935 resultados para Health Security
Resumo:
The present study examined Queensland Transcultural Mental Health Centre (QTMHC) client characteristics in order to provide a better understanding for development of future health service delivery models. Archived data that was collected for 1499 clients over two years period (2007-2009) was analysed using descriptive statistics and Chi squares. The results indicated that clients were referred from a range of sources and were generally adults. There were more women than men, who sought services. At least half of the clients had language barriers and relied on bilingual workers. Most frequently expressed mental health issues were mood disorder symptoms, followed by symptoms of schizophrenia and psychosis and anxiety. Acculturation strains and stressors were described as the most common psychosocial issues. Mental health and psychosocial issues differed for age, gender and world regions from which the CALD clients originated. The findings provided an understanding of clients who seek services at QTMHC. Various ways in which transcultural services and data bases can be further improved are discussed.
Resumo:
Living with substance users negatively impacts upon family members in many ways, and distress is common. Despite these deep and wide-ranging impacts, supportive interventions for family members in their own right are rarely available. Thailand has substantial and growing problems with substance use, and there is very little support or family members of drug users, especially in community setting. The Thai Family Support (TFS) program was designed for implementation in primary health care units (PCUs) in Thailand. TFS was based on two approaches with existing empirical support in Western contexts—the 5-step method and CRAFT—with adaptations to a Thai setting that included integration with Buddhist practices. Its aims were to increase well-being of family members, reduce mental distress, improve family relationships between family members, and engage substance users in behaviour change. A small-scale randomised controlled trial on TFS with a Delayed Treatment control was conducted, with assessments at 8 weeks (Post 1) and 20-24 weeks (Post 2). Structured interviews with participants and PCU staff and an examination of five case studies augmented the quantitative results. Mixed Model Analyses were applied to quantitative outcomes, and thematic analysis was used for qualitative data. Thirty-six participants (18 in each of Immediate and Delayed Conditions) were recruited. A significant difference at Baseline between the two conditions was observed on the Thai GHQ-28 and Gender, but it was not possible to statistically control for these effects. There was a significant Time by Condition interaction on the Thai GHQ-28, WHOQOL-BREF-THAI and FAS, reflecting greater improvements in the Immediate condition by Post 1, but with the Delayed condition meeting or exceeding that effect by Post 2. On FES Cohesion and Conflict, there were falls across conditions at Post 2, but only Cohesion also showed a Time by Condition interaction, and that effect was consistent with a delayed impact of treatment. Overall, TFS by PCU staff in the Delayed Condition gave similar results to TFS conducted by the researcher, supporting the viability of its dissemination to standard health services. Qualitative data also confirmed the quantitative results. Most participants reported physiological and psychological improvements even though their substance-using relative did not change their drug use behaviour. After completing TFS, participants reported increased knowledge, group support and sharing feeling, having positive patient-professional relationship, having greater knowledge of substance abuse and social support. In particular, they changed their behaviour towards the substance user, resulting in improvements to family relationships. PCU staff gave similar responses on the efficacy of TFS, and saw it as feasible for routine use, although some implementation challenges were identified. The cultural adaptation and in particular the religious activities, were recognised by participants and PCU staff as an important component of TFS to support psychological health and well-being. Findings from this study showed the impact of substance use on family members and difficulties that they experienced when living with the substance users, resulting distresses and burden that may develop severe mental health disease. Drug use policies should be modified to support family members and response to their needs effectively for early prevention. This study also gave preliminary support for application of the TFS program in rural primary care settings and identified some policies that will be required for it to be disseminated more broadly.
Resumo:
This article focuses on the relationship between private insurance status and dental service utilisation in Australia using data between 1995 and 2001. This article employs joint maximum likelihood to estimate models of time since last dental visit treating private ancillary health insurance (PAHI) as endogenous. The sensitivity of results to the choice between two different but related types of instrumental variables is examined. We find robust evidence in both 1995 and 2001 that individuals with a PAHI policy make significantly more frequent dental consultations relative to those without such coverage. A comparison of the 1995 and 2001 results, however, suggests that there has been an increasing role of PAHI in terms of the frequency of dental consultations over time. This seems intuitive given the trends in the price of unsubsidised private dental consultations. In terms of policy, our results suggest that while government measures to increase private health insurance coverage in Australia has been successful to a significant degree, it may have come at some cost in terms of socio-economic inequality as the privately insured are provided much better access to care and financial protection.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Threats against computer networks evolve very fast and require more and more complex measures. We argue that teams respectively groups with a common purpose for intrusion detection and prevention improve the measures against rapid propagating attacks similar to the concept of teams solving complex tasks known from field of work sociology. Collaboration in this sense is not easy task especially for heterarchical environments. We propose CIMD (collaborative intrusion and malware detection) as a security overlay framework to enable cooperative intrusion detection approaches. Objectives and associated interests are used to create detection groups for exchange of security-related data. In this work, we contribute a tree-oriented data model for device representation in the scope of security. We introduce an algorithm for the formation of detection groups, show realization strategies for the system and conduct vulnerability analysis. We evaluate the benefit of CIMD by simulation and probabilistic analysis.