960 resultados para improving child protection


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The focus of this special volume of CSI on research with and by children reflects a major paradigm shift in child research - a shift from a focus on the child as object of to a focus on the child as subject (and actor) in research (see Mason and Hood 2010). In his lead article in the first issue of this journal (2008), Asher Ben-Arieh highlighted the way in which the child indicators movement reflects this paradigm shift, outlining the way in which new directions in measuring and monitoring child well-being were leading to new roles for children in this process. He noted the importance of including children’s own perspectives on their well-being and argued that ‘incorporating children’s subjective perceptions is both a pre-requisite and a consequence of the changes historically in the measuring and monitoring of child well-being’ (p.13). This special issue again takes up this agenda of the child as subject in research...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this descriptive focus group study, we investigated parents’ views about child sexual abuse prevention education at home and in schools. Focus groups were conducted with a sample of 30 Australian adults who identified as the parent or caregiver of a child/children aged 0–5 years. The study explored (1) parents’ knowledge about child sexual abuse prevention, (2) the child sexual abuse prevention messages they provided to their children and the topics they discussed, (3) their attitudes towards child sexual abuse prevention education in schools, and (4) their preferences for content. Data analysis provided seven key themes in these four areas: knowledge (the inadequacy of their own prevention education; and how important is stranger danger now?); messages (bodies, touching, and relationships; the role of protective adults; and parent–child communication); attitudes (voice and choice); and preferences (not the nitty gritty, just the basics). The findings may be useful in assisting school authorities and providers of child sexual abuse prevention programs to better understand parents’ contributions to child sexual abuse prevention education, and their perspectives in relation to provision of school-based prevention programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Post-deployment maintenance and evolution can account for up to 75% of the cost of developing a software system. Software refactoring can reduce the costs associated with evolution by improving system quality. Although refactoring can yield benefits, the process includes potentially complex, error-prone, tedious and time-consuming tasks. It is these tasks that automated refactoring tools seek to address. However, although the refactoring process is well-defined, current refactoring tools do not support the full process. To develop better automated refactoring support, we have completed a usability study of software refactoring tools. In the study, we analysed the task of software refactoring using the ISO 9241-11 usability standard and Fitts' List of task allocation. Expanding on this analysis, we reviewed 11 collections of usability guidelines and combined these into a single list of 38 guidelines. From this list, we developed 81 usability requirements for refactoring tools. Using these requirements, the software refactoring tools Eclipse 3.2, Condenser 1.05, RefactorIT 2.5.1, and Eclipse 3.2 with the Simian UI 2.2.12 plugin were studied. Based on the analysis, we have selected a subset of the requirements that can be incorporated into a prototype refactoring tool intended to address the full refactoring process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Children who have suffered physical or sexual abuse are as vulnerable as adult trauma victims to experience "secondary trauma", in which the reactions of the family or broader system exacerbate the child's difficulties. Three clinical cases (a 7 yr old male, an 8 yr old male, and a 7 yr old female) are presented that suggest that this secondary trauma can be made worse by either excessive or insufficient provision of individual child psychotherapy, and the way the system interprets and reacts to these clinical decisions. Types of secondary trauma and their interactions with clinical decisions are discussed. Ways of framing clinical decisions to minimize the potential secondary trauma are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are emerging movements in several countries to improve policy and practice to protect children from exposure to domestic violence. These movements have resulted in the collection of new data on EDV and the design and implementation of new child welfare policies and practices. To assist with the development of child welfare practice, this article summarizes current knowledge on the prevalence of EDV, and on child welfare services policies and practices that may hold promise for reducing the frequency and impact of EDV on children. We focus on Australia, Canada, and the United States, as these countries share a similar socio-legal context, a long history of enacting and expanding legislation about reporting of maltreatment, debates regarding the application of reporting laws to EDV, and new child welfare practices that show promise for responding more effectively to EDV.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper draws on the work of the ‘EU Kids Online’ network funded by the EC (DG Information Society) Safer Internet plus Programme (project code SIP-KEP-321803); see www.eukidsonline.net, and addresses Australian children’s online activities in terms of risk, harm and opportunity. In particular, it draws upon data that indicates that Australian children are more likely to encounter online risks — especially around seeing sexual images, bullying, misuse of personal data and exposure to potentially harmful user-generated content — than is the case with their EU counterparts. Rather than only comparing Australian children with their European equivalents, this paper places the risks experienced by Australian children in the context of the mediation and online protection practices adopted by their parents, and asks about the possible ways in which we might understand data that seems to indicate that Australian children’s experiences of online risk and harm differ significantly from the experiences of their Europe-based peers. In particular, and as an example, this paper sets out to investigate the apparent conundrum through which Australian children appear twice as likely as most European children to have seen sexual images in the past 12 months, but parents are more likely to filter their access to the internet than is the case with most children in the wider EU Kids Online study. Even so, one in four Australian children (25%) believes that what their parents do helps ‘a lot’ to improve their internet experience, and Australian children and their parents are a little less likely to agree about the mediation practices taking place in the family home than is the case in the EU. The AU Kids Online study was carried out as a result of the ARC Centre of Excellence for Creative Industries and Innovation’s funding of a small scale randomised sample (N = 400) of Australian families with at least one child, aged 9–16, who goes online. The report on Risks and safety for Australian children on the internet follows the same format and uses much of the contextual statement around these issues as the ‘county level’ reports produced by the 25 EU nations involved in EU Kids Online, first drafted by Livingstone et al. (2010). The entirely new material is the data itself, along with the analysis of that data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Until recently, standards to guide nursing education and practice in Vietnam were nonexistent. This paper describes the development and implementation of a clinical teaching capacity building project piloted in Hanoi, Vietnam. The project was part of a multi-component capacity building program designed to improve nurse education in Vietnam. Objectives of the project were to develop a collaborative clinically-based teaching model that encourages evidence-based, student-centred clinical learning. The model incorporated strategies to promote development of nursing practice to meet national competency standards. Thirty nurse teachers from two organisations in Hanoi participated in the program. These participants attended three workshops, and completed applied assessments, where participants implemented concepts from each workshop. The assessment tasks were planning, implementing and evaluating clinical teaching. On completion of the workshops, twenty participants undertook a study tour in Australia to refine the teaching model and develop an action plan for model implementation in both organisations, with an aim to disseminate the model across Vietnam. Significant changes accredited to this project have been noted on an individual and organisational level. Dissemination of this clinical teaching model has commenced in Ho Chi Minh, with further plans for more in-depth dissemination to occur throughout the country.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Whole body cryotherapy (WBC) involves repeatedly exposing an individual, dressed in minimal clothing, to extremely cold air (–100 to –130°C) for a short period. One specific claim that is often made is that WBC is effective in treating exercise-induced muscle soreness and damage. However, our results suggest that two bouts of WBC were ineffective in improving recovery from eccentric exercise when administered 24 hours after eccentric exercise.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

According to a recent report Australian higher education is not in crisis. However, we could be doing it better. The report Mapping Australian Higher Education (Norton, 2012) highlights comparative weaknesses such as levels f student engagement; interactions between students and academic staff; and academic staff preferences for research over teaching. The report points out that despite these concerns most graduates continue to get good, well-paid jobs, student satisfaction is improving, and levels of public confidence in Australian higher education are high. It also stresses that ‘the promise of higher education is that it provides adaptable cognitive skills, not that it always provides the job specific skills graduates will need in their future employment’ (Norton, 2012, p.58). This is worth keeping in mind as we contribute to the significant growth in curriculum initiatives aimed at preparing graduates for the world of work. Work Integrated Learning (WIL) is not a new concept but there is increased pressure on higher education globally to address graduate employability skills. The sector is under pressure in an increasingly competitive environment to demonstrate the relevance of courses, accountability and effective use of public funds (Peach & Gamble, 2011). In the Australian context this also means responding to the skills shortage in areas such as engineering, health, construction and business (DEEWR, 2010). This paper provides a brief overview of collaborative efforts over several years to improve the activity of WIL at the Queensland University of Technology (QUT). These efforts have resulted in changes to curriculum, pedagogy, systems and processes, and the initiation of local, regional, national, and international networks. The willingness of students, staff, and industry partners to ‘get stuck in’ and try new approaches in these different contexts can be understood as a form of boundary spanning. That is, the development of the capability to mediate between different forms of expertise and the demands of different contexts in order to nurture student learning and improve the outcomes of higher education through WIL (Peach, Cates, Ilg, Jones, Lechleiter, 2011).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the medical and healthcare arena, patients‟ data is not just their own personal history but also a valuable large dataset for finding solutions for diseases. While electronic medical records are becoming popular and are used in healthcare work places like hospitals, as well as insurance companies, and by major stakeholders such as physicians and their patients, the accessibility of such information should be dealt with in a way that preserves privacy and security. Thus, finding the best way to keep the data secure has become an important issue in the area of database security. Sensitive medical data should be encrypted in databases. There are many encryption/ decryption techniques and algorithms with regard to preserving privacy and security. Currently their performance is an important factor while the medical data is being managed in databases. Another important factor is that the stakeholders should decide more cost-effective ways to reduce the total cost of ownership. As an alternative, DAS (Data as Service) is a popular outsourcing model to satisfy the cost-effectiveness but it takes a consideration that the encryption/ decryption modules needs to be handled by trustworthy stakeholders. This research project is focusing on the query response times in a DAS model (AES-DAS) and analyses the comparison between the outsourcing model and the in-house model which incorporates Microsoft built-in encryption scheme in a SQL Server. This research project includes building a prototype of medical database schemas. There are 2 types of simulations to carry out the project. The first stage includes 6 databases in order to carry out simulations to measure the performance between plain-text, Microsoft built-in encryption and AES-DAS (Data as Service). Particularly, the AES-DAS incorporates implementations of symmetric key encryption such as AES (Advanced Encryption Standard) and a Bucket indexing processor using Bloom filter. The results are categorised such as character type, numeric type, range queries, range queries using Bucket Index and aggregate queries. The second stage takes the scalability test from 5K to 2560K records. The main result of these simulations is that particularly as an outsourcing model, AES-DAS using the Bucket index shows around 3.32 times faster than a normal AES-DAS under the 70 partitions and 10K record-sized databases. Retrieving Numeric typed data takes shorter time than Character typed data in AES-DAS. The aggregation query response time in AES-DAS is not as consistent as that in MS built-in encryption scheme. The scalability test shows that the DBMS reaches in a certain threshold; the query response time becomes rapidly slower. However, there is more to investigate in order to bring about other outcomes and to construct a secured EMR (Electronic Medical Record) more efficiently from these simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Well over 50 picture books have been published for children on the topic of sexual child abuse (Lampert & Walsh, 2010) many with the aim of teaching their very young readers how to tell the difference between good and bad secrets. This paper looks at three recent picture books for how they focus on disclosure as an end point.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two hundred and twelve Australian mothers completed an online survey examining features of mother-child communication about child sexual abuse prevention. Two-thirds (67.5%) of respondents had discussed child sexual abuse prevention with their children. Proportions of mothers talking with their children about child sexual abuse prevention varied according to age range (highest for mothers with children aged 5-12 years) and only child status (lowest for mothers of only children). The number of topics discussed with their children differed according to child gender (greater number of topics discussed by mothers with both girls and boys) and age range (greater number of topics discussed by mothers with children aged 5-12 years). These findings provide new insights into mother-child communication about child sexual abuse prevention.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Studies show that in 3-11 year-olds, parental feeding style is directly associated with child weight [1] and also moderates the association between feeding practices and weight [2]. This cross-sectional study aimed to examine these relationships in younger children. Data from 331 of 698 first-time mothers of healthy term children (151 boys, mean age 24±1 months) enrolled in the NOURISH RCT included (a) measured child weight, (b) self-reported feeding styles and controlling feeding practices, and (c) maternal and child covariates. ANCOVA compared mean child weight-for-age z-score (cWAZ) across 4 feeding styles. Regression examined the associations between cWAZ and 5 controlling feeding practices. Moderated multiple regression analysis was planned to examine effects of feeding style on relationships between feeding practices and cWAZ. Feeding style (indulgent = 38.6%, authoritarian = 35.8%, authoritative = 13.1%, uninvolved = 12.5%) was not independently associated with cWAZ. However, ’pressure to eat’ was negatively associated with cWAZ (�=-0.131, p<0.05) higher pressure associated with lower cWAZ. Given feeding style was not associated with cWAZ, moderation analysis was not performed. Contrary to findings in older children, cWAZ in 2-year-olds was not associated with maternal feeding style. However, the negative association between child weight and pressure feeding found in 6-11year-olds [2] appears to hold in toddlers. Educating mothers about potentially detrimental long-term effects of pressure feeding in early childhood, may be more practical and effective in promoting healthy weight than targeting the less concrete concept of feeding styles. References: [1] Hughes, Appetite, 2005;44:83-92. [2] Hennessy, Appetite, 2010;54:369-377.