967 resultados para privacy protection
Resumo:
The IEC 61850 family of standards for substation communication systems were released in the early 2000s, and include IEC 61850-8-1 and IEC 61850-9-2 that enable Ethernet to be used for process-level connections between transmission substation switchyards and control rooms. This paper presents an investigation of process bus protection performance, as the in-service behavior of multi-function process buses is largely unknown. An experimental approach was adopted that used a Real Time Digital Simulator and 'live' substation automation devices. The effect of sampling synchronization error and network traffic on transformer differential protection performance was assessed and compared to conventional hard-wired connections. Ethernet was used for all sampled value measurements, circuit breaker tripping, transformer tap-changer position reports and Precision Time Protocol synchronization of sampled value merging unit sampling. Test results showed that the protection relay under investigation operated correctly with process bus network traffic approaching 100% capacity. The protection system was not adversely affected by synchronizing errors significantly larger than the standards permit, suggesting these requirements may be overly conservative. This 'closed loop' approach, using substation automation hardware, validated the operation of protection relays under extreme conditions. Digital connections using a single shared Ethernet network outperformed conventional hard-wired solutions.
Resumo:
The travel industry has come to rely heavily on information and communication technologies to facilitate relations with consumers. Compiling consumer data profiles has become easier and it is generally thought that this has led to an increase in consumers' privacy concerns, which may have an adverse impact on their willingness to purchase online. Three specific aspects of privacy that have received attention from researchers are unauthorized secondary use of data, invasion of privacy, and errors. A study was undertaken to examine the effects of these factors on prior purchase of travel services via the Internet and future purchase probability. No evidence was found to indicate that such privacy concerns affect online purchase behavior within the travel industry. Managerial implications are discussed.
Resumo:
TO THE EDITOR: In Australia, personal and health information that identifies an individual cannot be used or disclosed for research without specific requirements being met.1 Even if these requirements are met, data custodians may still refuse access if their views are discordant with those of the relevant human research ethics committee (HREC). It is now evident that there are adverse consequences of this well-meaning legislation...
Resumo:
Objectives: We aimed to identify current practice of sun protection and factors associated with effective use in four outdoor worker industries in Queensland, Australia. Methods: Workplaces in four industries with a high proportion of outdoor workers (building/construction, rural/farming, local government, and public sector industries) were identified using an online telephone directory, screened for eligibility, and invited to participant via mail (n=15, recruitment rate 37%). A convenience sample of workers were recruited within each workplace (n=162). Workplaces’ sun protective policies and procedures were identified using interviews and policy analysis with workplace representatives, and discussion groups and computer-assisted telephone interviews with workers. Personal characteristics and sun protection knowledge, attitudes and behaviors were collated and analysed. Results: Just over half the workplaces had an existing policy which referred to sun protection (58%), and most provided at least some personal protective equipment (PPE), but few scheduled work outside peak sun hours (43%) or provided skin checks (21%). Several worker and workplace characteristics were associated with greater sun protection behaviour among workers, including having received education on the use of PPE (p<0.001), being concerned about being in the sun (p=0.002); and working in a smaller workplace (p=0.035). Conclusions: Uptake of sun protection by outdoor workers is affected by a complex interplay of both workplace and personal factors, and there is a need for effective strategies targeting both the workplace environment and workers’ knowledge, attitudes and behaviors to decrease harmful sun exposure further.
Resumo:
Multi-Microgrids (MMGs) have been proposed to connect distributed generators (DG), microgrids (MG), and medium-voltage (MV) loads with the distribution system. A flexible protection scheme that enables an islanded MMG to continue operation during fault conditions is yet to be developed. In this paper, a protection scheme for an islanded MMG that utilises MG controllers and communication links is proposed. The MMG model used includes two MGs connected to the distribution system. Each MG consists of diesel, wind, and photovoltaic (PV) microsources. The effectiveness of the proposed protection scheme is evaluated by simulation.
Resumo:
Microgrids (MG) enable the integration of low capacity renewable energy resources with distribution systems. A recently proposed protection scheme for MGs utilising undervoltage, High Impedance Fault (HIF) detection, directional protection modules, and communication links significantly reduces the fault clearing time compared to previous schemes. In this paper, the effect of replacing undervoltage protection with differential protection in a scheme that also contains HIF and directional protection modules is studied. The MG model used in this study includes a diesel, wind, and two photovoltaic (PV) microsources. The alternative protection schemes are evaluated by simulation. It is found that the protection scheme consisting of differential, HIF detection, and directional protection modules is more effective compared to the alternative in protecting the MG from some fault conditions such as the phase-A-to-ground, phase-B-to-C, and phase-B-to-C-to-ground.
Resumo:
This review examines the multiple levels of pre-existing immunity in the upper and lower female reproductive tract. In addition, we highlight the need for further research of innate and adaptive immune protection of mucosal surfaces in the female reproductive tract. Innate mechanisms include the mucus lining, a tight epithelial barrier and the secretion of antimicrobial peptides and cytokines by epithelial and innate immune cells. Stimulation of the innate immune system also serves to bridge the adaptive arm resulting in the generation of pathogen-specific humoral and cell-mediated immunity. Less understood are the multiple components that act in a coordinated way to provide a network of ongoing protection. Innate and adaptive immunity in the human female reproductive tract are influenced by the stage of menstrual cycle and are directly regulated by the sex steroid hormones, progesterone and estradiol. Furthermore, the effect of hormones on immunity is mediated both directly on immune and epithelial cells and indirectly by stimulating growth factor secretion from stromal cells. The goal of this review is to focus on the diverse aspects of the innate and adaptive immune systems that contribute to a unique network of protection throughout the female reproductive tract.
Resumo:
The immune system in the female reproductive tract (FRT) does not mount an attack against HIV or other sexually transmitted infections (STI) with a single endogenously produced microbicide or with a single arm of the immune system. Instead, the body deploys dozens of innate antimicrobials to the secretions of the female reproductive tract. Working together, these antimicrobials along with mucosal antibodies attack many different viral, bacterial and fungal targets. Within the FRT, the unique challenges of protection against sexually transmitted pathogens coupled with the need to sustain the development of an allogeneic fetus have evolved in such a way that sex hormones precisely regulate immune function to accomplish both tasks. The studies presented in this review demonstrate that estradiol and progesterone secreted during the menstrual cycle act both directly and indirectly on epithelial cells and other immune cells in the reproductive tract to modify immune function in a way that is unique to specific sites throughout the FRT. As presented in this review, studies from our laboratory and others demonstrate that the innate immune response is under hormonal control, varies with the stage of the menstrual cycle, and as such is suppressed at mid-cycle to optimize conditions for successful fertilization and pregnancy. In doing so, a window of STI vulnerability is created during which potential pathogens including HIV enter the reproductive tract to infect host targets.
Resumo:
In Australia, protection orders are a key legal response to domestic violence, and are often viewed as a way of providing for victim safety. For instance, recently the joint Australian and New South Wales Law Reform Commissions recommended that a common core purpose of all state and territory domestic violence legislation should be ‘to ensure or maximise the safety and protection of persons who fear or experience family violence’ (2010:Recommendation 7-4). Drawing and building upon prior research in Australia and the United States (‘US’), this paper uses comparative quantitative content analysis to assess the victim safety focus of domestic violence protection order legislation in each Australian state and territory. The findings of this analysis show that the Northern Territory, South Australia and Victoria ‘stand out’ from the other jurisdictions, having the highest victim safety focus in their legislation. However, there remains sizeable scope for improvement in all Australian jurisdictions, in terms of the victim safety focus of their legislative provisions and the considerations of legislative inconsistency between jurisdictions.
Resumo:
Courts set guidelines for when genetic testing would be ordered - medical testing - life insurers - use of test results - confidentiality.
Resumo:
A home is an embodiment of human privacy, apart from providing shelter, security and several other functions. Achieving the desired level of privacy at home is very important in Muslim societies. Privacy is intended to protect the female members of the family from strangers, especially while entertaining guests at home. One way of controlling levels of exposure of the domestic domains to strangers is by controlling privacy levels. This research will investigate perceptions of privacy among Australian Muslims when entertaining guests at their homes. This research will also investigate the extent that modesty (achieved through both appearance and design) acts as the balancing factor in achieving a family’s desired levels of privacy while also affording them the capacity to be hospitable to guests. This research will use a qualitative approach to investigate Australian Muslim homes around Queensland, predominantly in the Brisbane area. A total number of 20 to 60 participants (10 to 30 males, 10 to 30 females) ranging from 25 to 55 years old will be interviewed. Ideally, participants will be those who have children or extended families (parents or siblings) living in the house. The data will be coded and analysed for the purpose of generating new knowledge for architects and designers when designing Muslim homes. It will also extend the current body of knowledge related to privacy mechanisms in housing designs, thereby benefitting architects and designers in the future.
Resumo:
The United Nations High Commissioner for Refugees' (UNHCR) 2011 statistics on refugee populations residing by region are a stark reminder of the challenge facing states and civil society in the Asia Pacific. In 2011, Africa hosted 2,149,000 refugees; the Americas, Europe, and Middle East and North Africa hosted 513 ,500, 1,605,500 and 1,889,900 respectively, while the Asia Pacific hosted a staggering 3,793,900. The fact that 35 per cent of the world's refugees reside in the Asia Pacific, coupled with the fact that 84 per cent of refugees displaced in Asia remain in the region,raises the questions why so few countries in the region are signatories to the Convention relating to the Status of Refugees ('Refugee Convention') or cognate rights instruments and why no formally binding regional agreement exists for the equitable sharing of responsibilities for refugees...
Resumo:
The security and privacy of patient information is one of the biggest hindrances to the wide adoption of eHealth systems. For eHealth systems to be successful they must provide protection for patients’ privacy while ensuring healthcare professionals are able to access the information necessary to provide appropriate care. Accountable-eHealth systems are a proposed solution to these potentially competing concerns by enforcing appropriate use and after-the-fact accountability measures. We have developed a Web-based prototype to demonstrate scenarios of how both appropriate and inappropriate use of patient information would be handled in an Accountable-eHealth system.