962 resultados para copyright protection
Resumo:
Background Child sexual abuse is a significant global problem in both magnitude and sequelae. The most widely used primary prevention strategy has been the provision of school-based education programmes. Although programmes have been taught in schools since the 1980s, their effectiveness requires ongoing scrutiny. Objectives To systematically assess evidence of the effectiveness of school-based education programmes for the prevention of child sexual abuse. Specifically, to assess whether: programmes are effective in improving students’ protective behaviours and knowledge about sexual abuse prevention; behaviours and skills are retained over time; and participation results in disclosures of sexual abuse, produces harms, or both. Search methods In September 2014, we searched CENTRAL, OvidMEDLINE, EMBASE and 11 other databases.We also searched two trials registers and screened the reference lists of previous reviews for additional trials. Selection criteria We selected randomised controlled trials (RCTs), cluster-RCTs, and quasi-RCTs of school-based education interventions for the prevention of child sexual abuse compared with another intervention or no intervention. Data collection and analysis Two review authors independently assessed the eligibility of trials for inclusion, extracted data, and assessed risk of bias.We summarised data for six outcomes: protective behaviours; knowledge of sexual abuse or sexual abuse prevention concepts; retention of protective behaviours over time; retention of knowledge over time; harm; and disclosures of sexual abuse. School-
Resumo:
While the implementation of the IEC 61850 standard has significantly enhanced the performance of communications in electrical substations, it has also increased the complexity of the system. Subsequently, these added elaborations have introduced new challenges in relation to the skills and tools required for the design, test and maintenance of 61850-compatible substations. This paper describes a practical experience of testing a protection relay using a non-conventional test equipment; in addition, it proposes a third party software technique to reveal the contents of the packets transferred on the substation network. Using this approach, the standard objects can be linked and interpreted to what the end-users normally see in the IED and test equipment proprietary software programs.
Resumo:
The reduction of unnecessary regulation was a clear policy objective of the Queensland government during 2014. In the area of property sales significant reforms were introduced from 1 December 2014. This article examines the key aspects of these reforms and whether there has been a reduction in red tape for sellers and buyers of land.
Resumo:
In making this submission, we suggest that Australia learn from the experiences of other jurisdictions, and avoid some of the mistakes that have been made. In particular, this involves: * Ensuring that adequate information is available to evaluate the success of the scheme * Ensuring that notices sent to consumers provide full and accurate information that helps them understand their rights and options * Limiting the potential abuse of the system, and particularly attempts to intimidate consumers into paying unfair penalties through ‘speculative invoicing’ * Avoiding the potential for actual or perceived bias in the scheme’s oversight body
Resumo:
Background As the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow significantly. Such use of medical images raises serious concerns for their continuous security protection, which digital watermarking has shown great potential to address. Methods We present a content-independent embedding scheme for medical image watermarking. We observe that the perceptual content of medical images varies widely with their modalities. Recent medical image watermarking schemes are image-content dependent and thus they may suffer from inconsistent embedding capacity and visual artefacts. To attain the image content-independent embedding property, we generalise RONI (region of non-interest, to the medical professionals) selection process and use it for embedding by utilising RONI’s least significant bit-planes. The proposed scheme thus avoids the need for RONI segmentation that incurs capacity and computational overheads. Results Our experimental results demonstrate that the proposed embedding scheme performs consistently over a dataset of 370 medical images including their 7 different modalities. Experimental results also verify how the state-of-the-art reversible schemes can have an inconsistent performance for different modalities of medical images. Our scheme has MSSIM (Mean Structural SIMilarity) larger than 0.999 with a deterministically adaptable embedding capacity. Conclusions Our proposed image-content independent embedding scheme is modality-wise consistent, and maintains a good image quality of RONI while keeping all other pixels in the image untouched. Thus, with an appropriate watermarking framework (i.e., with the considerations of watermark generation, embedding and detection functions), our proposed scheme can be viable for the multi-modality medical image applications and distant medical services such as teleradiology and eHealth.
Resumo:
Background Serum lutein (L) and zeaxanthin (Z) positively correlate with macular pigment optical density (MPOD), hence the latter is a valuable indirect tool for measuring L and Z content in the macula. L and Z have been attributed antioxidant capacity and protection from certain retinal diseases but their uptake within the eye is thought to depend on genetic, age and environmental factors. In particular gene variants within beta-carotene monooxygenase (BCMO1) are thought to modulate MPOD in the macula. Objectives: To determine the effect of BCMO1 single nucleotide polymorphisms (SNPs) rs11645428, rs6420424 and rs6464851 on macular pigment optical density (MPOD) in a cohort of young healthy participants of Caucasian origin with normal ocular health. Design In this cohort study, MPOD was assessed in 46 healthy participants (22 male and 24 female) with a mean age of 24 ± 4.0 years (range 19-33). The three SNPs, rs11645428, rs6420424, rs6564851 that have established associations with MPOD were determined using MassEXTEND (hME) Sequenom assay. One-way analysis of variance (ANOVA) was performed on groups segregated into homozygous and heterozygous BCMO1 genotypes. Correlations between body mass index (BMI), iris colour, gender, central retinal thickness (CRT), diet and MPOD were investigated. Results MPOD did not significantly vary with BCMO1 rs11645428 (F2,41 = 0.700, p = 0.503), rs6420424 (F2,41 = 0.210, p = 0.801) nor rs6464851 homozygous or heterozygous genotypes (F2,41 = 0,13, p = 0.88), in this young healthy cohort. The combination of these three SNPs into triple genotypes based on plasma conversion efficiency did not affect MPOD (F2,41 = 0.07, p = 0.9). There was a significant negative correlation with MPOD and central retinal thickness (r = - 0.39, p = 0.01) but no significant correlation between BMI, iris colour, gender and MPOD. Conclusion Our results indicate that macular pigment deposition within the central retina is not dependent on BCMO1 gene variants in young healthy people. We propose that MPOD is saturated in younger persons and/or other gene variant combinations determine its deposition.
Resumo:
The workshop is an activity of the IMIA Working Group ‘Security in Health Information Systems’ (SiHIS). It is focused to the growing global problem: how to protect personal health data in today’s global eHealth and digital health environment. It will review available trust building mechanisms, security measures and privacy policies. Technology alone does not solve this complex problem and current protection policies and legislation are considered woefully inadequate. Among other trust building tools, certification and accreditation mechanisms are dis-cussed in detail and the workshop will determine their acceptance and quality. The need for further research and international collective action are discussed. This workshop provides an opportunity to address a critical growing problem and make pragmatic proposals for sustainable and effective solutions for global eHealth and digital health.
Resumo:
Stress is implicated in the development and course of psychotic illness, but the factors that influence stress levels are not well understood. The aim of this study was to examine the impact of neuropsychological functioning and coping styles on perceived stress in people with first-episode psychosis (FEP) and healthy controls (HC). Thirty-four minimally treated FEP patients from the Early Psychosis Prevention and Intervention Centre, Melbourne, Australia, and 26 HC participants from a similar demographic area participated in the study. Participants completed a comprehensive neuropsychological test battery as well as the Coping Inventory for Stressful Situations (task-, emotion- and avoidance-focussed coping styles) and Perceived Stress Scale (PSS). Linear regressions were used to determine the contribution of neuropsychological functioning and coping style to perceived stress in the two groups. In the FEP group, higher levels of emotion-focussed and lower levels of task-focussed coping were associated with elevated stress. Higher premorbid IQ and working memory were also associated with higher subjective stress. In the HC group, higher levels of emotion-focussed coping, and contrary to the FEP group, lower premorbid IQ, working memory and executive functioning, were associated with increased stress. Lower intellectual functioning may provide some protection against perceived stress in FEP.
Resumo:
Asoftware-based environment was developed to provide practical training in medical radiation principles and safety. The Virtual Radiation Laboratory application allowed students to conduct virtual experiments using simulated diagnostic and radiotherapy X-ray generators. The experiments were designed to teach students about the inverse square law, half value layer and radiation protection measures and utilised genuine clinical and experimental data. Evaluation of the application was conducted in order to ascertain the impact of the software on students’ understanding, satisfaction and collaborative learning skills and also to determine potential further improvements to the software and guidelines for its continued use. Feedback was gathered via an anonymous online survey consisting of a mixture of Likert-style questions and short answer open questions. Student feedback was highly positive with 80 % of students reporting increased understanding of radiation protection principles. Furthermore 72 % enjoyed using the software and 87 %of students felt that the project facilitated collaboration within small groups. The main themes arising in the qualitative feedback comments related to efficiency and effectiveness of teaching, safety of environment, collaboration and realism. Staff and students both report gains in efficiency and effectiveness associated with the virtual experiments. In addition students particularly value the visualisation of ‘‘invisible’’ physical principles and increased opportunity for experimentation and collaborative problembased learning. Similar ventures will benefit from adopting an approach that allows for individual experimentation while visualizing challenging concepts.
Resumo:
We thank Dr Shedden and Dr Pall for their insightful comments and the opportunity to clarify a number of points from our work.1 The “protection factor” (PF) expressed as the inverse of the transmittance of contact lens (CL) material (1/Tλ), where T is the percentage transmittance of ultraviolet radiation (UVR) in a given waveband (UVC, UVB or UVA) of the UV spectrum for contact lenses is the standard method for reporting PF values and as such there should not be any controversy. We have calculated the PF for each wavelength across the entire UV spectrum (UVC, UVB, UVA) as presented in figure 3 of our previous publication.1 In that article, we were simply stating the observation when transmission in the UVC spectra band is considered especially because appreciable amounts of potentially carcinogenic short UV wavelengths was shown to be present in sunlight in our region three decades ago2 and these short wavelength photons are reported to be more biologically damaging to ocular tissues.3 In addition, the depletion of the Ozone layer is still continuing. Nevertheless, we understand the concern of the authors that the results of the PF might be confusing to those who are not familiar with the science of UVR and as such we have made some revisions to the findings of the calculated PF...
Resumo:
This study analyzes the management of wastewater pollutants in a number of Chinese industrial sectors from 1998 to 2010. We use decomposition analysis to calculate changes in wastewater pollutant emissions that result from cleaner production processes, end-of-pipe treatment, structural changes in industry, and changes in the scale of production. We focus on one indicator of water quality and three pollutants: chemical oxygen demand (COD), petroleum, cyanide, and volatile phenols. We find that until 2002, COD emissions were mainly reduced through end-of-pipe treatments. Cleaner production processes didn’t begin contributing to COD emissions reductions until the introduction of a 2003 law that enforced their implementation. Petroleum emissions were primarily lowered through cleaner production mechanisms, which have the added benefit of reducing the input cost of intermediate petroleum. Diverse and effective pollution abatement strategies for cyanide and volatile phenols are emerging among industries in China. It will be important for the government to consider differences between industries should they choose to regulate the emissions of specific chemical substances.
Resumo:
We argue that safeguards are necessary to ensure human rights are adequately protected. All systems of blocking access to online content necessarily raise difficult and problematic issues of infringement of freedom of speech and access to information. Given the importance of access to information across the breadth of modern life, great care must be taken to ensure that any measures designed to protect copyright by blocking access to online locations are proportionate. Any measures to block access to online content must be carefully tailored to avoid serious and disproportionate impact on human rights. This means first that the measures must be effective and adapted to achieve a legitimate purpose. The experience of foreign jurisdictions suggests that this legislation is unlikely to be effective. Unless and until there is clear evidence that the proposed scheme is likely to increase effective returns to Australian creators, this legislation should not be introduced. Second, the principle of proportionality requires ensuring that the proposed legislation does not unnecessarily burden legitimate speech or access to information. As currently worded, the draft legislation may result in online locations being blocked even though they would, if operated in Australia, not contravene Australian law. This is unacceptable, and if introduced, the law should be drafted so that it is clearly limited only to foreign locations where there is clear and compelling evidence that the location would authorise copyright infringement if it were in Australia. Third, proportionality requires that measures are reasonable and strike an appropriate balance between competing interests. This draft legislation provides few safeguards for the public interest or the interests of private actors who would access legitimate information. New safeguards should be introduced to ensure that the public interest is well represented at both the stage of the primary application and at any applications to rescind or vary injunctions. We recommend that: The legislation not be introduced unless and until there is compelling evidence that it will have a real and significant positive impact on the effective incomes of Australian creators. The ‘facilitates an infringement’ test in s 115A(1)(b) should be replaced with ‘authorises infringement’. The ‘primary purpose’ test in s 115A(1)(c) should be replaced with: “the online location has no substantial non-infringing uses”. An explicit role for public interest groups as amici curiae should be introduced. Costs of successful applications should be borne by applicants. Injunctions should be valid only for renewable two year terms. Section 115A(5) should be clarified, and cl (b) and (c) be removed. The effectiveness of the scheme should be evaluated in two years.
Resumo:
In contemporary Western societies, the years between childhood and young adulthood are commonly understood to be (trans)formative in the reflexive project of sexual self-making (Russell et al. 2012). As sexual subjects in the making, youthful bodies, desires and sexual activities are often perceived as both volatile and vulnerable, thus subjected to instruction and discipline, protection and surveillance. Accordingly, young people’s sexual proximities are closely monitored by social institutions and ‘(hetero)normalising regimes’ (Warner 1999) for any signs that may compromise the end goal of development—a ‘normal’ reproductive heterosexual monogamous adult.
Resumo:
Copyright was once one of the more obscure areas of law. It applied primarily to resolve disputes between rival publishers, and there was a time, not too long ago, when ordinary people gave it no thought. Copyright disputes were like subatomic particles: everyone knew that they existed, but nobody had ever seen one. In the digital age, however, copyright has become a heated, passionate, bloody battleground. The 'copyright wars' now pitch readers against authors, pirates against publishers, and content owners against communications providers. Everyone has heard a movie producer decry the rampant infringement of streaming sites, or a music executive suggest that BitTorrent is the end of civilisation as we know it. But everyone infringes copyright on an almost constant basis - streaming amateur videos with a soundtrack that isn't quite licensed, filesharing mp3s, copying LOLcat pictures from Facebook, posting pictures on Pinterest without permission, and so on - and most know full well they're in breach of the law.
Resumo:
Substation Automation Systems have undergone many transformational changes triggered by improvements in technologies. Prior to the digital era, it made sense to confirm that the physical wiring matched the schematic design by meticulous and laborious point to point testing. In this way, human errors in either the design or the construction could be identified and fixed prior to entry into service. However, even though modern secondary systems today are largely computerised, we are still undertaking commissioning testing using the same philosophy as if each signal were hard wired. This is slow and tedious and doesn’t do justice to modern computer systems and software automation. One of the major architectural advantages of the IEC 61850 standard is that it “abstracts” the definition of data and services independently of any protocol allowing the mapping of them to any protocol that can meet the modelling and performance requirements. On this basis, any substation element can be defined using these common building blocks and are made available at the design, configuration and operational stages of the system. The primary advantage of accessing data using this methodology rather than the traditional position method (such as DNP 3.0) is that generic tools can be created to manipulate data. Self-describing data contains the information that these tools need to manipulate different data types correctly. More importantly, self-describing data makes the interface between programs robust and flexible. This paper proposes that the improved data definitions and methods for dealing with this data within a tightly bound and compliant IEC 61850 Substation Automation System could completely revolutionise the need to test systems when compared to traditional point to point methods. Using the outcomes of an undergraduate thesis project, we can demonstrate with some certainty that it is possible to automatically test the configuration of a protection relay by comparing the IEC 61850 configuration extracted from the relay against its SCL file for multiple relay vendors. The software tool provides a quick and automatic check that the data sets on a particular relay are correct according to its CID file, thus ensuring that no unexpected modifications are made at any stage of the commissioning process. This tool has been implemented in a Java programming environment using an open source IEC 61850 library to facilitate the server-client association with the relay.