655 resultados para public purpose


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper investigates the elements which support innovative and entrepreneurial activity in New Zealand’s state owned enterprises (SOEs). An inductive case study design, involving interview data, textual analysis, and observation, was applied to three SOEs. Findings reveal that those aspects typically associated with entrepreneurship, such as innovation, risk acceptance, pro-activeness and growth, are often supported by a number of unexpected elements within the public sector. These elements include culture, branding, operational excellence, cost efficiency, and knowledge transfer. The implications are twofold. First, that innovative and entrepreneurial activity in the public sector can go beyond policy-making, with SOEs representing an important policy decision and sector of the New Zealand Government. And second, that the impact of several SOEs on international markets suggests competition on the global stage will increasingly come from both public and private sector organizations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The term ’public discourses’ describes a range of texts or signifiers that inform the conditions of audience reception. Public discourses include myriad written, visual, spatial, auditory and sensory texts experienced by an audience at a particular theatrical event. Ric Knowles first introduced this term in his recent work Reading the Material Theatre. Whereas Knowles was interested in how public discourses modified the conditions of reception, my broader research is to explore how these public discourses become texts in themselves. This paper will discuss one public discourse, the theatre programme, as it related to a staging of Maxwell Anderson’s Anne of the Thousand Days at the Brisbane Powerhouse in June 2006. The significance of the programme was explored at symposiums held after the performances. Audiences generally view programmes before a performance and after a performance and its significance as a written text changes. The program became a sign vehicle that worked to expound and explicate the meaning of the play for the audience. This public discourse became a significant written text contributing to the textual whole of the theatrical event.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on statements from Professional Development participants who were asked to comment on NAPLAN. The participants were involved in a project designed by the YuMi Deadly Centre (YDC) for implementation into 25 Queensland School to enhance the teaching and learning of mathematics to Aboriginal and Torres Strait Islander students and low SES students. Using an action research framework and a survey questionnaire, the preliminary data obtained from participating principals is mixed, with statements indicating that NAPLAN is a high priority for some schools while others indicated that it does not “tell” the whole story of student learning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The advent of data breach notification laws in the United States (US) has unearthed a significant problem involving the mismanagement of personal information by a range of public and private sector organisations. At present, there is currently no statutory obligation under Australian law requiring public or private sector organisations to report a data breach of personal information to law enforcement agencies or affected persons. However, following a comprehensive review of Australian privacy law, the Australian Law Reform Commission (ALRC) has recommended the introduction of a mandatory data breach notification scheme. The issue of data breach notification has ignited fierce debate amongst stakeholders, especially larger private sector entities. The purpose of this article is to document the perspectives of key industry and government representatives to identify their standpoints regarding an appropriate regulatory approach to data breach notification in Australia.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose, Design/methodology / approach The acknowledgement of state significance in relation to development projects can result in special treatment by regulatory authorities, particularly in terms of environmental compliance and certain economic and other government support measures. However, defining just what constitutes a “significant project”, or a project of “state significance”, varies considerably between Australian states. In terms of establishing threshold levels, in Queensland there is even less clarity. Despite this lack of definition, the implications of “state significance” can nevertheless be considerable. For example, in Queensland if the Coordinator-General declares a project to be a “significant project” under the State Development and Public Works Organisation Act 1971, the environmental impact assessment process may become more streamlined – potentially circumventing certain provisions under The Integrated Planning Act 1997. If the project is not large enough to be so deemed, an extractive resource under the State Planning Policy 2/07 - Protection of Extractive Resources 2007 may be considered to be of State or regional significance and subsequently designated as a “Key Resource Area”. As a consequence, such a project is afforded some measure of resource protection but remains subject to the normal assessment process under the Integrated Development Assessment System, as well as the usual requirements of the vegetation management codes, and other regulations. Findings (Originality/value) & Research limitations / implications This paper explores the various meanings of “state significance” in Queensland and the ramifications for development projects in that state. It argues for a streamlining of the assessment process in order to avoid or minimise constraints acting on the state’s development. In so doing, it questions the existence of a strategic threat to the delivery of an already over-stretched infrastructure program.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: This paper aims to show that identification of expectations and software functional requirements via consultation with potential users is an integral component of the development of an emergency department patient admissions prediction tool. ---------- Design/methodology/approach: Thematic analysis of semi-structured interviews with 14 key health staff delivered rich data regarding existing practice and future needs. Participants included emergency department staff, bed managers, nurse unit managers, directors of nursing, and personnel from health administration. ---------- Findings: Participants contributed contextual insights on the current system of admissions, revealing a culture of crisis, imbued with misplayed communication. Their expectations and requirements of a potential predictive tool provided strategic data that moderated the development of the Emergency Department Patient Admissions Prediction Tool, based on their insistence that it feature availability, reliability and relevance. In order to deliver these stipulations, participants stressed that it should be incorporated, validated, defined and timely. ---------- Research limitations/implications: Participants were envisaging a concept and use of a tool that was somewhat hypothetical. However, further research will evaluate the tool in practice. ---------- Practical implications: Participants' unsolicited recommendations regarding implementation will not only inform a subsequent phase of the tool evaluation, but are eminently applicable to any process of implementation in a healthcare setting. ---------- Originality/value: The consultative process engaged clinicians and the paper delivers an insider view of an overburdened system, rather than an outsider's observations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides a review of the state of the art relevant work on the use of public mobile data networks for aircraft telemetry and control proposes. Moreover, it describes the characterisation for airborne uses of the public mobile data communication systems known broadly as 3G. The motivation for this study was the explore how this mature public communication systems could be used for aviation purposes. An experimental system was fitted to a light aircraft to record communication latency, line speed, RF level, packet loss and cell tower identifier. Communications was established using internet protocols and connection was made to a local server. The aircraft was flown in both remote and populous areas at altitudes up to 8500 ft in a region located in South East Queensland, Australia. Results show that the average airborne RF levels are better than those on the ground by 21% and in the order of - 77dbm. Latencies were in the order of 500ms (1/2 the latency of Iridium), an average download speed of 0.48Mb/s, average uplink speed of 0.85Mb/s, a packet of information loss of 6.5%. The maximum communication range was also observed to be 70km from a single cell station. The paper also describes possible limitations and utility of using such communications architecture for both manned and unmanned aircraft systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The topics of corruption and tax evasion have attracted significant attention in the literature in recent years. We build on that literature by investigating empirically: (1) whether attitudes toward corruption and tax evasion vary systematically with gender and (2) whether gender differences decline as men and women face similar opportunities for illicit behavior. We use data on eight Western European countries from the World Values Survey and the European Values Survey. The results reveal significantly greater aversion to corruption and tax evasion among women. This holds across countries and time, and across numerous empirical specifications. (JEL H260, D730, J160, Z130)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mindful of time line and budget limitations this document, as requested by BBC, acts as an inspirational scope, identifying more ‘live’ opportunities than possible within the current budget. The document's secondary purpose is to identify through consultation, concept development of ideas and budgetary costs associated, a number of projects within this document that can be successfully achieved within the current circumstance. A limited, but successful outcome in this initial phase will help to ensure the continuing invested support of stake-holders, not only in Burnett Lane but in relation to the creative scope of other laneways as identified in the BCC laneway document.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is a widespread recognition to the need of better manage municipal property in most cities in the world. Structural problems across regional, state, and territorial governments that have legal powers to own and maintain real property are similar, regardless of the level of development of each country. Start from a very basic level of property inventory records. The need for better manage to the local government owned property is the result of widespread decentralisation initiatives that often have devolved huge property portfolios from central to local governments almost “overnight”. At the same time municipal or regional governments were and continue to be unprepared to deal with multiple issues related to the role of property owners and managers. The lack of discussion of public asset management especially the elements that should be incorporated in the framework creates an important challenge to study the discipline of public asset management further. The aim of this paper is to study the practices of public asset management in developed countries, especially the elements of public asset management framework, and its transferability to developing countries. A case study was selected and conducted to achieve this aim. They involved interviews and a focus group. The study found that in public asset management framework, proper asset identification, public asset needs analysis, asset life cycle and performance measurements are an important element that should be incorporated in the framework. Those elements are transferable and applicable to developing countries’ local governments. Finally, findings from this study provide useful input for the local government policy makers, scholars and asset management practitioners to establish a public asset management framework toward more efficient and effective local governments in managing their assets as well as increasing public services quality.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our purpose in this research was to uncover first-person descriptions of the birth experiences of African refugee women in Brisbane, Australia, and to explore the common themes that emerged from their experiences. We conducted semistructured interviews with 10 African refugees who had given birth in Brisbane. Essences universal to childbirth such as pain, control, and experiences of caregivers featured prominently in participants’ descriptions of their experiences. Their experiences, however, were further overshadowed by issues such as language barriers, the refugee experience, female genital mutilation (FGM), and encounters with health services with limited cultural competence.