912 resultados para other-regarding preferences
Resumo:
General risky behaviour is explored for correlation with risky driving behaviour in light of two theories, self-control and cross-situational consistency. Identification of general risky behaviours associated with risky driving behaviour, and the theory that best predicts the behaviours, will enable better targeting of intervention and education strategies to reduce driving related fatalities and injuries. A correlational study using participants (N=152) drawn from first year university undergraduates and the public surveyed their lifestyle and behaviours. Relationships were found between risky driving behaviours and other risky behaviours such as alcohol consumption, cannabis use and performing unlawful activities. No significant differences were found between genders, with the exception that males were more likely to believe that they were at risk of injury from their employment, χ2 (1, N = 152) = 4.49, p = .03, were more likely to have performed an unlawful offence, χ2 (1, N = 152) = 11.77, p = .001 and were more likely to drink drive, t (55.41) = -3.87, p < .001, mean difference = -0.63, CI 95% (-0.9, -0.37). People engaged in risky driving behaviours were more likely to engage in other risky behaviours. The theories that were explored were unable to accurately predict an association between general risky behaviour and driving without a license or when disqualified. Cross-situational consistency explained 20% (R2adj = .16) of the variance in which people engaged in risky driving with low self-control theory explaining an additional 0.3% variance (R2change = .003), F (8,143) = 6.92, p < .001. Driving while under the influence of alcohol could be predicted by risky behaviours in lifestyle, health, smoking, cannabis use and alcohol consumption, F (8,143) = 6.92, p < .001. The addition of self-control was not significant.
Resumo:
Speeding represents a major contributor to road trauma, increasing crash frequency and severity. Antispeeding campaigns represent a key strategy aimed at discouraging individuals from speeding. This paper investigated salient beliefs underpinning male and female drivers’ travel speed behaviour, with the view to use such insight to, ultimately, inform the content of targeted anti-speeding messages. A survey of N = 751 (579 males, 16-79 years) drivers assessed what they regarded as speeding in 60km/hr and 100km/hr zones and their beliefs about how they would respond to receiving a speeding infringement. Participants responded to scales which extended up to 20km/hr above each respective speed limit, the lowest speed that they considered was speeding and the speed at which they would be willing to drive and still feel in control. For analyses, to enable greater scrutiny of potential gender differences regarding the speeds identified, participants’ responses to these items were categorised into 5km/hr increments and chi-square analyses conducted. For their responses to (beliefs about) the possibility of being caught speeding, drivers were asked how applicable various beliefs were to them (e.g., feeling unlucky). These beliefs were analysed via MANOVA. The results revealed that there was considerable variability in the speeds identified, thus supporting the value of categorising speeds. Within the 100km/hr zone, based on the categories, a significant difference was found regarding the speed that males would be willing to drive (and still feel in control) relative to females. Specifically, the greatest proportion of males (30.4%) identified speeds within the 106-110km/hr category whereas the greatest proportion of females (38.1%) identified a lower speed, within the 101-105km/hr category, as the speed they would be willing to drive. No other significant differences emerged, however, either in relation to the definition of speeding reported for 100km/hr zones (i.e., males and females tended to identify a similar speed as indicative of speeding) nor for these same items as assessed in relation to the 60km/hr zones. For their responses to the possibility of being caught, males were significantly more likely than females to report that, if caught, a likely response they would have would be to think that they had still been driving safely. In contrast, females were significantly more likely than males to report thinking that their speeding had been unsafe and that they should not have been speeding. Females were also significantly more likely to report feeling embarrassed to tell important others about having received a speeding infringement than males. The findings are discussed in terms of their implications for developing well-targeted advertising messages aimed at discouraging drivers’ from speeding.
Resumo:
Every day inboxes are being flooded with invitations to invest money in overseas schemes, notifications of overseas lottery wins and inheritances, as well as emails from banks and other institutions asking for customers to confirm information about their identity and account details. While these requests may seem outrageous, many believe the request to be true and respond, through the sending of money or personal details. This can have devastating consequences, financially, emotionally and physically. While enforcement action is important, greater success is likely to come in the area of prevention, which avoids victim losses in the first place. Considerable victim support is also required by victims who have suffered significant losses, in trying to get their lives back on track. This project examined fraud prevention strategies and support services for victims of online fraud across the United Kingdom, United States of America and Canada. While much work has already been undertaken in Queensland, there is considerable room for improvement and a great deal can be learnt from these overseas jurisdictions. There are several examples of innovative and effective responses, particularly in the area of victim support, that are highlighted throughout this report. It is advocated that Australia can continue to improve its position regarding the prevention and support of online fraud victims, by applying the knowledge and expertise learnt overseas to a local context.
Resumo:
Bananas are one of the world�fs most important crops, serving as a staple food and an important source of income for millions of people in the subtropics. Pests and diseases are a major constraint to banana production. To prevent the spread of pests and disease, farmers are encouraged to use disease�] and insect�]free planting material obtained by micropropagation. This option, however, does not always exclude viruses and concern remains on the quality of planting material. Therefore, there is a demand for effective and reliable virus indexing procedures for tissue culture (TC) material. Reliable diagnostic tests are currently available for all of the economically important viruses of bananas with the exception of Banana streak viruses (BSV, Caulimoviridae, Badnavirus). Development of a reliable diagnostic test for BSV is complicated by the significant serological and genetic variation reported for BSV isolates, and the presence of endogenous BSV (eBSV). Current PCR�] and serological�]based diagnostic methods for BSV may not detect all species of BSV, and PCR�]based methods may give false positives because of the presence of eBSV. Rolling circle amplification (RCA) has been reported as a technique to detect BSV which can also discriminate between episomal and endogenous BSV sequences. However, the method is too expensive for large scale screening of samples in developing countries, and little information is available regarding its sensitivity. Therefore the development of reliable PCR�]based assays is still considered the most appropriate option for large scale screening of banana plants for BSV. This MSc project aimed to refine and optimise the protocols for BSV detection, with a particular focus on developing reliable PCR�]based diagnostics Initially, the appropriateness and reliability of PCR and RCA as diagnostic tests for BSV detection were assessed by testing 45 field samples of banana collected from nine districts in the Eastern region of Uganda in February 2010. This research was also aimed at investigating the diversity of BSV in eastern Uganda, identifying the BSV species present and characterising any new BSV species. Out of the 45 samples tested, 38 and 40 samples were considered positive by PCR and RCA, respectively. Six different species of BSV, namely Banana streak IM virus (BSIMV), Banana streak MY virus (BSMYV), Banana streak OL virus (BSOLV), Banana streak UA virus (BSUAV), Banana streak UL virus (BSULV), Banana streak UM virus (BSUMV), were detected by PCR and confirmed by RCA and sequencing. No new species were detected, but this was the first report of BSMYV in Uganda. Although RCA was demonstrated to be suitable for broad�]range detection of BSV, it proved time�]consuming and laborious for identification in field samples. Due to the disadvantages associated with RCA, attempts were made to develop a reliable PCR�]based assay for the specific detection of episomal BSOLV, Banana streak GF virus (BSGFV), BSMYV and BSIMV. For BSOLV and BSGFV, the integrated sequences exist in rearranged, repeated and partially inverted portions at their site of integration. Therefore, for these two viruses, primers sets were designed by mapping previously published sequences of their endogenous counterparts onto published sequences of the episomal genomes. For BSOLV, two primer sets were designed while, for BSGFV, a single primer set was designed. The episomalspecificity of these primer sets was assessed by testing 106 plant samples collected during surveys in Kenya and Uganda, and 33 leaf samples from a wide range of banana cultivars maintained in TC at the Maroochy Research Station of the Department of Employment, Economic Development and Innovation (DEEDI), Queensland. All of these samples had previously been tested for episomal BSV by RCA and for both BSOLV and BSGFV by PCR using published primer sets. The outcome from these analyses was that the newly designed primer sets for BSOLV and BSGFV were able to distinguish between episomal BSV and eBSV in most cultivars with some B�]genome component. In some samples, however, amplification was observed using the putative episomal�]specific primer sets where episomal BSV was not identified using RCA. This may reflect a difference in the sensitivity of PCR compared to RCA, or possibly the presence of an eBSV sequence of different conformation. Since the sequences of the respective eBSV for BSMYV and BSIMV in the M. balbisiana genome are not available, a series of random primer combinations were tested in an attempt to find potential episomal�]specific primer sets for BSMYV and BSIMV. Of an initial 20 primer combinations screened for BSMYV detection on a small number of control samples, 11 primers sets appeared to be episomal�]specific. However, subsequent testing of two of these primer combinations on a larger number of control samples resulted in some inconsistent results which will require further investigation. Testing of the 25 primer combinations for episomal�]specific detection of BSIMV on a number of control samples showed that none were able to discriminate between episomal and endogenous BSIMV. The final component of this research project was the development of an infectious clone of a BSV endemic in Australia, namely BSMYV. This was considered important to enable the generation of large amounts of diseased plant material needed for further research. A terminally redundant fragment (.1.3 �~ BSMYV genome) was cloned and transformed into Agrobacterium tumefaciens strain AGL1, and used to inoculate 12 healthy banana plants of the cultivars Cavendish (Williams) by three different methods. At 12 weeks post�]inoculation, (i) four of the five banana plants inoculated by corm injection showed characteristic BSV symptoms while the remaining plant was wilting/dying, (ii) three of the five banana plants inoculated by needle�]pricking of the stem showed BSV symptoms, one plant was symptomless while the remaining had died and (iii) both banana plants inoculated by leaf infiltration were symptomless. When banana leaf samples were tested for BSMYV by PCR and RCA, BSMYV was confirmed in all banana plants showing symptoms including those were wilting and/or dying. The results from this research have provided several avenues for further research. By completely sequencing all variants of eBSOLV and eBSGFV and fully sequencing the eBSIMV and eBSMYV regions, episomal BSV�]specific primer sets for all eBSVs could potentially be designed that could avoid all integrants of that particular BSV species. Furthermore, the development of an infectious BSV clone will enable large numbers of BSVinfected plants to be generated for the further testing of the sensitivity of RCA compared to other more established assays such as PCR. The development of infectious clones also opens the possibility for virus induced gene silencing studies in banana.
Resumo:
Proving security of cryptographic schemes, which normally are short algorithms, has been known to be time-consuming and easy to get wrong. Using computers to analyse their security can help to solve the problem. This thesis focuses on methods of using computers to verify security of such schemes in cryptographic models. The contributions of this thesis to automated security proofs of cryptographic schemes can be divided into two groups: indirect and direct techniques. Regarding indirect ones, we propose a technique to verify the security of public-key-based key exchange protocols. Security of such protocols has been able to be proved automatically using an existing tool, but in a noncryptographic model. We show that under some conditions, security in that non-cryptographic model implies security in a common cryptographic one, the Bellare-Rogaway model [11]. The implication enables one to use that existing tool, which was designed to work with a different type of model, in order to achieve security proofs of public-key-based key exchange protocols in a cryptographic model. For direct techniques, we have two contributions. The first is a tool to verify Diffie-Hellmanbased key exchange protocols. In that work, we design a simple programming language for specifying Diffie-Hellman-based key exchange algorithms. The language has a semantics based on a cryptographic model, the Bellare-Rogaway model [11]. From the semantics, we build a Hoare-style logic which allows us to reason about the security of a key exchange algorithm, specified as a pair of initiator and responder programs. The other contribution to the direct technique line is on automated proofs for computational indistinguishability. Unlike the two other contributions, this one does not treat a fixed class of protocols. We construct a generic formalism which allows one to model the security problem of a variety of classes of cryptographic schemes as the indistinguishability between two pieces of information. We also design and implement an algorithm for solving indistinguishability problems. Compared to the two other works, this one covers significantly more types of schemes, but consequently, it can verify only weaker forms of security.
Resumo:
This submission addresses the Youth Justice (Boot Camp Orders) and Other Legislation Amendment Bill 2012 which has as its objectives (1) the introduction of a Boot Camp Order as an option instead of detention for young offenders and (2) the removal of the option of court referred youth justice conferencing for young offenders. As members of the QUT Faculty of Law Centre for Crime and Justice we welcome the invitation to participate in the discussion of these issues which are critically important to the Queensland community at large but especially to our young people.
Resumo:
Background: Women who birth in private facilities in Australia are more likely to have a caesarean birth than women who birth in public facilities and these differences remain after accounting for sector differences in the demographic and health risk profiles of women. However, the extent to which women’s preferences and/or freedom to choose their mode of birth further account for differences in the likelihood of caesarean birth between the sectors remains untested. Method: Women who birthed in Queensland, Australia during a two-week period in 2009 were mailed a self-report survey approximately three months after birth. Seven hundred and fifty-seven women provided cross-sectional retrospective data on where they birthed (public or private facility), mode of birth (vaginal or caesarean) and risk factors, along with their preferences and freedom to choose their mode of birth. A hierarchical logistic regression was conducted to determine the extent to which maternal risk and freedom to choose one’s mode of birth explain sector differences in the likelihood of having a caesarean birth. Findings: While there was no sector difference in women’s preference for mode of birth, women who birthed in private facilities had higher odds of feeling able to choose either a vaginal or caesarean birth, and feeling able to choose only a caesarean birth. Women had higher odds of having caesarean birth if they birthed in private facilities, even after accounting for significant risk factors such as age, body mass index, previous caesarean and use of assisted reproductive technology. However, there was no association between place of birth and odds of having a caesarean birth after also accounting for freedom to choose one’s mode of birth. Conclusions: These findings call into question suggestions that the higher caesarean birth rate in the private sector in Australia is attributable to increased levels of obstetric risk among women birthing in the private sector or maternal preferences alone. Instead, the determinants of sector differences in the likelihood of caesarean births are complex and are linked to differences in the perceived choices for mode of birth between women birthing in the private and public systems.
Resumo:
Background. Recent reports have indicated that single-stranded DNA (ssDNA) viruses in the taxonomic families Geminiviridae, Parvoviridae and Anellovirus may be evolving at rates of ∼10-4 substitutions per site per year (subs/site/year). These evolution rates are similar to those of RNA viruses and are surprisingly high given that ssDNA virus replication involves host DNA polymerases with fidelities approximately 10 000 times greater than those of error-prone viral RNA polymerases. Although high ssDNA virus evolution rates were first suggested in evolution experiments involving the geminivirus maize streak virus (MSV), the evolution rate of this virus has never been accurately measured. Also, questions regarding both the mechanistic basis and adaptive value of high geminivirus mutation rates remain unanswered. Results. We determined the short-term evolution rate of MSV using full genome analysis of virus populations initiated from cloned genomes. Three wild type viruses and three defective artificial chimaeric viruses were maintained in planta for up to five years and displayed evolution rates of between 7.4 × 10-4 and 7.9 × 10-4 subs/site/year. Conclusion. These MSV evolution rates are within the ranges observed for other ssDNA viruses and RNA viruses. Although no obvious evidence of positive selection was detected, the uneven distribution of mutations within the defective virus genomes suggests that some of the changes may have been adaptive. We also observed inter-strand nucleotide substitution imbalances that are consistent with a recent proposal that high mutation rates in geminiviruses (and possibly ssDNA viruses in general) may be due to mutagenic processes acting specifically on ssDNA molecules. © 2008 Walt et al; licensee BioMed Central Ltd.
Resumo:
Background. We have characterised a new highly divergent geminivirus species, Eragrostis curvula streak virus (ECSV), found infecting a hardy perennial South African wild grass. ECSV represents a new genus-level geminivirus lineage, and has a mixture of features normally associated with other specific geminivirus genera. Results. Whereas the ECSV genome is predicted to express a replication associated protein (Rep) from an unspliced complementary strand transcript that is most similar to those of begomoviruses, curtoviruses and topocuviruses, its Rep also contains what is apparently a canonical retinoblastoma related protein interaction motif such as that found in mastreviruses. Similarly, while ECSV has the same unusual TAAGATTCC virion strand replication origin nonanucleotide found in another recently described divergent geminivirus, Beet curly top Iran virus (BCTIV), the rest of the transcription and replication origin is structurally more similar to those found in begomoviruses and curtoviruses than it is to those found in BCTIV and mastreviruses. ECSV also has what might be a homologue of the begomovirus transcription activator protein gene found in begomoviruses, a mastrevirus-like coat protein gene and two intergenic regions. Conclusion. Although it superficially resembles a chimaera of geminiviruses from different genera, the ECSV genome is not obviously recombinant, implying that the features it shares with other geminiviruses are those that were probably present within the last common ancestor of these viruses. In addition to inferring how the ancestral geminivirus genome may have looked, we use the discovery of ECSV to refine various hypotheses regarding the recombinant origins of the major geminivirus lineages. © 2009 Varsani et al; licensee BioMed Central Ltd.
Resumo:
Background: Modern healthcare managers are faced with pressure to deliver effective, efficient services within the context of fixed budget constraints. This requires decisions regarding the skill mix of the workforce particularly when staffing new services. One measure used to identify numbers and mix of staff in healthcare settings is workforce ratio. The aim of this study was to identify workforce ratios in nine allied health professions and to identify whether these measures are useful for planning allied health workforce requirements. Method: A systematic literature search using relevant MeSH headings of business, medical and allied health databases and relevant grey literature for the period 2000-2008 was undertaken. Results: Twelve articles were identified which described the use of workforce ratios in allied health services. Only one of these was a staffing ratio linked to clinical outcomes. The most comprehensive measures were identified in rehabilitation medicine. Conclusions: The evidence for use of staffing ratios for allied health practitioners is scarce and lags behind the fields of nursing and medicine.
Resumo:
This study investigates the characteristics and attributes that private equity investors prefer when selecting target acquisitions. These characteristics are examined against a matched sample of firms subject to corporate acquisitions via tender/merger offer during 2000-2009, across seven countries: Australia, Canada, the United Kingdom, the USA, France, Germany and Sweden. We show that firm-specific characteristics are more influential in target selection than external or institutional variables. In particular, private equity targets exhibit lower stock volatility and long-term growth prospects, are larger, and have greater abnormal operating income relative to tender/merger offer target firms. Further, private equity bidders exhibit 'home bias', implying that familiarity motivates target selection. Institutional factors remain largely insignificant across all tests.
Resumo:
Like many other Western jurisdictions over the past sixty years, New Zealand has had to contend with episodes of moral panic regarding the activities of youth gangs. The most recent episode occurred in 2005-2007 and was spurred by a perceived escalation in inter-gang conflict and violence in the Counties Manukau areas within greater Auckland, New Zealand. This particular episode was unique in the New Zealand context for the level of attention given to youth gangs by the government and policy makers. This paper reports on the authors’ experiences of carrying out research on the youth gang situation inCounties Manukauas part of an inter-agency project to develop a response to gang-related violence. Particular attention is paid to the ways in which government officials attempted to mould the research process and findings to suit an already emerging policy framework, predicated on supporting ‘business as usual’, at the expense of research participants calls for great autonomy to develop and delivery appropriate youth services to their communities.
Resumo:
Bleeding related wound complications cause significant morbidity in lower limb arthroplasty surgery. Patients who require therapeutic anticoagulation in the peri operative period are potentially at higher risk of these complications. This is a retrospective case control study reviewing all primary total hip replacements performed in a single center over a five year period and comparing outcomes of the patients on warfarin with a double-matched control group of patients not on warfarin. The warfarin group had significantly higher risk of deep joint infection (9% vs 2.2%), haematoma/ wound ooze (28% vs 4%) and superficial infection (13.5% vs 2.2%). Managing the total hip arthroplasty patient with therapeutic anticoagulation is a balance between the risk of thromboembolic disease and bleeding related complications. Improved understanding of this risk will better allow the patient to make an informed decision regarding their elective arthroplasty surgery.
Resumo:
Purpose Endotracheal suctioning causes significant lung derecruitment. Closed suction (CS) minimizes lung volume loss during suction, and therefore, volumes are presumed to recover more quickly postsuctioning. Conflicting evidence exists regarding this. We examined the effects of open suction (OS) and CS on lung volume loss during suctioning, and recovery of end-expiratory lung volume (EELV) up to 30 minutes postsuction. Material and Methods Randomized crossover study examining 20 patients postcardiac surgery. CS and OS were performed in random order, 30 minutes apart. Lung impedance was measured during suction, and end-expiratory lung impedance was measured at baseline and postsuctioning using electrical impedance tomography. Oximetry, partial pressure of oxygen in the alveoli/fraction of inspired oxygen ratio and compliance were collected. Results Reductions in lung impedance during suctioning were less for CS than for OS (mean difference, − 905 impedance units; 95% confidence interval [CI], − 1234 to –587; P < .001). However, at all points postsuctioning, EELV recovered more slowly after CS than after OS. There were no statistically significant differences in the other respiratory parameters. Conclusions Closed suctioning minimized lung volume loss during suctioning but, counterintuitively, resulted in slower recovery of EELV postsuction compared with OS. Therefore, the use of CS cannot be assumed to be protective of lung volumes postsuctioning. Consideration should be given to restoring EELV after either suction method via a recruitment maneuver.