336 resultados para Certification authorities


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Broad, early definitions of sustainable development have caused confusion and hesitation among local authorities and planning professionals. This confusion has arisen because loosely defined principles of sustainable development have been employed when setting policies and planning projects, and when gauging the efficiencies of these policies in the light of designated sustainability goals. The question of how this theory-rhetoric-practice gap can be filled is the main focus of this chapter. It examines the triple bottom line approach–one of the sustainability accounting approaches widely employed by governmental organisations–and the applicability of this approach to sustainable urban development. The chapter introduces the ‘Integrated Land Use and Transportation Indexing Model’ that incorporates triple bottom line considerations with environmental impact assessment techniques via a geographic, information systemsbased decision support system. This model helps decision-makers in selecting policy options according to their economic, environmental and social impacts. Its main purpose is to provide valuable knowledge about the spatial dimensions of sustainable development, and to provide fine detail outputs on the possible impacts of urban development proposals on sustainability levels. In order to embrace sustainable urban development policy considerations, the model is sensitive to the relationship between urban form, travel patterns and socio-economic attributes. Finally, the model is useful in picturing the holistic state of urban settings in terms of their sustainability levels, and in assessing the degree of compatibility of selected scenarios with the desired sustainable urban future.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this issue of the Project Management Journal, the reader will explore understanding better the contribution of project management to organizational performance, discovering the necessity to move beyond the old reigning paradigm of single-loop project control, raising the question whether PMP® certification leads to better performance, learning how to develop project management competence through a course based on service learning and an experiential learning approach, supporting new product development with the use of “dormant knowledge,” and increasing performance of virtual new product development projects...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 1984 the School of Architecture and Built Environment within the University of Newcastle, Australia introduced an integrated program based on real design projects and using Integrated Problem Based Learning (IPBL) as the teaching method. Since 1984 there have been multiple changes arising from the expectations of the architectural fraternity, enrolling students, lecturers, available facilities, accreditation authorities and many others. These challenges have been successfully accommodated whilst maintaining the original purposes and principles of IPBL. The Architecture program has a combined two-degree structure consisting of a first degree, Bachelor of Science (Architecture), followed by a second degree, Bachelor of Architecture. The program is designed to simulate the problem-solving situations that face a working architect in every day practice. This paper will present the degree structure where each student is enrolled in a single course per semester incorporating design integration and study areas in design studies, professional studies, historical studies, technical studies, environmental studies and communication skills. Each year the design problems increase in complexity and duration set around an annual theme. With 20 years of successful delivery of any program there are highlights and challenges along the way and this paper will discuss some of the successes and barriers experienced within the School of Architecture and Built Environment in delivering IPBL. In addition, the reflective process investigates the currency of IPBL as an appropriate vehicle for delivering the curriculum in 2004 and any additional administrative or staff considerations required to enhance the continuing application of IPBL.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Touch keyboarding as a vocational skill is disappearing at a time when students and educators across alleducational sectors are expected to use a computer keyboard on a regular basis. there is documentation surrounding the embedding of Information and Communication Technology (ICT) within the curricula and yet within the National Training Packages touch keyboarding, previously considered a core component, is now an elective in the Business Services framework. This situation is an odds with current practice overseas where touch keyboarding is a component of primary and secondary curricula. From Rhetoric to Practice explores the current issues and practice in teaching and learning touch keyboarding in primary, secondary and tertiary institutions. Through structured interview participants detailed current practice of teachers and their students. Further, tertiary students participated in a training program aimed at achquiring touch keyboarding as a skill to enhance their studies. The researcher's background experience of fifteen years teaching touch keyboarding and computer literacty to adults and 30 years in Business Services trade provides a strong basis for this project. The teaching experience is enhanced by industry experience in administration, course coordination in technical, community and tertiary institutions and a strong commitment to the efficient usage of a computer by all. The findings of this project identified coursework expectations requiring all students from kindergarten to tertiary to use a computer keyboard on a weekly basis and that neither teaching nor learning tough keyboarding appears in the primary, secondary and tertiary curricula in New South Wales. Further, teachers recognised tough keyboarding as the prefered style over 'hunt and peck' keyboarding while acknowledging the teaching and learning difficulties of time constraints, the need for qualified touch keyboarding teachers and issues arising when retraining students from existing poor habits. In conclusion, this project recommends that computer keyboarding be defined as a writing tool for education, vocation and life, with early instruction set in primary schooling area and embedding touch keyboarding with the secondary, technical and tertiary areas and finally to draw the attention of educational authorities to the Duty Of Care aspects associated with computer keyboarding in the classroom.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The standard approach to tax compliance applies the economics-of-crime methodology pioneered by Becker (1968): in its first application, due to Allingham and Sandmo (1972) it models the behaviour of agents as a decision involving a choice of the extent of their income to report to tax authorities, given a certain institutional environment, represented by parameters such as the probability of detection and penalties in the event the agent is caught. While this basic framework yields important insights on tax compliance behavior, it has some critical limitations. Specifically, it indicates a level of compliance that is significantly below what is observed in the data. This thesis revisits the original framework with a view towards addressing this issue, and examining the political economy implications of tax evasion for progressivity in the tax structure. The approach followed involves building a macroeconomic, dynamic equilibrium model for the purpose of examining these issues, by using a step-wise model building procedure starting with some very simple variations of the basic Allingham and Sandmo construct, which are eventually integrated to a dynamic general equilibrium overlapping generations framework with heterogeneous agents. One of the variations involves incorporating the Allingham and Sandmo construct into a two-period model of a small open economy of the type originally attributed to Fisher (1930). A further variation of this simple construct involves allowing agents to initially decide whether to evade taxes or not. In the event they decide to evade, the agents then have to decide the extent of income or wealth they wish to under-report. We find that the ‘evade or not’ assumption has strikingly different and more realistic implications for the extent of evasion, and demonstrate that it is a more appropriate modeling strategy in the context of macroeconomic models, which are essentially dynamic in nature, and involve consumption smoothing across time and across various states of nature. Specifically, since deciding to undertake tax evasion impacts on the consumption smoothing ability of the agent by creating two states of nature in which the agent is ‘caught’ or ‘not caught’, there is a possibility that their utility under certainty, when they choose not to evade, is higher than the expected utility obtained when they choose to evade. Furthermore, the simple two-period model incorporating an ‘evade or not’ choice can be used to demonstrate some strikingly different political economy implications relative to its Allingham and Sandmo counterpart. In variations of the two models that allow for voting on the tax parameter, we find that agents typically choose to vote for a high degree of progressivity by choosing the highest available tax rate from the menu of choices available to them. There is, however, a small range of inequality levels for which agents in the ‘evade or not’ model vote for a relatively low value of the tax rate. The final steps in the model building procedure involve grafting the two-period models with a political economy choice into a dynamic overlapping generations setting with more general, non-linear tax schedules and a ‘cost-of evasion’ function that is increasing in the extent of evasion. Results based on numerical simulations of these models show further improvement in the model’s ability to match empirically plausible levels of tax evasion. In addition, the differences between the political economy implications of the ‘evade or not’ version of the model and its Allingham and Sandmo counterpart are now very striking; there is now a large range of values of the inequality parameter for which agents in the ‘evade or not’ model vote for a low degree of progressivity. This is because, in the ‘evade or not’ version of the model, low values of the tax rate encourages a large number of agents to choose the ‘not-evade’ option, so that the redistributive mechanism is more ‘efficient’ relative to the situations in which tax rates are high. Some further implications of the models of this thesis relate to whether variations in the level of inequality, and parameters such as the probability of detection and penalties for tax evasion matter for the political economy results. We find that (i) the political economy outcomes for the tax rate are quite insensitive to changes in inequality, and (ii) the voting outcomes change in non-monotonic ways in response to changes in the probability of detection and penalty rates. Specifically, the model suggests that changes in inequality should not matter, although the political outcome for the tax rate for a given level of inequality is conditional on whether there is a large or small or large extent of evasion in the economy. We conclude that further theoretical research into macroeconomic models of tax evasion is required to identify the structural relationships underpinning the link between inequality and redistribution in the presence of tax evasion. The models of this thesis provide a necessary first step in that direction.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Listening skill is allocated inadequate consideration in English language instruction and learning in Iran. At the school level, listening skill is not taught but reading and writing skills are taught traditionally. At the college level, reading skill is emphasised. For students seeking IELTS certification, institutes teach listening skill within the framework of a Communicative Language Teaching (CLT) approach. Nonetheless, despite the official syllabus, many teachers tend to test rather than teach listening skill. Currently, listening skill in the curriculum is embedded in an oral comprehension teaching approach through multiple choice written responses in the institutes. Therefore, the process of explicitly teaching listening is overlooked with a strong emphasis on the post hoc assessment of the products of listening. This study used a mixed methods approach to investigate the relationship between metacognitive strategy instruction and listening performance, metacognitive awareness and use of metacognitive strategies in listening. Three research questions were addressed in this study: - Is there a relationship between metacognitive strategy instruction (planning, monitoring and evaluation) and Iranian High Intermediate students¡¦ listening? „ - Is there a relationship between metacognitive strategy instruction and Iranian High Intermediate students¡¦ metacognitive awareness of listening? - Does metacognitive strategy instruction help Iranian High Intermediate students¡¦ use of metacognitive strategies during listening? A single group (N = 30) of High Intermediate level tertiary students in Iran were guided through a metacognitive strategy instruction over one semester (10 weeks). The first research question was measured through IELTS listening tests, which tracked any change of students’ listening performance. The second research question was analysed through results of a Metacognitive Awareness Listening Questionnaire (MALQ) to survey students’ awareness of metacognitive strategies in listening. Finally, the third research question was analysed through interviews, which explored students’ use of metacognitive strategies in listening. Results indicate that High Intermediate students developed listening performance, but there were no significant changes in metacognitive awareness in listening. Students reported in the interviews that they used multiple strategies (cognitive and metacognitive) to approach listening. Implications for English teaching in Iran and other contexts are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The portfolio can be loosely defined as a collection or collation of achievements, artefacts, creative works or examples of competencies, usually for the purpose of demonstrating a person’s capabilities in a specific field of endeavour. People make and share their portfolios for many reasons: social or cultural recognition, employment, accreditation, and educational qualification. It is this latter purpose that this chapter addresses; the creation and use of a portfolio for educational development and certification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective. To determine the impact of the introduction of universal access to ambulance services via the implementation of the Community Ambulance Cover (CAC) program in Queensland in 2003–04. Method. The study involved a 10-year (2000–01 to 2009–10) retrospective analysis of routinely collected data reported by the Queensland Ambulance Service (QAS) and by the Council of Ambulance Authorities. The data were analysed for the impact of policy changes that resulted in universal access to ambulance services in Queensland. Results. QASis a statewide, publically funded ambulance service. In Queensland, ambulance utilisation rate (AUR)per 1000 persons grew by 41% over the decade or 3.9% per annum (10-year mean = 149.8, 95% CI: 137.3–162.3). The AUR mean after CAC was significantly higher for urgent incidents than for non-urgent ones. However projection modelling demonstrates that URs after the introduction of CAC were significantly lower than the projected utilisation for the same period. Conclusions. The introduction of universal access under the Community Ambulance Cover program in Queensland has not had any significant independent long-term impact on demand overall. There has been a reduction in the long-term growth rate, which may have been contributed to by an ‘appropriate use’ public awareness program.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social harmony can manifest in many ways. In rapidly motorizing countries like China, a growing area of potential disharmony is road use. The increased ability to purchase a car for the first time and a subsequent increase in new drivers has seen several Chinese cities take unprecedented measures to manage congestion. There is a corresponding need to ensure effective traffic law enforcement in promoting a safe environment for all road users. This paper reports qualitative research conducted with Beijing car drivers to investigate perceptions of unsafe road use, penalties for traffic violations, and improvements for the current system. Overall, the findings suggest awareness among drivers of many of the key risk factors. A perceived lack of clarity in how penalties are determined was identified and drivers in-dicated a desire to know how revenue from traffic fines is used. Several suggestions for improving the current system included school/community education about road risks and traffic law. The rise of private car ownership in China may contribute to a more harmonious personal life, but at the same time, may contribute to a decrease in societal harmony. A major challenge for authorities in any country is to promote the idea of a collective responsibility for road safety (traffic harmony), especially to those who perceive that traffic rules do not apply to them. This is a potentially greater challenge for China as it strives to balance harmony on the road and harmony in the broader society.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The following proposal is submitted by the AICA's credentialling and certification subcommittee for your consideration. It outlines a process and procedure for interim credentialling of infection control practitioners. In submitting this proposal, the subcommittee acknowledges that, while competency-based education is the preferred process for credentialling, there are clinicians who, in the absence of educational opportunities, have developed a specialist level of competency in infection control practice through self education and experience. Committee members also recognise the need for self-regulation of accrediting processes, to maintain standards in practice and support members in their clinical roles. We ask you to review the following proposal and invite your comments and critique, to be received by the last week in January 1998.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book identifies the fundamental legal principles and the governance requirements of sustainable forest management. An analytical model for assessing forest regulation is created which identifies the doctrinal concepts that underpin forest regulation (justice, property, sovereignty and governance). It also highlights the dominant public international institutions involved in forest regulation (UNFF, UNFCCC and WB) which is followed by analysis of non-state international forest regulation (forest certification and ecosystem markets). The book concludes by making a number of practical recommendations for reform of global forest governance arrangements and suggested reforms for individual international forest institutions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Numerous environmental rating tools have developed around the world over the past decade or so, in an attempt to increase awareness of the impact buildings have on the environment. Whilst many of these tools can be applied across a variety of building types, the majority focus mainly on the commercial building sector. Only recently have some of the better known environmental rating tools become adaptable to the land development sector, where arguably the most visible environmental impacts are made. EnviroDevelopment is one such tool that enables rating of residential land development in Australia. This paper seeks to quantify the environmental benefits achieved by the environmental rating tool EnviroDevelopment, using data from its certified residential projects across Australia. This research will identify the environmental gains achieved in the residential land development sector that can be attributed to developers aspiring to gain certification under this rating tool.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Before e-Technology’s effects on users can be accurately measured, those users must be fully engaged with the relevant systems and services. That is they must be able to function as part of the digital economy. The paper refers to this ‘user functionality’ as t-Engagement. Not all users are t-Engaged and in many instances achieving t-Engagement will require assistance from external sources. This paper identifies the current state of Australia’s regional digital economy readiness and highlights the role of Local Government Authorities (‘LGAs’) in enabling t-Engagement. The paper analyses responses to the 2012 BTA, NBN and Digital Economy Survey by LGA and other regional organizations within Australia. The paper’s particular focus is on the level of use by Local Government Authorities of federal, state and other programs designed to enable t-Engagement. The analysis confirms the role of LGAs in enabling t-Engagement and in promoting Australia’s digital economy. The paper concludes by reinforcing the need to ensure ongoing meaningful federal and State support of regional initiatives, as well as identifying issues requiring specific attention.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.