881 resultados para control over life
Resumo:
Research Question: What relationships exist between general self efficacy, locus of control and the nursing practice environment and caring efficacy and job satisfaction? Background: Important characteristics of current nursing practice include nurses having the ability to develop and continue therapeutic relationships with patients, nurses having autonomy and control over the practice environment and nurses having more involvement in decision making. In addition, employee satisfaction is enhanced when organisations offer access to authority. Despite this, nurses continue to complain of feeling powerless in their ability to make decisions. Sample: The study population and criteria for selection included Registered Nurses in Australia who were at the time members of an Australian professional and industrial organisation. Methods: A cross-sectional survey was undertaken. Data analysis was conducted using descriptive and bivariate statistics, and structural equation modelling. Results: The model fit the data well (χ² = 2.3594, χ²/df = 2.3594 and CFI = 0.9987). Twenty four percent of variation in caring efficacy (CE) can be accounted for by general self-efficacy (GSE); work locus of control (WLC) and practice environment (PE) and 62% of the variation in job satisfaction (JS) can be accounted for by GSE, WLC and PE. All pathways were found to be significant except PE to CE. GSE positively explained CE (β = 0.38). WLC was negatively related to CE i.e., as CE scores increased WLC scores decreased (β = -0.23). Further testing of the model found CE was positively related to GSE (βZ = 0.38, p < 0.001) and negatively related to WLC (βZ = - 0.23, p = 0.001). PE was not significantly associated with CE (βZ = - 0.01, p = 0.85). JS was explained by PE, which was positively related (βZ = 0.69, p = < 0.001); GSE which was negatively related (βZ - 0 .09, p < 0.001) and WLC, which was also negatively related (βZ = - 0.20, p < 0.001). Implications for Practice Nursing and organisational leaders should ensure the development of strategies for professional development and orientation programmes which may enhance nurses’ ability to develop caring relationships and express caring behaviours to their patients and as a result improve organisational and patient outcomes. Nursing shortages and turnover rates are associated with job satisfaction and the nursing practice environment. Improving the nursing environment can produce benefits to the health system such as better job satisfaction, improved workforce retention and better patient outcomes.
Resumo:
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.
Resumo:
Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how protect their own privacy through online mechanisms. What is required is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting user’s personal information. The research has posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online information systems.
Resumo:
Current literature warns organisations about a global ageing phenomenon. Workplace ageing is causing a diminishing work pool which has consequences for a sustainable workforce in the future. This phenomenon continues to impact on local government councils in Australia. Australia has one of the world’s most rapidly ageing populations, and there is evidence that Australian local government councils are already resulting in an unsustainable workforce. Consequently, this research program investigated the role of older workers in the Queensland local government workplace in enabling them to extend their working lives towards transitional employment and a sustainable workforce in the future. Transitional Employment is intended as a strategy for enabling individuals to have greater control over their employment options and their employability during the period leading to their final exit from the workforce. There was no evidence of corporate support for older workers in Queensland local government councils other than tokenistic government campaigns encouraging organisations to "better value their older workers". (Queensland Government, 2007d, p.6). TE is investigated as a possible intervention for older workers in the future. The international and national literature review reflected a range of matters impacting on current older workers in the workforce and barriers preventing them from accessing services towards extending their employment beyond the traditional retirement age (60 years) as defined by the Australian Government; an age when individuals can access their superannuation. Learning and development services were identified as one of those barriers. There was little evidence of investment in or consistent approaches to supporting older workers by organisations. Learning and development services appeared at best to be ad hoc, reactive to corporate productivity and outputs with little recognition of the ageing phenomenon (OECD, 2006, p.23) and looming skills and labour shortages (ALGA, 2006, p. 19). Themes from the literature review led to the establishment of three key research questions: 1. What are the current local government workforce issues impacting on skills and labour retention? 2. What are perceptions about the current workplace environment? And, 3. What are the expectations about learning and development towards extending employability of older workers within the local government sector? The research questions were explored by utilising three qualitative empirical studies, using some numerical data for reporting and comparative analysis. Empirical Study One investigated common themes for accessing transitional employment and comprised two phases. A literature review and Study One data analysis enabled the construction of an initial Transitional Employment Model which includes most frequent themes. Empirical Study Two comprised focus groups to further consider those themes. This led to identification of issues impacting the most on access to learning and development by older workers and towards a revised TEM. Findings presented majority support for transitional employment as a strategy for supporting older workers to work beyond their traditional retirement age. Those findings are presented as significant issues impacting on access to transitional employment within the final 3-dimensionsal TEM. The model is intended as a guide for responding to an ageing workforce by local government councils in the future. This study argued for increased and improved corporate support, particularly for learning and development services for older workers. Such support will enable older workers to maintain their employability and extend their working lives; a sustainable workforce in the future.
Resumo:
Several randomized trials have found behavior change programs delivered via text messaging to be efficacious to improve preventive health behaviors such as physical activity and stopping smoking; however few have assessed its value in skin cancer prevention or early detection. The HealthyTexts study enrolled 678 participants 18–42 years, and assigned them to receive 21 text messages about skin cancer prevention, skin self-examination or physical activity(attention control) over the course of one year. Baseline data have been collected and outcomes will be assessed at three months and twelve months post intervention. The trial aims to increase the mean overall sun protection habits index score from 2.3 to 2.7 with a standard deviation of 0.5 (effect size of 0.5) and the proportion of people who conduct a whole-body skin self-examination by an absolute 10%. This paper describes the study design and participants' baseline characteristics. In addition, participants' goals for their health, and strategies they apply to achieve those goals are summarized.
Resumo:
Predicate encryption is a new primitive that supports flexible control over access to encrypted data. We study predicate encryption systems, evaluating a wide class of predicates. Our systems are more expressive than the existing attribute-hiding systems in the sense that the proposed constructions support not only all existing predicate evaluations but also arbitrary conjunctions and disjunctions of comparison and subset queries. Toward our goal, we propose encryption schemes supporting multi-inner-product predicate and provide formal security analysis. We show how to apply the proposed schemes to achieve all those predicate evaluations.
Resumo:
This paper examines the extent to which patients who have been diagnosed as having terminal cancer choose to use non-medical therapies. In particular it is concerned with the illness behaviour of patients who are receiving conventional cytotoxic drug and radiation treatments, who also decide to use a wide range of ‘alternative’ medications and therapies. The paper discusses the findings of a study of 152 patients with metastatic cancer that examined the extent to which they used alternative cancer therapies, as well as the beliefs and attitudes they have about their cancer, its treatment, and the practitioners providing that treatment. Four groups of users of alternative therapies, who differ according to their commitment to and the type of therapies they use, were identified. Results of logistic regression analyses indicate that those using alternative therapies were different in range of social attitudes. These differences were primarily their greater reported ‘will to live’ and desire for control over treatment decisions, and the differing beliefs they hold about their disease.
Resumo:
Gelatin-methacrylamide (gelMA) hydrogels are shown to support chondrocyte viability and differentiation and give wide ranging mechanical properties depending on several cross-linking parameters. Polymer concentration, UV exposure time, and thermal gelation prior to UV exposure allow for control over hydrogel stiffness and swelling properties. GelMA solutions have a low viscosity at 37 °C, which is incompatible with most biofabrication approaches. However, incorporation of hyaluronic acid (HA) and/or co-deposition with thermoplastics allows gelMA to be used in biofabrication processes. These attributes may allow engineered constructs to match the natural functional variations in cartilage mechanical and geometrical properties.
Resumo:
Rises recorded for girls’ violence in countries like Australia, Canada, United Kingdom and United States have been hotly contested. One view is these rising rates of violence are an artefact of new forms of policy, policing, criminalisation and social control over young women. Another view is that young women may indeed have become more violent as they have increasingly participated in youth subcultural activities involving gangs and drugs, and cyber‐cultural activities that incite and reward girls’ violence. Any comprehensive explanation will need to address how a complex interplay of cultural, social, behavioural, and policy responses contribute to these rises. This article argues that there is no singular cause, explanation or theory that accounts for the rises in adolescent female violence, and that many of the simple explanations circulating in popular culture are driven by an anti‐feminist ideology. By concentrating on females as victims of violence and very rarely as perpetrators, feminist criminology has for the most part ducked the thorny issue of female violence, leaving a discursive space for anti‐feminist sentiment to reign. The article concludes by arguing the case for developing a feminist theory of female violence.
Resumo:
In this paper we introduce a novel design for a translational medical research ecosystem. Translational medical research is an emerging field of work, which aims to bridge the gap between basic medical science research and clinical research/patient care. We analyze the key challenges of digital ecosystems for translational research, based on real world scenarios posed by the Lab for Translational Research at the Harvard Medical School and the Genomics Research Centre of the Griffith University, and show how traditional IT approaches fail to fulfill these challenges. We then introduce our design for a translational research ecosystem. Several key contributions are made: A novel approach to managing ad-hoc research ecosystems is introduced; a new security approach for translational research is proposed which allows each participating site to retain control over its data and define its own policies to ensure legal and ethical compliance; and a design for a novel interactive access control framework which allows users to easily share data, while adhering to their organization's policies is presented.
Resumo:
Parallel interleaved converters are finding more applications everyday, for example they are frequently used for VRMs on PC main boards mainly to obtain better transient response. Parallel interleaved converters can have their inductances uncoupled, directly coupled or inversely coupled, all of which have different applications with associated advantages and disadvantages. Coupled systems offer more control over converter features, such as ripple currents, inductance volume and transient response. To be able to gain an intuitive understanding of which type of parallel interleaved converter, what amount of coupling, what number of levels and how much inductance should be used for different applications a simple equivalent model is needed. As all phases of an interleaved converter are supposed to be identical, the equivalent model is nothing more than a separate inductance which is common to all phases. Without utilising this simplification the design of a coupled system is quite daunting. Being able to design a coupled system involves solving and understanding the RMS currents of the input, individual phase (or cell) and output. A procedure using this equivalent model and a small amount of modulo arithmetic is detailed.
Resumo:
The purpose of this paper is to provide an evolutionary perspective of cloud computing (CC) by integrating two previously disparate literatures: CC and information technology outsourcing (ITO). We review the literature and develop a framework that highlights the demand for the CC service, benefits, risks, as well as risk mitigation strategies that are likely to influence the success of the service. CC success in organisations and as a technology overall is a function of (i) the outsourcing decision and supplier selection, (ii) contractual and relational governance, and (iii) industry standards and legal framework. Whereas CC clients have little control over standards and/or the legal framework, they are able to influence other factors to maximize the benefits while limiting the risks. This paper provides guidelines for (potential) cloud computing users with respect to the outsourcing decision, vendor selection, service-level-agreements, and other issues that need to be addressed when opting for CC services. We contribute to the literature by providing an evolutionary and holistic view of CC that draws on the extensive literature and theory of ITO. We conclude the paper with a number of research paths that future researchers can follow to advance the knowledge in this field.
Resumo:
We show for the first time that by controlling the growth kinetics of Morganella psychrotolerans, a silver-resistant psychrophilic bacterium, the shape anisotropy of silver nanoparticles can be achieved. This is particularly important considering that there has been no report that demonstrates a control over shape of Ag nanoparticles by controlling the growth kinetics of bacteria during biological synthesis. Additionally, we have for the first time performed electrochemistry experiments on bacterial cells after exposing them to Ag(+) ions, which provide significant new insights about mechanistic aspects of Ag reduction by bacteria. The possibility to achieve nanoparticle shape control by using a "green" biosynthesis approach is expected to open up new exciting avenues for eco-friendly, large-scale, and economically viable shape-controlled synthesis of nanomaterials.
Resumo:
The term fashion system describes inter-relationships between production and consumption illustrating how the production of fashion is a collective activity. For instance, Yuniya Kawamura notes systems for the production of fashion differ around the globe and are subject to constant change, and Jennifer Craik draws attention to an ‘array of competing and intermeshing systems cutting across western and non-western cultures. In China, Shanghai’s nascent fashion system seeks to emulate the Eurocentric system of Fashion Weeks and industry support groups. It promises emergent designers a platform for global competition, yet there are tensions from within. Interaction with a fashion system inevitably means becoming validated or legitimised. Legitimisation in turn depends upon gatekeepers who make aesthetic judgments about the status, quality and cultural value of a designers work. Notwithstanding the proliferation of fashion media, in Shanghai a new gatekeeper has arrived, seeking to filter authenticity from artifice, offering truth in a fashion market saturated with fakery and the hollowness of foreign consumptive practice, and providing a place of sanctuary for Chinese fashion design. Thus this paper discusses how new agencies are allowing designers in Shanghai greater control over their brand image while creating novel opportunities for promotion and sales. It explores why designers choose this new model and provides new knowledge of the curation of fashion by these gatekeepers.
Resumo:
This article discusses the situation of income support claimants in Australia, constructed as faulty citizens and flawed welfare subjects. Many are on the receiving end of complex, multi-layered forms of surveillance aimed at securing socially responsible and compliant behaviours. In Australia, as in other Western countries, neoliberal economic regimes with their harsh and often repressive treatment of welfare recipients operate in tandem with a burgeoning and costly arsenal of CCTV and other surveillance and governance assemblages. Through a program of ‘Income Management’, initially targeting (mainly) Indigenous welfare recipients in Australia’s Northern Territory, the BasicsCard (administered by Centrelink, on behalf of the Australian Federal Government’s Department of Human Services) is one example of this welfare surveillance. The scheme operates by ‘quarantining’ a percentage of a claimant’s welfare entitlements to be spent by way of the BasicsCard on ‘approved’ items only. The BasicsCard scheme raises significant questions about whether it is possible to encourage people to take responsibility for themselves if they no longer have real control over the most important aspects of their lives. Some Indigenous communities have resisted the BasicsCard, criticising it because the imposition of income management leads to a loss of trust, dignity, and individual agency. Further, income management of individuals by the welfare state contradicts the purported aim that they become less ‘welfare dependent’ and more ‘self-reliant’. In highlighting issues around compulsory income management this paper makes a contribution to the largely under discussed area of income management and welfare surveillance, with its propensity for function creep, garnering large volumes of data on BasicsCard user’s approved (and declined) purchasing decisions, complete with dates, amounts, times and locations.