228 resultados para Firearms owners
Resumo:
Wheel–rail interaction is one of the most important research topics in railway engineering. It involves track impact response, track vibration and track safety. Track structure failures caused by wheel–rail impact forces can lead to significant economic loss for track owners through damage to rails and to the sleepers beneath. Wheel–rail impact forces occur because of imperfections in the wheels or rails such as wheel flats, irregular wheel profiles, rail corrugations and differences in the heights of rails connected at a welded joint. A wheel flat can cause a large dynamic impact force as well as a forced vibration with a high frequency, which can cause damage to the track structure. In the present work, a three-dimensional (3-D) finite element (FE) model for the impact analysis induced by the wheel flat is developed by use of the finite element analysis (FEA) software package ANSYS and validated by another validated simulation. The effect of wheel flats on impact forces is thoroughly investigated. It is found that the presence of a wheel flat will significantly increase the dynamic impact force on both rail and sleeper. The impact force will monotonically increase with the size of wheel flats. The relationships between the impact force and the wheel flat size are explored from this finite element analysis and they are important for track engineers to improve their understanding of the design and maintenance of the track system.
Resumo:
Australia should introduce a transformative use exception. Transformative use is an important part of the copyright balance: it provides a mechanism through which to balance the rights of past authors against the interests of future authors. In the interests of promoting creativity and innovation, the impact of copyright law on the ability of Australians to create new works should be minimised. The scope of a transformative use exception should be based primarily on demonstrable harm to the direct licensing interests of copyright owners – the core of copyright. Importantly, however, there are unresolved questions about fairness that need to be more clearly addressed before the appropriate scope of a transformative use exception can be determined. This submission does not directly address the desirability of introducing a broader fair use right. It is likely that an open ended fair use exception is required to provide a more adequate balance between copyright owners and non-transformative users of copyright. If a broad fair use style exception is introduced, it would likely be desirable to include transformative uses within that exception. This submission, however, takes the more limited position that regardless of whether a fair use exception is introduced, an exception that permits unlicensed transformative uses is required in Australian copyright law.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Series reactors are used in distribution grids to reduce the short-circuit fault level. Some of the disadvantages of the application of these devices are the voltage drop produced across the reactor and the steep front rise of the transient recovery voltage (TRV), which generally exceeds the rating of the associated circuit breaker. Simulations were performed to compare the characteristics of a saturated core High-Temperature Superconducting Fault Current Limiter (HTS FCL) and a series reactor. The design of the HTS FCL was optimized using the evolutionary algorithm. The resulting Pareto frontier curve of optimum solution is presented in this paper. The results show that the steady-state impedance of an HTS FCL is significantly lower than that of a series reactor for the same level of fault current limiting. Tests performed on a prototype 11 kV HTS FCL confirm the theoretical results. The respective transient recovery voltages (TRV) of the HTS FCL and an air core reactor of comparable fault current limiting capability are also determined. The results show that the saturated core HTS FCL has a significantly lower effect on the rate of rise of the circuit breaker TRV as compared to the air core reactor. The simulations results are validated with shortcircuit test results.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
The player experience is at the core of videogame play. Understanding the facets of player experience presents many research challenges, as the phenomenon sits at the intersection of psychology, design, human-computer interaction, sociology, and physiology. This workshop brings together an interdisciplinary group of researchers to systematically and rigorously analyse all aspects of the player experience. Methods and tools for conceptualising, operationalising and measuring the player experience form the core of this research. Our aim is to take a holistic approach to identifying, adapting and extending theories and models of the player experience, to understand how these theories and models interact, overlap and differ, and to construct a unified vision for future research.
Resumo:
Principal Topic Counties in Northern Europe, such as Sweden, Finland and Denmark, have comparatively low per capita rates of entrepreneurship as measured by independent new venture start-up rates – as for example measured by the Global Entrepreneurship Monitor (GEM) Total entrepreneurial activity (TEA) rate. However, the latest 2011 GEM data reveals that these same countries have comparatively very high Employee Entrepreneurship Activity (EEA) rates – that is a high rate per capita of employees involved in new product development or new enterprise activities. This observation has prompted us to investigate the role of national culture in driving independent versus employee entrepreneurial activities. Prior research has established that national (and regional) culture plays an important role in forming an “entrepreneurial culture” that encourages (or discourages) independent business start-ups and TEA (e.g. Davidsson, 1995; Beugelsdijk, 2007). However, the relationship of culture and EEA has not received research attention. Moreover, empirical relationships between elements of national culture and independent entrepreneurship have revealed some surprising results. For example, Wildeman et al. (1999) report an unexpected higher share of individual business ownership in countries that have higher uncertainty avoidance, higher power distance and lower individualism according to Hofstede’s dimensions of culture. They speculate that dissatisfaction can be a source of entrepreneurship: in countries with a high power distance, a high uncertainty avoidance and low individualism, there may be relatively more business owners since enterprising individuals cannot satisfy their needs within existing organizations. Yet it remains a rather open question whether entrepreneurial behaviour in existing organisations provides a satisfactory explanation for these empirical findings. Methods We will conduct a cross sectional study of the influence of national culture according to the five / six dimensions of Hofstede (1980; 2001) on both TEA and EEA for the 54 countries that participated in GEM 2011. Since it is well established that the opportunities for entrepreneurship vary substantially with a country’s level of economic development, we intend to conduct separate analyses for the three categories of development – innovation driven economies, efficient driven economies and factor driven economies. We also intend to restrict our assessment of TEA to opportunity driven entrepreneurship, as necessity driven entrepreneurship has a different relationship to the “entrepreneurial culture” that is the focus of our study. We will control for a range of factors such as GDP growth, ease of doing business index and unemployment. Results and Implications Descriptive analyses of the GEM TEA and EEA data reveal clusters of countries that appear to be have similar national culture. We are yet to conduct regression analyses.
Resumo:
Young novice drivers - that is, drivers aged 16-25 years who are relatively inexperienced in driving on the road and have a novice (Learner, Provisional) driver's licence - have been overrepresented in car crash, injury and fatality statistics around the world for decades. There are numerous persistent characteristics evident in young novice driver crashes, fatalities and offences, including variables relating to the young driver themselves, broader social influences which include their passengers, the car they drive, and when and how they drive, and their risky driving behaviour in particular. Moreover, there are a range of psychosocial factors influencing the behaviour of young novice drivers, including the social influences of parents and peers, and person-related factors such as age-related factors, attitudes, and sensation seeking. Historically, a range of approaches have been developed to manage the risky driving behaviour of young novice drivers. Traditional measures predominantly relying upon education have had limited success in regulating the risky driving behaviour of the young novice driver. In contrast, interventions such as graduated driver licensing (GDL) which acknowledges young novice drivers' limitations - principally pertaining to their chronological and developmental age, and their driving inexperience - have shown to be effective in ameliorating this pervasive public health problem. In practice, GDL is a risk management tool that is designed to reduce driving at risky times (e.g., at night) or in risky driving conditions (e.g., with passengers), while still enabling novice drivers to obtain experience. In this regard, the GDL program in Queensland, Australia, was considerably enhanced in July 2007, and major additions to the program include mandated Learner practice of 100 hours recorded in a logbook, and passenger limits during night driving in the Provisional phase. Road safety researchers have also continued to consider the influential role played by the young driver's psychosocial characteristics, including psychological traits and states. In addition, whilst the majority of road safety user research is epidemiological in nature, contemporary road safety research is increasingly applying psychological and criminological theories. Importantly, such theories not only can guide young novice driver research, they can also inform the development and evaluation of countermeasures targeting their risky driving behaviour. The research is thus designed to explore the self-reported behaviours - and the personal, psychosocial, and structural influences upon the behaviours - of young novice drivers This thesis incorporates three stages of predominantly quantitative research to undertake a comprehensive investigation of the risky driving behaviour of young novices. Risky driving behaviour increases the likelihood of the young novice driver being involved in a crash which may harm themselves or other road users, and deliberate risky driving such as driving in excess of the posted speed limits is the focus of the program of research. The extant literature examining the nature of the risky behaviour of the young novice driver - and the contributing factors for this behaviour - while comprehensive, has not led to the development of a reliable instrument designed specifically to measure the risky behaviour of the young novice driver. Therefore the development and application of such a tool (the Behaviour of Young Novice Drivers Scale, or BYNDS) was foremost in the program of research. In addition to describing the driving behaviours of the young novice, a central theme of this program of research was identifying, describing, and quantifying personal, behavioural, and environmental influences upon young novice driver risky behaviour. Accordingly the 11 papers developed from the three stages of research which comprise this thesis are framed within Bandura's reciprocal determinism model which explicitly considers the reciprocal relationship between the environment, the person, and their behaviour. Stage One comprised the foundation research and operationalised quantitative and qualitative methodologies to finalise the instrument used in Stages Two and Three. The first part of Stage One involved an online survey which was completed by 761 young novice drivers who attended tertiary education institutions across Queensland. A reliable instrument for measuring the risky driving behaviour of young novices was developed (the BYNDS) and is currently being operationalised in young novice driver research in progress at the Centre for Injury Research and Prevention in Philadelphia, USA. In addition, regression analyses revealed that psychological distress influenced risky driving behaviour, and the differential influence of depression, anxiety, sensitivity to punishments and rewards, and sensation seeking propensity were explored. Path model analyses revealed that punishment sensitivity was mediated by anxiety and depression; and the influence of depression, anxiety, reward sensitivity and sensation seeking propensity were moderated by the gender of the driver. Specifically, for males, sensation seeking propensity, depression, and reward sensitivity were predictive of self-reported risky driving, whilst for females anxiety was also influential. In the second part of Stage One, 21 young novice drivers participated in individual and small group interviews. The normative influences of parents, peers, and the Police were explicated. Content analysis supported four themes of influence through punishments, rewards, and the behaviours and attitudes of parents and friends. The Police were also influential upon the risky driving behaviour of young novices. The findings of both parts of Stage One informed the research of Stage Two. Stage Two was a comprehensive investigation of the pre-Licence and Learner experiences, attitudes, and behaviours, of young novice drivers. In this stage, 1170 young novice drivers from across Queensland completed an online or paper survey exploring their experiences, behaviours and attitudes as a pre- and Learner driver. The majority of novices did not drive before they were licensed (pre-Licence driving) or as an unsupervised Learner, submitted accurate logbooks, intended to follow the road rules as a Provisional driver, and reported practicing predominantly at the end of the Learner period. The experience of Learners in the enhanced-GDL program were also examined and compared to those of Learner drivers who progressed through the former-GDL program (data collected previously by Bates, Watson, & King, 2009a). Importantly, current-GDL Learners reported significantly more driving practice and a longer Learner period, less difficulty obtaining practice, and less offence detection and crash involvement than Learners in the former-GDL program. The findings of Stage Two informed the research of Stage Three. Stage Three was a comprehensive exploration of the driving experiences, attitudes and behaviours of young novice drivers during their first six months of Provisional 1 licensure. In this stage, 390 of the 1170 young novice drivers from Stage Two completed another survey, and data collected during Stages Two and Three allowed a longitudinal investigation of self-reported risky driving behaviours, such as GDL-specific and general road rule compliance; risky behaviour such as pre-Licence driving, crash involvement and offence detection; and vehicle ownership, paying attention to Police presence, and punishment avoidance. Whilst the majority of Learner and Provisional drivers reported compliance with GDL-specific and general road rules, 33% of Learners and 50% of Provisional drivers reported speeding by 10-20 km/hr at least occasionally. Twelve percent of Learner drivers reported pre-Licence driving, and these drivers were significantly more risky as Learner and Provisional drivers. Ten percent of males and females reported being involved in a crash, and 10% of females and 18% of males had been detected for an offence, within the first six months of independent driving. Additionally, 75% of young novice drivers reported owning their own car within six months of gaining their Provisional driver's licence. Vehicle owners reported significantly shorter Learner periods and more risky driving exposure as a Provisional driver. Paying attention to Police presence on the roads appeared normative for young novice drivers: 91% of Learners and 72% of Provisional drivers reported paying attention. Provisional drivers also reported they actively avoided the Police: 25% of males and 13% of females; 23% of rural drivers and 15% of urban drivers. Stage Three also allowed the refinement of the risky behaviour measurement tool (BYNDS) created in Stage One; the original reliable 44-item instrument was refined to a similarly reliable 36-item instrument. A longitudinal exploration of the influence of anxiety, depression, sensation seeking propensity and reward sensitivity upon the risky behaviour of the Provisional driver was also undertaken using data collected in Stages Two and Three. Consistent with the research of Stage One, structural equation modeling revealed anxiety, reward sensitivity and sensation seeking propensity predicted self-reported risky driving behaviour. Again, gender was a moderator, with only reward sensitivity predicting risky driving for males. A measurement model of Akers' social learning theory (SLT) was developed containing six subscales operationalising the four constructs of differential association, imitation, personal attitudes, and differential reinforcement, and the influence of parents and peers was captured within the items in a number of these constructs. Analyses exploring the nature and extent of the psychosocial influences of personal characteristics (step 1), Akers' SLT (step 2), and elements of the prototype/willingness model (PWM) (step 3) upon self-reported speeding by the Provisional driver in a hierarchical multiple regression model found the following significant predictors: gender (male), car ownership (own car), reward sensitivity (greater sensitivity), depression (greater depression), personal attitudes (more risky attitudes), and speeding (more speeding) as a Learner. The research findings have considerable implications for road safety researchers, policy-makers, mental health professionals and medical practitioners alike. A broad range of issues need to be considered when developing, implementing and evaluating interventions for both the intentional and unintentional risky driving behaviours of interest. While a variety of interventions have been historically utilised, including education, enforcement, rehabilitation and incentives, caution is warranted. A multi-faceted approach to improving novice road safety is more likely to be effective, and new and existing countermeasures should capitalise on the potential of parents, peers and Police to be a positive influence upon the risky behaviour of young novice drivers. However, the efficacy of some interventions remains undetermined at this time. Notwithstanding this caveat, countermeasures such as augmenting and strengthening Queensland's GDL program and targeting parents and adolescents particularly warrant further attention. The findings of the research program suggest that Queensland's current-GDL can be strengthened by increasing compliance of young novice drivers with existing conditions and restrictions. The rates of speeding reported by the young Learner driver are particularly alarming for a number of reasons. The Learner is inexperienced in driving, and travelling in excess of speed limits places them at greater risk as they are also inexperienced in detecting and responding appropriately to driving hazards. In addition, the Learner period should provide the foundation for a safe lifetime driving career, enabling the development and reinforcement of non-risky driving habits. Learners who sped reported speeding by greater margins, and at greater frequencies, when they were able to drive independently. Other strategies could also be considered to enhance Queensland's GDL program, addressing both the pre-Licence adolescent and their parents. Options that warrant further investigation to determine their likely effectiveness include screening and treatment of novice drivers by mental health professionals and/or medical practitioners; and general social skills training. Considering the self-reported pre-licence driving of the young novice driver, targeted education of parents may need to occur before their child obtains a Learner licence. It is noteworthy that those participants who reported risky driving during the Learner phase also were more likely to report risky driving behaviour during the Provisional phase; therefore it appears vital that the development of safe driving habits is encouraged from the beginning of the novice period. General education of parents and young novice drivers should inform them of the considerably-increased likelihood of risky driving behaviour, crashes and offences associated with having unlimited access to a vehicle in the early stages of intermediate licensure. Importantly, parents frequently purchase the car that is used by the Provisional driver, who typically lives at home with their parents, and therefore parents are ideally positioned to monitor the journeys of their young novice driver during this early stage of independent driving. Parents are pivotal in the development of their driving child: they are models who are imitated and are sources of attitudes, expectancies, rewards and punishments; and they provide the most driving instruction for the Learner. High rates of self-reported speeding by Learners suggests that GDL programs specifically consider the nature of supervision during the Learner period, encouraging supervisors to be vigilant to compliance with general and GDL-specific road rules, and especially driving in excess of speed limit. Attitudes towards driving are formed before the adolescent reaches the age when they can be legally licensed. Young novice drivers with risky personal attitudes towards driving reported more risky driving behaviour, suggesting that countermeasures should target such attitudes and that such interventions might be implemented before the adolescent is licensed. The risky behaviours and attitudes of friends were also found to be influential, and given that young novice drivers tend to carry their friends as their passengers, a group intervention such as provided in a school class context may prove more effective. Social skills interventions that encourage the novice to resist the negative influences of their friends and their peer passengers, and to not imitate the risky driving behaviour of their friends, may also be effective. The punishments and rewards anticipated from and administered by friends were also found to influence the self-reported risky behaviour of the young novice driver; therefore young persons could be encouraged to sanction the risky, and to reward the non-risky, driving of their novice friends. Adolescent health programs and related initiatives need to more specifically consider the risks associated with driving. Young novice drivers are also adolescents, a developmental period associated with depression and anxiety. Depression, anxiety, and sensation seeking propensity were found to be predictive of risky driving; therefore interventions targeting psychological distress, whilst discouraging the expression of sensation seeking propensity whilst driving, warrant development and trialing. In addition, given that reward sensitivity was also predictive, a scheme which rewards novice drivers for safe driving behaviour - rather than rewarding the novice through emotional and instrumental rewards for risky driving behaviour - requires further investigation. The Police were also influential in the risky driving behaviour of young novices. Young novice drivers who had been detected for an offence, and then avoided punishment, reacted differentially, with some drivers appearing to become less risky after the encounter, whilst for others their risky behaviour appeared to be reinforced and therefore was more likely to be performed again. Such drivers saw t
Resumo:
Knowledge is a commodity. It is a by-product of learning that involves the creation, sharing, processing and possible use of information in the mind of an individual. Knowledge management (KM) is, therefore, concerned with the effective implementation of such activities within the organisation. It is simply the process of leveraging organisational knowledge to deliver a long-term competitive advantage. This paper presents the results of an empirical research investigation into the interaction between different KM activities within the context of construction contracting organisations. The different KM activities include: responsiveness to the knowledge of business environment, knowledge acquisition, knowledge dissemination, and knowledge application. A questionnaire survey was administered to investigate the opinions of construction professionals regarding the intensity of activities currently implemented by their organisations to facilitate knowledge capturing, sharing and application. A total of 149 responses were then used to statistically examine the inter-relationships between the different KM activities as practised by contracting organisations in Hong Kong. The paper presents and discusses the survey findings and proposes recommendations for improving the effectiveness of current KM practices.
Resumo:
In 2003, the Green Building Council of Australia (GBCA) launched their Green Star rating tools for various types of buildings in order to promote green building practice in Australia. Of these, the Green Star-Office Interior rating tool is designed for building owners, tenants and interior designers to assess the environmental impact of an interior fitout. It covers a number of categories, including Management, Indoor Environment Quality, Energy, Transport, Water, Materials, Land Use and Ecology, Emissions, and Innovation. This paper reviews the usage of the Green Star system in Australian office tenancy fitouts and the potential challenges associated with Green Star-Office Interior implementation. This involves the analysis of score sheets of 66 office interior projects across Australia that achieved Green Star certification. The percentage of green star points obtained within each category and sub-categories (credits) for each project are investigated to illustrate the achievement of credits. The results show that Emission-related credits and Innovation related credits are the easiest and most difficult respectively to obtain. It is also found that 6 Green Star office interior projects perform especially better in the categories of Energy and Ecology than 4 and 5 Star projects. The investigation of point frequency in each category provides prospective Green Star applicants with insights into credit achievement for future projects.
Resumo:
We report on an accurate numerical scheme for the evolution of an inviscid bubble in radial Hele-Shaw flow, where the nonlinear boundary effects of surface tension and kinetic undercooling are included on the bubble-fluid interface. As well as demonstrating the onset of the Saffman-Taylor instability for growing bubbles, the numerical method is used to show the effect of the boundary conditions on the separation (pinch-off) of a contracting bubble into multiple bubbles, and the existence of multiple possible asymptotic bubble shapes in the extinction limit. The numerical scheme also allows for the accurate computation of bubbles which pinch off very close to the theoretical extinction time, raising the possibility of computing solutions for the evolution of bubbles with non-generic extinction behaviour.
Resumo:
Humans have altered environments and enhanced their wellbeing unlike any other creature on the planet (Hielman & Donda, 2007); this is no different whether the environment is ecological, social or organizational. In recent times, the debate regarding greenhouse effects on the global weather patterns and the sustainment of the earth’s temperature necessary for life support has become quite infamously problematic as society pushes to find new sources of energy both renewable and environmentally sustainable. The feedback received on CSG from both government and companies alike is that the opportunities this industry creates has a lasting range of social and economic benefits worth over fifty (50) billion dollars in projects (Queensland Government, 2013). This however, has been overshadowed by social activist and lobbyist groups as ‘Lock the Gate Alliance’ saying, as one part of their report noted from the National Water Commission, “coal seam gas development could cause significant social impacts by disrupting current land-use practices and the local environment through infrastructure construction and access” (Lock the Gate Alliance, n.d.), and “In recent years both a NSW and Federal Senate inquiry into coal seam gas production were deliberately mislead by an organization that claims to work on behalf of the farming community, This is the battle for the end of the fossil fuel industry. This is the end game..." (Ward, 2013).
Resumo:
Purpose - The paper aims to improve consumer awareness of the complexities of community living. It does this by clarifying how living in a managed community is different from a ‘traditional’ neighbourhood; and identifying matters that can become disputes Design/methodology/approach - The paper builds on research by other authors into strata scheme disputes by examining recent Queensland cases. Findings - Many disputes appear to result from a lack of understanding of the complexities of community living. Matters that should be able to be easily resolved are therefore escalated to formal disputes. Research limitations/implications - The paper considers law and cases from Queensland. The types of matters considered, however, are relevant for any managed community and therefore the research is relevant for all jurisdictions. The research will be of particular interest to jurisdictions looking to boost living density by increasing the development of managed communities. Practical implications - The research will assist in consumer transactions by providing guidance as to the matters to be considering prior to moving into a managed community. More informed decision making by prospective residents will lead to a decreased likelihood of disputes arising. Originality/value - The paper is an up-to-date consideration of the issues arising from community living. It highlights the benefits arising from increased consumer awareness of the complexities of community living and the potential for consumer education to reduce the number of disputes.
Resumo:
Purpose – The question of whether female-owned firms underperform male-owned firms has triggered much research and discussion. Klapper and Parker's review concluded that the majority of prior research suggests that female-owned firms underperform relative to male-owned firms. However, using performance measures that control for size and risk (and after controlling for demographic differences such as industry, experience and hours worked) Robb and Watson found no gender performance difference in their sample of newly established US firms. The aim of this study, therefore, is to replicate Robb and Watson's study to determine whether their findings can be generalized to another geographical location, Australia. Design/methodology/approach – The authors test the female underperformance hypothesis using data from the CAUSEE project, a panel study which follows young firms over four years. They use three outcome variables: survival rates, return on assets and the Sharpe ratio. Findings – Consistent with Robb and Watson the results indicate that female-owned firms do not underperform male-owned firms. Originality/value – While replication studies are rare in entrepreneurship, they are an important tool for accumulating generalizable knowledge. The results suggest that while female-owned firms differ from male-owned firms in terms of many control variables (such as industry, owners' previous experience and hours worked) they are no less successful. This outcome should help dispel the female underperformance myth; which if left unchallenged could result in inappropriate policy decisions and, more importantly, could discourage women from establishing new ventures.
Resumo:
The design-build (DB) delivery system is an effective means of delivering a green construction project and selecting an appropriate contractor is critical to project success. Moreover, the delivery of green buildings requires specific design, construction and operation and maintenance considerations not generally encountered in the procurement of conventional buildings. Specifying clear sustainability requirements to potential contractors is particularly important in achieving sustainable project goals. However, many client/owners either do not explicitly specify sustainability requirements or do so in a prescriptive manner during the project procurement process. This paper investigates the current state-of-the-art procurement process used in specifying the sustainability requirements of the public sector in the USA construction market by means of a robust content analysis of 40 design-build requests for proposals (RFPs). The results of the content analysis indicate that the sustainability requirement is one of the most important dimensions in the best-value evaluation of DB contractors. Client/owners predominantly specify the LEED certification levels (e.g. LEED Certified, Silver, Gold, and Platinum) for a particular facility, and include the sustainability requirements as selection criteria (with specific importance weightings) for contractor evolution. Additionally, larger size projects tend to allocate higher importance weightings to sustainability requirements.This study provides public DB client/owners with a number of practical implications for selecting appropriate design-builders for sustainable DB projects.