664 resultados para establish


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Most salad vegetables are eaten fresh by consumers. However, raw vegetables may pose a risk of transmitting opportunistic bacteria to immunocompromised people, including cystic fibrosis (CF) patients. In particular, CF patients are vulnerable to chronic Pseudomonas aeruginosa lung infections and this organism is the primary cause of morbidity and mortality in this group. Clonal variants of P. aeruginosa have been identified as emerging threats to people afflicted with CF; however it has not yet been proven from where these clones originate or how they are transmitted. Due to the organisms‟ aquatic environmental niche, it was hypothesised that vegetables may be a source of these clones. To test this hypothesis, lettuce, tomatoes, mushrooms and bean sprout packages (n = 150) were analysed from a green grocer, supermarket and farmers‟ market within the Brisbane region, availability permitting. The internal and external surfaces of the vegetables were separately analysed for the presence of clonal strains of P. aeruginosa using washings and homogenisation techniques, respectively. This separation was in an attempt to establish which surface was contaminated, so that recommendations could be made to decrease or eliminate P. aeruginosa from these foods prior to consumption. Soil and water samples (n = 17) from local farms were also analysed for the presence of P. aeruginosa. Presumptive identification of isolates recovered from these environmental samples was made based on growth on Cetrimide agar at 42°C, presence of the cytochrome-oxidase enzyme and inability to ferment lactose. P. aeruginosa duplex real-time polymerase chain reaction assay (PAduplex) was performed on all bacterial isolates presumptively identified as P. aeruginosa. Enterobacterial repetitive intergenic consensus strain typing PCR (ERIC-PCR) was subsequently performed on confirmed bacterial isolates. Although 72 P. aeruginosa were isolated, none of these proved to be clonal strains. The significance of these findings is that vegetables may pose a risk of transmitting sporadic strains of P. aeruginosa to people afflicted with CF and possibly, other immunocompromised people.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this thesis is to examine the influence of ethnic cultural values on the relationship of role demands and the work-family balance (WFB) experience. Past studies have found that the demands from work and family roles have a different impact on the work-family experience in people of different ethnicity. Researchers attribute these results to the cultural differences across the groups. However, there has been no empirical support for these assumptions because most past studies did not explicitly measure the cultural dimension in their design. Therefore, although studies have found ethnic differences in work-family experience, as cultural variables were not measured, it cannot be determined whether these differences were due to the differing ethnic groups’ cultural styles. The present thesis is set up to address this limitation in the literature, employing the Malay and Chinese ethnic groups in Malaysia as the study samples. The investigation consisted of pilot interviews and two survey studies. The interviews were carried out to establish the perception of WFB by target participants of a non-western nation. The first survey served to identify whether the Malay and Chinese ethnic groups residing under the same economic and social systems vary in their perceptions of work and family roles. The second survey tests the research model empirically, that is, whether cultural values moderate the relationship between role demands and WFB and if these moderation effects vary across ethnic groups. From the interviews, the results indicated that work-family experience is not a universal experience, but is partly culture-specific. Specifically, in the case of Malaysia, WFB is very much observed from the role obligation perspective. In particular, balance is perceived when work duties and household affairs are both adequately fulfilled. On the other hand, the conceptualisation of WFB in terms of role satisfaction and role interference also emerged in the interviews, suggesting the universality of these constructs across cultures. The findings from Survey One indicated that participants of different ethnicities in this study do not differ greatly in their perceptions regarding their participation in work and family roles. Generally, these participants revealed the less traditional attitudes towards women’s participation in work and family roles. However, variations were observed between the two groups in terms of reasons for working, spouses’ preferences towards their employment, and the extent to which their work role is perceived to impede their normative role performance in the household. Despite these differences, the Malay and Chinese ethnic groups showed more similarities than differences in their perceptions of work and family. The findings from Survey Two, which tested the research model, produced mixed results. On the whole, the results showed that the cultural dimensions examined in this study (i.e. collectivism, work identity and family identity) did influence the relationship between role demands and WFB experience, thus providing empirical evidence for the assumption in the literature that the relationship between role demand and work-family experience is moderated by cultural values. Most importantly, support was found for the proposition that these moderation effects vary between the Malay and Chinese ethnic groups. Moreover, this study also found evidence that Malays and Chinese differ significantly on collectivism and work identity cultural dimensions where Malays are found to be more collectivist than the Chinese, while work identity is stronger in the Chinese than in the Malays. There is no difference in the levels of family identity between the two groups. Of all the three moderators, work identity was deemed the most important because many of the supported hypotheses pertained to the work identity moderating effects. In contrast, family identity does not seem to have much moderating influence on role demand-WFB relationships, while the results for the collectivism moderator are mixed. As such, although not conclusive, it can be deduced that variations in the effects of role demand on work-family experience across ethnicity are a result of the groups’ cultural differences, thereby supporting the assumption in the literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis conceptualises Use for IS (Information Systems) success. While Use in this study describes the extent to which an IS is incorporated into the user’s processes or tasks, success of an IS is the measure of the degree to which the person using the system is better off. For IS success, the conceptualisation of Use offers new perspectives on describing and measuring Use. We test the philosophies of the conceptualisation using empirical evidence in an Enterprise Systems (ES) context. Results from the empirical analysis contribute insights to the existing body of knowledge on the role of Use and demonstrate Use as an important factor and measure of IS success. System Use is a central theme in IS research. For instance, Use is regarded as an important dimension of IS success. Despite its recognition, the Use dimension of IS success reportedly suffers from an all too simplistic definition, misconception, poor specification of its complex nature, and an inadequacy of measurement approaches (Bokhari 2005; DeLone and McLean 2003; Zigurs 1993). Given the above, Burton-Jones and Straub (2006) urge scholars to revisit the concept of system Use, consider a stronger theoretical treatment, and submit the construct to further validation in its intended nomological net. On those considerations, this study re-conceptualises Use for IS success. The new conceptualisation adopts a work-process system-centric lens and draws upon the characteristics of modern system types, key user groups and their information needs, and the incorporation of IS in work processes. With these characteristics, the definition of Use and how it may be measured is systematically established. Use is conceptualised as a second-order measurement construct determined by three sub-dimensions: attitude of its users, depth, and amount of Use. The construct is positioned in a modified IS success research model, in an attempt to demonstrate its central role in determining IS success in an ES setting. A two-stage mixed-methods research design—incorporating a sequential explanatory strategy—was adopted to collect empirical data and to test the research model. The first empirical investigation involved an experiment and a survey of ES end users at a leading tertiary education institute in Australia. The second, a qualitative investigation, involved a series of interviews with real-world operational managers in large Indian private-sector companies to canvass their day-to-day experiences with ES. The research strategy adopted has a stronger quantitative leaning. The survey analysis results demonstrate the aptness of Use as an antecedent and a consequence of IS success, and furthermore, as a mediator between the quality of IS and the impacts of IS on individuals. Qualitative data analysis on the other hand, is used to derive a framework for classifying the diversity of ES Use behaviour. The qualitative results establish that workers Use IS in their context to orientate, negotiate, or innovate. The implications are twofold. For research, this study contributes to cumulative IS success knowledge an approach for defining, contextualising, measuring, and validating Use. For practice, research findings not only provide insights for educators when incorporating ES for higher education, but also demonstrate how operational managers incorporate ES into their work practices. Research findings leave the way open for future, larger-scale research into how industry practitioners interact with an ES to complete their work in varied organisational environments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents the findings of a research project that was set up to establish haw well Gibber, a street magazine set up in Perth in 1994, effectively provides a 'voice' for its canstituency -'young people marginalised by society'.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anna Hirsch and Clare Dixon (2008, 190) state that creative writers’ ‘obsession with storytelling…might serve as an interdisciplinary tool for evaluating oral histories.’ This paper enters a dialogue with Hirsch and Dixon’s statement by documenting an interview methodology for a practice-led PhD project, The Artful Life Story: Oral History and Fiction, which investigates the fictionalising of oral history. ----- ----- Alistair Thomson (2007, 62) notes the interdisciplinary nature of oral history scholarship from the 1980s onwards. As a result, oral histories are being used and understood in a variety of arts-based settings. In such contexts, oral histories are not valued so much for their factual content but as sources that are at once dynamic, emotionally authentic and open to a multiplicity of interpretations. How can creative writers design and conduct interviews that reflect this emphasis? ----- ----- The paper briefly maps the growing trend of using oral histories in fiction and ethnographic novels, in order to establish the need to design interviews for arts-based contexts. I describe how I initially designed the interviews to suit the aims of my practice. Once in the field, however, I found that my original methods did not account for my experiences. I conclude with the resulting reflection and understanding that emerged from these problematic encounters, focusing on the technique of steered monologue (Scagliola 2010), sometimes referred to as the Biographic Narrative Interpretative Method (Wengraf 2001, Jones 2006).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

While there have been improvements in Australian engineering education since the 1990s, there are still strong concerns that more progress needs to be made, particularly in the areas of developing graduate competencies and in outcomes-based curricula. This paper comments on the findings from a two-day Australian Learning and Teaching Council funded forum that sought to establish a shared understanding with the thee stakeholders (students, academics and industry) about how to achieve a design-based engineering curriculum. This paper reports on the findings from the first day’s activities, and reveals that there is a shared desire for design and project-based curricula that would encourage the development of the “three-dimensional” graduate: one who has technical, personal, and professional and systems-thinking/design-based competence. In addition, the data also reveal industry willingness to engage in the engineering curriculum to enhance authentic learning experiences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The requirement to prove a society united by a body of law and customs to establish native title rights has been identified as a major hurdle to achieving native title recognition. The recent appeal decision of the Federal Court in Sampi on behalf of the Bardi and Jawi People v Western Australia [2010] opens the potential for a new judicial interpretation of society based on the internal view of native title claimants. The decision draws on defining features of legal positivism to inform the court’s findings as to the existence of a single Bardi Jawi society of ‘one people’ living under ‘one law’. The case of Bodney v Bennell [2008] is analysed through comparitive study of how the application of the received positivist framework may limit native title recognition. This paper argues that the framing of Indigenous law by reference to Western legal norms is problematic due to the assumptions of legal positivism and that an internal view based on Indigenous worldviews, which see law as intrinsically linked to the spiritual and ancestral connection to country, is more appropriate to determine proof in native title claims.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The synthesizer has come a long way since wendy Carlos' 'Switched On Bach'. Unfortunately many would not realise it. Synthesizers are in most of the popular and commercial music we hear, and their development has followed the rapid development of computing technology, allowing sugnificant perfromance leaps every five years. In the last 10 years or so, the physical interface of synthesizers has changed little even while the sound generating hardware has raced ahead. The stabilisation of gestural controller, particularly keyboard-based controllers, has enabled tje synthesizer to establish itself as an expressive instrument and one worthy of the hours of practice required on any instrument to reach a high level of proficiency. It is now time for the instrumental study of synthesizer to be taken seriously by music educators across Australia, and I hope, through this paper, to shed some light on the path forward.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We investigate known security flaws in the context of security ceremonies to gain an understanding of the ceremony analysis process. The term security ceremonies is used to describe a system of protocols and humans which interact for a specific purpose. Security ceremonies and ceremony analysis is an area of research in its infancy, and we explore the basic principles involved to better understand the issues involved.We analyse three ceremonies, HTTPS, EMV and Opera Mini, and use the information gained from the experience to establish a list of typical flaws in ceremonies. Finally, we use that list to analyse a protocol proven secure for human use. This leads to a realisation of the strengths and weaknesses of ceremony analysis.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over recent years a significant amount of research has been undertaken to develop prognostic models that can be used to predict the remaining useful life of engineering assets. Implementations by industry have only had limited success. By design, models are subject to specific assumptions and approximations, some of which are mathematical, while others relate to practical implementation issues such as the amount of data required to validate and verify a proposed model. Therefore, appropriate model selection for successful practical implementation requires not only a mathematical understanding of each model type, but also an appreciation of how a particular business intends to utilise a model and its outputs. This paper discusses business issues that need to be considered when selecting an appropriate modelling approach for trial. It also presents classification tables and process flow diagrams to assist industry and research personnel select appropriate prognostic models for predicting the remaining useful life of engineering assets within their specific business environment. The paper then explores the strengths and weaknesses of the main prognostics model classes to establish what makes them better suited to certain applications than to others and summarises how each have been applied to engineering prognostics. Consequently, this paper should provide a starting point for young researchers first considering options for remaining useful life prediction. The models described in this paper are Knowledge-based (expert and fuzzy), Life expectancy (stochastic and statistical), Artificial Neural Networks, and Physical models.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Section 126 of the Land Title Act 1994 (Qld) regulates whether, and if so, when a caveat will lapse. While certain caveats will not lapse due to the operation of s 126(1), if a caveator does not wish a caveat to which the section applies to lapse, the caveator must start a proceeding in a court of competent jurisdiction to establish the interest claimed under the caveat within the time limits specified in, and otherwise comply with the obligations imposed by, s 126(4). The requirement, in s 126(4), to “start a proceeding” was the subject of judicial examination by the Court of Appeal (McMurdo P, Holmes JA and MacKenzie J) in Cousins Securities Pty Ltd v CEC Group Ltd [2007] QCA 192.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The increasing ubiquity of digital technology, internet services and location-aware applications in our everyday lives allows for a seamless transitioning between the visible and the invisible infrastructure of cities: road systems, building complexes, information and communication technology, and people networks create a buzzing environment that is alive and exciting. Driven by curiosity, initiative and interdisciplinary exchange, the Urban Informatics Research Lab at Queensland University of Technology (QUT), Brisbane, Australia, is an emerging cluster of people interested in research and development at the intersection of people, place and technology with a focus on cities, locative media and mobile technology. This paper introduces urban informatics as a transdisciplinary practice across people, place and technology that can aid local governments, urban designers and planners in creating responsive and inclusive urban spaces and nurturing healthy cities. Three challenges are being discussed. First, people, and the challenge of creativity explores the opportunities and challenges of urban informatics that can lead to the design and development of new tools, methods and applications fostering participation, the democratisation of knowledge, and new creative practices. Second, technology, and the challenge of innovation examines how urban informatics can be applied to support user-led innovation with a view to promote entrepreneurial ideas and creative industries. Third, place, and the challenge of engagement discusses the potential to establish places within cities that are dedicated to place-based applications of urban informatics with a view to deliver community and civic engagement strategies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Expert elicitation is the process of determining what expert knowledge is relevant to support a quantitative analysis and then eliciting this information in a form that supports analysis or decision-making. The credibility of the overall analysis, therefore, relies on the credibility of the elicited knowledge. This, in turn, is determined by the rigor of the design and execution of the elicitation methodology, as well as by its clear communication to ensure transparency and repeatability. It is difficult to establish rigor when the elicitation methods are not documented, as often occurs in ecological research. In this chapter, we describe software that can be combined with a well-structured elicitation process to improve the rigor of expert elicitation and documentation of the results

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Venous leg ulceration is a serious condition affecting 1 – 3% of the population. Decline in the function of the calf muscle pump is correlated with venous ulceration. Many previous studies have reported an improvement in the function of the calf muscle pump, endurance of the calf muscle and increased range of ankle motion after structured exercise programs. However, there is a paucity of published research that assesses if these improvements result in an improvement in the healing rates of venous ulcers. The primary purpose of this pilot study was to establish the feasibility of a homebased progressive resistance exercise program and examine if there was any clinical significance or trend toward healing. The secondary aims were to examine the benefit of a home-based progressive resistance exercise program on calf muscle pump function and physical parameters. The methodology used was a randomised controlled trial where eleven participants were randomised into an intervention (n = 6) or control group (n = 5). Participants who were randomised to receive a 12-week home-based progressive resistance exercise program were instructed through weekly face-to-face consultations during their wound clinic appointment by the author. Control group participants received standard wound care and compression therapy. Changes in ulcer parameters were measured fortnightly at the clinic (number healed at 12 weeks, percentage change in area and pressure ulcer score healing score). An air plethysmography test was performed at baseline and following the 12 weeks of training to determine changes in calf muscle pump function. Functional measures included maximum number of heel raises (endurance), maximal isometric plantar flexion (strength) and range of ankle motion (ROAM); these tests were conducted at baseline, week 6 and week 12. The sample for the study was drawn from the Princess Alexandra Hospital in Brisbane, Australia. Participants with venous leg ulceration who met the inclusion criteria were recruited. The participants were screened via duplex scanning and ankle brachial pressure index (ABPI) to ensure they did not have any arterial complications. Participants were excluded if there was evidence of cellulitis. Demographic data were obtained from each participant and details regarding medical history, quality of life and geriatric depression scores were collected at baseline. Both the intervention and control group were required to complete a weekly exercise diary to monitor activity levels between groups. To test for the effect of the intervention over time, a repeated measures analysis of variance was conducted on the major outcome variables. Group (intervention versus control) was the between subject factor and time (baseline, week 6, week 12) was the within subject or repeated measures factor. Due to the small sample size, further tests were conducted to check the assumptions of the statistical test to be used. The results showed that Mauchly.s Test, the Sphericity assumptions of repeated measures for ANOVA were met. Further tests of homogeneity of variance assumptions also confirmed that this assumption was met. Data analysis was conducted using the software package SPSS for Windows Release 17.0. The pilot study proved feasible with all of the intervention (n=6) participants continuing with the resistance program for the 12 week duration and no deleterious effects noted. Clinical significance was observed in the intervention group with a 32% greater change in ulcer size (p= 0.26) than the control group, and a 10% (p = 0.74) greater difference between the numbers healed compared to the control group. Statistical significance was observed for the ejection fraction (p = 0.05), residual volume fraction (p = 0.04) and ROAM (p = 0.01), which all improved significantly in the intervention group over time. These results are encouraging, nevertheless, further investigations seem warranted to examine the effect exercise has on the healing rates of venous leg ulcers, with a multistudy site, larger sample size and longer follow up period.