736 resultados para CONSTRUCT
Resumo:
Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.
Resumo:
The central thesis in the article is that the venture creation process is different for innovative versus imitative ventures. This holds up; the pace of the process differs by type of venture as do, in line with theory-based hypotheses, the effects of certain human capital (HC) and social capital (SC) predictors. Importantly, and somewhat unexpectedly, the theoretically derived models using HC, SC, and certain controls are relatively successful explaining progress in the creation process for the minority of innovative ventures, but achieve very limited success for the imitative majority. This may be due to a rationalistic bias in conventional theorizing and suggests that there is need for considerable theoretical development regarding the important phenomenon of new venture creation processes. Another important result is that the building up of instrumental social capital, which we assess comprehensively and as a time variant construct, is important for making progress with both types of ventures, and increasingly, so as the process progresses. This result corroborates with stronger operationalization and more appropriate analysis method what previously published research has only been able to hint at.
Resumo:
The epilogue pulls together the conceptual and methodological significance of the papers in the special issue exploring childhood and social interaction in everyday life in Sweden, Norway, United States and Australia. In considering the special issue, four domains of childhood are identified and discussed: childhood is a social construct where children learn how to enter into and participate in their social organizations, competency is best understood when communicative practices are examined in situ, children’s talk and interaction show situated culture in action, and childhood consists of shared social orders between children and adults. Emerging analytic interests are proposed, including investigating how children understand locations and place. Finally, the epilogue highlights the core focus of this special issue, which is showing children’s own methods for making sense of their everyday contexts using the interactional and cultural resources they have to hand.
Resumo:
The ideas for this CRC research project are based directly on Sidwell, Kennedy and Chan (2002). That research examined a number of case studies to identify the characteristics of successful projects. The findings were used to construct a matrix of best practice project delivery strategies. The purpose of this literature review is to test the decision matrix against established theory and best practice in the subject of construction project management.
Resumo:
The determination of the most appropriate procurement method for capital works projects is a challenging task for the Department of Housing and Works (DHW) and other Western Australian State Government Agencies because of the array of assessment criteria that are considered and the procurement methods that are available. A number of different procurement systems can be used to deliver capital works projects such a traditional, design and construct and management. Sub-classifications of these systems have proliferated and continue to emerge in response to market demands. The selection of an inappropriate procurement method may lead to undesirable project outcomes. To facilitate DHW in selecting an appropriate procurement method for its capital works projects, a six step procurement method selection process is presented. The characteristics of the most common forms of procurement method used in Australia are presented. Case studies where procurement methods have been used for specific types of capital works in Western Australia are offered to provide a reference point and learning opportunity for procurement method selection.
Resumo:
A plethora of methods for procuring building projects are available to meet the needs of clients. Deciding what method to use for a given project is a difficult and challenging task as a client’s objectives and priorities need to marry with the selected method so as to improve the likelihood of the project being procured successfully. The decision as to what procurement system to use should be made as early as possible and underpinned by the client’s business case for the project. The risks and how they can potentially affect the client’s business should also be considered. In this report, the need for client’s to develop a procurement strategy, which outlines the key means by which the objectives of the project are to be achieved is emphasised. Once a client has established a business case for a project, appointed a principal advisor, determined their requirements and brief, then consideration as to which procurement method to be adopted should be made. An understanding of the characteristics of various procurement options is required before a recommendation can be made to a client. Procurement systems can be categorised as traditional, design and construct, management and collaborative. The characteristics of these systems along with the procurement methods commonly used are described. The main advantages and disadvantages, and circumstances under which a system could be considered applicable for a given project are also identified.
Resumo:
The Study Process Questionnaire (Biggs, 1987) has been widely used in studies investigating learning behaviours in tertiary education. Many of the studies that have used the instrument have investigated the construct validity of the SPQ using a variety of factor analytic methods and techniques in an atheoretical way. Contrary to this method, Burnett and Dart (1997) argued that the hypothesised structure of a scale should be used when assessing the construct validity of an existing instrument. This study investigated the factor structure of the SPQ using a theoretical approach and found strong support for the three approaches to learning structure of the instrument.
Resumo:
Brisbane Water (BW), a commercialised business arm of Brisbane City Council (BCC) entered into an alliance with a number of organisations from the private sector in order to design, construct, commission and undertake upgrades to three existing wastewater treatment plants located at Sandgate, Oxley Creek, and Wacol in Brisbane. The alliance project is called the Brisbane Water Environmental Alliance (BWEA). This report details the efforts of a team of researchers from the School of Management at Queensland University of Technology to investigate this alliance. This is the second report on this project, and is called Stage 2 of the research. At the time that Stage 2 of the research project was conducted, the BWEA project was nearing completion with a further 8 months remaining before project completion. The aim of this report is to explore individuals’ perceptions of the effectiveness and functioning of the BWEA project in the latter stages of the project. The second aim of this report is to analyse the longitudinal findings of this research project by integrating the findings from Stage 1 and Stage 2 of the project. This long-term analysis of the functioning and effectiveness of the alliance is important because at the current time, researchers have little knowledge of the group developmental processes that occur in large-scale alliances over time. Stage 2 of this research project has a number of aims including assessing performance of the BWEA project from the point of view of a range of stakeholders including the alliance board and alliance management team, alliance staff, and key stakeholders from the client organisation (Brisbane Water). Data were collected using semi-structured interviews with 18 individuals including two board members, one external facilitator, and four staff members from the client organisation. Analysis involved coding the interview transcripts in terms of the major issues that were reported by interviewees.
Resumo:
Mock circulation loops are used to evaluate the performance of cardiac assist devices prior to animal and clinical testing. A compressible, translucent silicone ventricle chamber that mimics the exact size, shape and motion of a failing heart is desired to assist in flow visualization studies around inflow cannulae during VAD support. The aim of this study was therefore to design and construct a naturally shaped flexible left ventricle and evaluate its performance in a mock circulation loop. The ventricle shape was constructed by the use of CT images taken from a patient experiencing cardiomyopathic heart failure and used to create a 3D image and subsequent mould to produce a silicone ventricle. Different cardiac conditions were successfully simulated to validate the ventricle performance, including rest, left heart failure and VAD support.
Resumo:
Engineering assets such as roads, rail, bridges and other forms of public works are vital to the effective functioning of societies {Herder, 2006 #128}. Proficient provision of this physical infrastructure is therefore one of the key activities of government {Lædre, 2006 #123}. In order to ensure engineering assets are procured and maintained on behalf of citizens, government needs to devise the appropriate policy and institutional architecture for this purpose. The changing institutional arrangements around the procurement of engineering assets are the focus of this paper. The paper describes and analyses the transition to new, more collaborative forms of procurement arrangements which are becoming increasingly prevalent in Australia and other OECD countries. Such fundamental shifts from competitive to more collaborative approaches to project governance can be viewed as a major transition in procurement system arrangements. In many ways such changes mirror the shift from New Public Management, with its emphasis on the use of market mechanisms to achieve efficiencies {Hood, 1991 #166}, towards more collaborative approaches to service delivery, such as those under network governance arrangements {Keast, 2007 #925}. However, just as traditional forms of procurement in a market context resulted in unexpected outcomes for industry, such as a fragmented industry afflicted by chronic litigation {Dubois, 2002 #9}, the change to more collaborative forms of procurement is unlikely to be a panacea to the problems of procurement, and may well also have unintended consequences. This paper argues that perspectives from complex adaptive systems (CAS) theory can contribute to the theory and practice of managing system transitions. In particular the concept of emergence provides a key theoretical construct to understand the aggregate effect that individual project governance arrangements can have upon the structure of specific industries, which in turn impact individual projects. Emergence is understood here as the macro structure that emerges out of the interaction of agents in the system {Holland, 1998 #100; Tang, 2006 #51}.
Resumo:
This project is an extension of a previous CRC project (220-059-B) which developed a program for life prediction of gutters in Queensland schools. A number of sources of information on service life of metallic building components were formed into databases linked to a Case-Based Reasoning Engine which extracted relevant cases from each source. In the initial software, no attempt was made to choose between the results offered or construct a case for retention in the casebase. In this phase of the project, alternative data mining techniques will be explored and evaluated. A process for selecting a unique service life prediction for each query will also be investigated. This report summarises the initial evaluation of several data mining techniques.
Resumo:
This paper focuses on participatory research and how it can be understood and employed when researching children and youth. The aim of this paper is to provide a theoretically and empirically grounded discussion of participatory research methodologies with respect to investigating the dynamic and evolving phenomenon of young people growing up in networked societies. Initially, we review the nature of participatory research and how other researchers have endeavoured to involve young people (children and youth) in their research projects. Our review of these approaches aims to elucidate what we see as recurring and emerging issues with respect to the methodological design of involving young people as co-researchers. In the light of these issues and in keeping with our aim, we offer a case study of our own research project that seeks to understand the ways in which high school students use new media and network ICT systems (Internet, mobile phone applications, social networking sites) to construct identities, form social relations, and engage in creative practices as part of their everyday lives. The article concludes by offering an assessment of our tripartite model of participatory research that may benefit other researchers who share a similar interest in youth and new media.
Resumo:
This paper reads a range of nineteenth-century texts for children that retell either Shakespeare's The Tempest or mermaid narratives, considering the models of feminine subjectivity and sexuality that they construct. It then moves on to two key contemporary texts — Disney's film adaptation of The Little Mermaid (Clements and Musker 1989) and Penni Russon's Undine (2004) — that combine the Shakespearean heroine with the mermaid, and reads them against the nineteenth-century models. Ultimately, the essay determines that, while these texts seem to perform a progressive appropriation of the two traditions, they actually combine the most conservative aspects of both The Tempest and mermaid stories to produce authoritative (and dangerously persuasive) ideals of passive feminine sexuality that confine girls within patriarchally-dictated familial positions. The new figure for adolescent female subjectivity, the mermaid-Miranda, becomes in turn a model of identification and aspiration for the implied juvenile consumer.
Resumo:
LEX is a stream cipher that progressed to Phase 3 of the eSTREAM stream cipher project. In this paper, we show that the security of LEX against algebraic attacks relies on a small equation system not being solvable faster than exhaustive search. We use the byte leakage in LEX to construct a system of 21 equa- tions in 17 variables. This is very close to the require- ment for an efficient attack, i.e. a system containing 16 variables. The system requires only 36 bytes of keystream, which is very low.
Resumo:
Introduction: Bone mineral density (BMD) is currently the preferred surrogate for bone strength in clinical practice. Finite element analysis (FEA) is a computer simulation technique that can predict the deformation of a structure when a load is applied, providing a measure of stiffness (Nmm−1). Finite element analysis of X-ray images (3D-FEXI) is a FEA technique whose analysis is derived froma single 2D radiographic image. Methods: 18 excised human femora had previously been quantitative computed tomography scanned, from which 2D BMD-equivalent radiographic images were derived, and mechanically tested to failure in a stance-loading configuration. A 3D proximal femur shape was generated from each 2D radiographic image and used to construct 3D-FEA models. Results: The coefficient of determination (R2%) to predict failure load was 54.5% for BMD and 80.4% for 3D-FEXI. Conclusions: This ex vivo study demonstrates that 3D-FEXI derived from a conventional 2D radiographic image has the potential to significantly increase the accuracy of failure load assessment of the proximal femur compared with that currently achieved with BMD. This approach may be readily extended to routine clinical BMD images derived by dual energy X-ray absorptiometry. Crown Copyright © 2009 Published by Elsevier Ltd on behalf of IPEM. All rights reserved