946 resultados para Mutual security program, 1951-
Resumo:
Introduction: The delivery of health care in the 21st century will look like no other in the past. The fast paced technological advances that are being made will need to transition from the information age into clinical practice. The phenomenon of e-Health is the over-arching form of information technology and telehealth is one arm of that phenomenon. The uptake of telehealth both in Australia and overseas, has changed the face of health service delivery to many rural and remote communities for the better, removing what is known as the tyranny of distance. Many studies have evaluated the satisfaction and cost-benefit analysis of telehealth across the organisational aspects as well as the various adaptations of clinical pathways and this is the predominant focus of most studies published to date. However, whilst comments have been made by many researchers about the need to improve and attend to the communication and relationship building aspects of telehealth no studies have examined this further. The aim of this study was to identify the patient and clinician experiences, concerns, behaviours and perceptions of the telehealth interaction and develop a training tool to assist these clinicians to improve their interaction skills. Methods: A mixed methods design combining quantitative (survey analysis and data coding) and qualitative (interview analysis) approaches was adopted. This study utilised four phases to firstly qualitatively explore the needs of clients (patients) and clinicians within a telehealth consultation then designed, developed, piloted and quantitatively and qualitatively evaluated the telehealth communication training program. Qualitative data was collected and analysed during Phase 1 of this study to describe and define the missing 'communication and rapport building' aspects within telehealth. This data was then utilised to develop a self-paced communication training program that enhanced clinicians existing skills, which comprised of Phase 2 of this study to develop the interactive program. Phase 3 included evaluating the training program with 26 clinicians and results were recorded pre and post training, whilst phase 4 was the pilot for future recommendations of this training program using a patient group within a Queensland Health setting at two rural hospitals. Results: Comparisons of pre and post training data on 1) Effective communication styles, 2) Involvement in communication training package, 3) satisfaction pre and post training, and 4) health outcomes pre and post training indicated that there were differences between pre and post training in relation to effective communication style, increased satisfaction and no difference in health outcomes between pre and post training for this patient group. The post training results revealed over half of the participants (N= 17, 65%) were more responsive to non-verbal cues and were better able to reflect and respond to looks of anxiousness and confusion from a 'patient' within a telehealth consultation. It was also found that during post training evaluations, clinicians had enhanced their therapeutic communication with greater detail to their own body postures, eye contact and presentation. There was greater time spent looking at the 'patient' with an increase of 35 second intervals of direct eye contact and less time spent looking down at paperwork which decreased by 20 seconds. Overall 73% of the clinicians were satisfied with the training program and 61% strongly agreed that they recognised areas of their communication that needed improving during a telehealth consultation. For the patient group there was significant difference post training in rapport with a mean score from 42 (SD = 28, n = 27) to 48 (SD = 5.9, n = 24). For communication comfort of the patient group there was a significant difference between the pre and post training scores t(10) = 27.9, p = .002, which meant that overall the patients felt less inhibited whilst talking to the clinicians and more understood. Conclusion: The aim of this study was to explore the characteristics of good patient-clinician communication and unmet training needs for telehealth consultations. The study developed a training program that was specific for telehealth consultations and not dependent on a 'trainer' to deliver the content. In light of the existing literature this is a first of its kind and a valuable contribution to the research on this topic. It was found that the training program was effective in improving the clinician's communication style and increased the satisfaction of patient's within an e-health environment. This study has identified some historical myths that telehealth cannot be part of empathic patient centred care due to its technology tag.
Resumo:
Background Farm men and women in Australia have higher levels of problematic alcohol use than their urban counterparts and experience elevated health risks associated with excessive alcohol consumption. The Sustainable Farm Families (SFF) program has worked successfully with farm men and women to address health, well- being and safety and has identified that further research and training is required to understand and address alcohol misuse behaviours. This project will add an innovative component to the program by training health professionals working with farm men and women to discuss and respond to alcohol-related physical and mental health problems. Methods/Design A mixed method design with multi-level evaluation will be implemented following the development and delivery of a training program (The Alcohol Intervention Training Program {AITP}) for Sustainable Farm Families health professionals. Pre-, post- and follow-up surveys will be used to assess both the impact of the training on the knowledge, confidence and skills of the health professionals to work with alcohol misuse and associated problems, and the impact of the training on the attitudes, behaviour and mental health of farm men and women who participate in the SFF project. Evaluations will take a range of forms including self-rated outcome measures and interviews. Discussion The success of this project will enhance the health and well-being of a critical population, the farm men and women of Australia, by producing an evidence-based strategy to assist them to adopt more positive alcohol-related behaviours that will lead to better physical and mental health.
Resumo:
The purpose of the current study was to develop a measurement of information security culture in developing countries such as Saudi Arabia. In order to achieve this goal, the study commenced with a comprehensive review of the literature, the outcome being the development of a conceptual model as a reference base. The literature review revealed a lack of academic and professional research into information security culture in developing countries and more specifically in Saudi Arabia. Given the increasing importance and significant investment developing countries are making in information technology, there is a clear need to investigate information security culture from developing countries perspective such as Saudi Arabia. Furthermore, our analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. Our research aims to fill this gap by developing and validating a measurement model of information security culture, as well as developing initial understanding of factors that influence security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. In the qualitative phase, eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness, security compliance and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, policy maintenance, training and ethical conduct policies. These factors were confirmed by the literature review as being critical and important for the creation of security culture and formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model through Exploratory Factor Analysis (EFA), followed by Confirmatory Factor Analysis (CFA.) In addition, using Structural Equation Modelling (SEM) we were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture. The current study contributes to the existing body of knowledge in two major ways: firstly, it develops an information security culture measurement model; secondly, it presents empirical evidence for the nomological validity for the security culture measurement model and discovery of factors that influence information security culture. The current study also indicates possible future related research needs.
Resumo:
Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.
Resumo:
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of NLFSR ciphers is that their security is still not well investigated. The paper makes a progress in the study of the security of NLFSR ciphers. In particular, we show a distinguishing attack on linearly filtered NLFSR (or LF-NLFSR) ciphers. We extend the attack to a linear combination of LF-NLFSRs. We investigate the security of a modified version of the Grain stream cipher and show its vulnerability to both key recovery and distinguishing attacks.
Resumo:
Brief dementia education training programs appear to be effective in improving knowledge about dementia and self-confidence in interacting with patients with dementia. It is recommended that brief dementia training sessions be provided on a regular, on-going basis, particularly in view of frequent staff changes in the acute hospital environment.
Resumo:
Drawing on data from the Australian Business Assessment of Computer User Security (ABACUS) survey, this paper examines a range of factors that may influence businesses’ likelihood of being victimised by a computer security incident. It has been suggested that factors including business size, industry sector, level of outsourcing, expenditure on computer security functions and types of computer security tools and/or policies used may influence the probability of particular businesses experiencing such incidents. This paper uses probability modelling to test whether this is the case for the 4,000 businesses that responded to the ABACUS survey. It was found that the industry sector that a business belonged to, and business expenditure on computer security, were not related to businesses’ likelihood of detecting computer security incidents. Instead, the number of employees that a business has and whether computer security functions were outsourced were found to be key indicators of businesses’ likelihood of detecting incidents. Some of the implications of these findings are considered in this paper.
Resumo:
The Pink Women's Wellness Program Journal is a Queensland University of Technology (School of Nursing and Midwifery) initiative supported by IHBI, The Kim Walters Choices Program, Cancer Council Queensland and HOCA. The 12-week program provides participants recovering from acute breast cancer treatment a comprehensive set of information and tools designed to help get their lives back on track. Through the adoption of positive lifestyle habits, the focus of the program is the management of key side effects such as menopausal symptoms, increased risk of osteoporosis, heart disease and type 2 diabetes. This website brings a successful pilot program to an online medium, offering participants many advantages over the existing print journal. Some of the key services offered by the website version are: - Easy to use data capture tools to track exercise, BMI, nutrition and menopausal symptoms. - Real-time graphs illustrating participants' progress day by day and week by week. - The opportunity for participants to interact through simple social media tools. - Program related reminders, notifications and motivational messages.
Resumo:
The purpose of this investigation is to present an overview of roadside drug driving enforcement and detections in Queensland, Australia since the introduction of oral fluid screening. Drug driving is a problematic issue for road safety and investigations of the prevalence and impact of drug driving suggest that, in particular, the use of illicit drugs may increase a driver’s involvement in a road crash when compared to a driver who is drug free. In response to the potential increased crash involvement of drug impaired drivers, Australian police agencies have adopted the use of oral fluid analysis to detect the presence of illicit drugs in drivers. This paper describes the results of roadside drug testing for over 80,000 drivers in Queensland, Australia, from December 2007 to June 2012. It provides unique data on the prevalence of methamphetamine, cannabis and ecstasy in the screened population for the period. When prevalence rates are examined over time, drug driving detection rates have almost doubled from around 2.0% at the introduction of roadside testing operations to just under 4.0% in the latter years. The most common drug type detected was methamphetamine (40.8%) followed by cannabis (29.8%) and methamphetamine/cannabis combination (22.5%). By comparison, the rate of ecstasy detection was very low (1.7%). The data revealed a number of regional, age and gender patterns and variations of drug driving across the state. Younger drivers were more likely to test positive for cannabis whilst older drivers were more likely to test positive for methamphetamine. The overall characteristics of drivers who tested positive to the presence of at least one of the target illicit drugs are they are likely to be male, aged 30-39 years, be driving a car on Friday, Saturday or Sunday between 6:00PM and 6:00AM and to test positive for methamphetamine.
Resumo:
The QUT Sessional Academic Program (SAP) has scaffolded levels, each with experience-appropriate objectives: • SAP 1: Introduction to Learning and Teaching aims to develop confidence and build awareness of pedagogy and managing class-room scenarios. • SAP 2: Learning and Teaching in Large Units focuses on aligning curriculum and assessment through learning activities and builds a community of teaching practice with sessionals and subject coordinators. • SAP 3: Developing your Teaching Practice focuses on whole of university and classroom strategies to ensure student success through effective feedback; reflective practice and learning communities. • SAP 4: Enhancing your Teaching Practice applies these factors to teaching success. In conjunction with: • Sessional Career Advancement Development: for Higher Degree Research students/ sessional staff who aspire to become academics provides guidance on developing an academic portfolio in teaching, research and service. And • Sessional Academic Success program providing ongoing, local support (see separate nomination). A critical factor in its success is its praxis approach. Theoretical principles are modelled. Eg, ‘active learning’ is explained and modelled through learning activities, which participants evaluate ‘on the fly’ against the criteria of learning, engagement and connection with peers. The topics ‘learning communities’ and ‘reflective practice’ are explored as a learning community–then applied in participants’ classes, with reflections shared in the next session. This produces a ‘meta-awareness’ of theory and principles, as they are explained, applied in practice, and critically analysed for their effectiveness in workshops.
Resumo:
OBJECTIVE: To assess the long term effect of a nutrition program in a remote Aboriginal community (Minjilang). DESIGN: Evaluation of nutritional outcomes over the three years before and the three years after a health and nutrition program that ran from June 1989 to June 1990. Turnover of food items at the community store was used as a measure of dietary intake at Minjilang and a comparison community. SETTING: A community of about 150 Aboriginal people live at Minjilang on Croker Island, 240 km north-east of Darwin. A similar community of about 300 people on another island was used as the comparison. RESULTS: The program produced lasting improvements in dietary intake of most target foods (including fruit, vegetables and wholegrain bread) and nutrients (including folate, ascorbic acid and thiamine). Sugar intake fell in both communities before the program, but the additional decrease in sugar consumption during the program at Minjilang "rebounded" in the next year. Dietary improvements in the comparison community were delayed and smaller than at Minjilang. CONCLUSIONS: The success of the program at Minjilang was linked to an ongoing process of social change, which in turn provided a stimulus for dietary improvement in the comparison community. When Aboriginal people themselves control and maintain ownership of community-based intervention programs, nutritional improvements can be initiated and sustained.
Resumo:
Objectives PEPA is funded by the Department of Health and Ageing and aims to further improve the skill and confidence of the generalist workforce to work with people with palliative care needs. Recent quality improvement initiatives to promote transfer of learning into practice include appointment of a clinical educator, implementation of an online module for mentors and delivery of a mentoring workshop (collaborating with NSAP and PCC4U). This paper presents an overview of outcomes from these quality improvement initiatives. Methods PEPA host sites are selected based on their specialist palliative care level. Host site managers are surveyed six-monthly and participants are surveyed pre and three months post-placement to collect open and fixed response data on their experience of the program. Participants in the mentoring workshop (n=39) were asked to respond to a survey regarding the workshop outcomes. Results The percentage of placement participants who strongly agreed they ‘have the ability to implement the interventions required for people who have a life-limiting illness’ increased from 35% in 2011 (n=34) to 51% in 2012 (n=91) post-placement. Responses from mentor workshop participants indicated that 76% of respondents (n=25) agreed that they were able to identify principles for mentoring in the context of palliative care. In 2012, 61% of host site managers (n=54) strongly agreed that PEPA supports clinician working with people with a life-limiting illness. Conclusion Strategies to build the capabilities of palliative care professionals to mentor and support the learning experience of PEPA participants are critical to ongoing improvements of the program.
Resumo:
For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.