930 resultados para payment
Resumo:
Intracellular Flightless I (Flii), a gelsolin family member, has been found to have roles modulating actin regulation, transcriptional regulation and inflammation. In vivo Flii can regulate wound healing responses. We have recently shown that a pool of Flii is secreted by fibroblasts and macrophages, cells typically found in wounds, and its secretion can be upregulated upon wounding. We show that secreted Flii can bind to the bacterial cell wall component lipopolysaccharide and has the potential to regulate inflammation. We now show that secreted Flii is present in both acute and chronic wound fluid.
Resumo:
In July 2006 ‘welfare-to-work’ policies were introduced for single parents in Australia. These policies require most single parents with school aged children to be employed or seeking employment of 15-25 hours per week in return for their income support payment. The changes represented a sharp increase in the obligations applying to single parents on income support. This paper is concerned with how the well-being of single mothers who are combining income support and paid employment is being influenced by these stepped up activity requirements. The paper draws on data from semi-structured interviews with 21 Brisbane single mothers. The analysis explores participants’ experiences in the new policy environment utilizing the theoretical framework of ‘relational autonomy’. Relational approaches to autonomy emphasize the importance of relations of dependency and interdependency to the development of autonomy and well-being. The findings indicate that in their dealings with the welfare bureaucracy participants experienced a lack of recognition of their identities as mothers, paid workers and competent decision makers. These experiences have negative consequences for self worth, relational autonomy and ultimately the well-being of single parent families.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
This is the protocol for a review and there is no abstract. The objectives are as follows: The main aim of the review is to determine the effectiveness of using incentive-based approaches (IBAs) (financial and non-financial) to increase physical activity in community-dwelling children and adults. A secondary objective will be to address the use of incentives to improve cardiovascular and metabolic fitness. A final objective will be to explore: - whether there are any adverse effects associated with the use of IBAs for increasing physical activity; - whether there are any differential effects of IBAs within and between study populations by age, gender, education, inequalities and health status; and - whether the use of disincentive/aversive approaches leads to a reduction in sedentary behaviour.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
The Queensland University of Technology (QUT) Library, like many other academic and research institution libraries in Australia, has been collaborating with a range of academic and service provider partners to develop a range of research data management services and collections. Three main strategies are being employed and an overview of process, infrastructure, usage and benefits is provided of each of these service aspects. The development of processes and infrastructure to facilitate the strategic identification and management of QUT developed datasets has been a major focus. A number of Australian National Data Service (ANDS) sponsored projects - including Seeding the Commons; Metadata Hub / Store; Data Capture and Gold Standard Record Exemplars have / will provide QUT with a data registry system, linkages to storage, processes for identifying and describing datasets, and a degree of academic awareness. QUT supports open access and has established a culture for making its research outputs available via the QUT ePrints institutional repository. Incorporating open access research datasets into the library collections is an equally important aspect of facilitating the adoption of data-centric eresearch methods. Some datasets are available commercially, and the library has collaborated with QUT researchers, in the QUT Business School especially strongly, to identify and procure a rapidly growing range of financial datasets to support research. The library undertakes licensing and uses the Library Resource Allocation to pay for the subscriptions. It is a new area of collection development for with much to be learned. The final strategy discussed is the library acting as “data broker”. QUT Library has been working with researchers to identify these datasets and undertake the licensing, payment and access as a centrally supported service on behalf of researchers.
Resumo:
Purpose To explore the perspectives of cancer care centre users on participation in psychosocial research to inform research design and ethics. Methods The study is based on a qualitative research design. Fourteen semistructured interviews were carried in people diagnosed with cancer and carers. The interview included four main questions about practical barriers to participation, types of research design, motivating factors and the conduct of research in a cancer care support setting. The data were analysed using qualitative content analysis. Results Interviewees demonstrated a willingness to participate in psychosocial research within certain circumstances. There were no practical barriers identified, although they considered payment for research-related travel important. The most acceptable research design was the face-to-face interview and the least preferred was the randomised control trial. The factors that motivated participation were altruism, valuing research, and making a contribution to the centre. Interviewees supported the conduct of research in cancer care support centres conditional upon delaying recruitment during the initial months of users’ visits and its need to be discreet to avoid deterring visitors from accessing the centre. Conclusions The study concludes that the personal interaction between participants and researchers is the most important feature of decision-making by patients/carers to join studies. Taking into account the perspectives of people affected by cancer during the early stages of research design may enhance recruitment and retention and can contribute to the development of research protocols and ethics.
Resumo:
The decision of the Court of Appeal in Kellas-Sharpe v PSAL Ltd [2012] QCA 371 considered a not unusual provision in a loan agreement, being a provision whereby a lender agrees to accept a lower or concessional rate of interest in circumstances of prompt payment by the borrower. The loan agreement in question provided for the borrower to pay a standard rate of interest of 7.5% per month. However, if the borrower was not in default, the lender agreed to accept interest at a concessional rate of interest of 4% per month. The issue for determination by the Court of Appeal (McMurdo P, Gotterson JA and Fryberg J) was whether the clause was subject to the equitable jurisdiction to relieve against penalties, and, if so, if the interest rate provision should be treated as a penalty making the interest rate provision void. In mounting this argument, the borrower was seeking to overturn a long line of authority which has repeatedly upheld the semantic distinction between an increase in the rate of interest (which attracts the doctrine concerning penalties) and an incentive to the borrower by way of a reduction in the interest rate for prompt payment (which does not attract the doctrine)...
Resumo:
Managing public sector projects in Malaysia is a unique challenge. This is because of the ethical issues involved during the project procurement process. These ethical issues need attention because they will have an impact on the quality, cost and time of the project itself. The ethical issues here include conflict of interest, bid shopping, collusive tendering, bid cutting, corruption and the payment game. In 2006, 17.3% of 417 Malaysian government contract projects were considered sick due to contractors' performances that failed to conduct the project according to the project plan. Some of the sick projects from these statistics are due to the ethical issues involved. These construction projects have low quality due to the selection of the contractors, done unethically due to personal relationships instead of professional qualifications. That is why it is important to govern the project procurement processes to ensure the accountability and transparency of the decision making process to ensure that these ethical issues can be avoided. Extensive research has been conducted on the ethical issues in the tendering process or the award phase of project management. There is a lack of studies looking at the role of clients, including the government client, in relation to unethical practice in project procurement in the public sector. It is important to understand that ethical issues not only involve the contractors and suppliers but also the clients. Even though there are codes of ethics in the public sectors, ethical issues still arise. Therefore, this research develops a project governance framework (PGEDM) for ethical decision making in the Malaysian public sectors. This framework combines the ethical decision making process together with the project governance principals in guiding the public sectors with ethical decision making in project procurement. A triangulation of questionnaire survey and Delphi study was employed in this research to collect required qualitative and quantitative data. A questionnaire survey was conducted among the public officials (the practitioners) who are currently working in the procurement area in the Malaysian public sectors, in identifying the ethical behaviours and factors influencing further ethical behaviour to occur. A Delphi study was also conducted with the assistance of a panel of experts consisting of practitioners that have expertise in the area of project governance and project procurement as well as academician, which further considered the relationship and the influence of the criteria and indicators of ethical decision making (EDM) and project governance (project criteria, organisational culture, contract award criteria, individual criteria, client's requirements, government procedures and professional ethics). Through the identification and integration of the factors and EDM criteria as well as the project governance criteria and EDM steps for ethical issues, a PGEDM framework was developed to promote, and drive consistent decision outcome in project procurement in the public sector. The framework contributes significantly to ethical decision making in the project procurement process. These findings not only give benefit to the people involved in project procurement but also to the public officials in guiding them to be more accountable in handling ethical issues in the future and to have a more transparent decision making process.
Resumo:
Heavy-vehicle driving involves a challenging work environment and a high crash rate. We investigated the associations of sleepiness, sleep disorders, and work environment (including truck characteristics) with the risk of crashing between 2008 and 2011 in the Australian states of New South Wales and Western Australia. We conducted a case-control study of 530 heavy-vehicle drivers who had recently crashed and 517 heavy-vehicle drivers who had not. Drivers' crash histories, truck details, driving schedules, payment rates, sleep patterns, and measures of health were collected. Subjects wore a nasal flow monitor for 1 night to assess for obstructive sleep apnea. Driving schedules that included the period between midnight and 5:59 am were associated with increased likelihood of crashing (odds ratio = 3.42, 95% confidence interval: 2.04, 5.74), as were having an empty load (odds ratio = 2.61, 95% confidence interval: 1.72, 3.97) and being a less experienced driver (odds ratio = 3.25, 95% confidence interval: 2.37, 4.46). Not taking regular breaks and the lack of vehicle safety devices were also associated with increased crash risk. Despite the high prevalence of obstructive sleep apnea, it was not associated with the risk of a heavy-vehicle nonfatal, nonsevere crash. Scheduling of driving to avoid midnight-to-dawn driving and the use of more frequent rest breaks are likely to reduce the risk of heavy-vehicle nonfatal, nonsevere crashes by 2–3 times.
Resumo:
Social media platforms are of interest to interactive entertainment companies for a number of reasons. They can operate as a platform for deploying games, as a tool for communicating with customers and potential customers, and can provide analytics on how players utilize the; game providing immediate feedback on design decisions and changes. However, as ongoing research with Australian developer Halfbrick, creators of $2 , demonstrates, the use of these platforms is not universally seen as a positive. The incorporation of Big Data into already innovative development practices has the potential to cause tension between designers, whilst the platform also challenges the traditional business model, relying on micro-transactions rather than an up-front payment and a substantial shift in design philosophy to take advantage of the social aspects of platforms such as Facebook.
Resumo:
Executive Summary Emergency Departments (EDs) locally, nationally and internationally are becoming increasingly busy. Within this context, it can be challenging to deliver a health service that is safe, of high quality and cost-effective. Whilst various models are described within the literature that aim to measure ED ‘work’ or ‘activity’, they are often not linked to a measure of costs to provide such activity. It is important for hospital and ED managers to understand and apply this link so that optimal staffing and financial resourcing can be justifiably sought. This research is timely given that Australia has moved towards a national Activity Based Funding (ABF) model for ED activity. ABF is believed to increase transparency of care and fairness (i.e. equal work receives equal pay). ABF involves a person-, performance- or activity-based payment system, and thus a move away from historical “block payment” models that do not incentivise efficiency and quality. The aim of the Statewide Workforce and Activity-Based Funding Modelling Project in Queensland Emergency Departments (SWAMPED) is to identify and describe best practice Emergency Department (ED) workforce models within the current context of ED funding that operates under an ABF model. The study is comprised of five distinct phases. This monograph (Phase 1) comprises a systematic review of the literature that was completed in June 2013. The remaining phases include a detailed survey of Queensland hospital EDs’ resource levels, activity and operational models of care, development of new resource models, development of a user-friendly modelling interface for ED mangers, and production of a final report that identifies policy implications. The anticipated deliverable outcome of this research is the development of an ABF based Emergency Workforce Modelling Tool that will enable ED managers to profile both their workforce and operational models of care. Additionally, the tool will assist with the ability to more accurately inform adequate staffing numbers required in the future, inform planning of expected expenditures and be used for standardisation and benchmarking across similar EDs. Summary of the Findings Within the remit of this review of the literature, the main findings include: 1. EDs are becoming busier and more congested Rising demand, barriers to ED throughput and transitions of care all contribute to ED congestion. In addition requests by organisational managers and the community require continued broadening of the scope of services required of the ED and further increases in demand. As the population live longer with more lifestyle diseases their propensity to require ED care continues to grow. 2. Various models of care within EDs exist Models often vary to account for site specific characteritics to suit staffing profile, ED geographical location (e.g. metropolitan or rural site), and patient demographic profile (e.g. paediatrics, older persons, ethnicity). Existing and new models implemented within EDs often depend on the target outcome requiring change. Generally this is focussed on addressing issues at the input, throughput or output areas of the ED. Even with models targeting similar demographic or illness, the structure and process elements underpinning the model can vary, which can impact on outcomes and variance to the patient and carer experience between and within EDs. Major models of care to manage throughput inefficiencies include: A. Workforce Models of Care focus on the appropriate level of staffing for a given workload to provide prompt, timely and clinically effective patient care within an emergency care setting. The studies reviewed suggest that the early involvement of senior medical decision maker and/or specialised nursing roles such as Emergency Nurse Practitioners and Clinical Initiatives Nurse, primary contact or extended scope Allied Health Practitioners can facilitate patient flow and improve key indicators such as length of stay and reducing the number of those who did not wait to be seen amongst others. B. Operational Models of Care within EDs focus on mechanisms for streaming (e.g. fast-tracking) or otherwise grouping patient care based on acuity and complexity to assist with minimising any throughput inefficiencies. While studies support the positive impact of these models in general, it appears that they are most effective when they are adequately resourced. 3. Various methods of measuring ED activity exist Measuring ED activity requires careful consideration of models of care and staffing profile. Measuring activity requires the ability to account for factors including: patient census, acuity, LOS, intensity of intervention, department skill-mix plus an adjustment for non-patient care time. 4. Gaps in the literature Continued ED growth calls for new and innovative care delivery models that are safe, clinically effective and cost effective. New roles and stand-alone service delivery models are often evaluated in isolation without considering the global and economic impact on staffing profiles. Whilst various models of accounting for and measuring health care activity exist, costing studies and cost effectiveness studies are lacking for EDs making accurate and reliable assessments of care models difficult. There is a necessity to further understand, refine and account for measures of ED complexity that define a workload upon which resources and appropriate staffing determinations can be made into the future. There is also a need for continued monitoring and comprehensive evaluation of newly implemented workforce modelling tools. This research acknowledges those gaps and aims to: • Undertake a comprehensive and integrated whole of department workforce profiling exercise relative to resources in the context of ABF. • Inform workforce requirements based on traditional quantitative markers (e.g. volume and acuity) combined with qualitative elements of ED models of care; • Develop a comprehensive and validated workforce calculation tool that can be used to better inform or at least guide workforce requirements in a more transparent manner.
Resumo:
Effective machine fault prognostic technologies can lead to elimination of unscheduled downtime and increase machine useful life and consequently lead to reduction of maintenance costs as well as prevention of human casualties in real engineering asset management. This paper presents a technique for accurate assessment of the remnant life of machines based on health state probability estimation technique and historical failure knowledge embedded in the closed loop diagnostic and prognostic system. To estimate a discrete machine degradation state which can represent the complex nature of machine degradation effectively, the proposed prognostic model employed a classification algorithm which can use a number of damage sensitive features compared to conventional time series analysis techniques for accurate long-term prediction. To validate the feasibility of the proposed model, the five different level data of typical four faults from High Pressure Liquefied Natural Gas (HP-LNG) pumps were used for the comparison of intelligent diagnostic test using five different classification algorithms. In addition, two sets of impeller-rub data were analysed and employed to predict the remnant life of pump based on estimation of health state probability using the Support Vector Machine (SVM) classifier. The results obtained were very encouraging and showed that the proposed prognostics system has the potential to be used as an estimation tool for machine remnant life prediction in real life industrial applications.
Resumo:
Despite the fact that customer retention is crucial for providers of cloud enterprise systems, only little attention has been directed towards investigating the antecedents of subscription renewal in an organizational context. This is even more surprising, as cloud services are usually offered as subscription-based pricing models with the (theoretical) possibility of immediate service cancellation, strongly opposing classical long-term IT-Outsourcing contracts or license-based payment plans of on premise enterprise systems. To close this research gap an empirical study was undertaken. Firstly, a conceptual model was drawn from theories of social psychology, organizational system continuance and IS success. The model was subsequently tested using survey responses of senior management within companies which adopted cloud enterprise systems. Gathered data was then analysed using PLS. The results indicate that subscription renewal intention is influenced by both – social-related and technology-specific factors – which are able to explain 50.4% of the variance in the dependent variable. Beneath the cloud enterprise systems specific contributions, the work advances knowledge in the area of organizational system continuance, as well as IS success.
Resumo:
The basic principles and equations are developed for elementary finance, based on the concept of compound interest. The five quantities of interest in such problems are present value, future value, amount of periodic payment, number of periods and the rate of interest per period. We consider three distinct means of computing each of these five quantities in Excel 2007: (i) use of algebraic equations, (ii) by recursive schedule and the Goal Seek facility, and (iii) use of Excel's intrinsic financial functions. The paper is intended to be used as the basis for a lesson plan and contains many examples and solved problems. Comment is made regarding the relative difficulty of each approach, and a prominent theme is the systematic use of more than one method to increase student understanding and build confidence in the answer obtained. Full instructions to build each type of model are given and a complete set of examples and solutions may be downloaded (Examples.xlsx and Solutions.xlsx).