935 resultados para Health Security
Resumo:
Background: Traditional causal modeling of health interventions tends to be linear in nature and lacks multidisciplinarity. Consequently, strategies for exercise prescription in health maintenance are typically group based and focused on the role of a common optimal health status template toward which all individuals should aspire. ----- ----- Materials and methods: In this paper, we discuss inherent weaknesses of traditional methods and introduce an approach exercise training based on neurobiological system variability. The significance of neurobiological system variability in differential learning and training was highlighted.----- ----- Results: Our theoretical analysis revealed differential training as a method by which neurobiological system variability could be harnessed to facilitate health benefits of exercise training. It was observed that this approach emphasizes the importance of using individualized programs in rehabilitation and exercise, rather than group-based strategies to exercise prescription.----- ----- Conclusion: Research is needed on potential benefits of differential training as an approach to physical rehabilitation and exercise prescription that could counteract psychological and physical effects of disease and illness in subelite populations. For example, enhancing the complexity and variability of movement patterns in exercise prescription programs might alleviate effects of depression in nonathletic populations and physical effects of repetitive strain injuries experienced by athletes in elite and developing sport programs.
Resumo:
The perceived benefits of Wellness Education in University environments are substantiated by a number of studies in relation to the place, impact and purpose of Wellness curricula. Many authors recommend that Wellness curriculum design must include personal experiences, reflective practice and active self-managed learning approaches in order to legitimise the adoption of Wellness as a personal lifestyle approach. Wellness Education provides opportunities to engage in learning self-regulation skills both within and beyond the context of the Wellness construct. Learner success is optimised by creating authentic opportunities to develop and practice self regulation strategies that facilitate making meaning of life's experiences. Such opportunities include provision of options for self determined outcomes and are scaffolded according to learner needs; thus, configuring a learner-centred curriculum in Wellness Education would potentially benefit by overlaying principles from the domains of Self Determination Theory, Self Regulated Learning and Transformative Education Theory to highlight authentic, transformative learning as a lifelong approach to Wellness.
Resumo:
Background Exercise for Health was a pragmatic, randomised, controlled trial comparing the effect of an eight-month exercise intervention on function, treatment-related side effects and quality of life following breast cancer, compared with usual care. The intervention commenced six weeks post-surgery, and two modes of delivering the same intervention was compared with usual care. The purpose of this paper is to describe the study design, along with outcomes related to recruitment, retention and representativeness, and intervention participation. Methods: Women newly diagnosed with breast cancer and residing in a major metropolitan city of Queensland, Australia, were eligible to participate. Consenting women were randomised to a face-to-face-delivered exercise group (FtF, n=67), telephone-delivered exercise group (Tel, n=67) or usual care group (UC, n=60) and were assessed pre-intervention (5-weeks post-surgery), mid-intervention (6 months post-surgery) and 10 weeks post-intervention (12 months post-surgery). Each intervention arm entailed 16 sessions with an Exercise Physiologist. Results: Of 318 potentially eligible women, 63% (n=200) agreed to participate, with a 12-month retention rate of 93%. Participants were similar to the Queensland breast cancer population with respect to disease characteristics, and the randomisation procedure was mostly successful at attaining group balance, with the few minor imbalances observed unlikely to influence intervention effects given balance in other related characteristics. Median participation was 14 (min, max: 0, 16) and 13 (min, max: 3, 16) intervention sessions for the FtF and Tel, respectively, with 68% of those in Tel and 82% in FtF participating in at least 75% of sessions. Discussion: Participation in both intervention arms during and following treatment for breast cancer was feasible and acceptable to women. Future work, designed to inform translation into practice, will evaluate the quality of life, clinical, psychosocial and behavioural outcomes associated with each mode of delivery.
Resumo:
Short overview of the VACCHO Social Determinants Research Forum (2010).
Resumo:
We present a hierarchical model for assessing an object-oriented program's security. Security is quantified using structural properties of the program code to identify the ways in which `classified' data values may be transferred between objects. The model begins with a set of low-level security metrics based on traditional design characteristics of object-oriented classes, such as data encapsulation, cohesion and coupling. These metrics are then used to characterise higher-level properties concerning the overall readability and writability of classified data throughout the program. In turn, these metrics are then mapped to well-known security design principles such as `assigning the least privilege' and `reducing the size of the attack surface'. Finally, the entire program's security is summarised as a single security index value. These metrics allow different versions of the same program, or different programs intended to perform the same task, to be compared for their relative security at a number of different abstraction levels. The model is validated via an experiment involving five open source Java programs, using a static analysis tool we have developed to automatically extract the security metrics from compiled Java bytecode.
Resumo:
The ability to accurately predict the remaining useful life of machine components is critical for machine continuous operation and can also improve productivity and enhance system’s safety. In condition-based maintenance (CBM), maintenance is performed based on information collected through condition monitoring and assessment of the machine health. Effective diagnostics and prognostics are important aspects of CBM for maintenance engineers to schedule a repair and to acquire replacement components before the components actually fail. Although a variety of prognostic methodologies have been reported recently, their application in industry is still relatively new and mostly focused on the prediction of specific component degradations. Furthermore, they required significant and sufficient number of fault indicators to accurately prognose the component faults. Hence, sufficient usage of health indicators in prognostics for the effective interpretation of machine degradation process is still required. Major challenges for accurate longterm prediction of remaining useful life (RUL) still remain to be addressed. Therefore, continuous development and improvement of a machine health management system and accurate long-term prediction of machine remnant life is required in real industry application. This thesis presents an integrated diagnostics and prognostics framework based on health state probability estimation for accurate and long-term prediction of machine remnant life. In the proposed model, prior empirical (historical) knowledge is embedded in the integrated diagnostics and prognostics system for classification of impending faults in machine system and accurate probability estimation of discrete degradation stages (health states). The methodology assumes that machine degradation consists of a series of degraded states (health states) which effectively represent the dynamic and stochastic process of machine failure. The estimation of discrete health state probability for the prediction of machine remnant life is performed using the ability of classification algorithms. To employ the appropriate classifier for health state probability estimation in the proposed model, comparative intelligent diagnostic tests were conducted using five different classifiers applied to the progressive fault data of three different faults in a high pressure liquefied natural gas (HP-LNG) pump. As a result of this comparison study, SVMs were employed in heath state probability estimation for the prediction of machine failure in this research. The proposed prognostic methodology has been successfully tested and validated using a number of case studies from simulation tests to real industry applications. The results from two actual failure case studies using simulations and experiments indicate that accurate estimation of health states is achievable and the proposed method provides accurate long-term prediction of machine remnant life. In addition, the results of experimental tests show that the proposed model has the capability of providing early warning of abnormal machine operating conditions by identifying the transitional states of machine fault conditions. Finally, the proposed prognostic model is validated through two industrial case studies. The optimal number of health states which can minimise the model training error without significant decrease of prediction accuracy was also examined through several health states of bearing failure. The results were very encouraging and show that the proposed prognostic model based on health state probability estimation has the potential to be used as a generic and scalable asset health estimation tool in industrial machinery.
Resumo:
This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
Obestatin is a 23 amino acid, ghrelin gene-derived peptide hormone produced in the stomach and a range of other tissues throughout the body. While it was initially reported that obestatin opposed the actions of ghrelin with regards to appetite and food intake, it is now clear that obestatin is not an endogenous ghrelin antagonist of ghrelin, but it is a multi-functional peptide hormone in its own right. In this review we will discuss the controversies associated with the discovery of obestatin and explore emerging central and peripheral roles of obestatin, roles in adipogenesis, pancreatic homeostasis and cancer.
Resumo:
Health information sharing has become a vital part of modern healthcare delivery. E-health technologies provide efficient and effective ways of sharing medical information, but give rise to issues that neither the medical professional nor the consumers have control over. Information security and patient privacy are key impediments that hinder sharing information as sensitive as health information. Health information interoperability is another issue which hinders the adoption of available e health technologies. In this paper we propose a solution for these problems in terms of information accountability, the HL7 interoperability standard and social networks for manipulating personal health records.
Resumo:
Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP(One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses : 1) traceability based on the leakage of counter information, 2) vulnerability to an impersonation attack by maliciously updating a random number, and 3) traceability based on a physically-attacked tag. Finally, a security enhanced group-based authentication protocol is presented.
Resumo:
This paper presents a regional commentary (hereafter ‘the commentary’) on the three Australian projects of the Teasdale-Corti Global Health Research Partnership Program. The three Australian projects are: Victorian Aboriginal Health Service Ltd (VAHS), Melbourne, Victoria—Forty Years of Comprehensive Primary Health Care; Central Australian Aboriginal Congress Inc. (Congress), Alice Springs, Northern Territory—Ingkintja, Male Health Program; and Urapuntja Health Service (UHS), Utopia, Northern Territory—Outstation Health Care. It highlights common themes and lessons in respect to the Revitalising Health for All project in the context of Aboriginal and Torres Strait Islander health in Australia.
Resumo:
The effectiveness of ‘the lockout policy’ integrated within a broader police enforcement strategy to reduce alcohol-related harm, in and around late-night licensed premises, in major drinking precincts was examined. First response operational police (n= 280) recorded all alcohol and non alcohol-related incidents they attended in and around late-night liquor trading premises. A before and after study design was used, with police completing modified activity logs prior to and following the introduction of the lockout policy in two policing regions: Gold Coast (n = 12,801 incidents); Brisbane City/Fortitude Valley (n = 9,117 incidents). Qualitative information from key stakeholders (e.g., Police, Security Staff & Politicians n = 20) was also obtained. The number of alcohol-related offences requiring police attention was significantly reduced in some policing areas and for some types of offences (e.g., sex offences, street disturbances, traffic incidents. However, there was no variation for a number of other offence categories (e.g., assault). Interviews with licensees revealed that although all were initially opposed to the lockout policy, most perceived benefits from its introduction. This study was the first of its kind to comprehensively examine the impact of a lockout policy and provides supportive evidence for the effectiveness of the lockout policy as integrating positively with police enforcement to enhance public safety in some areas in and around late-night liquor trading premises.