252 resultados para area of occupancy
Resumo:
Generating accurate population-specific public health messages regarding sun protection requires knowledge about seasonal variation in sun exposure in different environments. To address this issue for a subtropical area of Australia, we used polysulphone badges to measure UVR for the township of Nambour (26° latitude) and personal UVR exposure among Nambour residents who were taking part in a skin cancer prevention trial. Badges were worn by participants for two winter and two summer days. The ambient UVR was approximately three times as high in summer as in winter. However, participants received more than twice the proportion of available UVR in winter as in summer (6.5%vs 2.7%, P < 0.05), resulting in an average ratio of summer to winter personal UVR exposure of 1.35. The average absolute difference in daily dose between summer and winter was only one-seventh of a minimal erythemal dose. Extrapolating from our data, we estimate that ca. 42% of the total exposure received in the 6 months of winter (June–August) and summer (December–February) is received during the three winter months. Our data show that in Queensland a substantial proportion of people’s annual UVR dose is obtained in winter, underscoring the need for dissemination of sun protection messages throughout the year in subtropical and tropical climates.
Resumo:
This thesis explores a way to inform the architectural design process for contemporary workplace environments. It reports on both theoretical and practical outcomes through an exclusively Australian case study of a network enterprise comprised of collaborative, yet independent business entities. The internet revolution, substantial economic and cultural shifts, and an increased emphasis on lifestyle considerations have prompted a radical re-ordering of organisational relationships and the associated structures, processes, and places of doing business. The social milieu of the information age and the knowledge economy is characterised by an almost instantaneous flow of information and capital. This has culminated in a phenomenon termed by Manuel Castells as the network society, where physical locations are joined together by continuous communication and virtual connectivity. A new spatial logic encompassing redefined concepts of space and distance, and requiring a comprehensive shift in the approach to designing workplace environments for today’s adaptive, collaborative organisations in a dynamic business world, provides the backdrop for this research. Within the duality of space and an augmentation of the traditional notions of place, organisational and institutional structures pose new challenges for the design professions. The literature revealed that there has always been a mono-organisational focus in relation to workplace design strategies. The phenomenon of inter-organisational collaboration has enabled the identification of a gap in the knowledge relative to workplace design. This new context generated the formulation of a unique research construct, the NetWorkPlace™©, which captures the complexity of contemporary employment structures embracing both physical and virtual work environments and practices, and provided the basis for investigating the factors that are shaping and defining interactions within and across networked organisational settings. The methodological orientation and the methods employed follow a qualitative approach and an abductively driven strategy comprising two distinct components, a cross-sectional study of the whole of the network and a longitudinal study, focusing on a single discrete workplace site. The complexity of the context encountered dictated that a multi-dimensional investigative framework was required to be devised. The adoption of a pluralist ontology and the reconfiguration of approaches from traditional paradigms into a collaborative, trans-disciplinary, multi-method epistemology provided an explicit and replicatable method of investigation. The identification and introduction of the NetWorkPlace™© phenomenon, by necessity, spans a number of traditional disciplinary boundaries. Results confirm that in this context, architectural research, and by extension architectural practice, must engage with what other disciplines have to offer. The research concludes that no single disciplinary approach to either research or practice in this area of design can suffice. Pierre Bourdieau’s philosophy of ‘practice’ provides a framework within which the governance and technology structures, together with the mechanisms enabling the production of social order in this context, can be understood. This is achieved by applying the concepts of position and positioning to the corporate power dynamics, and integrating the conflict found to exist between enterprise standard and ferally conceived technology systems. By extending existing theory and conceptions of ‘place’ and the ‘person-environment relationship’, relevant understandings of the tensions created between Castells’ notions of the space of place and the space of flows are established. The trans-disciplinary approach adopted, and underpinned by a robust academic and practical framework, illustrates the potential for expanding the range and richness of understanding applicable to design in this context. The outcome informs workplace design by extending theoretical horizons, and by the development of a comprehensive investigative process comprising a suite of models and techniques for both architectural and interior design research and practice, collectively entitled the NetWorkPlace™© Application Framework. This work contributes to the body of knowledge within the design disciplines in substantive, theoretical, and methodological terms, whilst potentially also influencing future organisational network theories, management practices, and information and communication technology applications. The NetWorkPlace™© as reported in this thesis, constitutes a multi-dimensional concept having the capacity to deal with the fluidity and ambiguity characteristic of the network context, as both a topic of research and the way of going about it.
Resumo:
This dissertation develops the model of a prototype system for the digital lodgement of spatial data sets with statutory bodies responsible for the registration and approval of land related actions under the Torrens Title system. Spatial data pertain to the location of geographical entities together with their spatial dimensions and are classified as point, line, area or surface. This dissertation deals with a sub-set of spatial data, land boundary data that result from the activities performed by surveying and mapping organisations for the development of land parcels. The prototype system has been developed, utilising an event-driven paradigm for the user-interface, to exploit the potential of digital spatial data being generated from the utilisation of electronic techniques. The system provides for the creation of a digital model of the cadastral network and dependent data sets for an area of interest from hard copy records. This initial model is calibrated on registered control and updated by field survey to produce an amended model. The field-calibrated model then is electronically validated to ensure it complies with standards of format and content. The prototype system was designed specifically to create a database of land boundary data for subsequent retrieval by land professionals for surveying, mapping and related activities. Data extracted from this database are utilised for subsequent field survey operations without the need to create an initial digital model of an area of interest. Statistical reporting of differences resulting when subsequent initial and calibrated models are compared, replaces the traditional checking operations of spatial data performed by a land registry office. Digital lodgement of survey data is fundamental to the creation of the database of accurate land boundary data. This creation of the database is fundamental also to the efficient integration of accurate spatial data about land being generated by modem technology such as global positioning systems, and remote sensing and imaging, with land boundary information and other information held in Government databases. The prototype system developed provides for the delivery of accurate, digital land boundary data for the land registration process to ensure the continued maintenance of the integrity of the cadastre. Such data should meet also the more general and encompassing requirements of, and prove to be of tangible, longer term benefit to the developing, electronic land information industry.
Resumo:
The Mount Isa Basin is a new concept used to describe the area of Palaeo- to Mesoproterozoic rocks south of the Murphy Inlier and inappropriately described presently as the Mount Isa Inlier. The new basin concept presented in this thesis allows for the characterisation of basin-wide structural deformation, correlation of mineralisation with particular lithostratigraphic and seismic stratigraphic packages, and the recognition of areas with petroleum exploration potential. The northern depositional margin of the Mount Isa Basin is the metamorphic, intrusive and volcanic complex here referred to as the Murphy Inlier (not the "Murphy Tectonic Ridge"). The eastern, southern and western boundaries of the basin are obscured by younger basins (Carpentaria, Eromanga and Georgina Basins). The Murphy Inlier rocks comprise the seismic basement to the Mount Isa Basin sequence. Evidence for the continuity of the Mount Isa Basin with the McArthur Basin to the northwest and the Willyama Block (Basin) at Broken Hill to the south is presented. These areas combined with several other areas of similar age are believed to have comprised the Carpentarian Superbasin (new term). The application of seismic exploration within Authority to Prospect (ATP) 423P at the northern margin of the basin was critical to the recognition and definition of the Mount Isa Basin. The Mount Isa Basin is structurally analogous to the Palaeozoic Arkoma Basin of Illinois and Arkansas in southern USA but, as with all basins it contains unique characteristics, a function of its individual development history. The Mount Isa Basin evolved in a manner similar to many well described, Phanerozoic plate tectonic driven basins. A full Wilson Cycle is recognised and a plate tectonic model proposed. The northern Mount Isa Basin is defined as the Proterozoic basin area northwest of the Mount Gordon Fault. Deposition in the northern Mount Isa Basin began with a rift sequence of volcaniclastic sediments followed by a passive margin drift phase comprising mostly carbonate rocks. Following the rift and drift phases, major north-south compression produced east-west thrusting in the south of the basin inverting the older sequences. This compression produced an asymmetric epi- or intra-cratonic clastic dominated peripheral foreland basin provenanced in the south and thinning markedly to a stable platform area (the Murphy Inlier) in the north. The fmal major deformation comprised east-west compression producing north-south aligned faults that are particularly prominent at Mount Isa. Potential field studies of the northern Mount Isa Basin, principally using magnetic data (and to a lesser extent gravity data, satellite images and aerial photographs) exhibit remarkable correlation with the reflection seismic data. The potential field data contributed significantly to the unravelling of the northern Mount Isa Basin architecture and deformation. Structurally, the Mount Isa Basin consists of three distinct regions. From the north to the south they are the Bowthorn Block, the Riversleigh Fold Zone and the Cloncurry Orogen (new names). The Bowthom Block, which is located between the Elizabeth Creek Thrust Zone and the Murphy Inlier, consists of an asymmetric wedge of volcanic, carbonate and clastic rocks. It ranges from over 10 000 m stratigraphic thickness in the south to less than 2000 min the north. The Bowthorn Block is relatively undeformed: however, it contains a series of reverse faults trending east-west that are interpreted from seismic data to be down-to-the-north normal faults that have been reactivated as thrusts. The Riversleigh Fold Zone is a folded and faulted region south of the Bowthorn Block, comprising much of the area formerly referred to as the Lawn Hill Platform. The Cloncurry Orogen consists of the area and sequences equivalent to the former Mount Isa Orogen. The name Cloncurry Orogen clearly distinguishes this area from the wider concept of the Mount Isa Basin. The South Nicholson Group and its probable correlatives, the Pilpah Sandstone and Quamby Conglomerate, comprise a later phase of now largely eroded deposits within the Mount Isa Basin. The name South Nicholson Basin is now outmoded as this terminology only applied to the South Nicholson Group unlike the original broader definition in Brown et al. (1968). Cored slimhole stratigraphic and mineral wells drilled by Amoco, Esso, Elf Aquitaine and Carpentaria Exploration prior to 1986, penetrated much of the stratigraphy and intersected both minor oil and gas shows plus excellent potential source rocks. The raw data were reinterpreted and augmented with seismic stratigraphy and source rock data from resampled mineral and petroleum stratigraphic exploration wells for this study. Since 1986, Comalco Aluminium Limited, as operator of a joint venture with Monument Resources Australia Limited and Bridge Oil Limited, recorded approximately 1000 km of reflection seismic data within the basin and drilled one conventional stratigraphic petroleum well, Beamesbrook-1. This work was the first reflection seismic and first conventional petroleum test of the northern Mount Isa Basin. When incorporated into the newly developed foreland basin and maturity models, a grass roots petroleum exploration play was recognised and this led to the present thesis. The Mount Isa Basin was seen to contain excellent source rocks coupled with potential reservoirs and all of the other essential aspects of a conventional petroleum exploration play. This play, although high risk, was commensurate with the enormous and totally untested petroleum potential of the basin. The basin was assessed for hydrocarbons in 1992 with three conventional exploration wells, Desert Creek-1, Argyle Creek-1 and Egilabria-1. These wells also tested and confrrmed the proposed basin model. No commercially viable oil or gas was encountered although evidence of its former existence was found. In addition to the petroleum exploration, indeed as a consequence of it, the association of the extensive base metal and other mineralisation in the Mount Isa Basin with hydrocarbons could not be overlooked. A comprehensive analysis of the available data suggests a link between the migration and possible generation or destruction of hydrocarbons and metal bearing fluids. Consequently, base metal exploration based on hydrocarbon exploration concepts is probably. the most effective technique in such basins. The metal-hydrocarbon-sedimentary basin-plate tectonic association (analogous to Phanerozoic models) is a compelling outcome of this work on the Palaeo- to Mesoproterozoic Mount lsa Basin. Petroleum within the Bowthom Block was apparently destroyed by hot brines that produced many ore deposits elsewhere in the basin.
Resumo:
This research has established, through ultrasound, near infrared spectroscopy and biomechanics experiments, parameters and parametric relationships that can form the framework for quantifying the integrity of the articular cartilage-on-bone laminate, and objectively distinguish between normal/healthy and abnormal/degenerated joint tissue, with a focus on articular cartilage. This has been achieved by: 1. using traditional experimental methods to produce new parameters for cartilage assessment; 2. using novel methodologies to develop new parameters; and 3. investigating the interrelationships between mechanical, structural and molec- ular properties to identify and select those parameters and methodologies that can be used in a future arthroscopic probe based on points 1 and 2. By combining the molecular, micro- and macro-structural characteristics of the tissue with its mechanical properties, we arrive at a set of critical benchmarking parameters for viable and early-stage non-viable cartilage. The interrelationships between these characteristics, examined using a multivariate analysis based on principal components analysis, multiple linear regression and general linear modeling, could then to deter- mine those parameters and relationships which have the potential to be developed into a future clinical device. Specifically, this research has found that the ultrasound and near infrared techniques can subsume the mechanical parameters and combine to characterise the tissue at the molecular, structural and mechanical levels over the full depth of the cartilage matrix. It is the opinion in this thesis that by enabling the determination of the precise area of in uence of a focal defect or disease in the joint, demarcating the boundaries of articular cartilage with dierent levels of degeneration around a focal defect, better surgical decisions that will advance the processes of joint management and treatment will be achieved. Providing the basis for a surgical tool, this research will contribute to the enhancement and quanti�cation of arthroscopic procedures, extending to post- treatment monitoring and as a research tool, will enable a robust method for evaluating developing (particularly focalised) treatments.
Resumo:
In 1984, the International Agency for Research on Cancer determined that working in the primary aluminium production process was associated with exposure to certain polycyclic aromatic hydrocarbons (PAHs) that are probably carcinogenic to humans. Key sources of PAH exposure within the occupational environment of a prebake aluminium smelter are processes associated with use of coal-tar pitch. Despite the potential for exposure via inhalation, ingestion and dermal adsorption, to date occupational exposure limits exist only for airborne contaminants. This study, based at a prebake aluminium smelter in Queensland, Australia, compares exposures of workers who came in contact with PAHs from coal-tar pitch in the smelter’s anode plant (n = 69) and cell-reconstruction area (n = 28), and a non-production control group (n = 17). Literature relevant to PAH exposures in industry and methods of monitoring and assessing occupational hazards associated with these compounds are reviewed, and methods relevant to PAH exposure are discussed in the context of the study site. The study utilises air monitoring of PAHs to quantify exposure via the inhalation route and biological monitoring of 1-hydroxypyrene (1-OHP) in urine of workers to assess total body burden from all routes of entry. Exposures determined for similar exposure groups, sampled over three years, are compared with published occupational PAH exposure limits and/or guidelines. Results of paired personal air monitoring samples and samples collected for 1-OHP in urine monitoring do not correlate. Predictive ability of the benzene-soluble fraction (BSF) in personal air monitoring in relation to the 1-OHP levels in urine is poor (adjusted R2 < 1%) even after adjustment for potential confounders of smoking status and use of personal protective equipment. For static air BSF levels in the anode plant, the median was 0.023 mg/m3 (range 0.002–0.250), almost twice as high as in the cell-reconstruction area (median = 0.013 mg/m3, range 0.003–0.154). In contrast, median BSF personal exposure in the anode plant was 0.036 mg/m3 (range 0.003–0.563), significantly lower than the median measured in the reconstruction area (0.054 mg/m3, range 0.003–0.371) (p = 0.041). The observation that median 1-OHP levels in urine were significantly higher in the anode plant than in the reconstruction area (6.62 µmol/mol creatinine, range 0.09–33.44 and 0.17 µmol/mol creatinine, range 0.001–2.47, respectively) parallels the static air measurements of BSF rather than the personal air monitoring results (p < 0.001). Results of air measurements and biological monitoring show that tasks associated with paste mixing and anode forming in the forming area of the anode plant resulted in higher PAH exposure than tasks in the non-forming areas; median 1-OHP levels in urine from workers in the forming area (14.20 µmol/mol creatinine, range 2.02–33.44) were almost four times higher than those obtained from workers in the non-forming area (4.11 µmol/mol creatinine, range 0.09–26.99; p < 0.001). Results justify use of biological monitoring as an important adjunct to existing measures of PAH exposure in the aluminium industry. Although monitoring of 1-OHP in urine may not be an accurate measure of biological effect on an individual, it is a better indicator of total PAH exposure than BSF in air. In January 2005, interim study results prompted a plant management decision to modify control measures to reduce skin exposure. Comparison of 1-OHP in urine from workers pre- and post-modifications showed substantial downward trends. Exposure via the dermal route was identified as a contributor to overall dose. Reduction in 1-OHP urine concentrations achieved by reducing skin exposure demonstrate the importance of exposure via this alternative pathway. Finally, control measures are recommended to ameliorate risk associated with PAH exposure in the primary aluminium production process, and suggestions for future research include development of methods capable of more specifically monitoring carcinogenic constituents of PAH mixtures, such as benzo[a]pyrene.
Resumo:
Digital collections are growing exponentially in size as the information age takes a firm grip on all aspects of society. As a result Information Retrieval (IR) has become an increasingly important area of research. It promises to provide new and more effective ways for users to find information relevant to their search intentions. Document clustering is one of the many tools in the IR toolbox and is far from being perfected. It groups documents that share common features. This grouping allows a user to quickly identify relevant information. If these groups are misleading then valuable information can accidentally be ignored. There- fore, the study and analysis of the quality of document clustering is important. With more and more digital information available, the performance of these algorithms is also of interest. An algorithm with a time complexity of O(n2) can quickly become impractical when clustering a corpus containing millions of documents. Therefore, the investigation of algorithms and data structures to perform clustering in an efficient manner is vital to its success as an IR tool. Document classification is another tool frequently used in the IR field. It predicts categories of new documents based on an existing database of (doc- ument, category) pairs. Support Vector Machines (SVM) have been found to be effective when classifying text documents. As the algorithms for classifica- tion are both efficient and of high quality, the largest gains can be made from improvements to representation. Document representations are vital for both clustering and classification. Representations exploit the content and structure of documents. Dimensionality reduction can improve the effectiveness of existing representations in terms of quality and run-time performance. Research into these areas is another way to improve the efficiency and quality of clustering and classification results. Evaluating document clustering is a difficult task. Intrinsic measures of quality such as distortion only indicate how well an algorithm minimised a sim- ilarity function in a particular vector space. Intrinsic comparisons are inherently limited by the given representation and are not comparable between different representations. Extrinsic measures of quality compare a clustering solution to a “ground truth” solution. This allows comparison between different approaches. As the “ground truth” is created by humans it can suffer from the fact that not every human interprets a topic in the same manner. Whether a document belongs to a particular topic or not can be subjective.
Resumo:
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.
Resumo:
Governments around the world are increasingly investing in information and communications technology (ICT) as a means of improving service delivery to citizens. Government ICT adoption is also being driven by a desire to streamline information accessibility and information flows within government - both between different levels of government and between different departments at the same level. Increasing the availability of information internally and to citizens has clear and compelling benefits but it also carries risks that must be carefully managed. This talk will examine the implications of such E-government initiatives for a range of compliance obligations, with a focus on information privacy. It will review recent developments in the area of systems-based enforcement of privacy policies and the particular privacy challenges presented by the aggregation of geospatial information.
Resumo:
China has a reputation as an economy based on utility: the large-scale manufacture of low-priced goods. But useful values like functionality, fitness for purpose and efficiency are only part of the story. More important are what Veblen called ‘honorific’ values, arguably the driving force of development, change and value in any economy. To understand the Chinese economy therefore, it is not sufficient to point to its utilitarian aspect. Honorific status-competition is a more fundamental driver than utilitarian cost-competition. We argue that ‘social network markets’ are the expression of these honorific values, relationships and connections that structure and coordinate individual choices. This paper explores how such markets are developing in China in the area of fashion and fashion media. These, we argue, are an expression of ‘risk culture’ for high-end entrepreneurial consumers and producers alike, providing a stimulus to dynamic innovation in the arena of personal taste and comportment, as part of an international cultural system based on constant change. We examine the launch of Vogue China in 2005, and China’s reception as a fashion player among the international editions of Vogue, as an expression of a ‘decisive moment’ in the integration of China into an international social network market based on honorific values.
Resumo:
Findings from an Australian case study of adult women expose general, light and basic use of mobile phones. Participants used their mobile phone mainly for coordination and to a lesser extent for practicing intrinsic interactions motivated by emotional support purposes. This paper focuses on social and emotional support over the mobile phone. Though crucial to individuals, emotional support seems to be a neglected area of research among mobile communication studies, all the more so when focusing on adult women. This study addresses this literature gap. The empirical findings are based on a case study of 26 women over 35 years of age residing in one coastal Australian town. The research design included a combination of quantitative and qualitative methods. This paper examines the communication methods adult women use for social and emotional support, and analyses reasons and social implications of this limited intrinsic communication use pattern over the mobile phone.
Resumo:
User-Web interactions have emerged as an important area of research in the field of information science. In this study, we investigate the effects of users’ cognitive styles on their Web navigational styles and information processing strategies. We report results from the analyses of 594 minutes recorded Web search sessions of 18 participants engaged in 54 scenario-based search tasks. We use questionnaires, cognitive style test, Web session logs and think-aloud as the data collection instruments. We classify users’ cognitive styles as verbalisers and imagers based on Riding’s (1991) Cognitive Style Analysis test. Two classifications of navigational styles and three categories of information processing strategies are identified. Our study findings show that there exist relationships between users’ cognitive style, and their navigational styles and information processing strategies. Verbal users seem to display sporadic navigational styles, and adopt a scanning strategy to understand the content of the search result page, while imagery users follow a structured navigational style and reading approach. We develop a matrix and a model that depicts the relationships between users’ cognitive styles, and their navigational style and information processing strategies. We discuss how the findings from this study could help search engine designers to provide an adaptive navigation support to users.
Resumo:
This paper investigates the research question ‘What is the effect of co-ethnic and non coethnic networking on business performance in Chinese immigrant businesses?’ The research will discuss key themes such as the extent to which Chinese immigrant entrepreneurs are embedded in co-ethnic and non co-ethnic networks and the affect of embeddedness on business performance, such as the entrepreneur’s satisfaction and business growth. Research on immigrant entrepreneurship has emerged as an important new area of inquiry within the field of entrepreneurship. The increased importance of the subject is due in part to major immigrant receiving countries, such as Australia, the United States and Canada, experiencing a high growth rate in their immigrant population. Reflecting on the existing research on immigrant entrepreneurship, it was decided to investigate the role of embeddedness on entrepreneurial business performance. This research seeks to identify the impact of embeddedness in co-ethnic and non co-ethnic networks on business performance of Chinese immigrant entrepreneurs in Australia. Chinese immigrant restaurant entrepreneurs in southeast Queensland, Australia were studied. The result expands on existing research on immigrant entrepreneurship, since the majority of immigrant entrepreneurship studies have been conducted on the United States and Canada immigrant experiences, but few have been conducted in the Australian immigrant entrepreneur context. This thesis also adds empirical testing to a research area with little empirical testing. The results indicated that embeddedness in the co-ethnic network is positively related to business performance measured by both growth and satisfaction. Embeddedness in the non co-ethnic network of the Chinese immigrant entrepreneurs in Australia did not show a similar pattern in accordance with studies conducted in the United States and Canada. This result is interesting and creates the opportunity for future research employing a comparative study.
Resumo:
Driver aggression is a road safety issue of growing concern throughout most highly motorised countries, yet to date there is no comprehensive model that deals with this issue in the road safety area. This paper sets out to examine the current state of research and theory on aggressive driving with a view to incorporating useful developments in the area of human aggression from mainstream psychological research. As a first step, evidence regarding the prevalence and incidence of driver aggression, including the impact of the phenomenon on crash rates is reviewed. Inconsistencies in the definition and operationalisation of driver aggression that have hampered research in the area are noted. Existing models of driver aggression are then identified and the need to distinguish and address the role of intentionality as well as the purpose of perpetrating behaviours within both these and research efforts is highlighted. Drawing on recent findings from psychological research into general aggression, it is argued that progress in understanding driver aggression requires models that acknowledge not only the person-related and situational factors, but the cognitive and emotional appraisal processes involved in driver aggression. An effective model is expected to allow the explanation of not only the likelihood and severity of driver aggression behaviours, but also the escalation of incidents within the context of the road environment.
Resumo:
This study investigates the antecedents to clothing disposal methods in two countries: Scotland and Australia. Increasing volumes of textiles are disposed of in landfill sites to the detriment of the environment. Extant research has identified the influences affecting an increased rate of purchasing and the trend to keep clothing for an ever shorter time. As such, it is imperative to examine the factors that affect consumers’ choice of clothing disposal method as limited research has been undertaken in this area of socially responsible consumption. The results of a survey administered to a sample of female consumers in the two countries identify antecedents of three forms of clothing disposal methods: selling through eBay or second-hand shops, giving away to family or friends or donating to charities. Findings show differences between the countries regarding clothing disposal behaviour. Nevertheless, general recycling behaviour was found to be the strongest predictor for donating to charities in both countries.