834 resultados para continuous disclosure
Resumo:
In TSPD Pty Ltd v Resortrez Pty Ltd [2008] QSC 001 Fryberg J made an order permitting the applicant to inspect and copy documents which had been produced to the court under a subpoena, but had remained in the registry. Though not essential to the decision the judgment contains some interesting discussion about the construction of r 242 of the Uniform Civil Procedure Rules 1999 (Qld) (UCPR).
Resumo:
Background When large scale trials are investigating the effects of interventions on appetite, it is paramount to efficiently monitor large amounts of human data. The original hand-held Electronic Appetite Ratings System (EARS) was designed to facilitate the administering and data management of visual analogue scales (VAS) of subjective appetite sensations. The purpose of this study was to validate a novel hand-held method (EARS II (HP® iPAQ)) against the standard Pen and Paper (P&P) method and the previously validated EARS. Methods Twelve participants (5 male, 7 female, aged 18-40) were involved in a fully repeated measures design. Participants were randomly assigned in a crossover design, to either high fat (>48% fat) or low fat (<28% fat) meal days, one week apart and completed ratings using the three data capture methods ordered according to Latin Square. The first set of appetite sensations was completed in a fasted state, immediately before a fixed breakfast. Thereafter, appetite sensations were completed every thirty minutes for 4h. An ad libitum lunch was provided immediately before completing a final set of appetite sensations. Results Repeated measures ANOVAs were conducted for ratings of hunger, fullness and desire to eat. There were no significant differences between P&P compared with either EARS or EARS II (p > 0.05). Correlation coefficients between P&P and EARS II, controlling for age and gender, were performed on Area Under the Curve ratings. R2 for Hunger (0.89), Fullness (0.96) and Desire to Eat (0.95) were statistically significant (p < 0.05). Conclusions EARS II was sensitive to the impact of a meal and recovery of appetite during the postprandial period and is therefore an effective device for monitoring appetite sensations. This study provides evidence and support for further validation of the novel EARS II method for monitoring appetite sensations during large scale studies. The added versatility means that future uses of the system provides the potential to monitor a range of other behavioural and physiological measures often important in clinical and free living trials.
Resumo:
Here we present a sequential Monte Carlo approach to Bayesian sequential design for the incorporation of model uncertainty. The methodology is demonstrated through the development and implementation of two model discrimination utilities; mutual information and total separation, but it can also be applied more generally if one has different experimental aims. A sequential Monte Carlo algorithm is run for each rival model (in parallel), and provides a convenient estimate of the marginal likelihood (of each model) given the data, which can be used for model comparison and in the evaluation of utility functions. A major benefit of this approach is that it requires very little problem specific tuning and is also computationally efficient when compared to full Markov chain Monte Carlo approaches. This research is motivated by applications in drug development and chemical engineering.
Resumo:
Pre-contractual material disclosure and representation from an insurance policy proposer is the most important element for insurers to make a decision on whether a proposer is insurable and what are the terms and conditions if the proposal by the proposer is able to be insured. The issue this thesis researches and investigates focus on the issues related to the pre-contractual non-disclosures and misrepresentations of an insured under the principle of utmost good faith, by operation of laws, can achieve with different results in different jurisdiction. A similar disputed claim involving material non-disclosed personal information or misrepresentation at the pre-contractual stage from an insured with respect to both general and life insurance policies settled by an insurer in Australia could be that the policy is set aside ab initio by the insurers in Singapore or China. The jurisdictions this thesis examines are • Australia; • Singapore; and • China including Hong Kong.
Resumo:
Most current computer systems authorise the user at the start of a session and do not detect whether the current user is still the initial authorised user, a substitute user, or an intruder pretending to be a valid user. Therefore, a system that continuously checks the identity of the user throughout the session is necessary without being intrusive to end-user and/or effectively doing this. Such a system is called a continuous authentication system (CAS). Researchers have applied several approaches for CAS and most of these techniques are based on biometrics. These continuous biometric authentication systems (CBAS) are supplied by user traits and characteristics. One of the main types of biometric is keystroke dynamics which has been widely tried and accepted for providing continuous user authentication. Keystroke dynamics is appealing for many reasons. First, it is less obtrusive, since users will be typing on the computer keyboard anyway. Second, it does not require extra hardware. Finally, keystroke dynamics will be available after the authentication step at the start of the computer session. Currently, there is insufficient research in the CBAS with keystroke dynamics field. To date, most of the existing schemes ignore the continuous authentication scenarios which might affect their practicality in different real world applications. Also, the contemporary CBAS with keystroke dynamics approaches use characters sequences as features that are representative of user typing behavior but their selected features criteria do not guarantee features with strong statistical significance which may cause less accurate statistical user-representation. Furthermore, their selected features do not inherently incorporate user typing behavior. Finally, the existing CBAS that are based on keystroke dynamics are typically dependent on pre-defined user-typing models for continuous authentication. This dependency restricts the systems to authenticate only known users whose typing samples are modelled. This research addresses the previous limitations associated with the existing CBAS schemes by developing a generic model to better identify and understand the characteristics and requirements of each type of CBAS and continuous authentication scenario. Also, the research proposes four statistical-based feature selection techniques that have highest statistical significance and encompasses different user typing behaviors which represent user typing patterns effectively. Finally, the research proposes the user-independent threshold approach that is able to authenticate a user accurately without needing any predefined user typing model a-priori. Also, we enhance the technique to detect the impostor or intruder who may take over during the entire computer session.
Resumo:
Background Insect baculovirus-produced Human immunodeficiency virus type 1 (HIV-1) Gag virus-like-particles (VLPs) stimulate good humoral and cell-mediated immune responses in animals and are thought to be suitable as a vaccine candidate. Drawbacks to this production system include contamination of VLP preparations with baculovirus and the necessity for routine maintenance of infectious baculovirus stock. We used piggyBac transposition as a novel method to create transgenic insect cell lines for continuous VLP production as an alternative to the baculovirus system. Results Transgenic cell lines maintained stable gag transgene integration and expression up to 100 cell passages, and although the level of VLPs produced was low compared to baculovirus-produced VLPs, they appeared similar in size and morphology to baculovirus-expressed VLPs. In a murine immunogenicity study, whereas baculovirus-produced VLPs elicited good CD4 immune responses in mice when used to boost a prime with a DNA vaccine, no boost response was elicited by transgenically produced VLPs. Conclusion Transgenic insect cells are stable and can produce HIV Pr55 Gag VLPs for over 100 passages: this novel result may simplify strategies aimed at making protein subunit vaccines for HIV. Immunogenicity of the Gag VLPs in mice was less than that of baculovirus-produced VLPs, which may be due to lack of baculovirus glycoprotein incorporation in the transgenic cell VLPs. Improved yield and immunogenicity of transgenic cell-produced VLPs may be achieved with the addition of further genetic elements into the piggyBac integron.
Resumo:
We review the literature on the impact of litigation risk (a form of external governance) on corporate prospective disclosure decisions as reflected in management earnings forecasts. From this analysis we identify four key areas for future research. First, litigation risk warrants more attention from researchers; currently it tends to be treated as a secondary factor impacting MEF decisions. Second, it would be informative from a governance perspective for researchers to explore why litigation risk has a differential impact on MEF decisions across countries. Third, understanding the interaction between litigation risk and forecast/firm-specific characteristics is important from management, investor and regulatory perspectives but is currently under-explored Last, research on the litigation risk and MEF attributes link is piecemeal and incomplete, requiring more integrated and expanded analysis.
Resumo:
A key strategy in facilitating learning in Open Disclosure training is the use of hypothetical, interactive scenarios called ‘simulations’. According to Clapper (2010), the ‘advantages of using simulation are numerous and include the ability to help learners make meaning of complex tasks, while also developing critical thinking and cultural skills’. Simulation, in turn, functions largely through improvisation and role-play, in which participants ‘act out’ particular roles and characters according to a given scenario, without recourse to a script. To maximise efficacy in the Open Disclosure training context, role-play requires the specialist skills of professionally trained actors. Core capacities that professional actors bring to the training process include (among others) believability, an observable and teachable skill which underpins the western traditions of actor training; and flexibility, which pertains to the actor’s ability to vary performance strategies according to the changing dynamics of the learning situation. The Patient Safety and Quality Improvement Service of Queensland Health utilises professional actors as a key component of their Open Disclosure Training Program. In engaging actors in this work, it is essential that Facilitators of Open Disclosure training have a solid understanding of the acting process: what acting is; how actors work to a brief; how they improvise; and how they sustainably manage a wide range of emotional states. In the simulation context, the highly skilled actor can optimise learning outcomes by adopting or enacting – in collaboration with the Facilitator - a pedagogical function.
Resumo:
Wires of YBa2Cu3O7-x were fabricated by extrusion using a hydroxypropyl methylcellulose (HPMC) binder. As little as 2 wt.% binder was added to an oxide prepared by a novel co-precipitation process, to produce a plastic mass which readily gave continuous extrusion of long lengths of wire in a reproducible fashion. Critical temperatures of 92K were obtained for wires given optimum high-temperature heat treatments. Critical current densities greater than 1000 A cm-1 were measured at 77.3K using heat treatments at around 910°C for 10h. These transport critical current densities, measured on centimeter-long wires, were obtained with microstructures showing a relatively dense and uniform distribution of randomly oriented, small YBa2Cu3O7-x grains. © 1993.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
There are different ways to authenticate humans, which is an essential prerequisite for access control. The authentication process can be subdivided into three categories that rely on something someone i) knows (e.g. password), and/or ii) has (e.g. smart card), and/or iii) is (biometric features). Besides classical attacks on password solutions and the risk that identity-related objects can be stolen, traditional biometric solutions have their own disadvantages such as the requirement of expensive devices, risk of stolen bio-templates etc. Moreover, existing approaches provide the authentication process usually performed only once initially. Non-intrusive and continuous monitoring of user activities emerges as promising solution in hardening authentication process: iii-2) how so. behaves. In recent years various keystroke dynamic behavior-based approaches were published that are able to authenticate humans based on their typing behavior. The majority focuses on so-called static text approaches, where users are requested to type a previously defined text. Relatively few techniques are based on free text approaches that allow a transparent monitoring of user activities and provide continuous verification. Unfortunately only few solutions are deployable in application environments under realistic conditions. Unsolved problems are for instance scalability problems, high response times and error rates. The aim of this work is the development of behavioral-based verification solutions. Our main requirement is to deploy these solutions under realistic conditions within existing environments in order to enable a transparent and free text based continuous verification of active users with low error rates and response times.
Resumo:
This paper investigates the social and environmental disclosure practices of two large multinational companies, specifically Nike and Hennes&Mauritz. Utilising a joint consideration of legitimacy theory and media agenda setting theory, we investigate the linkage between negative media attention, and positive corporate social and environmental disclosures. Our results generally support a view that for those industry‐related social and environmental issues attracting the greatest amount of negative media attention, these corporations react by providing positive social and environmental disclosures. The results were particularly significant in relation to labour practices in developing countries – the issue attracting the greatest amount of negative media attention for the companies in question.
Resumo:
Purpose – The aim of this paper is to establish a linkage between negative global media news towards Grameen Bank (GB), the largest microfinance organisation in the developing world, and the extent and type of annual report social performance disclosures by GB, over the nine-year period 1997-2005. Design/methodology/approach – Content analysis instruments are utilised to analyse GB annual report social disclosure. Findings – The study finds that GB's community poverty alleviation disclosures account for the highest proportion of total social disclosures in the period 1997-2005. The results of this study are particularly significant in relation to poverty alleviation – the issue attracting severe criticism from the Wall Street Journal (WSJ?) late in 2001. The community poverty alleviation disclosures by GB are significantly greater over the four years following the negative news in the WSJ than in the four years before. The results suggest that GB responds to a negative media story or legitimacy threatening news via annual report social disclosures in an attempt to re-establish its legitimacy. Originality/value – This paper contributes to the literature because in the past there has been no research published linking global media attention to the social disclosure practices of major organisations in developing countries
Resumo:
This report provides the results of a study of the social and environmental reporting practices of organisations operating in, or sourcing products from, a developing country; in this case, Bangladesh. The study comprised three distinct but related components: 1. an investigation of the social and environmental disclosure practices of the Bangladesh Garment Manufacturers and Exporters Association (BGMEA) 2. an investigation of the social and environmental disclosure practices of two major multinational buying companies: Nike and H&M 3. an exploration of possible drivers for the media agenda in reporting the activities of multinationals and NGOs.
Resumo:
The decision of Applegarth J in Heartwood Architectural & Joinery Pty Ltd v Redchip Lawyers [2009] QSC 195 (27 July 2009) involved a costs order against solicitors personally. This decision is but one of several recent decisions in which the court has been persuaded that the circumstances justified costs orders against legal practitioners on the indemnity basis. These decisions serve as a reminder to practitioners of their disclosure obligations when seeking any interlocutory relief in an ex parte application. These obligations are now clearly set out in r 14.4 of the Legal Profession (Solicitors) Rule 2007 and r 25 of 2007 Barristers Rule. Inexperience or ignorance will not excuse breaches of the duties owed to the court.