127 resultados para Linda Rosa
Resumo:
The National Party of Australia is under challenge. Will it be able to adapt and survive or will it become increasingly irrelevant in Australian politics? With population growth in some coastal and hinterland areas and decline in inland agricultural areas, the face of rural and regional Australia is changing. As a result, the National Party's traditional support is being eroded. Within the long-standing Coalition, the influence of the Nationals appears to be in decline, yet they continue to resist amalgamation with the Liberal Party.
Resumo:
In light of declining trade union density, specifically among young workers, this article explores how trade unions recruit, service and organize young people. Our focus is the way in which trade unions market their services to the young. We use, as a lens of analysis, the services and social marketing literature and the concept of an ‘unsought, experience good’ to explore trade union strategy. Based on interviews with a number of union officials in the state of Queensland, it is clear that unions see the issue of recruitment of young people as significant, and that innovative strategies are being used in at least some unions. However, the research also indicates that despite union awareness, strategies are uneven and resource allocation is patchy. While the research was carried out in one state, the results and conclusion are broadly applicable to the Australian labour movement as a whole, and have implications for union movements in other Anglophone countries.
Resumo:
A configurable process model describes a family of similar process models in a given domain. Such a model can be configured to obtain a specific process model that is subsequently used to handle individual cases, for instance, to process customer orders. Process configuration is notoriously difficult as there may be all kinds of interdependencies between configuration decisions.} In fact, an incorrect configuration may lead to behavioral issues such as deadlocks and livelocks. To address this problem, we present a novel verification approach inspired by the ``operating guidelines'' used for partner synthesis. We view the configuration process as an external service, and compute a characterization of all such services which meet particular requirements using the notion of configuration guideline. As a result, we can characterize all feasible configurations (i.\,e., configurations without behavioral problems) at design time, instead of repeatedly checking each individual configuration while configuring a process model.
Resumo:
Recent years have seen an increased uptake of business process management technology in industries. This has resulted in organizations trying to manage large collections of business process models. One of the challenges facing these organizations concerns the retrieval of models from large business process model repositories. For example, in some cases new process models may be derived from existing models, thus finding these models and adapting them may be more effective than developing them from scratch. As process model repositories may be large, query evaluation may be time consuming. Hence, we investigate the use of indexes to speed up this evaluation process. Experiments are conducted to demonstrate that our proposal achieves a significant reduction in query evaluation time.
Resumo:
In 2007, a comprehensive review of the extant research on nonpharmacological interventions for persons with early-stage dementia was conducted. More than 150 research reports, centered on six major domains, were included: early-stage support groups, cognitive training and enhancement programs, exercise programs, exemplar programs, health promotion programs, and “other” programs not fitting into previous categories. Theories of neural regeneration and plasticity were most often used to support the tested interventions. Recommendations for practice, research, and health policy are outlined, including evidence-based, nonpharmacological treatment protocols for persons with mild cognitive impairment and early-stage dementia. A tested, community-based, multimodal treatment program is also described. Overall, findings identify well-supported nonpharmacological treatments for persons with early-stage dementia and implications for a national health care agenda to optimize outcomes for this growing population of older adults.
Resumo:
As a result of the growing adoption of Business Process Management (BPM) technology different stakeholders need to understand and agree upon the process models that are used to configure BPM systems. However, BPM users have problems dealing with the complexity of such models. Therefore, the challenge is to improve the comprehension of process models. While a substantial amount of literature is devoted to this topic, there is no overview of the various mechanisms that exist to deal with managing complexity in (large) process models. It is thus hard to obtain comparative insight into the degree of support offered for various complexity reducing mechanisms by state-of-the-art languages and tools. This paper focuses on complexity reduction mechanisms that affect the abstract syntax of a process model, i.e. the structure of a process model. These mechanisms are captured as patterns, so that they can be described in their most general form and in a language- and tool-independent manner. The paper concludes with a comparative overview of the degree of support for these patterns offered by state-of-the-art languages and language implementations.
Resumo:
Vendors provide reference process models as consolidated, off-the-shelf solutions to capture best practices in a given industry domain. Customers can then adapt these models to suit their specific requirements. Traditional process flexibility approaches facilitate this operation, but do not fully address it as they do not sufficiently take controlled change guided by vendors’ reference models into account. This tension between the customer’s freedom of adapting reference models, and the ability to incorporate with relatively low effort vendor-initiated reference model changes, thus needs to be carefully balanced. This paper introduces process extensibility as a new paradigm for customising reference processes and managing their evolution over time. Process extensibility mandates a clear recognition of the different responsibilities and interests of reference model vendors and consumers, and is concerned with keeping the effort of customer-side reference model adaptations low while allowing sufficient room for model change.
Resumo:
Governments undertake extensive planning of many services and functions, but tend to neglect planning of public service workforces. Disruptions to public service delivery, such as shortages of nurses and doctors, have rejuvenated interest in workforce planning, but many organisations struggle to do it effectively. This historical study examines the capacity of central personnel agencies to predict workforce risks and support workforce planning, using a study of the Queensland public service. It identifies lack of workforce data as a barrier to effective workforce planning, as a result of factors such as changes in the direction of the central personnel agency, lack of appreciation for the value of comprehensive central workforce data, and limited agency human resource (HR) skills or capacity.
Resumo:
Home-based palliative care services are facing increasing challenges in servicing the needs of clients who live alone and without a primary caregiver. The findings from the analysis of 721 services’ records from three Australian states, and feedback from health professionals in interviews and postal surveys, demonstrated that there were aspects of being on one’s own with a terminal illness and living at home that require a specialised approach and support. This study explored the issues of palliative care patients living alone, from a service provider perspective, and provided evidence-based information to assist with service planning. The study made recommendations to the Australian Department of Health and Ageing about services considered important in developing support structures for this growing population.
Resumo:
Accurate knowledge and positive attitudes within the community are important for the effective diagnosis, treatment and support of people with ADHD. Most previous research about knowledge and attitudes has focused only on professional groups and parents of children with ADHD. The aim of this study was to explore knowledge about ADHD characteristics and causes, and attitudes towards issues such as medication in the general population. Six hundred and forty-five members of the Australian community, all of whom were parents, completed a questionnaire. The findings showed that the core features of ADHD were well-known, but there were misconceptions and considerable uncertainty about many aspects. Most respondents failed to recognise the genetic basis of the disorder and its potentially lifelong nature. Fathers were less knowledgeable than mothers. Although most participants believed that ADHD is a genuine disorder and recognised the benefits of medication, the majority believed that it is diagnosed too frequently and that medication is prescribed too readily. The study concluded that, in many respects, the public is not well-informed about ADHD and suggested that the media may have an important role in enhancing community awareness of the disorder through responsible, sensitive and accurate reporting.
Resumo:
The impact of government policy can become a strong enabler for the use of e-portfolios to support learning and employability. E-portfolio policy and practice seeks to draw together the different elements of integrated education and learning, graduate attributes, employability skills, professional competencies and lifelong learning, ultimately to support an engaged and productive workforce. Drawing on and updating the research findings from a nationwide research study conducted as part of the Australian ePortfolio Project, the present chapter discusses two important areas of the e-portfolio environment, government policy and academic policy. The focus is on those jurisdictions where government and academic policy issues have had a significant impact on e-portfolio practice, such as the European Union, the Netherlands, Scandinavian countries and the United Kingdom, as well as in Australia and New Zealand. These jurisdictions are of interest as government policy discussions are currently focusing on the need for closer integration between the different education and employment sectors. Finally, issues to be considered as well as strategies for driving policy decision making are presented.
Resumo:
Purpose – The purpose of this paper is to develop a conceptual framework that can be used to identify capabilities needed in the management of infrastructure assets. Design/methodology/approach – This paper utilises a qualitative approach to analyse secondary data in order to develop a conceptual framework that identifies capabilities for strategic infrastructure asset management. Findings – In an external business environment that is undergoing rapid change, it is more appropriate to focus on factors internal to the organisation such as resources and capabilities as a basis to develop competitive advantage. However, there is currently very little understanding of the internal capabilities that are appropriate for infrastructure asset management. Therefore, a conceptual framework is needful to guide infrastructure organisations in the identification of capabilities. Research limitations/implications – This is a conceptual paper and future empirical research should be conducted to validate the propositions made in the paper. Practical implications – The paper clearly argues the need for infrastructure organisations to adopt a systematic approach to identifying the capabilities needed in the management of strategic infrastructure assets. The discussion on the impact of essential capabilities is useful in providing the impetus for managers who operate in a deregulated infrastructure business landscape to review their existing strategies. Originality/value – The paper provides a new perspective on how asset managers can create value for their organisations by investing in the relevant capabilities.
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.