984 resultados para Risky behaviour
Resumo:
Joint ventures can take many forms and can be formed for different reasons, from sharing resources to creating future business opportunities. At the same time, there is increasing interest and discussion of alternative procurement methods, moving away from traditional procurement systems to relational approaches. Business systems and strategies need to be redefined and move from a short-term project to project culture to a more strategic, long-term perspective. Joint ventures of construction organisations, global and local, have become increasingly popular to deliver large-scale infrastructure construction projects. However, successful strategic collaborations require project organisations to formulate a fit between contractual and operational arrangements for each situation. This study reviews the movement from traditional procurement methods towards relational contracting approaches in Queensland, Australia. The study examines the organisational factors that facilitates sustainable relationship between project organisations and hence, lead to long-term business success. This paper reports on initial findings captured from a survey undertaken with construction contracting organisations in Australia, focusing on the supply chain relationships. Contractors’ perceptions of the relationship management process and the engagement of the supply chain are also presented.
Resumo:
Diachasmimorpha kraussii (Hymenoptera: Braconidae: Opiinae) is a koinobiont larval parasitoid of dacine fruit flies of the genus Bactrocera (Diptera: Tephritidae) in its native range (Australia, Papua New Guinea, Solomon Islands). The wasp is a potentially important control agent for pest fruit flies, having been considered for both classical and inundative biological control releases. I investigated the host searching, selection and utilisation mechanisms of the wasp against native host flies within its native range (Australia). Such studies are rare in opiine research where the majority of studies, because of the applied nature of the research, have been carried out using host flies and environments which are novel to the wasps. Diachasmimorpha kraussii oviposited equally into maggots of four fruit fly species, all of which coexist with the wasp in its native range (Australia), when tested in a choice trial using a uniform artificial diet media. While eggs laid into Bactrocera tryoni and B. jarvisi developed successfully through to adult wasps, eggs laid into B. cucumis and B. cacuminata were encapsulated. These results suggest that direct larval cues are not an important element in host selection by D. kraussii. Further exploring how D. kraussii locates suitable host larvae, I investigated the role of plant cues in host searching and selection. This was examined in a laboratory choice trial using uninfested fruit or fruit infested with either B. tryoni or B. jarvisi maggots. The results showed a consistent preference ranking among infested fruits by the wasp, with guava and peach most preferred, but with no response to uninfested fruits. Thus, it appears the wasp uses chemical cues emitted in response to fruit fly larval infestation for host location, but does not use cues from uninfested fruits. To further tease apart the role of (i) suitable and non-suitable maggots, (ii) infested and uninfested fruits of different plant species, and (iii) adult flies, in wasp host location and selection, I carried out a series of behavioural tests where I manipulated these attributes in a field cage. These trials confirmed that D. kraussii did not respond to cues in uninfested fruits, that there were consistent preferences by the wasps for different maggot infested fruits, that fruit preference did not vary depending on whether the maggots were physiologically suitable or not suitable for wasp offspring development, and finally, that adult flies appear to play a secondary role as indicators of larval infestation. To investigate wasp behaviour in an unrestrained environment, I concurrently observed diurnal foraging behaviours of both the wasp and one of its host fly in a small nectarine orchard. Wasp behaviour, both spatially and temporally, was not correlated with adult fruit fly behaviour or abundance. This study reinforced the point that infested fruit seems to be the primary cue used by foraging wasps. Wasp and fly feeding and mating was not observed in the orchard, implying these activities are occurring elsewhere. It is highly unlikely that these behaviours were happening within the orchard during the night as both insects are diurnal. As the final component of investigating host location, I carried out a habitat preference study for the wasp at the landscape scale. Using infested sentinel fruits, I tested the parasitism rate of B. tryoni in eucalyptus sclerophyll forest, rainforest and suburbia in South East Queensland. Although, rainforest is the likely endemic habitat of both B. tryoni and D. kraussii, B. tryoni abundance is significantly greater in suburban environments followed by eucalyptus sclerophyll forest. Parasitism rate was found to be higher in suburbia than in the eucalyptus sclerophyll forest, while no parasitism was recorded in the rainforest. This result suggests that wasps orient within the landscape towards areas of high host density and are not restricted by habitat types. Results from the different experiments suggest that host searching, selection and utilisation behaviour of D. kraussii are strongly influenced by cues associated with fruit fly larval feeding. Cues from uninfested fruits, the host larvae themselves, and the adult host flies play minimal roles. The discussion focuses on the fit of D. kraussii to Vinson’s classical parasitoid host location model and the implications of results for biological control, including recommendations for host and plant preference screening protocols and release regimes.
Resumo:
The purpose of this paper is to examine the legal implications of the continuing rise in the number of school children diagnosed with behaviour disorders. Not only are teachers now subject to a dense grid of legal regulation, they are also increasingly vulnerable to actions in tort. It will be argued here that as more and more children are labelled ‘disordered’, the duty of care become more onerous, and hence harder for teachers to meet. As a consequence, teachers are more likely to face claims of negligence. It is concluded that while the schooling system needs to retain a healthy scepticism about each new pathologising disorder that seeks special status for its sufferers, it also needs to provide greater training and resources for teachers regarding disorder management. It is also concluded that recent changes to negligence law regarding the issue of ‘reasonable foreseeability’ within breach of duty of care, may not be as significant as might have been hoped by the teaching community. Indeed, the elevated standard of care required by the increasing numbers of disordered pupils, places teachers in an ever more difficult legal position.
Resumo:
This paper is a deductive theoretical enquiry into the flow of effects from the geometry of price bubbles/busts, to price indices, to pricing behaviours of sellers and buyers, and back to price bubbles/busts. The intent of the analysis is to suggest analytical approaches to identify the presence, maturity, and/or sustainability of a price bubble. We present a pricing model to emulate market behaviour, including numeric examples and charts of the interaction of supply and demand. The model extends into dynamic market solutions myopic (single- and multi-period) backward looking rational expectations to demonstrate how buyers and sellers interact to affect supply and demand and to show how capital gain expectations can be a destabilising influence – i.e. the lagged effects of past price gains can drive the market price away from long-run market-worth. Investing based on the outputs of past price-based valuation models appear to be more of a game-of-chance than a sound investment strategy.
Resumo:
This paper reports findings from a study investigating the effect of integrating sponsored and nonsponsored search engine links into a single web listing. The premise underlying this research is that web searchers are chiefly interested in relevant results. Given the reported negative bias that web searchers have concerning sponsored links, separate listings may be a disservice to web searchers as it might not direct them to relevant websites. Some web meta-search engines integrate sponsored and nonsponsored links into a single listing. Using a web search engine log of over 7 million interactions from hundreds of thousands of users from a major web meta-search engine, we analysed the click-through patterns for both sponsored and nonsponsored links. We also classified web queries as informational, navigational and transactional based on the expected type of content and analysed the click-through patterns of each classification. The findings show that for more than 35% of queries, there are no clicks on any result. More than 80% of web queries are informational in nature and approximately 10% are transactional, and 10% navigational. Sponsored links account for approximately 15% of all clicks. Integrating sponsored and nonsponsored links does not appear to increase the clicks on sponsored listings. We discuss how these research results could enhance future sponsored search platforms.
Resumo:
The black rat (Rattus rattus) has been shown to be the primary species responsible for causing significant crop losses within the Australian macadamia industry. This species success within macadamia orchards is directly related to the flexibility expressed in its foraging behaviour. In this paper a conceptual foraging model is presented which proposes that the utilisation of resources by rodents within various components of the system is related not only to their relative abundance, but also to predator avoidance behaviour. Nut removal from high predation risk habitats during periods of low resource abundance in low risk compartments of the system is considered an essential behaviour that allows high rodent densities to be maintained throughout the year.
Resumo:
The purpose of this paper is to examine the legal implications of the continuing rise in the number of school children diagnosed with behaviour disorders. Not only are teachers now subject to a dense grid of legal regulation, they are also increasingly vulnerable to actions in tort. It will be argued here that as more and more children are labelled ‘disordered’, then the concomitant duty of care requirements for teachers becomes more onerous. As a consequence, teachers are less likely to be able to defend themselves against claims of negligence. It is concluded that while the schooling system needs to retain a healthy scepticism about each new pathologising disorder that seeks special status for its sufferers, it also needs to provide greater training and resources for teachers regarding disorder management. It is also concluded that recent changes to negligence law regarding the issue of ‘reasonable foreseeability’ within breach of duty of care, may not be as significant as might have been hoped by the teaching community. Indeed, the elevated standard of care, as required by increasing numbers of disordered pupils, place teachers in an ever more difficult legal position.
Resumo:
Despite the increasing popularity of social networking websites (SNWs), very little is known about the psychosocial variables which predict people’s use of these websites. The present study used an extended model of the theory of planned behaviour (TPB), including the additional variables of self-identity and belongingness, to predict high level SNW use intentions and behaviour in a sample of young people aged between 17 and 24 years. Additional analayses examined the impact of self-identity and belongingness on young people’s addictive tendencies towards SNWs. University students (N = 233) completed measures of the standard TPB constructs (attitude, subjective norm and perceived behavioural control), the additional predictor variables (self-identity and belongingness), demographic variables (age, gender, and past behaviour) and addictive tendencies. One week later, they reported their engagement in high level SNW use during the previous week. Regression analyses partially supported the TPB, as attitude and subjective norm signficantly predicted intentions to engage in high level SNW use with intention signficantly predicting behaviour. Self-identity, but not belongingness, signficantly contributed to the prediction of intention, and, unexpectedly, behaviour. Past behaviour also signficantly predicted intention and behaviour. Self-identity and belongingness signficantly predicted addictive tendencies toward SNWs. Overall, the present study revealed that high level SNW use is influenced by attitudinal, normative, and self-identity factors, findings which can be used to inform strategies that aim to modify young people’s high levels of use or addictive tendencies for SNWs.
Resumo:
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.
Resumo:
This study explored the role of donor prototype evaluations (perceptions of the typical organ donor) in organ donation communication decisions using an extended theory of planned behaviour (TPB) model. The model incorporated attitude, subjective norm, perceived behavioural control, moral norm, self-identity, and donor prototype evaluations to predict intentions to record consent on an organ donor register and discuss the organ donation decision with significant others. Participants completed surveys assessing the extended TPB constructs related to registering (n = 359) and discussing (n = 282). Results supported a role for donor prototype evaluations in predicting discussing intentions only. Both extended TPB structural equation models were a good fit to the data, accounting for 74 and 76% of the variance in registering and discussing intentions, respectively. Participants’ self-reported discussing behaviour (but not registering behaviour given low numbers of behavioural performers) was assessed 4 weeks later, with discussing intention as the only significant predictor of behaviour (Nagelkerke R2 = 0.11). These findings highlight the impact of people's perceptions of a typical donor on their decisions to discuss their organ donation preference, assisting our understanding of the factors influencing individuals' communication processes in efforts to bridge the gap between organ supply and demand.
Resumo:
Cold-formed steel members have been widely used in residential, industrial and commercial buildings as primary load bearing structural elements and non-load bearing structural elements (partitions) due to their advantages such as higher strength to weight ratio over the other structural materials such as hot-rolled steel, timber and concrete. Cold-formed steel members are often made from thin steel sheets and hence they are more susceptible to various buckling modes. Generally short columns are susceptible to local or distortional buckling while long columns to flexural or flexural-torsional buckling. Fire safety design of building structures is an essential requirement as fire events can cause loss of property and lives. Therefore it is essential to understand the fire performance of light gauge cold-formed steel structures under fire conditions. The buckling behaviour of cold-formed steel compression members under fire conditions is not well investigated yet and hence there is a lack of knowledge on the fire performance of cold-formed steel compression members. Current cold-formed steel design standards do not provide adequate design guidelines for the fire design of cold-formed steel compression members. Therefore a research project based on extensive experimental and numerical studies was undertaken at the Queensland University of Technology to investigate the buckling behaviour of light gauge cold-formed steel compression members under simulated fire conditions. As the first phase of this research, a detailed review was undertaken on the mechanical properties of light gauge cold-formed steels at elevated temperatures and the most reliable predictive models for mechanical properties and stress-strain models based on detailed experimental investigations were identified. Their accuracy was verified experimentally by carrying out a series of tensile coupon tests at ambient and elevated temperatures. As the second phase of this research, local buckling behaviour was investigated based on the experimental and numerical investigations at ambient and elevated temperatures. First a series of 91 local buckling tests was carried out at ambient and elevated temperatures on lipped and unlipped channels made of G250-0.95, G550-0.95, G250-1.95 and G450-1.90 cold-formed steels. Suitable finite element models were then developed to simulate the experimental conditions. These models were converted to ideal finite element models to undertake detailed parametric study. Finally all the ultimate load capacity results for local buckling were compared with the available design methods based on AS/NZS 4600, BS 5950 Part 5, Eurocode 3 Part 1.2 and the direct strength method (DSM), and suitable recommendations were made for the fire design of cold-formed steel compression members subject to local buckling. As the third phase of this research, flexural-torsional buckling behaviour was investigated experimentally and numerically. Two series of 39 flexural-torsional buckling tests were undertaken at ambient and elevated temperatures. The first series consisted 2800 mm long columns of G550-0.95, G250-1.95 and G450-1.90 cold-formed steel lipped channel columns while the second series contained 1800 mm long lipped channel columns of the same steel thickness and strength grades. All the experimental tests were simulated using a suitable finite element model, and the same model was used in a detailed parametric study following validation. Based on the comparison of results from the experimental and parametric studies with the available design methods, suitable design recommendations were made. This thesis presents a detailed description of the experimental and numerical studies undertaken on the mechanical properties and the local and flexural-torsional bucking behaviour of cold-formed steel compression member at ambient and elevated temperatures. It also describes the currently available ambient temperature design methods and their accuracy when used for fire design with appropriately reduced mechanical properties at elevated temperatures. Available fire design methods are also included and their accuracy in predicting the ultimate load capacity at elevated temperatures was investigated. This research has shown that the current ambient temperature design methods are capable of predicting the local and flexural-torsional buckling capacities of cold-formed steel compression members at elevated temperatures with the use of reduced mechanical properties. However, the elevated temperature design method in Eurocode 3 Part 1.2 is overly conservative and hence unsuitable, particularly in the case of flexural-torsional buckling at elevated temperatures.
Resumo:
Describes a brief intensive program of cognitive therapy for depression that was designed for 4 adult residents of country towns in Australia, who resided some distance from treatment centers. Ss were assessed prior to treatment, at posttreatment, and at 4-wk, 8-wk, and 20-mo follow-ups. Treatments took place over 3 consecutive days for a total period of 15 hrs. Effects were highly consistent with the impact of group treatments delivered on a more traditional schedule. If confirmed in a controlled group study, these results suggest that cognitive therapy may be applied more economically and more widely than was previously realized.
Resumo:
This paper explores how visibly non-heteronormative bodies mediate policing experiences of LGBT (lesbian, gay, bisexual, transgender) young people, an area that has been mostly ignored in research about policing young people. Informed by interviews with 35 LGBT young people in Brisbane, Queensland, this paper addresses this gap by exploring how the non-heteronormative body mediates policing experiences of LGBT young people. Drawing on Foucault (1984), Butler (1990a), and other queer theory, the paper argues young non-heteronormative bodies visibly perform ‘queerness’, are read by police, and shape police-LGBT youth interactions. While this is complicated by looking at-risk (in terms of risk factors like homelessness, substance abuse), and looking risky (in terms of risk-taking or criminalised activities), the paper concludes noting how youthful LGBT bodies are regulated by police as non-heteronormative and deviant.
Resumo:
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the most predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Resumo:
This thesis by publication contributes to our knowledge of psychological factors underlying a modern day phenomenon, young people’s mobile phone behaviour. Specifically, the thesis reports a PhD program of research which adopted a social psychological approach to explore mobile phone behaviour among young Australians aged between 15 and 24 years. A particular focus of the research program was to explore both the cognitive and behavioural aspects of young people’s mobile phone behaviour which for the purposes of this thesis is defined as mobile phone involvement. The research program comprised three separate stages which were developmental in nature, in that, the findings of each stage of the research program informed the next. The overarching goal of the program of research was to improve our understanding of the psychosocial factors influencing young people’s mobile phone behaviour. To achieve this overall goal, there were a number of aims to the research program which reflect the developmental nature of this thesis. Given the limited research into the mobile phone behaviour in Australia, the first two aims of the research program were to explore patterns of mobile phone behaviour among Australian youth and explore the social psychological factors relating to their mobile phone behaviour. Following this exploration, the research program sought to develop a measure which captures the cognitive and behavioural aspects of mobile phone behaviour. Finally, the research program aimed to examine and differentiate the psychosocial predictors of young people’s frequency of mobile phone use and their level of involvement with their mobile phone. Both qualitative and quantitative methodologies were used throughout the program of research. Five papers prepared during the three stages of the research program form the bulk of this thesis. The first stage of the research program was a qualitative investigation of young people’s mobile phone behaviour. Thirty-two young Australians participated in a series of focus groups in which they discussed their mobile phone behaviour. Thematic data analysis explored patterns of mobile phone behaviour among young people, developed an understanding of psychological factors influencing their use of mobile phones, and identified that symptoms of addiction were emerging in young people’s mobile phone behaviour. Two papers (Papers 1 and 2) emanated from this first stage of the research program. Paper 1 explored patterns of mobile phone behaviour and revealed that mobile phones were perceived as being highly beneficial to young people’s lives, with the ability to remain in constant contact with others being particularly valued. The paper also identified that symptoms of behavioural addiction including withdrawal, cognitive and behavioural salience, and loss of control, emerged in participants’ descriptions of their mobile phone behaviour. Paper 2 explored how young people’s need to belong and their social identity (two constructs previously unexplored in the context of mobile phone behaviour) related to their mobile phone behaviour. It was revealed that young people use their mobile phones to facilitate social attachments. Additionally, friends and peers influenced young people’s mobile phone behaviour; for example, their choice of mobile phone carrier and their most frequent type of mobile phone use. These papers laid the foundation for the further investigation of addictive patterns of behaviour and the role of social psychological factors on young people’s mobile behaviour throughout the research program. Stage 2 of the research program focussed on developing a new parsimonious measure of mobile phone behaviour, the Mobile Phone Involvement Questionnaire (MPIQ), which captured the cognitive and behavioural aspects of mobile phone use. Additionally, the stage included a preliminary exploration of factors influencing young people’s mobile phone behaviour. Participants (N = 946) completed a questionnaire which included a pool of items assessing symptoms of behavioural addiction, the uses and gratifications relating to mobile phone use, and self-identity and validation from others in the context of mobile phone behaviour. Two papers (Papers 3 & 4) emanated from the second stage of the research program. Paper 3 provided an important link between the qualitative and quantitative components of the research program. Qualitative data from Stage 1 indicated the reasons young people use their mobile phones and identified addictive characteristics present in young people’s mobile phone behaviour. Results of the quantitative study conducted in Stage 2 of the research program revealed the uses and gratifications relating to young people’s mobile phone behaviour and the effect of these gratifications on young people’s frequency of mobile phone use and three indicators of addiction, withdrawal, salience, and loss of control. Three major uses and gratifications: self (such as feeling good or as a fashion item), social (such as contacting friends), and security (such as use in an emergency) were found to underlie much of young people’s mobile phone behaviour. Self and social gratifications predicted young people’s frequency of mobile phone use and the three indicators of addiction but security gratifications did not. These results provided an important foundation for the inclusion of more specific psychosocial predictors in the later stages of the research program. Paper 4 reported the development of the mobile phone involvement questionnaire and a preliminary exploration of the effect of self-identity and validation from others on young people’s mobile phone behaviour. The MPIQ assessed a unitary construct and was a reliable measure amongst this cohort. Results found that self-identity influenced the frequency of young people’s use whereas self-identity and validation from others influenced their level of mobile phone involvement. These findings provided an important indication that, in addition to self factors, other people have a strong influence on young people’s involvement with their mobile phone and that mobile phone involvement is conceptually different to frequency of mobile phone use. Stage 3 of the research program empirically examined the psychosocial predictors of young people’s mobile behaviour and one paper, Paper 5, emanated from this stage. Young people (N = 292) from throughout Australia completed an online survey assessing the role of self-identity, ingroup norm, the need to belong, and self-esteem on their frequency of mobile phone use and their mobile phone involvement. Self-identity was the only psychosocial predictor of young people’s frequency of mobile phone use. In contrast, self-identity, ingroup norm, and need to belong all influenced young people’s level of involvement with their mobile phone. Additionally, the effect of self-esteem on young people’s mobile phone involvement was mediated by their need to belong. These results indicate that young people who perceive their mobile phone to be an integral part of their self-identity, who perceive that mobile phone is common amongst friends and peers, and who have a strong need for attachment to others, in some cases driven by a desire to enhance their self-esteem, are most likely to become highly involved with their mobile phones. Overall, this PhD program of research has provided an important contribution to our understanding of young Australians’ mobile phone behaviour. Results of the program have broadened our knowledge of factors influencing mobile phone behaviour beyond the approaches used in previous research. The use of various social psychological theories combined with a behavioural addiction framework provided a novel examination of young people’s mobile behaviour. In particular, the development of a new measure of mobile phone behaviour in the research program facilitated the differentiation of the psychosocial factors influencing frequency of young people’s mobile phone behaviour and their level of involvement with their mobile phone. Results of the research program indicate the important role that mobile phone behaviour plays in young people’s social development and also signals the characteristics of those people who may become highly involved with their mobile phone. Future research could build on this thesis by exploring whether mobile phones are affecting traditional social psychological processes and whether the results in this research program are generalisable to other cohorts and other communication technologies.