203 resultados para Indian Trust Fund (U.S.)
Resumo:
Purpose This paper examines the relationship between flood exposure and levels of social trust among a cohort of adult men from refugee backgrounds who were affected by the 2011 Queensland floods in Australia. Design/methodology/approach A quantitative questionnaire was administered to 141 men from refugee backgrounds almost two years after the 2011 Queensland floods. The survey was administered in person by trained peer in-terviewers, and included a number of standardised instruments assessing respondents’ so-cio-demographic characteristics, levels of social trust towards and from neighbours, the police, the wider Australian community, and the media, and exposure to and impact of the floods. Multiple logistic regression analyses were used to assess the relationship between flood exposure and social trust adjusting for pre-disaster levels of trust and other potentially confounding variables. Findings Participants with higher levels of flood exposure were significantly more likely to report greater levels of trust both towards and from their neighbours, the wider Australian community, and the media, and they were also more likely to believe that most people can be trusted. Research limitations/implications Although the study reports on data collected two years after the floods, the analysis has adjusted for pre-disaster measures of social trust and other socio-demographic variables. Originality/value Our paper has highlighted the important place of social trust and social capital for refugee communities in a post-disaster setting. Disaster responses that support social capital among marginalised populations are critical to increasing community resilience and supporting recovery.
Resumo:
In this environmental scan of research and policy literature, the authors consider various definitions of trust as they seek to address and inform the hypothesis that ‘a culture of trust enhances performance’ in schools. The discussion draws on the work of the Australian Institute for Teaching and School Leadership in school leadership and research by Caldwell and Harris (2008) to consider ways in which trust is linked to performance in schools and organisations. It explores the concept of trust as a form of capital available to schools, and highlights how successful school leaders work to align trust, strategy and passion in implementing effective change. At the heart of the review is the relationship between trust and school improvement. An adapted model of the elements of a culture of trust developed by Bryk and Schneider in their influential study of trust in school reform in Chicago is used to frame this aspect of the review. The authors identify four essential categories of relationships that enable schools to be described as having a culture of trust. The review concludes with a discussion of the relationship between trust and school governance.
Resumo:
Sustainability has become one of the important research topics in the field of Human Computer Interaction (HCI). However, the majority of work has focused on the Western culture. In this paper, we explore sustainable household practices in the developing world. Our research draws on the results from an ethnographic field study of household women belonging to the so-called middle class in India. We analyze our results in the context of Blevis' [4] principles of sustainable interaction design (established within the Western culture), to extract the intercultural aspects that need to be considered for designing technologies. We present examples from the field that we term "domestic artefacts". Domestic artefacts represent creative and sustainable ways household women appropriate and adapt used objects to create more useful and enriching objects that support household members' everyday activities. Our results show that the rationale behind creating domestic artefacts is not limited to the practicality and usefulness, but it shows how religious beliefs, traditions, family intimacy, personal interests and health issues are incorporated into them.
Resumo:
Many activities, from disaster response to project management, require cooperation among people from multiple organizations who initially lack interpersonal relationships and trust. Upon entering inter-organizational settings, pre-existing identities and expectations, along with emergent social roles and structures, may all influence trust between colleagues. To sort out these effects, we collected time-lagged data from three cohorts of military MBA students, representing 2,224 directed dyads, shortly after they entered graduate school. Dyads that shared organizational identity, boundary-spanning roles, and similar network positions (structural equivalence) were likely to have stronger professional ties and greater trust.
Resumo:
It is increasingly apparent that sea-level data (e.g. microfossil transfer functions, dated coral microatolls and direct observations from satellite and tidal gauges) vary temporally and spatially at regional to local scales, thus limiting our ability to model future sea-level rise for many regions. Understanding sealevel response at ‘far-field’ locations at regional scales is fundamental for formulating more relevant sea-level rise susceptibility models within these regions under future global change projections. Fossil corals and reefs in particular are valuable tools for reconstructing past sea levels and possible environmental phase shifts beyond the temporal constraints of instrumental records. This study used abundant surface geochronological data based on in situ subfossil corals and precise elevation surveys to determine previous sea level in Moreton Bay, eastern Australia, a far-field site. A total of 64 U-Th dates show that relative sea level was at least 1.1 m above modern lowest astronomical tide (LAT) from at least ˜6600 cal. yr BP. Furthermore, a rapid synchronous demise in coral reef growth occurred in Moreton Bay ˜5800 cal. yr BP, coinciding with reported reef hiatus periods in other areas around the Indo-Pacific region. Evaluating past reef growth patterns and phases allows for a better interpretation of anthropogenic forcing versus natural environmental/climatic cycles that effect reef formation and demise at all scales and may allow better prediction of reef response to future global change.
Resumo:
Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.
Resumo:
An increasing number of countries are faced with an aging population increasingly needing healthcare services. For any e-health information system, the need for increased trust by such clients with potentially little knowledge of any security scheme involved is paramount. In addition notable scalability of any system has become a critical aspect of system design, development and ongoing management. Meanwhile cryptographic systems provide the security provisions needed for confidentiality, authentication, integrity and non-repudiation. Cryptographic key management, however, must be secure, yet efficient and effective in developing an attitude of trust in system users. Digital certificate-based Public Key Infrastructure has long been the technology of choice or availability for information security/assurance; however, there appears to be a notable lack of successful implementations and deployments globally. Moreover, recent issues with associated Certificate Authority security have damaged trust in these schemes. This paper proposes the adoption of a centralised public key registry structure, a non-certificate based scheme, for large scale e-health information systems. The proposed structure removes complex certificate management, revocation and a complex certificate validation structure while maintaining overall system security. Moreover, the registry concept may be easier for both healthcare professionals and patients to understand and trust.
Resumo:
Enterprise resource planning (ERP) systems are rapidly being combined with “big data” analytics processes and publicly available “open data sets”, which are usually outside the arena of the enterprise, to expand activity through better service to current clients as well as identifying new opportunities. Moreover, these activities are now largely based around relevant software systems hosted in a “cloud computing” environment. However, the over 50- year old phrase related to mistrust in computer systems, namely “garbage in, garbage out” or “GIGO”, is used to describe problems of unqualified and unquestioning dependency on information systems. However, a more relevant GIGO interpretation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems based around ERP and open datasets as well as “big data” analytics, particularly in a cloud environment, the ability to verify the authenticity and integrity of the data sets used may be almost impossible. In turn, this may easily result in decision making based upon questionable results which are unverifiable. Illicit “impersonation” of and modifications to legitimate data sets may become a reality while at the same time the ability to audit any derived results of analysis may be an important requirement, particularly in the public sector. The pressing need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment is discussed in this paper. Some current and appropriate technologies currently being offered are also examined. However, severe limitations in addressing the problems identified are found and the paper proposes further necessary research work for the area. (Note: This paper is based on an earlier unpublished paper/presentation “Identity, Addressing, Authenticity and Audit Requirements for Trust in ERP, Analytics and Big/Open Data in a ‘Cloud’ Computing Environment: A Review and Proposal” presented to the Department of Accounting and IT, College of Management, National Chung Chen University, 20 November 2013.)
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
This cross-sectional study examined the association between psychosocial factors (mothers’ perception of own and child weight, maternal self-efficacy in feeding and involvement of the mother-in-law in child-feeding) and controlling feeding practices (monitoring, restriction, pressure to eat and passive feeding). Participants were 531 affluent-Indian mothers in Australia and Mumbai with children aged 1-5 years. The psychosocial variables and feeding practices were measured using a combination of previously validated scales and study-developed items/scales. Multivariable regression analyses were stratified by sample (Australia and Mumbai) to investigate psychosocial factors related to the feeding practices, adjusting for covariates. Self-efficacy in feeding was associated with each of the feeding practices in at least one of the samples (β values between 0.1-0.2, p= 0.04-0.005). The greater involvement of the mother-in-law in child-feeding was related to the higher use of restriction in both samples (β values ≥0.2, p=0.02). In contrast, maternal weight perceptions were not consistently associated with feeding practices in either sample. The findings highlighted that unique (self-efficacy in feeding) and culturally-specific (involvement of the mother-in-law) variables not extensively researched within the context of child-feeding were important factors associated with Indian mothers’ feeding practices. Greater consideration of these factors may be required when tailoring child-feeding interventions for Indian mothers.
Resumo:
Trust is widely recognized as one of the key qualities that a successful leader needs to bring about change within his/her organization. Literature has also shown that trust plays a pivotal role in effective school leadership. However, little research has been undertaken to identify specific actions of a transformational school leader enabling him/her to develop purposeful relationships of trust with his/her staff and Chair of the school’s governing body. Using a theoretical framework of transformational leadership in the context of the independent schooling sector in Australia, a multicase study of four highly trusted, transformational school leaders revealed 10 key trust building practices in the Head–staff dyad and three practices in the Head–Chair dyad. These practices were independent of the leader’s personal attributes. The study also revealed an inextricable link between trust and transformational leadership.
Resumo:
Opposition to men’s violence against women who are their intimate partners has become politically popular in the United States. The Violence Against Women Act (VAWA) has enjoyed broad-based support for over 15 years. VAWA has been refined and expanded with each reauthorization. Resistance to the battered women’s movement is often overlooked in this political context. However, woman abuse and state responses to it are mired in cultural tensions about crime, law, gender, economics, scholarship, and the family. Based on interviews with 35 advocates in the United States, this paper outlines key tactics of antifeminist backlash against the battered women’s movement.
Resumo:
Parametric ship roll resonance is a phenomenon where a ship can rapidly develop high roll motion while sailing in longitudinal waves. This effect can be described mathematically by periodic changes of the parameters of the equations of motion, which lead to a bifurcation. In this paper, the control design of an active u-tank stabilizer is carried out using Lyapunov theory. A nonlinear backstepping controller is developed to provide global exponential stability of roll. An extension of commonly used u-tank models is presented to account for large roll angles, and the control design is tested via simulation on a high-fidelity model of a vessel under parametric roll resonance.
Resumo:
10,000 Steps Rockhampton is a multi-strategy health promotion program which aims to develop sustainable community-based strategies to increase physical activity.The central coordinating focus of the project is the use of pedometers to raise awareness of and provide motivation for physical activity, around the theme of '10,000 steps/day - Every step counts.' To date, five key strategies have been implemented: (1) a media-based awareness raising campaign; (2) promotion of physical activity by health professionals; (3) improving social support for physical activity through group-based programs; (4) working with local council to improve environmental support for physical activity, and; (5) establishment of a ‘micro-grants’ fund to which community groups could apply for assistance with small, innovative physical activity enhancing projects. Strategies were introduced on a rolling basis beginning in February 2002 with 'layering' of interventions designed to address the multi-level individual social and environmental determinants of physical activity. The project was quasi-experimental in design, involving collection of baseline and two year follow-up data from community based surveys in Rockhampton and in a matched regional Queensland town. In August 2001,the baseline CATI survey (N=1281)found that 47.9% of men and 33.0% of women were meeting the national guidelines for physical activity. In August 2002, a smaller survey (N=400) found an increase in activity levels among women (39.7% active) but not in men (48.5%). Data from the two year follow up survey, to be conducted in August 2003, will be presented, with discussion of the major successes and challenges of this landmark physical activity intervention. Acknowledgement: This project is supported by a grant from Health Promotion Queensland.