrease the overall observation periods and admissions for chest pain. The components needed for the implementation of this strategy are widely available. The ADP has the potential to affect health-service delivery worldwide.
Resumo:
Background: The accurate evaluation of physical activity levels amongst youth is critical for quantifying physical activity behaviors and evaluating the effect of physical activity interventions. The purpose of this review is to evaluate contemporary approaches to physical activity evaluation amongst youth. Data sources: The literature from a range of sources was reviewed and synthesized to provide an overview of contemporary approaches for measuring youth physical activity. Results: Five broad categories are described: self-report, instrumental movement detection, biological approaches, direct observation, and combined methods. Emerging technologies and priorities for future research are also identified. Conclusions: There will always be a trade-off between accuracy and available resources when choosing the best approach for measuring physical activity amongst youth. Unfortunately, cost and logistical challenges may prohibit the use of "gold standard" physical activity measurement approaches such as doubly labelled water. Other objective methods such as heart rate monitoring, accelerometry, pedometry, indirect calorimetry, or a combination of measures have the potential to better capture the duration and intensity of physical activity, while self-reported measures are useful for capturing the type and context of activity.
Resumo:
Enterprise Systems (ES) have emerged as possibly the most important and challenging development in the corporate use of information technology in the last decade. Organizations have invested heavily in these large, integrated application software suites expecting improvments in; business processes, management of expenditure, customer service, and more generally, competitiveness, improved access to better information/knowledge (i.e., business intelligence and analytics). Forrester survey data consistently shows that investment in ES and enterprise applications in general remains the top IT spending priority, with the ES market estimated at $38 billion and predicted to grow at a steady rate of 6.9%, reaching $50 billion by 2012 (Wang & Hamerman, 2008). Yet, organizations have failed to realize all the anticipated benefits. One of the key reasons is the inability of employees to properly utilize the capabilities of the enterprise systems to complete the work and extract information critical to decision making. In response, universities (tertiary institutes) have developed academic programs aimed at addressing the skill gaps. In parallel with the proliferation of ES, there has been growing recognition of the importance of Teaching Enterprise Systems at tertiary education institutes. Many academic papers have discused the important role of Enterprise System curricula at tertiary education institutes (Ask, 2008; Hawking, 2004; Stewart, 2001), where the teaching philosophises, teaching approaches and challenges in Enterprise Systems education were discussed. Following the global trends, tertiary institutes in the Pacific-Asian region commenced introducing Enterprise System curricula in late 1990s with a range of subjects (a subject represents a single unit, rather than a collection of units; which we refer to as a course) in faculties / schools / departments of Information Technology, Business and in some cases in Engineering. Many tertiary educations commenced their initial subject offers around four salient concepts of Enterprise Systems: (1) Enterprise Systems implementations, (2) Introductions to core modules of Enterprise Systems, (3) Application customization using a programming language (e.g. ABAP) and (4) Systems Administration. While universities have come a long way in developing curricula in the enterprise system area, many obstacles remain: high cost of technology, qualified faculty to teach, lack of teaching materials, etc.
Resumo:
The concept of critical criminology – that crime and the present day processes of criminalization are rooted in the core structures of society – is of more relevance today than it has been at any other time. Written by an internationally renowned scholar, Contemporary Critical Criminology introduces the most up-to-date empirical, theoretical, and political contributions made by critical criminologists around the world. In its exploration of this material, the book also challenges the erroneous but widely held notion that the critical criminological project is restricted to mechanically applying theories to substantive topics, or to simple calling for radical political, economic, cultural, and social transformations. This book is an essential source of reference for both undergraduate and postgraduate students of Criminology, Criminal Theory, Social Policy, Research Methodology, and Penology.
Resumo:
This volume aims to 'bring the state back into terrorism studies' and fill the notable gap that currently exists in our understanding of the ways in which states employ terrorism as a political strategy of internal governance or foreign policy. Within this broader context, the volume has a number of specific aims. First, it aims to make the argument that state terrorism is a valid and analytically useful concept which can do much to illuminate our understanding of state repression and governance, and illustrate the varieties of actors, modalities, aims, forms, and outcomes of this form of contemporary political violence. Secondly, by discussing a rich and diverse set of empirical case studies of contemporary state terrorism this volume explores and tests theoretical notions, generates new questions and provides a resource for further research. Thirdly, it contributes to a critical-normative approach to the study of terrorism more broadly and challenges dominant approaches and perspectives which assume that states, particularly Western states, are primarily victims and not perpetrators of terrorism. Given the scarceness of current and past research on state terrorism, this volume will make a genuine contribution to the wider field, particularly in terms of ongoing efforts to generate more critical approaches to the study of political terrorism. This book will be of much interest to students of critical terrorism studies, critical security studies, terrorism and political violence and political theory in general.
Resumo:
Experts’ views and commentary have been highly respected in every discipline. However, unlike traditional disciplines like medicine, mathematics and engineering, Information System (IS) expertise is difficult to define. This paper attempts to understand the characteristics of IS-expert through a comprehensive literature review of analogous disciplines and then derives a formative research model with three main constructs. Further, this research validates the formative model to identify the characteristics of expertise using data gathered from 220 respondents using a contemporary Information System. Finally this research demonstrates how individuals with different levels of expertise differ in their views in relation to system evaluations.
Resumo:
Defining the difference between successful and mediocre leaders is a quest that has attracted many renowned scholars, drawing vast amounts of research effort. Yet while there are excellent theoretical explanations of what leaders should do: exhibit transformational behaviours, demonstrate authenticity, build productive relationships with followers and so on; there is still a scarcity of empirically-based research advising practicing leaders how to do these things. This study seeks to provide guidance about the fine-grained processes that effective leaders use on a daily basis to undertake the core process of all leadership activity; influencing followers. Using a grounded research approach, this study employs qualitative methods to capture the detail of effective leader behaviour and the micro-level influence processes that leaders use to create effective follower outcomes. Conducted in the health services industry with medical and allied health leaders, the study sought to answer the question: What influence methods might effective, contemporary leaders be using? The study builds on existing influence research, seeking to extend and update the typology of 11 influence tactics originally developed by Yukl and others, and which has been static since the late 1990s. Eight new influence tactics were identified, offering practicing leaders a powerful suite of potential strategies and representing a significant contribution to the field. Further research is recommended to confirm the identified influence constructs and test the generalisability of these findings to broader leader populations in health organisations and other knowledge-based organisations.
Resumo:
Preparing social work students to be effective practitioners is a complex and challenging task undertaken in a dynamic environment both in terms of the field of social work and the higher education sector. There have been recommendations that self knowledge, empirical knowledge, theoretical knowledge and procedural knowledge are the keys to high standards of social work practice. This paper suggests that the concept of practice wisdom is a useful focus for integrating these different aspects of informed practice and for focusing educational programmes for social work. As practice wisdom is more about process than possessed characteristics then there are important motivational and value-based considerations in developing wise practitioners. This discussion considers motivational and personal narrative aspects of practice wisdom so that it can be integrated into social work teaching.