Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Edith Cowan University

Risk

Discipline
Publication Year
Publication
Publication Type

Articles 1 - 30 of 33

Full-Text Articles in Entire DC Network

Pain Is Underestimated In Older Adults With Risk Of Falls, Mustafa Atee Jan 2024

Pain Is Underestimated In Older Adults With Risk Of Falls, Mustafa Atee

Research outputs 2022 to 2026

Dear Editor, I have read with great interest the Xiao et al. study examining ret-rospectively the incidence of falls and related factors in outpatient and inpatient elderly sample (n= 451) aged 65 years and above. . . .


Banking Industry Sustainable Growth Rate Under Risk: Empirical Study Of The Banking Industry In Asean Countries, Isnurhadi, Sulastri, Yulia Saftiana, Ferry Jie Jan 2023

Banking Industry Sustainable Growth Rate Under Risk: Empirical Study Of The Banking Industry In Asean Countries, Isnurhadi, Sulastri, Yulia Saftiana, Ferry Jie

Research outputs 2022 to 2026

This research examines how the banking industry maintains its sustainable growth rate. The sample consists of 328 commercial banks in the ASEAN area. A fixed effect model is employed to analyze the data. The study reveals several findings: (1) The countries with the most risk in the banking industry are Indonesia, Thailand, Philippines, Malaysia, and Singapore. (2) Operational risk has a negative effect on sustainable growth and a positive effect on actual growth. Asset utilization positively affects sustainable growth and positively affects actual growth. (3) Business risk has a positive effect on sustainable growth but a negative on actual growth. …


A Critical Control Approach To Preventing Fatalities In Construction, Roberta J. Selleck Jan 2023

A Critical Control Approach To Preventing Fatalities In Construction, Roberta J. Selleck

Theses: Doctorates and Masters

Workplace fatalities continue to occur within the Australian construction industry at an unacceptably high rate. Most fatalities can be attributed to worker exposure to fatal energies while conducting high risk tasks in a dynamic work environment. Construction fatalities are usually single fatality events related to occupational safety hazards which are either not recognised by workers or not consistently controlled through existing safety practices. By comparison other resources industries have lower fatality rates because of their focus on identifying the controls and verification activities needed to address Major Accident Events (MAEs) and Principal Hazards in a manner that prevents fatalities.

The …


Occupational Therapists And Physiotherapists Weighing Up The Dignity Of Risk For People Living With A Brain Injury: Grounded Theory, Mandy Stanley, Gisela Van Kessel, Carolyn M. Murray, Deborah Forsythe, Shylie Mackintosh Oct 2022

Occupational Therapists And Physiotherapists Weighing Up The Dignity Of Risk For People Living With A Brain Injury: Grounded Theory, Mandy Stanley, Gisela Van Kessel, Carolyn M. Murray, Deborah Forsythe, Shylie Mackintosh

Research outputs 2014 to 2021

Purpose:

Following a brain injury survivors may have physical, or cognitive changes or behaviours which bring safety risks into play when engaging in activities. Therapists experience tensions in enabling the dignity of participation in the context of managing risk.

Materials and methods:

Ten occupational therapists and seven physiotherapists participated in a grounded theory study utilising semi-structured in-depth interviews to explore the tensions between dignity and management of safety risks. Data were analysed using constant comparative method and a process of moving from open coding to categories to theory development.

Results:

The process of weighing up was central to the therapists’ …


Determining The Reliability Of Critical Controls In Construction Projects, Roberta Selleck, Maureen Hassall, Marcus Cattani Sep 2022

Determining The Reliability Of Critical Controls In Construction Projects, Roberta Selleck, Maureen Hassall, Marcus Cattani

Research outputs 2022 to 2026

Across the global construction industry, fatalities continue to occur from high-risk activities, where the risk controls have been defined; however, these were unreliable. In the mining industry, Critical Control Risk Management has provided positive results in reducing major accidents, which raises the question, could the Critical Control approach reduce the fatality rate in the construction industry? This study analyzed 10 years of serious and fatal incident investigation reports from four international construction companies to (i) assess the reliability of their Critical Controls (CCs) and (ii) assess the factors that affect the reliability of CCs. The results show the reliability of …


Vulnerable, Recalcitrant And Resilient: A Foucauldian Discourse Analysis Of Risk And Older People Within The Context Of Covid-19 News Media, Marjorie Skoss, Rachel Batten, Patricia Cain, Mandy Stanley Jan 2022

Vulnerable, Recalcitrant And Resilient: A Foucauldian Discourse Analysis Of Risk And Older People Within The Context Of Covid-19 News Media, Marjorie Skoss, Rachel Batten, Patricia Cain, Mandy Stanley

Research outputs 2022 to 2026

Risk is an innate and integral part of everyday life and is present in simple, everyday occupations and complex actions. Age-related stereotypes can mean older people have little opportunity to engage in activities that present some degree of risk. The present study explores the discourse around risk and older people in the context of the COVID-19 pandemic. We investigated news media as a reflection of the dominant public discourse around older people's behaviour to identify how risk is represented in relation to occupational engagement. Texts relating to older people and COVID-19 were sourced from the West Australian newspaper for a …


Customer Value Creation For The Emerging Market Middle Class: Perspectives From Case Studies In India, Rifat Sharmelly, Anton Klarin Jan 2021

Customer Value Creation For The Emerging Market Middle Class: Perspectives From Case Studies In India, Rifat Sharmelly, Anton Klarin

Research outputs 2014 to 2021

This paper examines the customer value creation framework and discusses the design of the key elements for product development in emerging markets. A scientometric/bibliometric scoping literature review identifies a clear gap in the current research in studying prerequisites for customer value creation in emerging market contexts. Observing experiences of Daikin and Renault in the context of India, the purpose of this paper is to identify value creation strategic choices following which comprehensive customer value offerings in products and services can be successfully created by firms across the four facets of the framework in emerging markets. Value creation strategies include having …


The Profession's Role In Helping Psychologists Balance Society's Interests With Their Clients' Interests, Alfred Allan Dec 2020

The Profession's Role In Helping Psychologists Balance Society's Interests With Their Clients' Interests, Alfred Allan

Research outputs 2014 to 2021

Objective:

Psychologists find it difficult to balance their clients' and society's interests when these interests differ from each other, such as when their clients pose a risk of harm to others. Society's increasing preoccupation with harm makes their task even more difficult. The first aim with this article is to determine the reactions of those who make, enforce, and use law to address society's concerns and how they impact on psychologists. The second aim is to propose how the profession can assist psychologists deal with the competing demands prompted by these reactions.

Method:

A legal-ethical analysis was used to identify …


Intelligent Building Systems: Security And Facility Professionals’ Understanding Of System Threats,Vulnerabilities And Mitigation Practice, David J. Brooks, Michael Coole, Paul Haskell-Dowland Jan 2020

Intelligent Building Systems: Security And Facility Professionals’ Understanding Of System Threats,Vulnerabilities And Mitigation Practice, David J. Brooks, Michael Coole, Paul Haskell-Dowland

Research outputs 2014 to 2021

Intelligent Buildings or Building Automation and Control Systems (BACS) are becoming common in buildings, driven by the commercial need for functionality, sharing of information, reduced costs and sustainable buildings. The facility manager often has BACS responsibility; however, their focus is generally not on BACS security. Nevertheless, if a BACS-manifested threat is realised, the impact to a building can be significant, through denial, loss or manipulation of the building and its services, resulting in loss of information or occupancy. Therefore, this study garnered a descriptive understanding of security and facility professionals’ knowledge of BACS, including vulnerabilities and mitigation practices. Results indicate …


Wildfire Suppression – An International Analysis Of Operations, Strategy And Firefighter Safety, Greg Peter Penney Jan 2020

Wildfire Suppression – An International Analysis Of Operations, Strategy And Firefighter Safety, Greg Peter Penney

Theses: Doctorates and Masters

Wildfire suppression remains an inherently dangerous yet increasingly frequent task for fire services throughout Australia and the world. Each year firefighters from career and volunteer agencies respond to wildfires that impact the urban interface. When such an event occurs during a period of intense fire behaviour the conditions are often incompatible with life for persons either caught in the open or those seeking refuge in a vehicle. In order to improve firefighter safety and operational effectiveness at the rural urban interface (RUI) during landscape scale wildfires, this dissertation serves to examine critical components of wildfire response, most notably wildfire suppression …


Exploring Iso31000 Risk Management During Dynamic Fire And Emergency Operations In Western Australia, Greg Penney Jan 2019

Exploring Iso31000 Risk Management During Dynamic Fire And Emergency Operations In Western Australia, Greg Penney

Research outputs 2014 to 2021

Firefighting remains an inherently dangerous occupation with serious injuries and fatalities reported globally. The Australasian Fire Authorities Council adopt ISO31000 as the standard of risk management for all firefighting and mitigation operations. However, previous studies have reported that decisions made by incident controllers during dynamic emergencies are typically reactionary and only partially compliant with the ISO31000 process. This paper describes research using new qualitative and quantitative data that support incident controllers in managing risk during dynamic fire and emergency situations, in accordance with ISO31000. The research was completed through two studies. The first study explored risk attitudes of serving fire …


Time-To-Event Analysis For Sports Injury Research Part 2: Time-Varying Outcomes, Rasmus Oestergaard Nielsen, Michael Lejbach Bertelsen, Daniel Ramskov, Merete Møller, Adam Hulme, Daniel Theisen, Caroline F. Finch, Lauren Victoria Fortington, Mohammad Ali Mansournia, Erik Thorlund Parner Jan 2019

Time-To-Event Analysis For Sports Injury Research Part 2: Time-Varying Outcomes, Rasmus Oestergaard Nielsen, Michael Lejbach Bertelsen, Daniel Ramskov, Merete Møller, Adam Hulme, Daniel Theisen, Caroline F. Finch, Lauren Victoria Fortington, Mohammad Ali Mansournia, Erik Thorlund Parner

Research outputs 2014 to 2021

BACKGROUND: Time-to-event modelling is underutilised in sports injury research. Still, sports injury researchers have been encouraged to consider time-to-event analyses as a powerful alternative to other statistical methods. Therefore, it is important to shed light on statistical approaches suitable for analysing training load related key-questions within the sports injury domain.

CONTENT: In the present article, we illuminate: (i) the possibilities of including time-varying outcomes in time-to-event analyses, (ii) how to deal with a situation where different types of sports injuries are included in the analyses (ie, competing risks), and (iii) how to deal with the situation where multiple subsequent injuries …


The Design And Evaluation Of A User-Centric Information Security Risk Assessment And Response Framework, Manal Alohali, Nathan Clarke, Steven Furnell Jan 2018

The Design And Evaluation Of A User-Centric Information Security Risk Assessment And Response Framework, Manal Alohali, Nathan Clarke, Steven Furnell

Research outputs 2014 to 2021

Abstract: The risk of sensitive information disclosure and modification through the use of online services has increased considerably and may result in significant damage. As the management and assessment of such risks is a well-known discipline for organizations, it is a challenge for users from the general public. Users have difficulties in using, understanding and reacting to security-related threats. Moreover, users only try to protect themselves from risks salient to them. Motivated by the lack of risk assessment solutions and limited impact of awareness programs tailored for users of the general public, this paper aims to develop a structured approach …


Field-Scale Multi-Phase Lnapl Remediation: Validating A New Computational Framework Against Sequential Field Pilot Trials, Kaveh Sookhak Lari, Colin Johnson, John Rayner, Greg Davis Jan 2018

Field-Scale Multi-Phase Lnapl Remediation: Validating A New Computational Framework Against Sequential Field Pilot Trials, Kaveh Sookhak Lari, Colin Johnson, John Rayner, Greg Davis

Research outputs 2014 to 2021

Remediation of subsurface systems, including groundwater, soil and soil gas, contaminated with light non-aqueous phase liquids (LNAPLs) is challenging. Field-scale pilot trials of multi-phase remediation were undertaken at a site to determine the effectiveness of recovery options. Sequential LNAPL skimming and vacuum-enhanced skimming, with and without water table drawdown were trialled over 78 days; in total extracting over 5 m3 of LNAPL. For the first time, a multi-component simulation framework (including the multi-phase multi-component code TMVOC-MP and processing codes) was developed and applied to simulate the broad range of multi-phase remediation and recovery methods used in the field trials. …


A Privacy Gap Around The Internet Of Things For Open-Source Projects, Brian Cusack, Reza Khaleghparast Jan 2016

A Privacy Gap Around The Internet Of Things For Open-Source Projects, Brian Cusack, Reza Khaleghparast

Australian Information Security Management Conference

The Internet of Things (IoT) is having a more important role in the everyday lives of people. The distribution of connectivity across social and personal interaction discloses personalised information and gives access to a sphere of sensitivities that were previously masked. Privacy measures and security to protect personal sensitivities are weak and in their infancy. In this paper we review the issue of privacy in the context of IoT open-source projects, and the IoT security concerns. A proposal is made to create a privacy bubble around the interoperability of devices and systems and a filter layer to mitigate the exploitation …


Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast Jan 2015

Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast

Australian Security and Intelligence Conference

The availability of cheap small physical drones that fly around and have a variety of visual and sensor networks attached invites investigation for work applications. In this research we assess the capability of a set of commercially available drones (VTOL) that cost less than $1000 (Cheap is a relative term and we consider anything less than $5000 relatively cheap). The assessment reviews the capability to provide secure and safe motor vehicle surveillance for conformance intelligence. The evaluation was conducted by initially estimating a set of requirements that would satisfy an ideal surveillance situation and then by comparing a sample of …


Creating An Operational Security Management Structure For Inimical Environments: Papua New Guinea As A Case Study, William J. Bailey Jan 2015

Creating An Operational Security Management Structure For Inimical Environments: Papua New Guinea As A Case Study, William J. Bailey

Australian Security and Intelligence Conference

Security is a necessary cost for businesses wishing to operate in the developing economy of Papua New Guinea. The country continues to face levels of crime and violence out of proportion to other East Asian countries; which deters many would be investors. However, the potential in PNG is vast and eagerly sought after despite the high costs required to operate without harm, therefore, it is necessary manage the security situation. Experience from similar countries has shown by using optimal security management systems and structures it is possible to work safely, securely and effectively, but this requires a comprehensive security, threat …


Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward Jan 2015

Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward

Research outputs 2014 to 2021

The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This …


Judging Dread: A Quantitative Investigation Of Affect, Psychometric Dread And Risk Consequence, Melvyn Griffiths Jan 2015

Judging Dread: A Quantitative Investigation Of Affect, Psychometric Dread And Risk Consequence, Melvyn Griffiths

Theses: Doctorates and Masters

Risk is generally understood as a product of the likelihood and consequence of an event. However, the way in which estimations of consequences are formed is unclear due to the complexities of human perception. In particular, the influence of Affect, defined as positive or negative qualities subjectively assigned to stimuli, may skew risk consequence judgements. Thus a clearer understanding of the role of Affect in risk consequence estimations has significant implications for risk management, risk communication and policy formulation.

In the Psychometric tradition of risk perception, Affect has become almost synonymous with the concept of Dread, despite Dread being measured …


The Reliability Of An Adolescent Dietary Pattern Identified Using Reduced-Rank Regression: Comparison Of A Ffq And 3 D Food Record, Geeta Appannah, Gerda K. Pot, Therese A. O'Sullivan, Wendy H. Oddy, Susan A. Jebb, Gina L. Ambrosini Jan 2014

The Reliability Of An Adolescent Dietary Pattern Identified Using Reduced-Rank Regression: Comparison Of A Ffq And 3 D Food Record, Geeta Appannah, Gerda K. Pot, Therese A. O'Sullivan, Wendy H. Oddy, Susan A. Jebb, Gina L. Ambrosini

Research outputs 2014 to 2021

Despite the increasing use of dietary patterns (DP) to study diet and health outcomes, relatively few studies have examined the reliability of DP using different dietary assessment methods. Reduced-rank regression (RRR) is an emerging statistical method that incorporates a priori information to characterise DP related to specific outcomes of interest. The aim of the present study was to compare DP identified using the RRR method in a FFQ with those in a 3 d food record (FR). Participants were 783 adolescents from the Western Australian Pregnancy (Raine) Cohort Study who completed both a FFQ and FR at 14 years of …


Identifying Bugs In Digital Forensic Tools, Brian Cusack, Alain Homewood Dec 2013

Identifying Bugs In Digital Forensic Tools, Brian Cusack, Alain Homewood

Australian Digital Forensics Conference

Bugs can be found in all code and the consequences are usually managed through upgrade releases, patches, and restarting operating systems and applications. However, in mission critical systems complete fall over systems are built to assure service continuity. In our research we asked the question, what are the professional risks of bugs in digital forensic tools? Our investigation reviewed three high use professional proprietary digital forensic tools, one in which we identified six bugs and evaluated these bug in terms of potential impacts on an investigator’s work. The findings show that yes major brand name digital forensic tools have software …


Intelligence Analysis And Threat Assessment: Towards A More Comprehensive Model Of Threat, Charles Vandepeer Jan 2011

Intelligence Analysis And Threat Assessment: Towards A More Comprehensive Model Of Threat, Charles Vandepeer

Australian Security and Intelligence Conference

A central focus of intelligence is the identification, analysis and assessment of threat. However, as acknowledged by intelligence practitioners, threat assessment lags behind the related field of risk assessment. This paper highlights how definitions of threat currently favoured by intelligence agencies are primarily based on threatening entities alone. Consequently, assessments of threat are almost singularly concerned with understanding an identified enemy’s intentions and capabilities. This ‘enemy-centric’ approach to intelligence analysis has recently come in for criticism. In particular, the shortcomings of the current approach become apparent where the focus of intelligence analysis is on threats from difficult-to-identify sub-state or non-state …


Terrorism In Australia: A Psychometric Study Into The Western Australian Public Perception Of Terrorism, Richard Sargent, David J. Brooks Nov 2010

Terrorism In Australia: A Psychometric Study Into The Western Australian Public Perception Of Terrorism, Richard Sargent, David J. Brooks

Australian Security and Intelligence Conference

Terrorism is not a new concept, as historically terrorist organisations have used the threat of violence or actual violence to generate fear in individuals, organisations and governments alike. Fear is a weapon and is used to gain political, ideological or religious objectives. Past terrorist attacks have raised concerns around the world, as governments ensured that their anti-terrorism security strategies are adequate. Domestically, Australia upgraded its capacity to respond to terrorism events through security enhancements across many areas and with new initiatives such as the 2002 public counter terrorism campaign. Nevertheless, there has been restricted research into how terrorist events have …


Success Of Agile Environment In Complex Projects, Abbass Ghanbary, Julian Day Nov 2010

Success Of Agile Environment In Complex Projects, Abbass Ghanbary, Julian Day

Australian Information Warfare and Security Conference

This paper discusses the impact of agile methodology in complex and modular interrelated projects based on the authors’ practical experience and observations. With the advancement of Web technologies and complex computer systems, business applications are able to transcend boundaries in order to fully meet business requirements and comply with the legislation, policies and procedures. The success of software development as well as software deployment of these complex applications is dependent upon the employed methodology and project management. This is so because employed methodology plays an important position in capturing and modeling of business requirements and project management helps to ensure …


Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests And Parochialism, Benjamin Beard, David J. Brooks Jan 2009

Consensual Security Risk Assessment: Overcoming Bias, Conflicting Interests And Parochialism, Benjamin Beard, David J. Brooks

Australian Security and Intelligence Conference

In a risk assessment process, insular methods of data collection and analysis may lead to an inaccurate risk assessment as stakeholders hold individual biases, conflicting interests and parochial approaches to certain risks. The article considered these issues and tested a consensual risk assessment approach that can overcome many of these issues. A staged risk assessment process was applied within an entertainment complex in the Security, and Food and Beverage Departments. Eight supervisors from the two departments participated in the study, with each participants individually interviewed on their view of predefined risks followed by the same risks discussed within a facilitated …


Engaging Academically At Risk Primary School Students In An Ict Mediated After-School Program, Lee Yong Tay, Cher Ping Lim Jan 2008

Engaging Academically At Risk Primary School Students In An Ict Mediated After-School Program, Lee Yong Tay, Cher Ping Lim

Research outputs pre 2011

This case study documents how a group of 14 academically at risk Primary 5 students (11 year olds) were engaged in academic related tasks in an after school program mediated by a 3-D Multi-User Virtual Environment (MUVE). Although there was no significant difference in the students' academic performance, they were found to be more engaged in the learning tasks and had acquired a range of information and communication technology (ICT) skills. At the start of the program students attended irregularly, but this improved gradually over the weeks, and other Primary 5 students were attracted to enrol in the program. …


Men Of Steel Or Plastic Cops: The Use Of Ethnography As A Transformative Agent, Christine Teague, David Leith Jan 2008

Men Of Steel Or Plastic Cops: The Use Of Ethnography As A Transformative Agent, Christine Teague, David Leith

Research outputs pre 2011

The Perth urban rail system, like many other rail systems in Australia and overseas, is subject to crime and anti-social behaviour around the railway environs from a small minority of the travelling public. The transit officers, who form part of the security section of the Public Transport Authority, are the people employed to deal with these incidents, which can result in transit officers being injured. To fully understand the violence and antisocial behaviour that they deal with on a regular basis and develop strategies to reduce this risk of injury, it was necessary to enter their world. The researcher in …


Securing Voip: A Framework To Mitigate Or Manage Risks, Peter James, Andrew Woodward Dec 2007

Securing Voip: A Framework To Mitigate Or Manage Risks, Peter James, Andrew Woodward

Australian Information Security Management Conference

In Australia, the past few years have seen Voice over IP (VoIP) move from a niche communications medium used by organisations with the appropriate infrastructure and capabilities to a technology that is available to any one with a good broadband connection. Driven by low cost and no cost phone calls, easy to use VoIP clients and increasingly reliable connections, VoIP is replacing the Public Switch Telephone Network (PSTN) in a growing number of households. VoIP adoption appears to be following a similar path to early Internet adoption, namely little awareness by users of the security implications. Lack of concern about …


Accident Denominators Relative To Age Groups In Heavy Industries Of The Port Hedland Region Of Western Australia, John R. Bottrell Jan 2007

Accident Denominators Relative To Age Groups In Heavy Industries Of The Port Hedland Region Of Western Australia, John R. Bottrell

Theses: Doctorates and Masters

The aim of this research is to investigate characteristics of accident denominators across age groups in mining and associated process industries in the Port Hedland region of Western Australia. Emphasis has been focussed on comparing young, inexperienced groups with older, more experienced groups. A literature review revealed some key contributors to accidents among younger workers, in particular, those who had only recently entered the workforce. The review also revealed contributors impacting accidents regarding other age groups over a wide range of industry types. From these findings an accident construct model and questionnaire were designed to identify contributing and mitigating denominators …


The Information Security Ownership Question In Iso/Iec 27001 – An Implementation, Lizzie Coles-Kemp, Richard E. Overill Dec 2006

The Information Security Ownership Question In Iso/Iec 27001 – An Implementation, Lizzie Coles-Kemp, Richard E. Overill

Australian Information Security Management Conference

The information security management standard ISO/IEC 27001 is built on the notion that information security is driven by risk assessment and risk treatment. Fundamental to the success of risk assessment and treatment is the decision making process that takes risk assessment output and assigns decisions to this output in terms of risk treatment actions. It is argued that the effectiveness of the management system lies in its ability to make effective, easytoimplement and measurable decisions. One of the key issues in decision making is ownership. In this paper two aspects of information security ownership are considered: ownership of the asset …