757 resultados para Passive Building Technologies
Resumo:
In 2008 we brought together much work at the intersection of entrepreneurship and human resource management (HRM) (Barrett & Mayson, 2008), after calls for more research (Baron, 2003; Katz, Aldrich, Welbourne & Williams, 2000; Tansky & Heneman, 2003). More has been collated since (Soriano, Dobon & Tansky, 2010; Tansky, Soriano & Dobon, 2010). We think it is now time again to regroup, pull conversational threads together and have a critical look at recent research at the intersection of HRM and Entrepreneurship. As editors of International Handbook of Entrepreneurship and HRM (Barrett & Mayson, 2008) we were privileged to collect 23 wonderfully diverse chapters from scholars around the globe addressing a range of issues at the intersection of the two pertinent disciplines or fields: HRM and entrepreneurship. This edition represented a coalescing of ideas that had been swirling about for some time. In three sections, the first dealt with theory and research methods, the second with the nature of HRM in small and entrepreneurial firms and the third with the functional aspects of HRM. At the time we were aware that the handbook did not cover the entire field and many topics were left unexplored. For example, the topic of regulation was generally absent while issues such as career advancement, performance management, organisational change and gender, diversity and ethnicity were also missing. In essence, the majority of those contributions sought to develop an understanding of the context in which particular aspects of HRM can be played out.
Resumo:
Abstract: Social network technologies, as we know them today have become a popular feature of everyday life for many people. As their name suggests, their underlying premise is to enable people to connect with each other for a variety of purposes. These purposes however, are generally thought of in a positive fashion. Based on a multi-method study of two online environments, Habbo Hotel and Second Life, which incorporate social networking functionality, we she light on forms of what can be conceptualized as antisocial behaviours and the rationales for these. Such behaviours included: scamming, racist/homophobic attacks, sim attacks, avatar attacks, non-conformance to contextual norms, counterfeiting and unneighbourly behaviour. The rationales for sub behaviours included: profit, fun, status building, network disruption, accidental acts and prejudice. Through our analysis we are able to comment upon the difficulties of defining antisocial behaviour in such environments, particularly when such environments are subject to interpretation vis their use and expected norms. We also point to the problems we face in conducting our public and private lives given the role ICTs are playing in the convergence of these two spaces and also the convergence of ICTs themselves.
Resumo:
The Weberian sense of work and life suggests that working is something around which the rest of life flows. Moreover, work life and domestic life have been defined as separate for most people based on physical structures. That is, being physically in a building at work limited your ability to interact with those who are not nearby – not part of work. As such, social conventions regarding the uses of media at work have become part of our cultural sensibilities – we “know” it is not proper to have romantic discourse over the office phone, much less romance during work! Doing so becomes news. Yet, despite the construction of such distinctions, these workspaces and places have always been difficult to render as such. For example, one might consider the relatively recent development of teleworking from the 1980s or the “putting out system”[1] which dates back to the 1400s – both requiring work in the home. The papers in this special issue draw our attention to some of the ethical issues raised by the growing pervasiveness of information and communications technologies (ICTs) in our everyday lives and the fact that it is becoming increasingly difficult to make distinctions between being somewhere (like work) and being away from some things (like one’s friends, social interests and other parts of life that are not integrated into this space or place [2] )...
Resumo:
Accurate three-dimensional representations of cultural heritage sites are highly valuable for scientific study, conservation, and educational purposes. In addition to their use for archival purposes, 3D models enable efficient and precise measurement of relevant natural and architectural features. Many cultural heritage sites are large and complex, consisting of multiple structures spatially distributed over tens of thousands of square metres. The process of effectively digitising such geometrically complex locations requires measurements to be acquired from a variety of viewpoints. While several technologies exist for capturing the 3D structure of objects and environments, none are ideally suited to complex, large-scale sites, mainly due to their limited coverage or acquisition efficiency. We explore the use of a recently developed handheld mobile mapping system called Zebedee in cultural heritage applications. The Zebedee system is capable of efficiently mapping an environment in three dimensions by continually acquiring data as an operator holding the device traverses through the site. The system was deployed at the former Peel Island Lazaret, a culturally significant site in Queensland, Australia, consisting of dozens of buildings of various sizes spread across an area of approximately 400 × 250 m. With the Zebedee system, the site was scanned in half a day, and a detailed 3D point cloud model (with over 520 million points) was generated from the 3.6 hours of acquired data in 2.6 hours. We present results demonstrating that Zebedee was able to accurately capture both site context and building detail comparable in accuracy to manual measurement techniques, and at a greatly increased level of efficiency and scope. The scan allowed us to record derelict buildings that previously could not be measured because of the scale and complexity of the site. The resulting 3D model captures both interior and exterior features of buildings, including structure, materials, and the contents of rooms.
Resumo:
The Story Project is a small, not-for-profit community media arts company based on the Sunshine Coast hinterland. It specialises in facilitating first-person storytelling. Since 2012 The Story Project has been collaborating with a small community arts organisation based in northern NSW, Uralla Arts, to record local heritage in first-person story form and to curate and present it ways that will appeal to new generations of listeners. The initial collaboration was funded by a Federal government Community Heritage program. The project successfully adapted a participatory method of life storytelling to this regional context and some 40 stories were contributed to a collection. A more ambitious suite of projects to develop soundwalks in a number of towns across the New England region has since grown from this initial collaboration. The soundwalks seek to combine local creative works in oral story, music and visual forms, and make them accessible through an application that can be downloaded to GPS-enabled mobile devices. While soundwalks are not new, the needs and challenges of creative community-building that New England soundwalks attempt to solve in this regional setting hold value for a broader range of interests than just those of the immediate project stakeholders. This paper reports on a research collaboration between The Story Project and QUT researchers that looked at The Story Project’s engagement with Uralla Arts and other New England community-based networks and organisations. It considers how this instance of story-centred, participatory media arts practice contributes to building population-wide capacity for creative expression.
Resumo:
The housing construction industry in Saudi Arabia has been booming rapidly in the past two decades. This boom has faced multiple downfalls in relation to government regulations and building codes, one of which is the application of sustainable methods to the housing construction. This paper sheds some light on the current role of the Saudi government and the role of the Saudi Building Code (SBC) in the housing construction industry. The methodology utilised in this paper was a Delphi survey that was distributed to twenty-five key stakeholders in the housing construction industry in Saudi Arabia. The results indicate that there is a lack of integration between the Saudi Building Code and the current construction methods used in the current construction industry. Some factors and elements are recommended to be incorporated into the Saudi Building Code and to be adopted as regulations in the Saudi housing construction industry.
Resumo:
Building rich and authentic learning experiences in the STEM classroom, is a challenge for many educators within Higher Education. While many Higher Education Institutions have embraced the need to transform current teaching and learning practices and include a range of online tools, this has often been met with some resistance and approaches that do not always recognise the academic who are a critical component to the success of the transformational process. Over the last decade the Internet has evolved from being a tool used by a few dedicated educators to one that is being used by the majority of educators. However, what is important is how this great resource is used in teaching and learning to allow students to build knowledge. The ability for students to construct knowledge and engage in higher order thinking skills is at the heart of educational practices, and building a community of learners has the potential to support these practices, especially within STEM education. This paper explores the relationship between students and an academic teaching in a technology rich STEM learning environment and their adoption of social community and shared tools. In particular the paper reports on the critical components that make a successful community of learners and the educational tools and approaches that were successfully used to enhance the student learning experience in a STEM classroom.
Resumo:
This digital poster (which was on display at "The Cube", Queensland University of Technology) demonstrates how specification parameters can be extracted from a product library repository for use in augmenting the information contents of the objects in a local BIM tool (Revit in this instance).
Resumo:
Building information models have created a paradigm shift in how buildings are built and managed by providing a dynamic repository for building data that is useful in many new operational scenarios. This change has also created an opportunity to use building information models as an integral part of security operations and especially as a tool to facilitate fine-grained access control to building spaces in smart buildings and critical infrastructure environments. In this paper, we identify the requirements for a security policy model for such an access control system and discuss why the existing policy models are not suitable for this application. We propose a new policy language extension to XACML, with BIM specific data types and functions based on the IFC specification, which we call BIM-XACML.
Resumo:
Building information models are increasingly being utilised for facility management of large facilities such as critical infrastructures. In such environments, it is valuable to utilise the vast amount of data contained within the building information models to improve access control administration. The use of building information models in access control scenarios can provide 3D visualisation of buildings as well as many other advantages such as automation of essential tasks including path finding, consistency detection, and accessibility verification. However, there is no mathematical model for building information models that can be used to describe and compute these functions. In this paper, we show how graph theory can be utilised as a representation language of building information models and the proposed security related functions. This graph-theoretic representation allows for mathematically representing building information models and performing computations using these functions.