902 resultados para Biblische Person
Resumo:
OBJECTIVE: To examine whether some drivers with hemianopia or quadrantanopia display safe driving skills on the road compared with drivers with normal visual fields. ---------- METHOD: An occupational therapist evaluated 22 people with hemianopia, 8 with quadrantanopia, and 30 with normal vision for driving skills during naturalistic driving using six rating scales. ---------- RESULTS: Of drivers with normal vision, >90% drove flawlessly or had minor errors. Although drivers with hemianopia were more likely to receive poorer ratings for all skills, 59.1%–81.8% performed with no or minor errors. A skill commonly problematic for them was lane keeping (40.9%). Of 8 drivers with quadrantanopia, 7 (87.5%) exhibited no or minor errors. ---------- CONCLUSION: This study of people with hemianopia or quadrantanopia with no lateral spatial neglect highlights the need to provide individual opportunities for on-road driving evaluation under natural traffic conditions if a person is motivated to return to driving after brain injury.
Resumo:
Confucius was and still is one of the most eminent Chinese philosophers. Such is the importance of Confucius’s teachings; it had influenced all aspects of social life in Chinese societies. In the post-Enron, post-Worldcom, and post-Global Financial Crisis era there are raising doubts in the mantra of the so-called conventional wisdom about law and economic order. Whilst many recent publications offered solutions to those problems like advocating for more laws, rules or reforms in regulatory institutions to enhance the regulation of corporate governance. What Confucius advocated was a non-legal, social mode of regulation based on moral ideals that should be embedded into the minds of every person. Whilst this is an ancient concept from primitive societies, its relevance and merits could be seen in modern Chinese societies like Hong Kong. In essence, Confucian principles of governance build on relational and paternalistic order based on moral ideals.
Resumo:
"This column is distinguished from previous Impact columns in that it concerns the development tightrope between research and commercial take-up and the role of the LGPL in an open source workflow toolkit produced in a University environment. Many ubiquitous systems have followed this route, (Apache, BSD Unix, ...), and the lessons this Service Oriented Architecture produces cast yet more light on how software diffuses out to impact us all." Michiel van Genuchten and Les Hatton Workflow management systems support the design, execution and analysis of business processes. A workflow management system needs to guarantee that work is conducted at the right time, by the right person or software application, through the execution of a workflow process model. Traditionally, there has been a lack of broad support for a workflow modeling standard. Standardization efforts proposed by the Workflow Management Coalition in the late nineties suffered from limited support for routing constructs. In fact, as later demonstrated by the Workflow Patterns Initiative (www.workflowpatterns.com), a much wider range of constructs is required when modeling realistic workflows in practice. YAWL (Yet Another Workflow Language) is a workflow language that was developed to show that comprehensive support for the workflow patterns is achievable. Soon after its inception in 2002, a prototype system was built to demonstrate that it was possible to have a system support such a complex language. From that initial prototype, YAWL has grown into a fully-fledged, open source workflow management system and support environment
Resumo:
In today's technological age, fraud has become more complicated, and increasingly more difficult to detect, especially when it is collusive in nature. Different fraud surveys showed that the median loss from collusive fraud is much greater than fraud perpetrated by a single person. Despite its prevalence and potentially devastating effects, collusion is commonly overlooked as an organizational risk. Internal auditors often fail to proactively consider collusion in their fraud assessment and detection efforts. In this paper, we consider fraud scenarios with collusion. We present six potentially collusive fraudulent behaviors and show their detection process in an ERP system. We have enhanced our fraud detection framework to utilize aggregation of different sources of logs in order to detect communication and have further enhanced it to render it system-agnostic thus achieving portability and making it generally applicable to all ERP systems.
Resumo:
Background Postnatal women (<12 months postpartum) are at increased risk of physical inactivity. Purpose To evaluate the efficacy and feasibility of a theory-based physical activity (PA) intervention delivered to postnatal women primarily via mobile telephone short message service (SMS). Methods Eighty-eight women were randomized to the intervention (n=45) or minimal contact control (n=43) condition. The 12-week intervention consisted of a face-to-face PA goal-setting consultation, a goal-setting magnet, three to five personally tailored SMS/week and a nominated support person who received two SMS per week. SMS content targeted constructs of social cognitive theory. Frequency (days/week) and duration (min/week) of PA participation and walking for exercise were assessed via self-report at baseline, 6 and 13 weeks. Results Intervention participants increased PA frequency by 1.82 days/week (SE±0.18) by 13 weeks (F(2,85)=4.46, p=0.038) and walking for exercise frequency by 1.08 days/ week (SE±0.24) by 13 weeks (F(2,85)=5.38, p=0.02). Positive trends were observed for duration (min/week) of PA and walking for exercise. Conclusions Intervention exposure resulted in increased frequency of PA and walking for exercise in postnatal women.
Resumo:
It is possible for the visual attention characteristics of a person to be exploited as a biometric for authentication or identification of individual viewers. The visual attention characteristics of a person can be easily monitored by tracking the gaze of a viewer during the presentation of a known or unknown visual scene. The positions and sequences of gaze locations during viewing may be determined by overt (conscious) or covert (sub-conscious) viewing behaviour. This paper presents a method to authenticate individuals using their covert viewing behaviour, thus yielding a unique behavioural biometric. A method to quantify the spatial and temporal patterns established by the viewer for their covert behaviour is proposed utilsing a principal component analysis technique called `eigenGaze'. Experimental results suggest that it is possible to capture the unique visual attention characteristics of a person to provide a simple behavioural biometric.
Resumo:
This third edition of Laying down the criminal law: A handbook for youth workers is essential to understanding young people’s experiences with criminal justice in Queensland. The text comprises detailed scenarios of situations where a young person would have contact with the system, and young people ‘in trouble’ (for example, being excluded from school). The text discusses how workers support the young person in talking to police, going to court, or being a victim of crime. One scenario notes how a youth worker responds to 15 year old Stephen staying at a youth shelter after leaving home and having contact with police. Scenarios are supplemented with information about confidentiality and negligence, and how workers consider these concepts supporting young people...
Resumo:
In this paper we highlight how current approaches to design for disability have failed to consider the emotional needs not only of those with disabilities but their families and other carers as well. In conjunction with this, we demonstrate through a review of literature the significance of the house, the home and home in the support and growth of the person as a whole in association with their loved ones, and the potential inequity that arises when the emotional and holistic dimensions of 'being' are neglected. With a growing trend nationally and internationally away from group and shared housing, a greater focus on the family and their home is required. However, as research has shown, home for families where a family member has a disability is not necessarily a positive experience; it can be a source of stress, work, conflict and burden, arousing emotions ranging from loss of control through guilt. As proposed in the paper, consideration of the negative as well as positive emotions demands exploration of the 'middle ground' between institutions and home-based care models. This paper outlines the beginning of one such exploration.
Resumo:
What predicts a person's venture creation success over the course of the career, such as making progress in the venture creation process and multiple successful venture creations? Applying a life span approach of human development, this study examined the effect of early entrepreneurial competence in adolescence, which was gathered retrospectively by means of the Life History Calendar method. Human and social capitals during the founding process were investigated as mediators between adolescent competence and performance. Findings were derived from regression analyses on the basis of prospective and retrospective data from two independent samples (N = 88 nascent founders; N = 148 founders). We found that early entrepreneurial competence in adolescence had a positive effect on making progress in the venture creation process. Nascent founders' current human and social capital also had a direct effect, but it did not mediate the effect of early competences. Finally, the data revealed that early entrepreneurial competence in adolescence positively predicted habitual entrepreneurship (multiple successful venture creations) exhibited over a longer period of the individual career (specifically, 18 years). In line with the results from prospective longitudinal studies on early precursors of entrepreneurship, our findings underscore the long neglected importance of adolescent development in the explanation of entrepreneurial performance during the subsequent working life.
Resumo:
In today’s electronic world vast amounts of knowledge is stored within many datasets and databases. Often the default format of this data means that the knowledge within is not immediately accessible, but rather has to be mined and extracted. This requires automated tools and they need to be effective and efficient. Association rule mining is one approach to obtaining knowledge stored with datasets / databases which includes frequent patterns and association rules between the items / attributes of a dataset with varying levels of strength. However, this is also association rule mining’s downside; the number of rules that can be found is usually very big. In order to effectively use the association rules (and the knowledge within) the number of rules needs to be kept manageable, thus it is necessary to have a method to reduce the number of association rules. However, we do not want to lose knowledge through this process. Thus the idea of non-redundant association rule mining was born. A second issue with association rule mining is determining which ones are interesting. The standard approach has been to use support and confidence. But they have their limitations. Approaches which use information about the dataset’s structure to measure association rules are limited, but could yield useful association rules if tapped. Finally, while it is important to be able to get interesting association rules from a dataset in a manageable size, it is equally as important to be able to apply them in a practical way, where the knowledge they contain can be taken advantage of. Association rules show items / attributes that appear together frequently. Recommendation systems also look at patterns and items / attributes that occur together frequently in order to make a recommendation to a person. It should therefore be possible to bring the two together. In this thesis we look at these three issues and propose approaches to help. For discovering non-redundant rules we propose enhanced approaches to rule mining in multi-level datasets that will allow hierarchically redundant association rules to be identified and removed, without information loss. When it comes to discovering interesting association rules based on the dataset’s structure we propose three measures for use in multi-level datasets. Lastly, we propose and demonstrate an approach that allows for association rules to be practically and effectively used in a recommender system, while at the same time improving the recommender system’s performance. This especially becomes evident when looking at the user cold-start problem for a recommender system. In fact our proposal helps to solve this serious problem facing recommender systems.
Resumo:
China is one of Asia’s many rapidly-motorising nations and recent increases in private-vehicle ownership have been coupled with an escalation in novice drivers. Several pieces of road safety legislation have been introduced in recent decades in China. While managing the legal aspects of road use is important, social influences on driver behaviour may offer alternative avenues to alter behaviour, particularly in a culture where such factors carry high importance. This paper reports qualitative research with Beijing drivers to investigate social influence factors that have, to date, received little attention in the literature. Findings indicated that family members, friends, and driving instructors appear influential on driver behaviour and that some newly licensed drivers seek additional assistance to facilitate the transition from learning to drive in a controlled environment to driving on the road in complex conditions. Strategies to avoid detection and penalties for inappropriate road use were described, many of which involved the use of a third person. These findings indicate potential barriers to implementing effective traffic enforcement and highlight the importance of understanding culturally-specific social factors relating to driver behaviour.
Resumo:
In a recent journal article, Luke Jaaniste and I identified an emergent model of exegesis. From a content analysis of submitted exegeses within a local archive, we identified an approach that is quite different from the traditional thesis, but is also distinct from previously identified forms of exegesis, which Milech and Schilo have described as a ‘context model’ (which assumes the voice of academic objectivity and provides an historical or theoretical context for the creative practice) and a ‘commentary’ model’ (which takes the form of a first person reflection on the challenges, insights and achievements of the practice). The model we identified combines these dichotomous forms and assumes a dual orientation–looking outwards to the established field of research, exemplars and theories, and inwards to the methodologies, processes and outcomes of the practice. We went on to argue that this ‘connective’ exegesis offers clear benefits to the researcher in connecting the practice to an established field while allowing the researcher to demonstrate how the methods have led to outcomes that advance the field in some way. And, while it helps the candidate to articulate objective claims for research innovation, it enables them to retain a voiced, personal relationship with their practice. However, it also poses considerable complexities and challenges in the writing. It requires a reconciliation of multi-perspectival subject positions: the disinterested perspective and academic objectivity of an observer/ethnographer/analyst/theorist at times and the invested perspective of the practitioner/ producer at others. The author must also contend with a range of writing styles, speech genres and voices: from the formal, polemical voice of the theorist to the personal, questioning and sometimes emotive voice of reflexivity. Moreover, the connective exegesis requires the researcher to synthesize various perspectives, subject positions, writing styles, and voices into a unified and coherent text. In this paper I consider strategies for writing a hybrid, connective exegesis. I first ground the discussion on polyvocality and alternate textual structures through reference to recent discussions in philosophy and critical theory, and point to examples of emergent approaches to texts and practices in related fields. I then return to the collection of archived exegeses to investigate the strategies that postgraduate candidates have adopted to resolve the problems that arise from a polyvocal, connective exegesis.
Resumo:
This thesis conceptualises Use for IS (Information Systems) success. While Use in this study describes the extent to which an IS is incorporated into the user’s processes or tasks, success of an IS is the measure of the degree to which the person using the system is better off. For IS success, the conceptualisation of Use offers new perspectives on describing and measuring Use. We test the philosophies of the conceptualisation using empirical evidence in an Enterprise Systems (ES) context. Results from the empirical analysis contribute insights to the existing body of knowledge on the role of Use and demonstrate Use as an important factor and measure of IS success. System Use is a central theme in IS research. For instance, Use is regarded as an important dimension of IS success. Despite its recognition, the Use dimension of IS success reportedly suffers from an all too simplistic definition, misconception, poor specification of its complex nature, and an inadequacy of measurement approaches (Bokhari 2005; DeLone and McLean 2003; Zigurs 1993). Given the above, Burton-Jones and Straub (2006) urge scholars to revisit the concept of system Use, consider a stronger theoretical treatment, and submit the construct to further validation in its intended nomological net. On those considerations, this study re-conceptualises Use for IS success. The new conceptualisation adopts a work-process system-centric lens and draws upon the characteristics of modern system types, key user groups and their information needs, and the incorporation of IS in work processes. With these characteristics, the definition of Use and how it may be measured is systematically established. Use is conceptualised as a second-order measurement construct determined by three sub-dimensions: attitude of its users, depth, and amount of Use. The construct is positioned in a modified IS success research model, in an attempt to demonstrate its central role in determining IS success in an ES setting. A two-stage mixed-methods research design—incorporating a sequential explanatory strategy—was adopted to collect empirical data and to test the research model. The first empirical investigation involved an experiment and a survey of ES end users at a leading tertiary education institute in Australia. The second, a qualitative investigation, involved a series of interviews with real-world operational managers in large Indian private-sector companies to canvass their day-to-day experiences with ES. The research strategy adopted has a stronger quantitative leaning. The survey analysis results demonstrate the aptness of Use as an antecedent and a consequence of IS success, and furthermore, as a mediator between the quality of IS and the impacts of IS on individuals. Qualitative data analysis on the other hand, is used to derive a framework for classifying the diversity of ES Use behaviour. The qualitative results establish that workers Use IS in their context to orientate, negotiate, or innovate. The implications are twofold. For research, this study contributes to cumulative IS success knowledge an approach for defining, contextualising, measuring, and validating Use. For practice, research findings not only provide insights for educators when incorporating ES for higher education, but also demonstrate how operational managers incorporate ES into their work practices. Research findings leave the way open for future, larger-scale research into how industry practitioners interact with an ES to complete their work in varied organisational environments.
Resumo:
Anna Hickey-Mody and Melissa Iocca invented a new name for the cinema-goer at "Bad Boy Bubby" (1993) when they wrote: "In de Heer's film, the viewer is primarily a listener, or aurator, and secondly a spectator" and I have argued the label 'aurator' can also be used for the person experiencing "Ten Canoes" (2006). This Aboriginal Australian Dreamtime fable features dialogue recorded entirely in the Ganalbingu language of the Indigenous people it stars, and is a prime example of what I would suggest can be labeled 'The Aboriginal Australian Films of Rolf de Heer'. "The Tracker" (2002) and "Dr. Plonk" (2007) have also included depictions of Aboriginal Australians and each of the trio utilizes Cat Hope's "innovative sound ideas" to present what I argue is an aural auteur's signature revealing a post-colonial Australian world-view that privileges the justice system and eco-spirituality of Aboriginal Australians.
Resumo:
In Moneywood Pty Ltd v Salamon Nominees Pty Ltd 1 the High Court of Australia considered an appeal from the Queensland Court of Appeal in relation to the correct interpretation of s76 (1)(c) Auctioneers and Agents Act 1971 (Qld). In paraphrase, s76(1)(c) provides that a real estate agent shall not be entitled to sue for or recover any commission unless “the engagement or appointment to act as …..real estate agent ….. in respect of such transaction is in writing signed by the person to be charged with such…..commission…..or the person’s agent or representative” (“the statutory requirement”).