999 resultados para Extended Duamel Principle


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Extended Adolescent Injury Checklist (E-AIC), a self-report measure of injury based on the model of the Adolescent Injury Checklist (AIC), was developed for use in the evaluation of school-based interventions. The three stages of this development involved focus groups with adolescents and consultations with medical staff, pilot testing of the revised AIC in a high school context, and use of the finalised checklist in pre- and post-questionnaires to examine its utility. Results revealed that responses to the final version of the E-AIC were meaningful and remained consistent over time. The E-AIC appears to be a promising measure of adolescent injury that is simple, time-efficient and appropriate for use in the evaluation of school-based injury prevention programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Speeding in school zones is a problem in both Malaysia and Australia. While there are differences between the countries in terms of school zone treatments and more generally, these differences do not explain why people choose to speed in school zones. Because speeding is usually an intentional behaviour, the Theory of Planned Behaviour (TPB) has been used to understand speeding and develop interventions, however it has limitations which can be addressed by extending the model to incorporate other constructs. One promising construct is mindfulness, which can improve the explanatory value of the TPB by taking into account unintentional speeding attributable to a lack of focus on important elements of the driving environment. We explain what mindfulness is (and is not), how it can assist in providing a better understanding of speeding in school zones, and how it can contribute to the development of interventions. We then outline a program of research which has been commenced, investigating the contribution of mindfulness to an understanding of speed choice in school zones in two different settings (Australia and Malaysia) using the TPB.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Injury is the leading cause of death among adolescents, and in many countries, accounts for more deaths than all other causes combined. Rates of death due to injury also increase dramatically across adolescence. The Australian Institute of Health and Welfare reported that, in 2005, there were 954 deaths of young Australians due to injury, which is a rate of 26 deaths per 100,000 young people. Of these deaths, 4% were adolescents aged 12-14, 17% were aged 15-17, and 80% were aged 18-24 years. Issues addressed: Injuries are the leading cause of death among adolescents. The current research examined a measure of adolescent injury in terms of whether it encompasses the diverse injury experiences of Australian adolescents, including high-risk and normative adolescents, and thus determine its utility as a tool for health promotion research. Grade 9 students from two Brisbane high schools (n=202, aged 13-14 years) and adolescents recruited from the Emergency Department waiting rooms of four Brisbane hospitals (n=98, aged 16-18 years) completed the Extended Adolescent Injury Checklist (E-AIC). The most common cause of injury among adolescents was a sports activity, followed by fights for all participants except schoolbased males, who experienced more bicycle injuries. Alcohol use was most frequently reported in association with interpersonal violence injuries. A broad variety of injuries, occurring in context of multiple risk as well as normative behaviours, were reported by adolescents in both school and ED settings, and were captured by the E-AIC. Findings suggest that the E-AIC is a useful measure that captures the injury experiences of adolescents in different contexts. The high occurrence of injuries that do not result in formal medical treatment also indicates scope for interventions to be based around lessons in first aid, while also incorporating injury prevention components.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a novel approach for identifying risks in executable business processes and detecting them at run time. The approach considers risks in all phases of the business process management lifecycle, and is realized via a distributed, sensor-based architecture. At design-time, sensors are defined to specify risk conditions which when fulfilled, are a likely indicator of faults to occur. Both historical and current execution data can be used to compose such conditions. At run-time, each sensor independently notifies a sensor manager when a risk is detected. In turn, the sensor manager interacts with the monitoring component of a process automation suite to prompt the results to the user who may take remedial actions. The proposed architecture has been implemented in the YAWL system and its performance has been evaluated in practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article is a response to Professor Keown’s criticism of my paper “Finding a Way Through the Ethical and Legal Maze: Withdrawal of Medical Treatment and Euthanasia” (2005) 13 (3) Medical Law Review 357. The article takes up and responds to a number of criticisms raised by Keown in an attempt to further the debate concerning the moral and legal status of withdrawing life-sustaining measures, its distinction from euthanasia, and the implications of the lawfulness of withdrawal for the principle of the sanctity of life.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Chlamydia pneumoniae is a widespread pathogen causing upper and lower respiratory tract infections in addition to a range of other diseases in humans and animals. Previous whole genome analyses have focused on four essentially clonal (> 99% identity) C. pneumoniae human genomes (AR39, CWL029, J138 and TW183), providing relatively little insight into strain diversity and evolution of this species. Results We performed individual gene-by-gene comparisons of the recently sequenced C. pneumoniae koala genome and four C. pneumoniae human genomes to identify species-specific genes, and more importantly, to gain an insight into the genetic diversity and evolution of the species. We selected genes dispersed throughout the chromosome, representing genes that were specific to C. pneumoniae, genes with a demonstrated role in chlamydial biology and/or pathogenicity (n = 49), genes encoding nucleotide salvage or amino acid biosynthesis proteins (n = 6), and extrachromosomal elements (9 plasmid and 2 bacteriophage genes). Conclusions We have identified strain-specific differences and targets for detection of C. pneumoniae isolates from both human and animal origin. Such characterisation is necessary for an improved understanding of disease transmission and intervention.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Charity Law - 2nd edition addresses the modern law relating to this sector. Like the first edition, it comes at a time of public concern about the law regulating charitable activity. While concentrating on both legal and practitioner issues, this book also explores the modern concept of charity. It examines and explains the regulatory framework for charity and the need for transparency and public accountability. It gives you a complete understanding of the changes introduced by the Charities Act 2009, giving particular attention to the responsibilities of the new regulatory authority for charities, the importance of the role now statutorily allocated to the public benefit principle, and the significance of a new extended range of charitable purposes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Software forms an important part of the interface between citizens and their government. An increasing amount of government functions are being performed, controlled, or delivered electronically. This software, like all language, is never value-neutral, but must, to some extent, reflect the values of the coder and proprietor. The move that many governments are making towards e-governance, and the increasing reliance that is being placed upon software in government, necessitates a rethinking of the relationships of power and control that are embodied in software.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The concept of constructability integrates individual construction functions and experiences through suitable and timely inputs into early stages of project planning and design. It aims to ease construction processes for a more effective and efficient achievement of overall project objectives. Similarly, the concepts of operability and maintainability integrate the functions and experiences of Operation and Maintenance (O&M) into project planning and design. Various studies suggested that these concepts have been implemented in isolation of each other and thus preventing optimum result in delivering infrastructure projects. This paper explores the integration of these three concepts in order to maximize the benefits of their implementation. It reviews the literature to identify the main O&M concerns, and assesses their association with constructability principles. This provides a structure to develop an extended constructability model that includes O&M concerns. It is anticipated that an extended constructability model that include O&M considerations can lead to a more efficient and effective delivery of infrastructure projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An extended theory of planned behavior (TPB) was used to predict young people’s intentions to donate money to charities in the future. Students (N = 210; 18-24 years) completed a questionnaire assessing their attitude, subjective norm, perceived behavioral control [PBC], moral obligation, past behavior and intentions toward donating money. Regression analyses revealed the extended TPB explained 61% of the variance in intentions to donate money. Attitude, PBC, moral norm, and past behavior predicted intentions, representing future targets for charitable giving interventions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.