463 resultados para Shipping conferences.
Resumo:
This presentation focuses on actioning university-community engagement through a Department of Employment, Education and Work Relations (DEEWR) grant. The project associated with this grant is titled Teacher Education Done Differently (TEDD) and it is currently in its third and final year of operation. TEDD aims to facilitate benefits for all partners (i.e., teachers, school executives, students, preservice teachers, university staff, and education departments). This project aims to facilitate understandings and skills on advancing mentoring and teaching practices for preservice teachers.
Resumo:
Drink driving remains a significant problem on Australian roads, with about a quarter to a third of fatal crashes involving drivers or riders who have a BAC of 0.05 or greater. Last available data in the state of Queensland (2003) of the major factors involved in road fatalities and injuries indicated that alcohol and drugs were noted as one of the contributing factors in 38% of fatalities and 11% of all crashes, making it the highest single contributing factor to road fatalities. Until this point, there has been little information about first time offenders as a group, but it is known that offenders typically are not first time drink drivers but rather ‘first time apprehended’, in that most have engaged in drink driving in the years leading to the first offence. This paper follows 89 first time drink driving offenders who were interviewed at the time of court mention and followed up around 6 months following the court hearing. Of the offenders, 27% reported to have driven over the limit in the time between initial contact and follow up. The paper demonstrates the characteristics and offending patterns of first offenders who engaged in drink driving following conviction and those who didn’t, providing suggestions on how to target those at high risk for the behaviour and subsequent offending.
Resumo:
Injuries and deaths due to unsafe driving practices are a substantial health and socioeconomic burden to the community. Young socially disadvantaged males who are involved in a lifestyle of risky behaviour, crime and motor vehicle accidents seem unaffected by educational campaigns to improve safer driving. The aim is to develop a driving and social behavioural profile that may explain the lack of effectiveness of road safety advertising and suggest ways to refine educational strategies to reduce the risky lifestyle and associated harms among those most vulnerable, the 15-25 year olds. The procedure involved a quantitative and qualitative analysis through questionnaires, surveys and focus groups involving a comparison of populations (n = 668) by age, gender and socioeconomic status in three discrete Australian sites. Information gathered included issues related to road safety awareness, knowledge of advertising, personal and peer group attitudes as well as driving and life style history. The results indicate that within the community a highly visible profile of strong anti-social road safety activities by an educationally and economically disadvantaged sub-culture exists and this group seem impervious to road safety advertising and education initiatives. As the overall unsafe driving and risky antisocial behaviour is significant among 15-25 year olds within the community the solution is seen to be community based. A long-term (five to ten year) program has been posited; promoting community partnerships through consultative and local action committees at all levels creating locally designed formal and informal educational and mutual support programs.
Resumo:
Alcohol misuse and violence is a major public safety concern. Although the extent and nature of alcohol-related violence has been examined there is a paucity of research surrounding the ongoing construction and re-construction of gender identity and its relationship to aggression and alcohol consumption. A social constructionist perspective was used to explore women’s perceptions and experiences of drinking alcohol and incidents of public violence and aggression. Two methods were used. Firstly, an exploratory study consisting of three in-depth interviews and three focus groups to examine the ideas women constructed in relation to their experiences; and further, an online survey to explore self-reported drinking patterns among men and women. The main themes emerging from the qualitative material were ‘planned drinking to excess’ (incorporating the rituals of a ‘pre-drink’ routine), and perceptions of appropriate feminine behaviour (particularly in relation to excessive drinking and alcohol related aggression in and around licensed venues). The survey data indicated that men continue to consume more alcohol and at higher levels than women, while women’s involvement in aggressive incidents on a night out being similar to that of men. Both genders considered that women’s involvement in aggressive incidents in and around licensed venues as ‘unfeminine’. Understanding drinking as a socially constructed activity adds to our understanding of the meaning of drinking for women, and in particular, young women. This perspective may allow more focussed initiatives to address the social and health related harms associated with drinking in and around licensed venues.
Resumo:
This paper presents a Six Sigma case study analysis involving three service organizations of Singapore. The organizations are a local hospital, a construction and related engineering service, and a consultancy service. These organizations embarked on their Six Sigma journey around 2003-2004. Though the hospital was slightly ahead than the other two in beginning Six Sigma. These organizations have since achieved significant service improvements through implementation of Six Sigma to their different divisions. Through a series of structured interviews with Six Sigma project champions, team leaders, and members; project reports; public archives; and observations; this study explores the Six Sigma journey of these organizations. The results portray a list of success factors which led to the Six Sigma initiatives, the process of Six Sigma implementation through proper identification of critical-to-quality characteristics, tools and techniques, and the performance indicators which display the improvements due to Six Sigma.
Resumo:
Gray‘s (2000) revised Reinforcement Sensitivity Theory (r-RST) was used to investigate personality effects on information processing biases to gain-framed and loss-framed anti-speeding messages and the persuasiveness of these messages. The r-RST postulates that behaviour is regulated by two major motivational systems: reward system or punishment system. It was hypothesised that both message processing and persuasiveness would be dependent upon an individual‘s sensitivity to reward or punishment. Student drivers (N = 133) were randomly assigned to view one of four anti-speeding messages or no message (control group). Individual processing differences were then measured using a lexical decision task, prior to participants completing a personality and persuasion questionnaire. Results indicated that participants who were more sensitive to reward showed a marginally significant (p = .050) tendency to report higher intentions to comply with the social gain-framed message and demonstrate a cognitive processing bias towards this message, than those with lower reward sensitivity.
Resumo:
An introduction to thinking about and understanding probability that highlights the main pits and trapfalls that befall logical reasoning
Resumo:
An introduction to elicitation of experts' probabilities, which illustrates common problems with reasoning and how to circumvent them during elicitation.
Resumo:
An introduction to design of eliciting knowledge from experts.
Resumo:
An introduction to eliciting a conditional probability table in a Bayesian Network model, highlighting three efficient methods for populating a CPT.
Resumo:
Defence organisations perform information security evaluations to confirm that electronic communications devices are safe to use in security-critical situations. Such evaluations include tracing all possible dataflow paths through the device, but this process is tedious and error-prone, so automated reachability analysis tools are needed to make security evaluations faster and more accurate. Previous research has produced a tool, SIFA, for dataflow analysis of basic digital circuitry, but it cannot analyse dataflow through microprocessors embedded within the circuit since this depends on the software they run. We have developed a static analysis tool that produces SIFA compatible dataflow graphs from embedded microcontroller programs written in C. In this paper we present a case study which shows how this new capability supports combined hardware and software dataflow analyses of a security critical communications device.
Resumo:
Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these false-positive data flow paths wastes an information security evaluator's time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.
Resumo:
This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.