934 resultados para Consumer protection.
Resumo:
Depending on how they perceive risk, consumers may not always act according to their ethical beliefs, exposing a gap between beliefs and behavior. We investigate the effect of moral potency on perceived psychological risk of committing an unacceptable behavior. The results suggest that perceived risk is triggered by moral ownership.
Resumo:
Background: Significant recent attention has focussed on the role of antibiotic prescribing and usage with the aim of combating antibiotic resistance, a growing worldwide health concern. A significant gap in this literature concerns the consumption patterns and beliefs of consumers about antibiotics and their effects. We seek to remedy this gap by exploring a range of questionable antibiotic practices and obtaining reliable estimates of their prevalence as well as their normative status. Methods: We conducted an online survey of over 100 consumers. We used a new incentive compatible technique, the Bayesian Truth Serum (BTS), to elicit more truthful responding than standard self-report measures. We asked participants to indicate whether they engaged in a number of practices including whether they had: taken antibiotics when they are out of date and stored antibiotics at home for later use. We then sought estimates of the percentage of other patients (like them) who had engaged in each behaviour, as well as asking them among those patients who had, the percentage that would admit to having done so. We also asked about social acceptability and responsibility of the practices. Results: These results will show for each type of questionable practice how prevalent it is and whether consumers view it as both socially acceptable and socially responsible. We will gain the relative prevalence of each of these practices. Conclusion: These findings are of paramount importance in gaining a better understanding of consumers’ antibiotic consumption patterns. These will be vital for better targeting educational campaigns to lower inappropriate antibiotic consumption.
Resumo:
Background Child maltreatment has severe short-and long-term consequences for children’s health, development, and wellbeing. Despite the provision of child protection education programs in many countries, few have been rigorously evaluated to determine their effectiveness. We describe the design of a multi-site gold standard evaluation of an Australian school-based child protection education program. The intervention has been developed by a not-for-profit agency and comprises 5 1-h sessions delivered to first grade students (aged 5–6 years) in their regular classrooms. It incorporates common attributes of effective programs identified in the literature, and aligns with the Australian education curriculum. Methods/Design A three-site cluster randomised controlled trial (RCT) of Learn to be safe with Emmy and friends™ will be conducted with children in approximately 72 first grade classrooms in 24 Queensland primary (elementary) schools from three state regions, over a period of 2 years. Entire schools will be randomised, using a computer generated list of random numbers, to intervention and wait-list control conditions, to prevent contamination effects across students and classes. Data will be collected at baseline (pre-assessment), immediately after the intervention (post-assessment), and at 6-, 12-, and 18-months (follow-up assessments). Outcome assessors will be blinded to group membership. Primary outcomes assessed are children’s knowledge of program concepts; intentions to use program knowledge, skills, and help-seeking strategies; actual use of program material in a simulated situation; and anxiety arising from program participation. Secondary outcomes include a parent discussion monitor, parent observations of their children’s use of program materials, satisfaction with the program, and parental stress. A process evaluation will be conducted concurrently to assess program performance. Discussion This RCT addresses shortcomings in previous studies and methodologically extends research in this area by randomising at school-level to prevent cross-learning between conditions; providing longer-term outcome assessment than any previous study; examining the degree to which parents/guardians discuss intervention content with children at home; assessing potential moderating/mediating effects of family and child demographic variables; testing an in-vivo measure to assess children’s ability to discriminate safe/unsafe situations and disclose to trusted adults; and testing enhancements to existing measures to establish greater internal consistency.
Resumo:
Protection of the amino group and activation of the carboxylic acid groups are the most important steps associated with any peptide synthesis protocol; hence, a one-pot process to achieve these is highly desirable. A possible strategy is to use pentafluorophenyl carbonates to simultaneously protect the amino group as a carbamate derivative and activate the carboxylic acid group as a pentafluorophenyl ester. A detailed study is carried out to understand the scope and limitations of this method using five different pentaflurophenyl carbonates. The efficiency of these one-pot reactions depends largely on the nature of the pentafluorophenyl carbonates and also on the nature of the amino acids. Electron deficient and sterically less demanding carbonates reacted faster than the others, whereas amino acids with longeraliphatic side chains gave better yields than more polar amino acids.
Resumo:
Salmonella typhimurium causes an invasive disease in mice that has similarities to human typhoid. A type III protein secretion system encoded by Salmonella pathogenicity island 2 (SPI2) is essential for virulence in mice, as well as survival and multiplication within macrophages. Reactive nitrogen intermediates (RNI) synthesized by inducible nitric oxide synthase (iNOS) are involved in the control of intracellular pathogens, including S. typhimurium. We studied the effect of Salmonella infection on iNOS activity in macrophages. Immunofluorescence microscopy demonstrated efficient colocalization of iNOS with bacteria deficient in SPI2 but not wild-type Salmonella, and suggests that the SPI2 system interferes with the localization of iNOS and Salmonella. Furthermore, localization of nitrotyrosine residues in the proximity was observed for SPI2 mutant strains but not wild-type Salmonella, indicating that peroxynitrite, a potent antimicrobial compound, is excluded from Salmonella-containing vacuoles by action of SPI2. Altered colocalization of iNOS with intracellular Salmonella required the function of the SPI2-encoded type III secretion system, but not of an individual "Salmonella translocated effector." Inhibition of iNOS increased intracellular proliferation of SPI2 mutant bacteria and, to a lesser extent, of wild-type Salmonella. The defect in systemic infection of a SPI2 mutant strain was partially restored in iNOS(-/-) mice. In addition to various strategies to detoxify RNI or repair damage due to RNI, avoidance of colocalization with RNI is important in adaptation of a pathogen to an intracellular life style.
Resumo:
A reliable protection against direct lightning hit is very essential for satellite launch pads. In view of this, suitable protection systems are generally employed. The evaluation of efficacy of the lightning protection schemes among others requires an accurate knowledge of the consequential potential rise at the struck point and the current injected into soil at the earth termination. The present work has made a detailed effort to deduce these quantities for the lightning protection scheme of the Indian satellite launch pad-I. A reduced scale model of the system with a frequency domain approach is employed for the experimental study. For further validation of the experimental approach, numerical simulations using numerical electromagnetic code-2 are also carried out on schemes involving single tower. The study results on the protection system show that the present design is quite safe with regard to top potential rise. It is shown that by connecting ground wires to the tower, its base current and, hence, the soil potential rise can be reduced. An evaluation of an alternate design philosophy involving insulated mast scheme is also made. The potential rise in that design is quantified and the possibility of a flashover to supporting tower is briefly looked into. The supporting tower is shown to have significant induced currents.
Resumo:
The legality of the operation of Google’s search engine, and its liability as an Internet intermediary, has been tested in various jurisdictions on various grounds. In Australia, there was an ultimately unsuccessful case against Google under the Australian Consumer Law relating to how it presents results from its search engine. Despite this failed claim, several complex issues were not adequately addressed in the case including whether Google sufficiently distinguishes between the different parts of its search results page, so as not to mislead or deceive consumers. This article seeks to address this question of consumer confusion by drawing on empirical survey evidence of Australian consumers’ understanding of Google’s search results layout. This evidence, the first of its kind in Australia, indicates some level of consumer confusion. The implications for future legal proceedings in against Google in Australia and in other jurisdictions are discussed.
Resumo:
Purpose The research purpose was to identify both the inspiration sources used by fast fashion designers and ways the designers sort information from the sources during the product development process. Design/methodology/approach This is a qualitative study, drawing on semi-structured interviews conducted with the members of the in-house design teams of three Australian fast fashion companies. Findings Australian fast fashion designers rely on a combination of trend data, sales data, product analysis and travel for design development ideas. The designers then use the consensus and embodiment methods to interpret and synthesise information from those inspiration sources. Research limitations/implications The empirical data used in the analysis were limited by interviewing fashion designers within only three Australian companies. Originality/value This research augments knowledge of fast fashion product development, in particular designers’ methods and approaches to product design within a volatile and competitive market.
Resumo:
The incorporation of dUMP during replication or the deamination of cytosine in DNA results in the occurrence of uracils in genomes. To maintain genomic integrity, uracil DNA glycosylases (UDGs) excise uracil from DNA and initiate the base-excision repair pathway. Here, we cloned, purified and biochemically characterized a family 5 UDG, UdgB, from Mycobacterium smegmatis to allow us to use it as a model organism to investigate the physiological significance of the novel enzyme. Studies with knockout strains showed that compared with the wild-type parent, the mutation rate of the udgB(-) strain was approximately twofold higher, whereas the mutation rate of a strain deficient in the family 1 UDG (ung(-)) was found to be similar to 8.4-fold higher. Interestingly, the mutation rate of the double-knockout (ung(-)ludgB(-)) strain was remarkably high, at similar to 19.6-fold. While CG to TA mutations predominated in the ung(-) and ung(-)/udgb(-) strains, AT to GC mutations were enhanced in the udgB(-) strain. The ung(-)/udgB(-) strain was notably more sensitive to acidified nitrite and hydrogen peroxide stresses compared with the single knockouts (ung(-) or udgB(-)). These observations reveal a synergistic effect of UdgB and Ung in DNA repair, and could have implications for the generation of attenuated strains of Mycobacterium tuberculosis.
Resumo:
Rather than a single focus on assessing risk and diagnosing deficit, this book recognises that our child protection systems bear down disproportionately on those from disadvantaged and marginalised communities and argues that what is needed is real support and practical assistance for poor and vulnerable parents and children. It uses real-world case examples to illustrate the relevant ethical and practice principles, and ways in which students and practitioners can practise ethically when dealing with complex, multi-faceted issues.
Resumo:
This paper reports on a study of 25 nonprofit human service organisations offering four types of human services. The purpose of the study was first to explore the manner in which consumer rights are both conceptualized and operationalized in the nonprofit human service context. Secondly the study explored whether differences occur between organisations whose primary funding body emphasized the importance of a rights framework in its program delivery and those where this is not the case.
Resumo:
Evaluation and design of shore protection works in the case of tsunamis assumes considerable importance in view of the impact it had in the recent tsunami of 26th December 2004 in India and other countries in Asia. The fact that there are no proper guidelines have made in the matters worse and resulted in the magnitude of damage that occurred. Survey of the damages indicated that the scour as a result of high velocities is one of the prime reasons for damages in the case of simple structures. It is revealed that sea walls in some cases have been helpful to minimize the damages. The objective of this paper is to suggest that design of shore line protection systems using expected wave heights that get generated and use of flexible systems such as geocells is likely to give a better protection. The protection systems can be designed to withstand the wave forces that corresponding to different probabilities of incidence. A design approach of geocells protection system is suggested and illustrated with reference to the data of wave heights in the east coast of India.
Resumo:
BACKGROUND: Earlier we reported that an oral administration of two mannose-specific dietary lectins, banana lectin (BL) and garlic lectin (GL), led to an enhancement of hematopoietic stem and progenitor cell (HSPC) pool in mice. STUDY DESIGN AND METHODS: Cord blood–derived CD34+ HSPCs were incubated with BL, GL, Dolichos lectin (DL), or artocarpin lectin (AL) for various time periods in a serum- and growth factor–free medium and were subjected to various functional assays. Reactive oxygen species (ROS) levels were detected by using DCHFDA method. Cell fractionation was carried out using lectin-coupled paramagnetic beads. RESULTS: CD34+ cells incubated with the lectins for 10 days gave rise to a significantly higher number of colonies compared to the controls, indicating that all four lectins possessed the capacity to protect HSPCs in vitro. Comparative analyses showed that the protective ability of BL and GL was better than AL and DL and, therefore, further experiments were carried out with them. The output of long-term culture-initiating cell (LTC-IC) and extended LTC-IC assays indicated that both BL and GL protected primitive stem cells up to 30 days. The cells incubated with BL or GL showed a substantial reduction in the ROS levels, indicating that these lectins protect the HSPCs via antioxidant mechanisms. The mononuclear cell fraction isolated by lectin-coupled beads got enriched for primitive HSPCs, as reflected in the output of phenotypic and functional assays. CONCLUSION: The data show that both BL and GL protect the primitive HSPCs in vitro and may also serve as cost-effective HSPC enrichment tools.
Resumo:
"The Protection of Traditional Knowledge Associated with Genetic Resources: The Role of Databases and Registers" ABSTRACT Yovana Reyes Tagle The misappropriation of TK has sparked a search for national and international laws to govern the use of indigenous peoples knowledge and protection against its commercial exploitation. There is a widespread perception that biopiracy or illegal access to genetic resources and associated traditional knowledge (TK) continues despite national and regional efforts to address this concern. The purpose of this research is to address the question of how documentation of TK through databases and registers could protect TK, in light of indigenous peoples increasing demands to control their knowledge and benefit from its use. Throughout the international debate over the protection of TK, various options have been brought up and discussed. At its core, the discussion over the legal protection of TK comes down to these issues: 1) The doctrinal question: What is protection of TK? 2) The methodological question: How can protection of TK be achieved? 3) The legal question: What should be protected? And 4) The policy questions: Who has rights and how should they be implemented? What kind of rights should indigenous peoples have over their TK? What are the central concerns the TK databases want to solve? The acceptance of TK databases and registers may bring with it both opportunities and dangers. How can the rights of indigenous peoples over their documented knowledge be assured? Documentation of TK was envisaged as a means to protect TK, but there are concerns about how documented TK can be protected from misappropriation. The methodology used in this research seeks to contribute to the understanding of the protection of TK. The steps taken in this research attempt to describe and to explain a) what has been done to protect TK through databases and registers, b) how this protection is taking place, and c) why the establishment of TK databases can or cannot be useful for the protection of TK. The selected case studies (Peru and Venezuela) seek to illustrate the complexity and multidisciplinary nature of the establishment of TK databases, which entail not only legal but also political, socio-economic and cultural issues. The study offers some conclusions and recommendations that have emerged after reviewing the national experiences, international instruments, work of international organizations, and indigenous peoples perspectives. This thesis concludes that if TK is to be protected from disclosure and unauthorized use, confidential databases are required. Finally, the TK database strategy needs to be strengthened by the legal protection of the TK itself.