937 resultados para VALIDITY


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of the study was to undertake rigorous psychometric testing of the Caring Efficacy Scale in a sample of Registered Nurses. A cross-sectional survey of 2000 registered nurses was undertaken. The Caring Efficacy Scale was utilised to inform the psychometric properties of the selected items of the Caring Efficacy Scale. Cronbach’s Alpha identified reliability of the data. Exploratory Factor Analysis and Confirmatory Factor Analysis were undertaken to validate the factors. Confirmatory factor analysis confirmed the development of two factors; Confidence to Care and Doubts and Concerns. The Caring Efficacy Scale has undergone rigorous psychometric testing, affording evidence of internal consistency and goodness-of-fit indices within satisfactory ranges. The Caring Efficacy Scale is valid for use in an Australian population of registered nurses. The scale can be used as a subscale or total score reflective of self-efficacy in nursing. This scale may assist nursing educators to predict levels of caring efficacy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose Intensity modulated radiotherapy (IMRT) treatments require more beam-on time and produce more linac head leakage to deliver similar doses to conventional, unmodulated, radiotherapy treatments. It is necessary to take this increased leakage into account when evaluating the results of radiation surveys around bunkers that are, or will be, used for IMRT. The recommended procedure of 15 applying a monitor-unit based workload correction factor to secondary barrier survey measurements, to account for this increased leakage when evaluating radiation survey measurements around IMRT bunkers, can lead to potentially-costly over estimation of the required barrier thickness. This study aims to provide initial guidance on the validity of reducing the value of the correction factor when applied to different radiation barriers (primary barriers, doors, maze walls and other walls) by 20 evaluating three different bunker designs. Methods Radiation survey measurements of primary, scattered and leakage radiation were obtained at each of five survey points around each of three different radiotherapy bunkers and the contribution of leakage to the total measured radiation dose at each point was evaluated. Measurements at each survey point were made with the linac gantry set to 12 equidistant positions from 0 to 330o, to 25 assess the effects of radiation beam direction on the results. Results For all three bunker designs, less than 0.5% of dose measured at and alongside the primary barriers, less than 25% of the dose measured outside the bunker doors and up to 100% of the dose measured outside other secondary barriers was found to be caused by linac head leakage. Conclusions Results of this study suggest that IMRT workload corrections are unnecessary, for 30 survey measurements made at and alongside primary barriers. Use of reduced IMRT workload correction factors is recommended when evaluating survey measurements around a bunker door, provided that a subset of the measurements used in this study are repeated for the bunker in question. Reduction of the correction factor for other secondary barrier survey measurements is not recommended unless the contribution from leakage is separetely evaluated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction Road safety researchers rely heavily on self-report data to explore the aetiology of crash risk. However, researchers consistently acknowledge a range of limitations associated with this methodological approach (e.g., self-report bias), which has been hypothesised to reduce the predictive efficacy of scales. Although well researched in other areas, one important factor often neglected in road safety studies is the fallibility of human memory. Given accurate recall is a key assumption in many studies, the validity and consistency of self-report data warrants investigation. The aim of the current study was to examine the consistency of self-report data of crash history and details of the most recent reported crash on two separate occasions. Materials & Method A repeated measures design was utilised to examine the self-reported crash involvement history of 214 general motorists over a two month period. Results A number of interesting discrepancies were noted in relation to number of lifetime crashes reported by the participants and the descriptions of their most recent crash across the two occasions. Of the 214 participants who reported having been involved in a crash, 35 (22.3%) reported a lower number of lifetime crashes as Time 2, than at Time 1. Of the 88 drivers who reported no change in number of lifetime crashes, 10 (11.4%) described a different most recent crash. Additionally, of the 34 reporting an increase in the number of lifetime crashes, 29 (85.3%) of these described the same crash on both occasions. Assessed as a whole, at least 47.1% of participants made a confirmed mistake at Time 1 or Time 2. Conclusions These results raise some doubt in regard to the accuracy of memory recall across time. Given that self-reported crash involvement is the predominant dependent variable used in the majority of road safety research, this issue warrants further investigation. Replication of the study with a larger sample size that includes multiple recall periods would enhance understanding into the significance of this issue for road safety methodology.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background The prevalence of type 2 diabetes is rising internationally. Patients with diabetes have a higher risk of cardiovascular events accounting for substantial premature morbidity and mortality, and health care expenditure. Given healthcare workforce limitations, there is a need to improve interventions that promote positive self-management behaviours that enable patients to manage their chronic conditions effectively, across different cultural contexts. Previous studies have evaluated the feasibility of including telephone and Short Message Service (SMS) follow up in chronic disease self-management programs, but only for single diseases or in one specific population. Therefore, the aim of this study is to evaluate the feasibility and short-term efficacy of incorporating telephone and text messaging to support the care of patients with diabetes and cardiac disease, in Australia and in Taiwan. Methods/design A randomised controlled trial design will be used to evaluate a self-management program for people with diabetes and cardiac disease that incorporates the use of simple remote-access communication technologies. A sample size of 180 participants from Australia and Taiwan will be recruited and randomised in a one-to-one ratio to receive either the intervention in addition to usual care (intervention) or usual care alone (control). The intervention will consist of in-hospital education as well as follow up utilising personal telephone calls and SMS reminders. Primary short term outcomes of interest include self-care behaviours and self-efficacy assessed at baseline and four weeks. Discussion If the results of this investigation substantiate the feasibility and efficacy of the telephone and SMS intervention for promoting self management among patients with diabetes and cardiac disease in Australia and Taiwan, it will support the external validity of the intervention. It is anticipated that empirical data from this investigation will provide valuable information to inform future international collaborations, while providing a platform for further enhancements of the program, which has potential to benefit patients internationally.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter considers the implications of convergence for media policy from three perspectives. First, it discusses what have been the traditional concerns of media policy, and the challenges it faces, from the perspectives of public interest theories, economic capture theories, and capitalist state theories. Second, it looks at what media convergence involves, and some of the dilemmas arising from convergent media policy including: (1) determining who is a media company; (2) regulatory parity between ‘old’ and ‘new’ media; (3) treatment of similar media content across different platforms; (4) distinguishing ‘big media’ from user-created content, and: (5) maintaining a distinction between media regulation and censorship of personal communication. Finally, it discusses attempts to reform media policy in light of these changes, including Australian media policy reports from 2011-12 including the Convergence Review, the Finkelstein Review of News Media, and the Australian Law Reform Commission’s National Classification Scheme Review. It concludes by arguing that ‘public interest’ approaches to media policy continue to have validity, even as they grapple with the complex question of how to understand the concept of influence in a convergent media environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Introduction. The purpose of this chapter is to address the question raised in the chapter title. Specifically, how can models of motor control help us understand low back pain (LBP)? There are several classes of models that have been used in the past for studying spinal loading, stability, and risk of injury (see Reeves and Cholewicki (2003) for a review of past modeling approaches), but for the purpose of this chapter we will focus primarily on models used to assess motor control and its effect on spine behavior. This chapter consists of 4 sections. The first section discusses why a shift in modeling approaches is needed to study motor control issues. We will argue that the current approach for studying the spine system is limited and not well-suited for assessing motor control issues related to spine function and dysfunction. The second section will explore how models can be used to gain insight into how the central nervous system (CNS) controls the spine. This segues segue nicely into the next section that will address how models of motor control can be used in the diagnosis and treatment of LBP. Finally, the last section will deal with the issue of model verification and validity. This issue is important since modelling accuracy is critical for obtaining useful insight into the behavior of the system being studied. This chapter is not intended to be a critical review of the literature, but instead intended to capture some of the discussion raised during the 2009 Spinal Control Symposium, with some elaboration on certain issues. Readers interested in more details are referred to the cited publications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of the current study was to develop a measurement of information security culture in developing countries such as Saudi Arabia. In order to achieve this goal, the study commenced with a comprehensive review of the literature, the outcome being the development of a conceptual model as a reference base. The literature review revealed a lack of academic and professional research into information security culture in developing countries and more specifically in Saudi Arabia. Given the increasing importance and significant investment developing countries are making in information technology, there is a clear need to investigate information security culture from developing countries perspective such as Saudi Arabia. Furthermore, our analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. Our research aims to fill this gap by developing and validating a measurement model of information security culture, as well as developing initial understanding of factors that influence security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. In the qualitative phase, eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness, security compliance and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, policy maintenance, training and ethical conduct policies. These factors were confirmed by the literature review as being critical and important for the creation of security culture and formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model through Exploratory Factor Analysis (EFA), followed by Confirmatory Factor Analysis (CFA.) In addition, using Structural Equation Modelling (SEM) we were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture. The current study contributes to the existing body of knowledge in two major ways: firstly, it develops an information security culture measurement model; secondly, it presents empirical evidence for the nomological validity for the security culture measurement model and discovery of factors that influence information security culture. The current study also indicates possible future related research needs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis studied technology’s role in promoting and supporting active lifestyles through behavioural strategies to reduce sedentary time and increase physical activity. The five studies included (1) development of a self-report instrument quantifying daily sedentary behaviour and light-intensity physical activity; (2) establishment of instrument validity and reliability; (3) use of an online personal activity monitor to successfully reduce sedentary time and increase physical activity; (4) identification of positive differences in total wellness as related to high/low levels of sitting time combined with insufficient/sufficient physical activity; and (5) improvement of total wellness through positive changes in sedentary behaviour and physical activity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Disengaged and disruptive students have been an ongoing concern for teachers for many years. Teaching is complex—complex students with complex lives and complex behaviours. How best to help these students is an ever-present question without a simple answer. Solutions need to be found. Under a positive behaviour support framework when serious, disruptive behaviour requires intervention, an individualised positive behaviour support plan (PBS plan) is developed and implemented. This multicase study (Stake, 2006) investigated how task engagement was changed for boys from year four to year seven who demonstrated serious, disruptive behaviour. The individualised PBS plan was the primary tool of behaviour intervention in each of the five cases. Using the Behaviour Support Plan Quality Evaluation Scoring Guide II (BSP-QE) (Browning- Wright, Saren & Mayer, 2003) the five PBS plans were evaluated prior to implementation and rated highly in terms of technical quality. Positive changes in student task engagement were forthcoming in all five cases. Eleven advisory visiting teachers in behaviour and eleven classroom teachers, five of whom were case-study participants, took part in this study. The classroom teachers were employed in south-east Queensland primary schools located in suburbs of economic disadvantage. All 22 participants expressed very similar perceptions of serious, disruptive behaviour emphasising the collateral impact upon the teaching and learning. Data obtained through direct observations, surveys and semi-structured interviews confirmed previous research to reveal a strong link between integrity of PBS plan implementation and student behaviour change. While classroom teachers, in the main, effectively managed the implementation of the PBS plan, social validity of goals, procedures and effects; in-class technical assistance and performance feedback were identified as three enablers to effective teacher implementation of the PBS plan. While the purpose of each PBS plan was to influence change in student behaviour, this study found that changing teacher behaviour was also instrumental in achieving positive student outcomes. Changing teacher behaviour and building capacity was facilitated by trusting, collaborative partnerships established between the Advisory Visiting Teacher-Behaviour and the classroom teacher responsible for the plan implementation. The Advisory Visiting Teacher-Behaviour provides assistance to teachers dealing with students who demonstrate ongoing, problematic behaviour. The inclusion of a teaching component as part of the implementation stage of the consultation process appeared to have considerable influence upon successful intervention. Results substantiated earlier understandings of the importance of teacher instruction highlighting the value of explicit teaching and performance feedback to the delivery of effective behaviour intervention. Conclusions drawn from this study have had a major impact upon the work of a regional team of Advisory Visiting Teachers-Behaviour. The focus of behaviour intervention has moved from being primarily upon the individual student to include a greater emphasis upon the critical role of the teacher. Procedures and processes are being re-evaluated to align with evidence-based practice and to include a collaborative consultation approach to improve teacher assistance. The framework and content of staff development and training is being created directly from the findings of this study. This practical application of the results has informed better ways of providing behaviour intervention for students demonstrating serious, disruptive behaviour. What this study has clearly shown is that when it comes to behaviour intervention, the important role of the teacher cannot be underestimated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Evaluation practices in the higher education sector have been criticised for having unclear purpose and principles; ignoring the complexity and changing nature of learning and teaching and the environments in which they occur; relying almost exclusively on student ratings of teachers working in classroom settings; lacking reliability and validity; using data for inappropriate purposes; and focusing on accountability and marketing rather than the improvement of learning and teaching. In response to similar criticism from stakeholders, in 2011 Queensland University of Technology began a project, entitled REFRAME, to review its approach to evaluation, particularly the student survey system it had been using for the past five years. This presentation will outline the scholarly, evidence based methodology used to undertake institution-wide change, meet the needs of stakeholders suitable to the cultural needs of the institution. It is believed that this approach is broadly applicable to other institutions contemplating change with regard to evaluation of learning and teaching.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Evaluation practices in the higher education sector have been criticised for having unclear purpose and principles; ignoring the complexity and changing nature of learning and teaching and the environments in which they occur; relying almost exclusively on student ratings of teachers working in classroom settings; lacking reliability and validity; using data for inappropriate purposes; and focusing on accountability and marketing rather than the improvement of learning and teaching. In response to similar criticism from stakeholders, in 2011 Queensland University of Technology began a project, entitled REFRAME, to review its approach to evaluation, particularly the student survey system it had been using for the past five years. This presentation will outline the scholarly, evidence based methodology used to undertake institution-wide change, meet the needs of stakeholders suitable to the cultural needs of the institution. It is believed that this approach is broadly applicable to other institutions contemplating change with regard to evaluation of learning and teaching.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we develop two stakeholder relationships scales. These scales assess project managers’ perceived competence in establishing and maintaining high quality, effective relationships with people internal to the project as well as those stakeholders who are external to the project. We developed the scales using an online survey study of three hundred and seventy three complex project managers from a sub-set of the Australian Defence Industry. Both the internal stakeholder relationships’ scale and the external stakeholder relationships’ scale demonstrated validity and reliability. This research has implications for the interpersonal work relationships’ literature and the stakeholder management literature. We recommend future research tests these scales with multiple samples, across different project types and project industries. The stakeholder relationships’ scales should be versatile enough to be applied to project management generally but are best suited to large-scale complex project environments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose. To compare the on-road driving performance of visually impaired drivers using bioptic telescopes with age-matched controls. Methods. Participants included 23 persons (mean age = 33 ± 12 years) with visual acuity of 20/63 to 20/200 who were legally licensed to drive through a state bioptic driving program, and 23 visually normal age-matched controls (mean age = 33 ± 12 years). On-road driving was assessed in an instrumented dual-brake vehicle along 14.6 miles of city, suburban, and controlled-access highways. Two backseat evaluators independently rated driving performance using a standardized scoring system. Vehicle control was assessed through vehicle instrumentation and video recordings used to evaluate head movements, lane-keeping, pedestrian detection, and frequency of bioptic telescope use. Results. Ninety-six percent (22/23) of bioptic drivers and 100% (23/23) of controls were rated as safe to drive by the evaluators. There were no group differences for pedestrian detection, or ratings for scanning, speed, gap judgments, braking, indicator use, or obeying signs/signals. Bioptic drivers received worse ratings than controls for lane position and steering steadiness and had lower rates of correct sign and traffic signal recognition. Bioptic drivers made significantly more right head movements, drove more often over the right-hand lane marking, and exhibited more sudden braking than controls. Conclusions. Drivers with central vision loss who are licensed to drive through a bioptic driving program can display proficient on-road driving skills. This raises questions regarding the validity of denying such drivers a license without the opportunity to train with a bioptic telescope and undergo on-road evaluation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In many applications, where encrypted traffic flows from an open (public) domain to a protected (private) domain, there exists a gateway that bridges the two domains and faithfully forwards the incoming traffic to the receiver. We observe that indistinguishability against (adaptive) chosen-ciphertext attacks (IND-CCA), which is a mandatory goal in face of active attacks in a public domain, can be essentially relaxed to indistinguishability against chosen-plaintext attacks (IND-CPA) for ciphertexts once they pass the gateway that acts as an IND-CCA/CPA filter by first checking the validity of an incoming IND-CCA ciphertext, then transforming it (if valid) into an IND-CPA ciphertext, and forwarding the latter to the recipient in the private domain. “Non-trivial filtering'' can result in reduced decryption costs on the receivers' side. We identify a class of encryption schemes with publicly verifiable ciphertexts that admit generic constructions of (non-trivial) IND-CCA/CPA filters. These schemes are characterized by existence of public algorithms that can distinguish between valid and invalid ciphertexts. To this end, we formally define (non-trivial) public verifiability of ciphertexts for general encryption schemes, key encapsulation mechanisms, and hybrid encryption schemes, encompassing public-key, identity-based, and tag-based encryption flavours. We further analyze the security impact of public verifiability and discuss generic transformations and concrete constructions that enjoy this property.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Outbreaks of an acute, severe, encephalitic illness, clinically similar to Japanese and St. Louis encephalitis, occurred in rural areas of southeastern Australia in 1917, 1918, 1922, 1925, 1951, and 1974[1,9,14-16] and in north and northwestern Australia in 1981, 1993, and 2000.[8,12,41] Approximately 420 cases were reported in these nine outbreaks.[41] They are thought to represent a single entity for which various names (Australian X disease, Murray Valley encephalitis, Australian encephalitis) have been used. Twenty-two cases were diagnosed in the 5 years between 2007 and 2011; three were fatal, and one of the fatalities occurred in a Canadian tourist on return from a holiday in northern Australia. Case-fatality rates, as high as 70 percent in the early years,[9,11] declined to 20 percent in the 1974 outbreak and have remained at about this level since then.[5,10,12] However, significant residual neurologic disability occurs in as many as 50 percent of survivors.[10,12] The presence of this disease in Papua New Guinea was confirmed in 1956.[20] The causative virus was transmitted to experimental animals as early as 1918,[6,11] although those strains could not be maintained. The definitive isolation and characterization of Murray Valley encephalitis virus in 1951[19] led to epidemiologic studies that suggested its survival in bird-mosquito cycles in northern Australia but not in the area of epidemic occurrence in southern Australia.[1] Murray Valley encephalitis is caused by Murray Valley encephalitis virus. In an effort to dissociate a disease from a specific locality, the term Australian encephalitis was proposed by residents of Murray Valley for the disease caused by Murray Valley encephalitis virus. Some researchers subsequently have attempted to expand the term Australian encephalitis to include encephalitis caused by any Australian arbovirus. Because the term Australian encephalitis has no scientific validity and is ambiguous, it should not be used.