853 resultados para private provider
Resumo:
Schools have seldom been examined by scholars in studies of organizational sites. Yet schools and the educational context in which they operate, offer potentially important insights into how organizations use rhetoric in their communications to persuade audiences and leverage advantage in the marketplace. This study, which utilises rhetorical analysis to examine the persuasive, yet ambiguous strategies used in 65 school prospectuses in Australia, revealed six strategies consistently used by schools to leverage competitive advantage and persuade internal and external audiences: identification, juxtapositioning, bolstering or self-promotion, partial reporting, selfexpansion and reframing or reversal. As well as illustrating how schools operate in the context of marketisation and privatization discourses in 21st century education, the organizational theory and methods utilised for the research demonstrates how rhetorical strategies draw on, as well as reproduce, socio-political and cultural discourses around economic and social privilege.
Resumo:
As most people know, all mass media, including television stations, are state-owned in China. However, with the economic reform in the broadcasting system and China entering the World Trade Organization (WTO), the television industry has expanded greatly and the television market has evolved, with an ensuing growth of competition. The players in China’s television industry have changed from a monologue of TV stations to stations that hold multiple roles and a growth of production companies and overseas television companies although the TV stations still dominate China’s television market. Private television production companies are, however, becoming increasingly active in this market.
Resumo:
The critical impact of innovation on national and the global economies has been discussed at length in the literature. Economic development requires the diffusion of innovations into markets. It has long been recognised that economic growth and development depends upon a constant stream of innovations. Governments have been keenly aware of the need to ensure this flow does not dry to a trickle and have introduced many and varied industry policies and interventions to assist in seeding, supporting and diffusing innovations. In Australia, as in many countries, Government support for the transfer of knowledge especially from publicly funded research has resulted in the creation of knowledge exchange intermediaries. These intermediaries are themselves service organisations, seeking innovative service offerings for their markets. The choice for most intermediaries is generally a dichotomous one, between market-pull and technology-push knowledge exchange programmes. In this article, we undertake a case analysis of one such innovative intermediary and its flagship programme. We then compare this case with other successful intermediaries in Europe. We put forward a research proposition that the design of intermediary programmes must match the service type they offer. That is, market-pull programmes require market-pull design, in close collaboration with industry, whereas technology programmes can be problem-solving innovations where demand is latent. The discussion reflects the need for an evolution in knowledge transfer policies and programmes beyond the first generation ushered in with the US Bayh-Dole Act (1980) and Stevenson-Wydler Act (1984). The data analysed is a case study comparison of market-pull and technology-push programmes, focusing on primary and secondary socio-economic benefits (using both Australian and international comparisons).
Resumo:
The paper describes the implementation of a project within Australian Catholic University designed to launch the Faculties into online education in a manner which ensured quality in all aspects of the teaching-learning experiences of academics and students. Key elements of the strategic approach adopted by the project leaders, including the involvement of a specialist commercial provider of web-based delivery systems as a partner in the project, mechanisms to support the initiative through the first stages, careful choice of the programs offered online, and staff development matched to the emerging needs of those involved in the teaching of courses, are described. Challenges encountered in the implementation process, and the factors which assisted in overcoming these problems are identified. The paper draws upon this experience to raise some important issues relevant to the successful introduction of online education as an integral component of the teaching repertoire of Faculties.
Resumo:
Medical personnel serving with the Defence Forces have contributed to the evolution of trauma treatment and the advancement of prehospital care within the military environment. This paper investigates the stories of an Australian Medical Officer, Sir Neville Howse, and two stretcher bearers, Private John Simpson (Kirkpatrick) and Private Martin O’Meara, In particular it describes the gruelling conditions under which they performed their roles, and reflects on the legacy that they have left behind in Australian society. While it is widely acknowledged that conflicts such as World War One should never have happened, as civilian and defence force paramedics, we should never forget the service and sacrifice of defence force medical personnel and their contribution to the body of knowledge on the treatment of trauma. These men and women bravely provided emergency care in the most harrowing conditions possible. However, men like Martin O’Meara may not have been given the same status in society today as Sir Neville Howse or Simpson and his donkey, due to the public’s lack of awareness and acceptance of war neurosis and conditions such as post traumatic stress disorder, reactive psychosis and somatoform disorders which were suffered by many soldiers during their wartime service and on their return home after fighting in war.
Resumo:
Purpose: With the increasing interest in Public Private Partnership (PPP) there is a need to investigate the factors contributing to successful delivery of PPP projects. Design/methodology/approach: An empirical questionnaire survey was conducted in Hong Kong and Australia. The survey respondents were asked to rate eighteen factors which contribute to delivering successful PPP projects. Findings: The findings from this survey were further compared with the results achieved by a previous researcher (Li, 2003) in a similar survey conducted in the United Kingdom. The comparison showed that amongst the top five success factors ranked by Hong Kong respondents, three were also ranked highly by the Australians and British. These success factors included: ‘Commitment and responsibility of public and private sectors’; ‘Strong and good private consortium’; and ‘Appropriate risk allocation and risk sharing’. Originality/value: These success factors were therefore found to be important for contributing to successful PPP projects irrespective of geographical locations.
Resumo:
Establishing a nationwide Electronic Health Record system has become a primary objective for many countries around the world, including Australia, in order to improve the quality of healthcare while at the same time decreasing its cost. Doing so will require federating the large number of patient data repositories currently in use throughout the country. However, implementation of EHR systems is being hindered by several obstacles, among them concerns about data privacy and trustworthiness. Current IT solutions fail to satisfy patients’ privacy desires and do not provide a trustworthiness measure for medical data. This thesis starts with the observation that existing EHR system proposals suer from six serious shortcomings that aect patients’ privacy and safety, and medical practitioners’ trust in EHR data: accuracy and privacy concerns over linking patients’ existing medical records; the inability of patients to have control over who accesses their private data; the inability to protect against inferences about patients’ sensitive data; the lack of a mechanism for evaluating the trustworthiness of medical data; and the failure of current healthcare workflow processes to capture and enforce patient’s privacy desires. Following an action research method, this thesis addresses the above shortcomings by firstly proposing an architecture for linking electronic medical records in an accurate and private way where patients are given control over what information can be revealed about them. This is accomplished by extending the structure and protocols introduced in federated identity management to link a patient’s EHR to his existing medical records by using pseudonym identifiers. Secondly, a privacy-aware access control model is developed to satisfy patients’ privacy requirements. The model is developed by integrating three standard access control models in a way that gives patients access control over their private data and ensures that legitimate uses of EHRs are not hindered. Thirdly, a probabilistic approach for detecting and restricting inference channels resulting from publicly-available medical data is developed to guard against indirect accesses to a patient’s private data. This approach is based upon a Bayesian network and the causal probabilistic relations that exist between medical data fields. The resulting definitions and algorithms show how an inference channel can be detected and restricted to satisfy patients’ expressed privacy goals. Fourthly, a medical data trustworthiness assessment model is developed to evaluate the quality of medical data by assessing the trustworthiness of its sources (e.g. a healthcare provider or medical practitioner). In this model, Beta and Dirichlet reputation systems are used to collect reputation scores about medical data sources and these are used to compute the trustworthiness of medical data via subjective logic. Finally, an extension is made to healthcare workflow management processes to capture and enforce patients’ privacy policies. This is accomplished by developing a conceptual model that introduces new workflow notions to make the workflow management system aware of a patient’s privacy requirements. These extensions are then implemented in the YAWL workflow management system.
Resumo:
Introduction The Australian Nurse Practitioner Project (AUSPRAC) was initiated to examine the introduction of nurse practitioners into the Australian health service environment. The nurse practitioner concept was introduced to Australia over two decades ago and has been evolving since. Today, however, the scope of practice, role and educational preparation of nurse practitioners is well defined (Gardner et al, 2006). Amendments to specific pre-existing legislation at a State level have permitted nurse practitioners to perform additional activities including some once in the domain of the medical profession. In the Australian Capital Territory, for example 13 diverse Acts and Regulations required amendments and three new Acts were established (ACT Health, 2006). Nurse practitioners are now legally authorized to diagnose, treat, refer and prescribe medications in all Australian states and territories. These extended practices differentiate nurse practitioners from other advanced practice roles in nursing (Gardner, Chang & Duffield, 2007). There are, however, obstacles for nurse practitioners wishing to use these extended practices. Restrictive access to Medicare funding via the Medicare Benefit Scheme (MBS) and the Pharmaceutical Benefit Scheme (PBS) limit the scope of nurse practitioner service in the private health sector and community settings. A recent survey of Australian nurse practitioners (n=202) found that two-thirds of respondents (66%) stated that lack of legislative support limited their practice. Specifically, 78% stated that lack of a Medicare provider number was ‘extremely limiting’ to their practice and 71% stated that no access to the PBS was ‘extremely limiting’ to their practice (Gardner et al, in press). Changes to Commonwealth legislation is needed to enable nurse practitioners to prescribe medication so that patients have access to PBS subsidies where they exist; currently patients with scripts which originated from nurse practitioners must pay in full for these prescriptions filled outside public hospitals. This report presents findings from a sub-study of Phase Two of AUSPRAC. Phase Two was designed to enable investigation of the process and activities of nurse practitioner service. Process measurements of nurse practitioner services are valuable to healthcare organisations and service providers (Middleton, 2007). Processes of practice can be evaluated through clinical audit, however as Middleton cautions, no direct relationship between these processes and patient outcomes can be assumed.
Resumo:
This research focuses on exploring the links between sport, Indigenous self determination and deeper engagement within mainstream Australia especially with regard to the issue of promoting healthy lifestyles and the role of governance, through sport governance. Against all social, economic and health criteria Indigenous Australians are disadvantaged – despite government attention and financial input. It is well understood that education is a basis to better health, employment and lifestyle (Furneaux and Brown, 2008). However, many of the issues confronting Indigenous people have not responded to conventional government approaches based on program development and policy initiatives from single organisations (Ryan et al 2006). As a consequence, new approaches that both tap into the specific interests of Indigenous people and better engage them in the process of governance are required. The case material of the research focuses on the Australian Football League (AFL) Kickstart program.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
This paper introduces Sapporo World Window, a screen-based application that is currently under development for the new underway passage at the centre of Sapporo City. There are ten large public screens installed in the space, displaying user-generated videos about various aspects of the city and a real-time map that visualises users’ interaction with the city. The application aims to engage the general public by functioning as a unique ‘point of connection’ for socio-cultural and technological interactions, making the space a lively social place where people can have meaningful experiences of interacting with people and places of Sapporo through mobile phones (keitai) and the public screens in the space. This paper first outlines the contextual background and key concept for the application’s design. Then the paper discusses the user interaction processes, technical specifications, and interface design, followed by the conclusions and outlook.