16 resultados para Science public policies

em Queensland University of Technology - ePrints Archive


Relevância:

90.00% 90.00%

Publicador:

Resumo:

Objective The aim of this study was to gather patients' perceptions regarding their choice between public and private hospital EDs for those who hold private health insurance. The findings of this study will contribute to knowledge regarding patients' decision-making processes and therefore may contribute to the development of evidence based public policies. Methods An in-depth semi-structured guide was used to interview participants at public and private hospital EDs. Questions sought to identify the issues that were considered by the participants to decide to attend that hospital ED, previous ED experience, expectations of ED services and perceived benefits and barriers to accessing services. Interviews were audio recorded, transcribed verbatim and analysed using content and thematic approaches. Results Four core themes emerged: prior good experience with the hospital, perceived quality of care, perceived waiting times and perceived costs that may explain patients' choice. Patients' choice between public and private EDs can be explained by the interaction of these core themes. The principal issues appear to be concern for gap payments at private hospital ED and waiting times at public hospital ED. Conclusions Patients who choose to attend public EDs appear to value financial concern over waiting time; those who choose to attend private EDs appear to value waiting time ahead of financial concerns.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The current policy decision making in Australia regarding non-health public investments (for example, transport/housing/social welfare programmes) does not quantify health benefits and costs systematically. To address this knowledge gap, this study proposes an economic model for quantifying health impacts of public policies in terms of dollar value. The intention is to enable policy-makers in conducting economic evaluation of health effects of non-health policies and in implementing policies those reduce health inequalities as well as enhance positive health gains of the target population. Health Impact Assessment (HIA) provides an appropriate framework for this study since HIA assesses the beneficial and adverse effects of a programme/policy on public health and on health inequalities through the distribution of those effects. However, HIA usually tries to influence the decision making process using its scientific findings, mostly epidemiological and toxicological evidence. In reality, this evidence can not establish causal links between policy and health impacts since it can not explain how an individual or a community reacts to changing circumstances. The proposed economic model addresses this health-policy linkage using a consumer choice approach that can explain changes in group and individual behaviour in a given economic set up. The economic model suggested in this paper links epidemiological findings with economic analysis to estimate the health costs and benefits of public investment policies. That is, estimating dollar impacts when health status of the exposed population group changes by public programmes – for example, transport initiatives to reduce congestion by building new roads/ highways/ tunnels etc. or by imposing congestion taxes. For policy evaluation purposes, the model is incorporated in the HIA framework by establishing association among identified factors, which drive changes in the behaviour of target population group and in turn, in the health outcomes. The economic variables identified to estimate the health inequality and health costs are levels of income, unemployment, education, age groups, disadvantaged population groups, mortality/morbidity etc. However, though the model validation using case studies and/or available database from Australian non-health policy (say, transport) arena is in the future tasks agenda, it is beyond the scope of this current paper.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Entry provides a concise description of obligations prescribed by laws and regulations, or procedural rules met by individuals or organisations. In the event of noncompliance, penalties are imposed. A conceptual overview, critical commentary and future directions on compliance provide the framework for this entry. The International Encyclopedia of Organization Studies is a definitive description of the field, spanning individual, organizational, societal, and cultural perspective in a cross-disciplinary manner. The Encyclopedia is thoroughly cross-referenced and entries are based around a series of broad themes. Key Features- Offers a comprehensive overview of many of the major ideas, concepts, terms, and approaches that characterise this diverse field of organization studies - Illustrates the fluidity, dynamism, and innovation that now occur in organization studies-internationally - Brings together a team of international contributors from the fields of: Management, Psychology, Sociology, Communications, Education, Political Science, Public Administration, Anthropology, Law and other related areas. - Examines how organizations are devices for structuring life and lives are structured by organizations

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Entry provides a concise description of procedural justice -the perceived fairness of organizational procedures in decision-making processes A conceptual overview, critical commentary and future directions provide the framework for this entry. The International Encyclopedia of Organization Studies is a definitive description of the field, spanning individual, organizational, societal, and cultural perspective in a cross-disciplinary manner. The Encyclopedia is thoroughly cross-referenced and entries are based around a series of broad themes. Key Features- Offers a comprehensive overview of many of the major ideas, concepts, terms, and approaches that characterise this diverse field of organization studies - Illustrates the fluidity, dynamism, and innovation that now occur in organization studies-internationally - Brings together a team of international contributors from the fields of: Management, Psychology, Sociology, Communications, Education, Political Science, Public Administration, Anthropology, Law and other related areas. - Examines how organizations are devices for structuring life and lives are structured by organizations

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Literally, the word compliance suggests conformity in fulfilling official requirements. The thesis presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCP). The thesis presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCP are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities. In order to provide confidence in operation for the mistrusting sets of entities, CCP must provide compliance verification mechanisms. These mechanisms are employed either by all the entities or a set of authorised entities in the system to verify the compliance of the behaviour of various participating entities with the rules of the system. It is often stated that confidentiality, integrity and authentication are the primary interests of cryptology. It is evident from the literature that authentication mechanisms employ confidentiality and integrity services to achieve their goal. Therefore, the fundamental services that any cryptographic algorithm may provide are confidentiality and integrity only. Since controlling the behaviour of the entities is not a feasible cryptologic goal,the verification of the confidentiality of any data is a futile cryptologic exercise. For example, there exists no cryptologic mechanism that would prevent an entity from willingly or unwillingly exposing its private key corresponding to a certified public key. The confidentiality of the data can only be assumed. Therefore, any verification in cryptologic protocols must take the form of integrity verification mechanisms. Thus, compliance verification must take the form of integrity verification in cryptologic protocols. A definition of compliance that is conducive as a cryptologic goal is presented as a guarantee on the confidentiality and integrity services. The definitions are employed to provide a classification mechanism for various message formats in a cryptologic protocol. The classification assists in the characterisation of protocols, which assists in providing a focus for the goals of the research. The resulting concrete goal of the research is the study of those protocols that employ message formats to provide restricted confidentiality and universal integrity services to selected data. The thesis proposes an informal technique to understand, analyse and synthesise the integrity goals of a protocol system. The thesis contains a study of key recovery,electronic cash, peer-review, electronic auction, and electronic voting protocols. All these protocols contain message format that provide restricted confidentiality and universal integrity services to selected data. The study of key recovery systems aims to achieve robust key recovery relying only on the certification procedure and without the need for tamper-resistant system modules. The result of this study is a new technique for the design of key recovery systems called hybrid key escrow. The thesis identifies a class of compliant cryptologic protocols called secure selection protocols (SSP). The uniqueness of this class of protocols is the similarity in the goals of the member protocols, namely peer-review, electronic auction and electronic voting. The problem statement describing the goals of these protocols contain a tuple,(I, D), where I usually refers to an identity of a participant and D usually refers to the data selected by the participant. SSP are interested in providing confidentiality service to the tuple for hiding the relationship between I and D, and integrity service to the tuple after its formation to prevent the modification of the tuple. The thesis provides a schema to solve the instances of SSP by employing the electronic cash technology. The thesis makes a distinction between electronic cash technology and electronic payment technology. It will treat electronic cash technology to be a certification mechanism that allows the participants to obtain a certificate on their public key, without revealing the certificate or the public key to the certifier. The thesis abstracts the certificate and the public key as the data structure called anonymous token. It proposes design schemes for the peer-review, e-auction and e-voting protocols by employing the schema with the anonymous token abstraction. The thesis concludes by providing a variety of problem statements for future research that would further enrich the literature.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The dominant economic paradigm currently guiding industry policy making in Australia and much of the rest of the world is the neoclassical approach. Although neoclassical theories acknowledge that growth is driven by innovation, such innovation is exogenous to their standard models and hence often not explored. Instead the focus is on the allocation of scarce resources, where innovation is perceived as an external shock to the system. Indeed, analysis of innovation is largely undertaken by other disciplines, such as evolutionary economics and institutional economics. As more has become known about innovation processes, linear models, based on research and development or market demand, have been replaced by more complex interactive models which emphasise the existence of feedback loops between the actors and activities involved in the commercialisation of ideas (Manley 2003). Currently dominant among these approaches is the national or sectoral innovation system model (Breschi and Malerba 2000; Nelson 1993), which is based on the notion of increasingly open innovation systems (Chesbrough, Vanhaverbeke, and West 2008). This chapter reports on the ‘BRITE Survey’ funded by the Cooperative Research Centre for Construction Innovation which investigated the open sectoral innovation system operating in the Australian construction industry. The BRITE Survey was undertaken in 2004 and it is the largest construction innovation survey ever conducted in Australia. The results reported here give an indication of how construction innovation processes operate, as an example that should be of interest to international audiences interested in construction economics. The questionnaire was based on a broad range of indicators recommended in the OECD’s Community Innovation Survey guidelines (OECD/Eurostat 2005). Although the ABS has recently begun to undertake regular innovation surveys that include the construction industry (2006), they employ a very narrow definition of the industry and only collect very basic data compared to that provided by the BRITE Survey, which is presented in this chapter. The term ‘innovation’ is defined here as a new or significantly improved technology or organisational practice, based broadly on OECD definitions (OECD/Eurostat 2005). Innovation may be technological or organisational in nature and it may be new to the world, or just new to the industry or the business concerned. The definition thus includes the simple adoption of existing technological and organisational advancements. The survey collected information about respondents’ perceptions of innovation determinants in the industry, comprising various aspects of business strategy and business environment. It builds on a pilot innovation survey undertaken by PricewaterhouseCoopers (PWC) for the Australian Construction Industry Forum on behalf of the Australian Commonwealth Department of Industry Tourism and Resources, in 2001 (PWC 2002). The survey responds to an identified need within the Australian construction industry to have accurate and timely innovation data upon which to base effective management strategies and public policies (Focus Group 2004).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Resource-intensive, high-carbon, Western lifestyles are frequently criticised as unsustainable and deeply unsatisfying. However, these lifestyles are still attractive to the majority of Westerners and to a high proportion of the developing world’s middle classes. This paper argues that the imminent threat of catastrophic climate change constitutes an immediate political, economic and ethical challenge for citizens of the developed world that cannot be tackled by appeals to asceticism or restraint. There can be no solution to climate change until sustainable conceptions of the good life are developed that those in the west want to live and which others might want to live. While the ultimate solution to climate change is the development of low carbon lifestyles, it is important that government initiatives, governance arrangements and economic incentives support rather than undermine that search. Like the global financial crisis, the climate change crisis also demonstrates what happens when weaknesses in national, corporate and professional governance are exacerbated by weaknesses in global governance. In tackling the latter, it is critical the mistakes now evidenced in the former are avoided – including a rethinking of carbon market and carbon tax alternatives. It is also critical that individuals must take responsibility for their actions as consumers, voters and investors.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Less than twenty years on from the proclamation of the Child Care Act 1972, and introduction of funding for not-for-profit child care centres, a series of market-driven public policies paved the way for the emergence of Australia’s current ECEC quasi-market. Seeking to respond to increasing demand for work-related child care in the 1990s, and to manage associated costs, a succession of Australian Governments turned to market theory and New Public Management (NPM) principles to inform ECEC policy. Reflecting on an era of high policy activity within ECEC, this paper examines a series of policy events and texts that set the course for the reform agenda that was to ensue in ECEC.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dietetics in Australia commenced in the 1930’s, inspired by formation of the profession in Britain and the United States. Almost exclusively a female profession, its roots were in nursing management in Britain and food science and home economics in the US, incorporating the principles of food preparation and supply, food and medical science, public health, management, all based on principles of social justice. Victoria employed the first dietitian in 1929, followed by NSW in 1936. Right from the start there was rivalry between the two states over the standard of training, Victoria and later Western Australia, following a college based institutional management focus and NSW, university graduates in science. Both however were committed to the hospital internship as a prelude to safe practice. Soon after, professional associations arose independently in both states, the purpose being to promote appropriate standards in education and to define the level of training required to enter the profession, though it was not until 1950 that a national association was formed. Parallel to the establishment of dietetic training and professional activities, a number of significant public health and medical science initiatives influenced the scope of dietetic practice. The Commonwealth Government commissioned dietary surveys in Australian cities as well as remote communities of Aboriginal and Papuan peoples. Newly discovered components of a healthy diet provided the beginnings of nutrition policy. Pioneer dietitians were trailblazers, with few role models. Their influence ranged across Australia to the United Nations and WHO and we can learn much from their endeavour.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Cryptosystems based on the hardness of lattice problems have recently acquired much importance due to their average-case to worst-case equivalence, their conjectured resistance to quantum cryptanalysis, their ease of implementation and increasing practicality, and, lately, their promising potential as a platform for constructing advanced functionalities. In this work, we construct “Fuzzy” Identity Based Encryption from the hardness of the Learning With Errors (LWE) problem. We note that for our parameters, the underlying lattice problems (such as gapSVP or SIVP) are assumed to be hard to approximate within supexponential factors for adversaries running in subexponential time. We give CPA and CCA secure variants of our construction, for small and large universes of attributes. All our constructions are secure against selective-identity attacks in the standard model. Our construction is made possible by observing certain special properties that secret sharing schemes need to satisfy in order to be useful for Fuzzy IBE. We also discuss some obstacles towards realizing lattice-based attribute-based encryption (ABE).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

NTRUEncrypt is a fast and practical lattice-based public-key encryption scheme, which has been standardized by IEEE, but until recently, its security analysis relied only on heuristic arguments. Recently, Stehlé and Steinfeld showed that a slight variant (that we call pNE) could be proven to be secure under chosen-plaintext attack (IND-CPA), assuming the hardness of worst-case problems in ideal lattices. We present a variant of pNE called NTRUCCA, that is IND-CCA2 secure in the standard model assuming the hardness of worst-case problems in ideal lattices, and only incurs a constant factor overhead in ciphertext and key length over the pNE scheme. To our knowledge, our result gives the first IND-CCA2 secure variant of NTRUEncrypt in the standard model, based on standard cryptographic assumptions. As an intermediate step, we present a construction for an All-But-One (ABO) lossy trapdoor function from pNE, which may be of independent interest. Our scheme uses the lossy trapdoor function framework of Peikert and Waters, which we generalize to the case of (k − 1)-of-k-correlated input distributions.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Secure multi-party computation (MPC) protocols enable a set of n mutually distrusting participants P 1, ..., P n , each with their own private input x i , to compute a function Y = F(x 1, ..., x n ), such that at the end of the protocol, all participants learn the correct value of Y, while secrecy of the private inputs is maintained. Classical results in the unconditionally secure MPC indicate that in the presence of an active adversary, every function can be computed if and only if the number of corrupted participants, t a , is smaller than n/3. Relaxing the requirement of perfect secrecy and utilizing broadcast channels, one can improve this bound to t a  < n/2. All existing MPC protocols assume that uncorrupted participants are truly honest, i.e., they are not even curious in learning other participant secret inputs. Based on this assumption, some MPC protocols are designed in such a way that after elimination of all misbehaving participants, the remaining ones learn all information in the system. This is not consistent with maintaining privacy of the participant inputs. Furthermore, an improvement of the classical results given by Fitzi, Hirt, and Maurer indicates that in addition to t a actively corrupted participants, the adversary may simultaneously corrupt some participants passively. This is in contrast to the assumption that participants who are not corrupted by an active adversary are truly honest. This paper examines the privacy of MPC protocols, and introduces the notion of an omnipresent adversary, which cannot be eliminated from the protocol. The omnipresent adversary can be either a passive, an active or a mixed one. We assume that up to a minority of participants who are not corrupted by an active adversary can be corrupted passively, with the restriction that at any time, the number of corrupted participants does not exceed a predetermined threshold. We will also show that the existence of a t-resilient protocol for a group of n participants, implies the existence of a t’-private protocol for a group of n′ participants. That is, the elimination of misbehaving participants from a t-resilient protocol leads to the decomposition of the protocol. Our adversary model stipulates that a MPC protocol never operates with a set of truly honest participants (which is a more realistic scenario). Therefore, privacy of all participants who properly follow the protocol will be maintained. We present a novel disqualification protocol to avoid a loss of privacy of participants who properly follow the protocol.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Universal One-Way Hash Functions (UOWHFs) may be used in place of collision-resistant functions in many public-key cryptographic applications. At Asiacrypt 2004, Hong, Preneel and Lee introduced the stronger security notion of higher order UOWHFs to allow construction of long-input UOWHFs using the Merkle-Damgård domain extender. However, they did not provide any provably secure constructions for higher order UOWHFs. We show that the subset sum hash function is a kth order Universal One-Way Hash Function (hashing n bits to m < n bits) under the Subset Sum assumption for k = O(log m). Therefore we strengthen a previous result of Impagliazzo and Naor, who showed that the subset sum hash function is a UOWHF under the Subset Sum assumption. We believe our result is of theoretical interest; as far as we are aware, it is the first example of a natural and computationally efficient UOWHF which is also a provably secure higher order UOWHF under the same well-known cryptographic assumption, whereas this assumption does not seem sufficient to prove its collision-resistance. A consequence of our result is that one can apply the Merkle-Damgård extender to the subset sum compression function with ‘extension factor’ k+1, while losing (at most) about k bits of UOWHF security relative to the UOWHF security of the compression function. The method also leads to a saving of up to m log(k+1) bits in key length relative to the Shoup XOR-Mask domain extender applied to the subset sum compression function.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Universal Designated-Verifier Signature (UDVS) schemes are digital signature schemes with additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier such that the designated-verifier can verify that the message was signed by the signer, but is unable to convince anyone else of this fact. Since UDVS schemes reduce to standard signatures when no verifier designation is performed, it is natural to ask how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. We show how this can be efficiently achieved, and provide proofs of security for our schemes in the random oracle model.