898 resultados para Intellectually Disabled


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Siblings play an important role in children’s learning and development. Interactions with brothers and sisters provide opportunities to learn about sharing and emotional reciprocity, to develop social skills, to express thoughts and feelings, and to practise resolving conflict. But for children whose brother or sister has a disability, such as a rare chromosome disorder, some of these sibling experiences may be different. Many parents worry about how their non-disabled child will be affected by the experience of living with a brother or sister with a disability, and a great deal of research has explored both the possible negative consequences and also the potential benefits for siblings. In this article, we summarise the research findings and provide suggestions for ways that parents can support the positive development and well-being of all their children.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Little research has examined the extent to which active ageing is facilitated by family and nonfamilial support persons of older adults with intellectual disabilities. This study explores the role played by key unpaid carers/support persons of older adults with lifelong intellectual disabilities in facilitating "active ageing." Little research has examined the extent to which active ageing is facilitated by family and nonfamilial support persons of older adults with intellectual disabilities. This study explores the role played by key unpaid carers/support persons of older adults with lifelong intellectual disabilities in facilitating “active ageing.” All key social network members conceived active ageing to mean ongoing activity. Family and extended family members were found to play a crucial role in facilitating independent living and providing opportunities for recreational pursuits for those living in group homes. Members of religious organizations and group home staff provided the same types of opportunities where family support was absent. The findings suggest the need for improvements in resource provision, staff training, and group home policy and building design.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What do emergency physicians think of law? Do they know the law? What role does it have in the practice of emergency medicine? Emergency physicians in New South Wales, Victoria and Queensland are being asked about these issues in a study by the Queensland University of Technology, Brisbane, Australia, titled ‘Withholding and withdrawing life-sustaining treatment from adults who lack capacity: The role of law in medical practice’. The study aims to examine the role that law plays in decisions to withhold or withdraw life-sustaining treatment from adults who lack capacity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What do physicians think of law? Do they know the law? What role does it have in the provision of end-of-life care? Physicians in New South Wales, Victoria and Queensland are being asked about these issues in a study by the Queensland University of Technology entitled ‘Withholding and withdrawing life-sustaining treatment from adults who lack capacity: The role of law in medical practice’. This research aims to examine the role that law plays in decisions to withhold or withdraw life-sustaining treatment from adults who lack capacity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper attempts, using data from the British Labour Force Survey 1996, to examine to what extent differences in labour market outcomes between able-bodied and disabled men may be attributed to differences in endowments of human capital and associated productivity differences. Both labour force participation and selectivity corrected human capital equations are estimated and decomposition techniques applied to them. Using the methodology of Baldwin and Johnson [Baldwin, M., Johnson, W.G., 1994. Labor market discrimination against men with disabilities. Journal of Human Resources, XXIX(1), Winter, 1–19], the employment effects of wage discrimination against the disabled are also estimated. Evidence of both substantial wage and participation rate differences between able-bodied and disabled men are found, which have implications for the operation of the 1995 Disability Discrimination Act.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research on the aspirations of people with intellectual disabilities documents the importance of alternative zones of inclusion where they can assert their own definitions of ability and normality. This stands in contrast to assumptions concerning technology and disability that position technology as ‘normalising’ the disabled body. This paper reports on the role of a digital music jamming tool in providing access to creative practice by people with intellectual disabilities. The tool contributed to the development of a spatio-temporal zone to enable aesthetic agency within and beyond the contexts of deinstitutionalised care. The research identifies the interactions among tools, individuals and groups that facilitated participants’ agency in shaping the form of musical practice. Further, we document the properties of emergent interaction - supported by a tool oriented to enabling music improvisation - as potentially resisting assumptions regarding normalisation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The inner city Brisbane suburbs of the West End peninsula are poised for redevelopment. Located within walking distance to CBD workplaces, home to Queensland’s highest value cultural precinct, and high quality riverside parklands, there is currently a once-in-a-lifetime opportunity to redevelop parts of the suburb to create a truly urban neighbourhood. According to a local community association, local residents agree and embrace the concept of high-density living, but are opposed to the high-rise urban form (12 storeys) advocated by the City’s planning authority (BCC, 2011) and would prefer to see medium-rise (5-8 storeys) medium-density built form. Brisbane experienced a major flood event which inundated the peninsula suburbs of West End in summer January 2011. The vulnerability of taller buildings to the vagaries of climate and more extreme weather events and their reliance on main electricity was exposed when power outages immediately before, during and after the flood disaster seriously limited occupants’ access and egress when elevators were disabled. Not all buildings were flooded but dwellings quickly became unliveable due to disabled air-conditioning. Some tall buildings remained uninhabitable for several weeks after the event. This paper describes an innovative design research method applied to the complex problem of resilient, sustainable neighbourhood form in subtropical cities, in which a thorough comparative analysis of a range of multiple-dwelling types has revealed the impact that government policy regarding design of the physical environment has on a community’s resilience. The outcomes advocate the role of climate-responsive design in averting the rising human capital and financial costs of natural disasters and climate change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In Exercise in Losing Control (2007) and We Are for You Because We are Against Them (2010), Austrian-born artist Noemi Lakmaier represents Otherness – and, in particular, the experience of Otherness as one of being vulnerable, dependent or visibly different from everyone else in a social situation – by placing first herself then a group of participants in big circular balls she calls ‘Weebles’. In doing so, Lakmaier depicts Otherness as an absurd, ambiguous or illegible element in otherwise everyday ‘living installations’ in which people meet, converse, dine and connect with spectators and passersby on the street. In this paper I analyse the way spectators and passersby respond to the weeble-wearers. Not surprisingly, responses vary – from people who hurry away, to people who try to talk to the weeble-wearer, to people who try to kick or tip the weeble to test its reality. The not-quite-normal situation, and the visibility of the spectators in the situation, asks spectators to rehearse their response to corporeal differences that might be encountered in day-to-day life. As the range of comments, confrontations and struggles show, the situation transfers the ill-at-ease, embarrassed and awkward aspects of dealing with corporeal difference from the disabled performer to the able spectator-become-performer. In this paper, I theorise some of the self-conscious spectatorial responses this sort of work can provoke in terms of an ethics of embarrassment. As the Latin roots of the word attest, embarrassment is born of a block, barrier or obstacle to move smoothly through a social or communicative encounter. In Lakmaier’s work, a range of potential blocks present themselves. The spectators’ responses – from ignoring the weeble, to querying the weeble, to asking visual, verbal or physical questions about how the weeble works, and so on – are ways of managing the interruption and moving forward. They are, I argue, strategies for moving from confusion to comprehension, or from what Emmanuel Levinas would call an encounter with the unknown to back into the horizon of the known, classified and classifiable. They flag the potential for what Levinas would call an ethical face-to-face encounter with the Other in which spectators and passersby may unexpectedly find themselves in a vulnerable position.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

OBJECTIVE: To determine the point at which differences in clinical assessment scores on physical ability, pain and overall condition are sufficiently large to correspond to a subjective perception of a meaningful difference from the perspective of the patient. METHODS: Forty patients with a diagnosis of rheumatoid arthritis participated in an evening of clinical assessment and one-on-one conversations with each other regarding their arthritic condition. The assessments included tender and swollen joint counts, clinician and patient global assessments, participant assessment of pain and the Health Assessment Questionnaire (HAQ) on physical ability. After each conversation, participants rated themselves relative to their conversational partner on physical ability, pain and overall condition. These subjective comparative ratings were compared to the differences of the individual clinical assessments. RESULTS: In total there were 120 conversations. Generally participants judged themselves as less disabled than others. They rated themselves as "somewhat better" than their conversation partner when they had a (mean) 7% better score on the HAQ, 6% less pain, and 9% better global assessment. In contrast, they rated themselves as "somewhat worse" when they had a (mean) 16% worse score on the HAQ, 16% more pain, and 29% worse global assessment. CONCLUSIONS: Patients view clinically important differences in an asymmetric manner. These results can provide guidance in interpreting results and planning clinical trials.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is the protocol for a review and there is no abstract. The objectives are as follows:The primary objective of the review is to assess the effectiveness of primary, secondary and tertiary intervention programmes utilised to reduce or prevent, or both, elderly abuse in organisational, institutional and community settings. We will also identify and report on adverse consequences or effects of the intervention/s in the review.The secondary objective is to investigate whether intervention?s effects are modified by types of abuse, types of participants, setting of intervention or cognitive status of the elderly.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper reports on an action-learning project conducted within the first year criminal justice curriculum in an Australian university. The project was initiated after an audit of first year units and student feedback revealed that there were gaps in the curriculum that possibly were disadvantaging certain groups of students, including mature, international, queer and disabled students, rendering them invisible. Official (university controlled student surveys and other feedback mechanisms) and anecdotal feedback found that at least some students in these groups felt disenfranchised; that is, unable to relate to either the subject mater, other students, or the university setting itself. As a school in which social justice provides the context for learning about criminal justice, first year subject coordinators as a group came to recognise the need for embedding diversity in the curriculum.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Denial-of-service (DoS) attacks are a growing concern to networked services like the Internet. In recent years, major Internet e-commerce and government sites have been disabled due to various DoS attacks. A common form of DoS attack is a resource depletion attack, in which an attacker tries to overload the server's resources, such as memory or computational power, rendering the server unable to service honest clients. A promising way to deal with this problem is for a defending server to identify and segregate malicious traffic as earlier as possible. Client puzzles, also known as proofs of work, have been shown to be a promising tool to thwart DoS attacks in network protocols, particularly in authentication protocols. In this thesis, we design efficient client puzzles and propose a stronger security model to analyse client puzzles. We revisit a few key establishment protocols to analyse their DoS resilient properties and strengthen them using existing and novel techniques. Our contributions in the thesis are manifold. We propose an efficient client puzzle that enjoys its security in the standard model under new computational assumptions. Assuming the presence of powerful DoS attackers, we find a weakness in the most recent security model proposed to analyse client puzzles and this study leads us to introduce a better security model for analysing client puzzles. We demonstrate the utility of our new security definitions by including two hash based stronger client puzzles. We also show that using stronger client puzzles any protocol can be converted into a provably secure DoS resilient key exchange protocol. In other contributions, we analyse DoS resilient properties of network protocols such as Just Fast Keying (JFK) and Transport Layer Security (TLS). In the JFK protocol, we identify a new DoS attack by applying Meadows' cost based framework to analyse DoS resilient properties. We also prove that the original security claim of JFK does not hold. Then we combine an existing technique to reduce the server cost and prove that the new variant of JFK achieves perfect forward secrecy (the property not achieved by original JFK protocol) and secure under the original security assumptions of JFK. Finally, we introduce a novel cost shifting technique which reduces the computation cost of the server significantly and employ the technique in the most important network protocol, TLS, to analyse the security of the resultant protocol. We also observe that the cost shifting technique can be incorporated in any Diffine{Hellman based key exchange protocol to reduce the Diffie{Hellman exponential cost of a party by one multiplication and one addition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dr Kathy A. Mills provides a critical synthesis and review of the new book by Matthew W. Hughey entitle: White Bound: Nationalists, Antiractists, and the Shared Meanings of Race, published by Standford University Press in 2012. A sample of Dr Mills' review reads: "The author positions race squarely at the center to challenge the shared assumptions of white supremacist logic on both sides of the debate. The clever thesis blurs the boundaries between “good whites” and “bad whites”, rendering the white reader intellectually stimulated, but existentially unchanged – White Bound – as the author ponders: “Perhaps we have met the enemy, and he [it] is us” (p.193)...The unanswered question that remains is: How do we resist the various “shades” of white supremacy to pursue counter-hegemonic practices?"