922 resultados para Local Group
Resumo:
Internationally, collection of reliable data on new and evolving health-care roles is crucial. We describe a protocol for design and administration of a national census of an emergent health-care role, namely nurse practitioners in Australia using databases held by regulatory authorities. A questionnaire was developed to obtain data on the role and scope of practice of Australian nurse practitioners. Our tool comprised five sections and included a total of 56 questions, using 28 existing items from the National Nursing and Midwifery Labour Force Census and nine items recommended in the Nurse Practitioner Workforce Planning Minimum Data Set. Australian Nurse Registering Authorities (n = 6) distributed the survey on our behalf. This paper outlines our instrument and methods. The survey was administered to 238 authorized Australian nurse practitioners (85% response rate). Rigorous collection of standardized items will ensure health policy is informed by reliable and valid data. We will re-administer the survey 2 years following the first survey to measure change over time.
Resumo:
As the acceptance and popularity of wireless networking technologies has proliferated, the security of the IEEE 802.11 wireless local area network (WLAN) has advanced in leaps and bounds. From tenuous beginnings, where the only safe way to deploy a WLAN was to assume it was hostile and employ higherlayer information security controls, to the current state of the art, all manner of improvements have been conceived and many implemented. This work investigates some of the remaining issues surrounding IEEE 802.11 WLAN operation. While the inherent issues in WLAN deployments and the problems of the original Wired Equivalent Privacy (WEP) provisions are well known and widely documented, there still exist a number of unresolved security issues. These include the security of management and control frames and the data link layer protocols themselves. This research introduces a novel proposal to enhance security at the link layer of IEEE 802.11 WLANs and then conducts detailed theoretical and empirical investigation and analysis of the eects of such proposals. This thesis �rst de�nes the state of the art in WLAN technology and deployment, including an overview of the current and emerging standards, the various threats, numerous vulnerabilities and current exploits. The IEEE 802.11i MAC security enhancements are discussed in detail, along with the likely outcomes of the IEEE 802.11 Task Group W1, looking into protected management frames. The problems of the remaining unprotected management frames, the unprotected control frames and the unprotected link layer headers are reviewed and a solution is hypothesised, to encrypt the entire MAC Protocol Data Unit (MPDU), including the MAC headers, not just the MAC Service Data Unit (MSDU) commonly performed by existing protocols. The proposal is not just to encrypt a copy of the headers while still using cleartext addresses to deliver the frame, as used by some existing protocols to support the integrity and authenticity of the headers, but to pass the entire MPDU only as ciphertext to also support the con�dentiality of the frame header information. This necessitates the decryption of every received frame using every available key before a station can determine if it is the intended recipient. As such, this raises serious concerns as to the viability of any such proposal due to the likely impact on throughput and scalability. The bulk of the research investigates the impacts of such proposals on the current WLAN protocols. Some possible variations to the proposal are also provided to enhance both utility and speed. The viability this proposal with respect to the eect on network throughput is then tested using a well known and respected network simulation tool, along with a number of analysis tools developed speci�cally for the data generated here. The simulator's operation is �rst validated against recognised test outputs, before a comprehensive set of control data is established, and then the proposal is tested and and compared against the controls. This detailed analysis of the various simulations should be of bene�t to other researchers who need to validate simulation results. The analysis of these tests indicate areas of immediate improvement and so the protocols are adjusted and a further series of experiments conducted. These �nal results are again analysed in detail and �nal appraisals provided.
Resumo:
The relationship between the quality of parent-child interactions and positive child developmental trajectories is well established (Guralnick, 2006; Shonkoff & Meissels, 2000; Zubrick et al., 2008). However, a range of parental, family, and socio-economic factors can pose risks to parents’ capacity to participate in quality interactions with their children. In particular, families with a child with a disability have been found to have higher levels of parenting stress, and are more likely to experience economic disadvantage, as well as social isolation. The importance of early interventions to promote positive parenting and child development for these families is widely recognised (Shonkoff & Meissels, 2000). However, to date, there is a lack of evidence about the effectiveness of early parenting programs for families who have a young child with a disability. This thesis investigates the impact of a music therapy parenting program, Sing & Grow, on 201 parent-child dyads who attended programs specifically targeted to parents who had a young child with a disability. Sing & Grow is an Australian national early parenting intervention funded by the Australian Government Department of Families, Housing, Community Services and Indigenous Affairs and delivered by Playgroup Queensland. It is designed and delivered by Registered Music Therapists for families with children aged from birth to three years. It aims to improve parenting skills and confidence, improve family functioning (positive parent-child interactions), enhance child development, and provide social networking opportunities to socially isolated families. The intervention targets a range of families in circumstances that have the potential to impact negatively on family functioning. This thesis uses data from the National Evaluation Study of Sing & Grow from programs which were targeted at families who had a young child with a disability. Three studies were conducted to address the objectives of this thesis. Study 1 examines the effects of the Sing & Grow intervention on parent reported pre and post parent mental health, parenting confidence, parenting skills, and child development, and other parent reported outcomes including social support, use of intervention resources, satisfaction with the intervention and perceived benefits of and barriers to participation. Significant improvements from pre to post were found for parent mental health and parent reported child communication and social skills, along with evidence that parents were very satisfied with the program and that it brought social benefits to families. Study 2 explored the pre to post effects of the intervention on children’s developmental skills and parent-child interactions using observational ratings made by clinicians. Significant pre to post improvements were found for parenting sensitivity, parental engagement with child and acceptance of child as well as for child responsiveness to parent, interest, and participation in the intervention, and social skills. Study 3 examined the nature of child and family characteristics that predicted better outcomes for families while taking account of the level of participation in the program. An overall outcome index was calculated and served as the dependent variable in a logistic regression analysis. Families who attended six or more sessions and mothers who had not completed high school were more likely to have higher outcome scores at post intervention than those who attended fewer sessions and those with more educated mothers respectively. The findings of this research indicate that the intervention had a positive impact on participants’ mental health, parenting behaviours and child development and that level of attendance was associated with better outcomes. There was also evidence that the program reached its target of high risk families (i.e., families in which mothers had lower educational levels) and that for these families better outcomes were achieved. There were also indications that the program was accessible and highly regarded by families and that it promoted social connections for participants. A theoretical model of how the intervention is currently working for families is proposed to explain the connections between early parenting, child development and maternal wellbeing. However, more research is required to further elucidate the mechanisms by which the intervention creates change for families. This research presents promising evidence that a short term group music therapy program can elicit important therapeutic benefits for families who have a child with a disability.
Resumo:
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.
Resumo:
This work is focussed on developing a commissioning procedure so that a Monte Carlo model, which uses BEAMnrc’s standard VARMLC component module, can be adapted to match a specific BrainLAB m3 micro-multileaf collimator (μMLC). A set of measurements are recommended, for use as a reference against which the model can be tested and optimised. These include radiochromic film measurements of dose from small and offset fields, as well as measurements of μMLC transmission and interleaf leakage. Simulations and measurements to obtain μMLC scatter factors are shown to be insensitive to relevant model parameters and are therefore not recommended, unless the output of the linear accelerator model is in doubt. Ultimately, this note provides detailed instructions for those intending to optimise a VARMLC model to match the dose delivered by their local BrainLAB m3 μMLC device.
Resumo:
Policymakers often propose strict enforcement strategies to fight the shadow economy and to increase tax morale. However, there is an alternative bottom-up approach that decentralises political power to those who are close to the problems. This paper analyses the relationship with local autonomy. We use data on tax morale at the individual level and macro data on the size of the shadow economy to analyse the relevance of local autonomy and compliance in Switzerland. The findings suggest that there is a positive (negative) relationship between local autonomy and tax morale (size of the shadow economy).
Resumo:
In normal child development, both individual and group pretense first emerges at approximately two years of age. The metarepresentational account of pretense holds that children already have the concept PRETEND when they first engage in early group pretense. A behavioristic account suggests that early group pretense is analogous to early beliefs or desires and thus require no mental state concepts. I argue that a behavioral account does not explain the actual behavior observed in children and it cannot explain how children come to understand that a specific action is one of pretense versus one of belief. I conclude that a mentalistic explanation of pretense best explains the behavior under consideration.