752 resultados para creativity of relationships
Resumo:
The focus of this thesis is discretionary work effort, that is, work effort that is voluntary, is above and beyond what is minimally required or normally expected to avoid reprimand or dismissal, and is organisationally functional. Discretionary work effort is an important construct because it is known to affect individual performance as well as organisational efficiency and effectiveness. To optimise organisational performance and ensure their long term competitiveness and sustainability, firms need to be able to induce their employees to work at or near their peak level. To work at or near their peak level, individuals must be willing to supply discretionary work effort. Thus, managers need to understand the determinants of discretionary work effort. Nonetheless, despite many years of scholarly investigation across multiple disciplines, considerable debate still exists concerning why some individuals supply only minimal work effort whilst others expend effort well above and beyond what is minimally required of them (Le. they supply discretionary work effort). Even though it is well recognised that discretionary work effort is important for promoting organisational performance and effectiveness, many authors claim that too little is being done by managers to increase the discretionary work effort of their employees. In this research, I have adopted a multi-disciplinary approach towards investigating the role of monetary and non-monetary work environment characteristics in determining discretionary work effort. My central research questions were "What non-monetary work environment characteristics do employees perceive as perks (perquisites) and irks (irksome work environment characteristics)?" and "How do perks, irks and monetary rewards relate to an employee's level of discretionary work effort?" My research took a unique approach in addressing these research questions. By bringing together the economics and organisational behaviour (OB) literatures, I identified problems with the current definition and conceptualisations of the discretionary work effort construct. I then developed and empirically tested a more concise and theoretically-based definition and conceptualisation of this construct. In doing so, I disaggregated discretionary work effort to include three facets - time, intensity and direction - and empirically assessed if different classes of work environment characteristics have a differential pattern of relationships with these facets. This analysis involved a new application of a multi-disciplinary framework of human behaviour as a tool for classifying work environment characteristics and the facets of discretionary work effort. To test my model of discretionary work effort, I used a public sector context in which there has been limited systematic empirical research into work motivation. The program of research undertaken involved three separate but interrelated studies using mixed methods. Data on perks, irks, monetary rewards and discretionary work effort were gathered from employees in 12 organisations in the local government sector in Western Australia. Non-monetary work environment characteristics that should be associated with discretionary work effort were initially identified through a review of the literature. Then, a qualitative study explored what work behaviours public sector employees perceive as discretionary and what perks and irks were associated with high and low levels of discretionary work effort. Next, a quantitative study developed measures of these perks and irks. A Q-sorttype procedure and exploratory factor analysis were used to develop the perks and irks measures. Finally, a second quantitative study tested the relationships amongst perks, irks, monetary rewards and discretionary work effort. Confirmatory factor analysis was firstly used to confirm the factor structure of the measurement models. Correlation analysis, regression analysis and effect-size correlation analysis were used to test the hypothesised relationships in the proposed model of discretionary work effort. The findings confirmed five hypothesised non-monetary work environment characteristics as common perks and two of three hypothesised non-monetary work environment characteristics as common irks. Importantly, they showed that perks, irks and monetary rewards are differentially related to the different facets of discretionary work effort. The convergent and discriminant validities of the perks and irks constructs as well as the time, intensity and direction facets of discretionary work effort were generally confirmed by the research findings. This research advances the literature in several ways: (i) it draws on the Economics and OB literatures to redefine and reconceptualise the discretionary work effort construct to provide greater definitional clarity and a more complete conceptualisation of this important construct; (ii) it builds on prior research to create a more comprehensive set of perks and irks for which measures are developed; (iii) it develops and empirically tests a new motivational model of discretionary work effort that enhances our understanding of the nature and functioning of perks and irks and advances our ability to predict discretionary work effort; and (iv) it fills a substantial gap in the literature on public sector work motivation by revealing what work behaviours public sector employees perceive as discretionary and what work environment characteristics are associated with their supply of discretionary work effort. Importantly, by disaggregating discretionary work effort this research provides greater detail on how perks, irks and monetary rewards are related to the different facets of discretionary work effort. Thus, from a theoretical perspective this research also demonstrates the conceptual meaningfulness and empirical utility of investigating the different facets of discretionary work effort separately. From a practical perspective, identifying work environment factors that are associated with discretionary work effort enhances managers' capacity to tap this valuable resource. This research indicates that to maximise the potential of their human resources, managers need to address perks, irks and monetary rewards. It suggests three different mechanisms through which managers might influence discretionary work effort and points to the importance of training for both managers and non-managers in cultivating positive interpersonal relationships.
Resumo:
Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.
Resumo:
Queensland University of Technology (QUT) completed an Australian National Data Service (ANDS) funded “Seeding the Commons Project” to contribute metadata to Research Data Australia. The project employed two Research Data Librarians from October 2009 through to July 2010. Technical support for the project was provided by QUT’s High Performance Computing and Research Support Specialists. ---------- The project identified and described QUT’s category 1 (ARC / NHMRC) research datasets. Metadata for the research datasets was stored in QUT’s Research Data Repository (Architecta Mediaflux). Metadata which was suitable for inclusion in Research Data Australia was made available to the Australian Research Data Commons (ARDC) in RIF-CS format. ---------- Several workflows and processes were developed during the project. 195 data interviews took place in connection with 424 separate research activities which resulted in the identification of 492 datasets. ---------- The project had a high level of technical support from QUT High Performance Computing and Research Support Specialists who developed the Research Data Librarian interface to the data repository that enabled manual entry of interview data and dataset metadata, creation of relationships between repository objects. The Research Data Librarians mapped the QUT metadata repository fields to RIF-CS and an application was created by the HPC and Research Support Specialists to generate RIF-CS files for harvest by the Australian Research Data Commons (ARDC). ---------- This poster will focus on the workflows and processes established for the project including: ---------- • Interview processes and instruments • Data Ingest from existing systems (including mapping to RIF-CS) • Data entry and the Data Librarian interface to Mediaflux • Verification processes • Mapping and creation of RIF-CS for the ARDC
Resumo:
Students with learning disabilities (LD) often experience significant feelings of loneliness. There is some evidence to suggest that these feelings of loneliness may be related to social difficulties that are linked to their learning disability. Adolescents experience more loneliness than any other age group, primarily because this is a time of identity formation and self-evaluation. Therefore, adolescents with learning disabilities are highly likely to experience the negative feelings of loneliness. Many areas of educational research have highlighted the impact of negative feelings on learning. This begs the question, =are adolescents with learning disabilities doubly disadvantaged in regard to their learning?‘ That is, if their learning experience is already problematic, does loneliness exacerbate these learning difficulties? This thesis reveals the findings of a doctoral project which examined this complicated relationship between loneliness and classroom participation using a social cognitive framework. In this multiple case-study design, narratives were constructed using classroom observations and interviews which were conducted with 4 adolescent students (2 girls and 2 boys, from years 9-12) who were identified as likely to be experiencing learning disabilities. Discussion is provided on the method used to identify students with learning disabilities and the related controversy of using disability labels. A key aspect of the design was that it allowed the students to relate their school experiences and have their stories told. The design included an ethnographic element in its focus on the interactions of the students within the school as a culture and elements of narrative inquiry were used, particularly in reporting the results. The narratives revealed all participants experienced problematic social networks. Further, an alarmingly high level of bullying was discovered. Participants reported that when they were feeling rejected or were missing a valued other they had little cognitive energy for learning and did not want to be in school. Absenteeism amongst the group was high, but this was also true for the rest of the school population. A number of relationships emerged from the narratives using social cognitive theory. These relationships highlighted the impact of cognitive, behavioural and environmental factors in the school experience of lonely students with learning disabilities. This approach reflects the social model of disability that frames the research.
Resumo:
Leadership has been described as having a moral purpose. This paper argues that theoretical insights from ethical leadership theory and empowerment theory are useful for understanding the work of community leaders. Community leaders tend to be people who are known mainly to their immediate community, work in a voluntary capacity and are committed to a particular goal or cause. The paper begins by referring to Starratt’s (1996) framework that comprises three inter-related ethics: an ethic of care, critique and justice, each of which is said to constitute ethical leadership. It then explores insights from empowerment theory since it is argued that it has some strong connections to ethical leadership. Central to both perspectives is the notion of relationships and ‘power to’ where power is shared and where people work together for change. Based on interviews with nine grassroots voluntary community leaders, this paper contributes to the limited research in the community leadership field by understanding more fully their values, beliefs and leadership practices. It is argued that the insights of ethical leadership and empowerment theory are highly relevant to explain their work and practice. The paper concludes by discussing some implications for leaders in educational settings.
Resumo:
Advances in data mining have provided techniques for automatically discovering underlying knowledge and extracting useful information from large volumes of data. Data mining offers tools for quick discovery of relationships, patterns and knowledge in large complex databases. Application of data mining to manufacturing is relatively limited mainly because of complexity of manufacturing data. Growing self organizing map (GSOM) algorithm has been proven to be an efficient algorithm to analyze unsupervised DNA data. However, it produced unsatisfactory clustering when used on some large manufacturing data. In this paper a data mining methodology has been proposed using a GSOM tool which was developed using a modified GSOM algorithm. The proposed method is used to generate clusters for good and faulty products from a manufacturing dataset. The clustering quality (CQ) measure proposed in the paper is used to evaluate the performance of the cluster maps. The paper also proposed an automatic identification of variables to find the most probable causative factor(s) that discriminate between good and faulty product by quickly examining the historical manufacturing data. The proposed method offers the manufacturers to smoothen the production flow and improve the quality of the products. Simulation results on small and large manufacturing data show the effectiveness of the proposed method.
Resumo:
This paper outlines how the project agreement operating on the Australian National Museum project in Canberra, Australia facilitated a responsible and responsive workplace environment for construction workers. A project alliancing approach was adopted and designed to encourage industrial relations innovation in the workplace. The trigger for this approach was the perceived success of the alliancing working arrangements between key project delivery teams and a desire to extend this arrangement to subcontractors, suppliers and the workforce. Changes in the Australian workplace relations environment and introduction of a national code of practice for the Australian construction industry provided impetus for reaching a new type of workplace agreement. The workplace culture and characteristics of relationships formed between workers and management on that site shaped the agreed terms and conditions of work. It also spurred the pursuit of innovative approaches to project delivery from a technology, management and workplace culture perspective.
Resumo:
The OECD (2006 Starting Strong II: Early Childhood Education and Care. OECD Publishing: Paris) envisions early childhood education and care settings as meeting places for diverse social groups; places that build social capital. This vision was assessed in a comparison of three preschools types: full-fee paying, subsidised-fee and publicly funded. The social composition within each was examined and the connectedness of the children (n = 472) who attended compared. Publicly funded preschools had more socially diverse populations. The quantity of social connectedness did not differ but children in publicly funded preschools described higher quality social relationships. Not all preschool settings are socially diverse but, where they are, the quality of relationships is highest.
Resumo:
Dealing with product yield and quality in manufacturing industries is getting more difficult due to the increasing volume and complexity of data and quicker time to market expectations. Data mining offers tools for quick discovery of relationships, patterns and knowledge in large databases. Growing self-organizing map (GSOM) is established as an efficient unsupervised datamining algorithm. In this study some modifications to the original GSOM are proposed for manufacturing yield improvement by clustering. These modifications include introduction of a clustering quality measure to evaluate the performance of the programme in separating good and faulty products and a filtering index to reduce noise from the dataset. Results show that the proposed method is able to effectively differentiate good and faulty products. It will help engineers construct the knowledge base to predict product quality automatically from collected data and provide insights for yield improvement.
Resumo:
This thesis develops a detailed conceptual design method and a system software architecture defined with a parametric and generative evolutionary design system to support an integrated interdisciplinary building design approach. The research recognises the need to shift design efforts toward the earliest phases of the design process to support crucial design decisions that have a substantial cost implication on the overall project budget. The overall motivation of the research is to improve the quality of designs produced at the author's employer, the General Directorate of Major Works (GDMW) of the Saudi Arabian Armed Forces. GDMW produces many buildings that have standard requirements, across a wide range of environmental and social circumstances. A rapid means of customising designs for local circumstances would have significant benefits. The research considers the use of evolutionary genetic algorithms in the design process and the ability to generate and assess a wider range of potential design solutions than a human could manage. This wider ranging assessment, during the early stages of the design process, means that the generated solutions will be more appropriate for the defined design problem. The research work proposes a design method and system that promotes a collaborative relationship between human creativity and the computer capability. The tectonic design approach is adopted as a process oriented design that values the process of design as much as the product. The aim is to connect the evolutionary systems to performance assessment applications, which are used as prioritised fitness functions. This will produce design solutions that respond to their environmental and function requirements. This integrated, interdisciplinary approach to design will produce solutions through a design process that considers and balances the requirements of all aspects of the design. Since this thesis covers a wide area of research material, 'methodological pluralism' approach was used, incorporating both prescriptive and descriptive research methods. Multiple models of research were combined and the overall research was undertaken following three main stages, conceptualisation, developmental and evaluation. The first two stages lay the foundations for the specification of the proposed system where key aspects of the system that have not previously been proven in the literature, were implemented to test the feasibility of the system. As a result of combining the existing knowledge in the area with the newlyverified key aspects of the proposed system, this research can form the base for a future software development project. The evaluation stage, which includes building the prototype system to test and evaluate the system performance based on the criteria defined in the earlier stage, is not within the scope this thesis. The research results in a conceptual design method and a proposed system software architecture. The proposed system is called the 'Hierarchical Evolutionary Algorithmic Design (HEAD) System'. The HEAD system has shown to be feasible through the initial illustrative paper-based simulation. The HEAD system consists of the two main components - 'Design Schema' and the 'Synthesis Algorithms'. The HEAD system reflects the major research contribution in the way it is conceptualised, while secondary contributions are achieved within the system components. The design schema provides constraints on the generation of designs, thus enabling the designer to create a wide range of potential designs that can then be analysed for desirable characteristics. The design schema supports the digital representation of the human creativity of designers into a dynamic design framework that can be encoded and then executed through the use of evolutionary genetic algorithms. The design schema incorporates 2D and 3D geometry and graph theory for space layout planning and building formation using the Lowest Common Design Denominator (LCDD) of a parameterised 2D module and a 3D structural module. This provides a bridge between the standard adjacency requirements and the evolutionary system. The use of graphs as an input to the evolutionary algorithm supports the introduction of constraints in a way that is not supported by standard evolutionary techniques. The process of design synthesis is guided as a higher level description of the building that supports geometrical constraints. The Synthesis Algorithms component analyses designs at four levels, 'Room', 'Layout', 'Building' and 'Optimisation'. At each level multiple fitness functions are embedded into the genetic algorithm to target the specific requirements of the relevant decomposed part of the design problem. Decomposing the design problem to allow for the design requirements of each level to be dealt with separately and then reassembling them in a bottom up approach reduces the generation of non-viable solutions through constraining the options available at the next higher level. The iterative approach, in exploring the range of design solutions through modification of the design schema as the understanding of the design problem improves, assists in identifying conflicts in the design requirements. Additionally, the hierarchical set-up allows the embedding of multiple fitness functions into the genetic algorithm, each relevant to a specific level. This supports an integrated multi-level, multi-disciplinary approach. The HEAD system promotes a collaborative relationship between human creativity and the computer capability. The design schema component, as the input to the procedural algorithms, enables the encoding of certain aspects of the designer's subjective creativity. By focusing on finding solutions for the relevant sub-problems at the appropriate levels of detail, the hierarchical nature of the system assist in the design decision-making process.
Resumo:
The combined impact of social class, cultural background and experience upon early literacy achievement in the first year of schooling is among the most durable questions in educational research. Links have been established between social class and achievement but literacy involves complex social and cognitive practices that are not necessarily reflected in the connections that have been made. The complexity of relationships between social class, cultural background and experience, and their impact on early literacy achievement have received little research attention. Recent refinements of the broad terms of social class or socioeconomic status have questioned the established links between social class and achievement. Nevertheless, it remains difficult to move beyond deficit and mismatch models of explaining and understanding the underperformance of children from lower socioeconomic and cultural minority groups when conventional measures are used. The data from an Australian pilot study reported here add to the increasing evidence that income is not necessarily related directly to home literacy resources or to how those resources are used. Further, the data show that the level of print resources in the home may not be a good indicator of the level of use of those resources.
Resumo:
IT-supported field data management benefits on-site construction management by improving accessibility to the information and promoting efficient communication between project team members. However, most of on-site safety inspections still heavily rely on subjective judgment and manual reporting processes and thus observers’ experiences often determine the quality of risk identification and control. This study aims to develop a methodology to efficiently retrieve safety-related information so that the safety inspectors can easily access to the relevant site safety information for safer decision making. The proposed methodology consists of three stages: (1) development of a comprehensive safety database which contains information of risk factors, accident types, impact of accidents and safety regulations; (2) identification of relationships among different risk factors based on statistical analysis methods; and (3) user-specified information retrieval using data mining techniques for safety management. This paper presents an overall methodology and preliminary results of the first stage research conducted with 101 accident investigation reports.
Resumo:
Purpose: This study provides insight into the histories and current statuses of queer community archives in California and explores what the archives profession can learn from the queer community archives and archivists. Through the construction of histories of three community archives (GLBT Historical Society; Lavender Library, Archives, and Cultural Exchange of Sacramento, Inc.; and ONE National Gay & Lesbian Archives), the study discovered why these independent, community-based archives were created, the issues that influenced their evolution, and the similarities and differences among them. Additionally, it compared the community archives to institutional archives which collect queer materials to explore the similarities and differences among the archives and determine possible implications for the archives profession. Significance: The study contributes to the literature in several significant ways: it is the first in-depth comparative history of the queer community archives; it adds to the cross-disciplinary research in archives and history; it contributes to the current debates on the nature of the archives and the role of the professional archivist; and it has implications for changing archival practice. Methodology: This study used social constructionism for epistemological positioning and new social history theory for theoretical framework. Information was gathered through seven oral history interviews with community archivists and volunteers and from materials in the archives’ collections. This evidence was used to construct the histories of the archives and determine their current statuses. The institutional archives used in the comparisons are the: University of California, Berkeley’s Bancroft Library; University of California, Santa Cruz’s Special Collections and University Archives; and San Francisco Public Library’s James C. Hormel Gay and Lesbian Center. The collection policies, finding aids, and archival collections related to the queer communities at the institutional and community archives were compared to determine commonalities and differences among the archives. Findings: The findings revealed striking similarities in the histories of the community archives and important implications for the archives’ survival and their relevancy to the archives profession. Each archives was started by an individual or small group collecting materials to preserve history that would otherwise have been lost as institutional archives were not collecting queer materials. These private collections grew and became the basis for the community archives. The community archives differ in their staffing models, circulation policies, and descriptive practices. The community archives have grown to incorporate more public programming functions than most institutional archives. While in the past, the community archives had little connection to institutional archives, today they have varying degrees of partnerships. However, the historical lack of collecting queer materials by institutional archives makes some members of the communities reluctant to donate materials to institutional archives or collaborate with them. All three queer community archives are currently managed by professionally trained and educated archivists and face financial issues impacting their continued survival. The similarities and differences between the community and institutional archives include differences in collection policies, language differences in the finding aids, and differing levels of relationships between the archives. However, they share similar sensitivity in the use of language in describing the queer communities and overlap in the types of materials collected. Implications: This study supports previous research on community archives showing that communities take the preservation of history into their own hands when ignored by mainstream archives (Flinn, 2007; Flinn & Stevens, 2009; Nestle, 1990). Based on the study’s findings, institutional archivists could learn from their community archivist counterparts better ways to become involved in and relevant to the communities whose records they possess. This study also expands the understanding of history of the queer communities to include in-depth research into the archives which preserve and make available material for constructing history. Furthermore, this study supports reflective practice for archivists, especially in terms of descriptions used in finding aids. It also supports changes in graduate education for archives students to enable archivists in the United States to be more fully cognizant of community archives and able to engage in collaborative, international projects. Through this more activist role of the archivists, partnerships between the community and institutional archives would be built to establish more collaborative, respectful relationships with the communities in this post-custodial age of the archives (Stevens, Flinn, & Shepherd, 2010). Including community archives in discussions of archival practice and theory is one way of ensuring archives represent and serve a diversity of voices.
Resumo:
IT-supported field data management benefits on-site construction management by improving accessibility to the information and promoting efficient communication between project team members. However, most of on-site safety inspections still heavily rely on subjective judgment and manual reporting processes and thus observers’ experiences often determine the quality of risk identification and control. This study aims to develop a methodology to efficiently retrieve safety-related information so that the safety inspectors can easily access to the relevant site safety information for safer decision making. The proposed methodology consists of three stages: (1) development of a comprehensive safety database which contains information of risk factors, accident types, impact of accidents and safety regulations; (2) identification of relationships among different risk factors based on statistical analysis methods; and (3) user-specified information retrieval using data mining techniques for safety management. This paper presents an overall methodology and preliminary results of the first stage research conducted with 101 accident investigation reports.
Resumo:
Design and Anthropology challenges conventional thinking regarding the nature of design and creativity, in a way that acknowledges the improvisatory skills and perceptual acuity of people. Combining theoretical investigations and documentation of practice based experiments, it addresses methodological questions concerning the re-conceptualisation of the relation between design and use from both theoretical and practice-based positions. Concerned with what it means to draw 'users' into processes of designing and producing this book emphasises the creativity of design and the emergence of objects in social situations and collaborative endeavours. Organised around the themes of perception and the user-producer, skilled practices of designing and using, and the relation between people and things, the book contains the latest work of researchers from academia and industry, to enhance our understanding of ethnographic practice and develop a research agenda for the emergent field of design anthropology. Drawing together work from anthropologists, philosophers, designers, engineers, scholars of innovation and theatre practitioners, Design and Anthropology will appeal to anthropologists and to those working in the fields of design and innovation, and the philosophy of technology and engineering.