188 resultados para Institutional rules
Resumo:
Designing practical rules for controlling invasive species is a challenging task for managers, particularly when species are long-lived, have complex life cycles and high dispersal capacities. Previous findings derived from plant matrix population analyses suggest that effective control of long-lived invaders may be achieved by focusing on killing adult plants. However, the cost-effectiveness of managing different life stages has not been evaluated. We illustrate the benefits of integrating matrix population models with decision theory to undertake this evaluation, using empirical data from the largest infestation of mesquite (Leguminosae: Prosopis spp) within Australia. We include in our model the mesquite life cycle, different dispersal rates and control actions that target individuals at different life stages with varying costs, depending on the intensity of control effort. We then use stochastic dynamic programming to derive cost-effective control strategies that minimize the cost of controlling the core infestation locally below a density threshold and the future cost of control arising from infestation of adjacent areas via seed dispersal. Through sensitivity analysis, we show that four robust management rules guide the allocation of resources between mesquite life stages for this infestation: (i) When there is no seed dispersal, no action is required until density of adults exceeds the control threshold and then only control of adults is needed; (ii) when there is seed dispersal, control strategy is dependent on knowledge of the density of adults and large juveniles (LJ) and broad categories of dispersal rates only; (iii) if density of adults is higher than density of LJ, controlling adults is most cost-effective; (iv) alternatively, if density of LJ is equal or higher than density of adults, management efforts should be spread between adults, large and to a lesser extent small juveniles, but never saplings. Synthesis and applications.In this study, we show that simple rules can be found for managing invasive plants with complex life cycles and high dispersal rates when population models are combined with decision theory. In the case of our mesquite population, focussing effort on controlling adults is not always the most cost-effective way to meet our management objective.
Resumo:
This chapter charts the theories and methods being adopted in an investigation of the 'micro-politics' of teacher education policy reception at a site of higher education in Queensland from 1980 to 1990. The paper combines insights and methods from critical ethnography with those from the institutional ethnography of feminist sociologist Dorothy Smith to link local policy activity at the institutional site to broader social structures and processes. In this way, enquiry begins with--and takes into account--the experiences of those groups normally excluded from mainstream and even critical policy analysis.
Resumo:
The Queensland University of Technology (QUT) in Brisbane, Australia, is involved in a number of projects funded by the Australian National Data Service (ANDS). Currently, QUT is working on a project (Metadata Stores Project) that uses open source VIVO software to aid in the storage and management of metadata relating to data sets created/managed by the QUT research community. The registry (called QUT Research Data Finder) will support the sharing and reuse of research datasets, within and external to QUT. QUT uses VIVO for both the display and the editing of research metadata.
Resumo:
Recent experience of practice-led postgraduate supervision has prompted me to conclude that the practice-led research method, as it is currently construed, produces good outcomes, especially in permitting practitioners in the creative arts, design and media into the research framework, but at the same time it also generates certain recurring difficulties. What are these difficulties? Practice-led candidates tend to rely on a narrow range of formulations with the result that they assume: (i) the innovative nature of practice-led research; (ii) that its novelty is based in opposition to other research methods; (iii) that practice is intrinsically research, often leading to tautological formulations; (iv) the hyper-self-reflexive nature of practice-led research. This set of guidelines was composed in order to circumvent the shortcomings that result from these recurring formulations. My belief is that, if these shortcomings are avoided, there is nothing to prevent practice-led from further developing as a research inquiry and thus achieving rewarding and successful research outcomes. Originally composed for the purposes of postgraduate supervision, these six rules are presented here in the context of a wider analysis of the emergence of practice-led research and its current conditions of possibility as a research method.
Resumo:
We study discrimination based on the hukou system that segregates citizens in groups of migrants and locals in urban China. We use an artefactual field experiment with a labor market framing. We recruit workers on their real labor market as experimental participants and investigate if official discrimination motivates individual discrimination based on hukou status. In our experimental results we observe discrimination based on the hukou characteristic: however, statistical discrimination does not seem to be the source of this, as status is exogeneous for our participants and migrants and locals behave similarly. Furthermore, discrimination increases between two experimental frameworks when motives for statistical discrimination are removed.
Resumo:
Refactoring is a common approach to producing better quality software. Its impact on many software quality properties, including reusability, maintainability and performance, has been studied and measured extensively. However, its impact on the information security of programs has received relatively little attention. In this work, we assess the impact of a number of the most common code-level refactoring rules on data security, using security metrics that are capable of measuring security from the viewpoint of potential information flow. The metrics are calculated for a given Java program using a static analysis tool we have developed to automatically analyse compiled Java bytecode. We ran our Java code analyser on various programs which were refactored according to each rule. New values of the metrics for the refactored programs then confirmed that the code changes had a measurable effect on information security.
Resumo:
This article will outline the impact of the Electronic Conveyancing National Law (ECNL) and the draft Model Participation Rules (MPR) on conveyancing practice and the obligations of lawyers and conveyancers.
Resumo:
In Uniline Australia Ltd ACN 010752057 v S Briggs Pty Ltd ACN 007415518 (No 2) [2009] FCA 920 Greenwood J considered a number of principles guiding the exercise of discretion in relation to costs, particularly when offers of compromise have been made under the formal process provided by the Federal Court Rules.
Resumo:
Research capacity building has become a prominent theme in higher education institutions across the world. To build research capacity, it is necessary to identify areas of challenges academics face within the academia. This case study focuses on Chinese teaching English as a foreign language (TEFL) academics with the purpose of identifying factors that influence their research capacity building. Six TEFL academics from a Chinese national university were interviewed and institutional research documents were analysed. Findings showed that obstacles and difficulties in conducting research were more related to departmental factors than individual characteristics. The institution was keen on developing a research culture, and encouraged research and publications. Departmental support for research was improving, but it seems that it was more generic than tailored to individual needs. The findings of this study provide implications for research administrators in further supporting TEFL academics’ research capacity building.
Resumo:
QUT’s new metadata repository (data registry), Research Data Finder, has been designed to promote the visibility and discoverability of QUT research datasets. Funded by the Australian National Data Service (ANDS), it will provide a qualitative snapshot of research data outputs created or collected by members of the QUT research community that are available via open or mediated access. As a fully integrated metadata repository Research Data Finder aligns with institutional sources of truth, such as QUT’s research administrative system, ResearchMaster, as well as QUT’s Academic Profiles system to provide high quality data descriptions that increase awareness of, and access to, shareable research data. In addition, the repository and its workflows are designed to foster smoother data management practices, enhance opportunities for collaboration and research, promote cross-disciplinary research and maximize existing research datasets. The metadata schema used in Research Data Finder is the Registry Interchange Format - Collections and Services (RIF-CS), developed by ANDS in 2009. This comprehensive schema is potentially complex for researchers; unlike metadata for publications, which are often made publicly available with the official publication, metadata for datasets are not typically available and need to be created. Research Data Finder uses a hybrid self-deposit and mediated deposit system. In addition to automated ingests from ResearchMaster (research project information) and Academic Profiles system (researcher information), shareable data is identified at a number of key “trigger points” in the research cycle. These include: research grant proposals; ethics applications; Data Management Plans; Liaison Librarian data interviews; and thesis submissions. These ingested records can be supplemented with related metadata including links to related publications, such as those in QUT ePrints. Records deposited in Research Data Finder are harvested by ANDS and made available to a national and international audience via Research Data Australia, ANDS’ discovery service for Australian research data. Researcher and research group metadata records are also harvested by the National Library of Australia (NLA) and these records are then published in Trove (the NLA’s digital information portal). By contributing records to the national infrastructure, QUT data will become more visible. Within Australia and internationally, many funding bodies have already mandated the open access of publications produced from publicly funded research projects, such as those supported by the Australian Research Council (ARC), or the National Health and Medical Research Council (NHMRC). QUT will be well placed to respond to the rapidly evolving climate of research data management. This project is supported by the Australian National Data Service (ANDS). ANDS is supported by the Australian Government through the National Collaborative Research Infrastructure Strategy Program and the Education Investment Fund (EIF) Super Science Initiative.
Resumo:
In Bazley v Wesley Monash IVF Pty Ltd [2010] QSC 118 an order was made under r 250 of the Uniform Civil Procedure Rules 1999 (Qld) (“UCPR”) requiring the respondent to continue to hold and maintain straws of semen belonging to the applicant’s deceased husband. The decision includes a useful analysis of the development of the common law regarding property rights in human bodies and body parts.
Strategies for gaining and maintaining academic support for the institutional open access repository
Resumo:
The impact of research can be measured by use or citation count. The more widely available that research outputs are; the more likely they are to be used, and the higher the impact. Making the author-manuscript version of research outputs freely available via the institutional repository greatly increases the availability of research outputs and can increase the impact. QUT ePrints, the open access institutional repository of research outputs at Queensland University of Technology (QUT), Australia, was established in 2003 and is managed by the QUT Library. The repository now contains over 39,000 records. More than 21,000 of these records have full-text copies attached as result of continuous effort to maintain momentum and encourage academic engagement. The full-text deposit rate has continued to increase over time and, in 2012 (August, at the time of writing), 88% of the records for works published in 2012 provide access to a full-text copy. Achieving success has required a long term approach to collaboration, open access advocacy, repository promotion, support for the deposit process, and ongoing system development. This paper discusses the various approaches adopted by QUT Library, in collaboration with other areas of the University, to achieve success. Approaches include mainstreaming the repository via having it report to the University Research and Innovation Committee; regular provision of deposit rate data to faculties; championing key academic supporters; and holding promotional competitions and events such as during Open Access Week. Support and training is provided via regular deposit workshops with academics and faculty research support groups and via the provision of online self-help information. Recent system developments have included the integration of citation data (from Scopus and Web of Science) and the development of a statistical reporting system which incentivise engagement.