41 resultados para cellules présentatrices d’antigènes (CPA)
em Queensland University of Technology - ePrints Archive
Resumo:
In 2012, the only South East Asian countries that have ratified the 1951 Convention relating to the Status of Refugees and the 1967 Protocol Relating to the Status of Refugees (hereafter referred to as the 1951 Convention and 1967 Protocol) is Philippines (signed 1954), Cambodia (signed 1995) and Timor Leste (signed 2001). Countries such as Indonesia, Malaysia and Thailand have annual asylum seeking populations from Myanmar, South Asia and Middle East, that are estimated to be at 15 000-20 000 per country (UNHCR 2012). The lack of a permanent and formal asylum processing process in these countries means that that asylum-seeking populations in the region are reliant on the local offices of the United Nations High Commission for Refugees based in the region to process their claims. These offices rely upon the good will of these governments to have a presence near detection camps and in capital cities to process claims of those who manage to reach the UNHCR representative office. The only burden sharing mechanism within the region primarily exists under the Bali Process on People Smuggling, Trafficking in Persons and Related Transnational Crime (the Bali Process), introduced in 2002. The Bali Process refers to an informal cooperative agreement amongst the states from the Asia-Pacific region, with Australia and Indonesia as the co-chairs, which discusses its namesake: primarily anti-people smuggling activities and migration protocols. There is no provision within this process to discuss the development of national asylum seeking legislation, processes for domestic processing of asylum claims or burden sharing in contrast to other regions such as Africa and South America (i.e. 2009 African Union Convention for the Protection and Assistance of the Internally Displaced, 1969 African Union Convention Governing the Specific Aspects of Refugee Problems in Africa and 1984 Cartagena Declaration on Refugees [Americas]) (PEF 2010: 19).
Resumo:
Unresolved painful emotional experiences such as bereavement, trauma and disturbances in core relationships, are common presenting problems for clients of psychodrama or psychotherapy more generally. Emotional pain is experienced as a shattering of the sense of self and disconnection from others and, when unresolved, produces avoidant responses which inhibit the healing process. There is agreement across therapeutic modalities that exposure to emotional experience can increase the efficacy of therapeutic interventions. Moreno proposes that the activation of spontaneity is the primary curative factor in psychodrama and that healing occurs when the protagonist (client) engages with his or her wider social system and develops greater flexibility in response to that system. An extensive case-report literature describes the application of the psychodrama method in healing unresolved painful emotional experiences, but there is limited empirical research to verify the efficacy of the method or to identify the processes that are linked to therapeutic change. The purpose of this current research was to construct a model of protagonist change processes that could extend psychodrama theory, inform practitioners’ therapeutic decisions and contribute to understanding the common factors in therapeutic change. Four studies investigated protagonist processes linked to in-session resolution of painful emotional experiences. Significant therapeutic events were analysed using recordings and transcripts of psychodrama enactments, protagonist and director recall interviews and a range of process and outcome measures. A preliminary study (3 cases) identified four themes that were associated with helpful therapeutic events: enactment, the working alliance with the director and with group members, emotional release or relief and social atom repair. The second study (7 cases) used Comprehensive Process Analysis (CPA) to construct a model of protagonists’ processes linked to in-session resolution. This model was then validated across four more cases in Study 3. Five meta-processes were identified: (i) a readiness to engage in the psychodrama process; (ii) re-experiencing and insight; (iii) activating resourcefulness; (iv) social atom repair with emotional release and (v) integration. Social atom repair with emotional release involved deeply experiencing a wished-for interpersonal experience accompanied by a free flowing release of previously restricted emotion and was most clearly linked to protagonists’ reports of reaching resolution and to post session improvements in interpersonal relationships and sense of self. Acceptance of self in the moment increased protagonists’ capacity to generate new responses within each meta-process and, in resolved cases, there was evidence of spontaneity developing over time. The fourth study tested Greenberg’s allowing and accepting painful emotional experience model as an alternative explanation of protagonist change. The findings of this study suggested that while the process of allowing emotional pain was present in resolved cases, Greenberg’s model was not sufficient to explain the processes that lead to in-session resolution. The protagonist’s readiness to engage and activation of resourcefulness appear to facilitate the transition from problem identification to emotional release. Furthermore, experiencing a reparative relationship was found to be central to the healing process. This research verifies that there can be in-session resolution of painful emotional experience during psychodrama and protagonists’ reports suggest that in-session resolution can heal the damage to the sense of self and the interpersonal disconnection that are associated with unresolved emotional pain. A model of protagonist change processes has been constructed that challenges the view of psychodrama as a primarily cathartic therapy, by locating the therapeutic experience of emotional release within the development of new role relationships. The five meta-processes which are described within the model suggest broad change principles which can assist practitioners to make sense of events as they unfold and guide their clinical decision making in the moment. Each meta-process was linked to specific post-session changes, so that the model can inform the development of therapeutic plans for individual clients and can aid communication for practitioners when a psychodrama intervention is used for a specific therapeutic purpose within a comprehensive program of therapy.
Resumo:
As the ultimate corporate decision-makers, directors have an impact on the investment time horizons of the corporations they govern. How they make investment decisions has been profoundly influenced by the expansion of the investment chain and the increasing concentration of share ownership in institutional hands. By examining agency in light of legal theory, we highlight that the board is in fact sui generis and not an agent of shareholders. Consequently, transparency can lead to directors being 'captured' by institutional investor objectives and timeframes, potentially to the detriment of the corporation as a whole. The counter-intuitive conclusion is that transparency may, under certain conditions, undermine good corporate governance and lead to excessive short-termism.
Resumo:
The 1989 Comprehensive Plan of Action (CPA) has recently been described as a successful example of how to manage large protracted refugee flows. However, this article revisits the circumstances surrounding the CPA used to resolve the prolonged Indo-Chinese refugee crisis to highlight that part of its development was linked to the fact that Southeast Asian states refused to engage with proposed solutions, which did not include repatriation for the majority of the Indo-Chinese asylum seekers who were deemed to be ‘non-genuine’1 ( UNGA, 1989a) refugees. This resulted in the CPA often forcibly repatriating ‘non-genuine’ refugees, particularly near the end of its program. This article reviews the CPA in order to assess whether its practices and results should be repeated.
Resumo:
Carlin and Finch, this issue, compare goodwill impairment discount rates used by a sample of large Australian firms with ‘independently’ generated discount rates. Their objective is to empirically determine whether managers opportunistically select goodwill discount rates subsequent to the 2005 introduction of International Financial Reporting Standards (IFRS) in Australia. This is a worthwhile objective given that IFRS introduced an impairment regime, and within this regime, discount rate selection plays a key role in goodwill valuation decisions. It is also timely to consider the goodwill valuation issue. Following the recent downturn in the economy, there is a high probability that many firms will be forced to write down impaired goodwill arising from boom period acquisitions. Hence, evidence of bias in rate selection is likely to be of major concern to investors, policymakers and corporate regulators. Carlin and Finch claim their findings provide evidence of such bias. In this commentary I review the validity of their claims.
Resumo:
The global financial crisis has highlighted the vulnerability of our economy to systemic risks. While its causes are numerous and relate to complex problems deeply embedded in capital markets, ‘short-termism’ (excessive focus on short-term outcomes at the expense of long-term wealth creation and sustainability) has frequently been flagged as a major contributor to this crisis. Although short-termism is not new, the global financial crisis has highlighted the presence of short-termism among institutional investors, and the failure of global markets and regulators to deal with such perverse and destructive behaviour (Guyatt 2009). Solutions are clearly needed. Although there is a body of research that provides evidence of the presence of short-termism in capital markets and the consequences of short-term decision-making on the financial wellbeing of both individuals and organisations, there is no consensus on mitigating solutions to short-termism. What emerges from the literature is the need to take a broad interdisciplinary perspective in seeking solutions to the problem.
Resumo:
With the massive decline in savings arising from the Global Financial Crisis (GFC), it is timely to review superannuation fund investment and disclosure strategies in the lead-up to the crisis. Accordingly, this study examines differences among superannuation funds’ default investment options in terms of naming and framing over three years from 2005 to 2007, as presented in product disclosure statements (PDSs). The findings indicate that default options are becoming more alike regardless of their name, and consequently, members may face increasing difficulties in distinguishing between balanced and growth-named default options when comparing them across superannuation funds. Comparability is also likely to be constrained by variations in the framing of default options presented in investment option menus in PDSs. These findings highlight the need for standardisation of default option definitions and disclosures to ensure descriptive accuracy, transparency and comparability.
Resumo:
The development of effective safety regulations for unmanned aircraft systems (UAS) is an issue of paramount concern for industry. The development of this framework is a prerequisite for greater UAS access to civil airspace and, subsequently, the continued growth of the UAS industry. The direct use of the existing conventionally piloted aircraft (CPA) airworthiness certification framework for the regulation of UAS has a number of limitations. The objective of this paper is to present one possible approach for the structuring of airworthiness regulations for civilian UAS. The proposed approach facilitates a more systematic, objective and justifiable method for managing the spectrum of risk associated with the diversity of UAS and their potential operations. A risk matrix is used to guide the development of an airworthiness certification matrix (ACM). The ACM provides a structured categorisation that facilitates the future tailoring of regulations proportionate to the levels of risk associated with the operation of the UAS. As a result, an objective and traceable link may be established between mandated regulations and the overarching objective for an equivalent level of safety to CPA. The ACM also facilitates the systematic consideration of a range of technical and operational mitigation strategies. For these reasons, the ACM is proposed as a suitable method for the structuring of an airworthiness certification framework for civil or commercially operated UAS (i.e., the UAS equivalent in function to the Part 21 regulations for civil CPA) and for the further structuring of requirements on the operation of UAS in un-segregated airspace.
Resumo:
The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.
Resumo:
A novel antioxidant for the potential treatment of ischaemia was designed by incorporating an isoindoline nitroxide into the framework of the free radical scavenger edaravone. 5-(3-Methyl-pyrazol-5-ol-1-yl)-1,1,3,3-tetramethylisoindolin-2-yloxyl 7 was prepared by N-arylation of 3-methyl-5-pyrazolone with 5-iodo-1,1,3,3-tetramethylisoindoline-2-yloxyl 8 in the presence of catalytic copper(I)iodide. Evaluation of 7, its methoxyamine derivative 10 and 5-carboxy-1,1,3,3-tetramethylisoindolin-2-yloxyl (CTMIO) against edaravone 1 in ischaemic rat atrial cardiomyocytes revealed significant decreases in cell death after prolonged ischaemia for each agent; however the protective effect of the novel antioxidant 7 (showing greater than 85% reduction in cell death at 100 μM) was significantly enhanced over that of edaravone 1 alone. Furthermore, the activity for 7 was found to be equal to or greater than the potent cardioprotective agent N6-cyclopentyladenosine (CPA). The methoxyamine adduct 10 and edaravone 1 showed no difference between the extent of reduction in cell death whilst CTMIO had only a modest protective effect.
Resumo:
By December 2010 total superannuation assets had reached $1.3 trillion, covering 94% of all Australians. This substantial growth was not a natural evolution. Rather it can be directly traced to three decades of bipartisan reform strategies based on a claimed public interest ideology. This article investigates the concerns raised by Superannuation Select Committees, consumer and union organisations, independent researchers and actuarial experts that, in contrast to the public interest rhetoric, the regulatory reforms have primarily achieved major private interest gains for powerful lobbyists. The findings of this analysis indicate that the democratic power of Australian governments to set economic policy agendas has been progressively eclipsed by the power of the financial services industry's producer groups. Rather than producing a best practice governance structure, fund members remain trapped in a post-reform cost paradox: no right of exit regardless of the deepening cost burden imposed. In an industry set to control a projected nominal figure of $6.7 trillion in superannuation assets by 2035, these findings suggest that the real change necessary to improve the deepening cost burden faced by fund members within a life-long, mandatory superannuation investment is now beyond any government's reach.
Resumo:
This paper seeks to contribute to the emerging stream of literature on the problematics of accountability ( [McKernan, in this issue], [Messner, 2009] and [Roberts, 2009]) and the possibilities of accounterability (Kamuf, 2007) by questioning whether and how accounterability can appear as a response to the problematics of accountability's operationalisation. To answer this question, this research considers the problematics of accountability found in the limits inherent to the giving of an account (Messner, 2009), in the ambiguous relationship between accountability and transparency (Roberts, 2009), and in the as yet unresolved contradictions of accountability (McKernan, in this issue). Accounterability is seen as a practice of resisting accountability demands while giving an account. Alternative practices arising out of such resistance are inductively identified through an ethnographic study of the day-to-day practices of the Salvation Army used as an extreme case. This case shows how an ideal form of accountability raises more questions than it answers in practice, thereby leading individuals to develop their own counter-abilities. Because accountability to a Higher-Stakeholder appears to be an unreachable ideal, identifying to whom one should give an account of oneself becomes problematic. A working response to the problematics of accountability, accounterability emerges as the mechanism whereby the limits and contradictions of account giving are transformed into the conditions of its realisation: unreachable accountability is transformed into tangible day-to-day practices that may differ slightly from expected ideal conduct. It transpires from this study that the main strength of accountability lies in its ability to absorb and to override its limits and contradictions, transforming them into conditions of its possibility. As such, accounterability emerges as the ultimate manifestation of this strength.
Resumo:
Not-for-profit (NFP) financial ratio research has focused primarily on organisational efficiency measurements for external stakeholders. Ratios that also capture information about stability, capacity (liquidity), gearing and sustainability, enable an assessment of financial resilience. They are thus valuable tools that can provide a framework of internal accountability between boards and management. The establishment of an Australian NFP regulator highlights the importance of NFP sustainability, and affirms the timeliness of this paper. We propose a suite of key financial ratios for use by NFP boards and management, and demonstrate its practical usefulness by applying the ratios to financial data from the 2009 reports of ACFID (Australian Council for International Development)-affiliated international aid organisations.
Resumo:
Unmanned Aircraft Systems (UAS) are one of a number of emerging aviation sectors. Such new aviation concepts present a significant challenge to National Aviation Authorities (NAAs) charged with ensuring the safety of their operation within the existing airspace system. There is significant heritage in the existing body of aviation safety regulations for Conventionally Piloted Aircraft (CPA). It can be argued that the promulgation of these regulations has delivered a level of safety tolerable to society, thus justifying the “default position” of applying these same standards, regulations and regulatory structures to emerging aviation concepts such as UAS. An example of this is the proposed “1309” regulation for UAS, which is based on the 1309 regulation for CPA. However, the absence of a pilot on-board an unmanned aircraft creates a fundamentally different risk paradigm to that of CPA. An appreciation of these differences is essential to the justification of the “default position” and in turn, to ensure the development of effective safety standards and regulations for UAS. This paper explores the suitability of the proposed “1309” regulation for UAS. A detailed review of the proposed regulation is provided and a number of key assumptions are identified and discussed. A high-level model characterising the expected number of third party fatalities on the ground is then used to determine the impact of these assumptions. The results clearly show that the “one size fits all” approach to the definition of 1309 regulations for UAS, which mandates equipment design and installation requirements independent of where the UAS is to be operated, will not lead to an effective management of the risks.
Resumo:
In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistringuishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the receipient in the private domain. "Non-trivial filtering" can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicaly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.