294 resultados para mandatory access control framework
Resumo:
Background Improving hand hygiene among health care workers (HCWs) is the single most effective intervention to reduce health care associated infections in hospitals. Understanding the cognitive determinants of hand hygiene decisions for HCWs with the greatest patient contact (nurses) is essential to improve compliance. The aim of this study was to explore hospital-based nurses’ beliefs associated with performing hand hygiene guided by the World Health Organization’s (WHO) 5 critical moments. Using the belief-base framework of the Theory of Planned Behaviour, we examined attitudinal, normative, and control beliefs underpinning nurses’ decisions to perform hand hygiene according to the recently implemented national guidelines. Methods Thematic content analysis of qualitative data from focus group discussions with hospital-based registered nurses from 5 wards across 3 hospitals in Queensland, Australia. Results Important advantages (protection of patient and self), disadvantages (time, hand damage), referents (supportive: patients, colleagues; unsupportive: some doctors), barriers (being too busy, emergency situations), and facilitators (accessibility of sinks/products, training, reminders) were identified. There was some equivocation regarding the relative importance of hand washing following contact with patient surroundings. Conclusions The belief base of the theory of planned behaviour provided a useful framework to explore systematically the underlying beliefs of nurses’ hand hygiene decisions according to the 5 critical moments, allowing comparisons with previous belief studies. A commitment to improve nurses’ hand hygiene practice across the 5 moments should focus on individual strategies to combat distraction from other duties, peer-based initiatives to foster a sense of shared responsibility, and management-driven solutions to tackle staffing and resource issues. Hand hygiene following touching a patient’s surroundings continues to be reported as the most neglected opportunity for compliance.
Resumo:
In the internet age, copyright owners are increasingly looking to online intermediaries to take steps to prevent copyright infringement. Sometimes these intermediaries are closely tied to the acts of infringement; sometimes – as in the case of ISPs – they are not. In 2012, the Australian High Court decided the Roadshow Films v iiNet case, in which it held that an Australian ISP was not liable under copyright’s authorization doctrine, which asks whether the intermediary has sanctioned, approved or countenanced the infringement. The Australian Copyright Act 1968 directs a court to consider, in these situations, whether the intermediary had the power to prevent the infringement and whether it took any reasonable steps to prevent or avoid the infringement. It is generally not difficult for a court to find the power to prevent infringement – power to prevent can include an unrefined technical ability to disconnect users from the copyright source, such as an ISP terminating users’ internet accounts. In the iiNet case, the High Court eschewed this broad approach in favor of focusing on a notion of control that was influenced by principles of tort law. In tort, when a plaintiff asserts that a defendant should be liable for failing to act to prevent harm caused to the plaintiff by a third party, there is a heavy burden on the plaintiff to show that the defendant had a duty to act. The duty must be clear and specific, and will often hinge on the degree of control that the defendant was able to exercise over the third party. Control in these circumstances relates directly to control over the third party’s actions in inflicting the harm. Thus, in iiNet’s case, the control would need to be directed to the third party’s infringing use of BitTorrent; control over a person’s ability to access the internet is too imprecise. Further, when considering omissions to act, tort law differentiates between the ability to control and the ability to hinder. The ability to control may establish a duty to act, and the court will then look to small measures taken to prevent the harm to determine whether these satisfy the duty. But the ability to hinder will not suffice to establish liability in the absence of control. This article argues that an inquiry grounded in control as defined in tort law would provide a more principled framework for assessing the liability of passive intermediaries in copyright. In particular, it would set a higher, more stable benchmark for determining the copyright liability of passive intermediaries, based on the degree of actual, direct control that the intermediary can exercise over the infringing actions of its users. This approach would provide greater clarity and consistency than has existed to date in this area of copyright law in Australia.
Resumo:
In the internet age, copyright owners are increasingly looking to online intermediaries to take steps to prevent copyright infringement. Sometimes these intermediaries are closely tied to the acts of infringement; sometimes – as in the case of ISPs – they are not. In 2012, the Australian High Court decided the Roadshow Films v iiNet case, in which it held that an Australian ISP was not liable under copyright’s authorization doctrine, which asks whether the intermediary has sanctioned, approved or countenanced the infringement. The Australian Copyright Act 1968 directs a court to consider, in these situations, whether the intermediary had the power to prevent the infringement and whether it took any reasonable steps to prevent or avoid the infringement. It is generally not difficult for a court to find the power to prevent infringement – power to prevent can include an unrefined technical ability to disconnect users from the copyright source, such as an ISP terminating users’ internet accounts. In the iiNet case, the High Court eschewed this broad approach in favor of focusing on a notion of control that was influenced by principles of tort law. In tort, when a plaintiff asserts that a defendant should be liable for failing to act to prevent harm caused to the plaintiff by a third party, there is a heavy burden on the plaintiff to show that the defendant had a duty to act. The duty must be clear and specific, and will often hinge on the degree of control that the defendant was able to exercise over the third party. Control in these circumstances relates directly to control over the third party’s actions in inflicting the harm. Thus, in iiNet’s case, the control would need to be directed to the third party’s infringing use of BitTorrent; control over a person’s ability to access the internet is too imprecise. Further, when considering omissions to act, tort law differentiates between the ability to control and the ability to hinder. The ability to control may establish a duty to act, and the court will then look to small measures taken to prevent the harm to determine whether these satisfy the duty. But the ability to hinder will not suffice to establish liability in the absence of control. This chapter argues that an inquiry grounded in control as defined in tort law would provide a more principled framework for assessing the liability of passive intermediaries in copyright. In particular, it would set a higher, more stable benchmark for determining the copyright liability of passive intermediaries, based on the degree of actual, direct control that the intermediary can exercise over the infringing actions of its users. This approach would provide greater clarity and consistency than has existed to date in this area of copyright law in Australia.
Resumo:
Community development is increasingly using participatory processes that aim to be inclusive and empowering. However, researchers have found that such processes can have contradictory effects. Australian research has highlighted the significant leadership of rural women in sustainable community and economic development and in the adoption of new communication technologies such as the Internet. A focus on gender in participatory development may therefore lead to more effective programs and policies. This chapter outlines an interdisciplinary feminist framework for critically evaluating the participation and empowerment of rural women. This framework was found effective in evaluating an Australian project that aimed to enhance rural women’s access to communication technologies and to empower its participants. Its multiple theoretical and methodological approaches are outlined. The framework advocates an analysis of diversity and difference and the macro and micro contexts. Some principles and strategies for rural women’s inclusion, participation, empowerment, and for participatory feminist evaluation are outlined.
Resumo:
This document outlines a framework that could be used by government agencies in assessing policy interventions aimed at achieving social outcomes from government construction contracts. The framework represents a rational interpretation of the information gathered during the multi-outcomes construction policies project. The multi-outcomes project focused on the costs and benefits of using public construction contracts to promote the achievement of training and employment and public art objectives. The origin of the policy framework in a cost-benefit appraisal of current policy interventions is evidenced by its emphasis on sensitivity to policy commitment and project circumstances (especially project size and scope).The quantitative and qualitative analysis conducted in the multi-outcomes project highlighted, first, that in the absence of strong industry commitment to policy objectives, policy interventions typically result in high levels of avoidance activity, substantial administrative costs and very few benefits. Thus, for policy action on, for example, training or local employment to be successful compliance issues must be adequately addressed. Currently it appears that pre-qualification schemes (similar to the Priority Access Scheme) and schemes that rely on measuring, for example, the training investments of contractors within particular projects do not achieve high levels of compliance and involve significant administrative costs. Thus, an alternative is suggested in the policy framework developed here: a levy on each public construction project – set as a proportion of the total project costs. Although a full evaluation of this policy alternative was beyond the scope of the multi-outcomes construction policies project, it appears to offer the potential to minimize the transaction costs on contractors whilst enabling the creation of a training agency dedicated to improving the supply of skilled construction labour. A recommendation is thus made that this policy alternative be fully researched and evaluated. As noted above, the outcomes of the multi-outcomes research project also highlighted the need for sensitivity to project circumstances in the development and implementation of polices for public construction projects. Ideally a policy framework would have the flexibility to respond to circumstances where contractors share a commitment to the policy objectives and are able to identify measurable social outcomes from the particular government projects they are involved in. This would involve a project-by-project negotiation of goals and performance measures. It is likely to only be practical for large, longer term projects.
Resumo:
Background Primary prevention of childhood overweight is an international priority. In Australia 20-25% of 2-8 year olds are already overweight. These children are at substantially increased the risk of becoming overweight adults, with attendant increased risk of morbidity and mortality. Early feeding practices determine infant exposure to food (type, amount, frequency) and include responses (eg coercion) to infant feeding behaviour (eg. food refusal). There is correlational evidence linking parenting style and early feeding practices to child eating behaviour and weight status. A focus on early feeding is consistent with the national focus on early childhood as the foundation for life-long health and well being. The NOURISH trial aims to implement and evaluate a community-based intervention to promote early feeding practices that will foster healthy food preferences and intake and preserve the innate capacity to self-regulate food intake in young children. Methods/Design This randomised controlled trial (RCT) aims to recruit 820 first-time mothers and their healthy term infants. A consecutive sample of eligible mothers will be approached postnatally at major maternity hospitals in Brisbane and Adelaide. Initial consent will be for re-contact for full enrolment when the infants are 4-7 months old. Individual mother- infant dyads will be randomised to usual care or the intervention. The intervention will provide anticipatory guidance via two modules of six fortnightly parent education and peer support group sessions, each followed by six months of regular maintenance contact. The modules will commence when the infants are aged 4-7 and 13-16 months to coincide with establishment of solid feeding, and autonomy and independence, respectively. Outcome measures will be assessed at baseline, with follow up at nine and 18 months. These will include infant intake (type and amount of foods), food preferences, feeding behaviour and growth and self-reported maternal feeding practices and parenting practices and efficacy. Covariates will include sociodemographics, infant feeding mode and temperament, maternal weight status and weight concern and child care exposure. Discussion Despite the strong rationale to focus on parents’ early feeding practices as a key determinant of child food preferences, intake and self-regulatory capacity, prospective longitudinal and intervention studies are rare. This trial will be amongst to provide Level II evidence regarding the impact of an intervention (commencing prior to age 12 months) on children’s eating patterns and behaviours. Trial Registration: ACTRN12608000056392
Resumo:
The full economic, cultural and environmental value of information produced or funded by the public sector can be realised through enabling greater access to and reuse of the information. To do this effectively it is necessary to describe and implement a policy framework that supports greater access and reuse among a distributed, online network of information suppliers and users. The objective of this study was to identify materials dealing with policies, principles and practices relating to information access and reuse in Australia and in other key jurisdictions internationally. Open Access Policies, Practices and Licensing: A review of the literature in Australia and selected jurisdictions sets out the findings of an extensive review of published materials dealing with policies, practices and legal issues relating to information access and reuse, with a particular focus on materials generated, held or funded by public sector bodies. The report was produced as part of the work program of the project “Enabling Real-Time Information Access in Both Urban and Regional Areas”, established within the Cooperative Research Centre for Spatial Information (CRCSI).
Resumo:
The CDIO Initiative has been globally recognised as an enabler for engineering education reform. With the CDIO process, the CDIO Standards and the CDIO Syllabus, many scholarly contributions have been made around cultural change, curriculum reform and learning environments. In the Australasian region, reform is gaining significant momentum within the engineering education community, the profession, and higher education institutions. This paper presents the CDIO Syllabus cast into the Australian context by mapping it to the Engineers Australia Graduate Attributes, the Washington Accord Graduate Attributes and the Queensland University of Technology Graduate Capabilities. Furthermore, in recognition that many secondary schools and technical training institutions offer introductory engineering technology subjects, this paper presents an extended self-rating framework suited for recognising developing levels of proficiency at a preparatory level. The framework is consistent with conventional application to undergraduate programs and professional practice, but adapted for the preparatory context. As with the original CDIO framework with proficiency levels, this extended framework is informed by Bloom’s Educational Objectives. A proficiency evaluation of Queensland Study Authority’s Engineering Technology senior syllabus is demonstrated indicating proficiency levels embedded within this secondary school subject within a preparatory scope. Through this extended CDIO framework, students and faculty have greater awareness and access to tools to promote (i) student engagement in their own graduate capability development, (ii) faculty engagement in course and program design, through greater transparency and utility of the continuum of graduate capability development with associate levels of proficiency, and the context in which they exist in terms of pre-tertiary engineering studies; and (iii) course maintenance and quality audit methodology for the purpose of continuous improvement processes and program accreditation.
Resumo:
Transportation disadvantage has been recognised to be the key source of social exclusion. Therefore an appropriate process is required to investigate and seek to resolve this problem. Currently, determination of Transportation Disadvantage is postulate based on income, poverty and mobility level. Transportation disadvantage may best regard be based on accessibility perspectives as they represent inability of the individual to access desired activities. This paper attempts to justify a process in determining transportation disadvantage by incorporating accessibility and social transporation conflict as the essence of a framework. The framework embeds space time organisation within the dimension of accessibility to identify a rigorous definition of transportation disadvantage. In developing the framework, the definition, dimension, component and measure of accessibility were scrutinised. The findings suggest the definition and dimension are the significant approach of research to evaluate travel experience of the disadvantaged. Concurrently, location accessibility measures will be incorprated to strenghten the determination of accessibility level. Literature review in social exclusion and mobility-related exclusion identified the dimension and source of transportation disadvantage. It was revealed that the appropriate approach to justify trasnportation disadvantaged is to incorporate space-time organisation within the studied components. The suggested framework is an inter-related process consisting of component of accessibility; individual, networking (transport system) and activities (destination). The integration and correlation among the components shall determine the level of transportation disadvantage. Prior findings are used to retrieve the spatial distribution of transportation disadvantaged and appropriate policies are developed to resolve the problems.
Resumo:
Background: Exercise could contribute to weight loss by altering the sensitivity of the appetite regulatory system. Objective: The aim of this study was to assess the effects of 12 wk of mandatory exercise on appetite control. Design: Fifty-eight overweight and obese men and women [mean (±SD) body mass index (in kg/m2) = 31.8 ± 4.5, age = 39.6 ± 9.8 y, and maximal oxygen intake = 29.1 ± 5.7 mL · kg–1 · min–1] completed 12 wk of supervised exercise in the laboratory. The exercise sessions were designed to expend 2500 kcal/wk. Subjective appetite sensations and the satiating efficiency of a fixed breakfast were compared at baseline (week 0) and at week 12. An Electronic Appetite Rating System was used to measure subjective appetite sensations immediately before and after the fixed breakfast in the immediate postprandial period and across the whole day. The satiety quotient of the breakfast was determined by calculating the change in appetite scores relative to the breakfast's energy content. Results: Despite large variability, there was a significant reduction in mean body weight (3.2 ± 3.6 kg), fat mass (3.2 ± 2.2 kg), and waist circumference (5.0 ± 3.2 cm) after 12 wk. The analysis showed that a reduction in body weight and body composition was accompanied by an increase in fasting hunger and in average hunger across the day (P < 0.0001). Paradoxically, the immediate and delayed satiety quotient of the breakfast also increased significantly (P < 0.05). Conclusions: These data show that the effect of exercise on appetite regulation involves at least 2 processes: an increase in the overall (orexigenic) drive to eat and a concomitant increase in the satiating efficiency of a fixed meal.
Resumo:
Managed execution frameworks, such as the.NET Common Language Runtime or the Java Virtual Machine, provide a rich environment for the creation of application programs. These execution environments are ideally suited for languages that depend on type-safety and the declarative control of feature access. Furthermore, such frameworks typically provide a rich collection of library primitives specialized for almost every domain of application programming. Thus, when a new language is implemented on one of these frameworks it becomes necessary to provide some kind of mapping from the new language to the libraries of the framework. The design of such mappings is challenging since the type-system of the new language may not span the domain exposed in the library application programming interfaces (APIs). The nature of these design considerations was clarified in the implementation of the Gardens Point Component Pascal (gpcp) compiler. In this paper we describe the issues, and the solutions that we settled on in this case. The problems that were solved have a wider applicability than just our example, since they arise whenever any similar language is hosted in such an environment.
Resumo:
We introduce multiple-control fuzzy vaults allowing generalised threshold, compartmented and multilevel access structure. The presented schemes enable many useful applications employing multiple users and/or multiple locking sets. Introducing the original single control fuzzy vault of Juels and Sudan we identify several similarities and differences between their vault and secret sharing schemes which influence how best to obtain working generalisations. We design multiple-control fuzzy vaults suggesting applications using biometric credentials as locking and unlocking values. Furthermore we assess the security of our obtained generalisations for insider/ outsider attacks and examine the access-complexity for legitimate vault owners.
Resumo:
The current study sought to understand adolescent protective behavior in friendship using a Theory of Planned Behavior framework. In particular, the study sought to consider a young persons’ direct and active intervention to inhibit their friends’ risky behavior or to assist them when the behavior leads to injury. The role of attitudes regarding the consequences, norms and control about protective behavior were examined both qualitatively through focus groups (n= 50) and quantitatively through surveys from a sample of 540 Year 9 students (13-14 years old). There was some support for the theory with attitudes regarding the consequences of the behavior and norms predicting intended protective behavior. A path analysis was conducted with a sub-sample of 140 students which showed that intentions to be protective and perceived control to undertake protective behavior directly predicted such behavior after a 3 month interval. Attitudes towards the consequences and norms only indirectly predicted protective behavior via intention. The findings provide important applied information for interventions designed to increase adolescent protective behavior in their friendships.
Resumo:
With growing concern over the use of the car in our urbanized society, there have emerged a number of lobby groups and professional bodies promoting a return to public transport, walking and cycling, with the urban village as the key driving land use, as a means of making our cities’ transportation systems more sustainable. This research has aimed at developing a framework applicable to the Australian setting that can facilitate increased passenger patronage of rail based urban transport systems from adjacent or associated land uses. The framework specifically tested the application of the Park & Ride and Transit Oriented Development (TOD) concepts and their applicability within the cultural, institutional, political and transit operational characteristics of Australian society. The researcher found that, although the application of the TOD concept had been limited to small pockets of town houses and mixed use developments around stations, the development industry and emerging groups within the community are posed to embrace the concept and bring with it increased rail patronage. The lack of a clear commitment to infrastructure and supporting land uses is a major barrier to the implementation of TODs. The research findings demonstrated significant scope for the size of a TOD to expand to a much greater radius of activity from the public transport interchange, than the commonly quoted 400 to 600 meters, thus incorporating many more residents and potential patrons. The provision of Park & Rides, and associated support facilities like Kiss & Rides, have followed worldwide trends of high patronage demands from the middle and outer car dependent suburbs of our cities. The data collection and analysis gathered by the researcher demonstrated that in many cases Park & Rides should form part of a TOD to ensure ease of access to rail stations by all modes and patron types. The question, however, remains how best to plan the incorporation of a Park & Ride within a TOD and still maintain those features that attract and promote TODs as a living entity.
Resumo:
Intimate partner abuse and control is one of the most common forms of violence against women, and is considered an international problem of social, political, legal and human rights significance. Yet few studies have attempted to understand this problem from the perspective of male perpetrators. This gap is addressed by conducting in-depth interviews with 16 able-bodied men of white European ancestry born and educated in New Zealand or Australia, who have been physically violent and/or emotionally, intellectually, sexually or financially controlling of a live-in female partner. This thesis extends and deepens the dominant ways of thinking about men’s intimate partner abuse by utilising a new theoretical framework compatible with contemporary feminist scholarship. A synthesis of Connell’s theory of masculinities and Bourdieu’s field theory is utilised for the purpose of exploring more nuanced, complex understandings of manliness and men’s relationships with men, women and social structures. Through such an analysis, this thesis finds that men’s perpetration of power and control over women is driven by a need to avoid the stigma of appearing weak. As a consequence, their desire and ability to show love, care and empathy is suppressed in favour of a presumed honourable manliness, and their female partners are used as weapons in the pursuit of symbolic capital in the form of recognition, prestige and acceptance from real and/or imagined men. This research also uncovers the complex interplay between masculine practices and particular social contexts. For example, the norms of practice encountered from those in authority, such as teachers, sports coaches, police, court judges and workplace management, influences the decision making of the men in this study, to use, or not to use, physical violence, psychological abuse and structural control. The principal conclusion is that there is a repertoire of paradoxical masculinities and contradictory social messages available to the men in this study. But gender policing by other men, complicit women and those in authority provides little room for legitimate complexity in masculine practices. Perpetrators in this study reconcile these conflicts of interest by generally avoiding subordinated masculinity and possible ostracism, and instead practicing more heroic hegemonic masculinities by abusing and controlling women and particular other men. This thesis concludes that for intimate partner abuse and control to cease, changes in power structures have to occur at all levels of society.