826 resultados para Program Theory
Resumo:
Using a thematic story telling approach which draws on ethnographic method, a grounded theory of protest movement continuity is presented. The grounded theory draws from theories and activist stories relating to the facilitative role of movement networks, social contagion theory and the cultural experience of activism. It highlights the contagious influence of protest networks in maintaining protest continuity over time and how this leads to common perceptions of development risk and opportunity within communities. It also reveals how communities use collective values and identity, social capital, emotional dynamics and symbolic artifacts to maintain protest continuity.
Resumo:
This article augments Resource Dependence Theory with Real Options reasoning in order to explain time bounds specification in strategic alliances. Whereas prior work has found about a 50/50 split between alliances that are time bound and those that are open-ended, their substantive differences and antecedents are ill understood. To address this, we suggest that the two alliance modes present different real options trade-offs in adaptation to environmental uncertainty: ceteris paribus, time-bound alliances are likely to provide abandonment options over open-ended alliances, but require additional investments to extend the alliance when this turns out to be desirable after formation. Open-ended alliances are likely to provide growth options over open-ended alliances, but they demand additional effort to abandon the alliance if post-formation circumstances so desire. Therefore, we expect time bounds specification to be a function of environmental uncertainty: organizations in more uncertain environments will be relatively more likely to place time bounds on their strategic alliances. Longitudinal archival and survey data collected amongst 39 industry clusters provides empirical support for our claims, which contribute to the recent renaissance of resource dependence theory by specifying the conditions under which organizations choose different time windows in strategic partnering.
Resumo:
The paper explores the role and focus of drink driving rehabilitation programs. It is particularly concerned with whether programs that specifically focus on reducing driving after drinking also have a positive effect on clients’ levels of drinking. A sample of volunteering clients was recruited while they were participating in the Australian “Under the Limit” program and they were followed up at least three months post completion. Response rates were very low and the sample is assumed to reflect the views and outcomes of persons who felt positive about the program. Clients reported large and meaningful reductions in their drinking and in their drink driving. They also reported important moves towards action and change in their drinking habits. The findings deserve to be followed up given the fact that drink driving programs are generally of much shorter duration than alcohol focussed interventions. There is a need for further research in this area and for developing more effective recruitment strategies.
Resumo:
There appears no shortage of theorists for preservice teacher education; however many ideas are abandoned without practical applications. Indeed, it can take years for theories to materialise into practice, if they materialise at all. The quality of preservice teacher education is central for enhancing an education system, and mentors’ roles can assist to shape preservice teachers’ development within the school context. Yet mentoring can be haphazard without being underpinned by a theoretical framework. A mentoring model (personal attributes, system requirements, pedagogical knowledge, modelling, and feedback) has emerged from research and the literature to guide mentors’ practices. This qualitative study investigates mentors’ pedagogical knowledge as one factor crucial to the mentoring process. More specifically, this study involves a questionnaire and audio-recorded focus group meetings with experienced mentors (n=14) who deliberated on devising practical applications for mentoring pedagogical knowledge. Findings revealed that these experienced mentors pinpointed practical applications around a mentor’s role for providing pedagogical knowledge to the mentee. These strategies were varied and demonstrated that any one mentoring practice may be approached from a number of different angles. Nevertheless, there were core mentoring practices in pedagogical knowledge such as showing the mentee how to plan for teaching, articulating classroom management approaches, and talking about how to connect learning to assessment. Mentors may require education on current mentoring practices with practical strategies that are linked to theoretical underpinnings.
Resumo:
Data flow analysis techniques can be used to help assess threats to data confidentiality and integrity in security critical program code. However, a fundamental weakness of static analysis techniques is that they overestimate the ways in which data may propagate at run time. Discounting large numbers of these false-positive data flow paths wastes an information security evaluator's time and effort. Here we show how to automatically eliminate some false-positive data flow paths by precisely modelling how classified data is blocked by certain expressions in embedded C code. We present a library of detailed data flow models of individual expression elements and an algorithm for introducing these components into conventional data flow graphs. The resulting models can be used to accurately trace byte-level or even bit-level data flow through expressions that are normally treated as atomic. This allows us to identify expressions that safely downgrade their classified inputs and thereby eliminate false-positive data flow paths from the security evaluation process. To validate the approach we have implemented and tested it in an existing data flow analysis toolkit.
Resumo:
The educational unit new product development, taught within the industrial design program at the Queensland University of Technology (QUT) introduces the relationship between product design and commercialisation to third year industrial design undergraduate students. In which, they are exposed for the first time to product strategy development aimed at meeting consumer expectations, whilst at the same time achieving corporate objectives. Delivered content such as intellectual property, market opportunities, competitor analysis and investor requirements are taught within the thirteen week semester timeframe. New product development theory is not a new field. However, the design approach to teaching this theory and more importantly how designers can use it in the design process is novel. This paper provides an overview of the curriculum design of this unit as well as its incremental development over the past four year duration period. Student project outcomes and more importantly the process and tools from this unit are also discussed and presented.
Resumo:
The Pattern and Structure Mathematical Awareness Program(PASMAP) stems from a 2-year longitudinal study on students’ early mathematical development. The paper outlines the interview assessment the Pattern and Structure Assessment(PASA) designed to describe students’ awareness of mathematical pattern and structure across a range of concepts. An overview of students’ performance across items and descriptions of their structural development are described.
Resumo:
The business environment across the globe is today characterised by three primary governance arrangements - bureaucracies, markets and networks. For organisations operating within each of these business contexts the terms of engagement in regard to negotiation are different. Rather than starting from a broad ‘how to’ approach or a specific cultural interface, Negotiating the Business Environment looks at governance arrangements within the business environment and at how such governance arrangements impact on how negotiation occurs. This text provides an Australian—not an overseas—perspective on negotiations that will be a welcome change for Australian students. Uniquely, it takes into account the context in which negotiations take place. Negotiating the Business Environment demonstrates how responding to business style in negotiations can effect successful outcomes. It include strong pedagogy including: key terms, key points, further reading lists, case studies, and end of chapter questions
Resumo:
Crowdsourcing harnesses the potential of large and open networks of people. It is a relatively new phenomenon and attracted substantial interest in practice. Related research, however, lacks a theoretical foundation. We propose a system-theoretical perspective on crowdsourcing systems to address this gap and illustrate its applicability by using it to classify crowdsourcing systems. By deriving two principal dimensions from theory, we identify four fundamental types of crowdsourcing systems that help to distinguish important features of such systems. We analyse their respective characteristics and discuss implications and requirements for various aspects related to the design of such systems. Our results demonstrate that systems theory can inform the study of crowdsourcing systems. The identified system types and the implications on their design may prove useful for researchers to frame future studies and for practitioners to identify the right crowdsourcing systems for a particular purpose.
Resumo:
The literature identifies transition as a key objective for capstone experiences. Capstones should take account of the particular needs of final year students by assisting them to transition from their student to their professional identity. The authors are currently completing an Australian Learning and Teaching Council (ALTC) funded project, “Curriculum Renewal in Legal Education: articulating final year curriculum design principles and a final year program”, which seeks to achieve curriculum renewal for legal education in the Australian context through the articulation of a set of curriculum design principles for the final year and the design of a transferable model for an effective final year program. The project has investigated the contemporary role of capstones in assisting transition out by reviewing the relevant literature and considering feedback from a project reference group, a final year student focus group and a recent graduate’s focus group. Analysis of this extensive research- and evidence-base suggests that capstone experiences should support transition through: • Assisting students to develop a sense of professional identity; • Consolidating students’ lifelong learning skills; • Providing opportunities for consolidation of career development and planning processes; • Enabling students to enhance professional skills and competencies; and • Preparing students as ethical citizens and leaders. This paper will examine the role of capstones in assisting students to transition to their professional identity and will propose learning and teaching approaches and assessment of learning methods that support transition out.
Collaboration : developing integration in multi-purpose services in rural New South Wales, Australia
Resumo:
Introduction: The Multi-purpose Service (MPS) Program was introduced to rural Australia in 1991 as a solution to poor health outcomes in rural compared with metropolitan populations, difficulty in attracting healthcare staff and a lack of viability and range of health services in rural areas. The aim of this study was to describe the main concerns of participants involved in the development of multi-purpose services in rural New South Wales (NSW). This article is abstracted from a larger study and discusses the extent to which collaboration occurred within the new multi-purpose service. Methods: A constructivist grounded theory methodology was used. Participants were from 13 multi-purpose services in rural NSW and 30 in-depth interviews were conducted with 6 community members, 11 managers and 13 staff members who had been involved in the process of developing a multi-purpose service. Results: The main concern of all participants was their anticipation of risk. This anticipation of risk manifested itself in either trust or suspicion and explained their progression through a phase of collaborating. Participants who had trust in other stakeholders were more likely to embrace an integrated health service identity. Those participants, who were suspicious that they would lose status or power, maintained that the previous hospital services provided a better health service and described a coexistence of services within the multi-purpose service. Conclusions: This study provided an insight into the perceptions of community members, staff members and managers involved in the process of developing a multi-purpose service. It revealed that the anticipation of risk was intrinsic to a process of changing from a traditional hospital service to collaborating in a new model of health care provided at a multi-purpose service.
Resumo:
This chapter introduces different theoretical approaches to negotiation and provides an explanation of these differing frameworks. While the action of a negotiation centres on the background research undertaken and what happens at the negotiation table, there is a need to know what principles and assumptions are informing these activities. Theories offer a way of understanding the underlying structures, processes and relationships of negotiation. Further, negotiation theories also assist with focusing attention on the 'basis of the bargain' and provide a standpoint from which to judge offers and counter-offers during the negotiation.
Resumo:
Embedded real-time programs rely on external interrupts to respond to events in their physical environment in a timely fashion. Formal program verification theories, such as the refinement calculus, are intended for development of sequential, block-structured code and do not allow for asynchronous control constructs such as interrupt service routines. In this article we extend the refinement calculus to support formal development of interrupt-dependent programs. To do this we: use a timed semantics, to support reasoning about the occurrence of interrupts within bounded time intervals; introduce a restricted form of concurrency, to model composition of interrupt service routines with the main program they may preempt; introduce a semantics for shared variables, to model contention for variables accessed by both interrupt service routines and the main program; and use real-time scheduling theory to discharge timing requirements on interruptible program code.