1.

Record Nr.

UNINA9910955887203321

Titolo

Translating chronic illness research into practice / / edited by Debbie Kralik, Barbara Paterson, Vivien Coates

Pubbl/distr/stampa

Chichester, West Sussex ; ; Ames, IA, : Wiley-Blackwell, 2010

ISBN

9786612690938

9781119293224

1119293227

9781282690936

1282690930

9781444318692

1444318691

Edizione

[1st ed.]

Descrizione fisica

1 online resource (225 p.)

Altri autori (Persone)

KralikDebbie

PatersonBarbara L

CoatesVivien E <1957-> (Vivien Elizabeth)

Disciplina

362.196

616.044

Soggetti

Chronic diseases

Chronic diseases - Research

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Translating Chronic Illness Research into Practice; Contents; List of Contributors; Preface; 1. Globalisation of Chronic Illness Research; Introduction; What is in a name?; Global crisis in chronic illness; Impact of chronic illness in developing nations; Trends in chronic illness research in developed nations; Policy drivers: taking action; Global initiatives for future chronic illness management; Conclusion; References; 2. Transitional Processes and Chronic Illness; Introduction; The search; Defining transition; An emerging understanding of transition; Describing transition

Transition and identityTransition and transformative learning; Transitional processes; A transition framework for practice; Conclusion; References; 3. Translating Chronic Illness Research Across the Lifespan;



Introduction; Human development across the lifespan; Key assumptions of the lifespan developmental perspective; Human development in old age; Applications of lifespan developmental perspectives in chronic illness research; Supporting age-appropriate development without jeopardising the safe management of serious chronic disease: the case of cystic fibrosis

Chronic illness in old age: providing developmentally appropriate integrity-promoting care to persons suffering from dementiaConclusions and implications; References; 4. Assisting People with Chronic Illness to Manage Co-Morbid Conditions; Introduction; Conceptualising co-morbidity; Social determinants of co-morbidities; The medical paradigm; Health-care systems; Co-morbidity management; Models of chronic illness management; Conclusion; References; 5. Conceptualisation of Self-Management; Introduction; Background to the use of the term self-management

Historical developments in self-managementAssociated concepts or models that overlap with or inform self-management; Alternative definitions of self-management; Conclusions: the future for chronic condition self-management; References; 6. The Relevance of Self-Management Programmes for People with Chronic Disease at Risk for Disease-Related Complications; Introduction; Background; Theoretical framework; Overview of relevant research; Sample; Participation; Attrition; Discussion; Conclusion; References; 7. The Potential of Technology for Providing Social Support to People and Families

IntroductionBackground; The Internet as a health resource; Impact of advanced technology in fostering therapeutic gain: overview of relevant research; Social support delivery: considerations in selecting advanced technology methods; Into the virtual future. . .; References; 8. Chronic Illness Research: Translating What We Know into What We Do; Introduction; The task ahead; The dose-response problem; The promise of research; Knowledge translation: emerging from naıvete; Embedding KT within research agencies and grants; Web-based KT innovations; What chronic illness research gets taken up?

Policy containers and the future of chronic illness

Sommario/riassunto

Translating Chronic Illness Research into Practice presents recent developments in chronic illness research and their implications for clinical practice. It delivers both a synthesis and a critique of current chronic illness research and its applications to chronic illness prevention, treatment and care. It promotes advances in knowledge about chronic illness, including discussion of the future directions for chronic illness research and gaps in present knowledge about effective chronic illness prevention, treatment and care. Key features:Contains contributions from internatio



2.

Record Nr.

UNINA9910484761003321

Titolo

Information and Communications Security : 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings / / edited by Hideki Imai, Guilin Wang

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007

ISBN

3-540-77048-8

Edizione

[1st ed. 2007.]

Descrizione fisica

1 online resource (XIV, 514 p.)

Collana

Security and Cryptology, , 2946-1863 ; ; 4861

Classificazione

004

DAT 465f

SS 4800

Disciplina

005.8

Soggetti

Cryptography

Data encryption (Computer science)

Computer networks

Data protection

Electronic data processing - Management

Computers and civilization

Algorithms

Cryptology

Computer Communication Networks

Data and Information Security

IT Operations

Computers and Society

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Authentication and Key Exchange -- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures -- New Construction of Group Secret Handshakes Based on Pairings -- nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords -- An Efficient Password-Only Two-Server Authenticated Key Exchange System -- Digital Signatures -- Formal Definition and Construction of Nominative Signature -- Short



Group Signature Without Random Oracles -- (Convertible) Undeniable Signatures Without Random Oracles -- Applications -- A New Dynamic Accumulator for Batch Updates -- Preventing Unofficial Information Propagation -- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction -- Privacy Protection on Multiple Sensitive Attributes -- Watermarking -- Audio Watermarking Algorithm Based on Centroid and Statistical Features -- A Semi-blind Watermarking Based on Discrete Wavelet Transform -- Fast Implementations -- On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme -- High Speed Modular Divider Based on GCD Algorithm -- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set -- Compact and Secure Design of Masked AES S-Box -- Applied Cryptography -- Boudot’s Range-Bounded Commitment Scheme Revisited -- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions -- Secure Multiparty Computation of DNF -- Cryptanalysis -- Square Like Attack on Camellia -- Differential Fault Analysis on CLEFIA -- Extending FORK-256 Attack to the Full Hash Function -- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard -- Formal Analysis -- A Framework for Game-Based Security Proofs -- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security -- Modeling Agreement Problems in the Universal Composability Framework -- System Security I -- A System Architecture for History-Based Access Control for XML Documents -- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing -- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies -- System Security II -- A Novel Approach for Untrusted Code Execution -- Detection and Diagnosis of Control Interception -- BIOS Security Analysis and a Kind of Trusted BIOS -- Collecting Autonomous Spreading Malware Using High-Interaction Honeypots -- Network Security -- DDoS Attack Detection Algorithms Based on Entropy Computing -- Firewall for Dynamic IP Address in Mobile IPv6 -- Application of the PageRank Algorithm to Alarm Graphs -- Drive-By Pharming.

Sommario/riassunto

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The papers presented were carefully reviewed and selected. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.