882 resultados para improving child protection
Resumo:
Active Grids are a form of grid infrastructure where the grid network is active and programmable. These grids directly support applications with value added services such as data migration, compression, adaptation and monitoring. Services such as these are particularly important for eResearch applications which by their very nature are performance critical and data intensive. We propose an architecture for improving the flexibility of Active Grids through web services. These enable Active Grid services to be easily and flexibly configured, monitored and deployed from practically any platform or application. The architecture is called WeSPNI ('Web Services based on Programmable Networks Infrastructure'). We present the architecture together with some early experimental results on using web services to monitor data movement in an active grid.
Resumo:
In his report into corruption in Queensland, Fitzgerald listed whistleblower protection as a necessary part of a strong governance regime. "What is required is an accessible, independent body to which disclosures can be made, confidentially (at least in the first instance) and in any event free from fear of reprisals." It was one of the reforms studied by the Electoral and Administrative Review Committee, the report of which resulted in the Whistleblowers Protection Act 1994 (WPA). The need for whistleblower protection was supported by all sides of Parliament. The Premier, Wayne Goss, in his Second Reading Speech on the Public Sector Ethics Bill , said that that Act and the WPA would form a package with the former outlining required behaviour and the WPA encouraging staff to report wrongdoing. The WPA was subsequently passed and has remained virtually unamended for over a decade. Such consistency is either an indication of skilled drafting and effectiveness or the fact that the Act has been neglected. It is the hypothesis of this paper that the latter is the case. This hypothesis will be tested by examining the sincerity and diligence with which the Act has been treated during, and following, its passage.
Resumo:
For decades, marketing and marketing research have been based on a concept of consumer behaviour that is deeply embedded in a linear notion of marketing activities. With increasing regularity, key organising frameworks for marketing and marketing activities are being challenged by academics and practitioners alike. In turn, this has led to the search for new approaches and tools that will help marketers understand the interaction among attitudes, emotions and product/brand choice. More recently, the approach developed by Harvard Professor, Gerald Zaltman, referred to as the Zaltman Metaphor Elicitation Technique (ZMET) has gained considerable interest. This paper seeks to demonstrate the effectiveness of this alternative qualitative method, using a non-conventional approach, thus providing a useful contribution to the qualitative research area.
Resumo:
This paper assesses and compares the performances of two daylight collection strategies, one passive and one active, for large-scale mirrored light pipes (MLP) illuminating deep plan buildings. Both strategies use laser cut panels (LCP) as the main component of the collection system. The passive system comprises LCPs in pyramid form, whereas the active system uses a tiled LCP on a simple rotation mechanism that rotates 360° in 24 hours. Performance is assessed using scale model testing under sunny sky conditions and mathematical modelling. Results show average illuminance levels for the pyramid LCP ranging from 50 to 250 lux and 150 to 200 lux for the rotating LCPs. Both systems improve the performance of a MLP. The pyramid LCP increases the performance of a MLP by 2.5 times and the rotating LCP by 5 times, when compared to an open pipe particularly for low sun elevation angles.
Resumo:
Quantitative behaviour analysis requires the classification of behaviour to produce the basic data. In practice, much of this work will be performed by multiple observers, and maximising inter-observer consistency is of particular importance. Another discipline where consistency in classification is vital is biological taxonomy. A classification tool of great utility, the binary key, is designed to simplify the classification decision process and ensure consistent identification of proper categories. We show how this same decision-making tool - the binary key - can be used to promote consistency in the classification of behaviour. The construction of a binary key also ensures that the categories in which behaviour is classified are complete and non-overlapping. We discuss the general principles of design of binary keys, and illustrate their construction and use with a practical example from education research.
Resumo:
Health Information Systems (HIS) make extensive use of Information and Communication Technologies (ICT). The use of ICT aids in improving the quality and efficiency of healthcare services by making healthcare information available at the point of care (Goldstein, Groen, Ponkshe, and Wine, 2007). The increasing availability of healthcare data presents security and privacy issues which have not yet been fully addressed (Liu, Caelli, May, and Croll, 2008a). Healthcare organisations have to comply with the security and privacy requirements stated in laws, regulations and ethical standards, while managing healthcare information. Protecting the security and privacy of healthcare information is a very complex task (Liu, May, Caelli and Croll, 2008b). In order to simplify the complexity of providing security and privacy in HIS, appropriate information security services and mechanisms have to be implemented. Solutions at the application layer have already been implemented in HIS such as those existing in healthcare web services (Weaver et al., 2003). In addition, Discretionary Access Control (DAC) is the most commonly implemented access control model to restrict access to resources at the OS layer (Liu, Caelli, May, Croll and Henricksen, 2007a). Nevertheless, the combination of application security mechanisms and DAC at the OS layer has been stated to be insufficient in satisfying security requirements in computer systems (Loscocco et al., 1998). This thesis investigates the feasibility of implementing Security Enhanced Linux (SELinux) to enforce a Role-Based Access Control (RBAC) policy to help protect resources at the Operating System (OS) layer. SELinux provides Mandatory Access Control (MAC) mechanisms at the OS layer. These mechanisms can contain the damage from compromised applications and restrict access to resources according to the security policy implemented. The main contribution of this research is to provide a modern framework to implement and manage SELinux in HIS. The proposed framework introduces SELinux Profiles to restrict access permissions over the system resources to authorised users. The feasibility of using SELinux profiles in HIS was demonstrated through the creation of a prototype, which was submitted to various attack scenarios. The prototype was also subjected to testing during emergency scenarios, where changes to the security policies had to be made on the spot. Attack scenarios were based on vulnerabilities common at the application layer. SELinux demonstrated that it could effectively contain attacks at the application layer and provide adequate flexibility during emergency situations. However, even with the use of current tools, the development of SELinux policies can be very complex. Further research has to be made in order to simplify the management of SELinux policies and access permissions. In addition, SELinux related technologies, such as the Policy Management Server by Tresys Technologies, need to be researched in order to provide solutions at different layers of protection.
Resumo:
This article explains the relevance of the Code and its place in the regulatory framework, discusses some of the key issues arising in the recent review (as identified by consumer advocates1), and explains the relationship between the Code and the Financial Ombudsman Service.
Resumo:
Previous research has demonstrated the importance of the qualities of the teacher-child relationship on children’s development. Close teacher-child relationships are especially important for children at risk. Positive relationships have been shown to have beneficial effects on children’s social and academic development (Birch & Ladd, 1997; Pianta & Stuhlman, 2004). Children with language difficulties are likely to face increased risks with regard to long term social and academic outcomes. The purpose of the current research was to gain greater understanding of the qualities of teacher-child relationships for young children with parent reported language concerns. The research analyses completed for this thesis involved the use of data from the public-access database of Growing Up in Australia: The Longitudinal Study of Australian Children (LSAC). LSAC is a longitudinal study involving a nationally representative sample of 10,000 Australian children. Data are being collected biennially from 2004 (Wave 1 data collection) until 2010 (Wave 4 data collection). LSAC has a cross-sequential research design involving two cohorts, an infant cohort (0-1 year at age of recruitment) and a kindergarten cohort (4-5 years at age of recruitment). Two studies are reported in this thesis using data for the LSAC Kindergarten Cohort which had 4983 child participants at recruitment. Study 1 used Wave 1 data to identify the differences between teacher-child relationship qualities for children with parent reported language concerns and their peers. Children identified by parents for whom concerns were held about their receptive and expressive language, as measured by items from the Parents’ Evaluation of Developmental Status (PEDS) (Glascoe, 2000) were the target (at risk) group in the study (n = 210). A matched case control group of peers (n = 210), matched on the child characteristics of sex, age, cultural and linguistic differences (CALD), and socio-economic positioning (SEP), were the comparison group for this analysis. Teacher-child relationship quality was measured by teacher reports on the Closeness and Conflict scales from the short version of the Student-Teacher Relationship Scale (STRS) (Pianta, 2001). There were statistically significant differences in the levels of closeness and conflict between the two groups. The target group had relationships with their teachers that had lower levels of closeness and higher levels of conflict than the control group. Study 2 reports analyses that examined the stability of the qualities of the teacher-child relationships at Wave 1 (4-5 years) and the qualities of the teacher-child relationships at Wave 2 (6-7 years). This time frame crosses the period of the children’s transition to school. The study examined whether early patterns in the qualities of the teacher-child relationship for children with parent reported language concerns at Wave 1 predicted the qualities of the teacher-child relationship outcomes in the early years of formal school. The sample for this study consisted of the group of children identified with PEDS language concerns at Wave 1 who also had teacher report data at Wave 2 (n = 145). Teacher-child relationship quality at Wave 1 and Wave 2 was again measured by the STRS scales of Closeness and Conflict. Results from multiple regression models indicated that teacher-child relationship quality at Wave 1 significantly contributed to the prediction of the quality of the teacher-child relationship at Wave 2, beyond other predictor variables included in the regression models. Specifically, Wave 1 STRS Closeness scores were the most significant predictor for STRS Closeness scores at Wave 2, while Wave 1 STRS Conflict scores were the only significant predictor for Wave 2 STRS Conflict outcomes. These results indicate that the qualities of the teacher-child relationship experienced prior to school by children with parent reported language concerns remained stable across transitions into formal schooling at which time the child had a different teacher. The results of these studies provide valuable insight into the nature of teacher-child relationship quality for young children with parent reported language concerns. These children experienced teacher-child relationships of a lower quality when compared with peers and, additionally, the qualities of these relationships prior to formal schooling were predictive of the qualities of the relationships in the early years of formal schooling. This raises concerns, given the increased risks of poorer social and academic outcomes already faced by children with language difficulties, that these early teacher-child relationships have an impact on future teacher-child relationships. Results of these studies are discussed with these considerations in mind and also discussed in terms of the implications for educational theory, policy and practice.
Resumo:
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.
Resumo:
The construction industry has adapted information technology in its processes in terms of computer aided design and drafting, construction documentation and maintenance. The data generated within the construction industry has become increasingly overwhelming. Data mining is a sophisticated data search capability that uses classification algorithms to discover patterns and correlations within a large volume of data. This paper presents the selection and application of data mining techniques on maintenance data of buildings. The results of applying such techniques and potential benefits of utilising their results to identify useful patterns of knowledge and correlations to support decision making of improving the management of building life cycle are presented and discussed.