928 resultados para Society for the Discharge and Relief of Persons Imprisoned for Small Debts.
Resumo:
Rapid urbanization in developing countries is putting stress on current infrastructure, which is resulting in the rapid consumption of natural resources to cope with the increasing demand of the population. Saudi Arabia is one of the developing countries facing rapid urbanization where its infrastructure is facing a huge demand by the increasing urbanization levels of its major cities. Developing sustainable housing in Saudi Arabia is a must for the preservation of resources for future generations of the region and of the world. In the coming years, several resources (such as fossil fuels and natural water) will be facing shortage if not managed properly. Providing electricity for housing in Saudi Arabia is one of the biggest challenges facing the country, where it is estimated that by 2050 energy demand in the Kingdom will be approximately 120 GW, and to meet this growing demand, 8 million barrels of oil per day will be required. However, implementation of Sustainable Housing in Saudi is still problematic to reach the desired goals of various key Saudi stakeholders. This paper analyses three case studies that have adopted sustainable construction methods and compares them to traditional non-sustainable houses. The outcome suggests that there is a viable chance for development of sustainable housing in the region if supported by the government with less red tape to deal with. This paper recommends that the Saudi governments should mandate new laws to reduce the overall consumption of energy and water to reduce the overall consumption of natural resources to secure the future generation’s demand of natural resources.
Resumo:
A cohort of 59 persons with industrial handling of low levels of acrylonitrile is being studied as part of a medical surveillance programme. Previously, an extended haemoglobin adduct monitoring (N-(cyanoethyl)valine and N-(hydroxyethyl)-valine) was performed regarding the glutathione transferases hGSTM1 and hGSTT1 polymorphisms but no influence of hGSTM1 or hGSTT1 polymorphisms on specific adduct levels was found. A compilation of case reports of human accidental poisonings had pointed to significant individual differences in human acrylonitrile metabolism and toxicity. Therefore, a re-evaluation of the industrial cohort included known polymorphisms of the glutathione transferases hGSTM3 and hGSTP1 as well as of the cytochrome P450 CYP2E1. A detailed statistical analysis revealed that exposed carriers of the allelic variants of hGSTP1, hGSTP1*B/hGSTP1*C, characterized by a single nucleotide polymorphism at nucleotide 313 which results in a change from Ile to Val at codon 104, had higher levels of the acrylonitrile-specific haemoglobin adduct N-(cyanoethyl)valine compared to the carriers of the codon 113 alleles hGSTP1*A and hGSTP1*D. The single nucleotide polymorphism at codon 113 of hGSTP1 (hGSTP1*A/hGSTP1*B versus hGSTP1*C/hGSTP1*D) did not show an effect, and also no influence was seen on specific haemoglobin adduct levels of the polymorphisms of hGSTM3 or CYP2E1. The data, therefore, point to a possible influence of a human enzyme polymorphism of the GSTP1 gene at codon 104 on the detoxication of acrylonitrile which calls for experimental toxicological investigation. The study also confirmed the impact of GSTT1 polymorphism on background N-(hydroxyethyl)-valine adduct levels in haemoglobin which are caused by endogenous ethylene oxide.
Resumo:
Pain is common in residential aged care facilities (RACFs). In 2005, the Australian Pain Society developed 27 recommendations for good practice in the identification, assessment, and management of pain in these settings. This study aimed to address implementation of the standards and evaluate outcomes. Five facilities in Australia participated in a comprehensive evaluation of RACF pain practice and outcomes. Pre-existing pain management practices were compared with the 27 recommendations, before an evidence-based pain management program was introduced that included training and education for staff and revised in-house pain-management procedures. Post-implementation audits evaluated the program's success. Aged care staff teams also were assessed on their reports of self-efficacy in pain management. The results show that before the implementation program, the RACFs demonstrated full compliance on 6 to 12 standards. By the project's completion, RACFs demonstrated full compliance with 10 to 23 standards and major improvements toward compliance in the remaining standards. After implementation, the staff also reported better understanding of the standards (p < .001) or of facility pain management guidelines (p < .001), increased confidence in therapies for pain management (p < .001), and increased confidence in their training to assess pain (p < .001) and recognize pain in residents with dementia who are nonverbal (p = .003). The results show that improved evidence-based practice in RACFs can be achieved with appropriate training and education. Investing resources in the aged care workforce via this implementation program has shown improvements in staff self-efficacy and practice.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
This study examines the role that the size of a victimised organisation and the size of the victim’s loss have on attitudes regarding the acceptance or unacceptance of 12 questionable consumer actions. A sample of 815 American adults rated each scenario on a scale anchored by very acceptable and very unacceptable. It was shown that the size of the victimised organisation tends to influence consumers’ opinions with more disdain directed towards consumers who take advantage of smaller businesses. Similarly, the respondents tended to be more critical of these actions when the loss incurred by the victimised organisation was large. A 2x2 matrix concurrently delineated the nature of the extent to which opinions regarding the 12 actions differed depending upon the mediating variable under scrutiny.
Resumo:
This paper attends to the idea of disconnection as a way of theorising people’s lived experience of social networking sites. Enrolling and extending a disconnective practice lens we suggest that the disconnective strategies of suspension and prevention are operational necessities for those we might see as the users and owners of sites such as Facebook. Indeed, our work demonstrates that disconnection in these contexts need not be associated only with modes of resistance and departure, but can also act as socioeconomic lubricant.
Resumo:
Issues Research shows that young people at risk of developing a substance use disorder often use substances to deal with problems, particularly relationship problems and emotional problems. Music listening is a widely available and engaging activity that may help young people address these problem areas. This study was part of a larger project to develop a phone app for young people in which they use music for emotional wellbeing. Approach Three focus groups with young people aged 15–25 years were conducted and the transcripts were analysed by three of the authors using a thematic analysis procedure (Braun & Clarke, 2006). Key Findings: Young people used music in four main ways to achieve wellbeing: relationship building through sharing music; cre- ating an ambience using music; using music to experience an emotion more fully; and using music to modify an emotion. Several mecha- nisms by which music achieved these functions were identified. Par- ticipants also articulated specific times when they would not use music and why. Discussion and Conclusions The information from these focus groups provides many avenues for the development of the app and for understanding how music listening helps young people to achieve wellbeing. These ideas can readily be used with young people at risk of developing substance use problems as it gives them an engaging and low cost alternative for managing their emotions and building relationships.
Resumo:
Enterprise Architecture Management (EAM) is discussed in academia and industry as a vehicle to guide IT implementations, alignment, compliance assessment, or technology management. Still, a lack of knowledge prevails about how EAM can be successfully used, and how positive impact can be realized from EAM. To determine these factors, we identify EAM success factors and measures through literature reviews and exploratory interviews and propose a theoretical model that explains key factors and measures of EAM success. We test our model with data collected from a cross-sectional survey of 133 EAM practitioners. The results confirm the existence of an impact of four distinct EAM success factors, ‘EAM product quality’, ‘EAM infrastructure quality’, ‘EAM service delivery quality’, and ‘EAM organizational anchoring’, and two important EAM success measures, ‘intentions to use EAM’ and ‘Organizational and Project Benefits’ in a confirmatory analysis of the model. We found the construct ‘EAM organizational anchoring’ to be a core focal concept that mediated the effect of success factors such as ‘EAM infrastructure quality’ and ‘EAM service quality’ on the success measures. We also found that ‘EAM satisfaction’ was irrelevant to determining or measuring success. We discuss implications for theory and EAM practice.
Resumo:
The potential benefits of shared eHealth records systems are promising for the future of improved healthcare. However, the uptake of such systems is hindered by concerns over the security and privacy of patient information. The use of Information Accountability and so called Accountable-eHealth (AeH) systems has been proposed to balance the privacy concerns of patients with the information needs of healthcare professionals. However, a number of challenges remain before AeH systems can become a reality. Among these is the need to protect the information stored in the usage policies and provenance logs used by AeH systems to define appropriate use of information and hold users accountable for their actions. In this paper, we discuss the privacy and security issues surrounding these accountability mechanisms, define valid access to the information they contain, discuss solutions to protect them, and verify and model an implementation of the access requirements as part of an Information Accountability Framework.
Resumo:
Mentoring has been identified as an important career development activity for women managers. Over the last four decades, organisations world-wide have implemented formal mentoring programs for women and for members of minority groups in recognition of the personal and professional benefits mentoring provides, not only for persons who are mentored but also, for those who undertake the mentoring. This chapter reviews the literature on mentoring and the contribution it can make to the career development of women managers. It reviews several inter-related bodies of literature: women’s representation in management positions worldwide; theories and frameworks of mentoring; empirical research exploring the impact of mentoring relationships on women managers’ career development; current illustrations of formal programs offered to women managers in the public and private sectors; and some critical issues that continue to impact women managers in relation to mentoring relationships. The chapter concludes by making an argument for further research on gender and mentoring.
Resumo:
In Australia, the legal basis for the detention and restraint of people with intellectual impairment is ad hoc and unclear. There is no comprehensive legal framework that authorises and regulates the detention of, for example, older people with dementia in locked wards or in residential aged care, people with disability in residential services or people with acquired brain injury in hospital and rehabilitation services. This paper focuses on whether the common law doctrine of necessity (or its statutory equivalents) should have a role in permitting the detention and restraint of people with disabilities. Traditionally, the defence of necessity has been recognised as an excuse, where the defendant, faced by a situation of imminent peril, is excused from the criminal or civil liability because of the extraordinary circumstances they find themselves in. In the United Kingdom, however, in In re F (Mental Patient: Sterilisation) and R v Bournewood Community and Mental Health NHS Trust, ex parte L, the House of Lords broadened the defence so that it operated as a justification for treatment, detention and restraint outside of the emergency context. This paper outlines the distinction between necessity as an excuse and as a defence, and identifies a number of concerns with the latter formulation: problems of democracy, integrity, obedience, objectivity and safeguards. Australian courts are urged to reject the United Kingdom approach and retain an excuse-based defence, as the risks of permitting the essentially utilitarian model of necessity as a justification are too great.
Resumo:
Objective Child maltreatment is a problem that has longer recognition in the northern hemisphere and in high-income countries. Recent work has highlighted the nearly universal nature of the problem in other countries but demonstrated the lack of comparability of studies because of the variations in definitions and measures used. The International Society for the Prevention of Child Abuse and Neglect has developed instrumentation that may be used with cross-cultural and cross-national benchmarking by local investigators. Design and sampling The instrument design began with a team of expert in Brisbane in 2004. A large bank of questions were subjected to two rounds of Delphi review to develop the fielded version of the instrument. Convenience samples included approximately 120 parent respondents with children under the age of 18 in each of six countries (697 total). Results This paper presents an instrument that measures parental behaviors directed at children and reports data from pilot work in 6 countries and 7 languages. Patterns of response revealed few missing values and distributions of responses that generally were similar in the six countries. Subscales performed well in terms of internal consistency with Cronbach's alpha in very good range (0.77–0.88) with the exception of the neglect and sex abuse subscales. Results varied by child age and gender in expected directions but with large variations among the samples. About 15% of children were shaken, 24% hit on the buttocks with an object, and 37% were spanked. Reports of choking and smothering were made by 2% of parents. Conclusion These pilot data demonstrate that the instrument is well tolerated and captures variations in, and potentially harmful forms of child discipline. Practice implications The ISPCAN Child Abuse Screening Tool – Parent Version (ICAST-P) has been developed as a survey instrument to be administered to parents for the assessment of child maltreatment in a multi-national and multi-cultural context. It was developed with broad input from international experts and subjected to Dephi review, translation, and pilot testing in six countries. The results of the Delphi study and pilot testing are presented. This study demonstrates that a single instrument can be used in a broad range of cultures and languages with low rates of missing data and moderate to high internal consistency.
Resumo:
This study analyses the diction of Latin building inscriptions. Despite its importance, this topic has rarely been discussed before: the most substantial contribution on the subject is a short dissertation by Klaus Gast (1965) that focuses on 100 inscriptions dating mostly from the Republican period. Marietta Horster (2001) also touched upon this theme in her thesis on imperial building inscriptions. I have collected my source material in North Africa because more Latin building inscriptions dating from the Imperial period have survived there than in any other area of the Roman Empire. By means of a thorough and independent survey, I have assembled all relevant African Latin building inscriptions datable to the Roman period (between 146 BC and AD 425), 1002 texts, into a corpus. These inscriptions are all fully edited in Appendix 1; Appendix 2 contains references to earlier editions. To facilitate search operations, both are also available in electronic form. They are downloadable from the address http://www.helsinki.fi/hum/kla/htm/jatkoopinnot.htm. Chapter one is an introduction dealing with the nature of building inscriptions as source material. Chapter two offers a statistical overview of the material. The following main section of the work falls into five chapters, each of which analyses one main part of a building inscription. An average building inscription can be divided into five parts: the starting phrase opens the inscription (a dedication to gods, for example), the subject part identifies the builder, the object part describes the constructed or repaired building, the predicate part records the building activity and the supplement part offers additional information on the project (it can specify the funding, for instance). These chapters are systematic and chronological and their purpose is to register and interpret the phrases used, to analyse reasons for their use and for their popularity among the different groups of builders. Chapter eight, which follows the main section of the work, creates a typology of building inscriptions based on their structure. It also presents the most frequently attested types of building inscriptions. The conclusion describes, on a general level, how the diction of building inscriptions developed during the period of study and how this striking development resulted from socio-economic changes that took place in Romano-African society during Antiquity. This study shows that the phraseology of building inscriptions had a clear correlation both with the type of builder and with the date of carving. Private builders tended to accentuate their participation (especially its financial side) in the project; honouring the emperor received more emphasis in the building inscriptions set up by communities; the texts produced by the army were concise. The chronological development is so clear that it enables stylistic dating. At the beginning of the imperial period the phrases were clear, concrete, formal and stereotyped but by Late Antiquity they have become vague, subjective, flexible, varied and even rhetorically or poetically coloured.
Resumo:
SecB, a soluble cytosolic chaperone component of the Secexport pathway, binds to newly synthesized precursor proteins and prevents their premature aggregation and folding and subsequently targets them to the translocation machinery on the membrane. PreMBP, the precursor form of maltose binding protein, has a 26-residue signal sequence attached to the N-terminus of MBP and is a physiological substrate of SecB. We examine the effect of macromolecular crowding and SecB on the stability and refolding of denatured preMBP and MBP. PreMBP was less stable than MBP (ΔTm =7( 0.5 K) in both crowded and uncrowded solutions. Crowding did not cause any substantial changes in the thermal stability ofMBP(ΔTm=1(0.4 K) or preMBP (ΔTm=0(0.6 K), as observed in spectroscopically monitored thermal unfolding experiments. However, both MBP and preMBP were prone to aggregation while refolding under crowded conditions. In contrast to MBP aggregates, which were amorphous, preMBP aggregates form amyloid fibrils.Under uncrowded conditions, a molar excess of SecB was able to completely prevent aggregation and promote disaggregation of preformed aggregates of MBP. When a complex of the denatured protein and SecB was preformed, SecB could completely prevent aggregation and promote folding of MBP and preMBP even in crowded solution. Thus, in addition to maintaining substrates in an unfolded, export-competent conformation, SecB also suppresses the aggregation of its substrates in the crowded intracellular environment. SecB is also able to promote passive disaggregation of macroscopic aggregates of MBP in the absence of an energy source such as ATP or additional cofactors. These experiments also demonstrate that signal peptide can reatly influence protein stability and aggregation propensity.