906 resultados para Supplemental security income program


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Introduction: Dental and medical students worldwide, including in Saudi Arabia, have been reported to have a high incidence of poor psychological health, such as depression, stress, anxiety, and lowlife satisfaction. Self-development coaching programs have become an increasingly popular way to improve individuals’ lives. However, few studies have evaluated the psychological effects of such programs among dental and medical students. Moreover, no studies have been conducted on self-development coaching programs in Saudi Arabia. Aims: The aim of this study was to assess the feasibility of a larger study via a pilot study and to acquire preliminary findings about the effectiveness of a self-development coaching program on psychological health among dental and medical students in Saudi Arabia. Methods: A pre-post interventional study design was used to test a self-development coaching program (How to be an Ultra-Super Student) with a sample of medical students (n=17) at Umm Al-Qura University at Saudi Arabia. The outcome measures were students’ psychological distress (depression, anxiety, and stress), life satisfaction, self-efficacy, the coach, and coaching program characteristics. Results: The study showed that there was a significant improvement in depression (p=0.04), self-efficacy (p=0.02), and satisfaction with life (p=0.04), which supported the feasibility of a large study in the future. Conclusions: The study’s findings encourage the implementation of a randomized, controlled trial study with a larger sample to further test the effectiveness of using self-development coaching programs with medical and dental students in Saudi Arabia to improve their psychological health.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article proposes that a paradigm shift that has implications for practitioners of parenting interventions is emerging. This shift represents a challenge to the dominant model of parent training. The Triple P Parenting Program is discussed as an example of parent training programme to highlight the relevant issues for practitioners, including common practitioner objections encountered in dissemination as identified, in part, by Mazzucchelli and Sanders. It is argued that apart fromthese objections, there are more essential concerns in relation to the adoption of parent training programmes by practitioners. Rather, the article argues that parent training is “mind-blind” and that approaches emerging from the field of interpersonal neurobiology represent developmentally sophisticated alternatives for intervention. The Circle of Security programme is discussed as one example of this emerging paradigm shift that integrates attachment, social neuroscience, and psychodynamic theory. Contrasts are highlighted between the models, and considerations for future issues in parent intervention conclude the article.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND Providing clinical pharmacy services to patients in their homes after discharge from hospital has been reported to reduce health care costs and improve outcomes. The Medication Management Program of the Fraser Health Authority involves pharmacists making home visits to provide clinical pharmacy services to elderly patients who have recently been discharged from hospital and others considered to be at high risk for adverse drug events. Although clinical and economic outcomes of this program have been evaluated, humanistic outcomes such as satisfaction have not been assessed. Moreover, very little evaluation of patient satisfaction with home pharmacy services has been reported in the literature. OBJECTIVE To evaluate patient satisfaction with the Medication Management Program. METHODS A telephone survey instrument, consisting of 7 Likert-scale items and 2 open-ended questions, was developed and administered to patients who received a home pharmacist visit between September 1 and November 23, 2011. In addition to the survey responses, demographic and clinical data for both respondents and nonrespondents were collected. RESULTS Of the 175 patients invited to participate in the survey, 103 (58.9%) agreed to participate. The majority of respondents agreed or strongly agreed with all of the survey items, indicating satisfaction with the program. For example, 97 (94%) agreed or strongly agreed that they would recommend the pharmacist home visit program continue to be available, and all 103 (100%) agreed or strongly agreed that they were satisfied with the pharmacist home visit. Respondents provided some suggestions for program improvement. CONCLUSIONS The survey findings demonstrate that patients were satisfied with the home clinical pharmacy services offered through the Fraser Health Medication Management Program.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study reports on an intervention program designed to facilitate transition to school of a whole community of Indigenous Australian children who had previously not been attending. The children were from families displaced from their traditional lands and experienced on-going social marginalisation and transience. A social capital framework was employed to track change in the children’s social inclusion and family-school engagement for two years, from school entry. Sociometric measurement and interview techniques were applied to assess the children’s social connectedness and peer relationship quality. Using these data, analyses examined whether bonding within the group supported or inhibited formation of new social relationships. Although transience disrupted attendance, there was a group trend towards increased social inclusion with some evidence that group bonds supported bridging to new social relationships. Change in family-school engagement was tracked using multi-informant interviews. Limited engagement between school and families presented an on-going challenge to sustained educational engagement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The article discusses the issues of resistance; that is resistance by prisoners to the various manifestations of power operating in high security prisons, as well as that of attempted shifts in the regime from physical to psychological control. Other topics highlighted include legitimacy and 'official discourse', mourning and the construction of 'ungrievable lives' and the importance of finding a way out of the cycle of violence, which high security regimes perpetuate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

“Food literacy” is an emerging term used to describe the relative ability to understand the nature of food and how it is important. It also describes the ability to gather, process, analyse and act upon information about food and to apply it in individual settings. A Delphi study of 43 Australian food experts from diverse sectors and settings in all states and territories explored the meaning of food literacy, its constitutive components and how they relate to nutrition. The three-round Delphi began with a semi-structured telephone interview and was followed by two online surveys. Grounded theory was used to develop a conceptual model of the relationship between food literacy and nutrition. It is proposed that food literacy influences nutrition through three related mechanisms of security, choice and pleasure. These mechanisms will be mediated by the local food supply and individual values. The relative importance of components of food literacy will depend upon these mediators. The level of nutrition outcome being sought (for example, dietary guidelines versus food group serves) will also influence the relative importance of these components. This model will be useful in informing program planning and evaluation and will be tested and refined following a phenomenological study of consumers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The growing importance of logistics in increasingly globalised production and consumption systems strengthens the case for explicit consideration of the climate risks that may impact on the operation of ports in the future, as well as the formulation of adaptation responses that act to enhance their resilience. Within a logistics chain, seaports are functional nodes of significant strategic importance, and are considered as critical gateways linking local and national supply chains to global markets. However, they are more likely to be exposed to vagaries of climate-related extreme events due to their coastal locations. As such, they need to be adaptive and respond to the projected impacts of climate change, in particular extreme weather events. These impacts are especially important in the logistics context as they could result in varying degrees of business interruption; including business closure in the worst case scenario. Since trans-shipment of freight for both the import and export of goods and raw materials has a significant impact on Australia’s sustained economic growth it was considered important to undertake a study of port functional assets, to assess their vulnerability to climate change, to model the potential impacts of climate-related extreme events, and to highlight possible adaptation responses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For over 150 years Australia has exported bulk, undifferentiated, commodities such as wool, wheat, meat and sugar to the UK and more recently to Japan, Korea, and the Middle East. It is estimated that, each year, Australia's farming system feeds a domestic population of some 22 million people, while exporting enough food to feed another 40 million. With the Australian population expected to double in the next 40 years, and with the anticipated growth in the world's population to reach a level of some 9 billion (from its present level of 7 billion) in the same period, there are strong incentives for an expansion of food production in Australia. Neoliberal settings are encouraging this expansion at the same time as they are facilitating importation of foods, higher levels of foreign direct investment and the commoditisation of resources (such as water). Yet, expansion in food production – and in an era of climate change – will continue to compromise the environment. After discussing Australia's neoliberal framework and its relation to farming, this paper outlines how Australia is attempting to address the issue of food security. It argues that productivist farming approaches that are favoured by both industry and government are proving incapable of bringing about long-term production outcomes that will guarantee national food security.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

“Supermax” prisons, conceived by the United States in the early 1980s, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country’s decision to build a supermax prison.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Responsibility to Protect and Women, Peace and Security: Aligning the Protection Agendas, editors Davies, Nwokora, Stamnes and Teitt address the intersections of the Responsibility to Protect (R2P) principle and the Women, Peace, and Security (WPS) agenda. Widespread or systematic sexual or gender-based violence is a war crime, a crime against humanity and an act of genocide, all of which are clearly addressed in the R2P principle. The protection of those at risk of widespread sexual violence is therefore not only relative to the Women, Peace and Security (WPS) agenda, but a fundamental sovereign obligation for all states as part of their commitment to R2P. Contributions from policy-makers and academics consider both the merits and the utility of aligning the protection agendas of R2P and WPS. Ultimately, a number of actionable recommendations are made concerning a unification of the agendas to best support the global empowerment of women and prevention of mass atrocities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security properties of the created CPN model are identified. After adding an attacker model to the protocol model, the security property is verified using state space method. This approach is applied to analyse a number of trusted computing protocols. The results show the applicability of proposed method to analyse both standard and user-defined properties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the past several decades, cryptographers have consistently provided us with stronger and more capable primitives and protocols that have found many applications in security systems in everyday life. One of the central tenets of cryptographic design is that, whereas a system’s architecture ought to be public and open to scrutiny, the keys on which it depends — long, utterly random, unique strings of bits — will be perfectly preserved by their owner, and yet nominally inaccessible to foes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability, are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new era of cyber warfare has appeared on the horizon with the discovery and detection of Stuxnet. Allegedly planned, designed, and created by the United States and Israel, Stuxnet is considered the first known cyber weapon to attack an adversary state. Stuxnet's discovery put a lot of attention on the outdated and obsolete security of critical infrastructure. It became very apparent that electronic devices that are used to control and operate critical infrastructure like programmable logic controllers (PLCs) or supervisory control and data acquisition (SCADA) systems lack very basic security and protection measures. Part of that is due to the fact that when these devices were designed, the idea of exposing them to the Internet was not in mind. However, now with this exposure, these devices and systems are considered easy prey to adversaries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At NDSS 2012, Yan et al. analyzed the security of several challenge-response type user authentication protocols against passive observers, and proposed a generic counting based statistical attack to recover the secret of some counting based protocols given a number of observed authentication sessions. Roughly speaking, the attack is based on the fact that secret (pass) objects appear in challenges with a different probability from non-secret (decoy) objects when the responses are taken into account. Although they mentioned that a protocol susceptible to this attack should minimize this difference, they did not give details as to how this can be achieved barring a few suggestions. In this paper, we attempt to fill this gap by generalizing the attack with a much more comprehensive theoretical analysis. Our treatment is more quantitative which enables us to describe a method to theoretically estimate a lower bound on the number of sessions a protocol can be safely used against the attack. Our results include 1) two proposed fixes to make counting protocols practically safe against the attack at the cost of usability, 2) the observation that the attack can be used on non-counting based protocols too as long as challenge generation is contrived, 3) and two main design principles for user authentication protocols which can be considered as extensions of the principles from Yan et al. This detailed theoretical treatment can be used as a guideline during the design of counting based protocols to determine their susceptibility to this attack. The Foxtail protocol, one of the protocols analyzed by Yan et al., is used as a representative to illustrate our theoretical and experimental results.