53 resultados para Uniqueness
em Queensland University of Technology - ePrints Archive
Resumo:
The ability to differentiate from competitors through the selection of unique offerings is an important cornerstone of competitive performance. Developing unique products and services to offer in the marketplace is not only important for established firms, but also an important strategic choice for young firms (Baum and Haveman, 1997). Unlike large and established firms, young firms tend to have less access to adequate resources, well-developed sources of information, contact networks, and considerable experience and management know-how. That is, these firms differ significantly in their attributes and performance from larger and well-established firms (c.f. Miller and Chen, 1994). Although young firms are disadvantaged by the paucity of resources in putting together its unique product offering(s), they develop different pathways in advancing their assortment of capabilities that enables them to stay ahead of competitors.
Resumo:
Research on subtle dehumanization has focused on the attribution of human uniqueness to groups (infrahumanization), but has not examined another sense of humanness, human nature. Additionally, research has not extended far beyond Western cultures to examine the universality of these forms of dehumanization. Hence, the attribution of both forms of humanness was examined in three cross-cultural studies. Anglo-Australian and ethnic Chinese attributed values and traits (Study 1, N = 200) and emotions (Study 2, N = 151) to Australian and Chinese groups, and rated these characteristics on human uniqueness and human nature. Both studies found evidence of complementary attributions of humanness for Australians, who denied Chinese human nature but attributed them with greater human uniqueness. Chinese denied Australians human uniqueness, but their attributions of human nature varied for traits, values, and emotions. Study 3 (N = 54) demonstrated similar forms of dehumanization using an implicit method. These results and their implications for dehumanization and prejudice suggest the need to broaden investigation and theory to encompass both forms of humanness, and examine the attribution of both lesser and greater humanness to outgroups.
Resumo:
As China continues to motorise rapidly, solutions are needed to reduce the burden of road trauma that is spread inequitably across the community. Little is currently known about how new drivers are trained to deal with on-road challenges, and little is also known about the perceptions, behaviours and attitudes of road users in China. This paper reports on a pilot study conducted in a driver retraining facility in one Chinese city where people who have had their licence suspended for accrual of 12 demerit points in a one year period must attend compulsory retraining in order to regain their licence. A sample of 239 suspended drivers responded to an anonymous questionnaire that sought information about preferred driving speeds and perceptions of safe driving speeds across two speed zones. Responses indicated that speeds higher than the posted limits were commonly reported, and that there was incongruence between preferred and safe speeds, such that a greater proportion of drivers reported preferred speeds that were substantially faster than what were reported as safe speeds. Participants with more driving experience reported significantly fewer crashes than newly licensed drivers (less than 2 years licensed) but no differences were found in offences when compared across groups with different levels of driving experience. Perceptions of risky behaviours were assessed by asking participants to describe what they considered to be the most dangerous on-road behaviours. Speeding and drink driving were the most commonly reported by far, followed by issues such as fatigue, ignoring traffic rules, not obeying traffic rules, phone use while driving, and non-use of seatbelts, which attracted an extremely low response which seems consistent with previously reported low belt wearing rates, unfavourable attitudes towards seatbelt use, and low levels of enforcement. Finally, observations about culturally specific considerations are made from previous research conducted by the authors and others. Specifically, issues of saving face and the importance and pervasiveness of social networks and social influence are discussed with particular regard to how any future countermeasures need to be informed by a thorough understanding of Chinese customs and culture.
Resumo:
'The Millennial Adolescent' offers contemporary, stimulating insights for those currently teaching as well as those preparing to teach. This book investigates the characteristics of Generation Y, using students own voices, generational theory and case studies. The text is structured around the principle that effective teachers need to know who they are teaching as well as what to teach, how to teach it, and how to assess the outcome. Using generational theory, 'The Millennial Adolescent' investigates the characteristics of Generation Y, or the Millennial Generation, and points out what all teachers need to know about working with this current generation of students who are described in a number of ways digital natives, team oriented, confident, multi-taskers, high achievers, and a generation unlike any other. The book contains well-known frameworks for developing understandings about adolescents, blended and contrasted with a contemporary socio-cultural construction of adolescence, set in our particular time, era and society. This book reflects the uniqueness of Australian contexts, while connecting with international trends and global patterns. Engaging and full of insights, this book is essential reading for all professionals dealing with adolescents.
Resumo:
The Millennial Adolescent' offers contemporary, stimulating insights for those currently teaching as well as those preparing to teach. This book investigates the characteristics of Generation Y, using students own voices, generational theory and case studies. The text is structured around the principle that effective teachers need to know who they are teaching as well as what to teach, how to teach it, and how to assess the outcome. Using generational theory, 'The Millennial Adolescent' investigates the characteristics of Generation Y, or the Millennial Generation, and points out what all teachers need to know about working with this current generation of students who are described in a number of ways digital natives, team oriented, confident, multi-taskers, high achievers, and a generation unlike any other. The book contains well-known frameworks for developing understandings about adolescents, blended and contrasted with a contemporary socio-cultural construction of adolescence, set in our particular time, era and society. This book reflects the uniqueness of Australian contexts, while connecting with international trends and global patterns. Engaging and full of insights, this book is essential reading for all professionals dealing with adolescents.
Resumo:
The rhetoric of the pedagogic discourses of landscape architectural students and interior design students is described as part of a doctoral study undertaken to document practices and orientations prior to cross-disciplinary collaboration. We draw on the theoretical framework of Basil Bernstein, an educational sociologist, and the rhetorical method of Kenneth Burke, a literary dramatist, to study the grammars of ‘landscape’ representation employed within these disciplinary examples. We investigate how prepared final year students are for working in a cross-disciplinary manner. The discursive interactions of their work, as illustrated by four examples of drawn images and written text, are described. Our findings suggest that we need to concern ourselves aspects of our pedagogic discourse that brings uniqueness and value to our disciplines ,as well as that shared discourses between disciplines.
Resumo:
The process of compiling a studio vocal performance from many takes can often result in the performer producing a new complete performance once this new "best of" assemblage is heard back. This paper investigates the ways that the physical process of recording can alter vocal performance techniques, and in particular, the establishing of a definitive melodic and rhythmic structure. Drawing on his many years of experience as a commercially successful producer, including the attainment of a Grammy award, the author will analyse the process of producing a “credible” vocal performance in depth, with specific case studies and examples. The question of authenticity in rock and pop will also be discussed and, in this context, the uniqueness of the producer’s role as critical arbiter – what gives the producer the authority to make such performance evaluations? Techniques for creating conditions in the studio that are conducive to vocal performances, in many ways a very unnatural performance environment, will be discussed, touching on areas such as the psycho-acoustic properties of headphone mixes, the avoidance of intimidatory practices, and a methodology for inducing the perception of a “familiar” acoustic environment.
Resumo:
Background: The quality of stormwater runoff from ports is significant as it can be an important source of pollution to the marine environment. This is also a significant issue for the Port of Brisbane as it is located in an area of high environmental values. Therefore, it is imperative to develop an in-depth understanding of stormwater runoff quality to ensure that appropriate strategies are in place for quality improvement, where necessary. To this end, the Port of Brisbane Corporation aimed to develop a port specific stormwater model for the Fisherman Islands facility. The need has to be considered in the context of the proposed future developments of the Port area. ----------------- The Project: The research project is an outcome of the collaborative Partnership between the Port of Brisbane Corporation (POBC) and Queensland University of Technology (QUT). A key feature of this Partnership is that it seeks to undertake research to assist the Port in strengthening the environmental custodianship of the Port area through ‘cutting edge’ research and its translation into practical application. ------------------ The project was separated into two stages. The first stage developed a quantitative understanding of the generation potential of pollutant loads in the existing land uses. This knowledge was then used as input for the stormwater quality model developed in the subsequent stage. The aim is to expand this model across the yet to be developed port expansion area. This is in order to predict pollutant loads associated with stormwater flows from this area with the longer term objective of contributing to the development of ecological risk mitigation strategies for future expansion scenarios. ----------------- Study approach: Stage 1 of the overall study confirmed that Port land uses are unique in terms of the anthropogenic activities occurring on them. This uniqueness in land use results in distinctive stormwater quality characteristics different to other conventional urban land uses. Therefore, it was not scientifically valid to consider the Port as belonging to a single land use category or to consider as being similar to any typical urban land use. The approach adopted in this study was very different to conventional modelling studies where modelling parameters are developed using calibration. The field investigations undertaken in Stage 1 of the overall study helped to create fundamental knowledge on pollutant build-up and wash-off in different Port land uses. This knowledge was then used in computer modelling so that the specific characteristics of pollutant build-up and wash-off can be replicated. This meant that no calibration processes were involved due to the use of measured parameters for build-up and wash-off. ---------------- Conclusions: Stage 2 of the study was primarily undertaken using the SWMM stormwater quality model. It is a physically based model which replicates natural processes as closely as possible. The time step used and catchment variability considered was adequate to accommodate the temporal and spatial variability of input parameters and the parameters used in the modelling reflect the true nature of rainfall-runoff and pollutant processes to the best of currently available knowledge. In this study, the initial loss values adopted for the impervious surfaces are relatively high compared to values noted in research literature. However, given the scientifically valid approach used for the field investigations, it is appropriate to adopt the initial losses derived from this study for future modelling of Port land uses. The relatively high initial losses will reduce the runoff volume generated as well as the frequency of runoff events significantly. Apart from initial losses, most of the other parameters used in SWMM modelling are generic to most modelling studies. Development of parameters for MUSIC model source nodes was one of the primary objectives of this study. MUSIC, uses the mean and standard deviation of pollutant parameters based on a normal distribution. However, based on the values generated in this study, the variation of Event Mean Concentrations (EMCs) for Port land uses within the given investigation period does not fit a normal distribution. This is possibly due to the fact that only one specific location was considered, namely the Port of Brisbane unlike in the case of the MUSIC model where a range of areas with different geographic and climatic conditions were investigated. Consequently, the assumptions used in MUSIC are not totally applicable for the analysis of water quality in Port land uses. Therefore, in using the parameters included in this report for MUSIC modelling, it is important to note that it may result in under or over estimations of annual pollutant loads. It is recommended that the annual pollutant load values given in the report should be used as a guide to assess the accuracy of the modelling outcomes. A step by step guide for using the knowledge generated from this study for MUSIC modelling is given in Table 4.6. ------------------ Recommendations: The following recommendations are provided to further strengthen the cutting edge nature of the work undertaken: * It is important to further validate the approach recommended for stormwater quality modelling at the Port. Validation will require data collection in relation to rainfall, runoff and water quality from the selected Port land uses. Additionally, the recommended modelling approach could be applied to a soon-to-be-developed area to assess ‘before’ and ‘after’ scenarios. * In the modelling study, TSS was adopted as the surrogate parameter for other pollutants. This approach was based on other urban water quality research undertaken at QUT. The validity of this approach should be further assessed for Port land uses. * The adoption of TSS as a surrogate parameter for other pollutants and the confirmation that the <150 m particle size range was predominant in suspended solids for pollutant wash-off gives rise to a number of important considerations. The ability of the existing structural stormwater mitigation measures to remove the <150 m particle size range need to be assessed. The feasibility of introducing source control measures as opposed to end-of-pipe measures for stormwater quality improvement may also need to be considered.
Resumo:
Port land uses are subjected to unique anthropogenic activities compared to typical urban land uses. This uniqueness results in distinctive stormwater quality characteristics. Such distinction in stormwater quality has made conventional approaches used for pollutant load estimations inaccurate. This is also the case for the Port of Brisbane (PoB). The study discussed in the paper was conducted to estimate the pollutant contributions from Port specific land uses at PoB. For estimation, software modules embedded in Mike URBAN were used. An innovative approach was adopted in modelling where the conventional model calibration step was not needed to be performed to generate suitable site specific parameters. Instead, equations and site specific parameters that replicate pollutant build-up and wash-off were generated from an extensive field investigation. Models were simulated incorporating site specific parameters from six different Port specific land uses and rainfall events from three representative years. Outcomes of the modelling exercise were used to identify the distinct pollutant contributions from different Port land uses.
Resumo:
Literally, the word compliance suggests conformity in fulfilling official requirements. The thesis presents the results of the analysis and design of a class of protocols called compliant cryptologic protocols (CCP). The thesis presents a notion for compliance in cryptosystems that is conducive as a cryptologic goal. CCP are employed in security systems used by at least two mutually mistrusting sets of entities. The individuals in the sets of entities only trust the design of the security system and any trusted third party the security system may include. Such a security system can be thought of as a broker between the mistrusting sets of entities. In order to provide confidence in operation for the mistrusting sets of entities, CCP must provide compliance verification mechanisms. These mechanisms are employed either by all the entities or a set of authorised entities in the system to verify the compliance of the behaviour of various participating entities with the rules of the system. It is often stated that confidentiality, integrity and authentication are the primary interests of cryptology. It is evident from the literature that authentication mechanisms employ confidentiality and integrity services to achieve their goal. Therefore, the fundamental services that any cryptographic algorithm may provide are confidentiality and integrity only. Since controlling the behaviour of the entities is not a feasible cryptologic goal,the verification of the confidentiality of any data is a futile cryptologic exercise. For example, there exists no cryptologic mechanism that would prevent an entity from willingly or unwillingly exposing its private key corresponding to a certified public key. The confidentiality of the data can only be assumed. Therefore, any verification in cryptologic protocols must take the form of integrity verification mechanisms. Thus, compliance verification must take the form of integrity verification in cryptologic protocols. A definition of compliance that is conducive as a cryptologic goal is presented as a guarantee on the confidentiality and integrity services. The definitions are employed to provide a classification mechanism for various message formats in a cryptologic protocol. The classification assists in the characterisation of protocols, which assists in providing a focus for the goals of the research. The resulting concrete goal of the research is the study of those protocols that employ message formats to provide restricted confidentiality and universal integrity services to selected data. The thesis proposes an informal technique to understand, analyse and synthesise the integrity goals of a protocol system. The thesis contains a study of key recovery,electronic cash, peer-review, electronic auction, and electronic voting protocols. All these protocols contain message format that provide restricted confidentiality and universal integrity services to selected data. The study of key recovery systems aims to achieve robust key recovery relying only on the certification procedure and without the need for tamper-resistant system modules. The result of this study is a new technique for the design of key recovery systems called hybrid key escrow. The thesis identifies a class of compliant cryptologic protocols called secure selection protocols (SSP). The uniqueness of this class of protocols is the similarity in the goals of the member protocols, namely peer-review, electronic auction and electronic voting. The problem statement describing the goals of these protocols contain a tuple,(I, D), where I usually refers to an identity of a participant and D usually refers to the data selected by the participant. SSP are interested in providing confidentiality service to the tuple for hiding the relationship between I and D, and integrity service to the tuple after its formation to prevent the modification of the tuple. The thesis provides a schema to solve the instances of SSP by employing the electronic cash technology. The thesis makes a distinction between electronic cash technology and electronic payment technology. It will treat electronic cash technology to be a certification mechanism that allows the participants to obtain a certificate on their public key, without revealing the certificate or the public key to the certifier. The thesis abstracts the certificate and the public key as the data structure called anonymous token. It proposes design schemes for the peer-review, e-auction and e-voting protocols by employing the schema with the anonymous token abstraction. The thesis concludes by providing a variety of problem statements for future research that would further enrich the literature.
Resumo:
The changes of economic status in Malaysia have lead to many psychosocial problems especially among the young people. Counselling and psychotherapy have been seen as one of the solutions that are practiced in Western Culture. Most counselling theorists believe that their theory is universal however there is limited research to prove it. This paper will describe an ongoing study conducted in Malaysia about the applicability of one Western counselling Theory, Bowen’s family theory the Differentiation of self levels in the family allow a person to both leave the family’s boundaries in search of uniqueness and continually return to the family in order to further establish a sense of belonging. In addition Bowen believed that this comprised of four measures: Differentiation of Self (DSI), Family Inventory of Live Event (ILE), Depression Anxiety and Stress Scale (DASS) and Connor-Davidson Resilience Scale (CD-RISC). Preliminary findings are discussed and the implication in enhancing the quality of teaching family counselling in universities explored.
Resumo:
Planning on utilization of train-set is one of the key tasks of transport organization for passenger dedicated railway in China. It also has strong relationships with timetable scheduling and operation plans at a station. To execute such a task in a railway hub pooling multiple railway lines, the characteristics of multiple routing for train-set is discussed in term of semicircle of train-sets' turnover. In programming the described problem, the minimum dwell time is selected as the objectives with special derive constraints of the train-set's dispatch, the connecting conditions, the principle of uniqueness for train-sets, and the first plus for connection in the same direction based on time tolerance σ. A compact connection algorithm based on time tolerance is then designed. The feasibility of the model and the algorithm is proved by the case study. The result indicates that the circulation model and algorithm about multiple routing can deal with the connections between the train-sets of multiple directions, and reduce the train's pulling in or leaving impact on the station's throat.
Resumo:
Should new ventures stick to their knitting once they start commercialising or should they engage in frequent changes of their business idea? In this paper we argue that new ventures still need to learn their way in the early phases of commercialisation and that changes are good, but subject to two important contingencies. First is that changes should be aimed at enhancing uniqueness, which in turn enhances new venture performance. Second is that our results show that changes have limited affect on uniqueness and performance for entrepreneurs aiming at maximising opportunities, but that changing the business idea has a significant positive impact for entrepreneurs focusing on minimising losses. Our findings indicate that entrepreneurs aiming at minimising losses may offset their initial disadvantages by engaging in a series of adaptations of the business idea to gain higher performance and a more unique product offering.
Resumo:
Many luxury heritage brands operate on the misconception that heritage is interchangeable with history rather than representative of the emotional response they originally developed in their customer. This idea of heritage as static history inhibits innovation, prevents dynamic renewal and impedes their ability to redefine, strengthen and position their brand in current and emerging marketplaces. This paper examines a number of heritage luxury brands that have successfully identified the original emotional responses they developed in their customers and, through innovative approaches in design, marketing, branding and distribution evoke these responses in contemporary consumers. Using heritage and innovation hand-in-hand, these brands have continued to grow and develop a vision of heritage that incorporates both historical and contemporary ideas to meet emerging customer needs. While what constitutes a ‘luxury’ item is constantly challenged in this era of accessible luxury products, up-scaling and aspirational spending, this paper sees consumers’ emotional needs as the key element in defining the concept of luxury. These emotional qualities consistently remain relevant due to their ability to enhance a positive sense of identity for the brand user. Luxury is about the ‘experience’ not just the product providing the consumer with a sense of enhanced status or identity through invoked feelings of exclusivity, authenticity, quality, uniqueness and culture. This paper will analyse luxury heritage brands that have successfully combined these emotional values with those of their ‘heritage’ to create an aura of authenticity and nostalgia that appeals to contemporary consumers. Like luxury, the line where clothing becomes fashion is blurred in the contemporary fashion industry; however, consumer emotion again plays an important role. For example, clothing becomes ‘fashion’ for consumers when it affects their self perception rather than fulfilling basic functions of shelter and protection. Successful luxury heritage brands can enhance consumers’ sense of self by involving them in the ‘experience’ and ‘personality’ of the brand so they see it as a reflection of their own exclusiveness, authentic uniqueness, belonging and cultural value. Innovation is a valuable tool for heritage luxury brands to successfully generate these desired emotional responses and meet the evolving needs of contemporary consumers. While traditionally fashion has been a monologue from brand to consumer, new technology has given consumers a voice to engage brands in a conversation to express their evolving needs, ideas and feedback. As a result, in this consumer-empowered era of information sharing, this paper defines innovation as the ability of heritage luxury brands to develop new design and branding strategies in response to this consumer feedback while retaining the emotional core values of their heritage. This paper analyses how luxury heritage brands can effectively position themselves in the contemporary marketplace by separating heritage from history to incorporate innovative strategies that will appeal to consumer needs of today and tomorrow.
Resumo:
Many initiatives to improve Business processes are emerging. The essential roles and contributions of Business Analyst (BA) and Business Process Management (BPM) professionals to such initiatives have been recognized in literature and practice. The roles and responsibilities of a BA or BPM practitioner typically require different skill-sets; however these differences are often vague. This vagueness creates much confusion in practice and academia. While both the BA and BPM communities have made attempts to describe their domains through capability defining empirical research and developments of Bodies of knowledge, there has not yet been any attempt to identify the commonality of skills required and points of uniqueness between the two professions. This study aims to address this gap and presents the findings of a detailed content mapping exercise (using NVivo as a qualitative data analysis tool) of the International Institution of Business Analysis (IIBA®) Guide to the Business Analysis Body of Knowledge (BABOK® Guide) against core BPM competency and capability frameworks.