302 resultados para Downstream Protection Values
Resumo:
Marketers spend considerable resources to motivate people to consume their products and services as a means of goal attainment (Bagozzi and Dholakia, 1999). Why people increase, decrease, or stop consuming some products is based largely on how well they perceive they are doing in pursuit of their goals (Carver and Scheier, 1992). Yet despite the importance for marketers in understanding how current performance influences a consumer’s future efforts, this topic has received little attention in marketing research. Goal researchers generally agree that feedback about how well or how poorly people are doing in achieving their goals affects their motivation (Bandura and Cervone, 1986; Locke and Latham, 1990). Yet there is less agreement about whether positive and negative performance feedback increases or decreases future effort (Locke and Latham, 1990). For instance, while a customer of a gym might cancel his membership after receiving negative feedback about his fitness, the same negative feedback might cause another customer to visit the gym more often to achieve better results. A similar logic can apply to many products and services from the use of cosmetics to investing in mutual funds. The present research offers managers key insights into how to engage customers and keep them motivated. Given that connecting customers with the company is a top research priority for managers (Marketing Science Institute, 2006), this article provides suggestions for performance metrics including four questions that managers can use to apply the findings.
Resumo:
A microgrid provides economical and reliable power to customers by integrating distributed resources more effectively. Islanded operation enables a continuous power supply for loads during a major grid disturbance. Reliability of a microgrid can be further increased by forming a mesh configuration. However, the protection of mesh microgrids is a challenging task. In this paper, protection schemes are discussed using current differential protection of a microgrid. The protection challenges associated with bi-directional power flow, meshed configuration, changing fault current level due to intermittent nature of DGs and reduced fault current level in an islanded mode are considered in proposing the protection solutions. Relay setting criterion and current transformer (CT) selection guidelines are also discussed. The results are verified using MATLAB calculations and PSCAD simulations.
Resumo:
Client puzzles are moderately-hard cryptographic problems neither easy nor impossible to solve that can be used as a counter-measure against denial of service attacks on network protocols. Puzzles based on modular exponentiation are attractive as they provide important properties such as non-parallelisability, deterministic solving time, and linear granularity. We propose an efficient client puzzle based on modular exponentiation. Our puzzle requires only a few modular multiplications for puzzle generation and verification. For a server under denial of service attack, this is a significant improvement as the best known non-parallelisable puzzle proposed by Karame and Capkun (ESORICS 2010) requires at least 2k-bit modular exponentiation, where k is a security parameter. We show that our puzzle satisfies the unforgeability and difficulty properties defined by Chen et al. (Asiacrypt 2009). We present experimental results which show that, for 1024-bit moduli, our proposed puzzle can be up to 30 times faster to verify than the Karame-Capkun puzzle and 99 times faster than the Rivest et al.'s time-lock puzzle.
Resumo:
Concrete is commonly used as a primary construction material for tall building construction. Load bearing components such as columns and walls in concrete buildings are subjected to instantaneous and long term axial shortening caused by the time dependent effects of "shrinkage", "creep" and "elastic" deformations. Reinforcing steel content, variable concrete modulus, volume to surface area ratio of the elements and environmental conditions govern axial shortening. The impact of differential axial shortening among columns and core shear walls escalate with increasing building height. Differential axial shortening of gravity loaded elements in geometrically complex and irregular buildings result in permanent distortion and deflection of the structural frame which have a significant impact on building envelopes, building services, secondary systems and the life time serviceability and performance of a building. Existing numerical methods commonly used in design to quantify axial shortening are mainly based on elastic analytical techniques and therefore unable to capture the complexity of non-linear time dependent effect. Ambient measurements of axial shortening using vibrating wire, external mechanical strain, and electronic strain gauges are methods that are available to verify pre-estimated values from the design stage. Installing these gauges permanently embedded in or on the surface of concrete components for continuous measurements during and after construction with adequate protection is uneconomical, inconvenient and unreliable. Therefore such methods are rarely if ever used in actual practice of building construction. This research project has developed a rigorous numerical procedure that encompasses linear and non-linear time dependent phenomena for prediction of axial shortening of reinforced concrete structural components at design stage. This procedure takes into consideration (i) construction sequence, (ii) time varying values of Young's Modulus of reinforced concrete and (iii) creep and shrinkage models that account for variability resulting from environmental effects. The capabilities of the procedure are illustrated through examples. In order to update previous predictions of axial shortening during the construction and service stages of the building, this research has also developed a vibration based procedure using ambient measurements. This procedure takes into consideration the changes in vibration characteristic of structure during and after construction. The application of this procedure is illustrated through numerical examples which also highlight the features. The vibration based procedure can also be used as a tool to assess structural health/performance of key structural components in the building during construction and service life.
Resumo:
In the long term, with development of skill, knowledge, exposure and confidence within the engineering profession, rigorous analysis techniques have the potential to become a reliable and far more comprehensive method for design and verification of the structural adequacy of OPS, write Nimal J Perera, David P Thambiratnam and Brian Clark. This paper explores the potential to enhance operator safety of self-propelled mechanical plant subjected to roll over and impact of falling objects using the non-linear and dynamic response simulation capabilities of analytical processes to supplement quasi-static testing methods prescribed in International and Australian Codes of Practice for bolt on Operator Protection Systems (OPS) that are post fitted. The paper is based on research work carried out by the authors at the Queensland University of Technology (QUT) over a period of three years by instrumentation of prototype tests, scale model tests in the laboratory and rigorous analysis using validated Finite Element (FE) Models. The FE codes used were ABAQUS for implicit analysis and LSDYNA for explicit analysis. The rigorous analysis and dynamic simulation technique described in the paper can be used to investigate the structural response due to accident scenarios such as multiple roll over, impact of multiple objects and combinations of such events and thereby enhance the safety and performance of Roll Over and Falling Object Protection Systems (ROPS and FOPS). The analytical techniques are based on sound engineering principles and well established practice for investigation of dynamic impact on all self propelled vehicles. They are used for many other similar applications where experimental techniques are not feasible.
Resumo:
The 'dick' tog, a briefs-style male swimsuit as it is colloquially referred to, is linked to Australia's national identity with overtly masculine bronzed 'Aussie' bodies clothed in this iconic apparel. However, the reality is, our hunger for worshiping the sun and the addiction to a beach culture is tempered by the pragmatic need to cover up and wear neck-to-knee, or more apt, head-to-toe sun protective clothing. Australia, in particular the state of Queensland, has one of the highest rates of skin cancer in the world; nevertheless, even after wide-ranging public programs for sun safety awareness many people still continue to wear designs that provide minimal sun protection. This paper will examine issues surrounding fashion and sun safe clothing. It will be proposed that in order to have effective community adoption of sun safe practices it is critical to understand the important role that fashion plays in determining sun protective behaviour.
Resumo:
In June 2011, a research project team from the Institute for Ethics, Governance and Law (IEGL), Queensland University of Technology, the United Nations University, and the Australian Government’s Asia Pacific Civil-Military Centre of Excellence (APCMCOE) held three Capacity-Building Workshops (the Workshops) on the Responsibility to Protect (R2P) and the Protection of Civilians (POC) in Armed Conflict in Manila, Kuala Lumpur, and Jakarta. The research project is funded by the Australian Responsibility to Protect Fund, with support from APCMCOE. Developments in Libya and Cote d’Ivoire and the actions of the United Nations Security Council have given new significance to the relationship between R2P and POC, providing impetus to the relevance and application of the POC principle recognised in numerous Security Council resolutions, and the R2P principle, which was recognised by the United Nations General Assembly in 2005 and, now, by the Security Council. The Workshops considered the relationship between R2P and POC. The project team presented the preliminary findings of their study and sought contributions and feedback from Workshop participants. Prior to the Workshops, members of the project team undertook interviews with UN offices and agencies, international organisations (IOs) and non-government organisations (NGOs) in Geneva and New York as part of the process of mapping the relationship between R2P and POC. Initial findings were considered at an Academic-Practitioner Workshop held at the University of Sydney in November 2010. In addition to an extensive literature review and a series of academic publications, the project team is preparing a practical guidance text (the Guide) on the relationship between R2P and POC to assist the United Nations, governments, regional bodies, IOs and NGOs in considering and applying appropriate protection strategies. It is intended that the Guide be presented to the United Nations Secretariat in New York in early 2012. The primary aim of the Workshops was to test the project’s initial findings among an audience of diplomats, military, police, civilian policy-makers, practitioners, researchers and experts from within the region. Through dialogue and discussion, the project team gathered feedback – comments, questions, critique and suggestions – to help shape the development of practical guidance about when, how and by whom R2P and POC might be implemented.
Resumo:
This study explores the international entrepreneurial values influencing the intensity of Internet use in the internationalization process of small to medium sized enterprises (SMEs), within the Australian tourism industry. The findings point to a relationship between the values of international entrepreneurs and the inclination of the firm to develop and initiate international activity. And so, this study endeavors to offer insight into issues that remain unresolved in existing tourism and international entrepreneurship (IE) literature. Two effective but underutilized qualitative methods were used in this study to identify the values of international entrepreneurs. They are repertory test and laddering analysis.
Resumo:
This thesis is about the Australian domain name system and, in particular, the principles governing the registration of domain names in the '.au' country code domain space. It examines the different types of registration systems adopted in country code domain spaces and categorises them according to the extent to which they impose restrictions on registration, ranging from restrictive to unrestrictive. A comparative analysis is made of the restrictive registration system in Australia and the United Kingdom‘s unrestrictive system.
Juggling competing public values : resolving conflicting agendas in social procurement in Queensland
Resumo:
Organisations within the not-for-profit sector provide services to individuals and groups government and for-profit organisations cannot or will not consider. This response by the not-for-profit sector to market failure and government failure is a well understood contribution to society by the nonprofit sector. Over time, this response has resulted in the development of a vibrant and rich agglomeration of services and programs that operate under a myriad of philosophical stances, service orientations, client groupings and operational capacities. In Australia, these organisations and services provide social support and service assistance to many people in the community; often targeting their assistance to clients facing the most difficult of clients with complex problems. Initially, in undertaking this role, the not-for-profit sector received limited sponsorship from government, relying on primarily on public donations to fund the delivery of services. (Lyons 2001). Over time governments assumed greater responsibility in the form of service grants to particular groups: ‘the worthy poor’. More recently, government has engaged in widespread procurement of services from the not-for-profit sector, which specify the nature of the outcomes to be achieved and, to a degree, the way in which the services will be provided. A consequence of this growing shift to a more marketised model of service contracting, often offered-up under the label of enhanced collaborative practice, has been increased competitiveness between agencies that had previously worked well together (Keast and Brown, 2006). One of the challenges which emerge from the procurement of services by government from third sector organisations is that public values such as effectiveness, efficiency, transparency and professionalism can be neglected (Jørgensen and Bozeman 2002), although this is not always the case (Brown, Furneaux and Gudmundsson 2012). While some approaches to the examination of social procurement - the intentional purchasing of social outcomes (Furneaux and Barraket 2011) - assumes that public values are lost in social procurement arrangements (Bozeman 2002; Jørgensen and Bozeman 2002), alternative approach suggest such inevitability is not the case. Instead, social procurement is seen to involve a set of tensions (Brown, Potoski and Slyke 2006) or a set of trade offs (Charles et al. 2007), which must be managed, and through such management, public values can be potentially safeguarded (Bruin and Dicke 2006). The potential trade-offs of public values in social procurement is an area in need of further research, and one which carries both theoretical and practical significance. Additionally, the juxtaposition of policies – horizontal integration and vertical efficiency – results in a complex, crowded and contested policy and practice environment (Keast et al., 2007),, with the potential for set of unintentional consequences arising from these arrangements. Further the involvement of for-profit, non-profit, and hybrid organisations such as social enterprises, adds further complexity in the number of different organisational forms engaged in service delivery on behalf of government. To address this issue, this paper uses information gleaned from a state-wide survey of not-for-profit organisations in Queensland, Australia which included within its focus organisational size, operational scope, funding arrangements and governance/management approaches. Supplementing this information is qualitative data derived from 17 focus groups and 120 interviews conducted over ten years of study of this sector. The findings contribute to greater understanding of the practice and theory of the future provision of social services.
Resumo:
-International recognition of need for public health response to child maltreatment -Need for early intervention at health system level -Important role of health professionals in identifying, reporting, documenting suspician of maltreatment -Up to 10% of all children presenting at ED’s are victims and without identification, 35% reinjured and 5% die -In Qld, mandatory reporting requirement for doctors and nurses for suspected abuse or neglect
Resumo:
Information communication and technology (ICT) systems are almost ubiquitous in the modern world. It is hard to identify any industry, or for that matter any part of society, that is not in some way dependent on these systems and their continued secure operation. Therefore the security of information infrastructures, both on an organisational and societal level, is of critical importance. Information security risk assessment is an essential part of ensuring that these systems are appropriately protected and positioned to deal with a rapidly changing threat environment. The complexity of these systems and their inter-dependencies however, introduces a similar complexity to the information security risk assessment task. This complexity suggests that information security risk assessment cannot, optimally, be undertaken manually. Information security risk assessment for individual components of the information infrastructure can be aided by the use of a software tool, a type of simulation, which concentrates on modelling failure rather than normal operational simulation. Avoiding the modelling of the operational system will once again reduce the level of complexity of the assessment task. The use of such a tool provides the opportunity to reuse information in many different ways by developing a repository of relevant information to aid in both risk assessment and management and governance and compliance activities. Widespread use of such a tool allows the opportunity for the risk models developed for individual information infrastructure components to be connected in order to develop a model of information security exposures across the entire information infrastructure. In this thesis conceptual and practical aspects of risk and its underlying epistemology are analysed to produce a model suitable for application to information security risk assessment. Based on this work prototype software has been developed to explore these concepts for information security risk assessment. Initial work has been carried out to investigate the use of this software for information security compliance and governance activities. Finally, an initial concept for extending the use of this approach across an information infrastructure is presented.
Resumo:
In an ever changing world the adults of the future will be faced with many challenges. To cope with these challenges it seems apparent that values education will need to become paramount within a child.s education. A considerable number of research studies have indicated that values education is a critical component within education (Lovat & Toomey, 2007b). Building on this research Lovat (2006) claimed that values education was the missing link in quality teaching The concept of quality teaching had risen to the fore within educational research literature in the late 20th century with the claim that it is the teacher who makes the difference in schooling (Hattie, 2004). Thus, if teachers make such a difference to student learning, achievement and well-being, then it must hold true that pre-service teacher education programmes are vital in ensuring the development of quality teachers for our schools. The gap that this current research programme addressed was to link the fields of values education, quality teaching and pre-service teacher education. This research programme aimed to determine the impact of a values-based pedagogy on the development of quality teaching dimensions within pre-service teacher education. The values-based pedagogy that was investigated in this research programme was Philosophy in the Classroom. The research programme adopted a nested case study design based on the constructivist-interpretative paradigm in examining a unit within a pre-service teacher education programme at a Queensland university. The methodology utilised was qualitative where the main source of data was via interviews. In total, 43 pre-service teachers participated in three studies in order to determine if their involvement in a unit where the focus was on introducing pre-service teachers to an explicit values-based pedagogy impacted on their knowledge, skills and confidence in terms of quality teaching dimensions. The research programme was divided into three separate studies in order to address the two research questions: 1. In what ways do pre-service teachers perceive they are being prepared to become quality teachers? 2. Is there a connection between an explicit values-based pedagogy in pre-service teacher education and the development of pre-service teachers. understanding of quality teaching? Study One provided insight into 21 pre-service teachers. understandings of quality teaching. These 21 participants had not engaged in an explicit values-based pedagogy. Study Two involved the interviewing of 22 pre-service teachers at two separate points in time . prior to exposure to a unit that employed a values-explicit pedagogy and post this subject.s lecture content delivery. Study Three reported on and analysed individual case studies of five pre-service teachers who had participated in Study Two Time 1 and Time 2, as well as a third time following their field experience where they had practice in teaching the values explicit pedagogy. The results of the research demonstrate that an explicit values-based pedagogy introduced into a teacher education programme has a positive impact on the development of pre-service teachers. understanding of quality teaching skills and knowledge. The teaching and practice of a values-based pedagogy positively impacted on pre-service teachers with increases of knowledge, skills and confidence demonstrated on the quality teaching dimensions of intellectual quality, a supportive classroom environment, recognition of difference, connectedness and values. These findings were reinforced through the comparison of pre-service teachers who had participated in the explicit values-based pedagogical approach, with a sample of pre-service teachers who had not engaged in this same values-based pedagogical approach. A solid values-based pedagogy and practice can and does enhance pre-service teachers. understanding of quality teaching. These findings surrounding the use of a values-based pedagogy in pre-service teacher education to enhance quality teaching knowledge and skills has contributed theoretically to the field of educational research, as well having practical implications for teacher education institutions and teacher educators.
Resumo:
In March 2000, the Department of Health and the Home Office issued guidance fundamentally altering policy and practice with regard to young people in prostitution. 1 Instead of being arrested and punished for prostitution-related offences, those under 18 years old were to be thought of as children ‘in need’ and offered welfare-based interventions. The practice that has developed in the last three years has offered interventions that are located within both child protection and youth justice work. This article examines these changes in order to generate insights about the changing nature of youth justice. In particular, it is argued that the drive to manage the risks posed by young people in prostitution to specific organisations, takes precedence over either the desire to care for, or the demand to punish them. Through an analysis of how practitioners and policy makers responsible for implementing this new approach to youth prostitution talk about ‘risk’ and ‘responsibility’, ‘liability’, ‘protection’ and ‘punishment’, the article argues that the contradiction between care and control has been re-interpreted, such that there is noticeable blurring of the boundaries between welfare and punishment at the margins of youth justice work.