323 resultados para Client
Resumo:
Objective Contemporary research demonstrates the feasibility of assessing therapeutic performance of trainee-therapists through the use of objective measures of client treatment outcome. Further, significant variation between individual therapists based on their client treatment outcomes has been demonstrated. This study sets out to determine whether a reliable composite measure of therapeutic efficiency, effectiveness and early dropout can be developed and used to objectively compare trainee-therapists against each other. Design and methods Treatment outcomes of 611 clients receiving treatment from 58 trainee-therapists enrolled in a professional training programme were tracked with the OQ-45.2 over a 6-year period to assess therapeutic efficiency, therapeutic effectiveness and early client dropout. Results Significant variation between trainee-therapists was observed for each index. Findings of a moderately strong correlation between therapeutic efficiency and effectiveness enabled the ranking of trainee-therapists based upon a composite measure of these indexes. A non-significant correlation was found between early client dropout and measures of therapeutic effectiveness and efficiency. Conclusions The findings stress the importance of utilizing objective measures to track the treatment outcomes. Despite all trainee-therapists being enrolled in the same training programme, significant variation between trainee-therapists' therapeutic efficiency and effectiveness was found to exist. Practitioner points Developing of potential benchmarking tools that enable trainee-therapists, supervisors and educational institutions to quickly assess therapeutic performance can become part of a holistic assessment of a trainee-therapist's clinical development. Despite an inherent optimistic belief that therapists do not cause harm, there appears to be a small and significant proportion of trainee-therapists who consistently evidence little therapeutic change. Considerable variability in trainee-therapists' therapeutic efficiency and effectiveness can exist in the one training programme. Early client dropout may not be associated with therapists' therapeutic effectiveness and efficiency.
Resumo:
This paper outlines an approach for teaching Marketing Principles in an MBA course through service-learning to enable adult learners to connect the lectures’ marketing content to a real-world marketing project. During the course, 40 students in groups of four to five individuals were involved in eight different client-sponsored marketing projects executed simultaneously. The rationale, planning and management of this approach utilised current research on service-learning, living cases and client-sponsored projects in marketing education. The experimental curriculum design is presented in a timeline that mirrors the preparation and management of the group projects and the considerations to be taken into account when initiating and facilitating the projects. Reflections from this iteration of the service-learning design suggest the importance of: detailed project planning, the involvement of students in choosing the projects, the introduction of forms and feedback loops, the role of the instructor in facilitating the students and managing expectations, and the role of the company representative in supporting the groups.
Resumo:
Australia is a leading user of collaborative procurement methods, which are used to deliver large and complex infrastructure projects. Project alliances, Early Contractor Involvement (ECI), and partnering are typical examples of collaborative procurement models. In order to increase procurement effectiveness and value for money (VfM), clients have adopted various learning strategies for new contract development. However client learning strategies and behaviours have not been systematically analysed before. Therefore, the current paper undertakes a literature review addressing the research question “How can client learning capabilities be effectively understood?”. From the resource-based and dynamic capability perspectives, this paper proposes that the collaborative learning capability (CLC) of clients drives procurement model evolution. Learning routines underpinning CLC carry out exploratory, transformative and exploitative learning phases associated with collaborative project delivery. This learning improves operating routines, and ultimately performance. The conceptualization of CLC and the three sequential learning phases is used to analyse the evidence in the construction management literature. The main contribution of this study is the presentation of a theoretical foundation for future empirical studies to unveil effective learning strategies, which help clients to improve the performance of collaborative projects in the dynamic infrastructure market.
Resumo:
The shooting of a social worker by a client on the Gold Coast in 1991 graphically illustrated the issue of physical assaults and violence by service users against social workers. In this article we look at the incidence of physical assault, threats of violence, abuse of agency property and verbal abuse to social and other welfare workers by clients, using data from a survey in Melbourne. We then look at probable causes of menacing behaviour, such as issues involved in work with involuntary clients' and we discuss options for preventing and coping with violence and abuse in the welfare work place.
Resumo:
Between the 1970s and the 1990s the level and type of emotionality in the Commonwealth Employment Service (the Australian national employment service) altered. Within a context of changing economic conditions and concomitant work intensification, it is argued that untenable working conditions resulted in new recruits adopting a coping strategy that led to the use rather than the suppression of emotions. The use of emotions provided workers with job satisfaction and greater control over service interactions. Management subsequently commandeered the use of emotions to complement the introduction of private sector management techniques and service delivery reforms, regaining control over worker-client interactions.
Resumo:
We present the first detailed application of Meadows’s cost-based modelling framework to the analysis of JFK, an Internet key agreement protocol. The analysis identifies two denial of service attacks against the protocol that are possible when an attacker is willing to reveal the source IP address. The first attack was identified through direct application of a cost-based modelling framework, while the second was only identified after considering coordinated attackers. Finally, we demonstrate how the inclusion of client puzzles in the protocol can improve denial of service resistance against both identified attacks.
Resumo:
"Globalisation‟ and the "global knowledge economy‟ have become some of the most common "buzzwords‟ in Australian business, economic, and social sectors in the past decade. Further, knowledge service exports are a growing sector for Australia that utilise complex technical and creative capacities, increasingly rely on virtual work innovations, require new socio-technical systems to establish and maintain effective client relationships in global contexts; and – along with other innovations in the electronic age – may require novel coping abilities on the part of both managers and their employees to achieve desired outcomes (Bandura, 2002). Accordingly, this paper overviews such trends. The paper also includes a research agenda which is a "work-in-progress‟ with a major global company, Shell (Australia); it highlights both the objectives and proposed methodology of the study; it also outlines anticipated key benefits arising from the research.
Resumo:
Collaboration is acknowledged as a key to continued growth in the Australian construction industry. Government, as a major industry client, has an important role to play with respect to fostering collaboration and ensuring the global competitiveness of the industry. The paper draws upon data collected for the Construction 2020 study and aims to demonstrate that government can a) help to break down the adversarial situation that currently exists between clients, project managers and subcontractors; and b) allow the supply chain to collaborate more effectively in terms of satisfying the relational and financial needs of all parties. Government can also provide a clear set of guidelines (backed up by a functional dispute resolution system) that will promote confidence with respect to forging relationships. Thus, the paper will discuss the way in which public policy can be more closely aligned with actual industry needs in order to promote greater collaboration.
Resumo:
This paper reports on a study of ERP lifecycle major issues from the perspectives of individuals with substantial and diverse involvement with SAP Financials in Queensland Government. A survey was conducted of 117 ERP system project participants in five closely related state government agencies. A modified Delphi technique identified, rationalized and weighed perceived major issues in ongoing ERP life cycle implementation, management and support. The five agencies each implemented SAP Financials simultaneously using a common implementation partner. The three survey rounds of the Delphi technique, together with coding and synthesizing procedures, resulted in a set of 10 major issue categories with 38 sub-issues. Relative scores of issue importance are compared across government agencies, roles (client vs implementation partner) and organizational levels (strategic, technical and operational). Study findings confirm the importance of this finer partitioning of the data, and distinctions identified reflect the circumstances of ERP lifecycle implementation, management and support among the stakeholder groups. The study findings should also be of interest to stakeholders who seek to better understand the issues surrounding ERP systems and to better realise the benefits of ERP.
Resumo:
The design of a building is a complicated process, having to formulate diverse components through unique tasks involving different personalities and organisations in order to satisfy multi-faceted client requirements. To do this successfully, the project team must encapsulate an integrated design that accommodates various social, economic and legislative factors. Therefore, in this era of increasing global competition integrated design has been increasingly recognised as a solution to deliver value to clients.----- The ‘From 3D to nD modelling’ project at the University of Salford aims to support integrated design; to enable and equip the design and construction industry with a tool that allows users to create, share, contemplate and apply knowledge from multiple perspectives of user requirements (accessibility, maintainability, sustainability, acoustics, crime, energy simulation, scheduling, costing etc.). Thus taking the concept of 3-dimensional computer modelling of the built environment to an almost infinite number of dimensions, to cope with whole-life construction and asset management issues in the design of modern buildings. This paper reports on the development of a vision for how integrated environments that will allow nD-enabled construction and asset management to be undertaken. The project is funded by a four-year platform grant from the Engineering and Physical Sciences Research Council (EPSRC) in the UK; thus awarded to a multi-disciplinary research team, to enable flexibility in the research strategy and to produce leading innovation. This paper reports on the development of a business process and IT vision for how integrated environments will allow nD-enabled construction and asset management to be undertaken. It further develops many of the key issues of a future vision arising from previous CIB W78 conferences.
Resumo:
Ordinary desktop computers continue to obtain ever more resources – in-creased processing power, memory, network speed and bandwidth – yet these resources spend much of their time underutilised. Cycle stealing frameworks harness these resources so they can be used for high-performance computing. Traditionally cycle stealing systems have used client-server based architectures which place significant limits on their ability to scale and the range of applica-tions they can support. By applying a fully decentralised network model to cycle stealing the limits of centralised models can be overcome. Using decentralised networks in this manner presents some difficulties which have not been encountered in their previous uses. Generally decentralised ap-plications do not require any significant fault tolerance guarantees. High-performance computing on the other hand requires very stringent guarantees to ensure correct results are obtained. Unfortunately mechanisms developed for traditional high-performance computing cannot be simply translated because of their reliance on a reliable storage mechanism. In the highly dynamic world of P2P computing this reliable storage is not available. As part of this research a fault tolerance system has been created which provides considerable reliability without the need for a persistent storage. As well as increased scalability, fully decentralised networks offer the ability for volunteers to communicate directly. This ability provides the possibility of supporting applications whose tasks require direct, message passing style communication. Previous cycle stealing systems have only supported embarrassingly parallel applications and applications with limited forms of communication so a new programming model has been developed which can support this style of communication within a cycle stealing context. In this thesis I present a fully decentralised cycle stealing framework. The framework addresses the problems of providing a reliable fault tolerance sys-tem and supporting direct communication between parallel tasks. The thesis includes a programming model for developing cycle stealing applications with direct inter-process communication and methods for optimising object locality on decentralised networks.
Resumo:
This study investigates variation in IT professionals' experience of ethics with a view to enhancing their formation and support. This is explored through an examination of the experience of IT, IT professional ethics and IT professional ethics education. The study's principal contribution is the empirical study and description of IT professionals' experience of ethics. The empirical phase is preceded by a review of conceptions of IT and followed by an application of the findings to IT education. The study's empirical findings are based on 30 semi-structured interviews with IT professionals who represent a wide demographic, experience and IT sub-discipline range. Their experience of ethics is depicted as five citizenships: Citizenship of my world, Citizenship of the corporate world, Citizenship of a shared world, Citizenship of the client's world and Citizenship of the wider world. These signify an expanding awareness, which progressively accords rights to others and defines responsibility in terms of others. The empirical findings inform a Model of Ethical IT. This maps an IT professional space increasingly oriented towards others. Such a model provides a conceptual tool, available to prompt discussion and reflection, and which may be employed in pursuing formation aimed at experiential change. Its usefulness for the education of IT professionals with respect to ethics is explored. The research approach employed in this study is phenomenography. This method seeks to elicit and represent variation of experience. It understands experience as a relationship between a subject (IT professionals) and an object (ethics), and describes this relationship in terms of its foci and boundaries. The study's findings culminate in three observations, that change is indicated in the formation and support of IT professionals in: 1. IT professionals' experience of their discipline, moving towards a focus on information users; 2. IT professionals' experience of professional ethics, moving towards the adoption of other-centred attitudes; and 3. IT professionals' experience of professional development, moving towards an emphasis on a change in lived experience. Based on these results, employers, educators and professional bodies may want to evaluate how they approach professional formation and support, if they aim to promote a comprehensive awareness of ethics in IT professionals.
Resumo:
Driving under the influence (DUI) is a major road safety problem. Historically, alcohol has been assumed to play a larger role in crashes and DUI education programs have reflected this assumption, although recent evidence suggests that younger drivers are becoming more likely to drive drugged than to drive drunk. This is a study of 7096 Texas clients under age 21 who were admitted to state-funded treatment programs between 1997 and 2007 with a past-year DUI arrest, DUI probation, or DUI referral. Data were obtained from the State’s administrative dataset. Multivariate logistic regressions models were used to understand the differences between those minors entering treatment as a DUI as compared to a non-DUI as well as the risks for completing treatment and for being abstinent in the month prior to follow-up. A major finding was that over time, the primary problem for underage DUI drivers changed from alcohol to marijuana. Being abstinent in the month prior to discharge, having a primary problem with alcohol rather than another drug, and having more family involved were the strongest predictors of treatment completion. Living in a household where the client was exposed to alcohol abuse or drug use, having been in residential treatment, and having more drug and alcohol and family problems were the strongest predictors of not being abstinent at follow-up. As a result, there is a need to direct more attention towards meeting the needs of the young DUI population through programs that address drug as well as alcohol consumption problems.
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.