761 resultados para Knowledge Exchange
Resumo:
Public knowledge and beliefs about injury prevention are currently poorly understood. A total of 1030 residents in the State of Queensland, Australia responded to questions about injury prevention in or around the home, on the roads, in or on the water, at work, deliberate injury, and responsibility for preventing deliberate injury allowing comparison with published injury prevalence data. Overall the youngest members of society were identified as being the most vulnerable to deliberate injury with young adults accounting for 59% of responses aligning with published data. However, younger adults failed to indicate an awareness of their own vulnerability to deliberate injury in alcohol environments even though 61% of older respondents were aware of this trend. Older respondents were the least inclined to agree that they could make a difference to their own safety in or around the home but were more inclined to agree that they could make a difference to their own safety at work. The results are discussed with a view to using improved awareness of public beliefs about injury to identify barriers to the uptake of injury prevention strategies (e.g. low perceived injury risk) as well as areas where injury prevention strategies may receive public support.
Resumo:
This is a conceptual article on police deviance and its multi-faceted forms. It seeks to address the lack of an adequately formulated framework in the literature of the breadth and depth of police misconduct and corruption. The article argues for the use of a proposed ‘sliding scale’ of police deviance by examining the nature, extent and progression of police deviance and crime using research in Australia and Canada as illustrative case studies. This sliding scale is designed to research, capture and store, and hence extend the knowledge base of what constitutes police deviance at the level of the individual, the group and the organisational contexts of policing. As such, the conceptual framework is a robust yet flexible research tool and its utility as a sliding scale constitutes a step forward in advancing the knowledge on police deviance and criminality through adopting an integrated and holistic approach to managing such knowledge.
Resumo:
This article discusses the design of a memorial space of the Tree of Knowledge, located in Oak Street, Barcaldine, Queensland designed by Brian Hooper Architect and M3 Architecture. Features of the design include the dead tree trunk underneath pieces of timber hanging down to show the original size of the tree in the 1890s and the root ball visible under a glass floor.
Resumo:
Knowledge is a powerful organisational asset yet intangible and hard to manage, particularly in a project environment where there is a tendency to repeat the same mistakes rather than learn from previous project lessons. A lack of effective knowledge sharing across projects causes reinventions that are costly, and time consuming. Research on knowledge transfer has focused mainly on functional organisations and only recent attention has been directed towards knowledge transfer in projects. Furthermore, there is little evidence in the literature which examines trust in the knowledge transfer processes. This paper studies how the three types of trust - ability, benevolence, and integrity impact on knowledge transfer from the inter-project perspective. Three case studies investigated the matter. A detailed description of the work undertaken and an analysis of interviews with project professionals from large project-based organisations are presented in this paper. The key finding identifies the positive impact of ability trust on knowledge transfer. However, it was also found that perception on both integrity and benevolence varied across organisations suggesting that there can be a possible impact of organisational factors on the way trust is perceived in inter-project knowledge transfer. The paper concludes with a discussion and recommendations regarding the development of trust for inter-project environment.
Resumo:
Australian policy initiatives and state curriculum reform efforts affirm a commitment to address student disengagement through the development of inclusive school environments, curriculum, and pedagogy. This paper, drawing on critical social theory, describes three Australian projects that support the cultivation of teachers’ beliefs, knowledge and skills for critical reflection and leading change in schools. The first project reports on the valued ethics that emerged in pre-service teacher reflections about a Service-learning Program at a university in Queensland. The second project reports on a school-based collaborative inquiry approach to professional development with a focus on literacy practices. The final project reports on an initiative in another university in Victoria, to operationalise pedagogical change and curriculum renewal in Victoria, through the Principles of Learning and Teaching (PoLT). These case studies illustrate how critical reflection and development of beliefs, knowledge and skills can be acquired to better meet the needs of schools.
Resumo:
Participatory design has the moral and pragmatic tenet of including those who will be most affected by a design into the design process. However, good participation is hard to achieve and results linking project success and degree of participation are inconsistent. Through three case studies examining some of the challenges that different properties of knowledge - novelty, difference, dependence - can impose on the participatory endeavour we examine some of the consequences to the participatory process of failing to bridge across knowledge boundaries - syntactic, semantic, and pragmatic. One pragmatic consequence, disrupting the user's feeling of involvement to the project, has been suggested as a possible explanation for the inconsistent results linking participation and project success. To aid in addressing these issues a new form of participatory research, called embedded research, is proposed and examined within the framework of the case studies and knowledge framework with a call for future research into its possibilities.
Resumo:
Knowledge is about cultural power. Considering that it is both resource and product within the brave new world of fast capitalism, this collection argues for knowledge cultures that are mutually engaged and hence more culturally inclusive and socially productive. Globalized intellectual property regimes, the privatization of information, and their counterpoint, the information and creative commons movements, constitute productive sites for the exploration of epistemologies that talk with each other rather than at and past each other. Global Knowledge Cultures provides a collection of accessible essays by some of the world’s leading legal scholars, new media analysts, techno activists, library professionals, educators and philosophers. Issues canvassed by the authors include the ownership of knowledge, open content licensing, knowledge policy, the common-wealth of learning, transnational cultural governance, and information futures. Together, they call for sustained intercultural dialogue for more ethical knowledge cultures within contexts of fast knowledge capitalism.
Resumo:
The International Network of Indigenous Health Knowledge and Development (INIHKD) Conference was held from Monday 24 May to Friday 28 May 2010 at Kiana Lodge, Port Madison Indian Reservation, Suquamish Nation, Washington State, United States of America. The overall theme for the 4th Biennial Conference was ‘Knowing Our Roots: Indigenous Medicines, Health Knowledges and Best Practices’. This article details the experience of participants who were at the INIHKD Conference. It concludes with an encouragement to people to attend the 5th INIHKD Conference in Australia in 2012.
Resumo:
Accurate knowledge and positive attitudes within the community are important for the effective diagnosis, treatment and support of people with ADHD. Most previous research about knowledge and attitudes has focused only on professional groups and parents of children with ADHD. The aim of this study was to explore knowledge about ADHD characteristics and causes, and attitudes towards issues such as medication in the general population. Six hundred and forty-five members of the Australian community, all of whom were parents, completed a questionnaire. The findings showed that the core features of ADHD were well-known, but there were misconceptions and considerable uncertainty about many aspects. Most respondents failed to recognise the genetic basis of the disorder and its potentially lifelong nature. Fathers were less knowledgeable than mothers. Although most participants believed that ADHD is a genuine disorder and recognised the benefits of medication, the majority believed that it is diagnosed too frequently and that medication is prescribed too readily. The study concluded that, in many respects, the public is not well-informed about ADHD and suggested that the media may have an important role in enhancing community awareness of the disorder through responsible, sensitive and accurate reporting.
Resumo:
The 5th International Conference on Field and Service Robotics (FSR05) was held in Port Douglas, Australia, on 29th - 31st July 2005, and brought together the worlds' leading experts in field and service automation. The goal of the conference was to report and encourage the latest research and practical results towards the use of field and service robotics in the community with particular focus on proven technology. The conference provided a forum for researchers, professionals and robot manufacturers to exchange up-to-date technical knowledge and experience. Field robots are robots which operate in outdoor, complex, and dynamic environments. Service robots are those that work closely with humans, with particular applications involving indoor and structured environments. There are a wide range of topics presented in this issue on field and service robots including: Agricultural and Forestry Robotics, Mining and Exploration Robots, Robots for Construction, Security & Defence Robots, Cleaning Robots, Autonomous Underwater Vehicles and Autonomous Flying Robots. This meeting was the fifth in the series and brings FSR back to Australia where it was first held. FSR has been held every 2 years, starting with Canberra 1997, followed by Pittsburgh 1999, Helsinki 2001 and Lake Yamanaka 2003.
Resumo:
This paper proposes a security architecture for the basic cross indexing systems emerging as foundational structures in current health information systems. In these systems unique identifiers are issued to healthcare providers and consumers. In most cases, such numbering schemes are national in scope and must therefore necessarily be used via an indexing system to identify records contained in pre-existing local, regional or national health information systems. Most large scale electronic health record systems envisage that such correlation between national healthcare identifiers and pre-existing identifiers will be performed by some centrally administered cross referencing, or index system. This paper is concerned with the security architecture for such indexing servers and the manner in which they interface with pre-existing health systems (including both workstations and servers). The paper proposes two required structures to achieve the goal of a national scale, and secure exchange of electronic health information, including: (a) the employment of high trust computer systems to perform an indexing function, and (b) the development and deployment of an appropriate high trust interface module, a Healthcare Interface Processor (HIP), to be integrated into the connected workstations or servers of healthcare service providers. This proposed architecture is specifically oriented toward requirements identified in the Connectivity Architecture for Australia’s e-health scheme as outlined by NEHTA and the national e-health strategy released by the Australian Health Ministers.
Resumo:
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-AKE is presented based on the security models for group key exchange protocols and also taking into account the security requirements generally considered in the ciphertext policy attribute-based setting. We also extend the paradigm of hybrid encryption to the ciphertext policy attribute-based encryption schemes. A new primitive called encapsulation policy attribute-based key encapsulation mechanism (EP-AB-KEM) is introduced and a notion of chosen ciphertext security is de�ned for EP-AB-KEMs. We propose an EP-AB-KEM from an existing attribute-based encryption scheme and show that it achieves chosen ciphertext security in the generic group and random oracle models. We present a generic one-round AB-AKE protocol that satis�es our AKE-security notion. The protocol is generically constructed from any EP-AB-KEM that satis�es chosen ciphertext security. Instantiating the generic AB-AKE protocol with our EP-AB-KEM will result in a concrete one-round AB-AKE protocol also secure in the generic group and random oracle models.
Resumo:
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.
Resumo:
A significant amount (ca. 15-25 GL/a) of PRW (Purified Recycled Water) from urban areas is foreseen as augmentation of the depleted groundwater resources of the Lockyer Valley (approx. 80 km west of Brisbane). Theresearch project uses field investigations, lab trials and modelling techniques to address the key challenges: (i) how to determine benefits of individual users from the augmentation of a natural common pool resource; (ii) how to minimise impacts of applying different quality water on the Lockyer soils, to creeks and on aquifier materials; (iii) how to minimuse mobilisation of salts in the unsaturated and saturated zones as a result of increased deep drainage; (iv) determination of potential for direct aquifer recharge using injection wells?