915 resultados para Data reporting
Resumo:
Background: International data on child maltreatment are largely derived from child protection agencies, and predominantly report only substantiated cases of child maltreatment. This approach underestimates the incidence of maltreatment and makes inter-jurisdictional comparisons difficult. There has been a growing recognition of the importance of health professionals in identifying, documenting and reporting suspected child maltreatment. This study aimed to describe the issues around case identification using coded morbidity data, outline methods for selecting and grouping relevant codes, and illustrate patterns of maltreatment identified. Methods: A comprehensive review of the ICD-10-AM classification system was undertaken, including review of index terms, a free text search of tabular volumes, and a review of coding standards pertaining to child maltreatment coding. Identified codes were further categorised into maltreatment types including physical abuse, sexual abuse, emotional or psychological abuse, and neglect. Using these code groupings, one year of Australian hospitalisation data for children under 18 years of age was examined to quantify the proportion of patients identified and to explore the characteristics of cases assigned maltreatment-related codes. Results: Less than 0.5% of children hospitalised in Australia between 2005 and 2006 had a maltreatment code assigned, almost 4% of children with a principal diagnosis of a mental and behavioural disorder and over 1% of children with an injury or poisoning as the principal diagnosis had a maltreatment code assigned. The patterns of children assigned with definitive T74 codes varied by sex and age group. For males selected as having a maltreatment-related presentation, physical abuse was most commonly coded (62.6% of maltreatment cases) while for females selected as having a maltreatment-related presentation, sexual abuse was the most commonly assigned form of maltreatment (52.9% of maltreatment cases). Conclusion: This study has demonstrated that hospital data could provide valuable information for routine monitoring and surveillance of child maltreatment, even in the absence of population-based linked data sources. With national and international calls for a public health response to child maltreatment, better understanding of, investment in and utilisation of our core national routinely collected data sources will enhance the evidence-base needed to support an appropriate response to children at risk.
Resumo:
Background: Internationally, research on child maltreatment-related injuries has been hampered by a lack of available routinely collected health data to identify cases, examine causes, identify risk factors and explore health outcomes. Routinely collected hospital separation data coded using the International Classification of Diseases and Related Health Problems (ICD) system provide an internationally standardised data source for classifying and aggregating diseases, injuries, causes of injuries and related health conditions for statistical purposes. However, there has been limited research to examine the reliability of these data for child maltreatment surveillance purposes. This study examined the reliability of coding of child maltreatment in Queensland, Australia. Methods: A retrospective medical record review and recoding methodology was used to assess the reliability of coding of child maltreatment. A stratified sample of hospitals across Queensland was selected for this study, and a stratified random sample of cases was selected from within those hospitals. Results: In 3.6% of cases the coders disagreed on whether any maltreatment code could be assigned (definite or possible) versus no maltreatment being assigned (unintentional injury), giving a sensitivity of 0.982 and specificity of 0.948. The review of these cases where discrepancies existed revealed that all cases had some indications of risk documented in the records. 15.5% of cases originally assigned a definite or possible maltreatment code, were recoded to a more or less definite strata. In terms of the number and type of maltreatment codes assigned, the auditor assigned a greater number of maltreatment types based on the medical documentation than the original coder assigned (22% of the auditor coded cases had more than one maltreatment type assigned compared to only 6% of the original coded data). The maltreatment types which were the most ‘under-coded’ by the original coder were psychological abuse and neglect. Cases coded with a sexual abuse code showed the highest level of reliability. Conclusion: Given the increasing international attention being given to improving the uniformity of reporting of child-maltreatment related injuries and the emphasis on the better utilisation of routinely collected health data, this study provides an estimate of the reliability of maltreatment-specific ICD-10-AM codes assigned in an inpatient setting.
Resumo:
Despite optimistic claims about the research-teaching nexus, Australian academics still face tension between research and teaching. The teaching and research priorities, beliefs and behaviours of 70 Professorial and Associate Professorial academics in Science, Information Technology and Engineering were examined in this study. The academics from 4 faculties in 3 Australian universities, were asked to rank 16 research activities and 16 matched learning and teaching (L&T) activities from each of three perspectives: job satisfaction, leadership behaviour, and perceptions of professional importance. The findings, which were remarkably consistent across the three universities, were unequivocally in favour of Research. The only L&T activity that was ranked consistently well was “Improving student satisfaction ratings for Teaching”. The data demonstrates that Australian government and university initiatives to raise the status of L&T activity are not impacting significantly on Australia’s future leaders of university learning.
Resumo:
A Wireless Sensor Network (WSN) is a set of sensors that are integrated with a physical environment. These sensors are small in size, and capable of sensing physical phenomena and processing them. They communicate in a multihop manner, due to a short radio range, to form an Ad Hoc network capable of reporting network activities to a data collection sink. Recent advances in WSNs have led to several new promising applications, including habitat monitoring, military target tracking, natural disaster relief, and health monitoring. The current version of sensor node, such as MICA2, uses a 16 bit, 8 MHz Texas Instruments MSP430 micro-controller with only 10 KB RAM, 128 KB program space, 512 KB external ash memory to store measurement data, and is powered by two AA batteries. Due to these unique specifications and a lack of tamper-resistant hardware, devising security protocols for WSNs is complex. Previous studies show that data transmission consumes much more energy than computation. Data aggregation can greatly help to reduce this consumption by eliminating redundant data. However, aggregators are under the threat of various types of attacks. Among them, node compromise is usually considered as one of the most challenging for the security of WSNs. In a node compromise attack, an adversary physically tampers with a node in order to extract the cryptographic secrets. This attack can be very harmful depending on the security architecture of the network. For example, when an aggregator node is compromised, it is easy for the adversary to change the aggregation result and inject false data into the WSN. The contributions of this thesis to the area of secure data aggregation are manifold. We firstly define the security for data aggregation in WSNs. In contrast with existing secure data aggregation definitions, the proposed definition covers the unique characteristics that WSNs have. Secondly, we analyze the relationship between security services and adversarial models considered in existing secure data aggregation in order to provide a general framework of required security services. Thirdly, we analyze existing cryptographic-based and reputationbased secure data aggregation schemes. This analysis covers security services provided by these schemes and their robustness against attacks. Fourthly, we propose a robust reputationbased secure data aggregation scheme for WSNs. This scheme minimizes the use of heavy cryptographic mechanisms. The security advantages provided by this scheme are realized by integrating aggregation functionalities with: (i) a reputation system, (ii) an estimation theory, and (iii) a change detection mechanism. We have shown that this addition helps defend against most of the security attacks discussed in this thesis, including the On-Off attack. Finally, we propose a secure key management scheme in order to distribute essential pairwise and group keys among the sensor nodes. The design idea of the proposed scheme is the combination between Lamport's reverse hash chain as well as the usual hash chain to provide both past and future key secrecy. The proposal avoids the delivery of the whole value of a new group key for group key update; instead only the half of the value is transmitted from the network manager to the sensor nodes. This way, the compromise of a pairwise key alone does not lead to the compromise of the group key. The new pairwise key in our scheme is determined by Diffie-Hellman based key agreement.
Resumo:
The Queensland Building Services Authority (QBSA) regulates the construction industry in Queensland, Australia, with licensing requirements creating differential financial reporting obligations, depending on firm size. Economic theories of regulation and behaviour provide a framework for investigating effects of the financial constraints and financial reporting requirements imposed by QBSA licensing. Data are analysed for all small and medium construction entities operating in Queensland between 2001 and 2006. Findings suggesting that construction licensees are categorizing themselves as smaller to avoid the more onerous and costly financial reporting of higher licensee categories are consistent with US findings from the 2002 Sarbanes-Oxley (SOX) regulation which created incentives for small firms to stay small to avoid the costs of compliance with more onerous financial reporting requirements. Such behaviour can have the undesirable economic consequences of adversely affecting employment, investment, wealth creation and financial stability. Insights and implications from the analysed QBSA processes are important for future policy reform and design, and useful to be considered where similar regulatory approaches are planned.
Resumo:
This study examines how both the level and the nature of environmental information voluntarily disclosed by Australian firms relate to their underlying environmental performance. Disclosure is scored using an index developed by Clarkson et al. (2008) based on Global Reporting Initiative (GRI) Guidelines and the environmental performance measure is based on emission data available from the National Pollutant Inventory (NPI). The sample consists of 51 firms that reported to the NPI in both 2002 and 2006. The findings are as follows. First, descriptive statistics indicate that while there was modest improvement in disclosure between 2002 and 2006, the highest disclosure score obtained was just slightly in excess of 50% of the maximum available based on the GRI Guidelines. Second, the results consistently indicate that not only do firms with a higher pollution propensity disclose more environmental information; they also rely on disclosures that the GRI views as inherently more objective and verifiable. Taken together, these results suggest that concerns regarding the reliability of voluntary environmental disclosures in the Australian context remain valid and thereby potentially signal a need for both enhanced mandatory reporting requirements and improved enforcement. In this regard, our study also informs regulatory policy on mandatory disclosures of environmental performance.
Resumo:
Significant numbers of children are severely abused and neglected by parents and caregivers. Infants and very young children are the most vulnerable and are unable to seek help. To identify these situations and enable child protection and the provision of appropriate assistance, many jurisdictions have enacted ‘mandatory reporting laws’ requiring designated professionals such as doctors, nurses, police and teachers to report suspected cases of severe child abuse and neglect. Other jurisdictions have not adopted this legislative approach, at least partly motivated by a concern that the laws produce dramatic increases in unwarranted reports, which, it is argued, lead to investigations which infringe on people’s privacy, cause trauma to innocent parents and families, and divert scarce government resources from deserving cases. The primary purpose of this paper is to explore the extent to which opposition to mandatory reporting laws is valid based on the claim that the laws produce ‘overreporting’. The first part of this paper revisits the original mandatory reporting laws, discusses their development into various current forms, explains their relationship with policy and common law reporting obligations, and situates them in the context of their place in modern child protection systems. This part of the paper shows that in general, contemporary reporting laws have expanded far beyond their original conceptualisation, but that there is also now a deeper understanding of the nature, incidence, timing and effects of different types of severe maltreatment, an awareness that the real incidence of maltreatment is far higher than that officially recorded, and that there is strong evidence showing the majority of identified cases of severe maltreatment are the result of reports by mandated reporters. The second part of this paper discusses the apparent effect of mandatory reporting laws on ‘overreporting’ by referring to Australian government data about reporting patterns and outcomes, with a particular focus on New South Wales. It will be seen that raw descriptive data about report numbers and outcomes appear to show that reporting laws produce both desirable consequences (identification of severe cases) and problematic consequences (increased numbers of unsubstantiated reports). Yet, to explore the extent to which the data supports the overreporting claim, and because numbers of unsubstantiated reports alone cannot demonstrate overreporting, this part of the paper asks further questions of the data. Who makes reports, about which maltreatment types, and what are the outcomes of those reports? What is the nature of these reports; for example, to what extent are multiple numbers of reports made about the same child? What meaning can be attached to an ‘unsubstantiated’ report, and can such reports be used to show flaws in reporting effectiveness and problems in reporting laws? It will be suggested that available evidence from Australia is not sufficiently detailed or strong to demonstrate the overreporting claim. However, it is also apparent that, whether adopting an approach based on public health and or other principles, much better evidence about reporting needs to be collected and analyzed. As well, more nuanced research needs to be conducted to identify what can reasonably be said to constitute ‘overreports’, and efforts must be made to minimize unsatisfactory reporting practice, informed by the relevant jurisdiction’s context and aims. It is also concluded that, depending on the jurisdiction, the available data may provide useful indicators of positive, negative and unanticipated effects of specific components of the laws, and of the strengths, weaknesses and needs of the child protection system.
Resumo:
-International recognition of need for public health response to child maltreatment -Need for early intervention at health system level -Important role of health professionals in identifying, reporting, documenting suspician of maltreatment -Up to 10% of all children presenting at ED’s are victims and without identification, 35% reinjured and 5% die -In Qld, mandatory reporting requirement for doctors and nurses for suspected abuse or neglect
Resumo:
The Australian Securities Exchange (ASX) listing rule 3.1 requires listed companies to immediately disclose price sensitive information to the market via the ASX’s Company Announcements Platform (CAP) prior to release through other disclosure channels. Since 1999, to improve the communication process, the ASX has permitted third-party mediation in the disclosure process that leads to the release of an Open Briefing (OB) through CAP. An OB is an interview between senior executives of the firm and an Open Briefing analyst employed by Orient Capital Pty Ltd (broaching topics such as current profit and outlook). Motivated by an absence of research on factors that influence firms to use OBs as a discretionary disclosure channel, this study examines (1) Why do firms choose to release information to the market via OBs?, (2) What are the firm characteristics that explain the discretionary use of OBs as a disclosure channel?, and (3) What are the disclosure attributes that influence firms’ decisions to regularly use OBs as a disclosure channel? Based on agency and information economics theories, a theoretical framework is developed to address research questions. This theoretical framework comprises disclosure environments such as firm characteristics and external factors, disclosure attributes and disclosure consequences. In order to address the first research question, the study investigates (i) the purpose of using OBs, (2) whether firms use OBs to provide information relating to previous public announcements, and (3) whether firms use OBs to provide routine or non-routine disclosures. In relation to the second and third research questions, hypotheses are developed to test factors expected to explain the discretionary use of OBs and firms’ decisions to regularly use OBs, and to explore the factors influencing the nature of OB disclosure. Content analysis and logistic regression models are used to investigate the research questions and test the hypotheses. Data are drawn from a hand-collected population of 1863 OB announcements issued by 239 listed firms between 2000 and 2010. The results show that types of information disclosed via an OB announcement are principally on matters relating to corporate strategies and performance and outlook. Most OB announcements are linked with a previous related announcement, with the lag between announcements significantly longer for loss-making firms than profitmaking firms. The main results show that firms which tend to be larger, have an analyst following, and have higher growth opportunities, are more likely to release OBs. Further, older firms and firms that release OB announcements containing good news, historical information and less complex information tend to be regular OB users. Lastly, firms more likely to disclose strategic information via OBs tend to operate in industries facing greater uncertainty, do not have analysts following, and have higher growth opportunities are less likely to disclose good news, historical information and complex information via OBs. This study is expected to contribute to disclosure literature in terms of disclosure attributes and firm characteristics that influence behaviour in this unique (OB) disclosure channel. With regard to practical significance, regulators can gain an understanding of how OBs are disclosed which can assist them in monitoring the use of OBs and improving the effectiveness of communications with stakeholders. In addition, investors can have a better comprehension of information contained in OB announcements, which may in turn better facilitate their investment decisions.
Resumo:
Mandatory child abuse and neglect reporting laws apply to teachers in many countries of the world. However, such laws have not yet been introduced for teachers in Malaysia, and there is debate about whether the laws should be extended to teachers at all. This paper aimed to investigate the level of support among teachers to assume mandatory reporting duties and to identify factors determining this support in Malaysia. A total of 668 teachers from 14 randomly selected public primary schools completed an anonymous self-administered questionnaire. Results showed that 44.4 per cent of the respondents supported legislation requiring teachers to report child abuse. Teachers of Indian ethnicity, those with a shorter duration of service in teaching (< 5 years), the availability of knowledgeable and supportive school staff and a higher level of commitment to reporting were significant factors affecting teachers' support for mandatory reporting. This study provides important insights into factors influencing teachers' support for the introduction of mandatory reporting legislation for teachers in Malaysia. Teachers do not unanimously support these laws and there is a lack of clarity about what such laws will mean for teachers. The data highlight the need for specific training programmes to raise teachers' awareness, build their confidence and enhance their willingness to report child abuse.
Resumo:
Objective: Comprehensive, accurate information about road crashes and related trauma is a prerequisite for identification and control of risk factors as well as for identifying faults within the broader road safety system. Quality data and appropriate crash investigation are critical in reducing the road toll that is rapidly growing in much of the developing world, including Pakistan. This qualitative research explored the involvement of social and cultural factors (in particular, fatalism) in risky road use in Pakistan. The findings highlight a significant issue, previously unreported in the road safety literature, namely, the link between fatalistic beliefs and inaccurate reporting of road crashes. Method: Thirty interviews (one-to one) were conducted by the first author with police officers, drivers, policy makers and religious orators in three Pakistani cities. Findings: Evidence emerged of a strong link between fatalism and the under-reporting of road crashes. In many cases, crashes and related road trauma appear to go unreported because a crash is considered to be one’s fate and, therefore, beyond personal control. Fate was also implicated in the practice of reconciliation between parties after a crash without police involvement and the seeking and granting of pardon for a road death. Conclusions: These issues represent additional factors that can contribute to under-reporting of crashes and associated trauma. Together, they highlight complications involved in establishing the true cost of road trauma in a country such as Pakistan and the difficulties faced when attempting to promote scientifically-based road safety information to counteract faith-based beliefs.
Resumo:
Recently there has been significant interest of researchers and practitioners on the use of Bluetooth as a complementary transport data. However, literature is limited with the understanding of the Bluetooth MAC Scanner (BMS) based data acquisition process and the properties of the data being collected. This paper first provides an insight on the BMS data acquisition process. Thereafter, it discovers the interesting facts from analysis of the real BMS data from both motorway and arterial networks of Brisbane, Australia. The knowledge gained is helpful for researchers and practitioners to understand the BMS data being collected which is vital to the development of management and control algorithms using the data.
Resumo:
Organisations are constantly seeking efficiency gains for their business processes in terms of time and cost. Management accounting enables detailed cost reporting of business operations for decision making purposes, although significant effort is required to gather accurate operational data. Process mining, on the other hand, may provide valuable insight into processes through analysis of events recorded in logs by IT systems, but its primary focus is not on cost implications. In this paper, a framework is proposed which aims to exploit the strengths of both fields in order to better support management decisions on cost control. This is achieved by automatically merging cost data with historical data from event logs for the purposes of monitoring, predicting, and reporting process-related costs. The on-demand generation of accurate, relevant and timely cost reports, in a style akin to reports in the area of management accounting, will also be illustrated. This is achieved through extending the open-source process mining framework ProM.
Resumo:
Despite plentiful efforts to identify perpetrator, victim, and incident characteristics correlated with reporting violence against women to police, few studies have addressed the contexts that shape such reporting. Even fewer have examined variations in these contexts across geographic areas. Drawing upon National Crime Victimization Survey data from 1992 through 2009, this paper uses conjunctive analysis of case configurations to identify and investigate the dominant situational contexts of reporting of violence against women to police across rural, suburban, and urban areas. Our findings show that context matters and the importance of incident, perpetrator, and victim characteristics vary across geographic areas.
Resumo:
This Technical and Background Paper summarises the results of a Australian Government Attorney-General’s Department’s funded project. The project aimed to clarify the contribution of the community night patrol program in the Northern Territory (NT) to improving the community safety of Indigenous communities. The paper recommends an improved framework for monitoring performance and reporting. Community night patrols or similar services operate in many other areas of Australia and internationally. The paper concludes that the core business of community night patrols is (non-crisis) crime prevention not defacto policing. It also concludes that an unrecognised outcome of patrols is capturing and sharing local knowledge about community safety issues and solutions. Over time, community night patrols should focus on working with other services to reduce the need for repeat assistance to persons at risk and for risky incidents. The recently released Northern Territory Emergency Response Evaluation Report (2011) confirmed that communities and service providers surveyed largely support night patrols, but better data is required to more comprehensively assess their performance.