130 resultados para access to knowledge


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Innovation Management (IM) in most knowledge based firms is used on an adhoc basis where senior managers use this term to leverage competitive edge without understanding its true meaning and how its robust application in organisation impacts organisational performance. There have been attempts in the manufacturing industry to harness the innovative potential of the business and apprehend its use as a point of difference to improve financial and non financial outcomes. However further work is required to innovatively extrapolate the lessons learnt to introduce incremental and/or radical innovation to knowledge based firms. An international structural engineering firm has been proactive in exploring and implementing this idea and has forged an alliance with the Queensland University of Technology to start the Innovation Management Program (IMP). The aim was to develop a permanent and sustainable program with which innovation can be woven through the fabric of the organisation. There was an intention to reinforce the firms’ vision and reinvigorate ideas and create new options that help in its realisation. This paper outlines the need for innovation in knowledge based firms and how this consulting engineering firm reacted to this exigency. The development of the Innovation Management Program, its different themes (and associated projects) and how they integrate to form a holistic model is also discussed. The model is designed around the need of providing professional qualification improvement opportunities for staff, setting-up organised, structured & easily accessible knowledge repositories to capture tacit and explicit knowledge and implement efficient project management strategies with a view to enhance client satisfaction. A Delphi type workshop is used to confirm the themes and projects. Some of the individual projects and their expected outcomes are also discussed. A questionnaire and interviews were used to collect data to select appropriate candidates responsible for leading these projects. Following an in-depth analysis of preliminary research results, some recommendations on the selection process will also be presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Young drivers aged 17-24 are consistently overrepresented in motor vehicle crashes. Research has shown that a young driver’s crash risk increases when carrying similarly aged passengers, with fatal crash risk increasing two to three fold with two or more passengers. Recent growth in access to and use of the internet has led to a corresponding increase in the number of web based behaviour change interventions. An increasing body of literature describes the evaluation of web based programs targeting risk behaviours and health issues. Evaluations have shown promise for such strategies with evidence for positive changes in knowledge, attitudes and behaviour. The growing popularity of web based programs is due in part to their wide accessibility, ability for personalised tailoring of intervention messages, and self-direction and pacing of online content. Young people are also highly receptive to the internet and the interactive elements of online programs are particularly attractive. The current study was designed to assess the feasibility for a web based intervention to increase the use of personal and peer protective strategies among young adult passengers. An extensive review was conducted on the development and evaluation of web based programs. Year 12 students were also surveyed about their use of the internet in general and for health and road safety information. All students reported internet access at home or at school, and 74% had searched for road safety information. Additional findings have shown promise for the development of a web based passenger safety program for young adults. Design and methodological issues will be discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Modern enterprise knowledge management systems typically require distributed approaches and the integration of numerous heterogeneous sources of information. A powerful foundation for these tasks can be Topic Maps, which not only provide a semantic net-like knowledge representation means and the possibility to use ontologies for modelling knowledge structures, but also offer concepts to link these knowledge structures with unstructured data stored in files, external documents etc. In this paper, we present the architecture and prototypical implementation of a Topic Map application infrastructure, the ‘Topic Grid’, which enables transparent, node-spanning access to different Topic Maps distributed in a network.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose: The purpose of the paper is to develop a framework for evaluation of accessibility for knowledge based cities. ----- ----- Design/methodology/approach: This approach notifies common mistakes and problems in accessibility assessment for knowledge cities. ----- ----- Originality/value: Accessibility plays a key role in transport sustainability and recognizes the crucial links between transport and sustainable goals like air quality, environmental resource consumption & social equity. In knowledge cities, accessibility has significant effects on quality of life and social equity by improving the mobility of people and goods. Accessibility also influences patterns of growth and economic health by providing access to land. Accessibility is not only one of the components of knowledge cities but also affects other elements of knowledge cities directly or indirectly. ----- ----- Practical implications: The outcomes of the application will be helpful for developing particular methodologies for evaluating knowledge cities. On other words, this methodology attempts to develop an assessment procedure for examining accessibility of knowledge-based cities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The ultimate goal of an authorisation system is to allocate each user the level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting because on one hand employees need enough access to perform their tasks, while on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally through carelessness, losing the information or being socially engineered to give access to an adversary. With the goal of developing a more dynamic authorisation model, we have adopted a game theoretic framework to reason about the factors that may affect users’ likelihood to misuse a permission at the time of an access decision. Game theory provides a useful but previously ignored perspective in authorisation theory: the notion of the user as a self-interested player who selects among a range of possible actions depending on their pay-offs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This is the final article in a series of three that examines the legal role of medical professionals in decisions to withhold or withdraw life-sustaining treatment from adults who lack capacity. This article considers the position in Victoria. A review of the law in this State reveals that medical professionals play significant legal roles in these decisions. However, the law is problematic in a number of respects and this is likely to impede medical professionals’ legal knowledge in this area. The article examines the level of training that medical professionals receive on issues such as refusal of treatment certificates and substitute decision-making, and the available empirical evidence as to the state of medical professionals’ knowledge of the law at the end of life. It concludes that there are gaps in legal knowledge and that law reform is needed in Victoria. The article also draws together themes from the series as a whole, including conclusions about the need for more and better medical education and about law reform generally.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the networked information driven world that we now inhabit the ability to access and reuse information, data and culture is a key ingredient to social, economic and cultural innovation. As government holds enormous amounts of publicly funded material that can be released to the public without breaching the law it should move to implement policies that will allow better access to and reuse of that information, knowledge and culture. The Queensland Government Information Licensing Framework (GILF) Project4 is one of the first projects in the world to systemically approach this issue and should be consulted as a best practice model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective: This paper asks whether Indigenous health policies might be improved if governments listened to Indigenous voices, both Australian and those who drafted the Declaration on the Rights of Indigenous Peoples, 2007. Methods: A fundamental tenet of the Declaration, which Australia endorsed in 2009, is respect for Indigenous knowledge and voice. The author analyses legal, cultural and historical sources for evidence of this respect. The metaphorical and empirical framework of the analysis is the epidemic of otitis media among Indigenous children. Results: A survey of Indigenous advice about health clearly demonstrates that access to their land and respect for the diversity of Indigenous cultures should inform health policies. Despite, however, claiming to consult Indigenous peoples, policy-makers have not been listening. In many Indigenous languages not listening, or ‘bad ears’, has connotations of disrespect. Conclusions: By turning a deaf ear to Indigenous knowledge governments are undermining any respect Indigenous peoples may have for them and their policies. A new approach is needed. Implications: The Declaration on the Rights of Indigenous Peoples can provide federal, state and territory governments with benchmarks against which health policy can be developed and implemented. Authentic consultation could restore Indigenous confidence in government policies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

High fidelity simulation as a teaching and learning approach is being embraced by many schools of nursing. Our school embarked on integrating high fidelity (HF) simulation into the undergraduate clinical education program in 2011. Low and medium fidelity simulation has been used for many years, but this did not simplify the integration of HF simulation. Alongside considerations of how and where HF simulation would be integrated, issues arose with: student consent and participation for observed activities; data management of video files; staff development, and conceptualising how methods for student learning could be researched. Simulation for undergraduate student nurses commenced as a formative learning activity, undertaken in groups of eight, where four students undertake the ‘doing’ role and four are structured observers, who then take a formal role in the simulation debrief. Challenges for integrating simulation into student learning included conceptualising and developing scenarios to trigger students’ decision making and application of skills, knowledge and attitudes explicit to solving clinical ‘problems’. Developing and planning scenarios for students to ‘try out’ skills and make decisions for problem solving lay beyond choosing pre-existing scenarios inbuilt with the software. The supplied scenarios were not concept based but rather knowledge, skills and technology (of the manikin) focussed. Challenges lay in using the technology for the purpose of building conceptual mastery rather than using technology simply because it was available. As we integrated use of HF simulation into the final year of the program, focus was on building skills, knowledge and attitudes that went beyond technical skill, and provided an opportunity to bridge the gap with theory-based knowledge that students often found difficult to link to clinical reality. We wished to provide opportunities to develop experiential knowledge based on application and clinical reasoning processes in team environments where problems are encountered, and to solve them, the nurse must show leadership and direction. Other challenges included students consenting for simulations to be videotaped and ethical considerations of this. For example if one student in a group of eight did not consent, did this mean they missed the opportunity to undertake simulation, or that others in the group may be disadvantaged by being unable to review their performance. This has implications for freely given consent but also for equity of access to learning opportunities for students who wished to be taped and those who did not. Alongside this issue were the details behind data management, storage and access. Developing staff with varying levels of computer skills to use software and undertake a different approach to being the ‘teacher’ required innovation where we took an experiential approach. Considering explicit learning approaches to be trialled for learning was not a difficult proposition, but considering how to enact this as research with issues of blinding, timetabling of blinded groups, and reducing bias for testing results of different learning approaches along with gaining ethical approval was problematic. This presentation presents examples of these challenges and how we overcame them.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The process of learning symbolic Arabic digits in early childhood requires that magnitude and spatial information integrates with the concept of symbolic digits. Previous research has separately investigated the development of automatic access to magnitude and spatial information from symbolic digits. However, developmental trajectories of symbolic number knowledge cannot be fully understood when considering components in isolation. In view of this, we have synthesized the existing lines of research and tested the use of both magnitude and spatial information with the same sample of British children in Years 1, 2 and 3 (6-8 years of age). The physical judgment task of the numerical Stroop paradigm (NSP) demonstrated that automatic access to magnitude was present from Year 1 and the distance effect signaled that a refined processing of numerical information had developed. Additionally, a parity judgment task showed that the onset of the Spatial-Numerical Association of Response Codes (SNARC) effect occurs in Year 2. These findings uncover the developmental timeline of how magnitude and spatial representations integrate with symbolic number knowledge during early learning of Arabic digits and resolve inconsistencies between previous developmental and experimental research lines.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is still no comprehensive information strategy governing access to and reuse of public sector information, applying on a nationwide basis, across all levels of government – local, state and federal - in Australia. This is the case both for public sector materials generally and for spatial data in particular. Nevertheless, the last five years have seen some significant developments in information policy and practice, the result of which has been a considerable lessening of the barriers that previously acted to impede the accessibility and reusability of a great deal of spatial and other material held by public sector agencies. Much of the impetus for change has come from the spatial community which has for many years been a proponent of the view “that government held information, and in particular spatial information, will play an absolutely critical role in increasing the innovative capacity of this nation.”1 However, the potential of government spatial data to contribute to innovation will remain unfulfilled without reform of policies on access and reuse as well as the pervasive practices of public sector data custodians who have relied on government copyright to justify the imposition of restrictive conditions on its use.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting. On one hand employees need enough access to the organisation’s resources in order to perform their jobs and on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally, through carelessness or being socially engineered to give access to an adversary. This thesis investigates issues of existing approaches to access control in allocating optimal level of access to users and proposes solutions in the form of new access control models. These issues are most evident when uncertainty surrounding users’ access needs, incentive to misuse and accountability are considered, hence the title of the thesis. We first analyse access control in environments where the administrator is unable to identify the users who may need access to resources. To resolve this uncertainty an administrative model with delegation support is proposed. Further, a detailed technical enforcement mechanism is introduced to ensure delegated resources cannot be misused. Then we explicitly consider that users are self-interested and capable of misusing resources if they choose to. We propose a novel game theoretic access control model to reason about and influence the factors that may affect users’ incentive to misuse. Next we study access control in environments where neither users’ access needs can be predicted nor they can be held accountable for misuse. It is shown that by allocating budget to users, a virtual currency through which they can pay for the resources they deem necessary, the need for a precise pre-allocation of permissions can be relaxed. The budget also imposes an upper-bound on users’ ability to misuse. A generalised budget allocation function is proposed and it is shown that given the context information the optimal level of budget for users can always be numerically determined. Finally, Role Based Access Control (RBAC) model is analysed under the explicit assumption of administrators’ uncertainty about self-interested users’ access needs and their incentives to misuse. A novel Budget-oriented Role Based Access Control (B-RBAC) model is proposed. The new model introduces the notion of users’ behaviour into RBAC and provides means to influence users’ incentives. It is shown how RBAC policy can be used to individualise the cost of access to resources and also to determine users’ budget. The implementation overheads of B-RBAC is examined and several low-cost sub-models are proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The impact of research can be measured by use or citation count. The more widely available that research outputs are; the more likely they are to be used, and the higher the impact. Making the author-manuscript version of research outputs freely available via the institutional repository greatly increases the availability of research outputs and can increase the impact. QUT ePrints, the open access institutional repository of research outputs at Queensland University of Technology (QUT), Australia, was established in 2003 and is managed by the QUT Library. The repository now contains over 39,000 records. More than 21,000 of these records have full-text copies attached as result of continuous effort to maintain momentum and encourage academic engagement. The full-text deposit rate has continued to increase over time and, in 2012 (August, at the time of writing), 88% of the records for works published in 2012 provide access to a full-text copy. Achieving success has required a long term approach to collaboration, open access advocacy, repository promotion, support for the deposit process, and ongoing system development. This paper discusses the various approaches adopted by QUT Library, in collaboration with other areas of the University, to achieve success. Approaches include mainstreaming the repository via having it report to the University Research and Innovation Committee; regular provision of deposit rate data to faculties; championing key academic supporters; and holding promotional competitions and events such as during Open Access Week. Support and training is provided via regular deposit workshops with academics and faculty research support groups and via the provision of online self-help information. Recent system developments have included the integration of citation data (from Scopus and Web of Science) and the development of a statistical reporting system which incentivise engagement.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The legal framework that operates at the end of life in Australia needs to be reformed. • Voluntary euthanasia and assisted suicide are currently unlawful. • Both activities nevertheless occur not infrequently in Australia, in part because palliative care cannot relieve physical and psychological pain and suffering in all cases. • In this respect, the law is deficient. The law is also unfair because it doesn’t treat people equally. Some people can be helped to die on their own terms as a result of their knowledge and/or connections while some are able to hasten their death by the refusal of life-sustaining treatment. But others do not have access to the means for their life to end. • A very substantial majority of Australians have repeatedly expressed in public opinion polls their desire for law reform on these matters. Many are concerned at what they see is happening to their loved ones as they reach the end of their lives, and want the confidence that when their time comes they will be able to exercise choice in relation to assisted dying. • The most consistent reason advanced not to change the law is the need to protect the vulnerable. There is a concern that if the law allows voluntary euthanasia and assisted suicide for some people, it will be expanded and abused, including pressures being placed on highly dependent people and those with disabilities to agree to euthanasia. • But there is now a large body of experience in a number of international jurisdictions following the legalisation of voluntary euthanasia and/or assisted suicide. This shows that appropriate safeguards can be implemented to protect vulnerable people and prevent the abuse that opponents of assisted dying have feared. It reveals that assisted dying meets a real need among a small minority of people at the end of their lives. It also provides reassurance to people with terminal and incurable disease that they will not be left to suffer the indignities and discomfort of a nasty death. • Australia is an increasingly secular society. Strong opposition to assisted death by religious groups that is based on their belief in divine sanctity of all human life is not a justification for denying choice for those who do not share that belief. • It is now time for Australian legislators to respond to this concern and this experience by legislating to enhance the quality of death for those Australians who seek assisted dying.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose - Researchers debate whether tacit knowledge sharing through Information Technology (IT) is actually possible. However, with the advent of social web tools, it has been argued that most shortcomings of tacit knowledge sharing are likely to disappear. This paper has two purposes: firstly, to demonstrate the existing debates in the literature regarding tacit knowledge sharing using IT, and secondly, to identify key research gaps that lay the foundations for future research into tacit knowledge sharing using social web. Design/methodology/approach - This paper reviews current literature on IT-mediated tacit knowledge sharing and opens a discussion on tacit knowledge sharing through the use of social web. Findings - First, the existing schools of thoughts in regards to IT ability for tacit knowledge sharing are introduced. Next, difficulties of sharing tacit knowledge through the use of IT are discussed. Then, potentials and pitfalls of social web tools are presented. Finally, the paper concludes that whilst there are significant theoretical arguments supporting that the social web facilitates tacit knowledge sharing there is a lack of empirical evidence to support these arguments and further work is required. Research limitations/implications - The limitations of the review includes: covering only papers that were published in English, issues of access to full texts of some resources, possibility of missing some resources due to search strings used or limited coverage of databases searched. Originality/value - The paper contributes to the fast growing literature on the intersection of KM and IT particularly by focusing on tacit knowledge sharing in social media space. The paper highlights the need for further studies in this area by discussing the current situation in the literature and disclosing the emerging questions and gaps for future studies.