994 resultados para Operational Stress Injuries
Resumo:
Hamstring strain injuries (HSIs) are common in a number of sports and incidence rates have not declined in recent times. Additionally, the high rate of recurrent injuries suggests that our current understanding of HSI and re-injury risk is incomplete. Whilst the multifactoral nature of HSIs is agreed upon by many, often individual risk factors and/or causes of injury are examined in isolation. This review aims to bring together the causes, risk factors and interventions associated with HSIs to better understand why HSIs are so prevalent. Running is often identified as the primary activity type for HSIs and given the high eccentric forces and moderate muscle strain placed on the hamstrings during running these factors are considered to be part of the aetiology of HSIs. However, the exact causes of HSIs remain unknown and whilst eccentric contraction and muscle strain purportedly play a role, accumulated muscle damage and/or a single injurious event may also contribute. Potentially, all of these factors interact to varying degrees depending on the injurious activity type (i.e. running, kicking). Furthermore, anatomical factors, such as the biarticular organization, the dual innervations of biceps femoris (BF), fibre type distribution, muscle architecture and the degree of anterior pelvic tilt, have all been implicated. Each of these variables impact upon HSI risk via a number of different mechanisms that include increasing hamstring muscle strain and altering the susceptibility of the hamstrings to muscle damage. Reported risk factors for HSIs include age, previous injury, ethnicity, strength imbalances, flexibility and fatigue. Of these, little is known, definitively, about why previous injury increases the risk of future HSIs. Nevertheless, interventions put in place to reduce the incidence of HSIs by addressing modifiable risk factors have focused primarily on increasing eccentric strength, correcting strength imbalances and improving flexibility. The response to these intervention programmes has been mixed with varied levels of success reported. A conceptual framework is presented suggesting that neuromuscular inhibition following HSIs may impede the rehabilitation process and subsequently lead to maladaptation of hamstring muscle structure and function, including preferentially eccentric weakness, atrophy of the previously injured muscles and alterations in the angle of peak knee flexor torque. This remains an area for future research and practitioners need to remain aware of the multifactoral nature of HSIs if injury rates are to decline.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
-
Resumo:
-
Resumo:
This report is an update of an earlier one produced in January 2010 (see Carrington et al. 2010) which remains as an ePrint through the project’s home page. This report focuses on our examination of extant data which have been sourced with respect to unintentional serious and violent harm, including injuries, to males living in regional and remote Australia . and which were available in public data bases at production. Such harm typically might be caused by, for example, transport accidents, occupational exposures and hazards, burns and so on. Thus unintentional violent harm can cause physical trauma the consequences of which can lead to chronic conditions including psychological harm or substance abuse.
Resumo:
Several authors stress the importance of data’s crucial foundation for operational, tactical and strategic decisions (e.g., Redman 1998, Tee et al. 2007). Data provides the basis for decision making as data collection and processing is typically associated with reducing uncertainty in order to make more effective decisions (Daft and Lengel 1986). While the first series of investments of Information Systems/Information Technology (IS/IT) into organizations improved data collection, restricted computational capacity and limited processing power created challenges (Simon 1960). Fifty years on, capacity and processing problems are increasingly less relevant; in fact, the opposite exists. Determining data relevance and usefulness is complicated by increased data capture and storage capacity, as well as continual improvements in information processing capability. As the IT landscape changes, businesses are inundated with ever-increasing volumes of data from both internal and external sources available on both an ad-hoc and real-time basis. More data, however, does not necessarily translate into more effective and efficient organizations, nor does it increase the likelihood of better or timelier decisions. This raises questions about what data managers require to assist their decision making processes.
Resumo:
Many modern business environments employ software to automate the delivery of workflows; whereas, workflow design and generation remains a laborious technical task for domain specialists. Several differ- ent approaches have been proposed for deriving workflow models. Some approaches rely on process data mining approaches, whereas others have proposed derivations of workflow models from operational struc- tures, domain specific knowledge or workflow model compositions from knowledge-bases. Many approaches draw on principles from automatic planning, but conceptual in context and lack mathematical justification. In this paper we present a mathematical framework for deducing tasks in workflow models from plans in mechanistic or strongly controlled work environments, with a focus around automatic plan generations. In addition, we prove an associative composition operator that permits crisp hierarchical task compositions for workflow models through a set of mathematical deduction rules. The result is a logical framework that can be used to prove tasks in workflow hierarchies from operational information about work processes and machine configurations in controlled or mechanistic work environments.
Resumo:
True stress-strain curve of railhead steel is required to investigate the behaviour of railhead under wheel loading through elasto-plastic Finite Element (FE) analysis. To reduce the rate of wear, the railhead material is hardened through annealing and quenching. The Australian standard rail sections are not fully hardened and hence suffer from non-uniform distribution of the material property; usage of average properties in the FE modelling can potentially induce error in the predicted plastic strains. Coupons obtained at varying depths of the railhead were, therefore, tested under axial tension and the strains were measured using strain gauges as well as an image analysis technique, known as the Particle Image Velocimetry (PIV). The head hardened steel exhibit existence of three distinct zones of yield strength; the yield strength as the ratio of the average yield strength provided in the standard (σyr=780MPa) and the corresponding depth as the ratio of the head hardened zone along the axis of symmetry are as follows: (1.17 σyr, 20%), (1.06 σyr, 20%- 80%) and (0.71 σyr, > 80%). The stress-strain curves exhibit limited plastic zone with fracture occurring at strain less than 0.1.
Resumo:
In Newson v Aust Scan Pty Ltd t/a Ikea Springwood [2010] QSC 223 the Supreme Court examined the discretion under s 32(2) of the Personal Injuries Proceedings Act 2002 (Qld), to permit a document which has not been disclosed as required by the pre-court procedures under the PIPA to be used in a subsequent court proceeding. This appears to be the first time that the nature and parameters of the discretion have been judicially considered.
Resumo:
This article describes the development and initial validation of a new instrument to measure academic stress—the Educational Stress Scale for Adolescents (ESSA). A series of cross-sectional questionnaire surveys were conducted with more than 2,000 Chinese adolescents to examine the psychometric properties. The final 16-item ESSA contains five latent variables: Pressure from study, Workload, Worry about grades, Self-expectation, and Despondency, which together explain 64% of the total item variance. Scale scores showed adequate internal consistency, 2-week test–retest reliability, and satisfactory concurrent validity. A confirmatory factor analysis suggested the proposed factor model fits well in a different sample. For researchers who have a particular interest in academic stress among adolescents, the ESSA promises to be a useful tool.
Resumo:
As an international norm, the Responsibility to Protect (R2P) has gained substantial influence and institutional presence—and created no small controversy—in the ten years since its first conceptualisation. Conversely, the Protection of Civilians in Armed Conflict (PoC) has a longer pedigree and enjoys a less contested reputation. Yet UN Security Council action in Libya in 2011 has thrown into sharp relief the relationship between the two. UN Security Council Resolutions 1970 and 1973 follow exactly the process envisaged by R2P in response to imminent atrocity crimes, yet the operative paragraphs of the resolutions themselves invoke only PoC. This article argues that, while the agendas of PoC and R2P converge with respect to Security Council action in cases like Libya, outside this narrow context it is important to keep the two norms distinct. Peacekeepers, humanitarian actors, international lawyers, individual states and regional organisations are required to act differently with respect to the separate agendas and contexts covered by R2P and PoC. While overlap between the two does occur in highly visible cases like Libya, neither R2P nor PoC collapses normatively, institutionally or operationally into the other.
Resumo:
The focus of governments on increasing active travel has motivated renewed interest in cycling safety. Bicyclists are up to 20 times more likely to be involved in serious injury crashes than drivers so understanding the relationship among factors in bicyclist crash risk is critically important for identifying effective policy tools, for informing bicycle infrastructure investments, and for identifying high risk bicycling contexts. This study aims to better understand the complex relationships between bicyclist self reported injuries resulting from crashes (e.g. hitting a car) and non-crashes (e.g. spraining an ankle) and perceived risk of cycling as a function of cyclist exposure, rider conspicuity, riding environment, rider risk aversion, and rider ability. Self reported data from 2,500 Queensland cyclists are used to estimate a series of seemingly unrelated regressions to examine the relationships among factors. The major findings suggest that perceived risk does not appear to influence injury rates, nor do injury rates influence perceived risks of cycling. Riders who perceive cycling as risky tend not to be commuters, do not engage in group riding, tend to always wear mandatory helmets and front lights, and lower their perception of risk by increasing days per week of riding and by increasing riding proportion on bicycle paths. Riders who always wear helmets have lower crash injury risk. Increasing the number of days per week riding tends to decrease both crash injury and non crash injury risk (e.g. a sprain). Further work is needed to replicate some of the findings in this study.