991 resultados para Medical protocols.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Child Health Line is a 24-hour Australian helpline that offers information and support for parents and families on child development and parenting. The helpline guidelines suggest that nurses should not offer medical advice, however they regularly receive calls seeking such advice. This paper examines how the service guidelines are talked into being through the nurses’ management of caller’s requests for medical advice and information, and shows how nurses orient to the boundaries of their professional role and institutionally regulated authority. Three ways in which the child health nurses manage medical advice and information seeking are discussed: using membership as a nurse to establish boundaries of expertise, privileging parental authority regarding decision making about seeking treatment for their child, and respecifying a ‘medical’ problem as a child development issue. The paper contributes to research on medical authority, and nurse authority in particular, by demonstrating the impact of institutional roles and guidelines on displays of knowledge and expertise. More generally, it contributes to an understanding of the interactional enactment and consequences of service guidelines for telehealth practice, with implications for training, policy and service delivery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tort law reform has resulted in legislation being passed by all Australian jurisdictions in the past decade implementing the recommendations contained in the Ipp Report. The report was in response to a perceived crisis in medical indemnity insurance. The objective was to restrict and limit liability in negligence actions. This paper will consider to what extent the reforms have impacted on the liability of health professionals in medical negligence actions. The reversal of the onus of proof through the obvious risk sections has attempted to extend the scope of the defence of voluntary assumption of risk. There is no liability for the materialisation of an inherent risk. Presumptions and mandatory reductions for contributory negligence have attempted to reduce the liability of defendants. It is now possible for reductions of 100% for contributory negligence. Apologies can be made with no admission of legal liability to encourage them being made and thereby reduce the number of actions being commenced. The peer acceptance defence has been introduced and enacted by legislation. There is protection for good samaritans even though the Ipp Report recommended against such protection. Limitation periods have been amended. Provisions relating to mental harm have been introduced re-instating the requirement of normal fortitude and direct perception. After an analysis of the legislation, it will be argued in this paper that while there has been some limitation and restriction, courts have generally interpreted the civil liability reforms in compliance with the common law. It has been the impact of statutory limits on the assessment of damages which has limited the liability of health professionals in medical negligence actions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The question whether the loss of chance of a better medical outcome in cases of medical negligence should be recognised as actionable damage is ‘a question which has divided courts and commentators throughout the common law world.’ In April 2010, the High Court handed down its anticipated decision in the case of Tabet (by her Tutor Sheiban) v Gett (2010) 240 CLR 537. The issue considered by the court was whether the appellant could claim in negligence for the loss of a chance of a better medical outcome. This issue had not been considered by the High Court previously, the most relevant cases being Rufo v Hosking (2004) 61 NSWLR 678 and Gavalas v Singh (2001) 3 VLR 404. Claiming for a loss of chance in a personal injury action raises questions as to recognised damage and causation, and the members of the High Court considered both of these.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As Australian society 1s agemg, individuals are increasingly concerned about managing their future, including making decisions about the medical treatment they may wish to receive or refuse if they lose decision-making capacity. To date, there has been relatively little research into the extent to which legal regulation allows competent adults to make advance refusals of life-sustaining medical treatment that will bind health professionals and others when a decision needs to be made at a future time. This thesis aims to fill this gap in the research by presenting the results of research into the legal regulation of advance directives that refuse life-sustaining medical treatment. In the five papers that comprise this thesis, the law that governs this area is examined, and the ethical principle of autonomy is used to critically evaluate that law. The principal finding of this research is that the current scheme of regulation is ineffective to adequately promote the right of a competent adult to make binding advance directives about refusal of medical treatment. The research concludes that legislation should be enacted to enable individuals to complete an advance directive, only imposing restrictions to the extent that this is necessary to promote individual autonomy. The thesis first examines the principle of autonomy upon which the common law (and some statutory law) is expressed to be based, to determine whether that principle is an appropriate one to underpin regulation. 1 The finding of the research is that autonomy can be justified as an organising principle on a number of grounds: it is consistent with the values of a liberal democracy; over recent decades, it is a principle that has been even more prominent within the discipline of medical ethics; and it is the principle which underpins the legal regulation of a related topic, namely the contemporaneous refusal of medical treatment. Next, the thesis reviews the common law to determine whether it effectively achieves the goal of promoting autonomy by allowing a competent adult to make an advance directive refusing treatment that will operate if he or she later loses decision-making capacity. 2 This research finds that conunon law doctrine, as espoused by the judiciary, prioritises individual choice by recognising valid advance directives that refuse treatment as binding. However, the research also concludes that the common law, as applied by the judiciary in some cases, may not be effective to promote individual autonomy, as there have been a number of circumstances where advance directives that refuse treatment have not been followed. The thesis then examines the statutory regimes in Australia that regulate advance directives, with a focus on the regulation of advance refusals of life-sustaining medical treatment.3 This review commences with an examination ofparliamentary debates to establish why legislation was thought to be necessary. It then provides a detailed review of all of the statutory regimes, the extent to which the legislation regulates the form of advance directives, and the circumstances in which they can be completed, will operate and can be ignored by medical professionals. The research finds that legislation was enacted mainly to clarify the common law and bring a level of certainty to the field. Legislative regimes were thought to provide medical professionals with the assurance that compliance with an advance directive that refuses life-sustaining medical treatment will not expose them to legal sanction. However, the research also finds that the legislation places so many restrictions on when an advance directive refusing treatment can be made, or will operate, that they have not been successful in promoting individual autonomy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Society has a need for children to be able to make health care decisions. Homeless children need access to health care. Parents may not be accessible or competent to consent to their child’s health care. The familial relationship may have broken down. Children may not want their parents to know about drug, alcohol or pregnancy related issues. There is legal and academic support for the right of children to make autonomous decisions with respect to their health care. However what these decisions cover and who can make them is not clear. Whether or not a minor has capacity and is therefore competent to consent to medical treatment is a question of law. Some states of Australia have enacted legislation, while others rely on the common law to determine this issue. At common law a minor is capable of giving consent to medical treatment when he or she achieves a sufficient understanding and intelligence to be able to understand fully what is proposed. Known as ‘Gillick competence’ this is a well known principle of law. The question posed by this paper is whether the decision of a ‘Gillick competent’ child can and should be overridden by the court?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

OBJECTIVES: To identify the prevalence of geriatric syndromes in the premorbid for all syndromes except falls (preadmission), admission, and discharge assessment periods and the incidence of new and significant worsening of existing syndromes at admission and discharge. DESIGN: Prospective cohort study. SETTING: Three acute care hospitals in Brisbane, Australia. PARTICIPANTS: Five hundred seventy-seven general medical patients aged 70 and older admitted to the hospital. MEASUREMENTS: Prevalence of syndromes in the premorbid (or preadmission for falls), admission, and discharge periods; incidence of new syndromes at admission and discharge; and significant worsening of existing syndromes at admission and discharge. RESULTS: The most frequently reported premorbid syndromes were bladder incontinence (44%), impairment in any activity of daily living (ADL) (42%). A high proportion (42%) experienced at least one fall in the 90 days before admission. Two-thirds of the participants experienced between one and five syndromes (cognitive impairment, dependence in any ADL item, bladder and bowel incontinence, pressure ulcer) before, at admission, and at discharge. A majority experienced one or two syndromes during the premorbid (49.4%), admission (57.0%), or discharge (49.0%) assessment period.The syndromes with a higher incidence of significant worsening at discharge (out of the proportion with the syndrome present premorbidly) were ADL limitation (33%), cognitive impairment (9%), and bladder incontinence (8%). Of the syndromes examined at discharge, a higher proportion of patients experienced the following new syndromes at discharge (absent premorbidly): ADL limitation (22%); and bladder incontinence (13%). CONCLUSION: Geriatric syndromes were highly prevalent. Many patients did not return to their premorbid function and acquired new syndromes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tort law reform has resulted in legislation being passed by all Australian jurisdictions in the past decade implementing the recommendations contained in the Ipp Report. The report was in response to a perceived crisis in medical indemnity insurance. The objective was to restrict and limit liability in negligence actions. This paper will consider to what extent the reforms have impacted on the liability of health professionals in medical negligence actions. After an analysis of the legislation, it will be argued in this paper that while there has been some limitation and restriction, courts have generally interpreted the civil liability reforms in compliance with the common law. It has been the impact of statutory limits on the assessment of damages through thresholds and caps which has limited the liability of health professionals in medical negligence actions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Chapter 10, Adam and Dougherty describe the application of medical image processing to the assessment and treatment of spinal deformity, with a focus on the surgical treatment of idiopathic scoliosis. The natural history of spinal deformity and current approaches to surgical and non-surgical treatment are briefly described, followed by an overview of current clinically used imaging modalities. The key metrics currently used to assess the severity and progression of spinal deformities from medical images are presented, followed by a discussion of the errors and uncertainties involved in manual measurements. This provides the context for an analysis of automated and semi-automated image processing approaches to measure spinal curve shape and severity in two and three dimensions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mixture models are a flexible tool for unsupervised clustering that have found popularity in a vast array of research areas. In studies of medicine, the use of mixtures holds the potential to greatly enhance our understanding of patient responses through the identification of clinically meaningful clusters that, given the complexity of many data sources, may otherwise by intangible. Furthermore, when developed in the Bayesian framework, mixture models provide a natural means for capturing and propagating uncertainty in different aspects of a clustering solution, arguably resulting in richer analyses of the population under study. This thesis aims to investigate the use of Bayesian mixture models in analysing varied and detailed sources of patient information collected in the study of complex disease. The first aim of this thesis is to showcase the flexibility of mixture models in modelling markedly different types of data. In particular, we examine three common variants on the mixture model, namely, finite mixtures, Dirichlet Process mixtures and hidden Markov models. Beyond the development and application of these models to different sources of data, this thesis also focuses on modelling different aspects relating to uncertainty in clustering. Examples of clustering uncertainty considered are uncertainty in a patient’s true cluster membership and accounting for uncertainty in the true number of clusters present. Finally, this thesis aims to address and propose solutions to the task of comparing clustering solutions, whether this be comparing patients or observations assigned to different subgroups or comparing clustering solutions over multiple datasets. To address these aims, we consider a case study in Parkinson’s disease (PD), a complex and commonly diagnosed neurodegenerative disorder. In particular, two commonly collected sources of patient information are considered. The first source of data are on symptoms associated with PD, recorded using the Unified Parkinson’s Disease Rating Scale (UPDRS) and constitutes the first half of this thesis. The second half of this thesis is dedicated to the analysis of microelectrode recordings collected during Deep Brain Stimulation (DBS), a popular palliative treatment for advanced PD. Analysis of this second source of data centers on the problems of unsupervised detection and sorting of action potentials or "spikes" in recordings of multiple cell activity, providing valuable information on real time neural activity in the brain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Key establishment is a crucial cryptographic primitive for building secure communication channels between two parties in a network. It has been studied extensively in theory and widely deployed in practice. In the research literature a typical protocol in the public-key setting aims for key secrecy and mutual authentication. However, there are many important practical scenarios where mutual authentication is undesirable, such as in anonymity networks like Tor, or is difficult to achieve due to insufficient public-key infrastructure at the user level, as is the case on the Internet today. In this work we are concerned with the scenario where two parties establish a private shared session key, but only one party authenticates to the other; in fact, the unauthenticated party may wish to have strong anonymity guarantees. We present a desirable set of security, authentication, and anonymity goals for this setting and develop a model which captures these properties. Our approach allows for clients to choose among different levels of authentication. We also describe an attack on a previous protocol of Øverlier and Syverson, and present a new, efficient key exchange protocol that provides one-way authentication and anonymity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For more than a decade research in the field of context aware computing has aimed to find ways to exploit situational information that can be detected by mobile computing and sensor technologies. The goal is to provide people with new and improved applications, enhanced functionality and better use experience (Dey, 2001). Early applications focused on representing or computing on physical parameters, such as showing your location and the location of people or things around you. Such applications might show where the next bus is, which of your friends is in the vicinity and so on. With the advent of social networking software and microblogging sites such as Facebook and Twitter, recommender systems and so on context-aware computing is moving towards mining the social web in order to provide better representations and understanding of context, including social context. In this paper we begin by recapping different theoretical framings of context. We then discuss the problem of context- aware computing from a design perspective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

To provide privacy protection, cryptographic primitives are frequently applied to communication protocols in an open environment (e.g. the Internet). We call these protocols privacy enhancing protocols (PEPs) which constitute a class of cryptographic protocols. Proof of the security properties, in terms of the privacy compliance, of PEPs is desirable before they can be deployed. However, the traditional provable security approach, though well-established for proving the security of cryptographic primitives, is not applicable to PEPs. We apply the formal language of Coloured Petri Nets (CPNs) to construct an executable specification of a representative PEP, namely the Private Information Escrow Bound to Multiple Conditions Protocol (PIEMCP). Formal semantics of the CPN specification allow us to reason about various privacy properties of PIEMCP using state space analysis techniques. This investigation provides insights into the modelling and analysis of PEPs in general, and demonstrates the benefit of applying a CPN-based formal approach to the privacy compliance verification of PEPs.