791 resultados para right to access
Resumo:
Early childhood education and care (ECEC) in Australia are currently a focus of social and economic policy. However, early childhood leadership in Australia is yet to develop a clear identity that will enable the field to develop to its full potential. In this paper we investigate a unique theoretical framework for constructing leadership identity, based on transformational leadership and epistemological beliefs. Using semistructured interviews, 15 childcare directors from a large metropolitan area in Australia were asked to describe their beliefs about knowing in the context of their leadership practices. The findings showed that leaders (n = 5) who espoused predominantly evaluativist beliefs about knowing were more likely to describe transformational leadership behaviours in the context of childcare leadership. A number of leaders held mixed beliefs (n = 9) about knowing and described their leadership practice in ways that reflected both transactional and transformational leadership styles. Finally, one leader described predominantly objectivist epistemological beliefs and transactional beliefs about leadership. These preliminary findings show that there seems to be a relationship between core epistemological beliefs and beliefs about leadership practices and offers a new way to characterise leadership in ECEC in Australia.
Resumo:
Throughout this workshop session we have looked at various configurations of Sage as well as using the Sage UI to run Sage applications (e.g. the image viewer). More advanced usage of Sage has been demonstrated using a Sage compatible version of Paraview highlighting the potential of parallel rendering. The aim of this tutorial session is to give a practical introduction to developing visual content for a tiled display using the Sage libraries. After completing this tutorial you should have the basic tools required to develop your own custom Sage applications. This tutorial is designed for software developers and intermediate programming knowledge is assumed, along with some introductory OpenGL . You will be required to write small portions of C/C++ code to complete this worksheet. However if you do not feel comfortable writing code (or have never written in C or C++), we will be on hand throughout this session so feel free to ask for some help. We have a number of machines in this lab running a VNC client to a virtual machine running Fedora 12. You should all be able to log in with the username “escience”, and password “escience10”. Some of the commands in this worksheet require you to run them as the root user, so note the password as you may need to use it a few times. If you need to access the Internet, then use the username “qpsf01”, password “escience10”
Resumo:
Road crashes cost world and Australian society a significant proportion of GDP, affecting productivity and causing significant suffering for communities and individuals. This paper presents a case study that generates data mining models that contribute to understanding of road crashes by allowing examination of the role of skid resistance (F60) and other road attributes in road crashes. Predictive data mining algorithms, primarily regression trees, were used to produce road segment crash count models from the road and traffic attributes of crash scenarios. The rules derived from the regression trees provide evidence of the significance of road attributes in contributing to crash, with a focus on the evaluation of skid resistance.
Resumo:
This research provides a systematic and theoretical analysis of the digital challenges to the established exclusive regime of the economic rights enjoyed by authors (and related rightholders) under the law of copyright. Accordingly, this research has developed a relational theory of authorship and a relational approach to copyright, contending that the regulatory emphasis of copyright law should focus on the facilitation of the dynamic relations between the culture, the creators, the future creators, the users and the public, rather than the allocation of resources in a static world. In this networked digital world, the creative works and contents have become increasingly vital for people to engage in creativity and cultural innovation, and for the evolution of the economy. Hence, it is argued that today copyright owners, as content holders, have certain obligations to make their works accessible and available to the public under fair conditions. This research sets forward a number of recommendations for the reform of the current copyright system.
Resumo:
The Northern Territory Government's Working Future: Outstations/Homelands (2009) policy statement gives effect to the Council of Australian Government's Closing the Gap policy on Indigenous housing and remote service delivery. These policies mark a radical shift in public policy that winds back the outstations and homelands movement that began in the 1970's. This paper examines Indigenous homelands policy and considers whether these policies are consistent with the Indigenous human rights and in particular the United Nations Declaration on the Rights of Indigenous Peoples (2007), which Australia endorsed in 2009. The author argues that the current homelands policy breaches a number of Indigenous human rights and promotes assimiliation by forcing Indigenous Australians to relocate to access basic services such as health, housing and education. As a consequence these policies are counter-intuitive to the overall Closing the Gap goals of improving Indigenous health outcomes because they fail to take into account the importance of country and culture to Indigenous wellbeing. She concludes that Australian governments need to formulate a homelands policy that is consistent with Indigenous human rights and in particular the right of self determination, enjoyment of culture and protection against forced assimilation.
Resumo:
Asylum is being gradually denuded of the national institutional mechanisms (judicial, legislative and administrative) that provide the framework for a fair and effective asylum hearing. In this sense, there is an ongoing ‘denationalization’ or ‘deformalization’ of the asylum process. This chapter critically examines one of the linchpins of this trend: the erection of pre-entry measures at ports of embarkation in order to prevent asylum seekers from physically accessing the territory of the state. Pre-entry measures comprise the core requirement that foreigners possess an entry visa granting permission to enter the state of destination. Visa requirements are increasingly implemented by immigration officials posted abroad or by officials of transit countries pursuant to bilateral agreements (so-called ‘juxtaposed’ immigration controls). Private carriers, which are subject to sanctions if they bring persons to a country who do not have permission to enter, also engage in a form of de facto immigration control on behalf of states. These measures constitute a type of ‘externalized’ or ‘exported’ border that pushes the immigration boundaries of the state as far from its physical boundaries as possible. Pre-entry measures have a crippling impact on the ability of asylum seekers to access the territory of states to claim asylum. In effect, states have ‘externalized’ asylum by replacing the legal obligation on states to protect refugees arriving at ports of entry with what are perceived to be no more than moral obligations towards asylum seekers arriving at the external border of the state.
Resumo:
In the networked information driven world that we now inhabit the ability to access and reuse information, data and culture is a key ingredient to social, economic and cultural innovation. As government holds enormous amounts of publicly funded material that can be released to the public without breaching the law it should move to implement policies that will allow better access to and reuse of that information, knowledge and culture. The Queensland Government Information Licensing Framework (GILF) Project4 is one of the first projects in the world to systemically approach this issue and should be consulted as a best practice model.
Resumo:
The unsteady natural convection boundary layer adjacent to an instantaneously heated inclined plate is investigated using an improved scaling analysis and direct numerical simulations. The development of the unsteady natural convection boundary layer following instantaneous heating may be classified into three distinct stages including a start-up stage, a transitional stage and a steady state stage, which can be clearly identified in the analytical and numerical results. Major scaling relations of the velocity and thicknesses and the flow development time of the natural convection boundary layer are obtained using triple-layer integral solutions and verified by direct numerical simulations over a wide range of flow parameters.
Resumo:
The responsibility to protect ('R2P') principle articulates the obligations of the international community to prevent conflict occurring, to intervene in conflicts, and to assist in rebuilding after conflicts. The doctrine is about protecting civilians in armed conflicts from four mass atrocity crimes: genocide, war crimes, crimes against humanity and ethnic cleansing. This book examines interventions in East Timor, Sri Lanka, Sudan and Kosovo. The chapters explore and question UN debates with respect to the doctrine both before and after its adoption in 2005; contrasting state attitudes to international military intervention; and what takes place after intervention. It also discusses the ability of the Security Council to access reliable information and credible and transparent processes to enable it to make a determination on the occurrence of atrocities in a Member State. Questioning whether there is a need to find a closer operational link between the responsibilities to prevent and react and a normative link between R2P and principles of international law, the contributions examine the effectiveness of the framework of R2P for international decision-making in response to mass atrocity crimes and ask how an international system to deal with threats and mass atrocities can be developed in the absence of a central authority. This book will be valuable to those interested in international law, human rights, and security, peace and conflict studies
Resumo:
In dynamic and uncertain environments, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. Risk-based approaches to access control attempt to address this problem by allocating a limited budget to users, through which they pay for the exceptions deemed necessary. So far the primary focus has been on how to incorporate the notion of budget into access control rather than what or if there is an optimal amount of budget to allocate to users. In this paper we discuss the problems that arise from a sub-optimal allocation of budget and introduce a generalised characterisation of an optimal budget allocation function that maximises organisations expected benefit in the presence of self-interested employees and costly audit.
Resumo:
Researchers are increasingly involved in data-intensive research projects that cut across geographic and disciplinary borders. Quality research now often involves virtual communities of researchers participating in large-scale web-based collaborations, opening their earlystage research to the research community in order to encourage broader participation and accelerate discoveries. The result of such large-scale collaborations has been the production of ever-increasing amounts of data. In short, we are in the midst of a data deluge. Accompanying these developments has been a growing recognition that if the benefits of enhanced access to research are to be realised, it will be necessary to develop the systems and services that enable data to be managed and secured. It has also become apparent that to achieve seamless access to data it is necessary not only to adopt appropriate technical standards, practices and architecture, but also to develop legal frameworks that facilitate access to and use of research data. This chapter provides an overview of the current research landscape in Australia as it relates to the collection, management and sharing of research data. The chapter then explains the Australian legal regimes relevant to data, including copyright, patent, privacy, confidentiality and contract law. Finally, this chapter proposes the infrastructure elements that are required for the proper management of legal interests, ownership rights and rights to access and use data collected or generated by research projects.
Resumo:
This paper examines changing patterns in the utilisation and geographic access to health services in Great Britain using National Travel Survey data (1985-2006). The utilisation rate was derived using the proportion of journeys made to access health services. Geographic access was analysed by separating the concept into its accessibility and mobility dimensions. Regression analyses were conducted to investigate the differences between different socio-spatial groups in these indicators over the period 1985-2006. This study found that journey distances to health facilities were significantly shorter and also gradually reduced over the period in question for Londoners, females, those without a car or on low incomes, and older people. However, most of their rates of utilisation of health services were found to be significantly lower because their journey times were significantly longer and also gradually increased over the periods. These findings indicate that the rate of utilisation of health services largely depends on mobility level although previous research studies have traditionally overlooked the mobility dimension.
Resumo:
The removal of the sulfate anion from water using synthetic hydrotalcite (Mg/Al LDH) was investigated using powder x-ray diffraction (XRD) and thermogravimetric analysis (TG). Synthetic hydrotalcite Mg6Al2(OH)16(CO3)∙4H2O was prepared by the co-precipitation method from aluminum and magnesium chloride salts. The synthetic hydrotalcite was thermally activated to a maximum temperature of 380°C. Samples of thermally activated hydrotalcite where then treated with aliquots of 1000ppm sulfate solution. The resulting products where dried and characterized by XRD and TG. Powder XRD revealed that hydrotalcite had been successfully prepared and that the product obtained after treatment with sulfate solution also conformed well to the reference pattern of hydrotalcite. The d(003) spacing of all samples was found to be within the acceptable region for a LDH structure. TG revealed all products underwent a similar decomposition to that of hydrotalcite. It was possible to propose a reasonable mechanism for the thermal decomposition of a sulfate containing Mg/Al LDH. The similarities in the results may indicate that the reformed hydrotalcite may contain carbonate anion as well as sulfate. Further investigation is required to confirm this.
Resumo:
In the era of Web 2.0, huge volumes of consumer reviews are posted to the Internet every day. Manual approaches to detecting and analyzing fake reviews (i.e., spam) are not practical due to the problem of information overload. However, the design and development of automated methods of detecting fake reviews is a challenging research problem. The main reason is that fake reviews are specifically composed to mislead readers, so they may appear the same as legitimate reviews (i.e., ham). As a result, discriminatory features that would enable individual reviews to be classified as spam or ham may not be available. Guided by the design science research methodology, the main contribution of this study is the design and instantiation of novel computational models for detecting fake reviews. In particular, a novel text mining model is developed and integrated into a semantic language model for the detection of untruthful reviews. The models are then evaluated based on a real-world dataset collected from amazon.com. The results of our experiments confirm that the proposed models outperform other well-known baseline models in detecting fake reviews. To the best of our knowledge, the work discussed in this article represents the first successful attempt to apply text mining methods and semantic language models to the detection of fake consumer reviews. A managerial implication of our research is that firms can apply our design artifacts to monitor online consumer reviews to develop effective marketing or product design strategies based on genuine consumer feedback posted to the Internet.
Resumo:
Cardiovascular disease (CVD) continues to impose a heavy burden in terms of cost, disability and death in Australia. Evidence suggests that increasing remoteness, where cardiac services are scarce, is linked to an increased risk of dying from CVD. Fatal CVD events are reported to be between 20% and 50% higher in rural areas compared to major cities. The Cardiac ARIA project, with its extensive use of geographic Information Systems (GIS), ranks each of Australia’s 20,387 urban, rural and remote population centres by accessibility to essential services or resources for the management of a cardiac event. This unique, innovative and highly collaborative project delivers a powerful tool to highlight and combat the burden imposed by cardiovascular disease (CVD) in Australia. Cardiac ARIA is innovative. It is a model that could be applied internationally and to other acute and chronic conditions such as mental health, midwifery, cancer, respiratory, diabetes and burns services. Cardiac ARIA was designed to: 1. Determine by expert panel, what were the minimal services and resources required for the management of a cardiac event in any urban, rural or remote population locations in Australia using a single patient pathway to access care. 2. Derive a classification using GIS accessibility modelling for each of Australia’s 20,387 urban, rural and remote population locations. 3. Compare the Cardiac ARIA categories and population locations with census derived population characteristics. Key findings are as follows: • In the event of a cardiac emergency, the majority of Australians had very good access to cardiac services. Approximately 71% or 13.9 million people lived within one hour of a category one hospital. • 68% of older Australians lived within one hour of a category one hospital (Principal Referral Hospital with access to Cardiac Catheterisation). • Only 40% of indigenous people lived within one hour of the category one hospital. • 16% (74000) of indigenous people lived more than one hour from a hospital. • 3% (91,000) of people 65 years of age or older lived more than one hour from any hospital or clinic. • Approximately 96%, or 19 million, of people lived within one hour of the four key services to support cardiac rehabilitation and secondary prevention. • 75% of indigenous people lived within one hour of the four cardiac rehabilitation services to support cardiac rehabilitation and secondary prevention. Fourteen percent (64,000 persons) indigenous people had poor access to the four key services to support cardiac rehabilitation and secondary prevention. • 12% (56,000) of indigenous people were more than one hour from a hospital and only had access one the four key services (usually a medical service) to support cardiac rehabilitation and secondary prevention.