747 resultados para compliance in VET
Resumo:
The increase in biological safety regulations and/or guidelines regarding personnel and facilities in high containment laboratories demands constant vigilance by biological safety professionals responsible for safety in these environments. Safety professionals have been faced with legislative compliance issues in the past and have developed effective management methods to cope with the demands of these requirements. Examples include the impact of the National Institutes of Health (NIH) recombinant DNA (rDNA) Guidelines and the Occupational Safety and Health Administration's (OSHA) Bloodborne Pathogens Standard. This chapter will attempt to describe seven successful strategies for management of regulatory compliance in research that are based on an overall philosophy of developing a “culture of safety”. Strategies range from interactive involvement with administration and research staff to biological safety professional development.
Resumo:
Empathic communication, (i.e. emotionally engaging with a patient), is an important part of the therapeutic relationship. It has been shown to improve the health and therapeutic outcomes for patients by improving diagnosis and compliance. In the West, front-line medical professionals, including herbal medicine practitioners, put themselves at risk of burnout and compassion fatigue by giving emotionally intensive care. While treatments for compassion fatigue and burnout are available, another way forward is needed to ensure healthcare professionals do not become ill; one that will enable both patients and healthcare professionals to receive the care needed. In this paper it is argued that compassion, which is defined in this paper, involves different neural circuitry to empathy and can protect healthcare professionals from the effects of stress that can, if not addressed, lead to burnout. Traditional Buddhist meditation techniques such as loving-kindness meditation have been shown to increase compassion in non-meditative states. Short daily sessions of such mediation practices have been shown to improve compassion in a way that protects healthcare professionals from burnout.
Resumo:
End users urgently request using mobile devices at their workplace. They know these devices from their private life and appreciate functionality and usability, and want to benefit from these advantages at work as well. Limitations and restrictions would not be accepted by them. On the contrary, companies are obliged to employ substantial organizational and technical measures to ensure data security and compliance when allowing to use mobile devices at the workplace. So far, only individual arrangements have been presented addressing single issues in ensuring data security and compliance. However, companies need to follow a comprehensive set of measures addressing all relevant aspects of data security and compliance in order to play it safe. Thus, in this paper at first technical architectures for using mobile devices in enterprise IT are reviewed. Thereafter a set of compliance rules is presented and, as major contribution, technical measures are explained that enable a company to integrate mobile devices into enterprise IT while still complying with these rules comprehensively. Depending on the company context, one or more of the technical architectures have to be chosen impacting the specific technical measures for compliance as elaborated in this paper. Altogether this paper, for the first time, correlates technical architectures for using mobile devices at the workplace with technical measures to assure data security and compliance according to a comprehensive set of rules.
Resumo:
Background and Problem: Sustainability reporting is a growing trend in the society. One of the most exposed industries to environmental matters is the oil and gas industry, which commit to sustainability reporting in order to deal with the industry’s destructive operations. The Global Reporting Initiative (GRI) provides voluntary guidelines in sustainability reporting, which increase transparency for the company’s stakeholders. However, it is controversial that the oil and gas industry put a great effort into sustainability reporting even though the industry is environmentally destructive. This gap is interesting to investigate and will contribute to the academic discussion. Therefore, this thesis will focus on the sustainability reporting in the oil and gas industry and to what extent the industry actually discloses material environmental information about their operations. Purpose: The purpose of this thesis is to examine how the sustainability reporting has changed in the oil and gas industry in Europe. This is performed from a stakeholder perspective. Further, it aims to investigate how oil and gas companies have followed the GRI guidelines and how the reporting has changed over time. Method: A quantitative method is used in order to answer the research questions. The data sample is based on oil and gas companies reporting according to the GRI framework during year 2012 to year 2014. The empirical data is gathered from the studied companies’ environmental category in their sustainability reports. Further, a content analysis technique, with a coding scheme, was set up to interpret and analyse the information. To enable an easy overview of the findings, the relevant data is presented in tables and diagrams. Empirical Findings and Conclusion: The majority of the studied companies have increased their level of compliance in the environmental category. Although, the majority of the companies have increased their reporting, the compliance level differs between the companies. The most reported sectors are the; “Water”, “Biodiversity”, “Emissions”, “Effluents and Waste”, “Compliance”, and “Overall”. Further, the empirical findings show that there is an overall increase in the amount of disclosed information per indicator. The conclusion of this thesis is that the environmental disclosures have increased in the oil and gas industry from year 2012 to 2014.
Resumo:
In a global society, all educational sectors need to recognise internationalism as a core, foundational principle. Whilst most educational sectors are taking up that challenge, vocational education and training (VET) is still being pulled towards the national agenda in terms of its structures and systems, and the policies driving it, disadvantaging those who graduate from VET, those who teach in it, and the businesses and countries that connect with it. This paper poses questions about the future of internationalisation in the sector. It examines whether there is a way to create a VET system that meets its primary point of value, to produce skilled workers for the local labour market, while still benefitting those graduates by providing international skills and knowledge, gained from VET institutions that are international in their outlook. The paper examines some of the key barriers created by systems and structures in VET to internationalisation and suggests that the efforts which have been made to address the problem have had limited success. It suggests that only a model which gives freedom to those with a direct vested interest, students, teachers, trainers and employers, to pursue international co-operation and liaison will have the opportunity to succeed. (DIPF/Orig.)
Resumo:
Literally, the word compliance suggests conformity in fulfilling official requirements. The thesis presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCP). The thesis presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCP are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities. In order to provide confidence in operation for the mistrusting sets of entities, CCP must provide compliance verification mechanisms. These mechanisms are employed either by all the entities or a set of authorised entities in the system to verify the compliance of the behaviour of various participating entities with the rules of the system. It is often stated that confidentiality, integrity and authentication are the primary interests of cryptology. It is evident from the literature that authentication mechanisms employ confidentiality and integrity services to achieve their goal. Therefore, the fundamental services that any cryptographic algorithm may provide are confidentiality and integrity only. Since controlling the behaviour of the entities is not a feasible cryptologic goal,the verification of the confidentiality of any data is a futile cryptologic exercise. For example, there exists no cryptologic mechanism that would prevent an entity from willingly or unwillingly exposing its private key corresponding to a certified public key. The confidentiality of the data can only be assumed. Therefore, any verification in cryptologic protocols must take the form of integrity verification mechanisms. Thus, compliance verification must take the form of integrity verification in cryptologic protocols. A definition of compliance that is conducive as a cryptologic goal is presented as a guarantee on the confidentiality and integrity services. The definitions are employed to provide a classification mechanism for various message formats in a cryptologic protocol. The classification assists in the characterisation of protocols, which assists in providing a focus for the goals of the research. The resulting concrete goal of the research is the study of those protocols that employ message formats to provide restricted confidentiality and universal integrity services to selected data. The thesis proposes an informal technique to understand, analyse and synthesise the integrity goals of a protocol system. The thesis contains a study of key recovery,electronic cash, peer-review, electronic auction, and electronic voting protocols. All these protocols contain message format that provide restricted confidentiality and universal integrity services to selected data. The study of key recovery systems aims to achieve robust key recovery relying only on the certification procedure and without the need for tamper-resistant system modules. The result of this study is a new technique for the design of key recovery systems called hybrid key escrow. The thesis identifies a class of compliant cryptologic protocols called secure selection protocols (SSP). The uniqueness of this class of protocols is the similarity in the goals of the member protocols, namely peer-review, electronic auction and electronic voting. The problem statement describing the goals of these protocols contain a tuple,(I, D), where I usually refers to an identity of a participant and D usually refers to the data selected by the participant. SSP are interested in providing confidentiality service to the tuple for hiding the relationship between I and D, and integrity service to the tuple after its formation to prevent the modification of the tuple. The thesis provides a schema to solve the instances of SSP by employing the electronic cash technology. The thesis makes a distinction between electronic cash technology and electronic payment technology. It will treat electronic cash technology to be a certification mechanism that allows the participants to obtain a certificate on their public key, without revealing the certificate or the public key to the certifier. The thesis abstracts the certificate and the public key as the data structure called anonymous token. It proposes design schemes for the peer-review, e-auction and e-voting protocols by employing the schema with the anonymous token abstraction. The thesis concludes by providing a variety of problem statements for future research that would further enrich the literature.
Resumo:
Policymakers often propose strict enforcement strategies to fight the shadow economy and to increase tax morale. However, there is an alternative bottom-up approach that decentralises political power to those who are close to the problems. This paper analyses the relationship with local autonomy. We use data on tax morale at the individual level and macro data on the size of the shadow economy to analyse the relevance of local autonomy and compliance in Switzerland. The findings suggest that there is a positive (negative) relationship between local autonomy and tax morale (size of the shadow economy).
Resumo:
Keizer, Lindenberg and Steg (2008) conduct six interesting field experiments and report that their results provide evidence of the broken windows theory. Such an analysis is highly relevant as the (broken windows) theory is both controversial and lacking empirical support. Keizer et al.’s key aim was to conceptualize a disorderly setting in such a way that it is linked to a process of spreading norm violation. The strength of the study is the exploration of cross-norm inhibition effects in a controlled field experimental environment. Their results show that if norm violating behavior becomes more common, it negatively affects compliance in other areas. Nevertheless, this comment paper discusses several shortcomings or limitations and provides new empirical evidence that deals with these problems.
Resumo:
Acknowledgement that many children in Australia travel in restraints that do not offer them the best protection has led to recent changes in legislation such that the type of restraint for children under 7 years is now specified. This paper reports the results of two studies (observational; focus group/ survey) carried out in the state of Queensland to evaluate the effectiveness of these changes to the legislation. Observations suggested that almost all of the children estimated as aged 0-12 years were restrained (95%). Analysis of the type of restraint used for target-aged children (0-6 year olds) suggests that the proportion using an age-appropriate restraint has increased by an estimated 7% since enactment of the legislation. However, around 1 in 4 children estimated as aged under 7 years were using restraints too large for good fit. Results from the survey and focus group suggested parents were supportive of the changes in legislation. Non-Indigenous parents agreed that the changes had been necessary, were effective at getting children into the right restraints, were easy to understand as well as making it clear what restraint to use with children. Moreover, they did not see the legislation as too complicated or too hard to comply with. Indigenous parents who participated in a focus group also regarded the legislation as improving children’s safety. However, they identified the cost of restraints as an important barrier to compliance. In summary, the legislation appears to have had a positive effect on compliance levels and on raising parental awareness of the need to restrain children child-specific restraints for longer. However, it would seem that an important minority of parents transition their children into larger restraints too early for optimal protection. Intervention efforts should aim to better inform these parents about appropriate ages for transition, especially from forward facing childseats. This could potentially be through use of other important transitions that occur at the same age, such as starting school. The small proportion of parents who do not restrain their children at all are also an important community sector to target. Finally, obtaining restraints presents a significant barrier to compliance for parents on limited incomes and interventions are needed to address this.
"I drove after drinking alcohol" and other risky driving behaviours reported by young novice drivers
Resumo:
Background Volitional risky driving behaviours including drink- and drug-driving and speeding contribute to the overrepresentation of young novice drivers in road crash fatalities, and crash risk is greatest during the first year of independent driving in particular. Aims To compare: 1) the self-reported compliance of drivers with road rules relating to substance-impaired driving and other risky driving behaviours including speeding and driving tired, one year after progression from a Learner to a Provisional (intermediate) licence; and 2) the interrelationships between substance-impaired driving and other risky driving behaviours (crashes, offences, and Police avoidance). Methods 1268 drivers (373 males) aged 17-26 years were surveyed regarding their sociodemographics (age, gender) and self-reported driving behaviours including crashes, offences, Police-avoidance, and driving intentions. Results A relatively small proportion of participants reported driving after taking drugs (5.9% males, 1.3% females) and drinking alcohol (19.3% males, 11.6% females). In comparison, a considerable proportion of participants reported at least occasionally exceeding speed limits (85.7% novices) and driving when tired (82.7% novices). Substance-impaired driving was associated with avoiding Police, speeding, risky driving intentions, and self reported crashes and offences. Forty-four percent of illicit-drug drivers also reported alcohol-impaired driving. Discussion and conclusions The low self-reported prevalence of substance-impaired driving suggests official enforcement measures play a role in promoting compliance, in addition to social influences such as the broader community and the young novice drivers’ social networks including friends and family. Conversely, the prevalence of speeding appears to reflect the pervasive cultural acceptance of this behaviour. Given the interrelationships between the risky driving behaviours, a deeper understanding of influential factors is required to inform targeted and general countermeasure implementation and evaluation during this critical driving period.
Resumo:
Portable water-filled road barriers (PWFB) are roadside structures placed on temporary construction zones to separate work site from moving traffic. Recent changes in governing standards require PWFB to adhere to strict compliance in terms of lateral displacement of the road barriers and vehicle redirectionality. Actual road safety barrier test can be very costly, thus researchers resort to Finite Element Analysis (FEA) in the initial designs phase prior to real vehicle test. There has been many research conducted on concrete barriers and flexible steel barriers using FEA, however not many is done pertaining to PWFB. This research probes a new method to model joint mechanism in PWFB. Two methods to model the joining mechanism are presented and discussed in relation to its practicality and accuracy to real work applications. Moreover, the study of the physical gap and mass of the barrier was investigated. Outcome from this research will benefit PWFB research and allow road barrier designers better knowledge in developing the next generation of road safety structures.
Resumo:
Objectives Actigraphy can reliably assess sleep in healthy adults and be used to estimate total sleep time in suspected obstructive sleep apnoea (OSA) patients. We compared sleep quality for Continuous Positive Air Pressure (CPAP) treated OSA patients and controls, evaluating the impact of stopping CPAP for one night. Methods 11 men, aged 51–75 years (m = 65.6 years), compliant CPAP users, treated for 1–19 years (m = 7.8 years) wore Cambridge Neurotechnology Ltd actiwatches for one night while using CPAP and for one night sleeping without CPAP. A control group of 11 healthy men, aged 63–74 years (m = 64.1 years) slept normally whilst wearing an actiwatch. Subsequent daytime sleepiness was recorded using Karolinska sleepiness scores (KSS). Results Actimetry showed no significant differences between actual sleep time, sleep efficiency, sleep disturbance index or number of wake bouts when comparing OSA participants using CPAP, with controls; there was no difference in subsequent daytime sleepiness, control KSS = 4.21, OSA KSS = 4.17. Without CPAP there was no significant difference in sleep length or sleep onset latency compared with using CPAP, but there was a significant impact on sleep quality as shown by: increased sleep disturbance index from 7.9 to 13.8 [t(10) = 3.510, P < 0.05], decreased percent of actual sleep from 92.05% to 86.15% [t(10) = 3.51, P < 0.05], decreased sleep efficiency from 86.6% to 81% [t(10) = 2.204, P < 0.05] and increased number of wake bouts from 29 to 42.5 [t(10) = 3.877, P < 0.05]. Daytime sleepiness became significantly worse increasing from KSS 4.17 to 6.27 [t(10) = )4.96, P < 0.05]. Conclusion There was no disparity in sleep quality or KSS scores between CPAP treated OSA patients and healthy controls of a similar age. Treated OSA patients obtained quality sleep with no elevated day time sleepiness. However, cessation of treatment for one night caused sleep quality to deteriorate despite a comparable sleep time; the deterioration in sleep quality could explain the increase in daytime sleepiness. OSA patients need to know that even short-term noncompliance with CPAP treatment significantly impairs sleep quality, leading to excessive sleepiness during monotonous tasks such as driving. Actigraphy successfully identified nights of non-compliance in treated OSA patients; but did not differentiate between the sleep of CPAP treated OSA patients and healthy controls.
Resumo:
This paper describes a program of research examining emergency messaging during the response and early recovery phases of natural disasters. The objective of this suite of studies is to develop message construction frameworks and channels that maximise community compliance with instructional messaging. The research has adopted a multi-hazard approach and considers the impact of formal emergency messages, as well as informal messages (e.g., social media posts), on community compliance. In recent years, media reports have consistently demonstrated highly variable community compliance to instructional messaging during natural disasters. Footage of individuals watching a tsunami approaching from the beach or being over-run by floodwaters are disturbing and indicate the need for a clearer understanding of decision making under stress. This project’s multi-hazard approach considers the time lag between knowledge of the event and desired action, as well as how factors such as message fatigue, message ambiguity, and the interplay of messaging from multiple media sources are likely to play a role in an individual’s compliance with an emergency instruction. To examine effective messaging strategy, we conduct a critical analysis of the literature to develop a framework for community consultation and design experiments to test the potential for compliance improvement. Preliminary results indicate that there is, as yet, little published evidence on which to base decisions about emergency instructional messages to threatened communities. The research described here will contribute improvements in emergency instructional message compliance by generating an evidence-based framework that takes into account behavioural compliance theory, the psychology of decision making under stress, and multiple channels of communication including social media.
Resumo:
Introduction. Spinal flexibility measurement is an important aspect of pre-operative clinical assessment in the treatment of Adolescent Idiopathic Scoliosis (AIS). Clinically, curve flexibility is a combined measure for all vertebral levels. We propose that in vivo flexibility for individual spinal joints could provide valuable additional information in planning treatment for scoliosis. Methods. Individual spinal joint flexibility in the coronal plane was measured for a series of AIS patients using axially loaded magnetic resonance imaging. Each patient underwent magnetic resonance imaging in the supine position, with no axial load, and then following application of an axial compressive load equal to half the patient’s bodyweight. Coronal plane disc wedge angles in the unloaded and loaded configurations were measured. Joint moments exerted by the axial compressive load were used to derive estimates of individual joint compliance. Results. Fifteen AIS patients were included in the study (mean clinical Cobb angle 46 degrees, mean age 15.3 years). Mean intra-observer measurement error for endplate inclination was 1.6˚. The mean increase in measured major Cobb angle between unloaded and loaded scans was 7.6˚. For certain spinal levels (+2,+1,-2 relative to the apex) there was a statistically significant relationship between change in wedge angle under load and initial wedge angle, such that initially highly wedged discs demonstrated a smaller change in wedge angle than less wedged discs. Highly wedged discs were observed near the apex of the curve, which corresponded to lower joint compliance in the apical region. Conclusion. Approaches such as this can provide valuable biomechanical data on in vivo spinal biomechanics in AIS. Knowledge of individual joint flexibility may assist surgeons to determine which spinal procedure is most appropriate for a patient, which levels should be included in a spinal fusion and the relative mobility of individual joints in the deformed region of the spine.
Resumo:
Background Segmental biomechanics of the scoliotic spine are important since the overall spinal deformity is comprised of the cumulative coronal and axial rotations of individual joints. This study investigates the coronal plane segmental biomechanics for adolescent idiopathic scoliosis patients in response to physiologically relevant axial compression. Methods Individual spinal joint compliance in the coronal plane was measured for a series of 15 idiopathic scoliosis patients using axially loaded magnetic resonance imaging. Each patient was first imaged in the supine position with no axial load, and then again following application of an axial compressive load. Coronal plane disc wedge angles in the unloaded and loaded configurations were measured. Joint moments exerted by the axial compressive load were used to derive estimates of individual joint compliance. Findings The mean standing major Cobb angle for this patient series was 46°. Mean intra-observer measurement error for endplate inclination was 1.6°. Following loading, initially highly wedged discs demonstrated a smaller change in wedge angle, than less wedged discs for certain spinal levels (+ 2,+1,− 2 relative to the apex, (p < 0.05)). Highly wedged discs were observed near the apex of the curve, which corresponded to lower joint compliance in the apical region. Interpretation While individual patients exhibit substantial variability in disc wedge angles and joint compliance, overall there is a pattern of increased disc wedging near the curve apex, and reduced joint compliance in this region. Approaches such as this can provide valuable biomechanical data on in vivo spinal biomechanics of the scoliotic spine, for analysis of deformity progression and surgical planning.