841 resultados para stated risks
Resumo:
In developed countries we once thought that the scourge of infectious diseases was tamed. Antibiotics were controlling infection in individual patients, vaccines were preventing illness and great faith was placed in the capacity of science to confound the most cunning organism. However, things have changed and in the new millennium we are confronting a host of challenges to public health from infectious diseases. Epidemics mean an excess of cases in the community from that normally expected or the appearance of a new infection (Webber ####, 22) Chapter 11 outlined the background to infectious diseases and the individual strategies directed towards the control and management of infectious diseases. The aim of this chapter is to outline the impact that infectious diseases have on population health, to identify the risks of major outbreaks and to identify the strategies required to reduce the risk and to manage any possible outbreak.
Resumo:
Public and private sector organisations worldwide are putting strategies in place to manage the commercial and operational risks of climate change. However, community organisations are lagging behind in their understanding and preparedness, despite them being among the most exposed to the effects of climate change impacts and regulation. This poster presents a proposal for a multidisciplinary study that addresses this issue by developing, testing and applying a novel climate risk assessment methodology that is tailored to the needs of Australia’s community sector and its clients. Strategies to mitigate risks and build resilience and adaptive capacity will be identified including new opportunities afforded by urban informatics, social media, and technologies of scale making.
Resumo:
Lawmakers are asking whether Australian researchers need an express 'experimental use' defense against patent infringement. The overriding policy for establishing a patent system is indisputably the promotion of innovation. According to traditional intellectual property pedagogy, the incentive to innovate flows from the reward afforded to the inventor. A balancing policy is that the patentee must fully disclose the invention to help minimize the risks of duplication and provides a basis for improvements by further research.Where there is uncertainty as to how these competing policy limbs are balanced and whether a patentee can exclude others from experimenting on a patented invention, the uncertain legal environment disadvantages both the patentee and researcher. Different jurisdictions have treated the experimental use question quite differently with varied results for the researcher. The biotechnology industry is evolving at an unprecedented pace and the law will as is always the case, lag behind in its usual cautious fashion. The Australian law may finally catch up to researchers' concerns.
Resumo:
Governments undertake extensive planning of many services and functions, but tend to neglect planning of public service workforces. Disruptions to public service delivery, such as shortages of nurses and doctors, have rejuvenated interest in workforce planning, but many organisations struggle to do it effectively. This historical study examines the capacity of central personnel agencies to predict workforce risks and support workforce planning, using a study of the Queensland public service. It identifies lack of workforce data as a barrier to effective workforce planning, as a result of factors such as changes in the direction of the central personnel agency, lack of appreciation for the value of comprehensive central workforce data, and limited agency human resource (HR) skills or capacity.
Resumo:
Purpose: The purpose of this paper is to explore the role of cross-functional teams in the alignment between system effectiveness and operational effectiveness after the implementation of enterprise information systems (EIS). In addition, it aims to explore the contribution of cross-functional teams to improvement in operational performance. ---------- Design/methodology/approach: The research uses a combination of qualitative and quantitative methods, in a two-stage methodological approach, to investigate the influence of cross-functional teams on the alignment between system effectiveness and operational effectiveness and the impact of the stated alignment on the improvement in operational performance. ---------- Findings: Initial findings suggest that factors stemming from system effectiveness and the performance objectives stemming from operational effectiveness are important and significantly well correlated factors that promote the alignment between the effectiveness of technological implementation and the effectiveness of operations. In addition, confirmatory factor analysis has been used to find the structural relationships and provide explanations for the stated alignment and the contribution of cross-functional teams to the improvement in operational performance. ---------- Research limitations/implications: The principal limitation of this study is its small sample size. ---------- Practical implications: Cross-functional teams have been used by many organisations as a way of involving expertise from different functional areas in the implementation of innovative technologies. An appropriate use of the dimensions that emerged from this research, in the context of cross-functional teams, will assist organisations to properly utilise cross-functional teams with the aim of improving operational performance. ---------- Originality/value: The paper presents a new approach to measure the effectiveness of EIS implementation by adding new dimensions to measure it.
Resumo:
International market access for fresh commodities is regulated by international accepted phytosanitary guidelines, the objectives of which are to reduce the biosecurity risk of plant pest and disease movement. Papua New Guinea (PNG) has identified banana as a potential export crop and to help meet international market access requirements, this thesis provides information for the development of a pest risk analysis (PRA) for PNG banana fruit. The PRA is a three step process which first identifies the pests associated with a particular commodity or pathway, then assesses the risk associated with those pests, and finally identifies risk management options for those pests if required. As the first step of the PRA process, I collated a definitive list on the organisms associated with the banana plant in PNG using formal literature, structured interviews with local experts, grey literature and unpublished file material held in PNG field research stations. I identified 112 organisms (invertebrates, vertebrate, pathogens and weeds) associated with banana in PNG, but only 14 of these were reported as commonly requiring management. For these 14 I present detailed information summaries on their known biology and pest impact. A major finding of the review was that of the 14 identified key pests, some research information occurs for 13. The single exception for which information was found to be lacking was Bactrocera musae (Tryon), the banana fly. The lack of information for this widely reported ‘major pest on PNG bananas’ would hinder the development of a PNG banana fruit PRA. For this reason the remainder of the thesis focused on this organism, particularly with respect to generation of information required by the PRA process. Utilising an existing, but previously unanalysed fruit fly trapping database for PNG, I carried out a Geographic Information System analysis of the distribution and abundance of banana in four major regions of PNG. This information is required for a PRA to determine if banana fruit grown in different parts of the country are at different risks from the fly. Results showed that the fly was widespread in all cropping regions and that temperature and rainfall were not significantly correlated with banana fly abundance. Abundance of the fly was significantly correlated (albeit weakly) with host availability. The same analysis was done with four other PNG pest fruit flies and their responses to the environmental factors differed to banana fly and each other. This implies that subsequent PRA analyses for other PNG fresh commodities will need to investigate the risk of each of these flies independently. To quantify the damage to banana fruit caused by banana fly in PNG, local surveys and one national survey of banana fruit infestation were carried out. Contrary to expectations, infestation was found to be very low, particularly in the widely grown commercial cultivar, Cavendish. Infestation of Cavendish fingers was only 0.41% in a structured, national survey of over 2 700 banana fingers. Follow up laboratory studies showed that fingers of Cavendish, and another commercial variety Lady-finger, are very poor hosts for B. musae, with very low host selection rates by female flies and very poor immature survival. An analysis of a recent (within last decade) incursion of B. musae into the Gazelle Peninsula of East New Britain Province, PNG, provided the final set of B. musae data. Surveys of the fly on the peninsular showed that establishment and spread of the fly in the novel environment was very rapid and thus the fly should be regarded as being of high biosecurity concern, at least in tropical areas. Supporting the earlier impact studies, however, banana fly has not become a significant banana fruit problem on the Gazelle, despite bananas being the primary starch staple of the region. The results of the research chapters are combined in the final Discussion in the form of a B. musae focused PRA for PNG banana fruit. Putting the thesis in a broader context, the Discussion also deals with the apparent discrepancy between high local abundance of banana fly and very low infestation rates. This discussion focuses on host utilisation patterns of specialist herbivores and suggests that local pest abundance, as determined by trapping or monitoring, need not be good surrogate for crop damage, despite this linkage being implicit in a number of international phytosanitary protocols.
Resumo:
This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.
Resumo:
Aim. The paper is a report of a study to demonstrate how the use of schematics can provide procedural clarity and promote rigour in the conduct of case study research. Background. Case study research is a methodologically flexible approach to research design that focuses on a particular case – whether an individual, a collective or a phenomenon of interest. It is known as the 'study of the particular' for its thorough investigation of particular, real-life situations and is gaining increased attention in nursing and social research. However, the methodological flexibility it offers can leave the novice researcher uncertain of suitable procedural steps required to ensure methodological rigour. Method. This article provides a real example of a case study research design that utilizes schematic representation drawn from a doctoral study of the integration of health promotion principles and practices into a palliative care organization. Discussion. The issues discussed are: (1) the definition and application of case study research design; (2) the application of schematics in research; (3) the procedural steps and their contribution to the maintenance of rigour; and (4) the benefits and risks of schematics in case study research. Conclusion. The inclusion of visual representations of design with accompanying explanatory text is recommended in reporting case study research methods.
Resumo:
Construction procurement organisations in the Australian framework provide broad guidelines on project management in setting benchmark performance measurements and processes for evaluating their projects. Despite this, little has been known in the project management practise in transport construction projects in Australia, in particular Queensland. Questionnaire data from 53 project management practitioners employed in State and City public sector organisations in Queensland,suggested that many practitioners in the public sector have little or a lack of understanding of government regulatory policies, which are used as economic evaluation tools for project options. Public sector project managers perceive socio-economic evaluation tools as inappropriate for public sector projects. The survey results also found conducting risk management analysis, developing a risk register and mitigation of risks were most effective way of managing risk. This study provides an opportunity for the public sector to review and provide training on project management practices and government regulatory policies governing public projects. This will improve project management practitioners’ understanding and interpretation of government regulatory policies.
Resumo:
Aim: Worldwide, injury is the leading cause of death and disability for young people. Injuries among young people are commonly associated with risk taking behaviour, including violence and transport risks, which often occur in the context of alcohol use. The school environment has been identified as having a significant role in shaping adolescent behaviour. In particular, school connectedness, the degree to which adolescents feel that they belong and are accepted at school, has been shown to be an important protective factor. Strategies for increasing school connectedness may therefore be effective in reducing risk taking and associated injury. Prior to developing connectedness strategies, it is important to understand the perspectives of those in the school regarding the construct and how it is realised in the school context. The aim of this research was to understand teachers’ perspectives of school connectedness, the strategies they employ to connect with students, and their perceptions of school connectedness as a strategy for risk taking and injury prevention. Method: In depth interviews of approximately 45 minutes duration were conducted with 13 Health and PE teachers and support staff from 2 high schools in Southeast Queensland, Australia. Additionally, 6 focus group workshop discussions were held with 35 Education department employees (5-6 per group), including teachers from 15 Southeast Queensland high schools. Results: Participants were found to place strong importance on the development of connectedness among students, including those at risk for problem behaviour. Strategies used to promote connectedness included building trust, taking an interest in each student and being available to talk to, and finding something positive for students to succeed at. Teachers identified strategies as being related to decreased risk taking behavior. Teacher training on school connectedness was perceived as an important and useful inclusion in a school based injury prevention program. Conclusions: The established link between increased school connectedness and decreased problem behaviour has implications for school based strategies designed to decrease adolescent risk taking behaviour and associated injury. Targeting school connectedness as a point of intervention, in conjunction with individual attitude and behaviour change programs, may be an effective injury prevention strategy.
Resumo:
This chapter is about the role of law in the management of the health workforce in Australia. Health professionals play an important role in the health system as the providers of treatment and care — without health professionals health systems would not function. The relationship between health professionals and patients has always been complex and is often subject to some form of regulation by the state. The first surviving written reference to such legal regulation dates from 1795-1750 BCE when the Babylonian Code of Hammurabi stated: “If a physician make a large incision with the operating knife, and kill him, or open a tumor with the operating knife, and cut out the eye, his hands shall be cut off.” Alexander the Great recommended the crucifixion of health professionals who killed their patients. Fortunately, the law in Australia prescribes lesser penalties for erring health professionals, but at the heart of modern regulation are similar concerns to those that underpinned the ancient Babylonian Code — to create conditions to ensure the safety of patients and the provision of quality services by health professionals.
Resumo:
Fishers are faced with multiple risks, including unpredictability of future catch rates, prices and costs. While the latter are largely beyond the control of fisheries managers, effective fisheries management should reduce uncertainty about future catches. Different management instruments are likely to have different impacts on the risk perception of fishers, and this should manifest itself in their implicit discount rate. Assuming licence and quota values represent the net present value of the flow of expected future profits, then a proxy for the implicit discount rate of vessels in a fishery can be derived by the ratio of the average level of profits to the average licence/quota value. From this, an indication of the risk perception can be derived, assuming higher discount rates reflect higher levels of systematic risk. In this paper, we apply the capital asset pricing model (CAPM) to determine the risk premium implicit in the discount rates for a range of Australian fisheries, and compare this with the set of management instruments in place. We test the assumption that rights based management instruments lower perceptions of risk in fisheries. We find little evidence to support this assumption. although the analysis was based on only limited data.
Resumo:
Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. Documents are distributed in a protected form such that they may only be used with trusted environments, and only in accordance with terms and conditions stated in the licence. Digital rights management has found uses in protecting copyrighted audio-visual productions, private personal information, and companies' trade secrets and intellectual property. This chapter describes a general model of digital rights management together with the technologies used to implement each component of a digital rights management system, and desribes how digital rights management can be applied to secure the distribution of electronic information in a variety of contexts.
Resumo:
Throughout the developed world there is an increasing prevalence of childhood obesity. Because of this increase, and awareness of the risks to long term health that childhood obesity presents, the phenomena is now described by many as a global epidemic. Children, Obesity and Exercise provides sport, exercise and medicine students and professionals with an accessible and practical guide to understanding and managing childhood and adolescent obesity. It covers: overweight, obesity and body composition; physical activity, growth and development; psycho-social aspects of childhood obesity; physical activity behaviours; eating behaviours; measuring childrens behaviour; interventions for prevention and management of childhood obesity. Children, Obesity and Exercise addresses the need for authoritative advice and innovative approaches to the prevention and management of this chronic problem.
Resumo:
This article reports the details of a research on novel design in the field of semitrailer sector and discuss design by hazard prevention techniques. The novel design made addresses occupational health and safety (OHS)concerns of fall from heights. The research includes a detailed survey of national data sources to examine the fatalities caused due to fall from heights in car carriers. The study investigates OHS recommendations in Australia for semitrailer sector. Often injuries are caused due to drivers working above the 1.5 meter height for loading, unloading of the cars, moving the decks up, down, strapping the cars, and slipperly. The new design is developed using latest computer aided design and engineeing (CAD, CAE), product data management (PDM), virtual design process (VDP). The new car carrier design excels in reducing the risks of injuries to drivers and new bench mark for OHS standards. The new design has all the decks operated with hydraulics and uses unique ratchet lock mechanism (fool proof design) and loading happens at a safe working height (below 1.5 meter). All the cars are strapped on the safe working height, and then car desks operated hydraulically to transfer them to the required position. This also includes the car on the prime mover, which shuttles across from one deck to other using hydraulic and rack-pinion mechanisms. The novel design car carrier solves the problem of falls from height: next step would be to transfer this technology across other similar effected sectors.