671 resultados para postal service employees
Resumo:
Community Child Health Nursing Services provide support for new mothers; however, the focus has often been on individual consultations, complemented by a series of group sessions soon after birth. We describe a new model of community care for first-time mothers that centres on group sessions throughout the whole contact period. The model was developed by practicing child health nurses for a large health service district in south-east Queensland, which offers a comprehensive community child health service. Issues identified by clinicians working within existing services, feedback from clients and the need for more resource-efficient methods of service provision underpinned the development of the model. The pilot program was implemented in two community child health centres in Brisbane. An early individual consultation to engage the family with the service was added in response to feedback from clinicians and clients. The modified model has since been implemented service-wide as the ‘First Steps Program’. The introduction of this model has ensured that the service has been able to retain a comprehensive service for first-time parents from a universal population, while responding to the challenges of population growth and the increasing number of complex clients placing demands on resources.
Resumo:
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a client to solve some moderately hard problem before being granted access to a resource. However, recent client puzzle difficulty definitions (Stebila and Ustaoglu, 2009; Chen et al., 2009) do not ensure that solving n puzzles is n times harder than solving one puzzle. Motivated by examples of puzzles where this is the case, we present stronger definitions of difficulty for client puzzles that are meaningful in the context of adversaries with more computational power than required to solve a single puzzle. A protocol using strong client puzzles may still not be secure against DoS attacks if the puzzles are not used in a secure manner. We describe a security model for analyzing the DoS resistance of any protocol in the context of client puzzles and give a generic technique for combining any protocol with a strong client puzzle to obtain a DoS-resistant protocol.
Resumo:
The launch of the Apple iPad on January 2010 has seen considerable interest from the newspaper and publishing industry in developing content and business models for the tablet PC device that can address the limits of both the print and online news and information media products. It is early days in the iPad’s evolution, and we wait to see what competitor devices will emerge in the near future. It is apparent, however, that it has become a significant “niche” product, with considerable potential for mass market expansion over the next few years, possibly at the expense of netbook sales. The scope for the iPad and tablet PCs to become a “fourth screen” for users, alongside the TV, PC and mobile phone, is in early stages of evolution. The study used five criteria to assess iPad apps: • Content: timeliness; archive; personalisation; content depth; advertisements; the use of multimedia; and the extent to which the content was in sync with the provider brand. • Useability: degree of static content; ability to control multimedia; file size; page clutter; resolution; signposts; and customisation. • Interactivity: hyperlinks; ability to contribute content or provide feedback to news items; depth of multimedia; search function; ability to use plug-ins and linking; ability to highlight, rate and/or save items; functions that may facilitate a community of users. • Transactions capabilities: ecommerce functionality; purchase and download process; user privacy and transaction security. • Openness: degree of linking to outside sources; reader contribution processes; anonymity measures; and application code ownership.
Resumo:
Introduction: There are many low intensity (LI) cognitive behavoural therapy (CBT) solutions to the problem of limited service access. In this chapter, we aim to discuss a relatively low-technology approach to access using standard postal services-CBT by mail, or M-CBT. Bibliotherapies including M-CBT teach key concepts and self-management techniques, together with screening tools and forms to structure home practice. M-CBT differs from other bibliotherapies by segmenting interventions and mailing them at regular intervals. Most involve participants returning copies of monitoring forms or completed handouts. Therapist feedback is provided, often in personal letters that accompany the printed materials. Participants may also be given access to telephone or email support. ----- ----- M-CBT clearly fulfills criteria for an LI CBT (see Bennett-Levy et al., Chapter 1, for a definition of LI interventions). Once written, they involve little therapist time and rely heavily on self-management. However, content and overall treatment duration need not be compromised. Long-term interventions with multiple components can be delivered via this method, provided their content can be communicated in letters and engagement is maintained.
Resumo:
The Katz and Kahn (1978) motivational framework is an open system management theory that underscores the importance of self-regulation while stressing the significance of using continuous feedback to adapt in a rapidly changing environment. This study aims to examine Katz and Kahn’s prepositions that the implementation of a system of rule compliance, external rewards, and internalized motivation can decrease employee turnover, increase quantitative and qualitative standards of performance, and enhance cooperation and creativeness. The results among 233 Chinese employees (96.6% response rate) indicated partial support for Katz and Kahn’s motivational framework. The implication for improving the Chinese workforce, in particular blue-collar occupations, is discussed.
Resumo:
SAP and its research partners have been developing a lan- guage for describing details of Services from various view- points called the Unified Service Description Language (USDL). At the time of writing, version 3.0 describes technical implementation aspects of services, as well as stakeholders, pricing, lifecycle, and availability. Work is also underway to address other business and legal aspects of services. This language is designed to be used in service portfolio management, with a repository of service descriptions being available to various stakeholders in an organisation to allow for service prioritisation, development, deployment and lifecycle management. The structure of the USDL metadata is specified using an object-oriented metamodel that conforms to UML, MOF and EMF Ecore. As such it is amenable to code gener-ation for implementations of repositories that store service description instances. Although Web services toolkits can be used to make these programming language objects available as a set of Web services, the practicalities of writing dis- tributed clients against over one hundred class definitions, containing several hundred attributes, will make for very large WSDL interfaces and highly inefficient “chatty” implementations. This paper gives the high-level design for a completely model-generated repository for any version of USDL (or any other data-only metamodel), which uses the Eclipse Modelling Framework’s Java code generation, along with several open source plugins to create a robust, transactional repository running in a Java application with a relational datastore. However, the repository exposes a generated WSDL interface at a coarse granularity, suitable for distributed client code and user-interface creation. It uses heuristics to drive code generation to bridge between the Web service and EMF granularities.
Resumo:
In a resource constrained business world, strategic choices must be made on process improvement and service delivery. There are calls for more agile forms of enterprises and much effort is being directed at moving organizations from a complex landscape of disparate application systems to that of an integrated and flexible enterprise accessing complex systems landscapes through service oriented architecture (SOA). This paper describes the analysis of strategies to detect supporting business services. These services can then be delivered in a variety of ways: web-services, new application services or outsourced services. The focus of this paper is on strategy analysis to identify those strategies that are common to lines of business and thus can be supported through shared services. A case study of a state government is used to show the analytical method and the detection of shared strategies.
Resumo:
Purpose: The paper seeks to apply the theory of the democratic deficit to school-based management with an emphasis on Australia. This theory was developed to examine managerial restructuring of the Australian Public Service in the 1990s. Given similarities between the use of managerial practices in the public service and government schools, the authors draw on recent literature about school-based management in Australia and apply the democratic deficit theory to it. ----- ----- Design/methodology/approach: This paper is conceptual in focus. The authors analyse literature in terms of the three components of the democratic deficit – i.e. the weakening of accountability, the denial of the roles and values of public employees, and the emergence of a “hollow state” – and in relation to the application of this theory to the Australian Public Service.----- ----- Findings: A trend towards the three components of the democratic deficit is evident in Australia although, to date, its emergence has not been as extensive as in the UK. The authors argue that the democratic principles on which public schooling in Australia was founded are being eroded by managerial and market practices.----- ----- Practical implications: These findings provide policy makers and practitioners with another way of examining managerial and market understandings of school-based management and its impact on teachers and on students. It offers suggestions to reorient practices away from those that are exclusively managerial-based towards those that are public-sector based.----- ----- Originality/value: The value of this paper is that it applies the theory of the democratic deficit to current understandings of school-based management.
Resumo:
The emergence of ePortfolios is relatively recent in the university sector as a way to engage students in their learning and assessment, and to produce records of their accomplishments. An ePortfolio is an online tool that students can utilise to record, catalogue, retrieve and present reflections and artefacts that support and demonstrate the development of graduate students’ capabilities and professional standards across university courses. The ePortfolio is therefore considered as both process and product. Although ePortfolios show promise as a useful tool and their uptake has grown, they are not yet a mainstream higher education technology. To date, the emphasis has been on investigating their potential to support the multiple purposes of learning, assessment and employability, but less is known about whether and how students engage with ePortfolios in the university setting. This thesis investigates student engagement with an ePortfolio in one university. As the educational designer for the ePortfolio project at the University, I was uniquely positioned as a researching professional to undertake an inquiry into whether students were engaging with the ePortfolio. The participants in this study were a cohort (defined by enrolment in a unit of study) of second and third year education students (n=105) enrolled in a four year Bachelor of Education degree. The students were introduced to the ePortfolio in an introductory lecture and a hands-on workshop in a computer laboratory. They were subsequently required to complete a compulsory assessment task – a critical reflection - using the ePortfolio. Following that, engagement with the ePortfolio was voluntary. A single case study approach arising from an interpretivist paradigm directed the methodological approach and research design for this study. The study investigated the participants’ own accounts of their experiences with the ePortfolio, including how and when they engaged with the ePortfolio and the factors that impacted on their engagement. Data collection methods consisted of an attitude survey, student interviews, document collection, a researcher reflective journal and researcher observations. The findings of the study show that, while the students were encouraged to use the ePortfolio as a learning and employability tool, most students ultimately chose to disengage after completing the assessment task. Only six of the forty-five students (13%) who completed the research survey had used the ePortfolio in a sustained manner. The data obtained from the students during this research has provided insight into reasons why they disengaged from the ePortfolio. The findings add to the understandings and descriptions of student engagement with technology, and more broadly, advance the understanding of ePortfolios. These findings also contribute to the interdisciplinary field of technology implementation. There are three key outcomes from this study, a model of student engagement with technology, a set of criteria for the design of an ePortfolio, and a set of recommendations for effective practice for those implementing ePortfolios. The first, the Model of Student Engagement with Technology (MSET) (Version 2) explored student engagement with technology by highlighting key engagement decision points for students The model was initially conceptualised by building on work of previous research (Version 1), however, following data analysis a new model emerged, MSET (Version 2). The engagement decision points were identified as: • Prior Knowledge and Experience, leading to imagined usefulness and imagined ease of use; • Initial Supported Engagement, leading to supported experience of usefulness and supported ease of use; • Initial Independent Engagement, leading to actual experience of independent usefulness and actual ease of use; and • Ongoing Independent Engagement, leading to ongoing experience of usefulness and ongoing ease of use. The Model of Student Engagement with Technology (MSET) goes beyond numerical figures of usage to demonstrate student engagement with an ePortfolio. The explanatory power of the model is based on the identification of the types of decisions that students make and when they make them during the engagement process. This model presents a greater depth of understanding student engagement than was previously available and has implications for the direction and timing of future implementation, and academic and student development activities. The second key outcome from this study is a set of criteria for the re-conceptualisation of the University ePortfolio. The knowledge gained from this research has resulted in a new set of design criteria that focus on the student actions of writing reflections and adding artefacts. The process of using the ePortfolio is reconceptualised in terms of privileging student learning over administrative compliance. The focus of the ePortfolio is that the writing of critical reflections is the key function, not the selection of capabilities. The third key outcome from this research consists of five recommendations for university practice that have arisen from this study. They are that, sustainable implementation is more often achieved through small steps building on one another; that a clear definition of the purpose of an ePortfolio is crucial for students and staff; that ePortfolio pedagogy should be the driving force not the technology; that the merit of the ePortfolio is fostered in students and staff; and finally, that supporting delayed task performance is crucial. Students do not adopt an ePortfolio just because it is provided. While students must accept responsibility for their own engagement with the ePortfolio, the institution has to accept responsibility for providing the environment, and technical and pedagogical support to foster engagement. Ultimately, an ePortfolio should be considered as a joint venture between student and institution where strong returns on investment can be realised by both. It is acknowledged that the current implementation strategies for the ePortfolio are just the beginning of a much longer process. The real rewards for students, academics and the university lie in the future.
Resumo:
This chapter reports on a narrative project recording the experiences of LGBT former and current police officers in the Queensland Police Service (QPS), Australia. It begins by examining the historical and research contexts of LGBT police officers, followed by a discussion of the methodology employed for the project. The chapter then examines and analyzes key themes emerging from the data about coming out, macho police culture, and the double life syndrome often experienced by LGBT police officers. Finally, it suggests that further research might uncover a more widespread application of these findings.
Resumo:
Introduction: Emergency prehospital medical care providers are frontline health workers during emergencies. However, little is known about their attitudes, perceptions, and likely behaviors during emergency conditions. Understanding these attitudes and behaviors is crucial to mitigating the psychological and operational effects of biohazard events such as pandemic influenza, and will support the business continuity of essential prehospital services. ----- ----- Problem: This study was designed to investigate the association between knowledge and attitudes regarding avian influenza on likely behavioral responses of Australian emergency prehospital medical care providers in pandemic conditions. ----- ----- Methods: Using a reply-paid postal questionnaire, the knowledge and attitudes of a national, stratified, random sample of the Australian emergency prehospital medical care workforce in relation to pandemic influenza were investigated. In addition to knowledge and attitudes, there were five measures of anticipated behavior during pandemic conditions: (1) preparedness to wear personal protective equipment (PPE); (2) preparedness to change role; (3) willingness to work; and likely refusal to work with colleagues who were exposed to (4) known and (5) suspected influenza. Multiple logistic regression models were constructed to determine the independent predictors of each of the anticipated behaviors, while controlling for other relevant variables. ----- ----- Results: Almost half (43%) of the 725 emergency prehospital medical care personnel who responded to the survey indicated that they would be unwilling to work during pandemic conditions; one-quarter indicated that they would not be prepared to work in PPE; and one-third would refuse to work with a colleague exposed to a known case of pandemic human influenza. Willingness to work during a pandemic (OR = 1.41; 95% CI = 1.0–1.9), and willingness to change roles (OR = 1.44; 95% CI = 1.04–2.0) significantly increased with adequate knowledge about infectious agents generally. Generally, refusal to work with exposed (OR = 0.48; 95% CI = 0.3–0.7) or potentially exposed (OR = 0.43; 95% CI = 0.3–0.6) colleagues significantly decreased with adequate knowledge about infectious agents. Confidence in the employer’s capacity to respond appropriately to a pandemic significantly increased employee willingness to work (OR = 2.83; 95% CI = 1.9–4.1); willingness to change roles during a pandemic (OR = 1.52; 95% CI = 1.1–2.1); preparedness to wear PPE (OR = 1.68; 95% CI = 1.1–2.5); and significantly decreased the likelihood of refusing to work with colleagues exposed to (suspected) influenza (OR = 0.59; 95% CI = 0.4–0.9). ----- ----- Conclusions:These findings indicate that education and training alone will not adequately prepare the emergency prehospital medical workforce for a pandemic. It is crucial to address the concerns of ambulance personnel and the perceived concerns of their relationship with partners in order to maintain an effective prehospital emergency medical care service during pandemic conditions.
Resumo:
Gradual authentication is a principle proposed by Meadows as a way to tackle denial-of-service attacks on network protocols by gradually increasing the confidence in clients before the server commits resources. In this paper, we propose an efficient method that allows a defending server to authenticate its clients gradually with the help of some fast-to-verify measures. Our method integrates hash-based client puzzles along with a special class of digital signatures supporting fast verification. Our hash-based client puzzle provides finer granularity of difficulty and is proven secure in the puzzle difficulty model of Chen et al. (2009). We integrate this with the fast-verification digital signature scheme proposed by Bernstein (2000, 2008). These schemes can be up to 20 times faster for client authentication compared to RSA-based schemes. Our experimental results show that, in the Secure Sockets Layer (SSL) protocol, fast verification digital signatures can provide a 7% increase in connections per second compared to RSA signatures, and our integration of client puzzles with client authentication imposes no performance penalty on the server since puzzle verification is a part of signature verification.
Resumo:
This report examines the involvement of manufacturers in value-adding through service-enhancement of product offerings. This focus has been prompted by: emphasis in the knowledge-economy literature on the increasing role played by services in economic growth; and recent analysis which suggests that the most dynamic sector of many economies is an integrated manufacturing-services sector (see Part One of this report). The report initially describes the emergence of an integrated manufacturing-services sector in the context of increasingly knowledge-based economic systems. Part Two reports on the results of a survey of manufacturers in the building and construction product system, investigating their involvement in service provision. Parts Three and Four present two case studies of exemplary manufacturers involved in adding value to their manufacturing operations through services offered on building and construction projects. The report examines manufacturers of materials, products, equipment and machinery used on building and construction projects. The two case study sections of the report, in part, focus on a major project undertaken by each of the manufacturers. This project element of activity is focussed on (as opposed to wholesale or retail supply), because this area of activity involves a broader array of service-enhancement mechanisms and more complex bundling of products and services.