890 resultados para SHARED RESPONSABILITY
Resumo:
Since the outbreak of Severe Acute Respiratory Syndrome (SARS) in 2003, there has been much discussion about whether the international community has moved into a new post-Westphalian era, where states increasingly recognize certain shared norms that guide what they ought to do in responding to infectious disease outbreaks. In this article I identify this new obligation as the ‘duty to report’, and examine competing accounts on the degree to which states appreciate this new obligation are considered by examining state behaviour during the H5N1 human infectious outbreaks in East Asia (since 2004). The article examines reporting behaviour for H5N1 human infectious cases in Cambodia, China, Indonesia, Thailand and Vietnam from 2004 to 2010. The findings lend strong support to the claim that East Asian states have come to accept and comply with the duty to report infectious disease outbreaks and that the assertions of sovereignty in response to global health governance frameworks have not systematically inhibited reporting compliance.
Resumo:
Aggressive behavior at the steering wheel has been indicated as a contributing factor in a majority of crashes and anger has been compared to alcohol impairment in terms of probability to cause a crash. It has been shown that being in a state of anger or excitement while driving can decrease the drivers’ performances. . This paper reports the evaluation of 6 novel design alternatives of In-Vehicle Information Systems (IVIS) aimed at mitigating driver aggression. Each application presented was designed to tackle the following contributing factors to driver aggression: competitiveness, anonymity, territoriality, stress as well as social and emotional isolation. The 6 applications were simulated using computer vision algorithm to automatically overlay the real traffic conditions with ‘Head-Up Display’ visualizations. Two applications emerged over the others from participant’s evaluation: shared music combined the known calming effect of music with the sense of sympathy and intimacy caused by hearing other drivers’ music. The Shared Snapshot application provided an immediate gratification and was evaluated as a potential prevention of roadside quarrels. The paper presents Theoretical foundation, participant’s evaluations, implications and limitations of the study.
Resumo:
The changing and challenging conditions of the 21st century have been significantly impacting our economy, society and built and natural environments. Today generation of knowledge—mostly in the form of technology and innovation—is seen as a panacea for the adaptation to changes and management of challenges (Yigitcanlar, 2010a). Making space and place that concentrate on knowledge generation, thus, has become a priority for many nations (van Winden, 2010). Along with this movement, concepts like knowledge cities and knowledge precincts are coined as places where citizenship undertakes a deliberate and systematic initiative for founding its development on the identification and sustainable balance of its shared value system, and bases its ability to create wealth on its capacity to generate and leverage its knowledge capabilities (Carrillo, 2006; Yigitcanlar, 2008a). In recent years, the term knowledge precinct (Hu & Chang, 2005) in its most contemporary interpretation evolved into knowledge community precinct (KCP). KCP is a mixed-use post-modern urban setting—e.g., flexible, decontextualized, enclaved, fragmented—including a critical mass of knowledge enterprises and advanced networked infrastructures, developed with the aim of collecting the benefits of blurring the boundaries of living, shopping, recreation and working facilities of knowledge workers and their families. KCPs are the critical building blocks of knowledge cities, and thus, building successful KCPs significantly contributes to the formation of prosperous knowledge cities. In the literature this type of development—a place containing economic prosperity, environmental sustainability, just socio‐spatial order and good governance—is referred as knowledge-based urban development (KBUD). This chapter aims to provide a conceptual understanding on KBUD and its contribution to the building of KCPs that supports the formation of prosperous knowledge cities.
Resumo:
Background Engaging clients in psychotherapy by managing their expectations is important for therapeutic success. Initial moments in first sessions of therapy are thought to afford an opportunity to establish a shared understanding of how therapy will proceed. However there is little evidence from analysis of actual sessions of therapy to support this. Objective This study utilised recordings to examine how therapists manage clients’ expectations during the first two sessions of online Cognitive Behavioural Therapy (CBT). Methods Expectation management was investigated through conversation analysis of sessions from 176 client-therapist dyads involved in online CBT. The primary focus of analysis was expectation management during the initial moments of first sessions, with a secondary focus on expectations at subsequent points. Analysis Clients’ expectations for therapy were most commonly managed during the initial moments of first sessions of therapy. At this point, most therapists either outlined the tasks of the first and subsequent sessions (n=36), or the first session only (n=108). On other occasions (n = 32), no attempt was made to manage clients’ expectations by outlining what would happen in therapy. Observations of the interactional consequences of such an absence suggest clients may struggle to engage with the therapeutic process in the absence of appropriate expectation management by therapists. Conclusion Clients may more readily engage from the outset of therapy when provided with an explanation that manages their expectation of what is involved. Therapists can accomplish this by projecting how therapy will proceed, particularly beyond the initial session.
Resumo:
We consider the following problem: users in a dynamic group store their encrypted documents on an untrusted server, and wish to retrieve documents containing some keywords without any loss of data confidentiality. In this paper, we investigate common secure indices which can make multi-users in a dynamic group to obtain securely the encrypted documents shared among the group members without re-encrypting them. We give a formal definition of common secure index for conjunctive keyword-based retrieval over encrypted data (CSI-CKR), define the security requirement for CSI-CKR, and construct a CSI-CKR based on dynamic accumulators, Paillier’s cryptosystem and blind signatures. The security of proposed scheme is proved under strong RSA and co-DDH assumptions.
Resumo:
This chapter examines the process of “transformative learning” for the 2008 cohort of the St. Thomas More College–Intercordia Canada (STM/IC) international community service-learning program. My primary data comes from the eight students who were part of that cohort, when I was their program coordinator. That data later became the heart of my Master’s thesis and was approved by the Research Ethics Office of the University of Saskatchewan. In this chapter I focus on three of those eight participants, outlining the critical elements of their experiences that were conducive to their transformative learning. To be sure, my sample size is too small to draw generalizable conclusions, but the quality of information I received from these students and their colleagues, coupled with the follow-up conversations I had with other educators and with the accompanying literature, supports the value of reflecting at length here about these students’ comments. I have chosen to highlight the experiences of these three participants because together they provide a range of experiences that best enables an analysis of the conditions that both did and did not lead to transformative learning. This case study suggests that transformative learning occurs through: the dynamics of vulnerability, a discovery of persisting differences within inter-personal relationships, and an experience of welcome and hospitality in the host environment. In contrast to other studies that focus on the enhanced capacities, skills and subsequent employability of participants through international education, transformative learning for these students required a relinquishing of securities, a disorientation and critical interrogation of the self, and enhanced receptivity to the newly recognized Other. Moreover, consistent with the critical-humanistic educational philosophy shared in different ways by the participants of the STM/IC program, this study suggests that international community service-learning can most responsibly contribute to good global citizenship through the construction of relationships of solidarity across difference.
Resumo:
We present a novel implementation of the threshold RSA. Our solution is conceptually simple, and leads to an easy design of the system. The signing key is shared in additive form, which is desirable for collaboratively performing cryptographic transformations, and its size, at all times, is logn, where n is the RSA modulus. That is, the system is ideal.
Resumo:
Introduction: Relatively few attempts have been made to describe and understand women’s alcohol consumption beyond adolescence and young adulthood. In particular, there has been a lack of studies focusing on the alcohol culture that surrounds and guides mature-aged women’s drinking. As part of a larger cross-national comparison, the present study sought to address this gap by identifying the shared beliefs and values that impact on drinking outcomes among mature-aged women in Sweden and Australia. Method: The study was guided by an ethnographic methodology. To generate data, a series of semi-structured interview were conducted with 17 Australian (age = 45-57 years; M = 52.1, SD = 3.9) and 19 Swedish (age = 45-58 years; M = 52.2, SD = 4.8) women. All interviews were transcribed verbatim and thematically analysed. Results: With age, the focus of alcohol as a single purpose vehicle for intoxication had given way to a focus on the enjoyment and ritual of drinking itself; taste had become increasingly important and alcohol was strongly associated with pleasurable environments and experiences. The view of alcohol as a taste experience was particularly pronounced among the Swedish women, with alcohol (most commonly wine) often seen as inseparable from food. Among the Swedish women, this view of alcohol was also associated with a strong de-emphasis of the pharmacological effects of alcohol. In contrast, several Australian women understood and used alcohol as relief for anxiety and stress. Moderate drinking was linked to the social construction of both age and gender in the two samples, while heavy or abusive alcohol consumption was associated with strong proscriptive norms and stigma. Conclusions: Australian and Swedish women share a number of beliefs and values around alcohol, however, these findings also show unique country-level differences. Implications for drinking outcomes are discussed.
Resumo:
Business transformation is, without any doubt, one of those concepts attracting substantial attention in the boardrooms of corporations. However, and not uncommon for an emerging approach, there is currently a plethora of viewpoints on the core characteristics of a business transformation. Unlike well-established approaches such as change, lean, or quality management, business transformation is still under-specified in terms of methodologies and techniques. This status compromises the reaching of shared understanding and progress in an area of ever increasing importance. Motivated by this lack of consensus, this article proposes a new typology of business transformations based on the assessment of 20 global case studies
Resumo:
To prevent unauthorized access to protected trusted platform module (TPM) objects, authorization protocols, such as the object-specific authorization protocol (OSAP), have been introduced by the trusted computing group (TCG). By using OSAP, processes trying to gain access to the protected TPM objects need to prove their knowledge of relevant authorization data before access to the objects can be granted. Chen and Ryan’s 2009 analysis has demonstrated OSAP’s authentication vulnerability in sessions with shared authorization data. They also proposed the Session Key Authorization Protocol (SKAP) with fewer stages as an alternative to OSAP. Chen and Ryan’s analysis of SKAP using ProVerif proves the authentication property. The purpose of this paper was to examine the usefulness of Colored Petri Nets (CPN) and CPN Tools for security analysis. Using OSAP and SKAP as case studies, we construct intruder and authentication property models in CPN. CPN Tools is used to verify the authentication property using a Dolev–Yao-based model. Verification of the authentication property in both models using the state space tool produces results consistent with those of Chen and Ryan.
Resumo:
User-generated content where content is created and shared among consumers is of key importance to marketers. This study investigates consumer intrinsic and extrinsic motivation to understand why people create user-generated branded video content. Specifically, we examine the role of altruism (individual difference – intrinsic motivation), social benefits (extrinsic reward), and economic incentives (extrinsic reward) on intentions to create user-generated content. Results show that extrinsic rewards (economic incentives) result in more positive intentions to create user-generated content than intrinsic motivations. However, an effect for altruism is also evident revealing that high altruism consumers are more likely to create positive user-generated content. The implication of these findings is that marketers wanting to encourage user-generated content about their brands should target high altruism consumers and offer economic incentives for content creation.
Resumo:
Objective To describe women’s reports of the model of care options General Practitioners (GPs) discussed with them at the first pregnancy consultation and women’s self-reported role in decisionmaking about model of care. Methods Women who had recently given birth responded to survey items about the models of care GPs discussed, their role in final decision-making, and socio-demographic, obstetric history, and early pregnancy characteristics. Results The proportion of women with whom each model of care was discussed varied between 8.2% (for private midwifery care with home birth) and 64.4% (GP shared care). Only 7.7% of women reported that all seven models were discussed. Exclusive discussion about private obstetric care and about all public models was common, and women’s health insurance status was the strongest predictor of the presence of discussions about each model. Most women (82.6%) reported active involvement in final decision-making about model of care. Conclusion Although most women report involvement in maternity model of care decisions, they remain largely uninformed about the breadth of available model of care options. Practical implications Strategies that facilitate women’s access to information on the differentiating features and outcomes for all models of care should be prioritized to better ensure equitable and quality decisions.
Resumo:
This tutorial primarily focuses on the technical challenges surrounding the design and implementation of Accountable-eHealth (AeH) systems. The potential benefits of shared eHealth records systems are promising for the future of improved healthcare; however, their uptake is hindered by concerns over the privacy and security of patient information. In the current eHealth environment, there are competing requirements between healthcare consumers' (i.e. patients) requirements and healthcare professionals' requirements. While consumers want control over their information, healthcare professionals want access to as much information as required in order to make well informed decisions. This conflict is evident in the review of Australia's PCEHR system. Accountable-eHealth systems aim to balance these concerns by implementing Information Accountability (IA) mechanisms. AeH systems create an eHealth environment where health information is available to the right person at the right time without rigid barriers whilst empowering the consumers with information control and transparency, thus, enabling the creation of shared eHealth records that can be useful to both patients and HCPs. In this half-day tutorial, we will discuss and describe the technical challenges surrounding the implementation of AeH systems and the solutions we have devised. A prototype AeH system will be used to demonstrate the functionality of AeH systems, and illustrate some of the proposed solutions. The topics that will be covered include: designing for usability in AeH systems, the privacy and security of audit mechanisms, providing for diversity of users, the scalability of AeH systems, and finally the challenges of enabling research and Big Data Analytics on shared eHealth Records while ensuring accountability and privacy are maintained.
Resumo:
Non-profit organisations in the aged care sector are currently under pressure from more than just a sheer increase of customers. A need to respond to changing legislative requirements, increased expectations from customers and increasing likelihood of shortage in appropriate experienced staff are also contributing to instability within the sector. This paper will present a longitudinal action research study of a non-profit organisation revisiting its core purpose of providing relevant services and attempting to build a customer-centric method for addressing the current and upcoming change drivers in an Australian aged care context. The study found Design- Led Innovation to be an effective methodology for capturing deep customer insights and conceptualising new business models which address the prevalent change drivers. This paper details a design-led approach to innovation, tailored to a non-profit organisation seeking to better understand its stakeholders and redefine its value offering.
Resumo:
In January 2011 a swollen Brisbane River broke its banks flooding riverside houses and buildings. The river’s water spread and rose up through storm water drains inundating some 20 000 houses in low-lying land. As the water receded those residents affected by the floods returned to their homes to assess the damage. While some people breathed a sigh of relief others were devastated by the overwhelming damage to their homes and personal belongings. Over the next few weeks the landscape of Brisbane was altered not merely by the mud and debris left by the torrent of water, but by the piles of domestic contents occupying Brisbane streets. Beds, toys, cabinets, plasterboard, tiles and household furniture lined curbsides waiting for collection. Later they would accumulate in public parks and sports centres to await disposal, momentarily creating an unsettling landscape of discarded domestic interiors. While most houses remained standing the heart breaking repercussions were evident in their interiority. Thousands of volunteers flocked to help those affected by the floods to purge the damage left by the water – removing wall and floor linings, discarding furniture and spoilt belongings. In her paper on Hurricane Katrina, Julieanna Preston wrote, ‘What anthropological evidence would we find as we followed their migration – heaps left by the side of the road, the physical weight overcoming the personal value…’ For many of the post flood restored homes and buildings entire interiors have been replaced, eradicating any trace of the significant event that disturbed them only months earlier. There were artifacts that would have survived the floods - furniture of solid timber – these were discarded and with them the patina that marked an important event in history. The patina is beyond technological reproducibility, and as Walter Benjamin writes, this being the whole premise of genuineness. It is the role of the French Polisher to maintain the true wear of the artefact for it is the patina that is most valuable in its ability to narrate the history of a piece. In 2012 two separate exhibitions in Brisbane will take place to display a selected collection of flood-damaged artefacts. This orchestrated way to commemorate the damage left by floods may be a method to compensate for the haste in which the damage was purged from the city. This need for exhibiting damaged artifacts illustrates Andreas Huyssen’s point that "…today memory is understood as a mode of re-presentation and as belonging to the present." This research looks at the dying trade of the French Polisher through conversations and a visual study of flood damaged furniture. The research also investigates the personal loss of artifacts through intimate stories shared by flood victims. This paper seeks to understand why so much was discarded and celebrate what remains.