356 resultados para Current records
Resumo:
Sustainable housing implementation requires strong support from the public, government and the housing industry. Lack of public awareness and understanding of the language and the meaning of sustainable housing may cause lack of public support. Salama stated that "sustainability or sustainable design is simply a rephrasing of some of the forgotten values of traditional architecture and urbanism"(Salama 2007). This exploratory paper examines public awareness of sustainable housing in Saudi Arabia. In developing countries, like Saudi Arabia, which have been experiencing a rapid rate of urbanisation, sustainable concept intervention is essential due to the scarcity of resources (Reffat 2004a). Sustainable building methods include the full use of the site design, passive solar design, natural light and ventilation. This paper reports on an exploratory survey on understanding the potential of the implementation of sustainable housing in Saudi Arabia. The main problem is that more than half of respondents were not aware of sustainable housing. Thus, one of the recommendations from the survey is to educate the public by using local media to inform people of the benefits of sustainable implementation to both new and existing housing stock.
Resumo:
Notwithstanding the obvious potential advantages of information and communications technology (ICT) in the enhanced provision of healthcare services, there are some concerns associated with integration of and access to electronic health records. A security violation in health records, such as an unauthorised disclosure or unauthorised alteration of an individual's health information, can significantly undermine both healthcare providers' and consumers' confidence and trust in e-health systems. A crisis in confidence in any national level e-health system could seriously degrade the realisation of the system's potential benefits. In response to the privacy and security requirements for the protection of health information, this research project investigated national and international e-health development activities to identify the necessary requirements for the creation of a trusted health information system architecture consistent with legislative and regulatory requirements and relevant health informatics standards. The research examined the appropriateness and sustainability of the current approaches for the protection of health information. It then proposed an architecture to facilitate the viable and sustainable enforcement of privacy and security in health information systems under the project title "Open and Trusted Health Information Systems (OTHIS)". OTHIS addresses necessary security controls to protect sensitive health information when such data is at rest, during processing and in transit with three separate and achievable security function-based concepts and modules: a) Health Informatics Application Security (HIAS); b) Health Informatics Access Control (HIAC); and c) Health Informatics Network Security (HINS). The outcome of this research is a roadmap for a viable and sustainable architecture for providing robust protection and security of health information including elucidations of three achievable security control subsystem requirements within the proposed architecture. The successful completion of two proof-of-concept prototypes demonstrated the comprehensibility, feasibility and practicality of the HIAC and HIAS models for the development and assessment of trusted health systems. Meanwhile, the OTHIS architecture has provided guidance for technical and security design appropriate to the development and implementation of trusted health information systems whilst simultaneously offering guidance for ongoing research projects. The socio-economic implications of this research can be summarised in the fact that this research embraces the need for low cost security strategies against economic realities by using open-source technologies for overall test implementation. This allows the proposed architecture to be publicly accessible, providing a platform for interoperability to meet real-world application security demands. On the whole, the OTHIS architecture sets a high level of security standard for the establishment and maintenance of both current and future health information systems. This thereby increases healthcare providers‘ and consumers‘ trust in the adoption of electronic health records to realise the associated benefits.
Resumo:
In the past, training in clinical psychology in Australia and overseas has been dominated by definitions of input— hours of classes or supervision and of specific components. While prospective practitioners have been required to demonstrate the acquisition of generic competencies, satisfaction of these input driven criteria has been required for both accreditation and registration. Ironically, for a discipline that prides itself on requiring empirical bases for practice and communicating those to students (Calhoun, Moras, Pilkonis, & Rehm, 1998), training criteria have been primarily derived from accepted wisdom, rather than from a sound body of data. The situation has been remarkably like that of a treatment establishing standards of fidelity before its effective components are known—an action our profession has correctly criticised in the past (Herbert & Mueser, 1992).
Resumo:
This paper seeks to explore how organisations can effectively use performance management systems (PMS) to monitor collective identities. The monitoring of relationships between identity and an influential PMS—the balanced scorecard (BSC)—are explored. Drawing from identity and management accounting literature, this paper argues that identity products, patternings and processes are commonly positioned, monitored and interpreted through the multiple perspectives and levels of the BSC. Specifically, human, technical and organisational capital under the Learning and Growth perspective of the BSC can incorporate various identity measures that sustain the relative, distinctive and fluid nature of identities. The value of this research is to strengthen the theoretical grounds which position identity as an important dimension of organisational capital in PMS.
Resumo:
This paper reports on an exploratory study of the role of web and social media in e-governments, especially in the context of Malaysia, with some comparisons and contrasts from other countries where such governmental efforts have been underway for awhile. It describes the current e-government efforts in Malaysia, and proposes that applying a theoretical framework would help understand the context and streamline these ongoing efforts. Specifically, it lays out a theoretical and cultural framework based on Mary Douglas’ (1996) Grid-Group Theory, Mircea Georgescu’s (2005) Three Pillars of E-Government, and Gerald Grant’s and Derek Chau’s (2006) Generic Framework for E-Government. Although this study is in its early stages, it has relevance to everyone who is interested in e-government efforts across the world, and especially relevant to developing countries.
Resumo:
Nowadays, business process management is an important approach for managing organizations from an operational perspective. As a consequence, it is common to see organizations develop collections of hundreds or even thousands of business process models. Such large collections of process models bring new challenges and provide new opportunities, as the knowledge that they encapsulate requires to be properly managed. Therefore, a variety of techniques for managing large collections of business process models is being developed. The goal of this paper is to provide an overview of the management techniques that currently exist, as well as the open research challenges that they pose.
Resumo:
This chapter looks at the challenges and opportunities of current affairs in British public service broadcasting
Resumo:
For more than a decade research in the field of context aware computing has aimed to find ways to exploit situational information that can be detected by mobile computing and sensor technologies. The goal is to provide people with new and improved applications, enhanced functionality and better use experience (Dey, 2001). Early applications focused on representing or computing on physical parameters, such as showing your location and the location of people or things around you. Such applications might show where the next bus is, which of your friends is in the vicinity and so on. With the advent of social networking software and microblogging sites such as Facebook and Twitter, recommender systems and so on context-aware computing is moving towards mining the social web in order to provide better representations and understanding of context, including social context. In this paper we begin by recapping different theoretical framings of context. We then discuss the problem of context- aware computing from a design perspective.
Resumo:
Previous research has indicated that road crashes are the most common form of work related fatalities (Haworth et al., 2000). Historically, industry has often taken a “silver bullet” approach developing and implementing a single countermeasure to address all their work related road safety issues, despite legislative requirements to discharge obligations through minimising risk and enhancing safety. This paper describes the results and implications from a series of work related road safety audits that were undertaken across five organisations to determine deficiencies in each organisation‟s safe driving management and practice. Researchers conducted a series of structured interviews, reviewed documentation relating to work related driving, and analysed vehicle related crash and incident records to determine each organisation‟s current situation in the management of work related road safety and driver behaviour. A number of consistent themes and issues across each organisation were identified relating to managing driver behaviour, organisational policies, incident recording and reporting, communication and education, and formalisation of key work related road safety strategies. Although organisations are required to undertake risk reduction strategies for all work related driving, the results of the research suggest that many organisations fail to systematically manage driver behaviour and mitigate work related road safety risk. Future improvements in work related road safety will require organisations to firstly acknowledge the high risk associated with drivers driving for work and secondly adopt comprehensive risk mitigation strategies in a similar manner to managing other workplace hazards.
Resumo:
This paper presents a three-dimensional numerical analysis of the electromagnetic forces within a high voltage superconducting Fault Current Limiter (FCL) with a saturated core under short-circuit conditions. The effects of electrodynamics forces in power transformer coils under short-circuit conditions have been reported widely. However, the coil arrangement in an FCL with saturated core differs significantly from existing reactive devices. The boundary element method is employed to perform an electromagnetic force analysis on an FCL. The analysis focuses on axial and radial forces of the AC coil. The results are compared to those of a power transformer and important design considerations are highlighted.
Resumo:
This paper reviews the current state in the application of infrared methods, particularly mid-infrared (mid-IR) and near infrared (NIR), for the evaluation of the structural and functional integrity of articular cartilage. It is noted that while a considerable amount of research has been conducted with respect to tissue characterization using mid-IR, it is almost certain that full-thickness cartilage assessment is not feasible with this method. On the contrary, the relatively more considerable penetration capacity of NIR suggests that it is a suitable candidate for full-thickness cartilage evaluation. Nevertheless, significant research is still required to improve the specificity and clinical applicability of the method if we are going to be able to use it for distinguishing between functional and dysfunctional cartilage.
Resumo:
Security and privacy in electronic health record systems have been hindering the growth of e-health systems since their emergence. The development of policies that satisfy the security and privacy requirements of different stakeholders in healthcare has proven to be difficult. But, these requirements have to be met if the systems developed are to succeed in achieving their intended goals. Access control is a fundamental security barrier for securing data in healthcare information systems. In this paper we present an access control model for electronic health records. We address patient privacy requirements, confidentiality of private information and the need for flexible access for health professionals for electronic health records. We carefully combine three existing access control models and present a novel access control model for EHRs which satisfies requirements of electronic health records.
Resumo:
In cross-organizational, distributed environments, Business Process Management requires collaborative technologies to facilitate the process of discovering, modeling, and improving business processes across geographical and organizational boundaries. This paper provides a comprehensive understanding of collaborative business process modeling that is based on a review of literature and a case study of three selected modelling tools. The application of the framework reveals that current process modeling tools consider different perspectives on collaboration, and that the included features are orthogonal. This paper informs practitioners about the state of the art in tool support for collaborative process modelling. It also informs vendors about opportunities to enhance the technology support. For research, our paper paper informs social aspects of BPM technology through its explicit focus on the collaboration of BPM stakeholders in the process of distributed modeling.
Resumo:
Observational seatbelt wearing studies are a valuable tool for obtaining up-to-date information about rates of use. Given that one quarter of vehicle occupants killed on Queensland roads in recent years were not wearing seatbelts, it is important that authorities are able to identify non-wearers and take steps to increase compliance with seatbelt laws to reduce the severity of crashes and, therefore, the road toll. An observational study of seatbelt use was conducted in metropolitan, regional and rural locations throughout Queensland in May and June, 2010. Trained observers took note of seatbelt use of all occupants of passenger vehicles, noting their gender, approximate age group, seating position, vehicle type, licence type (i.e. visible L or P plates), mobile phone use, and the date, time and location of the observation. Of 19,579 observations, 99.04% (19,391) of occupants were observed wearing seatbelts, as only 0.96% of occupants (188) were not wearing a seatbelt. There were differences in seatbelt wearing rates for a number of study variables, although most were very small. However, seatbelt wearing rates were 3.84% lower for drivers observed using a mobile phone than for those who were not. While compliance with seatbelt laws seems to be very high, it is still concerning that so few non-wearers represent a disproportionately large proportion of road fatalities and serious injuries in Queensland. Road safety authorities must therefore continue to find ways to improve seatbelt use, as small gains in wearing rates will translate into significant fatality reductions.
Resumo:
The cycling interaction between climate change and building performance is of dynamic nature and both are essentially the cause and the effect of each other. On one hand, buildings contribute significantly to the global warming process. On the other hand, climate change is also expected to impact on many aspects of building performance. In this paper, the status of current research on the implication of climate change on built environment is reviewed. It is found that although the present research has covered broad areas of research, they are generally only limited to the qualitative analyses. It is also highlighted that although it is widely realized that reducing greenhouse gas emissions from the building sector is very important, the adoption of complementary adaptation strategy to prepare the building for a range of climate change scenarios is also necessary. Due to the lack of holistic approach to generate future hourly weather data, various approaches have been used to generate different key weather variables. This ad hoc situation has seriously hindered the application of building simulation technique to the climate change impact study, in particular, to provide quantitative information for policy and design development.