631 resultados para Obesity - Prevention - Case studies


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose To identify the challenges faced by local government in Indonesia when adopting a Public Asset Management Framework. Design A Case Study in South Sulawesi Provincial Government was used as the approach to achieving the research objective. The case study involved two data collection techniques - interviews and document analysis. Findings The result of the study indicates there are significant challenges that the Indonesian local government need to manage when adopting a public asset management framework. Those challenges are: absence of an institutional and legal framework to support the asset management application; non-profit principle of public assets; multiple jurisdictions involved in the public asset management processes; the complexity of local government objectives; unavailability of data for managing public property; and limited human resources. Research Limitation This research is limited to one case study. It is a preliminary study from larger research that uses multiple case studies. The main research also investigates opportunities for local government by adopting and implementing public asset management. Originality/Value Findings from this study provide useful input for the policy makers, academics and asset management practitioners in Indonesia to establish a public asset management framework resulting in efficient and effective organizations, as well as an increase of public services quality. This study has a potential application for other developing countries.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The alliance project delivery method is used for approximately one third of all Australian government infrastructure projects representing $8-$10 billion per annum. Despite its widespread use, little is known about the differences between estimated project cost and actual cost over the project lifecycle. This paper presents the findings of research into 14 Australian government alliance case studies investigating the observed cost uplift over each project’s lifecycle. I find that significant cost uplift is likely and that this uplift is greater than that afflicting traditional delivery methods. Furthermore, most of the cost uplift occurs at a different place in the project lifecycle, namely between Business Case and Contractual Commitment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

National and international competition demands that Australian organisations become more competent at making the strategic technological decisions that impact their future in the international business economy. A new subject unit, Management of Technology is now offered in the popular Master of Project Management and Master of Business Administration programs at the Queensland University of Technology. This cross-disciplinary subject provides students with a theoretical foundation and practical tools to improve the efficiency and competitiveness of technically-oriented organisations. Applied case studies—shown to be the most appropriate mode of learning for mature-age students—form an integral component of the teaching program. In the first offerings of this subject during 1995 and 1996, American case studies were used. QUT has now supported the development of Australian case study packages for technology management through its Teaching and Learning Grants Scheme. The first case developed—Inland Oil Refiners’ Microstill Project—was completed in early 1996. A newly developed case—Automated Door Opening System for Wheelchair Access—is currently being completed. This case (comprising case study documentation and video presentation) tracks a cross-disciplinary product development driven by legislative and community pressures. It also reinforces the importance of personal relationships in the technology and business development that has taken this young Brisbane-based company from its embryonic beginnings on the Queensland Cultural Centre in 1994 to a national and export-focussed organisation in 1997. This paper reviews the need to develop Australian case material in Management of Technology, discusses the case study documentation and supporting video developed, and application of the case study approach in this teaching initiative in QUT’s Master of Project Management and Master of Business Administration programs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Video surveillance technology, based on Closed Circuit Television (CCTV) cameras, is one of the fastest growing markets in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. To overcome this limitation, it is necessary to have “intelligent” processes which are able to highlight the salient data and filter out normal conditions that do not pose a threat to security. In order to create such intelligent systems, an understanding of human behaviour, specifically, suspicious behaviour is required. One of the challenges in achieving this is that human behaviour can only be understood correctly in the context in which it appears. Although context has been exploited in the general computer vision domain, it has not been widely used in the automatic suspicious behaviour detection domain. So, it is essential that context has to be formulated, stored and used by the system in order to understand human behaviour. Finally, since surveillance systems could be modeled as largescale data stream systems, it is difficult to have a complete knowledge base. In this case, the systems need to not only continuously update their knowledge but also be able to retrieve the extracted information which is related to the given context. To address these issues, a context-based approach for detecting suspicious behaviour is proposed. In this approach, contextual information is exploited in order to make a better detection. The proposed approach utilises a data stream clustering algorithm in order to discover the behaviour classes and their frequency of occurrences from the incoming behaviour instances. Contextual information is then used in addition to the above information to detect suspicious behaviour. The proposed approach is able to detect observed, unobserved and contextual suspicious behaviour. Two case studies using video feeds taken from CAVIAR dataset and Z-block building, Queensland University of Technology are presented in order to test the proposed approach. From these experiments, it is shown that by using information about context, the proposed system is able to make a more accurate detection, especially those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information give critical feedback to the system designers to refine the system. Finally, the proposed modified Clustream algorithm enables the system to both continuously update the system’s knowledge and to effectively retrieve the information learned in a given context. The outcomes from this research are: (a) A context-based framework for automatic detecting suspicious behaviour which can be used by an intelligent video surveillance in making decisions; (b) A modified Clustream data stream clustering algorithm which continuously updates the system knowledge and is able to retrieve contextually related information effectively; and (c) An update-describe approach which extends the capability of the existing human local motion features called interest points based features to the data stream environment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis argues that in order to establish a sound information security culture it is necessary to look at organisation's information security systems in a socio- technical context. The motivation for this research stems from the continuing concern of ineffective information security in organisations, leading to potentially significant monetary losses. It is important to address both technical and non- technical aspects when dealing with information security management. Culture has been identified as an underlying determinant of individuals' behaviour and this extends to information security culture, particularly in developing countries. This research investigates information security culture in the Saudi Arabia context. The theoretical foundation for the study is based on organisational and national culture theories. A conceptual framework for this study was constructed based on Peterson and Smith's (1997) model of national culture. This framework guides the study of national, organisational and technological values and their relationships to the development of information security culture. Further, the study seeks to better understand how these values might affect the development and deployment of an organisation's information security culture. Drawing on evidence from three exploratory case studies, an emergent conceptual framework was developed from the traditional human behaviour and the social environment perspectives used in social work, This framework contributes to in- formation security management by identifying behaviours related to four modes of information security practice. These modes provide a sound basis that can be used to evaluate individual organisational members' behaviour and the adequacy of ex- isting security measures. The results confirm the plausibility of the four modes of practice. Furthermore, a final framework was developed by integrating the four modes framework into the research framework. The outcomes of the three case stud- ies demonstrate that some of the national, organisational and technological values have clear impacts on the development and deployment of organisations' informa- tion security culture. This research, by providing an understanding the in uence of national, organi- sational and technological values on individuals' information security behaviour, contributes to building a theory of information security culture development within an organisational context. The research reports on the development of an inte- grated information security culture model that highlights recommendations for developing an information security culture. The research framework, introduced by this research, is put forward as a robust starting point for further related work in this area.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many Enterprise Systems (ES) projects have reported nil or detrimental impacts despite the substantial investment in the system. Having expected positive outcomes for the organization and its functions through the weighty spend, the effective management of ES-related knowledge has been suggested as a critical success factor for these ES projects in ES implementations. This paper suggests theoretical views purporting the importance of understanding on knowledge management for ES success. To explain the complex, dynamic and multifaceted of knowledge management, we adopt the concepts in Learning Network Theory. We then conceptualized the impact of knowledge management on ES by analyzing five case studies in several industries in India, based on the Knowledge-based Theory of the Firm that captures the performance of the system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Humankind has been dealing with all kinds of disasters since the dawn of time. The risk and impact of disasters producing mass casualties worldwide is increasing, due partly to global warming as well as to increased population growth, increased density and the aging population. China, as a country with a large population, vast territory, and complex climatic and geographical conditions, has been plagued by all kinds of disasters. Disaster health management has traditionally been a relatively arcane discipline within public health. However, SARS, Avian Influenza, and earthquakes and floods, along with the need to be better prepared for the Olympic Games in China has brought disasters, their management and their potential for large scale health consequences on populations to the attention of the public, the government and the international community alike. As a result significant improvements were made to the disaster management policy framework, as well as changes to systems and structures to incorporate an improved disaster management focus. This involved the upgrade of the Centres for Disease Control and Prevention (CDC) throughout China to monitor and better control the health consequences particularly of infectious disease outbreaks. However, as can be seen in the Southern China Snow Storm and Wenchuan Earthquake in 2008, there remains a lack of integrated disaster management and efficient medical rescue, which has been costly in terms of economics and health for China. In the context of a very large and complex country, there is a need to better understand whether these changes have resulted in effective management of the health impacts of such incidents. To date, the health consequences of disasters, particularly in China, have not been a major focus of study. The main aim of this study is to analyse and evaluate disaster health management policy in China and in particular, its ability to effectively manage the health consequences of disasters. Flood has been selected for this study as it is a common and significant disaster type in China and throughout the world. This information will then be used to guide conceptual understanding of the health consequences of floods. A secondary aim of the study is to compare disaster health management in China and Australia as these countries differ in their length of experience in having a formalised policy response. The final aim of the study is to determine the extent to which Walt and Gilson’s (1994) model of policy explains how disaster management policy in China was developed and implemented after SARS in 2003 to the present day. This study has utilised a case study methodology. A document analysis and literature search of Chinese and English sources was undertaken to analyse and produce a chronology of disaster health management policy in China. Additionally, three detailed case studies of flood health management in China were undertaken along with three case studies in Australia in order to examine the policy response and any health consequences stemming from the floods. A total of 30 key international disaster health management experts were surveyed to identify fundamental elements and principles of a successful policy framework for disaster health management. Key policy ingredients were identified from the literature, the case-studies and the survey of experts. Walt and Gilson (1994)’s policy model that focuses on the actors, content, context and process of policy was found to be a useful model for analysing disaster health management policy development and implementation in China. This thesis is divided into four parts. Part 1 is a brief overview of the issues and context to set the scene. Part 2 examines the conceptual and operational context including the international literature, government documents and the operational environment for disaster health management in China. Part 3 examines primary sources of information to inform the analysis. This involves two key studies: • A comparative analysis of the management of floods in China and Australia • A survey of international experts in the field of disaster management so as to inform the evaluation of the policy framework in existence in China and the criteria upon which the expression of that policy could be evaluated Part 4 describes the key outcomes of this research which include: • A conceptual framework for describing the health consequences of floods • A conceptual framework for disaster health management • An evaluation of the disaster health management policy and its implementation in China. The research outcomes clearly identified that the most significant improvements are to be derived from improvements in the generic management of disasters, rather than the health aspects alone. Thus, the key findings and recommendations tend to focus on generic issues. The key findings of this research include the following: • The health consequences of floods may be described in terms of time as ‘immediate’, ‘medium term’ and ‘long term’ and also in relation to causation as ‘direct’ and ‘indirect’ consequences of the flood. These two aspects form a matrix which in turn guides management responses. • Disaster health management in China requires a more comprehensive response throughout the cycle of prevention, preparedness, response and recovery but it also requires a more concentrated effort on policy implementation to ensure the translation of the policy framework into effective incident management. • The policy framework in China is largely of international standard with a sound legislative base. In addition the development of the Centres for Disease Control and Prevention has provided the basis for a systematic approach to health consequence management. However, the key weaknesses in the current system include: o The lack of a key central structure to provide the infrastructure with vital support for policy development, implementation and evaluation. o The lack of well-prepared local response teams similar to local government based volunteer groups in Australia. • The system lacks structures to coordinate government action at the local level. The result of this is a poorly coordinated local response and lack of clarity regarding the point at which escalation of the response to higher levels of government is advisable. These result in higher levels of risk and negative health impacts. The key recommendations arising from this study are: 1. Disaster health management policy in China should be enhanced by incorporating disaster management considerations into policy development, and by requiring a disaster management risk analysis and disaster management impact statement for development proposals. 2. China should transform existing organizations to establish a central organisation similar to the Federal Emergency Management Agency (FEMA) in the USA or the Emergency Management Australia (EMA) in Australia. This organization would be responsible for leading nationwide preparedness through planning, standards development, education and incident evaluation and to provide operational support to the national and local government bodies in the event of a major incident. 3. China should review national and local plans to reflect consistency in planning, and to emphasize the advantages of the integrated planning process. 4. Enhance community resilience through community education and the development of a local volunteer organization. China should develop a national strategy which sets direction and standards in regard to education and training, and requires system testing through exercises. Other initiatives may include the development of a local volunteer capability with appropriate training to assist professional response agencies such as police and fire services in a major incident. An existing organisation such as the Communist Party may be an appropriate structure to provide this response in a cost effective manner. 5. Continue development of professional emergency services, particularly ambulance, to ensure an effective infrastructure is in place to support the emergency response in disasters. 6. Funding for disaster health management should be enhanced, not only from government, but also from other sources such as donations and insurance. It is necessary to provide a more transparent mechanism to ensure the funding is disseminated according to the needs of the people affected. 7. Emphasis should be placed on prevention and preparedness, especially on effective disaster warnings. 8. China should develop local disaster health management infrastructure utilising existing resources wherever possible. Strategies for enhancing local infrastructure could include the identification of local resources (including military resources) which could be made available to support disaster responses. It should develop operational procedures to access those resources. Implementation of these recommendations should better position China to reduce the significant health consequences experienced each year from major incidents such as floods and to provide an increased level of confidence to the community about the country’s capacity to manage such events.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is increasing evidence that parenting and feeding interact to influence children’s eating behaviour and weight status. Interpretation of existing research is complicated by the lack of consensus in the conceptualisation and measurement of both ‘parenting’ and ‘feeding’, particularly the distinction between ‘styles’, ‘dimensions’ and ‘practices’. In addition, the lack of validated tools to concurrently assess feeding practices in infancy limits the capacity to examine the relationships between parenting and feeding in infancy and their short- and long-term influence on weight status. In this paper we provide an overview of the constructs examined in this emerging area of research, highlight the conceptual, definitional and measurement challenges and propose a unifying model to aid design and the interpretation of intervention studies. Progress on these methodological issues will contribute to the robust evidence required to justify investment in interventions that focus on parenting and feeding in the context of child obesity prevention.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper closely examines factors affecting students’ progression in their engineering programs through fieldwork conducted at three Australian universities. To extract clues on how specific teaching methods can be used to maximize learning, the investigation considered factors such as understanding how students take in, process and present information. A number of focus groups were conducted with students and the data gathered was combined with survey results of students’ and academics’ learning styles. The paper reports on the process followed, and provides some analysis of the gathered data, as part of an Australian Learning and Teaching Council, ALTC, Associate Fellowship program.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While the fashion industry is normally first to recognise trends and embrace creativity, fashion designers are sometimes the last to acknowledge that business acumen and entrepreneurial skills are needed. However, fashion designers and entrepreneurs are now all members of the new ‘creative’ global marketplace with its inherent need to sell globally and be competitive with international brands. For the Australian industry, this tension creates enormous pressures due to Australia’s small population (and market/s), the decreasing textile and manufacturing base, the increase of ‘creative’ micro businesses and with this the increasing number of young Australians wanting to start their own fashion business. This paper highlights the current size of the Australian fashion industry, the trend for small business models, the ‘career portfolio’ entrepreneur and strategies Australian universities are undertaking to address students wishing to enter the business of fashion. It also identifies case studies where enterprise learning pedagogy has been successfully implemented into the business education of an Australian fashion program and concludes with recommendations for an enterprise pedagogy that creates authentic learning, while working with industry and community stakeholders in flexible university formats.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is not uncommon for enterprises today to be faced with the demand to integrate and incor- porate many different and possibly heterogeneous systems which are generally independently designed and developed, to allow seamless access. In effect, the integration of these systems results in one large whole system that must be able, at the same time, to maintain the local autonomy and to continue working as an independent entity. This problem has introduced a new distributed architecture called federated systems. The most challenging issue in federated systems is to find answers for the question of how to efficiently cooperate while preserving their autonomous characteristic, especially the security autonomy. This thesis intends to address this issue. The thesis reviews the evolution of the concept of federated systems and discusses the organisational characteristics as well as remaining security issues with the existing approaches. The thesis examines how delegation can be used as means to achieve better security, especially authorisation while maintaining autonomy for the participating member of the federation. A delegation taxonomy is proposed as one of the main contributions. The major contribution of this thesis is to study and design a mechanism to support dele- gation within and between multiple security domains with constraint management capability. A novel delegation framework is proposed including two modules: Delegation Constraint Man- agement module and Policy Management module. The first module is designed to effectively create, track and manage delegation constraints, especially for delegation processes which require re-delegation (indirect delegation). The first module employs two algorithms to trace the root authority of a delegation constraint chain and to prevent the potential conflict when creating a delegation constraint chain if necessary. The first module is designed for conflict prevention not conflict resolution. The second module is designed to support the first module via the policy comparison capability. The major function of this module is to provide the delegation framework the capability to compare policies and constraints (written under the format of a policy). The module is an extension of Lin et al.'s work on policy filtering and policy analysis. Throughout the thesis, some case studies are used as examples to illustrate the discussed concepts. These two modules are designed to capture one of the most important aspects of the delegation process: the relationships between the delegation transactions and the involved constraints, which are not very well addressed by the existing approaches. This contribution is significant because the relationships provide information to keep track and en- force the involved delegation constraints and, therefore, play a vital role in maintaining and enforcing security for transactions across multiple security domains.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report provides an overview of findings of qualitative research comprising three case studies undertaken as a part of the retrospective analysis component of Sustainable Built Environment National Research Centre (SBEnrc) Project 2.7 Leveraging R&D investment for the Australian Built Environment. These case studies (see Parts 2, 3 and 4 of this suite of reports) were undertaken to illustrate the nature of past R&D investments in Australia. This was done to complement: (i) the audit and analysis of past R&D investment undertaken by Thomas Barlow (2011); and (ii) the Construction 2030 roadmap being developed by Swinburne University of Technology and Professor Göran Roos from VTT Technical Research Centre of Finland. These documents will be the basis for the final phase of the present project - developing policy guidelines for future R&D investment in the Australian built environment. Refer also Parts 1, 2 and 3 for detail findings.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study describes the treatment of obese individuals who rated high on emotional eating using four case studies that involved 22 sessions of either cognitive behavioral therapy (CBT) or dialectical behavioral therapy (DBT). Outcomes measures relating to weight, body mass index, emotional eating, depression, anxiety, and stress were all assessed with each participant prior to each baseline (three weekly sessions), during treatment and posttherapy. At the 8-week follow-up, the two cases that had received DBT had lost 10.1% and 7.6% of their initial body weight, whereas the two cases that had received CBT had lost 0.7% and 0.6% of their initial body weight. The two DBT cases also exhibited reductions in emotional distress, frequency of emotional eating or quantity of food eating in response to emotions, whereas the two CBT cases showed no overall reductions in these areas. Important processes from all four cases are described as are the implications to clinicians for developing more effective interventions for obese clients who engage in emotional eating.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Developing awareness of and maintaining interest in Korea and Korean culture for non-language secondary and tertiary students continues to challenge educators in Australia. A lack of appropriate and accessible creative and cultural materials is a key factor contributing to this challenge. In light of changes made to 'fair use' guidelines for the Digital Millennium Copyright Act in the United States in July 2010, and in order to prepare for a time in the near future when Australian copyright regulations might follow suit, this article offers a framework for utilizing film and digital media contents in the classroom. Case studies of the short digital animation film 'Birthday Boy' (2004) and the feature film The Divine Weapon (2008) are presented in order to illustrate new educational approaches to popular Korean films---the cinematic component of the 'Korean Wave' ('Hanryu' or 'Hallyu' in Korean). It is hoped that this work-in-progress will enable teachers to inspire students with limited language skills to learn more about Korean popular culture, history, and tradition as well as media, politics, and genre studies in dynamic ways through the use of films as cultural texts in the classroom.