256 resultados para interview protocols

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Investigative interviews with alleged victims form the central plank of evidence in the prosecution of child sexual abuse. Despite interviewers being provided with a guiding framework, child sexual abuse cases are often not prosecuted because of poor-quality evidence. The purpose of this study was to elicit feedback from prosecutors about the structure and format of current interview protocols and the ways in which these could potentially be improved from an evidential perspective. Focus group discussions (ranging in length from 180 to 190 minutes) were conducted with 13 Crown prosecutors representing every jurisdiction of Australia. Thematic analysis of the focus group discussions revealed that prosecutors were supportive of the structure of interview protocols, however, concerns were raised about four of the interview elements. These elements were the oath and truth–lie competency test, the ground rules, the practice narrative and eliciting a disclosure. The prosecutors’ concerns and their implications for protocol developers and trainers are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: Despite the heterogeneity of Australian Aboriginal peoples, certain styles of relating are shared and are markedly different to the communication styles of non-Aboriginal peoples. These differences may affect the suitability of current investigative interview protocols to Australian Aboriginal children. This study aimed to qualitatively evaluate the applicability of an investigative interview protocol to Australian Aboriginal children and examine how it could be modified to better suit the communication styles in many Aboriginal communities. Method: A diverse group of 28 participants who had expertise in Aboriginal language and culture, as well as an understanding of the child investigative interview process, each partook in an in-depth semi-structured interview where they were prompted to reflect on Aboriginal language and culture with reference to a current interview protocol (in the context of sexual assault investigation). Results: Thematic analysis revealed overall support for the narrative-based structure of the interview protocol when eliciting information from Aboriginal children. A number of concerns were also identified, and these largely related to the syntax and vocabulary within the protocol, as well as the methods of questioning and building rapport with the child. Conclusions: Directions for future research and potential modifications to investigative interview protocols to better suit Aboriginal children are discussed.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This study examined the investigative interviewing of Australian Aboriginal children in cases of alleged sexual abuse, with a focus on three commonly included components of interview protocols: ground rules, practice narrative, and substantive phase. Analysis of 70 field transcripts revealed that the overall delivery and practice of ground rules at the beginning of the interview was positively associated with the spontaneous usage of rules in children's narratives of abuse. When specifically examining the "don't know" rule, however, only practice had an effect of children's usage of the rule (as opposed to simple delivery or no delivery at all). Children spoke more words overall, and interviewers used more open-ended prompts during the substantive phase when the interviews contained a practice narrative. Children most often disclosed sexual abuse in response to an open-ended prompt; however, they produced the most words in response to suggestive prompts. This article concludes with a discussion of the effectiveness of ground rules, practice narratives, and questioning with Aboriginal children.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This thesis focused on improving investigative interview protocols with Australian Aboriginal children (predominantly in cases of abuse). Current investigative interviewing procedures were evaluated, and a revised interview protocol tailored to Aboriginal children was created.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aims and objectives. The aim of the study was to determine how graduate nurses use protocols in their medication management activities. The objectives were to: examine the extent of adherence to various protocols in relation to medication activities and determine how the ward environment impacts on graduate nurses' use of protocols to manage patients' medications.
Background. Protocols help newly qualified nurses integrate new knowledge into practice and promote effective decision-making
Design. A descriptive prospective qualitative design was used.
Methods. Twelve graduate nurses involved in direct patient care in medical, surgical and specialty wards of a metropolitan teaching hospital participated in the study. Participant observations were conducted with the graduate nurses during a two-hour period when medications were being administered to patients. In-depth interviews were conducted with each nurse immediately after observations and demographic data were collected on participating nurses and patients in their care, including all medications prescribed. Protocols associated with medication management activities for the clinical settings were also transcribed.
Results. Six themes were evident from the data: availability and use of protocols, scrutinizing patients' identity before medication administration, double-checking certain medications before administration, writing incident reports, following specific policies and timing the administration of medications.
Conclusion. Graduate nurses adhered to protocols if they were perceived not to impede with other nursing activities. Participants were also more likely to follow protocols if they felt encouraged to make their own decisions and if there was a decreased likelihood that disciplinary action would be involved.
Relevance to clinical practice. Experienced health professionals should encourage graduate nurses to comply with medication protocols and to make clinically reasoned decisions about medication activities. By providing peer support and acting as role models, experienced health professionals can also demonstrate to graduate nurses how effective protocol use is an important component of quality patient care.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses a longitudinal, interview-based study of Australian secondary school students that explores the interaction between school ethos and forms of subjectivity. The study was designed to enable prospective and retrospective understandings of identity over time. It is suggested that this methodology encourages a reflexive self-positioning for both participants and researchers and, in the accumulation of an archive of perspectives, responds to poststructuralist critiques of contingency and construction in research interviews. Second, it is argued that the richness of longitudinal research invites more than one kind of analysis, and that working with and across conventionally divergent theoretical approaches can be fruitful. This is discussed with reference to Bourdieu's account of social field and habitus, and Hollway and Jefferson's notion of the 'defended subject'.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completely ignore the possibility that some principals may collude in private to achieve a fraudulent or illegal purpose. Therefore, it is critical to address the possibility of collusion attacks in order to correctly analyse security protocols. This paper proposes a framework by which to detect collusion attacks in security protocols. The possibility of security threats from insiders is especially taken into account. The case study demonstrates that our methods are useful and promising in discovering and preventing collusion attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In July 2003 an important one-volume text, Forget about Flinders: A Yanyuwa atlas of the south west gulf of Carpentaria produced in a limited edition of 14 copies, returned to Yanyuwa country and to the families who collaborated with John Bradley and artist Nona Cameron on the project. Subsequently, a second edition of 20 copies has been released, mainly to institutions. It is the most comprehensive attempt yet to restore Yanyuwa names to country and to produce a multilayered, dynamic, history-rich, and bilingual representation of how country is known in this community, and how the central song cycle texts intersect with Yanyuwa tradition. What follows is a condensed and edited interview with Frances Devlin-Glass, in which John Bradley discusses the motivations, the hybridised methodologies employed, the innovations of this new genre, and the pedagogical ends served by this latest iteration of Yanyuwa song cycles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper briefly describes four essential elements of interviews involving children, where the primary goal is to obtain detailed and accurate information about an event (e.g., an alleged incident of sexual abuse). These elements include (a) the establishment of a good rapport with the child, (b) a clear description of the purpose and ground-rules of the interview, (c) objectivity and open-mindness, and (d) effective questioning skills. A rationale for the importance of each of these elements and practical recommendations are offered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most of the current web-based application systems suffer from poor performance and costly heterogeneous accessing. Distributed or replicated strategies can alleviate the problem in some degree, but there are still some problems of the distributed or replicated model, such as data synchronization, load balance, and so on.  In this paper, we propose a novel architecture for Internet-based data processing system based on multicast and anycast protocols. The proposed architecture breaks the functionalities of existing data processing system, in particular, the database functionality, into several agents. These agents communicate with each other using multicast and anycast mechanisms. We show that the proposed architecture provides better scalability, robustness, automatic load balance, and performance than the current distributed architecture of Internet-based data
processing.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The cost of recovery protocols is important with respect to system performance during normal operation and failure in terms of overhead, and time taken to recover failed transactions. The cost of recovery protocols for web database systems has not been addressed much. In this paper, we present a quantitative study of cost of recovery protocols. For this purpose, we use an experiment setup to evaluate the performance of two recovery algorithms, namely the, two-phase commit algorithm and log-based algorithm. Our work is a step towards building reliable protocols for web database systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile ad-hoc networks are characterised by constant topology changes, the absence of fixed infrastructure and lack of any centralised control. Traditional routing algorithms prove to be inefficient in such a changing environment. Ad-hoc routing protocols such as dynamic source routing (DSR), ad-hoc on-demand distance vector routing (AODV) and destination-sequence distance vector (DSDV) have been proposed to solve the multi hop routing problem in ad-hoc networks. Performance studies of these routing protocols have assumed constant bit rate (CBR) traffic. Real-time multimedia traffic generated by video-on demand and teleconferencing services are mostly variable bit rate (VBR) traffic. Most of these multimedia traffic is encoded using the MPEG standard. (ISO moving picture expert group). When video traffic is transferred over MANETs a series of performance issues arise. In this paper we present a performance comparison of three ad-hoc routing protocols - DSR, AODV and DSDV when streaming MPEG4 traffic. Simulation studies show that DSDV performs better than AODV and DSR. However all three protocols fail to provide good performance in large, highly mobile network environments. Further study is required to improve the performance of these protocols in mobile ad-hoc networks offering VBR services.