807 resultados para Alert (Steamship)
Resumo:
Introduction: Previous studies investigating mothers’ sleep in the postpartum period commonly demonstrated elevated levels of sleepiness in this population. A Karolinska Sleepiness Scale (KSS) rating of 5 or above is associated with an exponential increase in vehicle crash risk. To date, no studies have investigated the relationship between mothers’ sleep in the postpartum period and their driving behaviour. Methods: Sleep-wake diary data was collected from 14 mother-infant dyads during two 7-day assessment periods when the infants were 6 and 12 weeks old. The mothers’ indicated all driving episodes during these weeks and their respective sleepiness level using the KSS. Semi-structured interviews were conducted with the mothers when their infant was 12 weeks old. Results: The infants slept significantly more than their mothers at 6 weeks and 12 weeks of age. During both time points, mothers and infants had a similar number of night awakenings (waking between 22:00 and 06:00), with some mothers experiencing greater than 19 awakenings over 7 nights. Notably, 36% of the mothers did not experience a continuous sleep period longer than 4.5 hours when their infant was 6 weeks old. A total of 141 driving episodes were reported during the 7 day assessment period when the infants were 6 weeks old. Over 50% of the driving episodes were denoted with a KSS score of 5 or above. Strategies mothers cited they employed during this period included only driving when feeling alert, postponing driving until another person is present, and driving in the morning when less sleepy. Conclusion: Mothers are experiencing disrupted sleep at night and some mothers do not obtain more than 4.5 hours of continuous sleep during the early postpartum weeks. In this sample, some mothers reported self-regulating driving behaviour, however over half of the driving episodes were undertaken with a sleepiness rating linked with elevated crash risk.
Resumo:
Road traffic accidents can be reduced by providing early warning to drivers through wireless ad hoc networks. When a vehicle detects an event that may lead to an imminent accident, the vehicle disseminates emergency messages to alert other vehicles that may be endangered by the accident. In many existing broadcast-based dissemination schemes, emergency messages may be sent to a large number of vehicles in the area and can be propagated to only one direction. This paper presents a more efficient context aware multicast protocol that disseminates messages only to endangered vehicles that may be affected by the emergency event. The endangered vehicles can be identified by calculating the interaction among vehicles based on their motion properties. To ensure fast delivery, the dissemination follows a routing path obtained by computing a minimum delay tree. The multicast protocol uses a generalized approach that can support any arbitrary road topology. The performance of the multicast protocol is compared with existing broadcast protocols by simulating chain collision accidents on a typical highway. Simulation results show that the multicast protocol outperforms the other protocols in terms of reliability, efficiency, and latency.
Resumo:
Security cues found in web browsers are meant to alert users to potential online threats, yet many studies demonstrate that security indicators are largely ineffective in this regard. Those studies have depended upon self-reporting of subjects' use or aggregate experimentation that correlate responses to sites with and without indicators. We report on a laboratory experiment using eye-tracking to follow the behavior of self-identified computer experts as they share information across popular social media websites. The use of eye-tracking equipment allows us to explore possible behavioral differences in the way experts perceive web browser security cues, as opposed to non-experts. Unfortunately, due to the use of self-identified experts, technological issues with the setup, and demographic anomalies, our results are inconclusive. We describe our initial experimental design, lessons learned in our experimentation, and provide a set of steps for others to follow in implementing experiments using unfamiliar technologies, eye-tracking specifically, subjects with different experience with the laboratory tasks, as well as individuals with varying security expertise. We also discuss recruitment and how our design will address the inherent uncertainties in recruitment, as opposed to design for an ideal population. Some of these modifications are generalizable, together they will allow us to run a larger 2x2 study, rather than a study of only experts using two different single sign-on systems.
Resumo:
Security indicators in web browsers alert users to the presence of a secure connection between their computer and a web server; many studies have shown that such indicators are largely ignored by users in general. In other areas of computer security, research has shown that technical expertise can decrease user susceptibility to attacks. In this work, we examine whether computer or security expertise affects use of web browser security indicators. Our study takes place in the context of web-based single sign-on, in which a user can use credentials from a single identity provider to login to many relying websites; single sign-on is a more complex, and hence more difficult, security task for users. In our study, we used eye trackers and surveyed participants to examine the cues individuals use and those they report using, respectively. Our results show that users with security expertise are more likely to self-report looking at security indicators, and eye-tracking data shows they have longer gaze duration at security indicators than those without security expertise. However, computer expertise alone is not correlated with recorded use of security indicators. In survey questions, neither experts nor novices demonstrate a good understanding of the security consequences of web-based single sign-on.
Resumo:
Since the first destination image studies were published in the early 1970s, the field has become one of the most popular in the tourism literature. While reviews of the destination image literature show no commonly agreed conceptualisation of the construct, researchers have predominantly used structured questionnaires for measurement. There has been criticism that the way some of these scales have been selected means a greater likelihood of attributes being irrelevant to participants. This opens up the risk of stimulating uninformed responses. The issue of uninformed response was first raised as a source of error 60 years ago. However, there has been little, if any, discussion in relation to destination image measurement, studies of which often require participants to provide opinion-driven rather than fact-based responses. This paper reports the trial of a ‘don’t know’ (DK) non-response option for participants in two destination image questionnaires. It is suggested the use of a DK option provides participants with an alternative to i) skipping the question, ii) using the scale midpoint to denote neutrality, or iii) providing an uninformed response. High levels of DK usage by participants can then alert the marketer of the need to improve awareness of destination performance for potential salient attributes.
Resumo:
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.
Resumo:
An emerging theme for a nation transiting into a sustainable future is the provision of a low carbon (dioxide) environment. Carbon emission reduction is therefore important for the industry and community as a whole. Buildings contribute immensely to total greenhouse gas emissions, so pragmatic actions need to be taken to cut the amount of carbon emitted by the construction industry. These typically involve strategies such as energy-saving features in the design, construction and operation of building projects. However, a variety of characteristics of the markets and stakeholders involved are suppressing their development. This paper reports on a series of interviews with a variety of Hong Kong construction project participants aimed at identifying the drivers of, and obstacles to, the construction industry's attempts to reduce carbon emissions. The results confirm the main actions currently undertaken are energy efficiency enhancement, green procurement, research and development activities, waste/water management and other technical measures such as the provision of thermal insulation. The majority of the drivers are economical in nature, suggesting that financial aids, and particularly government incentives, are likely to be useful motivators. Also suggested is the increased promotion of the benefits of environmental sustainability to the wider community, in order to alert the general public to the need for reducing the amount of carbon originating from building usage.
Resumo:
Road crashes contribute to a significant amount of child mortality and morbidity in Australia. In fact, passenger injuries contribute to the majority of child crash road trauma. A number of factors contribute to child injury and death in motor vehicles, including inappropriate seating position, inappropriate choice of restraint, and incorrect installation and use of child restraints. Prior to March 2010, child restraint legislation in Queensland only required children twelve months and younger to be seated in a properly adjusted and fastened child restraint. This legislation left older infants and young children potentially suboptimally protected. From March 2010, new legislation specified seating position and type of child restraint required, depending on the age of the child. This research was underpinned by the Health Belief Model (HBM), which explores health related behaviour, behaviour change, environmental factors influencing behaviour change (including legislative changes) and is flexible enough to be used in relation to parents' health practices for their children, rather than parent health directly. This thesis investigates the extent to which the changes to child restraint legislation have led parents in regional areas of Queensland to use appropriate restraint practices for their children and determines the extent to which the constructs of the HBM, parental perceptions, barriers and environmental factors contribute to the appropriateness of child seating and restraint use. Study One included three sets of observations taken in two regional cities of Queensland prior to the legislative amendment, during an educative period of six months, and after the enactment of the legislation. Each child's seating position and restraint type were recorded. Results showed that the proportion of children observed occupying the front seat decreased by 15.6 per cent with the announcement the legislation. There was no decrease in front seat use at the enactment of the legislation. The proportion of children observed using dedicated child restraints increased by 8.8 per cent with the announcement of the legislation when there was one child in the vehicle. Further, there was a 10.1 per cent increase in the proportion of children observed using a seat belt that fit with the announcement when there was one child in the vehicle and with the enactment of the legislation regardless of the number of children in the vehicle (21.8 per cent for one child, 39.7 per cent for two children and 40.2 per cent for three or more children). Study Two comprised initial intercept interviews, later followed up by telephone, with parents with children aged eight years and younger at the announcement and telephone interviews at the enactment of the legislation in one regional city in Queensland. Parents reported their child restraint practices, and opinions, knowledge and understanding of the requirements of the new legislation. Parent responses were analysed in terms of the constructs in the HBM. When asked which seating position their child 'usually' used, parents reported child front seat use was nil (0.0 per cent) and did not change with the enactment of the legislative amendment. However, when parents were asked whether they allowed children to use the front seat at some point within the six months prior to the interview, reported child front seat use was 7 (5.4 per cent) children at T2 and 10 (9.6 per cent) at T3. Reported use of age-appropriate child restraints did not increase with the enactment of the legislation (p = 0.77, ns). Parents reported restraint practices were classed as either appropriate or inappropriate. Parents who reported appropriate restraint practices were those whose children were sitting in optimal restraints and seating positions for their age according to the requirements of the legislation. Parents who reported inappropriate restraint practices were those who had one or more children who were suboptimally restrained or seated for their age according to the requirements of the legislation. Neither parents' perceptions about their susceptibility of being in a crash nor the likelihood of severity of child injury if involved in a crash yielded significant differences in the appropriateness of reported parent restraint practices over time with the enactment of the legislation. A trend in the data suggested parents perceived a benefit to using appropriate restraint practices was to avoid fines and demerit points. Over 75 per cent of parents who agreed that child restraints provide better protection for children than an adult seat belt reported appropriately seating and restraining their children (2 (1) = 8.093, p<.05). The self-efficacy measure regarding parents' confidence in installing a child restraint showed a significant association with appropriate parental restraint practices (2 (1) = 7.036, p<.05). Results suggested that some parents may have misinterpreted the announcement of the legislative amendment as the announcement of the enforcement of the legislation instead. Some parents who correctly reported details of the legislation did not report appropriate child restraint practices. This finding shows that parents' knowledge of the legislative amendment does not necessarily have an impact on their behaviour to appropriately seat and restrain children. The results of these studies have important implications for road safety and the prevention of road-related injury and death to children in Queensland. Firstly, parents reported feeling unsure of how to install restraints, which suggests that there may be children travelling in restraints that have not been installed correctly, putting them at risk. Interventions to alert and encourage parents to seek advice when unsure about the correct installation of child restraints could be considered. Secondly, some parents in this study although they were using the most appropriate restraint for their children, reported using a type that was not the most appropriate restraint for the child's age according to the legislation. This suggests that intervention may be effective in helping parents make a more accurate choice of the most appropriate type of restraint to use with children, especially as the child ages and child restraint requirements change. Further research could be conducted to ascertain the most effective methods of informing and motivating parents to use the most appropriate restraints and seating positions for their children, as these results show a concerning disparity between reported restraint practices and those that were observed.
Resumo:
The purpose of this chapter is to address the question of how communication studies can prove its value in relation to corporate social responsibility (CSR). As many disciplines seek to understand CSR, the role of communication has been relatively underexplored despite its prevalence in demonstrating and shaping social responsibility positions and practice. Literature review. The literature review points to what we consider as four aces. Communication studies alert us to (1) how meaning is constructed through communication, something that has implications for the management of organizations as publics hold different views of CSR and expect different things from them; (2) how a dialogue between an organization and its publics should unfold; (3) how practices of transparency can assist organizations to come across as trustworthy actors; and, importantly, (4) how a complexity view is fruitful to grasp the CSR communication process. These four key themes could be instructive for practitioners who want to argue for and demonstrate the usefulness of strategic communication for the management of CSR and bridge meso and macro levels of analysis.
Resumo:
Evidence has emerged that the Anglican Church in Britain failed to alert police about a senior member of the clergy who's alleged to have abused children in both the Britain and Australia. Anglican Priest Reverend Robert Waddington was principal of a school in North Queensland in 1960s. He went on to become the Dean of Manchester, but he died five years ago. Allegations of abuse reached the Anglican Church in England in the late 1990s - but no action was taken. The diocese of North Queensland has begun its own investigation but it seems crucial documents may have been lost.
Resumo:
E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.
Resumo:
Over the past decade there has been an increased awareness in the field of international relations of the potential impact of an infectious disease epidemic on national security. While states’ attempts to combat infectious disease have a long history, what is new in this area is the adoption at the international level of securitized responses regarding the containment of infectious disease. This article argues that the securitization of infectious disease by states and the World Health Organization (WHO) has led to two key developments. First, the WHO has had to assert itself as the primary actor that all states, particularly western states, can rely upon to contain the threat of infectious diseases. The WHO's apparent success in this is evidenced by the development of the Global Outbreak Alert Response Network (GOARN), which has led to arguments that the WHO has emerged as the key authority in global health governance. The second outcome that this article seeks to explore is the development of the WHO's authority in the area of infectious disease surveillance. In particular, is GOARN a representation of the WHO's consummate authority in the area of coordinating infectious disease response or is GOARN the product of the WHO's capitulation to western states’ concerns with preventing infectious disease outbreaks from reaching their borders and as a result, are arguments expressing the authority of the WHO in infectious disease response premature?
Resumo:
A quasi-Poisson generalized linear model combined with a distributed lag non-linear model was used to quantify the main effect of temperature on emergency department visits (EDVs) for childhood diarrhea in Brisbane from 2001 to 2010. Residual of the model was checked to examine whether there was an added effect due to heat waves. The change over time in temperature-diarrhea relation was also assessed. Both low and high temperatures had significant impact on childhood diarrhea. Heat waves had an added effect on childhood diarrhea, and this effect increased with intensity and duration of heat waves. There was a decreasing trend in the main effect of heat on childhood diarrhea in Brisbane across the study period. Brisbane children appeared to have gradually adapted to mild heat, but they are still very sensitive to persistent extreme heat. Development of future heat alert systems should take the change in temperature-diarrhea relation over time into account.
Resumo:
Moose populations are managed for sustainable yield balanced against costs caused by damage to forestry or agriculture and collisions with vehicles. Optimal harvests can be calculated based on a structured population model driven by data on abundance and the composition of bulls, cows, and calves obtained by aerial-survey monitoring during winter. Quotas are established by the respective government agency and licenses are issued to hunters to harvest an animal of specified age or sex during the following autumn. Because the cost of aerial monitoring is high, we use a Management Strategy Evaluation to evaluate the costs and benefits of periodic aerial surveys in the context of moose management. Our on-the-fly "seat of your pants" alternative to independent monitoring is management based solely on the kill of moose by hunters, which is usually sufficient to alert the manager to declines in moose abundance that warrant adjustments to harvest strategies. Harvests are relatively cheap to monitor; therefore, data can be obtained each year facilitating annual adjustments to quotas. Other sources of "cheap" monitoring data such as records of the number of moose seen by hunters while hunting also might be obtained, and may provide further useful insight into population abundance, structure and health. Because conservation dollars are usually limited, the high cost of aerial surveys is difficult to justify when alternative methods exist. © 2012 Elsevier Inc.
Hand, foot and mouth disease in China: Evaluating an automated system for the detection of outbreaks
Resumo:
Objective To evaluate the performance of China’s infectious disease automated alert and response system in the detection of outbreaks of hand, foot and mouth (HFM) disease. Methods We estimated size, duration and delay in reporting HFM disease outbreaks from cases notified between 1 May 2008 and 30 April 2010 and between 1 May 2010 and 30 April 2012, before and after automatic alert and response included HFM disease. Sensitivity, specificity and timeliness of detection of aberrations in the incidence of HFM disease outbreaks were estimated by comparing automated detections to observations of public health staff. Findings The alert and response system recorded 106 005 aberrations in the incidence of HFM disease between 1 May 2010 and 30 April 2012 – a mean of 5.6 aberrations per 100 days in each county that reported HFM disease. The response system had a sensitivity of 92.7% and a specificity of 95.0%. The mean delay between the reporting of the first case of an outbreak and detection of that outbreak by the response system was 2.1 days. Between the first and second study periods, the mean size of an HFM disease outbreak decreased from 19.4 to 15.8 cases and the mean interval between the onset and initial reporting of such an outbreak to the public health emergency reporting system decreased from 10.0 to 9.1 days. Conclusion The automated alert and response system shows good sensitivity in the detection of HFM disease outbreaks and appears to be relatively rapid. Continued use of this system should allow more effective prevention and limitation of such outbreaks in China.