910 resultados para message rejection
Resumo:
This paper discusses the fast emerging challenges for Malay and Muslim sexual minority storytellers in the face of an aggressive state-sponsored Islamisation of a constitutionally secular Malaysia. I examine the case of Azwan Ismail, a gay Malay and Muslim Malaysian who took part in the local ‘It Gets Better’ Project, initiated in December 2010 by Seksualiti Merdeka (an annual sexuality rights festival) and who suffered an onslaught of hostile comments from fellow Malay Muslims. In this paper, I ask how a message aimed at discouraging suicidal tendencies among sexual minority teenagers can go so wrong. In discussing the contradictions between Azwan’s constructions of self and the expectations others have of him, I highlight the challenges for Azwan’s existential self. For storytellers who are vulnerable if visible, the inevitable sharing of a personal story with unintended and hostile audiences when placed online, can have significant repercussions. The purist Sunni Islam agenda in Malaysia not only rejects the human rights of the sexual minority in Malaysia but has influenced and is often a leading hostile voice in both regional and international blocs. This self-righteous and supremacist political Islam fosters a more disabling environment for vulnerable, minority communities and their human rights. It creates a harsher reality for the sexual minority that manifests in State-endorsed discrimination, compulsory counselling, forced rehabilitation and their criminalisation. It places the right of the sexual minority to live within such a community in doubt. I draw on existing literature on how personal stories have historically been used to advance human rights. Included too, is the signifance and implications of the work by social psychologists in explaining this loss of credibility of personal stories. I then advance an analytical framework that will allow storytelling as a very individual form of witnessing to reclaim and regain its ‘truth to power’.
Resumo:
Background: Young motherhood is commonly associated with vulnerabilities, stereotyping of young women’s behaviour and poor outcomes for them and their children. The objective was to understand how maternity care is experienced for this group in the transition to parenthood. Methods: Data from a large-scale 2010 survey of women’s experience of maternity care were analysed using qualitative methods with open text responses. Results: 7,193 women responded to the survey: 237 were aged 20 years or less. Most (83%) of these young women provided open text responses. The main themes were: ‘being a consumer’, ‘the quality of care’, ‘needing support’ and ‘pride in parenthood’ while subthemes included ‘being young’ and ‘how staff made me feel’, ‘testimonials for staff’, ‘not being left’ and ‘it’s all worthwhile’. Conclusion: Many young women responding described a positive experience. For many first time mothers this marked a positive change in their identity. Nevertheless staff perceptions and attitudes affected how they saw themselves and what they took away from their experience of maternity care. A key message for other women supported and reinforced their role as active and involved consumers who, in engaging with services, have to stand up for themselves and make their needs and wishes known.
Resumo:
Speeding remains a pervasive road safety problem, increasing both crash frequency and severity. Advertising countermeasures which aim to change individuals’ attitudes and behaviours are a key component in the array of countermeasures aimed at reducing this risky behaviour. Enhancing individuals’ perceptions of the personal relevance of such messages is important for increasing persuasiveness. This study examined what males and females reported as the most concerning aspects associated with (i) receiving a speeding fine, (ii) losing one’s license, and (iii) being involved in a crash. For each of these outcomes, a range of specific and appropriate aspects were assessed. For instance, in relation to receiving a fine, individuals reported the extent to which they would, for example, feel concerned about losing demerit points and paying more in insurance premiums. An online survey of 751 drivers (579 males; 16-79 years) was administered. When controlling for age, overall significant gender differences were found in relation to two of the three outcomes; receiving a fine and being in a crash. Follow-up tests of univariate effects revealed that females consistently reported being significantly more concerned than males on all aspects. Thus, for being fined, females were significantly more concerned with, for example, being caught and receiving a ticket in the mail; while, for being in a crash, specific aspects included, for example, injuring/killing oneself and seeing oneself as not a good/safe driver. The findings are discussed in terms of their implications for developing well-targeted messages aimed at discouraging drivers from speeding.
Resumo:
A fundamental part of many authentication protocols which authenticate a party to a human involves the human recognizing or otherwise processing a message received from the party. Examples include typical implementations of Verified by Visa in which a message, previously stored by the human at a bank, is sent by the bank to the human to authenticate the bank to the human; or the expectation that humans will recognize or verify an extended validation certificate in a HTTPS context. This paper presents general definitions and building blocks for the modelling and analysis of human recognition in authentication protocols, allowing the creation of proofs for protocols which include humans. We cover both generalized trawling and human-specific targeted attacks. As examples of the range of uses of our construction, we use the model presented in this paper to prove the security of a mutual authentication login protocol and a human-assisted device pairing protocol.
Resumo:
Recent developments in wearable ECG technology have seen renewed interest in the use of Heart Rate Variability (HRV) feedback for stress management. Yet, little is know about the efficacy of such interventions. Positive reappraisal is an emotion regulation strategy that involves changing the way a situation is construed to decrease emotional impact. We sought to test the effectiveness of an intervention that used feedback on HRV data to prompt positive reappraisal during a stressful work task. Participants (N=122) completed two 20-minute trials of an inbox activity. In-between the first and the second trial participants were assigned to the waitlist control condition, a positive reappraisal via psycho-education condition, or a positive reappraisal via HRV feedback condition. Results revealed that using HRV data to frame a positive reappraisal message is more effective than using psycho-education (or no intervention)–especially for increasing positive mood and reducing arousal.
Resumo:
The Australian Commission on Safety and Quality in Health Care commissioned this rapid review to identify recent evidence in relation to three key questions: 1. What is the current evidence of quality and safety issues regarding the hospital experience of people with cognitive impairment (dementia/delirium)? 2. What are the existing evidence-based pathways, best practice or guidelines for cognitive impairment in hospitals? 3. What are the key components of an ideal patient journey for a person with dementia and/or delirium? The purpose of this review is to identify best practice in caring for patients with cognitive impairment (CI) in acute hospital settings. CI refers to patients with dementia and delirium but can include other conditions. For the purposes of this report, ‘Hospitals’ is defined as acute care settings and includes care provided by acute care institutions in other settings (e.g. Multipurpose Services and Hospital in the Home). It does not include residential aged care settings nor palliative care services that are not part of a service provided by an acute care institution. Method Both peer-reviewed publications and the grey literature were comprehensively searched for recent (primarily post 2010) publications, reports and guidelines that addressed the three key questions. The literature was evaluated and graded according to the National Health and Medical Research Council (NHMRC) levels of criteria (see Evidence Summary – Appendix B). Results Thirty-one recent publications were retrieved in relation to quality and safety issues faced by people with CI in acute hospitals. The results indicate that CI is a common problem in hospitals (upwards of 30% - the rate increases with increasing patient age), although this is likely to be an underestimate, in part, due to numbers of patients without a formal dementia diagnosis. There is a large body of evidence showing that patients with CI have worse outcomes than patients without CI following hospitalisation including increased mortality, more complications, longer hospital stays, increased system costs as well as functional and cognitive decline. 4 To improve the care of patients with CI in hospital, best practice guidelines have been developed, of which sixteen recent guidelines/position statements/standards were identified in this review (Table 2). Four guidelines described standards or quality indicators for providing optimal care for the older person with CI in hospital, in general, while three focused on delirium diagnosis, prevention and management. The remaining guidelines/statements focused on specific issues in relation to the care of patients with CI in acute hospitals including hydration, nutrition, wandering and care in the Emergency Department (ED). A key message in several of the guidelines was that older patients should be assessed for CI at admission and this is particularly important in the case of delirium, which can indicate an emergency, in order to implement treatment. A second clear mess...
Resumo:
Importance of the field: Reactive oxygen species (ROS) occur as natural by-products of oxygen metabolism and have important cellular functions. Normally, the cell is able to maintain an adequate balance between the formation and removal of ROS either via anti-oxidants or through the use specific enzymatic pathways. However, if this balance is disturbed, oxidative stress may occur in the cell, a situation linked to the pathogenesis of many diseases, including cancer. Areas covered in this review: HDACs are important regulators of many oxidative stress pathways including those involved with both sensing and coordinating the cellular response to oxidative stress. In particular aberrant regulation of these pathways by histone deacetylases may play critical roles in cancer progression. What the reader will gain: In this review we discuss the notion that targeting HDACs may be a useful therapeutic avenue in the treatment of oxidative stress in cancer, using chronic obstructive pulmonary disease (COPD), NSCLC and hepatocellular carcinoma (HCC) as examples to illustrate this possibility. Take home message: Epigenetic mechanisms may be an important new therapeutic avenue for targeting oxidative stress in cancer. © 2010 Informa UK, Ltd.
Resumo:
This paper examines the recent prominent view in medical ethics that withdrawing life-sustaining treatment (LST) is an act of killing. I trace this view to the rejection of the traditional claim that withdrawing LST is an omission rather than an act. Although that traditional claim is not as problematic as this recent prominent view suggests, my main claim is that even if we accepted that withdrawing LST should be classified as an act rather than as an omission, it could still be classified as letting die rather than killing. Even though omissions are contrasted with acts, letting die need not be, for one can let die by means of acts. The remainder of the paper is devoted to establishing this claim and addresses certain objections to it.
Resumo:
The 12th annual survey of Australian contact lens prescribing was conducted between January and April 2011, employing the same format as in previous years. About 3,000 optometrist members of Optometrists Association Australia were sent an e-mail message with a link to a downloadable questionnaire, and a request that this be accessed, printed and completed to provide details of the first 10 patients fitted with contact lenses after receipt of the questionnaire.
Resumo:
The 13th annual survey of Australian contact lens prescribing was conducted between January and April 2012. The same format as in previous years was employed. About 3,000 members of Optometrists Association Australia were sent an e-mail message with a link to a downloadable questionnaire, and a request that this be accessed, printed and completed to provide details of the first 10 patients fitted with contact lenses after receipt of the questionnaire.
Resumo:
This study assessed the revised Behavioural Inhibition System (BIS), as conceptualised by Gray and McNaughton’s (2000) revised RST, by exposing participants to a loss-framed road safety message (emphasising the negative consequences of speeding behaviour) and a high performance motor vehicle promotional advertisement. Licensed young drivers (N = 40, aged 17–25 years) were randomly allocated to view either the message or both the message and advertisement. Participants then completed a computerised lexical decision task prior to completing three personality measures: Corr-Cooper RST-PQ, CARROT and Q-Task. It was predicted that those with a stronger BIS would demonstrate greater processing of these mixed message cues compared to weaker BIS individuals, and that this BIS effect would only be observed in the mixed cues condition (due to simultaneous activation of the incentive and punishment systems). Preliminary findings will be discussed in the context of the influence of personality traits on health message processing.
Resumo:
Using Gray and McNaughton’s revised RST, this study investigated the extent to which the Behavioural Approach System (BAS) and the Fight-Flight-Freeze System (FFFS) influence the processing of gain-framed and loss-framed road safety messages and subsequent message acceptance. It was predicted that stronger BAS sensitivity and FFFS sensitivity would be associated with greater processing and acceptance of the gain-framed messages and loss-framed messages, respectively. Young drivers (N = 80, aged 17–25 years) viewed one of four road safety messages and completed a lexical decision task to assess message processing. Both self-report (e.g., Corr-Cooper RST-PQ) and behavioural measures (i.e., CARROT and Q-Task) were used to assess BAS and FFFS traits. Message acceptance was measured via self-report ratings of message effectiveness, behavioural intentions, attitudes and subsequent driving behaviour. The results are discussed in the context of the effect that differences in reward and punishment sensitivities may have on message processing and message acceptance.
Resumo:
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.
Resumo:
Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability, are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.
Resumo:
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.