277 resultados para 380109 Psychological Methodology, Design and Analysis

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Industrial employment growth has been one of the most dynamic areas of expansion in Asia; however, current trends in industrialised working environments have resulted in greater employee stress. Despite research showing that cultural values affect the way people cope with stress, there is a dearth of psychometrically established tools for use in non-Western countries to measure these constructs. Studies of the "Way of Coping Checklist-Revised" (WCCL-R) in the West suggest that the WCCL-R has good psychometric properties, but its applicability in the East is still understudied. A confirmatory factor analysis (CFA) is used to validate the WCCL-R constructs in an Asian population. This study used 1,314 participants from Indonesia, Sri Lanka, Singapore, and Thailand. An initial exploratory factor analysis revealed that original structures were not confirmed; however, a subsequent EFA and CFA showed that a 38-item, five-factor structure model was confirmed. The revised WCCL-R in the Asian sample was also found to have good reliability and sound construct and concurrent validity. The 38-item structure of the WCCL-R has considerable potential in future occupational stress-related research in Asian countries.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Illegal pedestrian behaviour is common and is reported as a factor in many pedestrian crashes. Since walking is being promoted for its health and environmental benefits, minimisation of its associated risks is of interest. The risk associated with illegal road crossing is unclear, and better information would assist in setting a rationale for enforcement and priorities for public education. An observation survey of pedestrian behaviour was conducted at signalised intersections in the Brisbane CBD (Queensland, Australia) on typical workdays, using behavioural categories that were identifiable in police crash reports. The survey confirmed high levels of crossing against the lights, or close enough to the lights that they should legally have been used. Measures of exposure for crossing legally, against the lights, and close to the lights were generated by weighting the observation data. Relative risk ratios were calculated for these categories using crash data from the observation sites and adjacent midblocks. Crossing against the lights and crossing close to the lights both exhibited a crash risk per crossing event approximately eight times that of legal crossing at signalised intersections. The implications of these results for enforcement and education are discussed, along with the limitations of the study.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A set of non-nested longitudinal models tested the relationships between personal and workplace resources, well-being and work engagement. The reciprocal model, trimmed of trivial paths had the best fit and parsimony. The model showed the strong influences of concurrent functioning, stability of variables over time and weaker reciprocal relationships between variables across time. Individuals with greater confidence in themselves and the future experience better work conditions and have greater well-being and work engagement. These day-to-day influences are equalled by the long term strength and stability of Individual Factors, Positive Workplace Factors, and Overall Well-Being. Whilst the reciprocal paths had only weak to mild effects, there was mutual reinforcement of Individual Factors and Overall Well-Being, with Positive Workplace Factors and Work Engagement counterbalancing each other, indicating a more complex relationship. Well-being, particularly, is anchored in the immediate and distant past and provides a robust stability to functioning into the future.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is a growing need for parametric design software that communicates building performance feedback in early architectural exploration to support decision-making. This paper examines how the circuit of design and analysis process can be closed to provide active and concurrent feedback between architecture and services engineering domains. It presents the structure for an openly customisable design system that couples parametric modelling and energy analysis software to allow designers to assess the performance of early design iterations quickly. Finally, it discusses how user interactions with the system foster information exchanges that facilitate the sharing of design intelligence across disciplines.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is increasing evidence that parenting and feeding interact to influence children’s eating behaviour and weight status. Interpretation of existing research is complicated by the lack of consensus in the conceptualisation and measurement of both ‘parenting’ and ‘feeding’, particularly the distinction between ‘styles’, ‘dimensions’ and ‘practices’. In addition, the lack of validated tools to concurrently assess feeding practices in infancy limits the capacity to examine the relationships between parenting and feeding in infancy and their short- and long-term influence on weight status. In this paper we provide an overview of the constructs examined in this emerging area of research, highlight the conceptual, definitional and measurement challenges and propose a unifying model to aid design and the interpretation of intervention studies. Progress on these methodological issues will contribute to the robust evidence required to justify investment in interventions that focus on parenting and feeding in the context of child obesity prevention.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background The four principles of Beauchamp and Childress - autonomy, non-maleficence, beneficence and justice - have been extremely influential in the field of medical ethics, and are fundamental for understanding the current approach to ethical assessment in health care. This study tests whether these principles can be quantitatively measured on an individual level, and then subsequently if they are used in the decision making process when individuals are faced with ethical dilemmas. Methods The Analytic Hierarchy Process was used as a tool for the measurement of the principles. Four scenarios, which involved conflicts between the medical ethical principles, were presented to participants and they made judgments about the ethicality of the action in the scenario, and their intentions to act in the same manner if they were in the situation. Results Individual preferences for these medical ethical principles can be measured using the Analytic Hierarchy Process. This technique provides a useful tool in which to highlight individual medical ethical values. On average individuals have a significant preference for non-maleficence over the other principles, however, and perhaps counter-intuitively, this preference does not seem to relate to applied ethical judgements in specific ethical dilemmas. Conclusions People state they value these medical ethical principles but they do not actually seem to use them directly in the decision making process. The reasons for this are explained through the lack of a behavioural model to account for the relevant situational factors not captured by the principles. The limitations of the principles in predicting ethical decision making are discussed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Secure communications in distributed Wireless Sensor Networks (WSN) operating under adversarial conditions necessitate efficient key management schemes. In the absence of a priori knowledge of post-deployment network configuration and due to limited resources at sensor nodes, key management schemes cannot be based on post-deployment computations. Instead, a list of keys, called a key-chain, is distributed to each sensor node before the deployment. For secure communication, either two nodes should have a key in common in their key-chains, or they should establish a key through a secure-path on which every link is secured with a key. We first provide a comparative survey of well known key management solutions for WSN. Probabilistic, deterministic and hybrid key management solutions are presented, and they are compared based on their security properties and re-source usage. We provide a taxonomy of solutions, and identify trade-offs in them to conclude that there is no one size-fits-all solution. Second, we design and analyze deterministic and hybrid techniques to distribute pair-wise keys to sensor nodes before the deployment. We present novel deterministic and hybrid approaches based on combinatorial design theory and graph theory for deciding how many and which keys to assign to each key-chain before the sensor network deployment. Performance and security of the proposed schemes are studied both analytically and computationally. Third, we address the key establishment problem in WSN which requires key agreement algorithms without authentication are executed over a secure-path. The length of the secure-path impacts the power consumption and the initialization delay for a WSN before it becomes operational. We formulate the key establishment problem as a constrained bi-objective optimization problem, break it into two sub-problems, and show that they are both NP-Hard and MAX-SNP-Hard. Having established inapproximability results, we focus on addressing the authentication problem that prevents key agreement algorithms to be used directly over a wireless link. We present a fully distributed algorithm where each pair of nodes can establish a key with authentication by using their neighbors as the witnesses.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Deterministic computer simulations of physical experiments are now common techniques in science and engineering. Often, physical experiments are too time consuming, expensive or impossible to conduct. Complex computer models or codes, rather than physical experiments lead to the study of computer experiments, which are used to investigate many scientific phenomena of this nature. A computer experiment consists of a number of runs of the computer code with different input choices. The Design and Analysis of Computer Experiments is a rapidly growing technique in statistical experimental design. This thesis investigates some practical issues in the design and analysis of computer experiments and attempts to answer some of the questions faced by experimenters using computer experiments. In particular, the question of the number of computer experiments and how they should be augmented is studied and attention is given to when the response is a function over time.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

High power piezoelectric ultrasonic transducers have been widely exploited in a variety of applications. The critical behaviour of a piezoelectric device is encapsulated in its resonant frequencies because of its maximum transmission performance at these frequencies. Therefore power electronic converters should be tuned at those resonant frequencies to transfer electrical power to mechanical power efficiently. However, structural and environmental changes cause variations in the device resonant frequencies which can degrade the system performance. Hence, estimating the device resonant frequencies within the incorporated setup can significantly improve the system performance. This paper proposes an efficient resonant frequency estimation approach to maintain the performance of high power ultrasonic applications using the employed power converter. Experimental validations indicate the effectiveness of the proposed method.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Previous research into the potential ‘dark’ side of trait emotional intelligence (EI) has repeatedly demonstrated that trait EI is negatively associated with Machiavellianism. In this study, we reassess the potential dark side of trait EI, by testing whether Agreeableness mediates and/or moderates the relationship between trait EI and Machiavellianism. Hypothesized mediation and moderation effects were tested using a large sample of 884 workers who completed several self-report questionnaires. Results provide support for both hypotheses; Agreeableness was found to mediate and moderate the relationship between trait EI and Machiavellianism. Overall, results indicate that individuals high in trait EI tend to have low levels of Machiavellianism because they generally have a positive nature (i.e. are agreeable) and not because they are emotionally competent per se. Results also indicate that individuals high in ‘perceived emotional competence’ have the potential to be high in Machiavellianism, particularly when they are low in Agreeableness.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Balancing the demands of research and ethics is always challenging and even more so when recruiting vulnerable groups. Within the context of current legislation and international human rights declarations, it is strongly advocated that research can and must be undertaken with all recipients of health care services. Research in the field of intellectual disability presents particular challenges in regard to consenting processes. This paper is a critical reflection and analysis of the complex processes undertaken and events that occurred in gaining informed consent from people with intellectual disability to participate in a study exploring their experiences of being an inpatient in mental health hospitals within Aotearoa/New Zealand. A framework based on capacity, information and voluntariness is presented with excerpts from the field provided to explore consenting processes. The practical implications of the processes utilised are then discussed in order to stimulate debate regarding clearer and enhanced methods of gaining informed consent from people with intellectual disability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Background Early feeding practices lay the foundation for children’s eating habits and weight gain. Questionnaires are available to assess parental feeding but overlapping and inconsistent items, subscales and terminology limit conceptual clarity and between study comparisons. Our aim was to consolidate a range of existing items into a parsimonious and conceptually robust questionnaire for assessing feeding practices with very young children (<3 years). Methods Data were from 462 mothers and children (age 21–27 months) from the NOURISH trial. Items from five questionnaires and two study-specific items were submitted to a priori item selection, allocation and verification, before theoretically-derived factors were tested using Confirmatory Factor Analysis. Construct validity of the new factors was examined by correlating these with child eating behaviours and weight. Results Following expert review 10 factors were specified. Of these, 9 factors (40 items) showed acceptable model fit and internal reliability (Cronbach’s α: 0.61-0.89). Four factors reflected non-responsive feeding practices: ‘Distrust in Appetite’, ‘Reward for Behaviour’, ‘Reward for Eating’, and ‘Persuasive Feeding’. Five factors reflected structure of the meal environment and limits: ‘Structured Meal Setting’, ‘Structured Meal Timing’, ‘Family Meal Setting’, ‘Overt Restriction’ and ‘Covert Restriction’. Feeding practices generally showed the expected pattern of associations with child eating behaviours but none with weight. Conclusion The Feeding Practices and Structure Questionnaire (FPSQ) provides a new reliable and valid measure of parental feeding practices, specifically maternal responsiveness to children’s hunger/satiety signals facilitated by routine and structure in feeding. Further validation in more diverse samples is required.