884 resultados para Bushong, Reid


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This present paper reviews the reliability and validity of visual analogue scales (VAS) in terms of (1) their ability to predict feeding behaviour, (2) their sensitivity to experimental manipulations, and (3) their reproducibility. VAS correlate with, but do not reliably predict, energy intake to the extent that they could be used as a proxy of energy intake. They do predict meal initiation in subjects eating their normal diets in their normal environment. Under laboratory conditions, subjectively rated motivation to eat using VAS is sensitive to experimental manipulations and has been found to be reproducible in relation to those experimental regimens. Other work has found them not to be reproducible in relation to repeated protocols. On balance, it would appear, in as much as it is possible to quantify, that VAS exhibit a good degree of within-subject reliability and validity in that they predict with reasonable certainty, meal initiation and amount eaten, and are sensitive to experimental manipulations. This reliability and validity appears more pronounced under the controlled (but more arti®cial) conditions of the laboratory where the signal : noise ratio in experiments appears to be elevated relative to real life. It appears that VAS are best used in within-subject, repeated-measures designs where the effect of different treatments can be compared under similar circumstances. They are best used in conjunction with other measures (e.g. feeding behaviour, changes in plasma metabolites) rather than as proxies for these variables. New hand-held electronic appetite rating systems (EARS) have been developed to increase reliability of data capture and decrease investigator workload. Recent studies have compared these with traditional pen and paper (P&P) VAS. The EARS have been found to be sensitive to experimental manipulations and reproducible relative to P&P. However, subjects appear to exhibit a signi®cantly more constrained use of the scale when using the EARS relative to the P&P. For this reason it is recommended that the two techniques are not used interchangeably

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the most celebrated qualities of the Internet is its enabling of simultaneity and multiplicity. By allowing users to open as many windows into the world as they (and their computers) can withstand, the Internet is understood to have brought places and cultures together on a scale and in a manner unprecedented. Yet, while the Internet has enabled many to reconnect with cultures and places long distanced and/or lost, it has also led to the belief that these reconnections are established with little correspondent cost to existent ties of belonging. In this paper, I focus on the dilemma multiple belongings engender for the ties of national belonging and question the sanguinity of multiple belongings as practised online. In particular, I use Lefebvre's notion of lived space to unpack the problems and contradictions of what has been called 'Greater China' for the ethnic Chinese minority in nations like Malaysia, Singapore and Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users’ access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer from the assumption that users will (can) not depart from the expected behaviour implicit in the authorisation policy. In reality however, users can and do depart from the canonical behaviour. This paper argues that the conflict of interest between insiders and authorisation mechanisms is analogous to the subset of problems formally studied in the field of game theory. It proposes a game theoretic authorisation model that can ensure users’ potential misuse of a resource is explicitly considered while making an authorisation decision. The resulting authorisation model is dynamic in the sense that its access decisions vary according to the changes in explicit factors that influence the cost of misuse for both the authorisation mechanism and the insider.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A hip fracture causes permanent changes to life style for older people. Further, two important mortality indicators found post operatively for this group include, the time until surgery after fracture, and pre-operative health status prior to surgery, yet no research is available investigating relationships between time to surgery and health status. The researchers aimed to establish the health status risks for patients aged over 65 years with a non-pathological hip fracture to guide nursing care interventions. A prospective cohort design was used to investigate relationships between time to surgery and measures on pre-operative health status indicators including, skin integrity risk, vigor, mental state, bowel function and continence. Twenty-nine patients with a mean age in years of 81.93 (SD,9.49), were recruited. The mean number of hours from time 1 assessment to surgery was 52.72 (SD,58.35) and the range was 1 hour to 219 hours. At Time 2, the mean scores of vigor and skin integrity risk were significantly higher, indicating poorer health status. A change in health status occurred but possibly due to the small sample size it was difficult to relate this result to time. However the results informed preoperative care prior to surgery, for this group.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australian climate, soils and agricultural management practices are significantly different from those of the northern hemisphere nations. Consequently, experimental data on greenhouse gas production from European and North American agricultural soils and its interpretation are unlikely to be directly applicable to Australian systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Data breach notification laws require organisations to notify affected persons or regulatory authorities when an unauthorised acquisition of personal data occurs. Most laws provide a safe harbour to this obligation if acquired data has been encrypted. There are three types of safe harbour: an exemption; a rebuttable presumption and factor-based analysis. We demonstrate, using three condition-based scenarios, that the broad formulation of most encryption safe harbours is based on the flawed assumption that encryption is the silver bullet for personal information protection. We then contend that reliance upon an encryption safe harbour should be dependent upon a rigorous and competent risk-based review that is required on a case-by-case basis. Finally, we recommend the use of both an encryption safe harbour and a notification trigger as our preferred choice for a data breach notification regulatory framework.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With the increasing threat of cyber and other attacks on critical infrastructure, governments throughout the world have been organizing industry to share information on possible threats. In Australia the Office of the Attorney General has formed Trusted Information Sharing Networks (TISN) for the various critical industries such as banking and electricity. Currently the majority of information for a TISN is shared at physical meetings. To meet cyber threats there are clearly limitations to physical meetings. Many of these limitations can be overcome by the creation of a virtual information sharing network (VISN). However there are many challenges to overcome in the design of a VISN both from a policy and technical viewpoint. We shall discuss some of these challenges in this talk.