946 resultados para Mutual security program, 1951-
Resumo:
Meticulous planning and preparation do not always guarantee that eHealth programs unfold as predicted. eHealth entails interdependent social interactions which are difficult to predict without past experience or reference to lessons learned. Judicious insight into past case studies and eventualities, therefore, is essential towards building a successful eHealth solution. Australia’s eHealth program is at a crucial stage where appropriate policy considerations and operational changes are in order. In this paper, we present an initial exploration of prominent eHealth initiatives of other countries to identify similarities, differences and to seek lessons towards making Australia’s eHealth initiative a better journey.
Resumo:
Background: Cardiac patients with diabetes are at higher readmission rates (22%) compared to only 6% for those patients without diabetes. Evidence shows benefits of peer support and using information technology to improve chronic illness and achieve better health outcomes. However limited evidence suggests that cardiac or diabetes self-management programs incorporating peer supporters (patients with similar conditions) or telephone and text-messaging, have improved health outcomes and reduce health care utilisations. A multidisciplinary research team approach is crucial to accommodate the complex aspects of delivering intervention programs for these at-risk patients. However, challenges such as the inconsistency in significance of key concepts across research fields, as well as practical and operational issues within different contexts are often experienced. Aims: To develop an effective multidisciplinary team approach to deliver a peer support based cardiac-diabetes self-management program incorporating the preparation of lay personnel to provide telephone and text-messaging follow up support. Methods: The approach was used for a multidisciplinary project using randomised controlled trial. Results: The findings from multidisciplinary team approach reveal the feasibility of a Peer support based cardiac-diabetes self-management program.
Resumo:
This study was undertaken in an effort to contribute to the limited knowledge of women who commit murder. Women account for approximately 10% of the total Australian homicides and according to Mouzos (2000), 20% of these female perpetrated homicides result in murder convictions. In her extensive study of female homicide offending in England, Brookman (2005) asserts that nearly two thirds of the victims of women who kill are intimates, to include violent partners and their own children. The other third of the victims consist largely of acquaintances and to lesser degree strangers (Brookman, 2005). This study strives to introduce further knowledge regarding women convicted of murder; the smaller subgroup of female homicide offenders of which less is known. It is comprised of women who killed intimates and non-intimates to include acquaintances. The study engages the narratives of seven women, all of whom were convicted of murder and serving lengthy sentences at the Dame Phyllis Frost Centre, a medium and maximum security prison that is located on the outskirts of Melbourne, Australia. The seven women fall largely outside of the characteristics of female homicide offenders as revealed in the studies from Australia’s National Homicide Monitoring Program (NHMP, 2007), from Canada by Hoffmann, Lavigne, and Dickie (1998) and research from the United States by Scott and Davies (2002). In this study there were no Indigenous women represented. Only one of the women had a previous criminal charge. The women were older on average than the prevailing demographics from western nations. Two of the women had substance abuse and co-occurring mental illness, which reflects a significant lower rate than the literature suggests. This study expands the current understanding of the phenomenon of women who murder. It communicates the narratives of seven women charged and convicted of murder as they attempt to understand their lives and identities. It moves the dialogue beyond the preponderance of feminist criminological research that examines motive and the relationship the woman has with her victim to the social discourses which dominate in her identity formation. This research found that in their attempt to create a favourable identity the women needed to engage with the master script of normative femininity through the feminisation of victimisation, motherhood and domesticity.
Resumo:
PURPOSE: The purpose of this study was to examine the influence of three different high-intensity interval training (HIT) regimens on endurance performance in highly trained endurance athletes. METHODS: Before, and after 2 and 4 wk of training, 38 cyclists and triathletes (mean +/- SD; age = 25 +/- 6 yr; mass = 75 +/- 7 kg; VO(2peak) = 64.5 +/- 5.2 mL x kg(-1) min(-1)) performed: 1) a progressive cycle test to measure peak oxygen consumption (VO(2peak)) and peak aerobic power output (PPO), 2) a time to exhaustion test (T(max)) at their VO(2peak) power output (P(max)), as well as 3) a 40-km time-trial (TT(40)). Subjects were matched and assigned to one of four training groups (G(2), N = 8, 8 x 60% T(max) at P(max), 1:2 work:recovery ratio; G(2), N = 9, 8 x 60% T(max) at P(max), recovery at 65% HR(max); G(3), N = 10, 12 x 30 s at 175% PPO, 4.5-min recovery; G(CON), N = 11). In addition to G(1), G(2), and G(3) performing HIT twice per week, all athletes maintained their regular low-intensity training throughout the experimental period. RESULTS: All HIT groups improved TT(40) performance (+4.4 to +5.8%) and PPO (+3.0 to +6.2%) significantly more than G(CON) (-0.9 to +1.1%; P < 0.05). Furthermore, G(1) (+5.4%) and G(2) (+8.1%) improved their VO(2peak) significantly more than G(CON) (+1.0%; P < 0.05). CONCLUSION: The present study has shown that when HIT incorporates P(max) as the interval intensity and 60% of T(max) as the interval duration, already highly trained cyclists can significantly improve their 40-km time trial performance. Moreover, the present data confirm prior research, in that repeated supramaximal HIT can significantly improve 40-km time trial performance.
Resumo:
Introduction: Participants may respond to phases of a workplace walking program at different rates. This study evaluated the factors that contribute to the number of steps through phases of the program. The intervention was automated through a web-based program designed to increase workday walking. Methods: The study reviewed independent variable influences throughout phases I–III. A convenience sample of university workers (n=56; 43.6±1.7 years; BMI 27.44±.2.15 kg/m2; 48 female) were recruited at worksites in Australia. These workers were given a pedometer (Yamax SW 200) and access to the website program. For analyses, step counts entered by workers into the website were downloaded and mean workday steps were compared using a seemingly unrelated regression. This model was employed to capture the contemporaneous correlation within individuals in the study across observed time periods. Results: The model predicts that the 36 subjects with complete information took an average 7460 steps in the baseline two week period. After phase I, statistically significance increases in steps (from baseline) were explained by age, working status (full or part time), occupation (academic or professional), and self reported public transport (PT) use (marginally significant). Full time workers walked more than part time workers by about 440 steps, professionals walked about 300 steps more than academics, and PT users walked about 400 steps more than non-PT users. The ability to differentiate steps after two weeks among participants suggests a differential affect of the program after only two weeks. On average participants increased steps from week two to four by about 525 steps, but regular auto users had nearly 750 steps less than non-auto users at week four. The effect of age was diminished in the 4th week of observation and accounted for 34 steps per year of age. In phase III, discriminating between participants became more difficult, with only age effects differentiating their increase over baseline. The marginal effect of age by phase III compared to phase I, increased from 36 to 50, suggesting a 14 step per year increase from the 2nd to 6th week. Discussion: The findings suggest that participants responded to the program at different rates, with uniformity of effect achieved by the 6th week. Participants increased steps, however a tapering off occurred over time. Age played the most consistent role in predicting steps over the program. PT use was associated with increased step counts, while Auto use was associated with decreased step counts.
Resumo:
For any discipline to be regarded as a professional undertaking by which its members may be treated as true “professionals” in a specific area, practitioners must clearly understand that discipline’s history as well as the place and significance of that history in current practice as well as its relevance to available technologies and artefacts at the time. This is common for many professional disciplines such as medicine, pharmacy, engineering, law and so on but not yet, this paper submits, in information technology. Based on twenty five elapsed years of experience in developing and delivering Cybersecurity courses at undergraduate and postgraduate levels, this paper proposes a rationale and set of differing perspectives for the planning and development of curricula relevant to the delivery of appropriate courses in the history of cybersecurity or information assurance to information and communications technology (ICT) students and thus to potential information technology professionals.
Resumo:
Iris based identity verification is highly reliable but it can also be subject to attacks. Pupil dilation or constriction stimulated by the application of drugs are examples of sample presentation security attacks which can lead to higher false rejection rates. Suspects on a watch list can potentially circumvent the iris based system using such methods. This paper investigates a new approach using multiple parts of the iris (instances) and multiple iris samples in a sequential decision fusion framework that can yield robust performance. Results are presented and compared with the standard full iris based approach for a number of iris degradations. An advantage of the proposed fusion scheme is that the trade-off between detection errors can be controlled by setting parameters such as the number of instances and the number of samples used in the system. The system can then be operated to match security threat levels. It is shown that for optimal values of these parameters, the fused system also has a lower total error rate.
Resumo:
There has been a rapid escalation in the development and evaluation of social and emotional well-being (SEW) programs in primary schools over the last few decades. Despite the plethora of programs available, primary teachers’ use of SEW programs is not well documented in Australian schools, with even less consideration of the factors influencing program use. A cross-sectional survey was undertaken with primary classroom teachers across twelve schools in the Brisbane and Sunshine Coast Education Districts in Queensland, Australia, during 2005. A checklist of SEW programs and an audit of SEW practices in schools were employed to investigate the number, range and types of SEW programs used by primary classroom teachers and the contextual factors influencing program use. Whilst the majority of implementation studies have been conducted under intervention conditions, this study was designed to capture primary classroom teachers’ day-to-day use of SEW programs and the factors influencing program use under real-world conditions. The findings of this research indicate that almost three quarters of the primary classroom teachers involved in the study reported using at least one SEW program during 2005. Wide variation in the number and range of programs used was evident, suggesting that teachers are autonomous in their use of SEW programs. Evidence-based SEW programs were used by a similar proportion of teachers to non-evidence-based programs. However, irrespective of the type of program used, primary teachers overwhelmingly reported using part of a SEW program rather than the whole program. This raises some issues about the quality of teachers’ program implementation in real-world practice, especially with respect to programs that are evidence-based. A content analysis revealed that a wide range of factors have been examined as potential influences on teachers’ implementation of health promotion programs in schools, including SEW programs, despite the limited number of studies undertaken to date. However, variation in the factors examined and study designs employed both within and across health promotion fields limited the extent to which studies could be compared. A methodological and statistical review also revealed substantial variation in the quality of reporting of studies. A variety of factors were examined as potential influences on primary classroom teachers’ use of SEW programs across multiple social-ecological levels of influence (ranging from community to school and individual levels). In this study, parent or caregiver involvement in class activities and the availability of wellbeing-related policies in primary schools were found to be influential in primary classroom teachers’ use of SEW programs. Teachers who often or always involve parents or caregivers in class activities were at a higher odds of program use relative to teachers who never or rarely involved parents or caregivers in class activities. However, teachers employed in schools with the highest number of wellbeing-related policies available were at a lower odds of program use relative to teachers employed in schools with fewer wellbeing-related policies available. Future research should investigate primary classroom teachers’ autonomy and motivations for using SEW programs and the reasons behind the selection and use of particular types of programs. A larger emphasis should also be placed upon teachers not using SEW programs to identify valid reasons for non-use. This would provide another step towards bridging the gap between the expectations of program developers and the needs of teachers who implement programs in practice. Additionally, the availability of wellbeing-related school policies and the types of activities that parents and caregivers are involved with in the classroom warrant more in-depth investigation. This will help to ascertain how and why these factors influence primary classroom teachers’ use of SEW programs on a day-to-day basis in schools.
Resumo:
Availability has become a primary goal of information security and is as significant as other goals, in particular, confidentiality and integrity. Maintaining availability of essential services on the public Internet is an increasingly difficult task in the presence of sophisticated attackers. Attackers may abuse limited computational resources of a service provider and thus managing computational costs is a key strategy for achieving the goal of availability. In this thesis we focus on cryptographic approaches for managing computational costs, in particular computational effort. We focus on two cryptographic techniques: computational puzzles in cryptographic protocols and secure outsourcing of cryptographic computations. This thesis contributes to the area of cryptographic protocols in the following ways. First we propose the most efficient puzzle scheme based on modular exponentiations which, unlike previous schemes of the same type, involves only a few modular multiplications for solution verification; our scheme is provably secure. We then introduce a new efficient gradual authentication protocol by integrating a puzzle into a specific signature scheme. Our software implementation results for the new authentication protocol show that our approach is more efficient and effective than the traditional RSA signature-based one and improves the DoSresilience of Secure Socket Layer (SSL) protocol, the most widely used security protocol on the Internet. Our next contributions are related to capturing a specific property that enables secure outsourcing of cryptographic tasks in partial-decryption. We formally define the property of (non-trivial) public verifiability for general encryption schemes, key encapsulation mechanisms (KEMs), and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption avors. We show that some generic transformations and concrete constructions enjoy this property and then present a new public-key encryption (PKE) scheme having this property and proof of security under the standard assumptions. Finally, we combine puzzles with PKE schemes for enabling delayed decryption in applications such as e-auctions and e-voting. For this we first introduce the notion of effort-release PKE (ER-PKE), encompassing the well-known timedrelease encryption and encapsulated key escrow techniques. We then present a security model for ER-PKE and a generic construction of ER-PKE complying with our security notion.
Resumo:
Distribution through electronic media provides an avenue for promotion, recognition and an outlet of display for graphic designers. The emergence of available media technologies have enabled graphic designers to extend these boundaries of their practice. In this context the designer is constantly striving for aesthetic success and is strongly influenced by the fashion and trends of contemporary design work. The designer is always in a state of inquiry, finding pathways of discovery that lead to innovation and originality that are highly valued criteria for self-evaluation. This research is based on an analysis of the designer perspective and the processes used within an active graphic design practice specializing entirely within a digital collage domain. Contemporary design methodologies were critically examined, compared and refined to reflect the self-practice of the researcher. The refined methodology may assist designers in maintaining systematic work practices, as well as promote the importance of exploration and experimentation processes. Research findings indicate some differences in the identified methodologies and the design practice of the researcher in the sense that many contemporary designers are not confined to a client-base but are self-generating design images influenced by contemporary practitioners. As well as confirming some aspects of more conventional design processes, the researcher found that accidental discoveries and the designer’s interaction with technology plays a significant part in the design process.
Resumo:
Vulnerable and marginalised populations are not only over-represented in the criminal justice system, but also in civil jurisdictions like the coronial system. Moreover, many of the personnel who deal with criminal matters, especially in rural and regional areas, are also those who manage the coronial death investigation. This movement back and forth between civil and criminal jurisdictions is difficult for the both professional personnel and the families, but especially for those families who may also have had dealings with these personnel in the criminal justice system, or who present as suspicious due to larger historical and global issues. While coronial legislation now allows families to raise cultural and religious concerns about the process, particularly to do with the autopsy of their loved one, this also requires them to identify themselves to police at the initial stage of the death investigation. This paper, part of a larger body of work on autopsy decision making, discusses the ways in which this information is gathered by police, how it is communicated through the system, the ways in which families are supported through the process, and the difficulties that ensue.
Resumo:
Practice-led journalism research techniques were used in this study to produce a ‘first draft of history’ recording the human experience of survivors and rescuers during the January 2011 flash flood disaster in Toowoomba and the Lockyer Valley in Queensland, Australia. The study aimed to discover what can be learnt from engaging in journalistic reporting of natural disasters. This exegesis demonstrates that journalism can be both a creative practice and a research methodology. About 120 survivors, rescuers and family members of victims participated in extended interviews about what happened to them and how they survived. Their stories are the basis for two creative outputs of the study: a radio documentary and a non-fiction book, that document how and why people died, or survived, or were rescued. Listeners and readers are taken "into the flood" where they feel anxious for those in peril, relief when people are saved, and devastated when babies, children and adults are swept away to their deaths. In undertaking reporting about the human experience of the floods, several significant elements about journalistic reportage of disasters were exposed. The first related to the vital role that the online social media played during the disaster for individuals, citizen reporters, journalists and emergency services organisations. Online social media offer reporters powerful new reporting tools for both gathering and disseminating news. The second related to the performance of journalists in covering events involving traumatic experiences. Journalists are often required to cover trauma and are often amongst the first-responders to disasters. This study found that almost all of the disaster survivors who were approached were willing to talk in detail about their traumatic experiences. A finding of this project is that journalists who interview trauma survivors can develop techniques for improving their ability to interview people who have experienced traumatic events. These include being flexible with interview timing and selecting a location; empowering interviewees to understand they don’t have to answer every question they are asked; providing emotional security for interviewees; and by being committed to accuracy. Survivors may exhibit posttraumatic stress symptoms but some exhibit and report posttraumatic growth. The willingness of a high proportion of the flood survivors to participate in the flood research made it possible to document a relatively unstudied question within the literature about journalism and trauma – when and why disaster survivors will want to speak to reporters. The study sheds light on the reasons why a group of traumatised people chose to speak about their experiences. Their reasons fell into six categories: lessons need to be learned from the disaster; a desire for the public to know what had happened; a sense of duty to make sure warning systems and disaster responses to be improved in future; personal recovery; the financial disinterest of reporters in listening to survivors; and the timing of the request for an interview. Feedback to the creative-practice component of this thesis - the book and radio documentary - shows that these issues are not purely matters of ethics. By following appropriate protocols, it is possible to produce stories that engender strong audience responses such as that the program was "amazing and deeply emotional" and "community storytelling at its most important". Participants reported that the experience of the interview process was "healing" and that the creative outcome resulted in "a very precious record of an afternoon of tragedy and triumph and the bitter-sweetness of survival".
Resumo:
The main theme of this thesis is to allow the users of cloud services to outsource their data without the need to trust the cloud provider. The method is based on combining existing proof-of-storage schemes with distance-bounding protocols. Specifically, cloud customers will be able to verify the confidentiality, integrity, availability, fairness (or mutual non-repudiation), data freshness, geographic assurance and replication of their stored data directly, without having to rely on the word of the cloud provider.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
This project explores yarning as a methodology for understanding health and wellness from an indigenous woman's perspective. Previous research exploring indigenous Australian women's perspectives have used traditional Western methodologies and have often been felt by the women themselves to be inappropriate and ineffective in gathering information and promoting discussion. This research arose from the indigenous women themselves, and resulted in the exploration of using yarning as a methodology. Yarning is a conversational process that involves the sharing of stories and the development of knowledge. It prioritizes indigenous ways of communicating, in that it is culturally prescribed, cooperative, and respectful. The authors identify different types of yarning that are relevant throughout their research, and explain two types of yarning—family yarning and cross-cultural yarning—which have not been previously identified in research literature. This project found that yarning as a research method is appropriate for community-based health research with indigenous Australian women. This may be an important finding for health professionals and researchers to consider when working and researching with indigenous women from other countries.