915 resultados para Springer briefs
Resumo:
The central thesis in the article is that the venture creation process is different for innovative versus imitative ventures. This holds up; the pace of the process differs by type of venture as do, in line with theory-based hypotheses, the effects of certain human capital (HC) and social capital (SC) predictors. Importantly, and somewhat unexpectedly, the theoretically derived models using HC, SC, and certain controls are relatively successful explaining progress in the creation process for the minority of innovative ventures, but achieve very limited success for the imitative majority. This may be due to a rationalistic bias in conventional theorizing and suggests that there is need for considerable theoretical development regarding the important phenomenon of new venture creation processes. Another important result is that the building up of instrumental social capital, which we assess comprehensively and as a time variant construct, is important for making progress with both types of ventures, and increasingly, so as the process progresses. This result corroborates with stronger operationalization and more appropriate analysis method what previously published research has only been able to hint at.
Resumo:
Two current longitudinal studies in advanced countries, PSED II in the US and CAUSEE in Australia, have attempted to harmonize the major features of the research design. A comparison of the initial screening and first detailed interviews indicates a higher participation in new firm creation in the U.S. Similar types of persons are involved in both countries, albeit more immigrants, older individuals with more work experience and more established individuals in Australia. The nascent enterprises in the two countries are similar on many characteristics, although those in Australia report greater emphasis on new technology and international customers. Assessment of the prevalence of nascent enterprises and new firms from the Global Entrepreneurship Monitor surveys indicates a higher prevalence of new firms in Australia. These two longitudinal projects may help determine if this reflects a high proportion of new firm births or greater survival in the early years among Australian new firms.
Resumo:
Archaeology provides a framework of analysis and interpretation that is useful for disentangling the textual layers of a contemporary lived-in urban space. The producers and readers of texts may include those who planned and developed the site and those who now live, visit and work there. Some of the social encounters and content sharing between these people may be artificially produced or manufactured in the hope that certain social situations will occur. Others may be serendipitous. With archaeology’s original focus on places that are no longer inhabited it is often only the remaining artefacts and features of the built environment that form the basis for interpreting the social relationships of past people. Our analysis however, is framed within a contemporary notion of archaeological artefacts in an urban setting. Unlike an excavation, where the past is revealed through digging into the landscape, the application of landscape archaeology within a present day urban context is necessarily more experiential, visual and based on recording and analysing the physical traces of social encounters and relationships between residents and visitors. These physical traces are present within the creative content, and the built and natural elements of the environment. This chapter explores notions of social encounters and content sharing in an urban village by analysing three different types of texts: the design of the built environment; content produced by residents through a geospatial web application; and, print and online media produced in digital storytelling workshops.
Resumo:
This paper discusses the different perceptions of first year accounting students about their tutorial activities and their engagements in assessment. As the literature suggests, unless participation in learning activities forms part of graded assessment, it is often difficult to engage students in these activities. Using an action research model, this paper reports the study of first year accounting students' responses to action-oriented learning tasks in tutorials. The paper focuses on the importance of aligning curriculum objectives, learning and teaching activities and assessment, i.e. the notion of constructive alignment. However, as the research findings indicate, without support at institutional level, applying constructive alignment to facilitate quality student learning outcomes is a difficult task. Thus, the impacts of policy constraints on curriculum issues are also discussed, focusing on the limitations faced by tutors and their lack of involvement in curriculum development.
Resumo:
This paper discusses the ongoing design and use of a digital community noticeboard situated in a suburban hub. The design intention is to engage residents, collect and display local information and communications, and spark discussion. A key contribution is an understanding of Situated Display navigation that aids retrieval from a long-term collection created by and for suburban community, and engaging qualities of this collection.
Resumo:
Thirty-five clients who received counseling participated in this exploratory study by completing a letter to a friend that described in as much detail as possible what they had learned from counseling. The participants’ written responses were analyzed using a content analysis approach. The analysis indicated that the data were best categorized in terms of three broad areas of learnings (Self, Relations with Others, and the Process of Learning and Change). The Self taxonomy was found to consist of six hierarchical levels. The Relations with Others taxonomy consisted of five hierarchical levels, while the Process of Learning and Change taxonomy consisted of five hierarchical levels. The results suggested that these three taxonomies offer a promising and exciting way to view the impact of counseling within a learning framework. If these taxonomies are found to be stable in future research and clients are easily classified using the taxonomies then this approach may have implications for counseling. It may well be that to maximise the learnings counselors could use specific strategies and techniques to enhance their clients’ learning in the three areas.
Resumo:
Information and Communication Technologies (ICTs) provide great promise for the future of education. In the Asia-Pacific region, many nations have started working towards the comprehensive development of infrastructure to enable the development of strong networked educational systems. In Queensland there have been significant initiatives in the past decade to support the integration of technology in classrooms and to set the conditions for the enhancement of teaching and learning with technology. One of the great challenges is to develop our classrooms to make the most of these technologies for the benefit of student learning. Recent research and theory into cognitive load, suggests that complex information environments may well impose a barrier on student learning. Further, it suggests that teachers have the capacity to mitigate against cognitive load through the way they prepare and support students engaging with complex information environments. This chapter compares student learning at different levels of cognitive load to show that learning is enhanced when integrating pedagogies are employed to mitigate against high-load information environments. This suggests that a mature policy framework for ICTs in education needs to consider carefully the development of professional capacities to effectively design and integrate technologies for learning.
Resumo:
In the past decade, the utilization of ambulance data to inform the prevalence of nonfatal heroin overdose has increased. These data can assist public health policymakers, law enforcement agencies, and health providers in planning and allocating resources. This study examined the 672 ambulance attendances at nonfatal heroin overdoses in Queensland, Australia, in 2000. Gender distribution showed a typical 70/30 male-to-female ratio. An equal number of persons with nonfatal heroin overdose were between 15 and 24 years of age and 25 and 34 years of age. Police were present in only 1 of 6 cases, and 28.1% of patients reported using drugs alone. Ambulance data are proving to be a valuable population-based resource for describing the incidence and characteristics of nonfatal heroin overdose episodes. Future studies could focus on the differences between nonfatal heroin overdose and fatal heroin overdose samples.
Resumo:
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of either information-theoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement.
Resumo:
There are two key ways in which the Australian Uniform Consumer Credit Code seeks to protect consumers in relation to consumer credit transactions. The first is by means of disclosure regulation where information is required to be disclosed to the consumer before the credit contract is entered into and the second is by way of “safety net” provisions, where contracts can be varied or set aside in the event of hardship, a finding that the transaction was unjust, or a finding of unconscionable fees or charges. This article explores the limitations of both of these means of protection, particularly in the case of vulnerable, low-income consumers. In order to highlight the inadequacies of these forms of consumer protection and the need for regulatory reform, we draw on interviews conducted with 30 low-income consumers who had recently signed a credit contract, focusing on their understanding of information disclosed in the contract, as well as their responses to hypothetical unfair terms and their understanding of their rights, for example in the event of an unjust transaction. These interviews were conducted as part of a joint research project between Brotherhood of St Laurence and Griffith University’s Centre for Credit and Consumer Law, funded by Consumer Affairs Victoria.
Resumo:
Australia is currently well placed to contribute to the global growth of human stem cell research. However, as the science has progressed, authorities have had to deal with the ongoing challenges of regulating such a fast moving field of scientific endeavour. Australia’s past and current approach to regulating the use of embryos in human embryonic stem cell research provides an insight into how Australia may continue to adapt to future regulatory challenges presented by human stem cell research. In the broader context, a number of issues have been identified that may impact upon the success of future human stem cell research in Australia.
Resumo:
We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contrary to what might be expected, we show that the natural combination of an ID-based AKE protocol with a public key based AKE protocol cannot provide strong security. We provide the first one-round CL-AKE scheme proven secure in the random oracle model. We introduce two variants of the Diffie-Hellman trapdoor the introduced by \cite{DBLP:conf/eurocrypt/CashKS08}. The proposed key agreement scheme is secure as long as each party has at least one uncompromised secret. Thus, our scheme is secure even if the key generation centre learns the ephemeral secrets of both parties.
Resumo:
Due to the popularity of modern Collaborative Virtual Environments, there has been a related increase in their size and complexity. Developers therefore need visualisations that expose usage patterns from logged data, to understand the structures and dynamics of these complex environments. This chapter presents a new framework for the process of visualising virtual environment usage data. Major components, such as an event model, designer task model and data acquisition infrastructure are described. Interface and implementation factors are also developed, along with example visualisation techniques that make use of the new task and event model. A case study is performed to illustrate a typical scenario for the framework, and its benefits to the environment development team.
Resumo:
Summary Generalized Procrustes analysis and thin plate splines were employed to create an average 3D shape template of the proximal femur that was warped to the size and shape of a single 2D radiographic image of a subject. Mean absolute depth errors are comparable with previous approaches utilising multiple 2D input projections. Introduction Several approaches have been adopted to derive volumetric density (g cm-3) from a conventional 2D representation of areal bone mineral density (BMD, g cm-2). Such approaches have generally aimed at deriving an average depth across the areal projection rather than creating a formal 3D shape of the bone. Methods Generalized Procrustes analysis and thin plate splines were employed to create an average 3D shape template of the proximal femur that was subsequently warped to suit the size and shape of a single 2D radiographic image of a subject. CT scans of excised human femora, 18 and 24 scanned at pixel resolutions of 1.08 mm and 0.674 mm, respectively, were equally split into training (created 3D shape template) and test cohorts. Results The mean absolute depth errors of 3.4 mm and 1.73 mm, respectively, for the two CT pixel sizes are comparable with previous approaches based upon multiple 2D input projections. Conclusions This technique has the potential to derive volumetric density from BMD and to facilitate 3D finite element analysis for prediction of the mechanical integrity of the proximal femur. It may further be applied to other anatomical bone sites such as the distal radius and lumbar spine.
Resumo:
This paper provides a fresh analysis of the widely-used Common Scrambling Algorithm Stream Cipher (CSA-SC). Firstly, a new representation of CSA-SC with a state size of only 89 bits is given, a significant reduction from the 103 bit state of a previous CSA-SC representation. Analysis of this 89-bit representation demonstrates that the basis of a previous guess-and-determine attack is flawed. Correcting this flaw increases the complexity of that attack so that it is worse than exhaustive key search. Although that attack is not feasible, the reduced state size of our representation makes it obvious that CSA-SC is vulnerable to several generic attacks, for which feasible parameters are given.