327 resultados para Suspect


Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: Palliative care patients have numerous rehabilitation needs that increase with disease progression. Palliative rehabilitation practices and perceptions of palliative medicine physicians towards the role of rehabilitation are largely unstudied. AIM: To explore palliative medicine physicians' attitudes and perceptions towards rehabilitation delivered within inpatient palliative care units. DESIGN: Qualitative study utilizing semi-structured interviews. Transcribed interviews were analysed using thematic analysis and major themes reported as results. PARTICIPANTS: Australian palliative medicine physicians working in inpatient palliative care units. RESULTS: In total, 20 physicians participated, representing specialist palliative care services across Australia. A total of 11 (55%) were males with an average of 12.5 years' experience working in palliative care. Most participants believed rehabilitation was an important aspect of palliative care; however, few felt adequate rehabilitation programmes were available. Participants varied in their concepts of what palliative rehabilitation entailed. The term rehabilitation was seen by some as helpful (fostering hope and aiding transitions) and by others to be misleading (creating unrealistic expectations). Four key themes emerged when describing physicians' attitudes, including (1) integrating rehabilitation within palliative care, (2) the intervention, (3) possibilities and (4) the message of rehabilitation. CONCLUSION: A lack of consensus exists among palliative medicine specialists regarding the definition and scope of palliative rehabilitation. Participants generally expressed a wish to offer enhanced rehabilitation interventions, however described resource and skill-set limitations as significant barriers. Further research is required to establish an evidence base for palliative rehabilitation, to support its acceptance and widespread integration within specialist inpatient palliative care.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The development of the creative industries “proposition” has caused a great deal of controversy. Even as it has been examined and adopted in several, quite diverse, jurisdictions as a policy language seeking to respond to both creative production and consumption in new economic conditions, it is subject to at times withering critique from within academic media, cultural and communication studies. It is held to promote a simplistic narrative of the merging of culture and economics and represents incoherent policy; the data sources are suspect and underdeveloped; there is a utopianization of “creative” labor; and a benign globalist narrative of the adoption of the idea. This article looks at some of these critiques of creative industries idea and argues against them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital forensics relates to the investigation of a crime or other suspect behaviour using digital evidence. Previous work has dealt with the forensic reconstruction of computer-based activity on single hosts, but with the additional complexity involved with a distributed environment, a Web services-centric approach is required. A framework for this type of forensic examination needs to allow for the reconstruction of transactions spanning multiple hosts, platforms and applications. A tool implementing such an approach could be used by an investigator to identify scenarios of Web services being misused, exploited, or otherwise compromised. This information could be used to redesign Web services in order to mitigate identified risks. This paper explores the requirements of a framework for performing effective forensic examinations in a Web services environment. This framework will be necessary in order to develop forensic tools and techniques for use in service oriented architectures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital forensics investigations aim to find evidence that helps confirm or disprove a hypothesis about an alleged computer-based crime. However, the ease with which computer-literate criminals can falsify computer event logs makes the prosecutor's job highly challenging. Given a log which is suspected to have been falsified or tampered with, a prosecutor is obliged to provide a convincing explanation for how the log may have been created. Here we focus on showing how a suspect computer event log can be transformed into a hypothesised actual sequence of events, consistent with independent, trusted sources of event orderings. We present two algorithms which allow the effort involved in falsifying logs to be quantified, as a function of the number of `moves' required to transform the suspect log into the hypothesised one, thus allowing a prosecutor to assess the likelihood of a particular falsification scenario. The first algorithm always produces an optimal solution but, for reasons of efficiency, is suitable for short event logs only. To deal with the massive amount of data typically found in computer event logs, we also present a second heuristic algorithm which is considerably more efficient but may not always generate an optimal outcome.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Computer profiling is the automated forensic examination of a computer system in order to provide a human investigator with a characterisation of the activities that have taken place on that system. As part of this process, the logical components of the computer system – components such as users, files and applications - are enumerated and the relationships between them discovered and reported. This information is enriched with traces of historical activity drawn from system logs and from evidence of events found in the computer file system. A potential problem with the use of such information is that some of it may be inconsistent and contradictory thus compromising its value. This work examines the impact of temporal inconsistency in such information and discusses two types of temporal inconsistency that may arise – inconsistency arising out of the normal errant behaviour of a computer system, and inconsistency arising out of deliberate tampering by a suspect – and techniques for dealing with inconsistencies of the latter kind. We examine the impact of deliberate tampering through experiments conducted with prototype computer profiling software. Based on the results of these experiments, we discuss techniques which can be employed in computer profiling to deal with such temporal inconsistencies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Speaker verification is the process of verifying the identity of a person by analysing their speech. There are several important applications for automatic speaker verification (ASV) technology including suspect identification, tracking terrorists and detecting a person’s presence at a remote location in the surveillance domain, as well as person authentication for phone banking and credit card transactions in the private sector. Telephones and telephony networks provide a natural medium for these applications. The aim of this work is to improve the usefulness of ASV technology for practical applications in the presence of adverse conditions. In a telephony environment, background noise, handset mismatch, channel distortions, room acoustics and restrictions on the available testing and training data are common sources of errors for ASV systems. Two research themes were pursued to overcome these adverse conditions: Modelling mismatch and modelling uncertainty. To directly address the performance degradation incurred through mismatched conditions it was proposed to directly model this mismatch. Feature mapping was evaluated for combating handset mismatch and was extended through the use of a blind clustering algorithm to remove the need for accurate handset labels for the training data. Mismatch modelling was then generalised by explicitly modelling the session conditions as a constrained offset of the speaker model means. This session variability modelling approach enabled the modelling of arbitrary sources of mismatch, including handset type, and halved the error rates in many cases. Methods to model the uncertainty in speaker model estimates and verification scores were developed to address the difficulties of limited training and testing data. The Bayes factor was introduced to account for the uncertainty of the speaker model estimates in testing by applying Bayesian theory to the verification criterion, with improved performance in matched conditions. Modelling the uncertainty in the verification score itself met with significant success. Estimating a confidence interval for the "true" verification score enabled an order of magnitude reduction in the average quantity of speech required to make a confident verification decision based on a threshold. The confidence measures developed in this work may also have significant applications for forensic speaker verification tasks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores the genealogies of bio-power that cut across punitive state interventions aimed at regulating or normalising several distinctive ‘problem’ or ‘suspect’ deviant populations, such as state wards, non-lawful citizens and Indigenous youth. It begins by making some general comments about the theoretical approach to bio-power taken in this paper. It then outlines the distinctive features of bio-power in Australia and how these intersected with the emergence of penal welfarism to govern the unruly, unchaste, unlawful, and the primitive. The paper draws on three examples to illustrate the argument – the gargantuan criminalisation rates of Aboriginal youth, the history of incarcerating state wards in state institutions, and the mandatory detention of unlawful non-citizens and their children. The construction of Indigenous people as a dangerous presence, alongside the construction of the unruly neglected children of the colony — the larrikin descendants of convicts as necessitating special regimes of internal controls and institutions, found a counterpart in the racial and other exclusionary criteria operating through immigration controls for much of the twentieth century. In each case the problem child or population was expelled from the social body through forms of bio-power, rationalised as strengthening, protecting or purifying the Australian population.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2010 we realised that our fifth 48 hour game making competition was more than a mere event but that we were actually watching our local games industry enact a very intense process of community making and reflective practice. This presentation of our early research on the event was an invited spectacle at the Games Connect Australia Pacific Conference 2010 held at the Gold Coast Convention Centre, 14-15 October 2010. Abstract: Jams, Jellybeans and the fruit of passion: if games are about creating innovative player experience, then the place to start is how we set up game design education as an experience Authors: truna aka j.turner – Brisbane IGDA & Lubi Thomas, Mt Nebo Studios The 48 hour game making challenge has grown since it started in 2007 to accommodate 20 teams, some of the teams are professionals, some are made of people who are working in other industries, most are made of students from the various tertiary institutes around town. We still don’t quite understand why these mad people sign up for 48 hours of intense creativity just for the jelly beans we hand out as prizes but we do suspect that the space we give them and the passion they bring to the event offers those of us involved in the education side of the games industry really vital insights into what is critical and important in terms of education. The Australian games industry really needs these people, they are bright and ingenious and they make the most amazing games. But you won't get them by telling tertiary institutions what you fancy this year in terms of skills and criteria; you will get them by fostering their creativity and passion. If games are about creating innovative player experience, then the place to start is how we set up game design education as an experience.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Analysis of either footprints or footwear impressions which have been recovered from a crime scene is a well known and well accepted part of forensic investigation. When this evidence is obtained by investigating officers, comparative analysis to a suspect’s evidence may be undertaken. This can be done either by the detectives or in some cases, podiatrists with experience in forensic analysis. Frequently asked questions of a podiatrist include; “What additional information should be collected from a suspect (for the purposes of comparison), and how should it be collected?” This paper explores the answers to these and related questions based on 20 years of practical experience in the field of crime scene analysis as it relates to podiatry and forensics. Elements of normal and abnormal foot function are explored and used to explain the high degree of variability in wear patterns produced by the interaction of the foot and footwear. Based on this understanding the potential for identifying unique features of the user and correlating this to footwear evidence becomes apparent. Standard protocols adopted by podiatrists allow for more precise, reliable, and valid results to be obtained from their analysis. Complex data sets are now being obtained by investigating officers and, in collaboration with the podiatrist; higher quality conclusions are being achieved. This presentation details the results of investigations which have used standard protocols to collect and analyse footwear and suspects of recent major crimes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We suspect that the array of silly names used to refer to temporary staff worldwide may be indicative of the extent to which these nurses have been relegated to, and we would argue, remain in, a type of underclass – relatively unsupported by employers in terms of professional practice and ipso facto excluded from contributing professionally to team work, practice development, clinical governance and evidence based practice. This may be acceptable to some but in a climate of risk averseness and in the interests of strategic planning we would suggest it is an accident waiting to happen. The recent UK Royal College of Nursing (RCN) (Ball & Pike, 2006) survey of bank and agency nurses brings a welcome focus on a group of nurses that make a significant contribution to the smooth running of health services in many countries.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Expected satiety has been shown to play a key role in decisions around meal size. Recently it has become clear that these expectations can also influence the satiety that is experienced after a food has been consumed. As such, increasing the expected and actual satiety a food product confers without increasing its caloric content is of importance. In this study we sought to determine whether this could be achieved via product labelling. Female participants (N=75) were given a 223-kcal yoghurt smoothie for lunch. In separate conditions the smoothie was labelled as a diet brand, a highly-satiating brand, or an ‘own brand’ control. Expected satiety was assessed using rating scales and a computer-based ‘method of adjustment’, both prior to consuming the smoothie and 24 hours later. Hunger and fullness were assessed at baseline, immediately after consuming the smoothie, and for a further three hours. Despite the fact that all participants consumed the same food, the smoothie branded as highly-satiating was consistently expected to deliver more satiety than the other ‘brands’; this difference was sustained 24 hours after consumption. Furthermore, post-consumption and over three hours, participants consuming this smoothie reported significantly less hunger and significantly greater fullness. These findings demonstrate that the satiety that a product confers depends in part on information that is present around the time of consumption. We suspect that this process is mediated by changes to expected satiety. These effects may potentially be utilised in the development of successful weight-management products.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phishing emails cause enormous losses to both users and organisations. The goal of this study is to determine which individuals are more vulnerable to phishing emails. To gain this information an experiment has been developed which involves sending phishing email to users and collecting information about users. The detection deception model has been applied to identify users’ detection behaviour. We find that users who have less email experience and high levels of submissiveness have increased susceptibility. Among those, users who have high susceptibility levels and high openness and extraversion are more likely to carry on the harmful action embedded in phishing emails.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The novel manuscript Fragrance of Night is a crime novel set in Indonesia. Raymond Chan, struggling to deal with the death of his Australian wife, returns to his country of birth, Indonesia. Ostensibly he returns to attend his cousin Lee’s wedding but he is also in search of some meaning in his life. He is drawn into a local murder mystery, and with the help of a young, Javanese policeman, he is soon investigating suspects and motives. Raymond finds himself becoming increasingly enamoured with the main suspect, Lani, but ultimately, once the murder mystery is solved, Raymond loses her. The exegesis examines crime fiction as a genre, in particular Indonesian crime fiction and notions of postcolonialism and hybridisation. Within this broader context, it analyses works by Indonesian crime fiction writer S Mara Gd, postcolonial crime fiction and novels written in English but set in ‘exotic’ locale. The formulation of my novel Fragrance of Night was informed by the examination of the machinations of hybridised crime fiction and the more general rules of the crime fiction genre.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Advances in mobile telephone technology and available dermoscopic attachments for mobile telephones have created a unique opportunity for consumer-initiated mobile teledermoscopy. At least 2 companies market a dermoscope attachment for an iPhone (Apple), forming a mobile teledermoscope. These devices and the corresponding software applications (apps) enable (1) lesion magnification (at least ×20) and visualization with polarized light; (2) photographic documentation using the telephone camera; (3) lesion measurement (ruler); (4) adding of image and lesion details; and (5) e-mail data to a teledermatologist for review. For lesion assessment, the asymmetry-color (AC) rule has 94% sensitivity and 62 specificity for melanoma identification by consumers [1]. Thus, consumers can be educated to recognize asymmetry and color patterns in suspect lesions. However, we know little about consumers' use of mobile teledermoscopy for lesion assessment.