911 resultados para Information treatment
Resumo:
Measures and theories of information abound, but there are few formalised methods for treating the contextuality that can manifest in different information systems. Quantum theory provides one possible formalism for treating information in context. This paper introduces a quantum-like model of the human mental lexicon, and shows one set of recent experimental data suggesting that concept combinations can indeed behave non-separably. There is some reason to believe that the human mental lexicon displays entanglement.
Resumo:
This chapter deals with the law concerning children and consent to medical treatment. Where a child under the age of 18 requires medical treatment, issues arise as to who may lawfully consent to the treatment and under what circumstances. Depending on the circumstances, consent may be given by the child’s parent or guardian; the child; or a court. The chapter provides a thorough treatment of Australian law about these issues and circumstances.
Resumo:
This article examines Finnis' and Keown's claim that the intention/foresight distinction should be used as the basis for the lawfulness of withholding and withdrawing medical treatment, rather than the act/omission distinction which is currently used. I argue that whilst the intention/foresight distinction is sound and can apply to palliative pain relief hastening death, it cannot be applied to withholding and withdrawing medical treatment. Instead, the act/omission distinction remains the better basis for the lawfulness of withholding and withdrawal, and law reform is consequently unnecessary.
Resumo:
Information security policy defines the governance and implementation strategy for information security in alignment with the corporate risk policy objectives and strategies. Research has established that alignment between corporate concerns may be enhanced when strategies are developed concurrently using the same development process as an integrative relationship is established. Utilizing the corporate risk management framework for security policy management establishes such an integrative relationship between information security and corporate risk management objectives and strategies. There is however limitation in the current literature on presenting a definitive approach that fully integrates security policy management with the corporate risk management framework. This paper presents an approach that adopts a conventional corporate risk management framework for security policy development and management to achieve alignment with the corporate risk policy. A case example is examined to illustrate the alignment achieved in each process step with a security policy structure being consequently derived in the process. It is shown that information security policy management outcomes become both integral drivers and major elements of the corporate-level risk management considerations. Further study should involve assessing the impact of the use of the proposed framework in enhancing alignment as perceived in this paper.
Resumo:
The MPEG-21 Multimedia Framework provides for controlled distribution of multimedia works through its Intellectual Property Management and Protection ("IPMP") Components and Rights Expression Language ("MPEG REL"). The IPMP Components provide a framework by which the components of an MPEG-21 digital item can be protected from undesired access, while MPEG REL provides a mechanism for describing the conditions under which a component of a digital item may be used and distributed. This chapter describes how the IPMP Components and MPEG REL were used to implement a series of digital rights management applications at the Cooperative Research Centre for Smart Internet Technology in Australia. While the IPMP Components and MPEG REL were initially designed to facilitate the protection of copyright, the applications also show how the technology can be adapted to the protection of private personal information and sensitive corporate information.
Resumo:
National estimates of the prevalence of child abuse-related injuries are obtained from a variety of sectors including welfare, justice, and health resulting in inconsistent estimates across sectors. The International Classification of Diseases (ICD) is used as the international standard for categorising health data and aggregating data for statistical purposes, though there has been limited validation of the quality, completeness or concordance of these data with other sectors. This research study examined the quality of documentation and coding of child abuse recorded in hospital records in Queensland and the concordance of these data with child welfare records. A retrospective medical record review was used to examine the clinical documentation of over 1000 hospitalised injured children from 20 hospitals in Queensland. A data linkage methodology was used to link these records with records in the child welfare database. Cases were sampled from three sub-groups according to the presence of target ICD codes: Definite abuse, Possible abuse, unintentional injury. Less than 2% of cases coded as being unintentional were recoded after review as being possible abuse, and only 5% of cases coded as possible abuse cases were reclassified as unintentional, though there was greater variation in the classification of cases as definite abuse compared to possible abuse. Concordance of health data with child welfare data varied across patient subgroups. This study will inform the development of strategies to improve the quality, consistency and concordance of information between health and welfare agencies to ensure adequate system responses to children at risk of abuse.
Resumo:
Emergency departments (EDs) are often the first point of contact with an abused child. Despite legal mandate, the reporting of definite or suspected abusive injury to child safety authorities by ED clinicians varies due to a number of factors including training, access to child safety professionals, departmental culture and a fear of ‘getting it wrong’. This study examined the quality of documentation and coding of child abuse captured by ED based injury surveillance data and ED medical records in the state of Queensland and the concordance of these data with child welfare records. A retrospective medical record review was used to examine the clinical documentation of almost 1000 injured children included in the Queensland Injury Surveillance Unit database (QISU) from 10 hospitals in urban and rural centres. Independent experts re-coded the records based on their review of the notes. A data linkage methodology was then used to link these records with records in the state government’s child welfare database. Cases were sampled from three sub-groups according to the surveillance intent codes: Maltreatment by parent, Undetermined and Unintentional injury. Only 0.1% of cases coded as unintentional injury were recoded to maltreatment by parent, while 1.2% of cases coded as maltreatment by parent were reclassified as unintentional and 5% of cases where the intent was undetermined by the triage nurse were recoded as maltreatment by parent. Quality of documentation varied across type of hospital (tertiary referral centre, children’s, urban, regional and remote). Concordance of health data with child welfare data varied across patient subgroups. Outcomes from this research will guide initiatives to improve the quality of intentional child injury surveillance systems.
Resumo:
Background: Acute coronary syndromes are a major cause of mortality and morbidity. Objectives/Methods: The objective of this evaluation is to review the clinical trials of two new drugs being developed for the treatment of acute coronary syndromes. The first drug is the anti-coagulant otamixaban, and the trial compared otamixaban with unfractionated heparin and eptifibatide in acute coronary syndromes. The second drug is the anti-platelet ticagrelor, and the trial compared ticagrelor with clopidogrel in acute coronary syndromes. Results: In the SEPIA-ACS1 TIMI 42 trial, the primary efficacy endpoint occurred in 6.2% of subjects treated with unfractionated heparin and eptifibatide, and to a significantly lesser extent with otamixaban. In the PLATO trial, the primary efficacy endpoint had occurred less in the ticagrelor group (9.8%) than in the clopidogrel group (11.7%) at 12 months. Conclusions: Two new drugs for acute coronary syndromes, otamixaban and ticagrelor, have recently been shown to have benefits in subjects undergoing percutaneous interventions compared to the present standard regimens for this condition.
Resumo:
Background: The first sign of developing multiple sclerosis is a clinically isolated syndrome that resembles a multiple sclerosis relapse. Objective/methods: The objective was to review the clinical trials of two medicines in clinically isolated syndromes (interferon β and glatiramer acetate) to determine whether they prevent progression to definite multiple sclerosis. Results: In the BENEFIT trial, after 2 years, 45% of subjects in the placebo group developed clinically definite multiple sclerosis, and the rate was lower in the interferon β-1b group. Then all subjects were offered interferon β-1b, and the original interferon β-1b group became the early treatment group, and the placebo group became the delayed treatment group. After 5 years, the number of subjects with clinical definite multiple sclerosis remained lower in the early treatment than late treatment group. In the PreCISe trial, after 2 years, the time for 25% of the subjects to convert to definite multiple sclerosis was prolonged in the glatiramer group. Conclusions: Interferon β-1b and glatiramer acetate slow the progression of clinically isolated syndromes to definite multiple sclerosis. However, it is not known whether this early treatment slows the progression to the physical disabilities experienced in multiple sclerosis.
Resumo:
Osteoporosis is the most common bone disease. Low levels of oestrogens or testosterone are risk factors for primary osteoporosis. The most common cause of secondary osteoporosis is glucocorticoid treatment, but there are many other secondary causes of osteoporosis. Osteoporosis can be secondary to anti-oestrogen treatment for hormone-sensitive breast cancer and to androgen-deprivation therapy for prostate cancer. Zoledronic is the most potent bisphosphonate at inhibiting bone resorption. In osteoporosis, zoledronic acid increases bone mineral density for at least a year after a single intravenous administration. The efficacy and safety of extended release (once-yearly) zoledronic acid in the treatment of osteoporosis is reviewed.
Resumo:
Background: Methotrexate alone or in combination with other agents is the standard treatment for moderate-to-severe rheumatoid arthritis. As the biological agents are expensive, they are not usually used until methotrexate has failed to give a good response. Thus, there is scope for the development of cheaper drugs that can be used instead of methotrexate or in addition to methotrexate. Objectives/methods: Pamapimod is a p38α inhibitor being developed for use in the treatment of rheumatoid arthritis. The objective was to evaluate the recent clinical trials of pamapimod in subjects with rheumatoid arthritis. Results: There is no clear cut evidence that pamapimod alone or in the presence of methotrexate is efficacious in subjects with rheumatoid arthritis, but it does cause adverse effects. Conclusion: It is unlikely that pamapimod will be useful in the treatment of rheumatoid arthritis.
Resumo:
With an increasing level of collaboration amongst researchers, software developers and industry practitioners in the past three decades, building information modelling (BIM) is now recognized as an emerging technological and procedural shift within the architect, engineering and construction (AEC) industry. BIM is not only considered as a way to make a profound impact on the professions of AEC, but is also regarded as an approach to assist the industry to develop new ways of thinking and practice. Despite the widespread development and recognition of BIM, a succinct and systematic review of the existing BIM research and achievement is scarce. It is also necessary to take stock on existing applications and have a fresh look at where BIM should be heading and how it can benefit from the advances being made. This paper first presents a review of BIM research and achievement in AEC industry. A number of suggestions are then made for future research in BIM. This paper maintains that the value of BIM during design and construction phases is well documented over the last decade, and new research needs to expand the level of development and analysis from design/build stage to postconstruction and facility asset management. New research in BIM could also move beyond the traditional building type to managing the broader range of facilities and built assets and providing preventative maintenance schedules for sustainable and intelligent buildings
Resumo:
We advance the proposition that dynamic stochastic general equilibrium (DSGE) models should not only be estimated and evaluated with full information methods. These require that the complete system of equations be specified properly. Some limited information analysis, which focuses upon specific equations, is therefore likely to be a useful complement to full system analysis. Two major problems occur when implementing limited information methods. These are the presence of forward-looking expectations in the system as well as unobservable non-stationary variables. We present methods for dealing with both of these difficulties, and illustrate the interaction between full and limited information methods using a well-known model.
Contextualizing the tensions and weaknesses of information privacy and data breach notification laws
Resumo:
Data breach notification laws have detailed numerous failures relating to the protection of personal information that have blighted both corporate and governmental institutions. There are obvious parallels between data breach notification and information privacy law as they both involve the protection of personal information. However, a closer examination of both laws reveals conceptual differences that give rise to vertical tensions between each law and shared horizontal weaknesses within both laws. Tensions emanate from conflicting approaches to the implementation of information privacy law that results in different regimes and the implementation of different types of protections. Shared weaknesses arise from an overt focus on specified types of personal information which results in ‘one size fits all’ legal remedies. The author contends that a greater contextual approach which promotes the importance of social context is required and highlights the effect that contextualization could have on both laws.