863 resultados para Job Demands-Resources model
Resumo:
This paper studies how firms make layoff decisions in the presence of adverse shocks. In this uncertain environment, workers' expectations about their job security affect their on-the-job performance. This productivity effect on job insecurity forces firms to strike a balance between laying off redundant workers and maintaining survivors' commitment when deciding on the amount and timing of downsizing. This framework offers an explanation of conservative employment practices (such as zero or reduced layoffs) based on firms having private information about their future profits. High retention rates and wages can signal that the firm has a bright future, boosting workers' confidence. Moreover, the model provides clear predictions about when waves of downsizing will occur as opposed to one-time massive cuts.
Resumo:
We generalize the Mortensen-Pissarides (1994) model of the labor marketwith a more realistic structure for the stochastic process of theshocks to the worker-firm match. In this way we can acommodate theempirical observation that hazard rates of job termination decrease andaverage wages increase with job tenure. Besides being able to fit bettersome observables of the model, the changes we introduce are nontrivialfor the analysis of policies as well.
Resumo:
This paper considers a job search model where the environment is notstationary along the unemployment spell and where jobs do not lastforever. Under this circumstance, reservation wages can be lower thanwithout separations, as in a stationary environment, but they can alsobe initially higher because of the non-stationarity of the model. Moreover,the time-dependence of reservation wages is stronger than with noseparations. The model is estimated structurally using Spanish data forthe period 1985-1996. The main finding is that, although the decrease inreservation wages is the main determinant of the change in the exit ratefrom unemployment for the first four months, later on the only effect comesfrom the job offer arrival rate, given that acceptance probabilities areroughly equal to one.
Resumo:
In this chapter we portray the effects of female education and professional achievementon fertility decline in Spain over the period 1920-1980 (birth cohorts of 1900-1950).A longitudinal econometric approach is used to test the hypothesis that the effectsof women s education in the revaluing of their time had a very significant influence onfertility decline. Although in the historical context presented here improvements inschooling were on a modest scale, they were continuous (with the interruption of theCivil War) and had a significant impact in shaping a model of low fertility in Spain. Wealso stress the relevance of this result in a context such as the Spanish for which liberalvalues were absent, fertility control practices were forbidden, and labour forceparticipation of women was politically and socially constrained.
Resumo:
In this paper I show how borrowing constraints and job search interact.I fit a dynamic model to data from the National Longitudinal Survey(1979-cohort) and show that borrowing constraints are significant. Agentswith more initial assets and more access to credit attain higher wagesfor several periods after high school graduation. The unemployed maintaintheir consumption by running down their assets, while the employed saveto buffer against future unemployment spells. I also show that, unlikein models with exogenous income streams, unemployment transfers, byallowing agents to attain higher wages do not 'crowd out' but increasesaving.
Resumo:
The Neolithic was marked by a transition from small and relatively egalitarian groups to much larger groups with increased stratification. But, the dynamics of this remain poorly understood. It is hard to see how despotism can arise without coercion, yet coercion could not easily have occurred in an egalitarian setting. Using a quantitative model of evolution in a patch-structured population, we demonstrate that the interaction between demographic and ecological factors can overcome this conundrum. We model the coevolution of individual preferences for hierarchy alongside the degree of despotism of leaders, and the dispersal preferences of followers. We show that voluntary leadership without coercion can evolve in small groups, when leaders help to solve coordination problems related to resource production. An example is coordinating construction of an irrigation system. Our model predicts that the transition to larger despotic groups will then occur when: (i) surplus resources lead to demographic expansion of groups, removing the viability of an acephalous niche in the same area and so locking individuals into hierarchy; (ii) high dispersal costs limit followers' ability to escape a despot. Empirical evidence suggests that these conditions were probably met, for the first time, during the subsistence intensification of the Neolithic.
Resumo:
Commuting consists in the fact that an important fraction of workers in developed countries do not reside close to their workplaces but at long distances from them, so they have to travel to their jobs and then back home daily. Although most workers hold a job in the same municipality where they live or in a neighbouring one, an important fraction of workers face long daily trips to get to their workplace and then back home.Even if we divide Catalonia (Spain) in small aggregations of municipalities, trying to make them as close to local labour markets as possible, we will find out that some of them have a positive commuting balance, attracting many workers from other areas and providing local jobs for almost all their resident workers. On the other side, other zones seem to be mostly residential, so an important fraction of their resident workers hold jobs in different local labour markets. Which variables influence an area¿s role as an attraction pole or a residential zone? In previous papers (Artís et al, 1998a, 2000; Romaní, 1999) we have brought out the main individual variables that influence commuting by analysing a sample of Catalan workers and their commuting decisions. In this paper we perform an analysis of the territorial variables that influence commuting, using data for aggregate commuting flows in Catalonia from the 1991 and 1996 Spanish Population Censuses.These variables influence commuting in two different ways: a zone with a dense, welldeveloped economical structure will have a high density of jobs. Work demand cannot be fulfilled with resident workers, so it spills over local boundaries. On the other side, this economical activity has a series of side-effects like pollution, congestion or high land prices which make these areas less desirable to live in. Workers who can afford it may prefer to live in less populated, less congested zones, where they can find cheaper land, larger homes and a better quality of life. The penalty of this decision is an increased commuting time. Our aim in this paper is to highlight the influence of local economical structure and amenities endowment in the workplace-residence location decision. A place-to-place logit commuting models is estimated for 1991 and 1996 in order to find the economical and amenities variables with higher influence in commuting decisions. From these models, we can outline a first approximation to the evolution of these variables in the 1986-1996 period. Data have been obtained from aggregate flow travel-matrix from the 1986, 1991 and 1996 Spanish Population Censuses
Resumo:
Commuting consists in the fact that an important fraction of workers in developed countries do not reside close to their workplaces but at long distances from them, so they have to travel to their jobs and then back home daily. Although most workers hold a job in the same municipality where they live or in a neighbouring one, an important fraction of workers face long daily trips to get to their workplace and then back home.Even if we divide Catalonia (Spain) in small aggregations of municipalities, trying to make them as close to local labour markets as possible, we will find out that some of them have a positive commuting balance, attracting many workers from other areas and providing local jobs for almost all their resident workers. On the other side, other zones seem to be mostly residential, so an important fraction of their resident workers hold jobs in different local labour markets. Which variables influence an area¿s role as an attraction pole or a residential zone? In previous papers (Artís et al, 1998a, 2000; Romaní, 1999) we have brought out the main individual variables that influence commuting by analysing a sample of Catalan workers and their commuting decisions. In this paper we perform an analysis of the territorial variables that influence commuting, using data for aggregate commuting flows in Catalonia from the 1991 and 1996 Spanish Population Censuses.These variables influence commuting in two different ways: a zone with a dense, welldeveloped economical structure will have a high density of jobs. Work demand cannot be fulfilled with resident workers, so it spills over local boundaries. On the other side, this economical activity has a series of side-effects like pollution, congestion or high land prices which make these areas less desirable to live in. Workers who can afford it may prefer to live in less populated, less congested zones, where they can find cheaper land, larger homes and a better quality of life. The penalty of this decision is an increased commuting time. Our aim in this paper is to highlight the influence of local economical structure and amenities endowment in the workplace-residence location decision. A place-to-place logit commuting models is estimated for 1991 and 1996 in order to find the economical and amenities variables with higher influence in commuting decisions. From these models, we can outline a first approximation to the evolution of these variables in the 1986-1996 period. Data have been obtained from aggregate flow travel-matrix from the 1986, 1991 and 1996 Spanish Population Censuses
Resumo:
In an era of increasing concern for limited water resources a wise joint management of conventional and nonconventional water resources must be considered. Water scarcity aggravates in coastal zones which are often characterised by high population density, intense economic activity and tourism; meaning heavy seasonal water demands. The relationships between sea and land-water can also compromise the quality of available freshwater. In this context, the use of non-conventional water increases the availability of water supplies. Non-conventional water resources of low quality could be directed to meet several needs (like watering lawns, washing cars, flushing toilets and cooling systems, among others). Therefore, significantly more potable water would be available to meet human demand for safe water.
Resumo:
Researchers should continuously ask how to improve the models we rely on to make financial decisions in terms of the planning, design, construction, and maintenance of roadways. This project presents an alternative tool that will supplement local decision making but maintain a full appreciation of the complexity and sophistication of today’s regional model and local traffic impact study methodologies. This alternative method is tailored to the desires of local agencies, which requested a better, faster, and easier way to evaluate land uses and their impact on future traffic demands at the sub-area or project corridor levels. A particular emphasis was placed on scenario planning for currently undeveloped areas. The scenario planning tool was developed using actual land use and roadway information for the communities of Johnston and West Des Moines, Iowa. Both communities used the output from this process to make regular decisions regarding infrastructure investment, design, and land use planning. The City of Johnston case study included forecasting future traffic for the western portion of the city within a 2,600-acre area, which included 42 intersections. The City of West Des Moines case study included forecasting future traffic for the city’s western growth area covering over 30,000 acres and 331 intersections. Both studies included forecasting a.m. and p.m. peak-hour traffic volumes based upon a variety of different land use scenarios. The tool developed took goegraphic information system (GIS)-based parcel and roadway information, converted the data into a graphical spreadsheet tool, allowed the user to conduct trip generation, distribution, and assignment, and then to automatically convert the data into a Synchro roadway network which allows for capacity analysis and visualization. The operational delay outputs were converted back into a GIS thematic format for contrast and further scenario planning. This project has laid the groundwork for improving both planning and civil transportation decision making at the sub-regional, super-project level.
Resumo:
Working in a NGO often involves providing life saving resources (food, medicine, equipment, water, etc) to needy populations around the globe. Such duty requires highly dedicated employees and humanitarian workers are said to face a hign degree of pressure in their daily work. Despite the evidence of taxing work demands, and a high potential for stress related problems, very few studies on occupational chronic stress have specifically looked at NGO workers. Assuming that "field stress" can relay to workers at headquarters, we carried out an exploratory study about occupational health among employees of a NGO's headquarters. We sent a questionnaire to all employees (N=130) of a NGO headquarters located in Switzerland. We used the TST questionnaire (French version of the Langner's questionnaire on psychiatric symptoms) to identify cases with potential mental health problems. We also included in the questionnaire some items about motivation, acknowledgment, work-life balance, job demand, and autonomy. A total of 75 employees answered our questionnaire (57% response rate). 44% of our sample were men (n=33) and 56% were women (n=42). The mean age was of 40 years (SD=7.6). 56% were working at the headquarters of the NGO in questions as of 2 years or less. Not surprisingly, a majority of respondents reported to be highly motivated (74%) and the meaning of work was important for 80% of them. However, 35% indicated having problems in conciliating their private and professional life. Most frequent reported symptoms included feeling "weak all over" (81%), having "trouble getting asleep often" (35%), "clogging in nose" (35%), feeling "nervous often" (33%), and "memory not all right" (33%). The score for psychiatric symptoms was high in 8 (11%) employees whose health might therefore be at risk. In comparison, other sudies showed that this proportion was 9% for French teachers and 16% for sales personnel1. Results show that symptoms of mental health problems do occur among NGO workers. Some of these symptoms are known to be linked to occupational stress. Chronic stress manifests itself first in non-specific symptoms (e.g. fatigue) and later in specific pathologies. This could explain the relatively low proportion of cases with a high score in Langner's scale than was expected. Therefore, we hypothesize a healthy worker effect. The fact that our sample is 40 years old in average, and that the turnover is quite high can also support this hypothesis. Further research is needed in order to better understand occupational stress in this specific population. An upcoming study will investigate the role of organizational factors associated with health complaints. Therefore, a longitudinal survey including quantitative and qualitative methods is appropriate.
Resumo:
EXECUTIVE SUMMARY : Evaluating Information Security Posture within an organization is becoming a very complex task. Currently, the evaluation and assessment of Information Security are commonly performed using frameworks, methodologies and standards which often consider the various aspects of security independently. Unfortunately this is ineffective because it does not take into consideration the necessity of having a global and systemic multidimensional approach to Information Security evaluation. At the same time the overall security level is globally considered to be only as strong as its weakest link. This thesis proposes a model aiming to holistically assess all dimensions of security in order to minimize the likelihood that a given threat will exploit the weakest link. A formalized structure taking into account all security elements is presented; this is based on a methodological evaluation framework in which Information Security is evaluated from a global perspective. This dissertation is divided into three parts. Part One: Information Security Evaluation issues consists of four chapters. Chapter 1 is an introduction to the purpose of this research purpose and the Model that will be proposed. In this chapter we raise some questions with respect to "traditional evaluation methods" as well as identifying the principal elements to be addressed in this direction. Then we introduce the baseline attributes of our model and set out the expected result of evaluations according to our model. Chapter 2 is focused on the definition of Information Security to be used as a reference point for our evaluation model. The inherent concepts of the contents of a holistic and baseline Information Security Program are defined. Based on this, the most common roots-of-trust in Information Security are identified. Chapter 3 focuses on an analysis of the difference and the relationship between the concepts of Information Risk and Security Management. Comparing these two concepts allows us to identify the most relevant elements to be included within our evaluation model, while clearing situating these two notions within a defined framework is of the utmost importance for the results that will be obtained from the evaluation process. Chapter 4 sets out our evaluation model and the way it addresses issues relating to the evaluation of Information Security. Within this Chapter the underlying concepts of assurance and trust are discussed. Based on these two concepts, the structure of the model is developed in order to provide an assurance related platform as well as three evaluation attributes: "assurance structure", "quality issues", and "requirements achievement". Issues relating to each of these evaluation attributes are analysed with reference to sources such as methodologies, standards and published research papers. Then the operation of the model is discussed. Assurance levels, quality levels and maturity levels are defined in order to perform the evaluation according to the model. Part Two: Implementation of the Information Security Assurance Assessment Model (ISAAM) according to the Information Security Domains consists of four chapters. This is the section where our evaluation model is put into a welldefined context with respect to the four pre-defined Information Security dimensions: the Organizational dimension, Functional dimension, Human dimension, and Legal dimension. Each Information Security dimension is discussed in a separate chapter. For each dimension, the following two-phase evaluation path is followed. The first phase concerns the identification of the elements which will constitute the basis of the evaluation: ? Identification of the key elements within the dimension; ? Identification of the Focus Areas for each dimension, consisting of the security issues identified for each dimension; ? Identification of the Specific Factors for each dimension, consisting of the security measures or control addressing the security issues identified for each dimension. The second phase concerns the evaluation of each Information Security dimension by: ? The implementation of the evaluation model, based on the elements identified for each dimension within the first phase, by identifying the security tasks, processes, procedures, and actions that should have been performed by the organization to reach the desired level of protection; ? The maturity model for each dimension as a basis for reliance on security. For each dimension we propose a generic maturity model that could be used by every organization in order to define its own security requirements. Part three of this dissertation contains the Final Remarks, Supporting Resources and Annexes. With reference to the objectives of our thesis, the Final Remarks briefly analyse whether these objectives were achieved and suggest directions for future related research. Supporting resources comprise the bibliographic resources that were used to elaborate and justify our approach. Annexes include all the relevant topics identified within the literature to illustrate certain aspects of our approach. Our Information Security evaluation model is based on and integrates different Information Security best practices, standards, methodologies and research expertise which can be combined in order to define an reliable categorization of Information Security. After the definition of terms and requirements, an evaluation process should be performed in order to obtain evidence that the Information Security within the organization in question is adequately managed. We have specifically integrated into our model the most useful elements of these sources of information in order to provide a generic model able to be implemented in all kinds of organizations. The value added by our evaluation model is that it is easy to implement and operate and answers concrete needs in terms of reliance upon an efficient and dynamic evaluation tool through a coherent evaluation system. On that basis, our model could be implemented internally within organizations, allowing them to govern better their Information Security. RÉSUMÉ : Contexte général de la thèse L'évaluation de la sécurité en général, et plus particulièrement, celle de la sécurité de l'information, est devenue pour les organisations non seulement une mission cruciale à réaliser, mais aussi de plus en plus complexe. A l'heure actuelle, cette évaluation se base principalement sur des méthodologies, des bonnes pratiques, des normes ou des standards qui appréhendent séparément les différents aspects qui composent la sécurité de l'information. Nous pensons que cette manière d'évaluer la sécurité est inefficiente, car elle ne tient pas compte de l'interaction des différentes dimensions et composantes de la sécurité entre elles, bien qu'il soit admis depuis longtemps que le niveau de sécurité globale d'une organisation est toujours celui du maillon le plus faible de la chaîne sécuritaire. Nous avons identifié le besoin d'une approche globale, intégrée, systémique et multidimensionnelle de l'évaluation de la sécurité de l'information. En effet, et c'est le point de départ de notre thèse, nous démontrons que seule une prise en compte globale de la sécurité permettra de répondre aux exigences de sécurité optimale ainsi qu'aux besoins de protection spécifiques d'une organisation. Ainsi, notre thèse propose un nouveau paradigme d'évaluation de la sécurité afin de satisfaire aux besoins d'efficacité et d'efficience d'une organisation donnée. Nous proposons alors un modèle qui vise à évaluer d'une manière holistique toutes les dimensions de la sécurité, afin de minimiser la probabilité qu'une menace potentielle puisse exploiter des vulnérabilités et engendrer des dommages directs ou indirects. Ce modèle se base sur une structure formalisée qui prend en compte tous les éléments d'un système ou programme de sécurité. Ainsi, nous proposons un cadre méthodologique d'évaluation qui considère la sécurité de l'information à partir d'une perspective globale. Structure de la thèse et thèmes abordés Notre document est structuré en trois parties. La première intitulée : « La problématique de l'évaluation de la sécurité de l'information » est composée de quatre chapitres. Le chapitre 1 introduit l'objet de la recherche ainsi que les concepts de base du modèle d'évaluation proposé. La maniéré traditionnelle de l'évaluation de la sécurité fait l'objet d'une analyse critique pour identifier les éléments principaux et invariants à prendre en compte dans notre approche holistique. Les éléments de base de notre modèle d'évaluation ainsi que son fonctionnement attendu sont ensuite présentés pour pouvoir tracer les résultats attendus de ce modèle. Le chapitre 2 se focalise sur la définition de la notion de Sécurité de l'Information. Il ne s'agit pas d'une redéfinition de la notion de la sécurité, mais d'une mise en perspectives des dimensions, critères, indicateurs à utiliser comme base de référence, afin de déterminer l'objet de l'évaluation qui sera utilisé tout au long de notre travail. Les concepts inhérents de ce qui constitue le caractère holistique de la sécurité ainsi que les éléments constitutifs d'un niveau de référence de sécurité sont définis en conséquence. Ceci permet d'identifier ceux que nous avons dénommés « les racines de confiance ». Le chapitre 3 présente et analyse la différence et les relations qui existent entre les processus de la Gestion des Risques et de la Gestion de la Sécurité, afin d'identifier les éléments constitutifs du cadre de protection à inclure dans notre modèle d'évaluation. Le chapitre 4 est consacré à la présentation de notre modèle d'évaluation Information Security Assurance Assessment Model (ISAAM) et la manière dont il répond aux exigences de l'évaluation telle que nous les avons préalablement présentées. Dans ce chapitre les concepts sous-jacents relatifs aux notions d'assurance et de confiance sont analysés. En se basant sur ces deux concepts, la structure du modèle d'évaluation est développée pour obtenir une plateforme qui offre un certain niveau de garantie en s'appuyant sur trois attributs d'évaluation, à savoir : « la structure de confiance », « la qualité du processus », et « la réalisation des exigences et des objectifs ». Les problématiques liées à chacun de ces attributs d'évaluation sont analysées en se basant sur l'état de l'art de la recherche et de la littérature, sur les différentes méthodes existantes ainsi que sur les normes et les standards les plus courants dans le domaine de la sécurité. Sur cette base, trois différents niveaux d'évaluation sont construits, à savoir : le niveau d'assurance, le niveau de qualité et le niveau de maturité qui constituent la base de l'évaluation de l'état global de la sécurité d'une organisation. La deuxième partie: « L'application du Modèle d'évaluation de l'assurance de la sécurité de l'information par domaine de sécurité » est elle aussi composée de quatre chapitres. Le modèle d'évaluation déjà construit et analysé est, dans cette partie, mis dans un contexte spécifique selon les quatre dimensions prédéfinies de sécurité qui sont: la dimension Organisationnelle, la dimension Fonctionnelle, la dimension Humaine, et la dimension Légale. Chacune de ces dimensions et son évaluation spécifique fait l'objet d'un chapitre distinct. Pour chacune des dimensions, une évaluation en deux phases est construite comme suit. La première phase concerne l'identification des éléments qui constituent la base de l'évaluation: ? Identification des éléments clés de l'évaluation ; ? Identification des « Focus Area » pour chaque dimension qui représentent les problématiques se trouvant dans la dimension ; ? Identification des « Specific Factors » pour chaque Focus Area qui représentent les mesures de sécurité et de contrôle qui contribuent à résoudre ou à diminuer les impacts des risques. La deuxième phase concerne l'évaluation de chaque dimension précédemment présentées. Elle est constituée d'une part, de l'implémentation du modèle général d'évaluation à la dimension concernée en : ? Se basant sur les éléments spécifiés lors de la première phase ; ? Identifiant les taches sécuritaires spécifiques, les processus, les procédures qui auraient dû être effectués pour atteindre le niveau de protection souhaité. D'autre part, l'évaluation de chaque dimension est complétée par la proposition d'un modèle de maturité spécifique à chaque dimension, qui est à considérer comme une base de référence pour le niveau global de sécurité. Pour chaque dimension nous proposons un modèle de maturité générique qui peut être utilisé par chaque organisation, afin de spécifier ses propres exigences en matière de sécurité. Cela constitue une innovation dans le domaine de l'évaluation, que nous justifions pour chaque dimension et dont nous mettons systématiquement en avant la plus value apportée. La troisième partie de notre document est relative à la validation globale de notre proposition et contient en guise de conclusion, une mise en perspective critique de notre travail et des remarques finales. Cette dernière partie est complétée par une bibliographie et des annexes. Notre modèle d'évaluation de la sécurité intègre et se base sur de nombreuses sources d'expertise, telles que les bonnes pratiques, les normes, les standards, les méthodes et l'expertise de la recherche scientifique du domaine. Notre proposition constructive répond à un véritable problème non encore résolu, auquel doivent faire face toutes les organisations, indépendamment de la taille et du profil. Cela permettrait à ces dernières de spécifier leurs exigences particulières en matière du niveau de sécurité à satisfaire, d'instancier un processus d'évaluation spécifique à leurs besoins afin qu'elles puissent s'assurer que leur sécurité de l'information soit gérée d'une manière appropriée, offrant ainsi un certain niveau de confiance dans le degré de protection fourni. Nous avons intégré dans notre modèle le meilleur du savoir faire, de l'expérience et de l'expertise disponible actuellement au niveau international, dans le but de fournir un modèle d'évaluation simple, générique et applicable à un grand nombre d'organisations publiques ou privées. La valeur ajoutée de notre modèle d'évaluation réside précisément dans le fait qu'il est suffisamment générique et facile à implémenter tout en apportant des réponses sur les besoins concrets des organisations. Ainsi notre proposition constitue un outil d'évaluation fiable, efficient et dynamique découlant d'une approche d'évaluation cohérente. De ce fait, notre système d'évaluation peut être implémenté à l'interne par l'entreprise elle-même, sans recourir à des ressources supplémentaires et lui donne également ainsi la possibilité de mieux gouverner sa sécurité de l'information.
Resumo:
The purpose of this project is to develop an investment analysis model that integrates the capabilities of four types of analysis for use in evaluating interurban transportation system improvements. The project will also explore the use of new data warehousing and mining techniques to design the types of databases required for supporting such a comprehensive transportation model. The project consists of four phases. The first phase, which is documented in this report, involves development of the conceptual foundation for the model. Prior research is reviewed in Chapter 1, which is composed of three major sections providing demand modeling background information for passenger transportation, transportation of freight (manufactured products and supplies), and transportation of natural resources and agricultural commodities. Material from the literature on geographic information systems makes up Chapter 2. Database models for the national and regional economies and for the transportation and logistics network are conceptualized in Chapter 3. Demand forecasting of transportation service requirements is introduced in Chapter 4, with separate sections for passenger transportation, freight transportation, and transportation of natural resources and commodities. Characteristics and capacities of the different modes, modal choices, and route assignments are discussed in Chapter 5. Chapter 6 concludes with a general discussion of the economic impacts and feedback of multimodal transportation activities and facilities.
Resumo:
The traditional model of learning based on knowledge transfer doesn't promote the acquisition of information-related competencies and development of autonomous learning. More needs to be done to embrace learner-centred approaches, based on constructivism, collaboration and co-operation. This new learning paradigm is aligned with the European Higher Education Area (EHEA) requirements. In this sense, a learning experience based in faculty' librarian collaboration was seen as the best option for promoting student engagement and also a way to increase information-related competences in Open University of Catalonia (UOC) academic context. This case study outlines the benefits of teacher-librarian collaboration in terms of pedagogy innovation, resources management and introduction of open educational resources (OER) in virtual classrooms, Information literacy (IL) training and use of 2.0 tools in teaching. Our faculty-librarian's collaboration aims to provide an example of technology-enhanced learning and demonstrate how working together improves the quality and relevance of educational resources in UOC's virtual classrooms. Under this new approach, while teachers change their role from instructors to facilitators of the learning process and extend their reach to students, libraries acquire an important presence in the academic learning communities.
Resumo:
The size-advantage model (SAM) explains the temporal variation of energetic investment on reproductive structures (i.e. male and female gametes and reproductive organs) in long-lived hermaphroditic plants and animals. It proposes that an increase in the resources available to an organism induces a higher relative investment on the most energetically costly sexual structures. In plants, pollination interactions are known to play an important role in the evolution of floral features. Because the SAM directly concerns flower characters, pollinators are expected to have a strong influence on the application of the model. This hypothesis, however, has never been tested. Here, we investigate whether the identity and diversity of pollinators can be used as a proxy to predict the application of the SAM in exclusive zoophilous plants. We present a new approach to unravel the dynamics of the model and test it on several widespread Arum (Araceae) species. By identifying the species composition, abundance and spatial variation of arthropods trapped in inflorescences, we show that some species (i.e. A. cylindraceum and A. italicum) display a generalist reproductive strategy, relying on the exploitation of a low number of dipterans, in contrast to the pattern seen in the specialist A. maculatum (pollinated specifically by two fly species only). Based on the model presented here, the application of the SAM is predicted for the first two and not expected in the latter species, those predictions being further confirmed by allometric measures. We here demonstrate that while an increase in the female zone occurs in larger inflorescences of generalist species, this does not happen in species demonstrating specific pollinators. This is the first time that this theory is both proposed and empirically tested in zoophilous plants. Its overall biological importance is discussed through its application in other non-Arum systems.