634 resultados para Key Block Theory


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Adult day care centres provide a means whereby frail or disabled older people can remain living at home particularly when their family care-givers engage in waged work. In Taiwan, adult day care services appear to meet the cultural needs of both older people and their families for whom filial care is vital. Little research attention has been paid to the use of day care services in Taiwan, the uptake rate of which is low. This grounded theory study explored the ways in which older people and family care-givers construct meanings around the use of day care services in Taiwan. Forty-four semi-structured interviews were undertaken with older people, care-givers and day care centre managers. The findings from grounded theory data analysis bring focus to the assumptions and structures that underpin the process of transition to day care services. A key feature of this process is the reconstruction of personal identity as both the older people and family care-givers work to make sense of the relationship between the self and a changing social structure. Reconstructing identity in a shifting world is the core category of the study and reflects a process of reframing whereby older people came to new definitions of social responsibility and independence within the context of the day care centre. Similarly, the family care-givers actively reformulated the concept of filial piety as they interacted with and interpreted the changes in economic and social conditions in Taiwan.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Creativity plays an increasingly important role in our personal, social, educational, and community lives. For adolescents, creativity can enable self-expression, be a means of pushing boundaries, and assist learning, achievement, and completion of everyday tasks. Moreover, adolescents who demonstrate creativity can potentially enhance their capacity to face unknown future challenges, address mounting social and ecological issues in our global society, and improve their career opportunities and contribution to the economy. For these reasons, creativity is an essential capacity for young people in their present and future, and is highlighted as a priority in current educational policy nationally and internationally. Despite growing recognition of creativity’s importance and attention to creativity in research, the creative experience from the perspectives of the creators themselves and the creativity of adolescents are neglected fields of study. Hence, this research investigated adolescents’ self-reported experiences of creativity to improve understandings of their creative processes and manifestations, and how these can be supported or inhibited. Although some aspects of creativity have been extensively researched, there were no comprehensive, multidisciplinary theoretical frameworks of adolescent creativity to provide a foundation for this study. Therefore, a grounded theory methodology was adopted for the purpose of constructing a new theory to describe and explain adolescents’ creativity in a range of domains. The study’s constructivist-interpretivist perspective viewed the data and findings as interpretations of adolescents’ creative experiences, co-constructed by the participants and the researcher. The research was conducted in two academically selective high schools in Australia: one arts school, and one science, mathematics, and technology school. Twenty adolescent participants (10 from each school) were selected using theoretical sampling. Data were collected via focus groups, individual interviews, an online discussion forum, and email communications. Grounded theory methods informed a process of concurrent data collection and analysis; each iteration of analysis informed subsequent data collection. Findings portray creativity as it was perceived and experienced by participants, presented in a Grounded Theory of Adolescent Creativity. The Grounded Theory of Adolescent Creativity comprises a core category, Perceiving and Pursuing Novelty: Not the Norm, which linked all findings in the study. This core category explains how creativity involved adolescents perceiving stimuli and experiences differently, approaching tasks or life unconventionally, and pursuing novel ideas to create outcomes that are not the norm when compared with outcomes by peers. Elaboration of the core category is provided by the major categories of findings. That is, adolescent creativity entailed utilising a network of Sub-Processes of Creativity, using strategies for Managing Constraints and Challenges, and drawing on different Approaches to Creativity – adaptation, transfer, synthesis, and genesis – to apply the sub-processes and produce creative outcomes. Potentially, there were Effects of Creativity on Creators and Audiences, depending on the adolescent and the task. Three Types of Creativity were identified as the manifestations of the creative process: creative personal expression, creative boundary pushing, and creative task achievement. Interactions among adolescents’ dispositions and environments were influential in their creativity. Patterns and variations of these interactions revealed a framework of four Contexts for Creativity that offered different levels of support for creativity: high creative disposition–supportive environment; high creative disposition–inhibiting environment; low creative disposition–supportive environment; and low creative disposition–inhibiting environment. These contexts represent dimensional ranges of how dispositions and environments supported or inhibited creativity, and reveal that the optimal context for creativity differed depending on the adolescent, task, domain, and environment. This study makes four main contributions, which have methodological and theoretical implications for researchers, as well as practical implications for adolescents, parents, teachers, policy and curriculum developers, and other interested stakeholders who aim to foster the creativity of adolescents. First, this study contributes methodologically through its constructivist-interpretivist grounded theory methodology combining the grounded theory approaches of Corbin and Strauss (2008) and Charmaz (2006). Innovative data collection was also demonstrated through integration of data from online and face-to-face interactions with adolescents, within the grounded theory design. These methodological contributions have broad applicability to researchers examining complex constructs and processes, and with populations who integrate multimedia as a natural form of communication. Second, applicable to creativity in diverse domains, the Grounded Theory of Adolescent Creativity supports a hybrid view of creativity as both domain-general and domain-specific. A third major contribution was identification of a new form of creativity, educational creativity (ed-c), which categorises creativity for learning or achievement within the constraints of formal educational contexts. These theoretical contributions inform further research about creativity in different domains or multidisciplinary areas, and with populations engaged in formal education. However, the key contribution of this research is that it presents an original Theory and Model of Adolescent Creativity to explain the complex, multifaceted phenomenon of adolescents’ creative experiences.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Left realists contend that people lacking legitimate means of solving the problem of relative deprivation may come into contact with other frustrated disenfranchised people and form subcultures, which in turn, encourage criminal behaviors. Absent from this theory is an attempt to address how, today, subcultural development in North America and elsewhere is heavily shaped simultaneously by the recent destructive consequences of right-wing Friedman or Chicago School economic policies and marginalized men's attempts to live up to the principles of hegemonic masculinity. The purpose of this paper, then, is to offer a new left realist theory that emphasizes the contribution of these two key determinants.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Organizations adopt a Supply Chain Management System (SCMS) expecting benefits to the organization and its functions. However, organizations are facing mounting challenges to realizing benefits through SCMS. Studies suggest a growing dissatisfaction among client organizations due to an increasing gap between expectations and realization of SCMS benefits. Further, reflecting the Enterprise System studies such as Seddon et al. (2010), SCMS benefits are also expected to flow to the organization throughout its lifecycle rather than being realized all at once. This research therefore proposes to derive a lifecycle-wide understanding of SCMS benefits and realization to derive a benefit expectation management framework to attain the full potential of an SCMS. The primary research question of this study is: How can client organizations better manage their benefit expectations of SCM systems? The specific research goals of the current study include: (1) to better understand the misalignment of received and expected benefits of SCM systems; (2) to identify the key factors influencing SCM system expectations and to develop a framework to manage SCMS benefits; (3) to explore how organizational satisfaction is influenced by the lack of SCMS benefit confirmation; and (4) to explore how to improve the realization of SCM system benefits. Expectation-Confirmation Theory (ECT) provides the theoretical underpinning for this study. ECT has been widely used in the consumer behavior literature to study customer satisfaction, post-purchase behavior and service marketing in general. Recently, ECT has been extended into Information Systems (IS) research focusing on individual user satisfaction and IS continuance. However, only a handful of studies have employed ECT to study organizational satisfaction on large-scale IS. The current study will enrich the research stream by extending ECT into organizational-level analysis and verifying the preliminary findings of relevant works by Staples et al. (2002), Nevo and Chan (2007) and Nevo and Wade (2007). Moreover, this study will go further trying to operationalize the constructs of ECT into the context of SCMS. The empirical findings of the study commence with a content analysis, through which 41 vendor reports and academic reports are analyzed yielding sixty expected benefits of SCMS. Then, the expected benefits are compared with the benefits realized at a case organization in the Fast Moving Consumer Goods industry sector that had implemented a SAP Supply Chain Management System seven years earlier. The study develops an SCMS Benefit Expectation Management (SCMS-BEM) Framework. The comparison of benefit expectations and confirmations highlights that, while certain benefits are realized earlier in the lifecycle, other benefits could take almost a decade to realize. Further analysis and discussion on how the developed SCMS-BEM Framework influences ECT when applied in SCMS was also conducted. It is recommended that when establishing their expectations of the SCMS, clients should remember that confirmation of these expectations will have a long lifecycle, as shown in the different time periods in the SCMS-BEM Framework. Moreover, the SCMS-BEM Framework will allow organizations to maintain high levels of satisfaction through careful mitigation and confirming expectations based on the lifecycle phase. In addition, the study reveals that different stakeholder groups have different expectations of the same SCMS. The perspective of multiple stakeholders has significant implications for the application of ECT in the SCMS context. When forming expectations of the SCMS, the collection of organizational benefits of SCMS should represent the perceptions of all stakeholder groups. The same mechanism should be employed in the measurements of received SCMS benefits. Moreover, for SCMS, there exists interdependence of the satisfaction among the various stakeholders. The satisfaction of decision-makers or the authorized staff is not only driven by their own expectation confirmation level, it is also influenced by the confirmation level of other stakeholders‘ expectations in the organization. Satisfaction from any one particular stakeholder group can not reflect the true satisfaction of the client organization. Furthermore, it is inferred from the SCMS-BEM Framework that organizations should place emphasis on the viewpoints of the operational and management staff when evaluating the benefits of SCMS in the short and middle term. At the same time, organizations should be placing more attention on the perspectives of strategic staff when evaluating the performance of the SCMS in the long term.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Book Abstract: Current experimentations with approaches to restorative justice for adult offenders represents a compelling new direction in the criminal justice system. This book examines the values and challenges of restorative justice for adult offenders, victims and communities. The discussion is situated within current debate, available research, and the international literature. In canvassing the structure, content, and delivery of key Australian and New Zealand restorative justice programs for adult offenders, the distinguished authors offer critical analysis of the emergence and impact of program developements for practitioners and professionals. This collection brings together stimulating and informed articles by experienced practitioners, leading academics and new researchers in the field. It also offers valuable insights into emerging restorative justice practice for adult offenders and provides a real alternative to the adversarial justice system.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

To enhance workplace safety in the construction industry it is important to understand interrelationships among safety risk factors associated with construction accidents. This study incorporates the systems theory into Heinrich’s domino theory to explore the interrelationships of risks and break the chain of accident causation. Through both empirical and statistical analyses of 9,358 accidents which occurred in the U.S. construction industry between 2002 and 2011, the study investigates relationships between accidents and injury elements (e.g., injury type, part of body, injury severity) and the nature of construction injuries by accident type. The study then discusses relationships between accidents and risks, including worker behavior, injury source, and environmental condition, and identifies key risk factors and risk combinations causing accidents. The research outcomes will assist safety managers to prioritize risks according to the likelihood of accident occurrence and injury characteristics, and pay more attention to balancing significant risk relationships to prevent accidents and achieve safer working environments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The goal of this article is to propose the model of green human resource initiatives adoption. Based on innovation management and psychology literatures, attitude, pressure and controllability are key drivers for organizational change. Data were collected from 210 organizations in Australia. Results indicated that attitude, pressure and controllability significantly influenced the firms’ adoption of green HR initiatives. Attitude and resource availability especially had greater impacts than pressure. Limitation, implications and future researches are also outlined.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Australian queer (GLBTIQ) university student activist media is an important site of self-representation. Community media is a significant site for the development of queer identity, community and a key part of queer politics. This paper reviews my research into queer student media, which is grounded in a queer theoretical perspective. Rob Cover argues that queer theoretical approaches that study media products fail to consider the material contexts that contribute to their construction. I use an ethnographic approach to examine how editors construct queer identity and community in queer student media. My research contributes to queer media scholarship by addressing the gap that Cover identifies, and to the rich scholarship on negotiations of queer community.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pairwise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighboring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent research has proposed Neo-Piagetian theory as a useful way of describing the cognitive development of novice programmers. Neo-Piagetian theory may also be a useful way to classify materials used in learning and assessment. If Neo-Piagetian coding of learning resources is to be useful then it is important that practitioners can learn it and apply it reliably. We describe the design of an interactive web-based tutorial for Neo-Piagetian categorization of assessment tasks. We also report an evaluation of the tutorial's effectiveness, in which twenty computer science educators participated. The average classification accuracy of the participants on each of the three Neo-Piagetian stages were 85%, 71% and 78%. Participants also rated their agreement with the expert classifications, and indicated high agreement (91%, 83% and 91% across the three Neo-Piagetian stages). Self-rated confidence in applying Neo-Piagetian theory to classifying programming questions before and after the tutorial were 29% and 75% respectively. Our key contribution is the demonstration of the feasibility of the Neo-Piagetian approach to classifying assessment materials, by demonstrating that it is learnable and can be applied reliably by a group of educators. Our tutorial is freely available as a community resource.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Key distribution is one of the most challenging security issues in wireless sensor networks where sensor nodes are randomly scattered over a hostile territory. In such a sensor deployment scenario, there will be no prior knowledge of post deployment configuration. For security solutions requiring pair wise keys, it is impossible to decide how to distribute key pairs to sensor nodes before the deployment. Existing approaches to this problem are to assign more than one key, namely a key-chain, to each node. Key-chains are randomly drawn from a key-pool. Either two neighbouring nodes have a key in common in their key-chains, or there is a path, called key-path, among these two nodes where each pair of neighbouring nodes on this path has a key in common. Problem in such a solution is to decide on the key-chain size and key-pool size so that every pair of nodes can establish a session key directly or through a path with high probability. The size of the key-path is the key factor for the efficiency of the design. This paper presents novel, deterministic and hybrid approaches based on Combinatorial Design for key distribution. In particular, several block design techniques are considered for generating the key-chains and the key-pools. Comparison to probabilistic schemes shows that our combinatorial approach produces better connectivity with smaller key-chain sizes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Boards of directors are key governancemechanisms in organizations and fulfill twomain tasks:monitoringmanagers and firm performance, and providing advice and access to resources. In spite of a wealth of researchmuch remains unknown about how boards attend to the two tasks. This study investigates whether organizational (firm profitability) and environmental factors (industry regulation) affect board task performance. The data combine CEOs' responses to a questionnaire, and archival data from a sample of large Italian firms. Findings show that past firm performance is negatively associatedwith board monitoring and advice tasks; greater industry regulation enhances perceived board task performance; board monitoring and advice tasks tend to reinforce each other, despite their theoretical and practical distinction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Reading plays an important role in establishing lifelong learning and providing the reader with an avenue to new experiences and a language with which to express their ideas and feelings (Owen 2003; Hamston & Love 2005). In particular adolescents need a language that allows them to 'play with their identities in a safe and controlled manner to explore who they want to be in this ever changing world' (Koss & Teale 2009, 569). Block (1995) advances that there is a distinct correlation between what we read and how we live in the world, and argues 'if what we read influences our identity in the world, the ways we are able to imagine and live in the world, then there is some responsibility to address these various texts, their readers and possible reading experiences' (Koss & Teale 2009, 569). Within my research I attempt to take on this responsibility by establishing a connection between reluctant adolescent male readers, and their reading experiences and by using their opinions to create a novella that seeks to more fully engage them. Centred within the larger debate about boys and books are two central discussions: why don't boys read and what should boys read? While a number of reasons why adolescent boys don't read are mentioned in this paper and it might not be possible to fully account for why many are reluctant readers, it is possible to argue that specific forms of literature addressing certain themes and topics relevant to the age group might appeal to reluctant readers. The conceptual framework for this research was structured using a mixed-method approach consisting of four phases. In positioning my research for determining literature that reluctant readers may want to read I draw on a variety of material which tends to support the longevity of S.E Hinton's (1967) argument that 'teenagers today, want to read about teenagers today' (cited in Smith & Wilhelm 2002, 6). My practice-based research was conducted within a high school in Brisbane, Australia. Six participants were selected and required to read three recently published Australian Young Adult novels, and opinion was collected via semi-structured interviews on these case studies. Grounded Theory (Charmaz 2003; Charmaz 2006; Glaser & Strauss 2011) informed the design of the questions, and the process of concurrent interviews and analysis of opinion. This analysis led to construction of my theory: adolescent male reluctant readers want to read about female relationships and family conflict within a story that consists of an adventure that, although unlikely to happen, could happen. From this study there are two main contributions, which have theoretical and practical implications for stakeholders with a vested interest in the discussion regarding boys and books. First, this study, through the research methodology, presents key findings that indicate that reluctant readers are interested in realistic texts addressing themes that will help with the construction of, and understanding of, their own lives. Secondly, the grounded theory derived from these findings is applied to my own praxis and my creative artefact (Duende) is included with this exegesis as a text intended to create a connection between engaging texts and adolescent male reluctant readers.