152 resultados para Final do Antigo Regime
Resumo:
Early detection surveillance programs aim to find invasions of exotic plant pests and diseases before they are too widespread to eradicate. However, the value of these programs can be difficult to justify when no positive detections are made. To demonstrate the value of pest absence information provided by these programs, we use a hierarchical Bayesian framework to model estimates of incursion extent with and without surveillance. A model for the latent invasion process provides the baseline against which surveillance data are assessed. Ecological knowledge and pest management criteria are introduced into the model using informative priors for invasion parameters. Observation models assimilate information from spatio-temporal presence/absence data to accommodate imperfect detection and generate posterior estimates of pest extent. When applied to an early detection program operating in Queensland, Australia, the framework demonstrates that this typical surveillance regime provides a modest reduction in the estimate that a surveyed district is infested. More importantly, the model suggests that early detection surveillance programs can provide a dramatic reduction in the putative area of incursion and therefore offer a substantial benefit to incursion management. By mapping spatial estimates of the point probability of infestation, the model identifies where future surveillance resources can be most effectively deployed.
Resumo:
This report provides an account of the first large-scale scoping study of work integrated learning (WIL) in contemporary Australian higher education. The explicit aim of the project was to identify issues and map a broad and growing picture of WIL across Australia and to identify ways of improving the student learning experience in relation to WIL. The project was undertaken in response to high levels of interest in WIL, which is seen by universities both as a valid pedagogy and as a means to respond to demands by employers for work-ready graduates, and demands by students for employable knowledge and skills. Over a period of eight months of rapid data collection, 35 universities and almost 600 participants contributed to the project. Participants consistently reported the positive benefits of WIL and provided evidence of commitment and innovative practice in relation to enhancing student learning experiences. Participants provided evidence of strong partnerships between stakeholders and highlighted the importance of these relationships in facilitating effective learning outcomes for students. They also identified a range of issues and challenges that face the sector in growing WIL opportunities; these issues and challenges will shape the quality of WIL experiences. While the majority of comments focused on issues involved in ensuring quality placements, it was recognised that placements are just one way to ensure the integration of work with learning. Also, the WIL experience is highly contextualised and impacted by the expectations of students, employers, the professions, the university and government policy.
Resumo:
Investigating Literacy Years 4-9: A pilot acknowledges that the literacy required of students in the middle years of schooling changes as they begin to read and write to learn across the subject areas using various resources and media. Teachers begin to look for evidence of understanding of concepts, content details, appropriate genre uses and the capacity to work with extended and complex texts. Yet, in comparison to the early years, there has been relatively little research conducted during this period of schooling, especially Years 4-7 of primary schooling (Comber et al, 2002). However, evidence suggests that gaps between those who perform highly and those who perform poorly on standardised measures of literacy increase rather than decrease, and these gaps relate to social background. Hence there is a need to investigate how different school communities with diverse student populations design rich curriculum at these stages of schooling and explicitly teach young people to handle new and changing literacy demands.
Resumo:
In late 2009, Health Libraries Australia (HLA) received a small grant to undertake a national research project to determine the future requirements for health librarians in the workforce in Australia and develop a structured, modular education framework (post-graduate qualification and continuing professional development structure) to meet these requirements. The main objective was to consider the education and professional development framework that would ensure that health librarians have a clearly defined scope of practice and the specific competency based knowledge and skills that enable them to contribute to the design and delivery of high quality health services in this country. The final report presents a detailed discussion of the changing Australian healthcare environment and the resulting impact on the health library sector, as well as an overview of international trends in health libraries and the implications for Australian health librarianship education. The research methodology is outlined, followed by an analysis of the findings from the two surveys with health librarians and health library managers and the semi-structured interviews conducted with employers. The Medical Library Association (MLA) in the United States had developed a policy document detailing the competencies required by health librarians. It was found that the MLA competencies represented an accepted professional framework of skills which could be used objectively in the survey instrument to measure the areas of professional knowledge and responsibilities that were relevant in the current workplace, and to identify how these requirements might change in the next three to five years. The research results underscore the imperative for health librarians to engage in regular, relevant professional development activities that will enable them to stay abreast with the rapid contextual changes impacting on their practice. In order to be accepted as key members of the multi-disciplinary health professional team, it is strongly believed that health librarians should commit to establishing the mechanisms for specialist certification maintained through compulsory CPD in an ongoing three-year cycle of revalidation. This development would align ALIA and health librarians with other health sector professional associations which are responsible for the self regulation of entry to and continuation in their profession.
Resumo:
The primary goal of the Vehicular Ad Hoc Network (VANET) is to provide real-time safety-related messages to motorists to enhance road safety. Accessing and disseminating safety-related information through the use of wireless communications technology in VANETs should be secured, as motorists may make critical decisions in dealing with an emergency situation based on the received information. If security concerns are not addressed in developing VANET systems, an adversary can tamper with, or suppress, the unprotected message to mislead motorists to cause traffic accidents and hazards. Current research on secure messaging in VANETs focuses on employing the certificate-based Public Key Infrastructure (PKI) scheme to support message encryption and digital signing. The security overhead of such a scheme, however, creates a transmission delay and introduces a time-consuming verification process to VANET communications. This thesis has proposed a novel public key verification and management approach for VANETs; namely, the Public Key Registry (PKR) regime. Compared to the VANET PKI scheme, this new approach can satisfy necessary security requirements with improved performance and scalability, and at a lower cost by reducing the security overheads of message transmission and eliminating digital certificate deployment and maintenance issues. The proposed PKR regime consists of the required infrastructure components, rules for public key management and verification, and a set of interactions and associated behaviours to meet these rule requirements. This is achieved through a system design as a logic process model with functional specifications. The PKR regime can be used as development guidelines for conforming implementations. An analysis and evaluation of the proposed PKR regime includes security features assessment, analysis of the security overhead of message transmission, transmission latency, processing latency, and scalability of the proposed PKR regime. Compared to certificate-based PKI approaches, the proposed PKR regime can maintain the necessary security requirements, significantly reduce the security overhead by approximately 70%, and improve the performance by 98%. Meanwhile, the result of the scalability evaluation shows that the latency of employing the proposed PKR regime stays much lower at approximately 15 milliseconds, whether operating in a huge or small environment. It is therefore believed that this research will create a new dimension to the provision of secure messaging services in VANETs.
Resumo:
How can Australian library and information science (LIS) education produce, in a sustainable manner, the diverse supply of graduates with the appropriate attributes to develop and maintain high quality professional practice in the rapidly changing 21st century? This report presents the key findings of a project that has examined this question through research into future directions for LIS education in Australia. Titled Re-conceptualising and re-positioning Australian library and information science education for the twenty-first century, the purpose of the project was to establish a consolidated and holistic picture of the Australian LIS profession, and identify how its future education and training can be mediated in a cohesive and sustainable manner. The project was undertaken with a team of 12 university and vocational LIS educators from 11 institutions around Australia between November 2009 and December 2010. Collectively, these eleven institutions represented the broad spectrum and diversity of LIS education in Australia, and enabled the project to examine education for the information profession in a holistic and synergistic manner. Participating institutions in the project included Queensland University of Technology (Project Leader), Charles Sturt University, Curtin University of Technology, Edith Cowan University, Monash University, RMIT University, University of Canberra, University of South Australia, University of Tasmania, University of Technology Sydney and Victoria University. The inception and need for the project was motivated by a range of factors. From a broad perspective several of these factors relate to concerns raised at national and international levels regarding problems with education for LIS. In addition, the motivation and need for the project also related to some unique challenges that LIS education faces in the Australian tertiary education landscape. Over recent years a range of responses to explore the various issues confronting LIS education in Australia have emerged at local and national levels however this project represented the first significant investment of funding for national research in this area. In this way, the inception of the project offered a unique opportunity and powerful mechanism through which to bring together key stakeholders and inspire discourse concerning future education for the profession. Therefore as the first national project of its kind, its intent has been to provide foundation research that will inform and guide future directions for LIS education and training in Australia. The primary objective of the project was to develop a Framework for the Education of the Information Professions in Australia. The purpose of this framework was to provide evidence based strategic recommendations that would guide Australia’s future education for the information professions. Recognising the three major and equal players in the education process the project was framed around three areas of consideration: LIS students, the LIS workforce and LIS educators. Each area of consideration aligned to a research substudy in the project. The three research substudies were titled Student Considerations, Workforce Planning Considerations and Tertiary Education Considerations. The Students substudy provided a profile of LIS students and an analysis of their choices, experiences and expectations in regard to LIS education and their graduate destinations. The Workforce substudy provided an overview and analysis of the nature of the current LIS workforce, including a focus on employer expectations and employment opportunities and comment on the core and elective skill, knowledge and attitudes of current and future LIS professionals. Finally the Tertiary Education substudy provided a profile of LIS educators and an analysis of their characteristics and experiences including the key issues and challenges. In addition it also explored current national and international trends and priorities impacting on LIS education. The project utilised a Community Based Participatory Research (CBPR) approach. This approach involves all members of the community in all aspects of the project. It recognised the unique strengths and perspectives that community members bring to the process. For this project ‘community’ comprised of all individuals who have a role in, or a vested interest in, LIS education and included LIS educators, professionals, employers, students and professional associations. Individuals from these sub-groups were invited to participate in a range of aspects of the project from design through to implementation and evaluation. A range of research methodologies were used to consider the many different perspectives of LIS education, including employers and recruiters, professional associations, students, graduates and LIS teaching staff. Data collection involved a mixed method approach of questionnaires, focus groups, semi-structured interviews and environmental scans. An array of approaches was selected to ensure that broadest possible access to different facets of the information profession would be achieved. The main findings and observations from each substudy have highlighted a range of challenges for LIS education that need to be addressed. These findings and observations have grounded the development of the Framework for the Education of the Information Professions in Australia. The framework presents eleven recommendations to progress the national approach to LIS education and guide Australia’s future education for the information professions. The framework will be used by the LIS profession, most notably its educators, as strategic directions for the future of LIS education in Australia. Framework for the Education of the Information Professions in Australia: Recommendation 1: It is recommended that a broader and more inclusive vocabulary be adopted that both recognises and celebrates the expanding landscape of the field, for example ‘information profession’, ‘information sector’, ‘information discipline’ and ‘information education’. Recommendation 2: It is recommended that a self-directed body composed of information educators be established to promote, support and lead excellence in teaching and research within the information discipline. Recommendation 3: It is recommended that Australia’s information discipline continue to develop excellence in information research that will raise the discipline’s profile and contribute to its prominence within the national and international arena. Recommendation 4: It is recommended that further research examining the nature and context of Australia’s information education programs be undertaken to ensure a sustainable and relevant future for the discipline. Recommendation 5: It is recommended that further research examining the pathways and qualifications available for entry into the Australian information sector be undertaken to ensure relevance, attractiveness, accessibility and transparency. Recommendation 6: It is recommended that strategies are developed and implemented to ensure the sustainability of the workforce of information educators. Recommendation 7: It is recommended that a national approach to promoting and marketing the information profession and thereby attracting more students to the field is developed. Recommendation 8: It is recommended that Australia’s information discipline continues to support a culture of quality teaching and learning, especially given the need to accommodate a focus on the broader information landscape and more flexible delivery options. Recommendation 9: It is recommended that strategies are developed that will support and encourage collaboration between information education within the higher education and VET sectors. Recommendation 10: It is recommended that strategies and forums are developed that will support the information sector working together to conceptualise and articulate their professional identity and educational needs. Recommendation 11: It is recommended that a research agenda be established that will identify and prioritise areas in which further development or work is needed to continue advancing information education in Australia. The key findings from this project confirm that a number of pressing issues are confronting LIS education in Australia. Left unaddressed these issues will have significant implications for the future of LIS education as well as the broader LIS profession. Consequently creating a sustainable and cohesive future can only be realised through cooperation and collaboration among all stakeholders including those with the capacity to enact radical change in university and vocational institutions. Indeed the impending adoption and implementation of the project’s recommendations will fundamentally determine whether Australian LIS education is assured both for the present day and into the future.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
Flow regime transition criteria are of practical importance for two-phase flow analyses at reduced gravity conditions. Here, flow regime transition criteria which take the friction pressure loss effect into account were studied in detail. Criteria at reduced gravity conditions were developed by extending an existing model with various experimental datasets taken at microgravity conditions showed satisfactory agreement. Sample computations of the model were performed at various gravity conditions, such as 0.196, 1.62, 3.71, and 9.81 m/s2 corresponding to micro-gravity and lunar, Martian and Earth surface gravity, respectively. It was found that the effect of gravity on bubbly-slug and slug-annular (churn) transitions in a two-phase flow system was more pronounced at low liquid flow conditions, whereas the gravity effect could be ignored at high mixture volumetric flux conditions. While for the annular flow transitions due to flow reversal and onset of dropset entrainment, higher superficial gas velocity was obtained at higher gravity level.
Resumo:
This chapter will first consider the rationale for a transition pedagogy for first and final year law students. It then discusses the elements of a transition pedagogy for both years, noting the synergies and differences between programs designed to assist transition into and out of a law degree. In doing so, the authors attempt to explore the extent to which the first year curriculum principles identified by Sally Kift under an Australian Learning and Teaching Council (ALTC) Senior Fellowship may also be applied to the final year university experience. During the course of the discussion, examples are drawn from universities and Law Schools in Australia and internationally which seek to address these imperatives...
Resumo:
Within Australia, motor vehicle injury is the leading cause of hospital admissions and fatalities. Road crash data reveals that among the factors contributing to crashes in Queensland, speed and alcohol continue to be overrepresented. While alcohol is the number one contributing factor to fatal crashes, speeding also contributes to a high proportion of crashes. Research indicates that risky driving is an important contributor to road crashes. However, it has been debated whether all risky driving behaviours are similar enough to be explained by the same combination of factors. Further, road safety authorities have traditionally relied upon deterrence based countermeasures to reduce the incidence of illegal driving behaviours such as speeding and drink driving. However, more recent research has focussed on social factors to explain illegal driving behaviours. The purpose of this research was to examine and compare the psychological, legal, and social factors contributing to two illegal driving behaviours: exceeding the posted speed limit and driving when over the legal blood alcohol concentration (BAC) for the drivers licence type. Complementary theoretical perspectives were chosen to comprehensively examine these two behaviours including Akers’ social learning theory, Stafford and Warr’s expanded deterrence theory, and personality perspectives encompassing alcohol misuse, sensation seeking, and Type-A behaviour pattern. The program of research consisted of two phases: a preliminary pilot study, and the main quantitative phase. The preliminary pilot study was undertaken to inform the development of the quantitative study and to ensure the clarity of the theoretical constructs operationalised in this research. Semi-structured interviews were conducted with 11 Queensland drivers recruited from Queensland Transport Licensing Centres and Queensland University of Technology (QUT). These interviews demonstrated that the majority of participants had engaged in at least one of the behaviours, or knew of someone who had. It was also found among these drivers that the social environment in which both behaviours operated, including family and friends, and the social rewards and punishments associated with the behaviours, are important in their decision making. The main quantitative phase of the research involved a cross-sectional survey of 547 Queensland licensed drivers. The aim of this study was to determine the relationship between speeding and drink driving and whether there were any similarities or differences in the factors that contribute to a driver’s decision to engage in one or the other. A comparison of the participants self-reported speeding and self-reported drink driving behaviour demonstrated that there was a weak positive association between these two behaviours. Further, participants reported engaging in more frequent speeding at both low (i.e., up to 10 kilometres per hour) and high (i.e., 10 kilometres per hour or more) levels, than engaging in drink driving behaviour. It was noted that those who indicated they drove when they may be over the legal limit for their licence type, more frequently exceeded the posted speed limit by 10 kilometres per hour or more than those who complied with the regulatory limits for drink driving. A series of regression analyses were conducted to investigate the factors that predict self-reported speeding, self-reported drink driving, and the preparedness to engage in both behaviours. In relation to self-reported speeding (n = 465), it was found that among the sociodemographic and person-related factors, younger drivers and those who score high on measures of sensation seeking were more likely to report exceeding the posted speed limit. In addition, among the legal and psychosocial factors it was observed that direct exposure to punishment (i.e., being detected by police), direct punishment avoidance (i.e., engaging in an illegal driving behaviour and not being detected by police), personal definitions (i.e., personal orientation or attitudes toward the behaviour), both the normative and behavioural dimensions of differential association (i.e., refers to both the orientation or attitude of their friends and family, as well as the behaviour of these individuals), and anticipated punishments were significant predictors of self-reported speeding. It was interesting to note that associating with significant others who held unfavourable definitions towards speeding (the normative dimension of differential association) and anticipating punishments from others were both significant predictors of a reduction in self-reported speeding. In relation to self-reported drink driving (n = 462), a logistic regression analysis indicated that there were a number of significant predictors which increased the likelihood of whether participants had driven in the last six months when they thought they may have been over the legal alcohol limit. These included: experiences of direct punishment avoidance; having a family member convicted of drink driving; higher levels of Type-A behaviour pattern; greater alcohol misuse (as measured by the AUDIT); and the normative dimension of differential association (i.e., associating with others who held favourable attitudes to drink driving). A final logistic regression analysis examined the predictors of whether the participants reported engaging in both drink driving and speeding versus those who reported engaging in only speeding (the more common of the two behaviours) (n = 465). It was found that experiences of punishment avoidance for speeding decreased the likelihood of engaging in both speeding and drink driving; whereas in the case of drink driving, direct punishment avoidance increased the likelihood of engaging in both behaviours. It was also noted that holding favourable personal definitions toward speeding and drink driving, as well as higher levels of on Type-A behaviour pattern, and greater alcohol misuse significantly increased the likelihood of engaging in both speeding and drink driving. This research has demonstrated that the compliance with the regulatory limits was much higher for drink driving than it was for speeding. It is acknowledged that while speed limits are a fundamental component of speed management practices in Australia, the countermeasures applied to both speeding and drink driving do not appear to elicit the same level of compliance across the driving population. Further, the findings suggest that while the principles underpinning the current regime of deterrence based countermeasures are sound, current enforcement practices are insufficient to force compliance among the driving population, particularly in the case of speeding. Future research should further examine the degree of overlap between speeding and drink driving behaviour and whether punishment avoidance experiences for a specific illegal driving behaviour serve to undermine the deterrent effect of countermeasures aimed at reducing the incidence of another illegal driving behaviour. Furthermore, future work should seek to understand the factors which predict engaging in speeding and drink driving behaviours at the same time. Speeding has shown itself to be a pervasive and persistent behaviour, hence it would be useful to examine why road safety authorities have been successful in convincing the majority of drivers of the dangers of drink driving, but not those associated with speeding. In conclusion, the challenge for road safety practitioners will be to convince drivers that speeding and drink driving are equally risky behaviours, with the ultimate goal to reduce the prevalence of both behaviours.
Resumo:
This final report outlines the research conducted by the Centre for Accident Research and Road Safety – Queensland (CARRS-Q) for the research project (title above). This report provides an outline of the project methodology, literature review, three stages of research results (including the focus group discussions, review of organisational records, documentation and initiatives, and analysis of previous CARRS-Q occupational road safety self-report surveys), and recommendations for intervention strategy and initiatives development and implementation.