952 resultados para Zika virus--Prevention
Resumo:
Although suicide deaths in Australia continue to decline since the peak of 2,720 suicide deaths in 1997, youth suicide and self-harm are a major health issue. In 2006, in the 20 to 24 year age group, suicide accounted for approximately 21% of all male deaths and 14% of all female deaths. There is a lack of solid data on the rates of suicide and self-harm among young people from refugee backgrounds. However, this population faces a significant number of post-resettlement stressors that may add to their vulnerability and increase their risk of suicide and self-harm. The NEXUS program is an innovative strategy developed by the Queensland Program of Assistance to Survivors of Torture and Trauma (QPASTT) that aims to reduce risk factors for suicide and self-harm and to promote protective factors among youth from refugee backgrounds living in Brisbane and Toowoomba. QPASTT is a non-government organisation that provides culturally appropriate support services to refugee and humanitarian entrants to Australia. QPASTT’s primary function is to provide counselling, advocacy support and community development activities for survivors of torture and trauma at an individual, family and community level. Since 2002 the NEXUS program has been developed and implemented by QPASTT. Since then, this multi-component program has been funded by the Commonwealth Department of Health and Ageing through the National Suicide Prevention Strategy (NSPS). NSPS funding of local community suicide prevention activities will contribute to the outcomes specified in the strategic framework: Living is for Everyone (LIFE): A framework for prevention of suicide and self-harm in Australia. The focus of this report is the evaluation of the NEXUS program conducted by QPASTT between August 2007 and May 2009.
Resumo:
This is the protocol for a review and there is no abstract. The objectives are as follows: To assess the effects of education programmes for skin cancer prevention in the general population. Description of the condition Skin cancer is a term that includes both melanoma and keratinocyte cancer. Keratinocyte cancer (also known as nonmelanoma skin cancer) generally refers to basal cell carcinoma (BCC) and squamous cell carcinoma (SCC), although it also includes other rare cutaneous neoplasms (Madan 2010). Skin cancer is the most common cancer in populations of predominantly fair-skinned people (Donaldson 2011; Lomas 2012; Stern 2010), with incidence increasing (Garbe 2009; Leiter 2012). There are variations in annual incidence rates between these populations, with Australia reporting the highest rate of skin cancer in the world (Lomas 2012). In 2012, the estimated age-standardised incidence rate for melanoma was almost 63 per 100,000 people for Australian men, and 40 per 100,000 people for Australian women (AIHW 2012). In Europe, incidence rates range from 10 to 15 per 100,000 people (Garbe 2009; Lasithiotakis 2006), with rates highest amongst men (Stang 2006). In the United States, incidence rates are approximately 18 per 100,000 people (Garbe 2009),with the highest rates reported forwomen (Bradford 2010). Keratinocyte cancer is much more common than melanoma. In 2012, the estimated Australian age-standardised rates for BCCand SCC were 884 and 387 per 100,000 people, respectively (Staples 2006). The cumulative three-year risk of developing a subsequent keratinocyte cancer is 18% for SCC and 44% for BCC (Marcil 2000).
Resumo:
E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.
Resumo:
Background The epidemiology of dengue in the South Pacific has been characterized by transmission of a single dominant serotype for 3–5 years, with subsequent replacement by another serotype. From 2001 to 2008 only DENV-1 was reported in the Pacific. In 2008, DENV-4 emerged and quickly displaced DENV-1 in the Pacific, except in New Caledonia (NC) where DENV-1 and DENV-4 co-circulated in 2008–2009. During 2012–2013, another DENV-1 outbreak occurred in NC, the third DENV-1 outbreak in a decade. Given that dengue is a serotype-specific immunizing infection, the recurrent outbreaks of a single serotype within a 10-year period was unexpected. Findings This study aimed to inform this phenomenon by examining the phylogenetic characteristics of the DENV-1 viruses in NC and other Pacific islands between 2001 and 2013. As a result, we have demonstrated that NC experienced introductions of viruses from both the Pacific (genotype IV) and South-east Asia (genotype I). Moreover, whereas genotype IV and I were co-circulating at the beginning of 2012, we observed that from the second half of 2012, i.e. during the major DENV-1 outbreak, all analyzed viruses were genotype I suggesting that a genotype switch occurred. Conclusions Repeated outbreaks of the same dengue serotype, as observed in NC, is uncommon in the Pacific islands. Why the earlier DENV-1 outbreaks did not induce sufficient herd immunity is unclear, and likely multifactorial, but the robust vector control program may have played a role by limiting transmission and thus maintaining a large susceptible pool in the population. Keywords: Dengue; Phylogeny; Genotype; Epidemics; New Caledonia
Resumo:
This study is the first to examine the effectiveness of the Fun FRIENDS programme, a school-based, universal preventive intervention for early childhood anxiety and promotion of resilience delivered by classroom teachers. Participants (N = 488) included children aged 4–7 years attending 1 of 14 Catholic Education schools in Brisbane, Australia. The schools were randomly allocated to one of three groups, the intervention, active comparison and waitlist control group. Parents completed standardized measures of anxiety and behavioural inhibition (BI), resilience, social and emotional functioning and behaviour difficulties in addition to parental stress and anxiety, at pre- and post- and 12-month follow-up. Teachers also completed a parallel measure of social and emotional strength at the three time points. Comparable results were obtained for the intervention and comparison groups; however, the intervention group (IG) achieved greater reductions in BI, child behavioural difficulties and improvements in social and emotional competence. In addition, significant improvements in parenting distress and parent–child interactions were found for the IG, with gains maintained at 12-month follow-up. Teacher reports revealed more significant improvement in social and emotional competence for the IG. Clinical implications of the findings are discussed, along with limitations and directions for future research.
Resumo:
Ross River virus (RRV) infection is a debilitating disease which has a significant impact on population health, economic productivity and tourism in Australia. This study examined epidemiological patterns of the RRV disease in Queensland, Australia between January 2001 and December 2011 at a statistical local area level. Spatial-temporal analyses were used to identify the patterns of the disease distribution over time stratified by age, sex and space. The results show that the mean annual incidence was 54 per 100,000 people, with a male: female ratio of 1:1.1. Two space-time clusters were identified: the areas adjacent to Townsville, on the eastern coast of Queensland; and the south east areas. Thus, although public health intervention should be considered across all areas in which RRV occurs, it should specifically focus on these high risk regions, particularly during the summer and autumn to reduce the social and economic impacts of RRV.
Resumo:
Background Southeast Asia has been at the epicentre of recent epidemics of emerging and re-emerging zoonotic diseases. Community-based surveillance and control interventions have been heavily promoted but the most effective interventions have not been identified. Objectives This review evaluated evidence for the effectiveness of community-based surveillance interventions at monitoring and identifying emerging infectious disease; the effectiveness of community-based control interventions at reducing rates of emerging infectious disease; and contextual factors that influence intervention effectiveness. Inclusion criteria Participants Communities in Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines, Singapore, Thailand and Viet Nam. Types of intervention(s) Non-pharmaceutical, non-vaccine, and community-based surveillance or prevention and control interventions targeting rabies, Nipah virus , dengue, SARS or avian influenza. Types of outcomes Primary outcomes: measures: of infection or disease; secondary outcomes: measures of intervention function. Types of studies Original quantitative studies published in English. Search strategy Databases searched (1980 to 2011): PubMed, CINAHL, ProQuest, EBSCOhost, Web of Science, Science Direct, Cochrane database of systematic reviews, WHOLIS, British Development Library, LILACS, World Bank (East Asia), Asian Development Bank. Methodological quality Two independent reviewers critically appraised studies using standard Joanna Briggs Institute instruments. Disagreements were resolved through discussion. Data extraction A customised tool was used to extract quantitative data on intervention(s), populations, study methods, and primary and secondary outcomes; and qualitative contextual information or narrative evidence about interventions. Data synthesis Data was synthesised in a narrative summary with the aid of tables. Meta-analysis was used to statistically pool quantitative results. Results Fifty-seven studies were included. Vector control interventions using copepods, environmental cleanup and education are effective and sustainable at reducing dengue in rural and urban communities, whilst insecticide spraying is effective in urban outbreak situations. Community-based surveillance interventions can effectively identify avian influenza in backyard flocks, but have not been broadly applied. Outbreak control interventions for Nipah virus and SARS are effective but may not be suitable for ongoing control. Canine vaccination and education is more acceptable than culling, but still fails to reach coverage levels required to effectively control rabies. Contextual factors were identified that influence community engagement with, and ultimately effectiveness of, interventions. Conclusion Despite investment in community-based disease control and surveillance in Southeast Asia, published evidence evaluating interventions is limited in quantity and quality. Nonetheless this review identified a number of effective interventions, and several contextual factors influencing effectiveness. Identification of the best programs will require comparative evidence of effectiveness acceptability, cost-effectiveness and sustainability.
Resumo:
Sexual harassment remains a widespread workplace phenomenon, despite laws that proscribe it. Drawing initially on a typology from the violence prevention literature that conceptualizes prevention and response approaches according to when they occur, the paper synthesizes strategies identified in literature addressing workplace sexual harassment, as well as other workplace injustices or grievances. The paper utilizes this previous research to develop a framework of sexual harassment prevention strategies along two dimensions: functions and timing. The framework offers a research-informed set of organization-wide preventative and remedial approaches, a systemic approach to what is often seen as an individual problem, and a means to better focus interventions that are often disparate and unco-ordinated. The paper also highlights important areas for future research including a stronger focus on longer-term (tertiary) corrective actions.
Resumo:
Objective: The study aimed to examine the difference in response rates between opt-out and opt-in participant recruitment in a population-based study of heavy-vehicle drivers involved in a police-attended crash. Methods: Two approaches to subject recruitment were implemented in two different states over a 14-week period and response rates for the two approaches (opt-out versus opt-in recruitment) were compared. Results: Based on the eligible and contactable drivers, the response rates were 54% for the optout group and 16% for the opt-in group. Conclusions and Implications: The opt-in recruitment strategy (which was a consequence of one jurisdiction’s interpretation of the national Privacy Act at the time) resulted in an insufficient and potentially biased sample for the purposes of conducting research into risk factors for heavy-vehicle crashes. Australia’s national Privacy Act 1988 has had a long history of inconsistent practices by state and territory government departments and ethical review committees. These inconsistencies can have profound effects on the validity of research, as shown through the significantly different response rates we reported in this study. It is hoped that a more unified interpretation of the Privacy Act across the states and territories, as proposed under the soon-to-be released Australian Privacy Principles will reduce the recruitment challenges outlined in this study.
Resumo:
A recent meta-analysis provides evidence supporting the universal application of school-based prevention programs for adolescent depression. The mechanisms underlying such successful interventions, however, are largely unknown. We report on a qualitative analysis of 109 Grade 9 students’ beliefs about what they gained from an evidence-based depression prevention intervention, the Resourceful Adolescent Program (RAP-A). Fifty-four percent of interviewees articulated at least one specific example of program benefit. A thematic analysis of responses revealed two major themes, improved interpersonal relationships and improved self-regulation, both stronger than originally assumed. A more minor theme also emerged—more helpful cognitions. It is postulated that both improved interpersonal relationships and improved self-regulation are likely to enhance one another, and more helpful cognitions may express its contribution through enhanced self-regulation. These findings broaden our understanding of the impact of depression prevention programs, beginning to illuminate how such programs benefit participants.
Resumo:
This article explores the relationship between the Responsibility to Protect (R2P) and the pursuit of the so-called ‘Women, Peace and Security’ (WPS) agenda at the UN. We ask whether the two agendas should continue to be pursued separately or whether each can make a useful contribution to the other. We argue that while the history of R2P has not included language that deliberately evokes the protection of women and the promotion of gender in preventing genocide and mass atrocities, this does not preclude the R2P and WPS agendas becoming mutually reinforcing. The article identifies cross-cutting areas where the two agendas may be leveraged for the UN and member states to address the concerns of women as both actors in need of protection and active agents in preventing and responding to genocide and mass atrocities, namely in the areas of early warning.
Resumo:
Banana bunchy top disease (BBTD) caused by banana bunchy top virus (BBTV) was radioactively detected by nucleic acid hybridization techniques. Results showed that, 32P-labelled insert of pBT338 was hybridized with nucleic acid extracts from BBTV-infected plants from Egypt and Australia but not with those from CMV-infected plants from Egypt. Results revealed that BBTV was greatly detected in midrib, roots, meristem, corm, leaves and pseudostem respectively. BBTV was also detected in symptomless young plants prepared from diseased plant materials grown under tissue culture conditions but was not present in those performed from healthy plant materials. The sensitivity of dot blot and Southern blot hybridizations for the detection of BBTV was also performed for the detection of BBTV.
Resumo:
Cheating detection in linear secret sharing is considered. The model of cheating extends the Tompa-Woll attack and includes cheating during multiple (unsuccessful) recovery of the secret. It is shown that shares in most linear schemes can be split into subshares. Subshares can be used by participants to trade perfectness of the scheme with cheating prevention. Evaluation of cheating prevention is given in the context of different strategies applied by cheaters.
Resumo:
The work investigates cheating prevention in secret sharing. It is argued that cheating is immune against cheating if the cheaters gain no advantage over honest participants by submitting invalid shares to the combiner. This work addresses the case when shares and the secret are taken from GF(pt). Two models are considered. The first one examines the case when cheaters consistently submit always invalid shares. The second modeldeal s with cheaters who submit a mixture of valid and invalid shares. For these two models, cheating immunity is defined, properties of cheating immune secret sharing are investigated and their constructions are given.