838 resultados para Australasian jurisdictions
Resumo:
Despite increasingly sophisticated speed management strategies, speeding remains a significant contributing factor in 25% of Australia’s fatal crashes. Excessive speed is also a recognised contributor to road trauma in rapidly motorising countries such as China, where increases in vehicle ownership and new drivers, and a high proportion of vulnerable road users all contribute to a high road trauma rate. Speed choice is a voluntary behaviour. Therefore, driver perceptions are important to our understanding of the nature of speeding. This paper reports preliminary qualitative (focus groups) and quantitative (survey) investigations of the perceptions of drivers in Queensland and Beijing. Drivers’ definitions of speeding as well as their perceptions of the influence of legal factors on their reported speeds were explored. Survey participants were recruited from petrol stations (Queensland, n=833) and car washes (Beijing, n=299). Similarities were evident in justifications for exceeding speed limits across samples. Excessive speeds were not deemed as ‘speeding’ when drivers considered that they were safe and under their control, or when speed limits were seen as unreasonably low. This appears linked to perceptions of enforcement tolerances in some instances with higher perceived enforcement thresholds noted in China. Encouragingly, drivers in both countries reported a high perceived risk of apprehension if speeding. However, a substantial proportion of both samples also indicated perceptions of low certainty of receiving penalties when apprehended. Chinese drivers considered sanctions less severe than did Australian drivers. In addition, strategies to avoid detection and penalties were evident in both samples, with Chinese drivers reporting a broader range of avoidant techniques. Implications of the findings for future directions in speed management in both countries are discussed.
Resumo:
Young drivers aged 17-24 are consistently overrepresented in motor vehicle crashes. Research has shown that a young driver’s crash risk increases when carrying similarly aged passengers, with fatal crash risk increasing two to three fold with two or more passengers. Recent growth in access to and use of the internet has led to a corresponding increase in the number of web based behaviour change interventions. An increasing body of literature describes the evaluation of web based programs targeting risk behaviours and health issues. Evaluations have shown promise for such strategies with evidence for positive changes in knowledge, attitudes and behaviour. The growing popularity of web based programs is due in part to their wide accessibility, ability for personalised tailoring of intervention messages, and self-direction and pacing of online content. Young people are also highly receptive to the internet and the interactive elements of online programs are particularly attractive. The current study was designed to assess the feasibility for a web based intervention to increase the use of personal and peer protective strategies among young adult passengers. An extensive review was conducted on the development and evaluation of web based programs. Year 12 students were also surveyed about their use of the internet in general and for health and road safety information. All students reported internet access at home or at school, and 74% had searched for road safety information. Additional findings have shown promise for the development of a web based passenger safety program for young adults. Design and methodological issues will be discussed.
Resumo:
The general aim of designated driver programs is to reduce the level of drink driving by encouraging potential drivers to travel with a driver who has abstained from (or at least limited) consuming alcohol. Designated driver programs are quite widespread around the world, however a limited number have been rigorously evaluated. This paper reports the qualitative results from an evaluation of a designated driver program known as ‘Skipper’, in a provincial city in Queensland. Focus groups were conducted with 108 individuals from the intervention area. These focus groups aimed to assess the barriers and facilitators to the programs’ effectiveness by obtaining information about the patrons’ views on various aspects of the program, as well as designated driver and travelling after drinking more generally. A brief questionnaire was also given to participants in order to present responses in terms of the participants’ characteristics. Results suggest general support for the designated driver concept and the ‘Skipper’ program specifically. Facilitating factors reported by participants included the media coverage highlighting the risks associated with drink driving and the social acceptability of choosing not to drink. However, there was also some suggestion that the impact of the program was mainly to encourage those who already engage in designated driver behaviour to continue doing so, rather than encouraging the uptake of the behaviour among potential new users. Some of the suggested barriers to this kind of behaviour change include: social pressure to drink; alcohol dependency; and a failure to plan ahead.
Resumo:
This paper examines an aspect of the data taken from a larger study evaluating the effect of speeding penalty changes on speeding recidivism in Queensland. Traffic offence data from May 1996 to August 2007 were provided to the research team for two cohorts of offenders: individuals who committed a speeding offence in May 2001; and individuals who committed a speeding offence in May 2003. Data included details of the offenders’ index offence, previous and subsequent traffic offences (speeding and other) and their demographic characteristics. Using this data the aim of this component of the research was to use demographic data and the previous traffic offences of these individuals to explore the characteristics and predictors of high-range speeding offenders. High-range offenders were identified as those individuals who committed two or more speeding offences with a recorded speed of 30 km/hr or more above the speed limit. For the purposes of comparison, low-range offenders (committed one speeding offence in the time-frame and that offence was less than 15 km/hr over the speed limit) and mid-range offenders (all other offenders) were identified. Using Chi-square and logistic regression analyses, characteristics and predictors of high-range speeding offenders were identified. The implications and limitations of this study are also discussed.
Resumo:
Research has shown that road lane width impacts on driver behaviour. This literature review provides guidelines to assist in the design, construction and retrofitting of urban roads to accommodate road users' safety requirements. It focuses on the impacts of lane widths on cyclists and motor vehicle safety behaviour. The literature review commenced with a search of library databases. Peer reviewed articles and road authority (local, state and national) reports were reviewed. The majority of studies investigating the effects of lane width on driver behaviour were simulator based, while research into cycling safety involved data collected from actual traffic environments. Results show that marked road lane width influences perceived task difficulty, risk perception and possibly speed choice. The positioning of cyclists in traffic lanes is influenced by the presence of on-road cycling facilities and the total roadway width. The lateral displacement between bicycle and vehicle is smallest when a bicycle facility is present. Lower, or reduced, vehicle speeds play a significant role in improving bicyclist and pedestrian safety. It is also shown that if road lane widths in urban areas were reduced, to a functional width that was less than the current guidelines of 3.5m, it could result in a safer road environment for all road users.
Resumo:
The unusual behaviour of fine lunar regolith like stickiness and low heat conductivity is dominated by the structural arrangement of its finest fraction. Here, we show the previously unknown phenomenon of a globular 3D superstructure within the dust fraction of regolith. A study using the recently developed Transmission X-ray Microscopy (TXM) with tomographic reconstruction reveals a highly porous network of cellular voids in the finest dust fraction aggregates in lunar soil. Such porous chained aggregates are composed of sub-micron particles that form a network of cellular voids a few micrometers in diameter. Discovery of such a superstructure within the finest fraction of lunar topsoil enables a model of heat transfer to be constructed.
Resumo:
Government figures put the current indigenous unemployment rate at around 23%, 3 times the unemployment rate for other Australians. This thesis aims to assess whether Australian indirect discrimination legislation can provide a remedy for one of the causes of indigenous unemployment - the systemic discrimination which can result from the mere operation of established procedures of recruitment and hiring. The impact of those practices on indigenous people is examined in the context of an analysis of anti-discrimination legislation and cases from all Australian jurisdictions from the time of the passing of the Racial Discrimination Act by the Commonwealth in 1975 to the present. The thesis finds a number of reasons why the legislation fails to provide equality of opportunity for indigenous people seeking to enter the workforce. In nearly all jurisdictions it is obscurely drafted, used mainly by educated middle class white women, and provides remedies which tend to be compensatory damages rather than change to recruitment policy. White dominance of the legal process has produced legislative and judicial definitions of "race" and "Aboriginality" which focus on biology rather than cultural difference. In the commissions and tribunals complaints of racial discrimination are often rejected on the grounds of being "vexatious" or "frivolous", not reaching the required standard of proof, or not showing a causal connection between race and the conduct complained of. In all jurisdictions the cornerstone of liability is whether a particular employment term, condition or practice is reasonable. The thesis evaluates the approaches taken by appellate courts, including the High Court, and concludes that there is a trend towards an interpretation of reasonableness which favours employer arguments such as economic rationalism, the maintenance of good industrial relations, managerial prerogative to hire and fire, and the protection of majority rights. The thesis recommends that separate, clearly drafted legislation should be passed to address indigenous disadvantage and that indigenous people should be involved in all stages of the process.
Resumo:
Crash risk is the statistical probability of a crash. Its assessment can be performed through ex post statistical analysis or in real-time with on-vehicle systems. These systems can be cooperative. Cooperative Vehicle-Infrastructure Systems (CVIS) are a developing research avenue in the automotive industry worldwide. This paper provides a survey of existing CVIS systems and methods to assess crash risk with them. It describes the advantages of cooperative systems versus non-cooperative systems. A sample of cooperative crash risk assessment systems is analysed to extract vulnerabilities according to three criteria: market penetration, over-reliance on GPS and broadcasting issues. It shows that cooperative risk assessment systems are still in their infancy and requires further development to provide their full benefits to road users.
Resumo:
The driving task requires sustained attention during prolonged periods, and can be performed in highly predictable or repetitive environments. Such conditions could create drowsiness or hypovigilance and impair the ability to react to critical events. Identifying vigilance decrement in monotonous conditions has been a major subject of research, but no research to date has attempted to predict this vigilance decrement. This pilot study aims to show that vigilance decrements due to monotonous tasks can be predicted through mathematical modelling. A short vigilance task sensitive to short periods of lapses of vigilance called Sustained Attention to Response Task is used to assess participants’ performance. This task models the driver’s ability to cope with unpredicted events by performing the expected action. A Hidden Markov Model (HMM) is proposed to predict participants’ hypovigilance. Driver’s vigilance evolution is modelled as a hidden state and is correlated to an observable variable: the participant’s reactions time. This experiment shows that the monotony of the task can lead to an important vigilance decline in less than five minutes. This impairment can be predicted four minutes in advance with an 86% accuracy using HMMs. This experiment showed that mathematical models such as HMM can efficiently predict hypovigilance through surrogate measures. The presented model could result in the development of an in-vehicle device that detects driver hypovigilance in advance and warn the driver accordingly, thus offering the potential to enhance road safety and prevent road crashes.
Resumo:
Effective information and knowledge management (IKM) is critical to corporate success; yet, its actual establishment and management is not yet fully understood. We identify ten organizational elements that need to be addressed to ensure the effective implementation and maintenance of information and knowledge management within organizations. We define these elements and provide key characterizations. We then discuss a case study that describes the implementation of an information system (designed to support IKM) in a medical supplies organization. We apply the framework of organizational elements in our analysis to uncover the enablers and barriers in this systems implementation project. Our analysis suggests that taking the ten organizational elements into consideration when implementing information systems will assist practitioners in managing information and knowledge processes more effectively and efficiently. We discuss implications for future research.
Resumo:
Objectives: Recovery is an emerging movement in mental health. Evidence for recovery-based approaches is not well developed and approaches to implement recovery-oriented services are not well articulated. The collaborative recovery model (CRM) is presented as a model that assists clinicians to use evidence-based skills with consumers, in a manner consistent with the recovery movement. A current 5 year multisite Australian study to evaluate the effectiveness of CRM is briefly described. Conclusion: The collaborative recovery model puts into practice several aspects of policy regarding recovery-oriented services, using evidence-based practices to assist individuals who have chronic or recurring mental disorders (CRMD). It is argued that this model provides an integrative framework combining (i) evidence-based practice; (ii) manageable and modularized competencies relevant to case management and psychosocial rehabilitation contexts; and (iii) recognition of the subjective experiences of consumers.
Resumo:
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.
Resumo:
Traffic congestion is an increasing problem with high costs in financial, social and personal terms. These costs include psychological and physiological stress, aggressivity and fatigue caused by lengthy delays, and increased likelihood of road crashes. Reliable and accurate traffic information is essential for the development of traffic control and management strategies. Traffic information is mostly gathered from in-road vehicle detectors such as induction loops. Traffic Message Chanel (TMC) service is popular service which wirelessly send traffic information to drivers. Traffic probes have been used in many cities to increase traffic information accuracy. A simulation to estimate the number of probe vehicles required to increase the accuracy of traffic information in Brisbane is proposed. A meso level traffic simulator has been developed to facilitate the identification of the optimal number of probe vehicles required to achieve an acceptable level of traffic reporting accuracy. Our approach to determine the optimal number of probe vehicles required to meet quality of service requirements, is to simulate runs with varying numbers of traffic probes. The simulated traffic represents Brisbane’s typical morning traffic. The road maps used in simulation are Brisbane’s TMC maps complete with speed limits and traffic lights. Experimental results show that that the optimal number of probe vehicles required for providing a useful supplement to TMC (induction loop) data lies between 0.5% and 2.5% of vehicles on the road. With less probes than 0.25%, little additional information is provided, while for more probes than 5%, there is only a negligible affect on accuracy for increasingly many probes on the road. Our findings are consistent with on-going research work on traffic probes, and show the effectiveness of using probe vehicles to supplement induction loops for accurate and timely traffic information.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
Business Process Management (BPM) has increased in popularity and maturity in recent years. Large enterprises engage use process management approaches to model, manage and refine repositories of process models that detail the whole enterprise. These process models can run to the thousands in number, and may contain large hierarchies of tasks and control structures that become cumbersome to maintain. Tools are therefore needed to effectively traverse this process model space in an efficient manner, otherwise the repositories remain hard to use, and thus are lowered in their effectiveness. In this paper we analyse a range of BPM tools for their effectiveness in handling large process models. We establish that the present set of commercial tools is lacking in key areas regarding visualisation of, and interaction with, large process models. We then present six tool functionalities for the development of advanced business process visualisation and interaction, presenting a design for a tool that will exploit the latest advances in 2D and 3D computer graphics to enable fast and efficient search, traversal and modification of process models.