105 resultados para Indiana Dept. of Audit and Control
em Queensland University of Technology - ePrints Archive
Resumo:
This study aims to predict adherence to diabetic treatment regimens and sustained diabetic control. During two clinic visits that were 2 months apart, 63 adult outpatients completed measures of diabetic history, current treatment, diabetic control, adherence, and self-efficacy about adherence to treatment. Results showed that self-efficacy was a significant predictor of later adherence to diabetes treatment even after past levels of adherence were taken into account. Posttest levels of adherence in turn were significantly associated with posttest %HbA1c after control for illness severity. A stepwise multiple regression to predict %HbAlc at post entered pretest measures of diabetic control, treatment type, and self-efficacy, which together predicted 50% of the variance. Results are related to self-efficacy theory and implications for practice are discussed.
Resumo:
Does job control act as a stress-buffer when employees' type and level of work self-determination is taken into account? It was anticipated that job control would only be stress-buffering for employees high in self-determined and low in non-self-determined work motivation. In contrast, job control would be stress-exacerbating for employees who were low in self-determined and high in non-self-determined work motivation. Employees of a health insurance organization (N = 123) completed a survey on perceptions of role overload, job control, work self-determination, and a range of strain and engagement indicators. Results revealed that, when individuals high in self-determination perceived high job control, they experienced greater engagement (in the form of dedication to their work). In addition, when individuals high in non-self-determination perceived high job demands, they experienced more health complaints. A significant 3-way interaction demonstrated that, for individuals low in non-self-determination, high job control had the anticipated stress-buffering effect on engagement (in the form of absorption in their work). In addition, low job control was stress-exacerbating. However, contrary to expectations, for those high in non-self-determination, high job control was just as useful as low job control as a stress-buffer. The practical applications of these findings to the organizational context are discussed.
Resumo:
This paper details the design and performance assessment of a unique collision avoidance decision and control strategy for autonomous vision-based See and Avoid systems. The general approach revolves around re-positioning a collision object in the image using image-based visual servoing, without estimating range or time to collision. The decision strategy thus involves determining where to move the collision object, to induce a safe avoidance manuever, and when to cease the avoidance behaviour. These tasks are accomplished by exploiting human navigation models, spiral motion properties, expected image feature uncertainty and the rules of the air. The result is a simple threshold based system that can be tuned and statistically evaluated by extending performance assessment techniques derived for alerting systems. Our results demonstrate how autonomous vision-only See and Avoid systems may be designed under realistic problem constraints, and then evaluated in a manner consistent to aviation expectations.
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.
Resumo:
The purpose of the present study was to examine the extent to which Desire for Control (DFC) interacts with experimental manipulations of demand and control, and the consequences of these interactions on task satisfaction and perceived goal attainment (i.e. task performance and task mastery). It was expected that the proposed stress-buffering effects of control would be evident only for individuals high in DFC. Moreover, it was anticipated that control may have a stress-exacerbating effect for those low in DFC. These hypotheses were tested on a sample of 137 first year psychology students who participated in an in-basket activity under low and high conditions of demand and control. Results revealed that the proposed stress-buffering effect of control was found only for those high in DFC and a stress-exacerbating effect of increased control was evident for those low in DFC on task performance and task mastery perceptions. Future research directions and the implications of these findings to applied settings are discussed.
Resumo:
Intimate partner abuse and control is one of the most common forms of violence against women, and is considered an international problem of social, political, legal and human rights significance. Yet few studies have attempted to understand this problem from the perspective of male perpetrators. This gap is addressed by conducting in-depth interviews with 16 able-bodied men of white European ancestry born and educated in New Zealand or Australia, who have been physically violent and/or emotionally, intellectually, sexually or financially controlling of a live-in female partner. This thesis extends and deepens the dominant ways of thinking about men’s intimate partner abuse by utilising a new theoretical framework compatible with contemporary feminist scholarship. A synthesis of Connell’s theory of masculinities and Bourdieu’s field theory is utilised for the purpose of exploring more nuanced, complex understandings of manliness and men’s relationships with men, women and social structures. Through such an analysis, this thesis finds that men’s perpetration of power and control over women is driven by a need to avoid the stigma of appearing weak. As a consequence, their desire and ability to show love, care and empathy is suppressed in favour of a presumed honourable manliness, and their female partners are used as weapons in the pursuit of symbolic capital in the form of recognition, prestige and acceptance from real and/or imagined men. This research also uncovers the complex interplay between masculine practices and particular social contexts. For example, the norms of practice encountered from those in authority, such as teachers, sports coaches, police, court judges and workplace management, influences the decision making of the men in this study, to use, or not to use, physical violence, psychological abuse and structural control. The principal conclusion is that there is a repertoire of paradoxical masculinities and contradictory social messages available to the men in this study. But gender policing by other men, complicit women and those in authority provides little room for legitimate complexity in masculine practices. Perpetrators in this study reconcile these conflicts of interest by generally avoiding subordinated masculinity and possible ostracism, and instead practicing more heroic hegemonic masculinities by abusing and controlling women and particular other men. This thesis concludes that for intimate partner abuse and control to cease, changes in power structures have to occur at all levels of society.
Resumo:
This chapter examines why policy decision-makers opt for command and control environmental regulation despite the availability of a plethora of market-based instruments which are more efficient and cost-effective. Interestingly, Sri Lanka has adopted a wholly command and control system, during both the pre and post liberalisation economic policies. This chapter first examines the merits and demerits of command and control and market-based approaches and then looks at Sri Lanka’s extensive environmental regulatory framework. The chapter then examines the likely reasons as to why the country has gone down the path of inflexible regulatory measures and has become entrenched in them. The various hypotheses are discussed and empirical evidence is provided. The chapter also discusses the consequences of an environmentally slack economy and policy implications stemming from adopting a wholly regulatory approach. The chapter concludes with a discussion of the main results.
Resumo:
A work-based professional development program was offered to a group of registered nurses working in palliative care. The goal of the program was to improve skills in psychosocial care (Yates et al., 1996). Participants were encouraged to reflect critically on their practice experience within a group setting. The focus of the group discussion and reflection were shared practice incidents. Each participant was given the opportunity to identify and describe an incident from their professional practice that presented a challenging issue within palliative nursing. This paper explores the themes of conflict and control, evident within the collection of fifteen practice incidents and discusses the nurses role as mediator. The concepts of patient advocacy and professional autonomy are challenged through the nurses experience of providing care within a hierarchical and bureaucratic health service. The outcome of reflection for the organization is most effective when shared experience and collective action (rather than individual practice) are the focus.
Resumo:
Throughout Australia (and in comparable urban contexts around the world) public spaces may be said to be under attack by developers and also attempts by civic authorities to regulate, restrict, rebrand and reframe them. A consequence of the increasingly security driven, privatised and surveilled nature of public space is the exclusion and displacement of those considered flawed and unwelcome in the ‘spectacular’ consumption spaces of many major urban centres. In the name of urban regeneration, processes of securitisation, ‘gentrification’ and creative cities discourses can refashion public space as sites of selective inclusion and exclusion. In this context of monitoring and control procedures, children and young people’s use of space in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to the social order, requiring various forms of punitive and/or remedial action. This paper discusses developments in the surveillance, governance and control of public space used by children and young people in particular and the capacity for their displacement and marginality, diminishing their sense of place and belonging, and right to public space as an expression of their civil, political and social citizenship(s).
Resumo:
Throughout much of the world, urban and rural public spaces may be said to be under attack by property developers, commercial interests and also attempts by civic authorities to regulate, restrict, reframe and rebrand these spaces. A consequence of the increasingly security driven, privatised, commercial and surveilled nature of public space is the exclusion and displacement of those considered ‘flawed’ and unwelcome in the ‘spectacular’ consumption spaces of many major urban centres. In the name of urban regeneration, processes of securitisation, ‘gentrification’ and creative cities initiatives can act to refashion public space as sites of selective inclusion and exclusion. The use of surveillance and other control technologies as deployed in and around the UK ‘Riots’ of 2011 may help to promote and encourage a passing sense of personal safety and confidence in using public space. Through systems of social sorting, the same surveillance assemblages can also further the physical, emotional and psychological exclusion of certain groups and individuals, deemed to be both ‘out of time and out of place’ in major zones of urban, conspicuous, consumption. In this harsh environment of monitoring and control procedures, children and young people’s use of public spaces and places in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to social order, requiring various forms of punitive and/or remedial action. Much of this civic action actively excludes some children and young people from participation and as a consequence, their trust in local processes and communities is eroded. This paper discusses worldwide developments in the surveillance, governance and control of the public space environments used by children and young people in particular and the capacity for their displacement and marginality, diminishing their sense of belonging, wellbeing and rights to public space as an expression of their social, political and civil citizenship(s).
Resumo:
Throughout Australia (and elsewhere in the world) public spaces are under attack by developers and also attempts by civic authorities to regulate, restrict and reframe them. A consequence of the increasingly security driven, privatised and surveilled nature of public space is the exclusion and displacement of those considered flawed and unwelcome in the “spectacular” consumption spaces of major urban centres. In this context of monitoring and control procedures, children and young people’s use of public space in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to social order, requiring various forms of punitive and/or remedial action. This paper discusses developments in the surveillance, governance and control of public space used by children and young people in particular and the capacity for their displacement and marginality, diminishing their sense of belonging, wellbeing and right to public space as an expression of social, political and civil citizenship.
Resumo:
Introduction The Elaborated Intrusion Theory of Desire holds that desires for functional and dysfunctional goals share a common form. Both are embodied cognitive events, characterised by affective intensity and frequency. Accordingly, we developed scales to measure motivational cognitions for functional goals (Motivational Thought Frequency, MTF; State Motivation, SM), based on the existing Craving Experience Questionnaire (CEQ). When applied to increasing exercise, MTF and SM showed the same three-factor structure as the CEQ (Intensity, Imagery, Availability). The current study tested the internal structure and concurrent validity of the MTF and SM Scales when applied to control of alcohol consumption (MTF-A; SM-A). Methods Participants (N = 417) were adult tertiary students, staff or community members who had recently engaged in high-risk drinking or were currently trying to control alcohol consumption. They completed an online survey comprising the MTF-A, SM-A, Alcohol Use Disorders Identification Test (AUDIT), Readiness to Change Questionnaire (RCQ) and demographics. Results Confirmatory Factor Analysis gave acceptable fit for the MTF-A, but required the loss of one SM-A item, and was improved by intercorrelations of error terms. Higher scores were associated with more severe problems on the AUDIT and with higher Contemplation and Action scores on the RCQ. Conclusions The MTF-A and SM-A show potential as measures of motivation to control drinking. Future research will examine their predictive validity and sensitivity to change. The scales' application to both increasing functional and decreasing dysfunctional behaviours is consistent with EI Theory's contention that both goal types operate in similar ways.