Open Access. Powered by Scholars. Published by Universities.®

Medicine and Health Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Medicine and Health Sciences

Should Educators Be ‘Wrapping School Playgrounds In Cotton Wool’ To Encourage Physical Activity? Exploring Primary And Secondary Students’ Voices From The School Playground, Brendon P. Hyndman, Amanda Telford Jan 2015

Should Educators Be ‘Wrapping School Playgrounds In Cotton Wool’ To Encourage Physical Activity? Exploring Primary And Secondary Students’ Voices From The School Playground, Brendon P. Hyndman, Amanda Telford

Australian Journal of Teacher Education

Physical activity in school playgrounds has changed considerably over recent decades to reflect a climate of ‘surplus safety’. A growing culture of surplus safety can be attributed to a desire of parents and teachers responsible for children to protect school students from danger. The aim of this research was to examine students’ perceptions of playground safety influences on physical activity during school breaks from the perspectives of the ‘users’ of school playgrounds. Data collection consisted of seven focus groups (4 primary school & 3 secondary school) conducted across four schools (2 primary & 2 secondary). During this study, the focus …


Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward Jan 2015

Cybersecurity Vulnerabilities In Medical Devices: A Complex Environment And Multifaceted Problem, Patricia A.H. Williams, Andrew J. Woodward

Research outputs 2014 to 2021

The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This …