106 resultados para Requests
Resumo:
The Queensland Injury Surveillance Unit (QISU) has been collecting and analysing injury data in Queensland since 1988. QISU data is collected from participating emergency departments (EDs) in urban, rural and remote areas of Queensland. Using this data, QISU produces several injury bulletins per year on selected topics, providing a picture of Queensland injury, and setting this in the context of relevant local, national and international research and policy. These bulletins are used by numerous government and non-government groups to inform injury prevention and practice throughout the state. QISU bulletins are also used by local and state media to inform the general public of injury risk and prevention strategies. In addition to producing the bulletins, QISU regularly responds to requests for information from a variety of sources. These requests often require additional analysis of QISU data to tailor the response to the needs of the end user. This edition of the bulletin reviews 5 years of information requests to QISU.
Resumo:
The missing-item format and interrupted behaviour chain strategy have been used to increase spontaneous requests among children with developmental disabilities, but their relative effectiveness has not been compared. The present study compared the extent to which each strategy evoked spontaneous requests and challenging behaviour in three children with autism. Sessions where a needed item was withheld (missing-item format) were compared to sessions involving the removal of a needed item (interrupted behaviour chain strategy). Comparisons were conducted across three activates in an alternating treatments design. Both strategies evoked spontaneous requests with no significant difference in effectiveness. Few differences were obtained in the amount of challenging behaviour evoked but the two conditions, although a moderate inverse relationship between spontaneous requesting and challenging behaviour was observed. The results suggest that theses two procedures yield similar outcomes. Concurrent use of both strategies may enable teachers to create a greater number of opportunities for requesting.
Resumo:
We have designed a mobile application that takes advantage of the built-in features of smart phones such as camera and GPS that allow users to take geo-tagged photos while on the move. Urban residents can take pictures of broken street furniture and public property requiring repair, attach a brief description, and submit the information as a maintenance request to the local government organisation of their city. This paper discusses the design approach that led to the application, highlights a built-in mechanism to elicit user feedback, and evaluates the progress to date with user feedback and log statistics. It concludes with an outlook highlighting user requested features and our own design aspirations for moving from a reporting tool to a civic engagement tool.
Resumo:
The two-phrase best-value process has been widely used by public agencies for Design and Build (DB) procurement, with a key issue in the first phase of pre-qualification being the determination of evaluation criteria. This study identified a set of general qualification criteria for design-builders and compares their relative importance by a thorough content analysis of 97 Requests for Qualification (RFQ) for public DB projects advertised between 2000 and 2011 in various regions of the USA. The thirty-nine qualification criteria found are summarized and classified into eight categories comprising: experience; project understanding and approach; organizational structure and capacity; past performance record; professional qualifications; responsiveness to RFQs, office location and familiarity with local environment; and legal status in descending order of their relative importance. A comparative analysis of different types of projects shows that the relative weightings of the qualification criteria vary according to different characteristics of the DB projects involved.
Resumo:
The early years are significant in optimising children’s educational, emotional and social outcomes and have become a major international policy priority. Within Australia, policy levers have prioritised early childhood education, with a focus on program quality, as it is associated with lifelong success. Longitudinal studies have found that high quality teacher-child interactions are an essential element of high quality programs, and teacher questioning is one aspect of teacher-child interactions that has been attributed to affecting the quality of education, linking open ended questioning to higher cognitive achievement. Teachers, however, overwhelmingly ask more closed than open questions. In the classroom, like everyday interaction, questions in interaction require answers. They are used to request, offer, repair, challenge, seek agreement (Curl & Drew, 2008; Enfield, Stivers, & Levinson, 2010; Hayano, 2013; Schegloff, 2007). Teachers use questions to set agendas and manage lessons (McHoul, 1978; Mehan, 1979; Sacks, 1995), and to gauge students’ knowledge and understanding (Lerner, 1995; McHoul, 1978; Mehan, 1979). Drawing on data from the Australian Research Council project Interacting with Knowledge: Interacting with people: Web searching in early childhood, this paper focuses on an extended sequence of talk between a teacher with two students aged between 3.5 and 5 years in a preschool classroom. The episode, drawn from a corpus of over 200 hours of video recorded data, captures how the teacher and children undertake an online search for images of lady beetles and hairy caterpillars on the Web. Ethnomethodological and conversation analysis approaches examine how the teacher asks questions, which call on the children to display their factual knowledge about the search topic. The fine grained analysis shows how teachers design their interactions to prompt children’s displays of factual knowledge, and how the design of factual questions affect a student’s response in terms of what and how they respond. In focussing on how the teacher designs factual questions and how children respond to these questions it shows that question design can close down a student’s reply; or elicit a range of answers, from one word to extended more detailed responses. Understanding how the design of teachers’ questions can influence students’ responses has pedagogic implications and may support educators to make intentional decisions regarding their own questioning techniques.
Resumo:
Optimizing the quality of early childhood education (ECE) is an international policy priority. Teacher-child interactions have been identified as the strongest indicator of quality and most potent predictor of child outcomes. This paper presents ethnomethodological and conversation analysis of an interaction between an early childhood educator with two children as they engage with each other, while performing a Web search. Analyses shows that question design can elicit qualitatively different responses with regard to sustained interactions. Understanding the design of teacher questions has pedagogic implications for the work of the teacher and for the broader quality agenda in early childhood education.
Resumo:
Flexible working arrangements have attracted growing attention in workplaces across Australia and in many other countries in recent years. This contribution utilises the results of two large Australian employee surveys to analyse who asks for flexibility, why, and with what effects on work-life interference. This analysis is set in the context of Australia’s ‘Right to Request’ (RTR) provisions which, at the time of the study, gave parents of preschool children and those with a disabled child aged up to 18 the RTR flexibility. The analysis also draws on a set of qualitative interviews of those we term ‘discontented non-requesters’ (that is, those who are not content with current arrangements but who do not ask for flexibility) to probe beneath the survey results to consider explanations about why some people do not ask for flexibility despite desiring different working arrangements. We conclude with the implications for policy and regulation.
Resumo:
Developments in information technology will drive the change in records management; however, it should be the health information managers who drive the information management change. The role of health information management will be challenged to use information technology to broker a range of requests for information from a variety of users, including he alth consumers. The purposes of this paper are to conceptualise the role of health information management in the context of a technologically driven and managed health care environment, and to demonstrat e how this framework has been used to review and develop the undergraduate program in health information management at the Queensland University of Technology.
Resumo:
John Frazer, Professor, trained at the Architectural Association, taught first at Cambridge University and then the AA in the 1970s and again in the '90s. He was Head of School of Design Research History and Criticism at the University of Ulster in the 1980s, he also ran a systems and design consultancy with his wife Julia (including projects for Cedric Price and Walter Segal) and was founder and chairman of Autographics software. He is currently Swire Chair Professor and Head of School of Design in Hong Kong.----- This is a very personal perspective on a concept of universal and future significance. It is personal, both is the sense that it is an unashamedly biased view of both the significance of the project, and the nature of that significance and because the author was personally involved as one of the consultants on GENERATOR and subsequently involved Cedric Price in its educational application at the Architectural Association. GENERATOR is still very much alive and was still developing whilst this chapter was being written.
Resumo:
Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined area. Documents can be loaded onto a portable device and used in the approved areas, but cannot be used if the device moves to another area. Our contribution includes a taxonomy for access control in the presence of requests to perform non-instantaneous controlled actions.
Resumo:
Real-Time Kinematic (RTK) positioning is a technique used to provide precise positioning services at centimetre accuracy level in the context of Global Navigation Satellite Systems (GNSS). While a Network-based RTK (N-RTK) system involves multiple continuously operating reference stations (CORS), the simplest form of a NRTK system is a single-base RTK. In Australia there are several NRTK services operating in different states and over 1000 single-base RTK systems to support precise positioning applications for surveying, mining, agriculture, and civil construction in regional areas. Additionally, future generation GNSS constellations, including modernised GPS, Galileo, GLONASS, and Compass, with multiple frequencies have been either developed or will become fully operational in the next decade. A trend of future development of RTK systems is to make use of various isolated operating network and single-base RTK systems and multiple GNSS constellations for extended service coverage and improved performance. Several computational challenges have been identified for future NRTK services including: • Multiple GNSS constellations and multiple frequencies • Large scale, wide area NRTK services with a network of networks • Complex computation algorithms and processes • Greater part of positioning processes shifting from user end to network centre with the ability to cope with hundreds of simultaneous users’ requests (reverse RTK) There are two major requirements for NRTK data processing based on the four challenges faced by future NRTK systems, expandable computing power and scalable data sharing/transferring capability. This research explores new approaches to address these future NRTK challenges and requirements using the Grid Computing facility, in particular for large data processing burdens and complex computation algorithms. A Grid Computing based NRTK framework is proposed in this research, which is a layered framework consisting of: 1) Client layer with the form of Grid portal; 2) Service layer; 3) Execution layer. The user’s request is passed through these layers, and scheduled to different Grid nodes in the network infrastructure. A proof-of-concept demonstration for the proposed framework is performed in a five-node Grid environment at QUT and also Grid Australia. The Networked Transport of RTCM via Internet Protocol (Ntrip) open source software is adopted to download real-time RTCM data from multiple reference stations through the Internet, followed by job scheduling and simplified RTK computing. The system performance has been analysed and the results have preliminarily demonstrated the concepts and functionality of the new NRTK framework based on Grid Computing, whilst some aspects of the performance of the system are yet to be improved in future work.
Resumo:
Context The School of Information Technology at QUT has recently undertaken a major restructuring of their Bachelor of Information Technology (BIT) course. Some of the aims of this restructuring include a reduction in first year attrition and to provide an attractive degree course that meets both student and industry expectations. Emphasis has been placed on the first semester in the context of retaining students by introducing a set of four units that complement one another and provide introductory material on technology, programming and related skills, and generic skills that will aid the students throughout their undergraduate course and in their careers. This discussion relates to one of these four fist semester units, namely Building IT Systems. The aim of this unit is to create small Information Technology (IT) systems that use programming or scripting, databases as either standalone applications or web applications. In the prior history of teaching introductory computer programming at QUT, programming has been taught as a stand alone subject and integration of computer applications with other systems such as databases and networks was not undertaken until students had been given a thorough grounding in those topics as well. Feedback has indicated that students do not believe that working with a database requires programming skills. In fact, the teaching of the building blocks of computer applications have been compartmentalized and taught in isolation from each other. The teaching of introductory computer programming has been an industry requirement of IT degree courses as many jobs require at least some knowledge of the topic. Yet, computer programming is not a skill that all students have equal capabilities of learning (Bruce et al., 2004) and this is clearly shown by the volume of publications dedicated to this topic in the literature over a broad period of time (Eckerdal & Berglund, 2005; Mayer, 1981; Winslow, 1996). The teaching of this introductory material has been done pretty much the same way over the past thirty years. During this period of time that introductory computer programming courses have been taught at QUT, a number of different programming languages and programming paradigms have been used and different approaches to teaching and learning have been attempted in an effort to find the golden thread that would allow students to learn this complex topic. Unfortunately, computer programming is not a skill that can be learnt in one semester. Some basics can be learnt but it can take many years to master (Norvig, 2001). Faculty data typically has shown a bimodal distribution of results for students undertaking introductory programming courses with a high proportion of students receiving a high mark and a high proportion of students receiving a low or failing mark. This indicates that there are students who understand and excel with the introductory material while there is another group who struggle to understand the concepts and practices required to be able to translate a specification or problem statement into a computer program that achieves what is being requested. The consequence of a large group of students failing the introductory programming course has been a high level of attrition amongst first year students. This attrition level does not provide good continuity in student numbers in later years of the degree program and the current approach is not seen as sustainable.
Resumo:
This paper investigates self–Googling through the monitoring of search engine activities of users and adds to the few quantitative studies on this topic already in existence. We explore this phenomenon by answering the following questions: To what extent is the self–Googling visible in the usage of search engines; is any significant difference measurable between queries related to self–Googling and generic search queries; to what extent do self–Googling search requests match the selected personalised Web pages? To address these questions we explore the theory of narcissism in order to help define self–Googling and present the results from a 14–month online experiment using Google search engine usage data.
Resumo:
In their statistical analyses of higher court sentencing in South Australia, Jeffries and Bond (2009) found evidence that Indigenous offenders were treated more leniently than non-Indigenous offenders, when they appeared before the court under similar numerical circumstances. Using a sample of narratives for criminal defendants convicted in South Australia’s higher courts, the current article extends Jeffries and Bond’s (2009) prior statistical work by drawing on the ‘focal concerns’ approach to establish whether, and in what ways, Indigeneity comes to exert a mitigating influence over sentencing. Results show that the sentencing stories of Indigenous and non-Indigenous offenders differed in ways that may have reduced assessments of blameworthiness and risk for Indigenous defendants. In addition, judges highlighted a number of Indigenous-specific constraints that potentially could result in imprisonment being construed as an overly harsh and costly sentence for Indigenous offenders.
Resumo:
This paper is a report of a study to explore what constitutes nurse-patient interactions and to ascertain patients' perceptions of these interactions. BACKGROUND: Nurses maintain patient integrity through caring practices. When patients feel disempowered or that their integrity is threatened they are more likely to make a complaint. When nurses develop a meaningful relationship with patients they recognize and address their concerns. It is increasingly identified in the literature that bureaucratic demands, including increased workloads and reduced staffing levels, result in situations where the development of a 'close' relationship is limited. METHOD: Data collection took two forms: twelve 4-hour observation periods of nurse-patient interactions in one cubicle (of four patients) in a medical and a surgical ward concurrently over a 4-week period; and questionnaires from inpatients of the two wards who were discharged during the 4-week data collection period in 2005. FINDINGS: Observation data showed that nurse-patient interactions were mostly friendly and informative. Opportunities to develop closeness were limited. Patients were mostly satisfied with interactions. The major source of dissatisfaction was when patients perceived that nurses were not readily available to respond to specific requests. Comparison of the observation and survey data indicated that patients still felt 'cared for' even when practices did not culminate in a 'connected' relationship. CONCLUSION: The findings suggest that patients believe that caring is demonstrated when nurses respond to specific requests. Patient satisfaction with the service is more likely to be improved if nurses can readily adapt their work to accommodate patients' requests or, alternatively, communicate why these requests cannot be immediately addressed.