108 resultados para Management - Data processing - Study and teaching (Higher) - Victoria
Resumo:
Emergency departments (EDs) are often the first point of contact with an abused child. Despite legal mandate, the reporting of definite or suspected abusive injury to child safety authorities by ED clinicians varies due to a number of factors including training, access to child safety professionals, departmental culture and a fear of ‘getting it wrong’. This study examined the quality of documentation and coding of child abuse captured by ED based injury surveillance data and ED medical records in the state of Queensland and the concordance of these data with child welfare records. A retrospective medical record review was used to examine the clinical documentation of almost 1000 injured children included in the Queensland Injury Surveillance Unit database (QISU) from 10 hospitals in urban and rural centres. Independent experts re-coded the records based on their review of the notes. A data linkage methodology was then used to link these records with records in the state government’s child welfare database. Cases were sampled from three sub-groups according to the surveillance intent codes: Maltreatment by parent, Undetermined and Unintentional injury. Only 0.1% of cases coded as unintentional injury were recoded to maltreatment by parent, while 1.2% of cases coded as maltreatment by parent were reclassified as unintentional and 5% of cases where the intent was undetermined by the triage nurse were recoded as maltreatment by parent. Quality of documentation varied across type of hospital (tertiary referral centre, children’s, urban, regional and remote). Concordance of health data with child welfare data varied across patient subgroups. Outcomes from this research will guide initiatives to improve the quality of intentional child injury surveillance systems.
Resumo:
This paper is a report of students' responses to instruction which was based on the use of concrete representations to solve linear equations. The sample consisted of 21 Grade 8 students from a middle-class suburban state secondary school with a reputation for high academic standards and innovative mathematics teaching. The students were interviewed before and after instruction. Interviews and classroom interactions were observed and videotaped. A qualitative analysis of the responses revealed that students did not use the materials in solving problems. The increased processing load caused by concrete representations is hypothesised as a reason.
Resumo:
Overloaded truck traffic is a significant problem on highways around the world. Developing countries in particular, overloaded truck traffic causes large amounts of unexpected expenditure in terms of road maintenance because of premature pavement damage. Overloaded truck traffic is a common phenomenon in developing countries, because of inefficient road management and monitoring systems. According to the available literature, many developing countries are facing the same problem, which is economic loss caused by the existence of overloaded trucks in the traffic stream. This paper summarizes the available literature, news reports, journal articles and traffic research regarding overloaded traffic. It examines the issue of overloading and the strategies and legislation used in developed countries.
Resumo:
Road safety is a major concern worldwide. Road safety will improve as road conditions and their effects on crashes are continually investigated. This paper proposes to use the capability of data mining to include the greater set of road variables for all available crashes with skid resistance values across the Queensland state main road network in order to understand the relationships among crash, traffic and road variables. This paper presents a data mining based methodology for the road asset management data to find out the various road properties that contribute unduly to crashes. The models demonstrate high levels of accuracy in predicting crashes in roads when various road properties are included. This paper presents the findings of these models to show the relationships among skid resistance, crashes, crash characteristics and other road characteristics such as seal type, seal age, road type, texture depth, lane count, pavement width, rutting, speed limit, traffic rates intersections, traffic signage and road design and so on.
Resumo:
This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.
Resumo:
Change management research has largely ignored the effects of organizational change management history in shaping employee attitudes and behavior. This article develops and tests a model of the effects of poor change management history (PCMH) on employee attitudes (trust, job satisfaction, turnover intentions, change cynicism, and openness to change) and actual turnover. We found that PCMH, through PCMH beliefs, led to lower trust, job satisfaction and openness to change, and higher cynicism and turnover intentions. Also, PCMH beliefs predicted employee turnover over 2 years.
Resumo:
Objectives: To quantify the concordance of hospital child maltreatment data with child protection service (CPS) records and identify factors associated with linkage. Methods: Multivariable logistic regression analysis was conducted following retrospective medical record review and database linkage of 884 child records from 20 hospitals and the CPS in Queensland, Australia. Results: Nearly all children with hospital assigned maltreatment codes (93.1%) had a CPS record. Of these, 85.1% had a recent notification. 29% of the linked maltreatment group (n=113) were not known to CPS prior to the hospital presentation. Almost 1/3 of children with unintentional injury hospital codes were known to CPS. Just over 24% of the linked unintentional injury group (n=34) were not known to CPS prior to the hospital presentation but became known during or after discharge from hospital. These estimates are higher than the 2006/07 annual rate of 2.39% of children being notified to CPS. Rural children were more likely to link to CPS, and children were over 3 times more likely to link if the index injury documentation included additional diagnoses or factors affecting their health. Conclusions: The system for referring maltreatment cases to CPS is generally efficient, although up to 1 in 15 children had codes for maltreatment but could not be linked to CPS data. The high proportion of children with unintentional injury codes who linked to CPS suggests clinicians and hospital-based child protection staff should be supported by further education and training to ensure children at risk are being detected by the child protection system.
Resumo:
Acoustic sensors play an important role in augmenting the traditional biodiversity monitoring activities carried out by ecologists and conservation biologists. With this ability however comes the burden of analysing large volumes of complex acoustic data. Given the complexity of acoustic sensor data, fully automated analysis for a wide range of species is still a significant challenge. This research investigates the use of citizen scientists to analyse large volumes of environmental acoustic data in order to identify bird species. Specifically, it investigates ways in which the efficiency of a user can be improved through the use of species identification tools and the use of reputation models to predict the accuracy of users with unidentified skill levels. Initial experimental results are reported.
Resumo:
Dashboards are expected to improve decision making by amplifying cognition and capitalizing on human perceptual capabilities. Hence, interest in dashboards has increased recently, which is also evident from the proliferation of dashboard solution providers in the market. Despite dashboards' popularity, little is known about the extent of their effectiveness, i.e. what types of dashboards work best for different users or tasks. In this paper, we conduct a comprehensive multidisciplinary literature review with an aim to identify the critical issues organizations might need to consider when implementing dashboards. Dashboards are likely to succeed and solve the problems of presentation format and information load when certain visualization principles and features are present (e.g. high data-ink ratio and drill down features).Werecommend that dashboards come with some level of flexibility, i.e. allowing users to switch between alternative presentation formats. Also some theory driven guidance through popups and warnings can help users to select an appropriate presentation format. Given the dearth of research on dashboards, we conclude the paper with a research agenda that could guide future studies in this area.
Resumo:
Researchers are increasingly involved in data-intensive research projects that cut across geographic and disciplinary borders. Quality research now often involves virtual communities of researchers participating in large-scale web-based collaborations, opening their earlystage research to the research community in order to encourage broader participation and accelerate discoveries. The result of such large-scale collaborations has been the production of ever-increasing amounts of data. In short, we are in the midst of a data deluge. Accompanying these developments has been a growing recognition that if the benefits of enhanced access to research are to be realised, it will be necessary to develop the systems and services that enable data to be managed and secured. It has also become apparent that to achieve seamless access to data it is necessary not only to adopt appropriate technical standards, practices and architecture, but also to develop legal frameworks that facilitate access to and use of research data. This chapter provides an overview of the current research landscape in Australia as it relates to the collection, management and sharing of research data. The chapter then explains the Australian legal regimes relevant to data, including copyright, patent, privacy, confidentiality and contract law. Finally, this chapter proposes the infrastructure elements that are required for the proper management of legal interests, ownership rights and rights to access and use data collected or generated by research projects.
Resumo:
Business Process Management (BPM) is a topic that continues to grow in significance as organisations seek to gain and sustain competitive advantage in an increasingly global environment. Despite anecdotal evidence of organisations improving performance by pursuing a BPM approach, there is little theory that explains and substantiates this relationship. This study provides the first theory on the progression and maturity of BPM Initiatives within organisations and provides a vital starting block upon which future research in this area can build. The Researcher starts by clearly defining three key terms (BPM Initiative, BPM Progression and BPM Maturity), showing the relationship between these three concepts and proposing their relationship with Organisational Performance. The Researcher then combines extant literature and use of the Delphi Technique and the case study method to explore the progression and measurement of the BPM Initiatives within organisations. The study builds upon the principles of general theories including the Punctuated Equilibrium Model and Dynamic Capabilities to present theory on BPM Progression and BPM Maturity. Using the BPM Capability Framework developed through an international Delphi study series, the Researcher shows how the specific organisational context influences which capability areas an organisation chooses to progress. By comparing five separate organisations over an extended time the Researcher is able to show that, despite this disparity, there is some evidence of consistency with regard to the capability areas progressed. This suggests that subsequent identification of progression paths may be possible. The study also shows that the approach and scope taken to BPM within each organisation is a likely predictor of such paths. These outcomes result in the proposal of a formative model for measuring BPM Maturity.
Resumo:
Victorians feel a strong connection to their local waterways and most have a good grasp of river health issues. The My Victorian Waterway report analyses how Victorians interact with their local waterways including rivers, lakes and estuaries. The report is based on the results of a survey completed by more than 7,000 Victorians who answered questions about how they use and care for their local waterways as well as their knowledge of river health issues and aspirations for the future of our waterways.
Resumo:
Over the last decade, Papua New Guinea (PNG) has pursued educational reform in elementary teacher education. Because elementary teachers and teacher education are central to the reform agenda, there is a need to gain empirical evidence about how PNG teacher trainers’ understandings about learning and teaching impact on their practice. The study uses cultural-authorship as a theoretical framework to investigate the nature of changes in understanding about learning and teaching for 18 teacher trainers as they progressed through a two-year Bachelor of Early Childhood upgrade course. It addresses the research question: What do elementary teacher trainers in PNG understanding about learning and teaching and how has this changed during their course? The focus on such understandings provides valuable insights into their professional identities at a critical time in PNG’s education reform agenda. Analysis of journal entries at the beginning and end of the course showed that, over time, teacher trainers described increasingly more complex ways of understanding learning and teaching. These views shifted from a focus on learning and teaching as transmission of ideas to one in which the critical role played by communities and families in educational processes and the teacher as a change agent became focal. This watershed finding demonstrates notable shifts in teacher trainers’ professional identities from trainers to community leaders in elementary education.