238 resultados para additional key words and phrases


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Using data from the 1989 Canadian Labour Market Activity Survey and, for Australia, the 1989-90 Income Distribution Survey, the authors investigate the reasons for the significantly lower gender wage gap in Australia than in Canada. Key similarities and differences between these two countries, the authors argue, make them a good basis for a "natural experiment" to investigate the effects of different labor market institutions. In particular, Australia has a stronger union movement and a greater degree of centralization in wage determination than Canada, and most of its workers are covered by legally binding minimum working conditions. The authors conclude that several differences between the countries in labor market structure-notably, a lower rate of return to education, a lower rate of return to labor market experience, and a lower level of wage inequality in Australia than in Canada- are largely responsible for the smaller gender wage gap in Australia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The focus of this research was promotion and succession management in Australian law firms. Two staff retention issues currently faced by the Australian legal industry were identified as suggesting possible failures in this area: 1) Practitioners are leaving law firms early in their careers, 2) Female representation is disproportionally low at partnership level. The research described current Australian law firm promotion and succession practices and then explained their possible relevance to the two retention issues. The overall aim of the research was to uncover key findings and present practical recommendations to law firm managers and partners ready for incorporation into their future promotion and succession planning practice. In so doing the research aimed to benefit the Australian legal community as a whole. Four areas of literature relevant to the topic were reviewed, 1) law firm governance concluding that the fundamental values of the P²-Form remained constant (Cooper, Hinings, Greenwood & Brown, 1996; Morris & Pinnington, 1998) with ownership and strategic control of law firms remaining in the hands of partners; 2) the importance of individual practitioners to law firms concluding that the actual and opportunity costs relating to practitioner turnover were significant due to the transient nature of knowledge as a key asset of law firms (Gottschalk & Khandelwal, 2004; Rebitzer & Taylor, 2007); 3) generational differences concluding with support for the work of Finegold, Mohrman and Spreitzer (2002), Davis, Pawlowski and Houston (2006), Kuhnreuther (2003), and Avery, McKay, and Wilson (2007) which indicated that generational cohort differences were of little utility in human resources management practice; and 4) previous research relating to law firm promotion and succession practices indicating that five practices were relevant in law firm promotion outcomes; 1) firm billing requirements (Gorman & Kmec, 2009; Phillips, 2001; Noonan & Corcoran, 2004; Webley & Duff, 2007); 2) mentoring programs (Phillips, 2001; Noonan & Corcoran, 2004); 3) the existence of female partners (Gorman & Kmec, 2009; Beckman & Phillips, 2005); 4) non-partner career paths (Phillips, 2001; Corcoran & Noonan, 2004); and 5) the existence of family friendly policies (Gorman & Kmec, 2009; Phillips, 2001; Noonan & Corcoran, 2004; Webley & Duff, 2007.) The research was carried out via a sequential mixed method approach. The initial quantitative study was based upon a theoretical framework grounded in the literature and provided baseline information describing Australian law firm promotion and succession practices. The study was carried out via an on-line survey of Australian law firm practitioners. The results of the study provided the basis for the second qualitative study. The qualitative study further explained the statistically generated results and focused specifically on the two identified retention issues. The study was conducted via one-on-one interviews with Australian law firm partners and experienced law firm managers. The results of both studies were combined within the context of relevant literature resulting in eight key findings: Key findings 1) Organisational commitment levels across generational cohorts are more homogenous than different. 2) Law firm practitioners are leaving law firms early in their careers due to the heavy time commitment behaviour demanded of them, particularly by clients. 3) Law firm promotion and succession practices reinforce practitioner time commitment behaviour marking it as an indicator of practitioner success. 4) Law firm practitioners believe that they have many career options outside law firms and are considering these options. 5) Female practitioners are considering opting out of law firms due to time commitment demands related to partnership conflicting with family commitment demands. 6) A masculine, high time commitment culture in law firms is related to the decision by female practitioners to leave law firms. 7) The uptake of alternative work arrangements by female practitioners is not fatal to their partnership prospects particularly in firms with supportive policies, processes and organisational culture. 8) Female practitioners are less inclined than their male counterparts to seek partnership as an ultimate goal and are more likely to opt out of law firms exhibiting highly competitive, masculine cultures. Practical recommendations Further review of the data collected in relation to the key findings provided the basis for nine practical recommendations specifically geared towards implementation by law firm managers and partners. The first recommendation relates to the use of generational differences in practitioner management. The next six relate to recommended actions to reduce the time commitment demands on practitioners. The final two recommendations relate to the practical implementation of these actions both at an individual and organisational level. The recommendations are as follows: 1) "Generationally driven," age based generalisations should not be utilised in law firm promotion and succession management practice. 2) Expected levels of client access to practitioners be negotiated on a client by client basis and be included in client retention agreements. 3) Appropriate alternative working arrangements such as working off-site, flexible working hours or part-time work be offered to practitioners in situations where doing so will not compromise client serviceability. 4) The copying of long working hour behaviours of senior practitioners should be discouraged particularly where information technology can facilitate remote client serviceability. 5) Refocus the use of timesheets from an employer monitoring tool to an employee empowerment tool. 6) Policies and processes relating to the offer of alternative working arrangements be supported and reinforced by law firm organisational culture. 7) Requests for alternative working arrangements be determined without regard to gender. 8) Incentives and employment conditions offered to practitioners to be individualised based on the subjective need of the individual and negotiated as a part of the current employee performance review process. 9) Individually negotiated employment conditions be negotiated within the context of the firm’s overall strategic planning process. Through the conduct of the descripto-explanatory study, a detailed discussion of current law firm promotion and succession practices was enabled. From this discussion, 7 eight key findings and nine associated recommendations were generated as well as an insight into the future of the profession being given. The key findings and recommendations provide practical advice to law firm managers and partners in relation to their everyday promotion and succession practice. The need to negotiate individual employee workplace conditions and their integration into overall law firm business planning was put forward. By doing so, it was suggested that both the individual employee and the employing law firm would mutually benefit from the arrangement. The study therefore broadened its practical contribution from human resources management to a contribution to the overall management practice of Australian law firms. In so doing, the research has provided an encompassing contribution to the Australian legal industry both in terms of employee welfare as well as firm and industry level success.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Exponential growth of genomic data in the last two decades has made manual analyses impractical for all but trial studies. As genomic analyses have become more sophisticated, and move toward comparisons across large datasets, computational approaches have become essential. One of the most important biological questions is to understand the mechanisms underlying gene regulation. Genetic regulation is commonly investigated and modelled through the use of transcriptional regulatory network (TRN) structures. These model the regulatory interactions between two key components: transcription factors (TFs) and the target genes (TGs) they regulate. Transcriptional regulatory networks have proven to be invaluable scientific tools in Bioinformatics. When used in conjunction with comparative genomics, they have provided substantial insights into the evolution of regulatory interactions. Current approaches to regulatory network inference, however, omit two additional key entities: promoters and transcription factor binding sites (TFBSs). In this study, we attempted to explore the relationships among these regulatory components in bacteria. Our primary goal was to identify relationships that can assist in reducing the high false positive rates associated with transcription factor binding site predictions and thereupon enhance the reliability of the inferred transcription regulatory networks. In our preliminary exploration of relationships between the key regulatory components in Escherichia coli transcription, we discovered a number of potentially useful features. The combination of location score and sequence dissimilarity scores increased de novo binding site prediction accuracy by 13.6%. Another important observation made was with regards to the relationship between transcription factors grouped by their regulatory role and corresponding promoter strength. Our study of E.coli ��70 promoters, found support at the 0.1 significance level for our hypothesis | that weak promoters are preferentially associated with activator binding sites to enhance gene expression, whilst strong promoters have more repressor binding sites to repress or inhibit gene transcription. Although the observations were specific to �70, they nevertheless strongly encourage additional investigations when more experimentally confirmed data are available. In our preliminary exploration of relationships between the key regulatory components in E.coli transcription, we discovered a number of potentially useful features { some of which proved successful in reducing the number of false positives when applied to re-evaluate binding site predictions. Of chief interest was the relationship observed between promoter strength and TFs with respect to their regulatory role. Based on the common assumption, where promoter homology positively correlates with transcription rate, we hypothesised that weak promoters would have more transcription factors that enhance gene expression, whilst strong promoters would have more repressor binding sites. The t-tests assessed for E.coli �70 promoters returned a p-value of 0.072, which at 0.1 significance level suggested support for our (alternative) hypothesis; albeit this trend may only be present for promoters where corresponding TFBSs are either all repressors or all activators. Nevertheless, such suggestive results strongly encourage additional investigations when more experimentally confirmed data will become available. Much of the remainder of the thesis concerns a machine learning study of binding site prediction, using the SVM and kernel methods, principally the spectrum kernel. Spectrum kernels have been successfully applied in previous studies of protein classification [91, 92], as well as the related problem of promoter predictions [59], and we have here successfully applied the technique to refining TFBS predictions. The advantages provided by the SVM classifier were best seen in `moderately'-conserved transcription factor binding sites as represented by our E.coli CRP case study. Inclusion of additional position feature attributes further increased accuracy by 9.1% but more notable was the considerable decrease in false positive rate from 0.8 to 0.5 while retaining 0.9 sensitivity. Improved prediction of transcription factor binding sites is in turn extremely valuable in improving inference of regulatory relationships, a problem notoriously prone to false positive predictions. Here, the number of false regulatory interactions inferred using the conventional two-component model was substantially reduced when we integrated de novo transcription factor binding site predictions as an additional criterion for acceptance in a case study of inference in the Fur regulon. This initial work was extended to a comparative study of the iron regulatory system across 20 Yersinia strains. This work revealed interesting, strain-specific difierences, especially between pathogenic and non-pathogenic strains. Such difierences were made clear through interactive visualisations using the TRNDifi software developed as part of this work, and would have remained undetected using conventional methods. This approach led to the nomination of the Yfe iron-uptake system as a candidate for further wet-lab experimentation due to its potential active functionality in non-pathogens and its known participation in full virulence of the bubonic plague strain. Building on this work, we introduced novel structures we have labelled as `regulatory trees', inspired by the phylogenetic tree concept. Instead of using gene or protein sequence similarity, the regulatory trees were constructed based on the number of similar regulatory interactions. While the common phylogentic trees convey information regarding changes in gene repertoire, which we might regard being analogous to `hardware', the regulatory tree informs us of the changes in regulatory circuitry, in some respects analogous to `software'. In this context, we explored the `pan-regulatory network' for the Fur system, the entire set of regulatory interactions found for the Fur transcription factor across a group of genomes. In the pan-regulatory network, emphasis is placed on how the regulatory network for each target genome is inferred from multiple sources instead of a single source, as is the common approach. The benefit of using multiple reference networks, is a more comprehensive survey of the relationships, and increased confidence in the regulatory interactions predicted. In the present study, we distinguish between relationships found across the full set of genomes as the `core-regulatory-set', and interactions found only in a subset of genomes explored as the `sub-regulatory-set'. We found nine Fur target gene clusters present across the four genomes studied, this core set potentially identifying basic regulatory processes essential for survival. Species level difierences are seen at the sub-regulatory-set level; for example the known virulence factors, YbtA and PchR were found in Y.pestis and P.aerguinosa respectively, but were not present in both E.coli and B.subtilis. Such factors and the iron-uptake systems they regulate, are ideal candidates for wet-lab investigation to determine whether or not they are pathogenic specific. In this study, we employed a broad range of approaches to address our goals and assessed these methods using the Fur regulon as our initial case study. We identified a set of promising feature attributes; demonstrated their success in increasing transcription factor binding site prediction specificity while retaining sensitivity, and showed the importance of binding site predictions in enhancing the reliability of regulatory interaction inferences. Most importantly, these outcomes led to the introduction of a range of visualisations and techniques, which are applicable across the entire bacterial spectrum and can be utilised in studies beyond the understanding of transcriptional regulatory networks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Developers and policy makers are consistently at odds over the debate as to whether impact fees increase house prices. This debate continues despite the extensive body of theoretical and empirical international literature that discusses the passing on to home buyers of impact fees, and the corresponding increase to housing prices. In attempting to quantify this impact, over a dozen empirical studies have been carried out in the US and Canada since the 1980’s. However the methodologies used vary greatly, as do the results. Despite similar infrastructure funding policies in numerous developed countries, no such empirical works exist outside of the US/Canada. The purpose of this research is to analyse the existing econometric models in order to identify, compare and contrast the theoretical bases, methodologies, key assumptions and findings of each. This research will assist in identifying if further model development is required and/or whether any of these models have external validity and are readily transferable outside of the US. The findings conclude that there is very little explicit rationale behind the various model selections and that significant model deficiencies appear still to exist.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The development planning process under Law No. 25/2004 is said to be a new approach to increase public participation in decentralised Indonesia. This Law has introduced planning mechanisms, called Musyawarah Perencanaan Pembangunan (Musrenbang), to provide a forum for development planning. In spite of the expressed intention of these mechanisms to improve public participation, some empirical observations have cast doubt on the outcomes. As a result, some local governments have tried to provide alternative mechanisms to promote for participation in local development planning. Since planning is often said to be one of the most effective ways to improve community empowerment, it is of particular concern, to examine the extent to which the current local development planning processes in Indonesia provide sufficient opportunities to improve the self organising capabilities of communities to sustain development programs to meet local needs. With this objective in mind, this paper examines problems encountered by the new local planning mechanism (Musrenbang) in increasing local community empowerment particularly regarding their self organising capabilities. The concept of community empowerment as a pathway to social justice is explored to identify its key elements and approaches and to show how they can be incorporated within planning processes. Having discussed this, it is then argued that to change current unfavorable outcomes, procedural justice and social learning approaches need to be adopted as pathways to community empowerment. Lastly it is also suggested that an alternative local planning process, called Sistem Dukungan (SISDUK), introduced in South Suluwezi in collaboration with JAICA in 2006 (?) offers scope to incorporate such procedural justice and social learning approaches to improve the self organizing capabilities of local communities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

“Who are you? How do you define yourself, your identity?” With these words Allan Moore opens his exhaustive new work proposing a more comprehensive approach to the musicological analysis of popular song. The last three decades have seen a huge expansion of the anthology of the sociological and cultural meanings of pop, but Moore’s book is not another exploration of this field, although some of these ideas are incorporated in this work. Rather, he addresses the limitations of conventional musicology when dealing particularly with songs: “I address popular song rather than popular music. The defining feature of popular song lies in the interaction of everyday words and music… it is how they interact that produces significance in the experience of song”.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

"Authored by well-established leasing experts including Professor WD Duncan, author of the book Commercial Leases in Australia (6th ed), this loose leaf and online service offers a variety of resources to save solicitors and barristers time when negotiating or disputing commercial leasing matters at home and across the country. This is the only work to offer annotated retail leasing legislation for the three main States, including discussion of tribunal decisions and links directly to equivalent provisions in all other jurisdictions. A comparative table highlights key differences and similarities in retail leasing legislation between all States at a glance. Solicitors are then able to draw upon deeper treatment of commercial leasing in all States in principles-based commentary, and access precedents that are readily adaptable for other jurisdictions." -- publisher website

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Free association norms indicate that words are organized into semantic/associative neighborhoods within a larger network of words and links that bind the net together. We present evidence indicating that memory for a recent word event can depend on implicitly and simultaneously activating related words in its neighborhood. Processing a word during encoding primes its network representation as a function of the density of the links in its neighborhood. Such priming increases recall and recognition and can have long lasting effects when the word is processed in working memory. Evidence for this phenomenon is reviewed in extralist cuing, primed free association, intralist cuing, and single-item recognition tasks. The findings also show that when a related word is presented to cue the recall of a studied word, the cue activates it in an array of related words that distract and reduce the probability of its selection. The activation of the semantic network produces priming benefits during encoding and search costs during retrieval. In extralist cuing recall is a negative function of cue-to-distracter strength and a positive function of neighborhood density, cue-to-target strength, and target-to cue strength. We show how four measures derived from the network can be combined and used to predict memory performance. These measures play different roles in different tasks indicating that the contribution of the semantic network varies with the context provided by the task. We evaluate spreading activation and quantum-like entanglement explanations for the priming effect produced by neighborhood density.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Average speed enforcement is a relatively new approach gaining popularity throughout Europe and Australia. This paper reviews the evidence regarding the impact of this approach on vehicle speeds, crashes rates and a number of additional road safety and public health outcomes. The economic and practical viability of the approach as a road safety countermeasure is also explored. A literature review, with an international scope, of both published and grey literature was conducted. There is a growing body of evidence to suggest a number of road safety benefits associated with average speed enforcement, including high rates of compliance with speed limits, reductions in average and 85th percentile speeds and reduced speed variability between vehicles. Moreover, the approach has been demonstrated to be particularly effective in reducing excessive speeding behaviour. Reductions in crash rates have also been reported in association with average speed enforcement, particularly in relation to fatal and serious injury crashes. In addition, the approach has been shown to improve traffic flow, reduce vehicle emissions and has also been associated with high levels of public acceptance. Average speed enforcement offers a greater network-wide approach to managing speeds that reduces the impact of time and distance halo effects associated with other automated speed enforcement approaches. Although comparatively expensive it represents a highly reliable approach to speed enforcement that produces considerable returns on investment through reduced social and economic costs associated with crashes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the modern connected world, pervasive computing has become reality. Thanks to the ubiquity of mobile computing devices and emerging cloud-based services, the users permanently stay connected to their data. This introduces a slew of new security challenges, including the problem of multi-device key management and single-sign-on architectures. One solution to this problem is the utilization of secure side-channels for authentication, including the visual channel as vicinity proof. However, existing approaches often assume confidentiality of the visual channel, or provide only insufficient means of mitigating a man-in-the-middle attack. In this work, we introduce QR-Auth, a two-step, 2D barcode based authentication scheme for mobile devices which aims specifically at key management and key sharing across devices in a pervasive environment. It requires minimal user interaction and therefore provides better usability than most existing schemes, without compromising its security. We show how our approach fits in existing authorization delegation and one-time-password generation schemes, and that it is resilient to man-in-the-middle attacks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Advances in technology introduce new application areas for sensor networks. Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues. Security of large scale densely deployed and infrastructure less wireless networks of resource limited sensor nodes requires efficient key distribution and management mechanisms. We consider distributed and hierarchical wireless sensor networks where unicast, multicast and broadcast type of communications can take place. We evaluate deterministic, probabilistic and hybrid type of key pre-distribution and dynamic key generation algorithms for distributing pair-wise, group-wise and network-wise keys.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

For humans and robots to communicate using natural language it is necessary for the robots to develop concepts and associated terms that correspond to the human use of words. Time and space are foundational concepts in human language, and to develop a set of words that correspond to human notions of time and space, it is necessary to take into account the way that they are used in natural human conversations, where terms and phrases such as `soon', `in a while', or `near' are often used. We present language learning robots called Lingodroids that can learn and use simple terms for time and space. In previous work, the Lingodroids were able to learn terms for space. In this work we extend their abilities by adding temporal variables which allow them to learn terms for time. The robots build their own maps of the world and interact socially to form a shared lexicon for location and duration terms. The robots successfully use the shared lexicons to communicate places and times to meet again.