956 resultados para Modern portfolio theory


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Evidence within Australia and internationally suggests parenthood as a risk factor for inactivity; however, research into understanding parental physical activity is scarce. Given that active parents can create active families and social factors are important for parents’ decision making, the authors investigated a range of social influences on parents’ intentions to be physically active. Parents (N = 580; 288 mothers and 292 fathers) of children younger than 5 years completed an extended Theory of Planned Behavior questionnaire either online or paper based. For both genders, attitude, control factors, group norms, friend general support, and an active parent identity predicted intentions, with social pressure and family support further predicting mothers’ intentions and active others further predicting fathers’ intentions. Attention to these factors and those specific to the genders may improve parents’ intentions to be physically active, thus maximizing the benefits to their own health and the healthy lifestyle practices for other family members.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: Donor retention is vital to blood collection agencies. Past research has highlighted the importance of early career behavior for long-term donor retention, yet research investigating the determinants of early donor behavior is scarce. Using an extended Theory of Planned Behavior (TPB), this study sought to identify the predictors of first-time blood donors' early career retention. STUDY DESIGN AND METHODS: First-time donors (n = 256) completed three surveys on blood donation. The standard TPB predictors and self-identity as a donor were assessed 3 weeks (Time 1) and at 4 months (Time 2) after an initial donation. Path analyses examined the utility of the extended TPB to predict redonation at 4 and 8 months after initial donation. RESULTS: The extended TPB provided a good fit to the data. Post-Time 1 and 2 behavior was consistently predicted by intention to redonate. Further, intention was predicted by attitudes, perceived control, and self-identity (Times 1 and 2). Donors' intentions to redonate at Time 1 were the strongest predictor of intention to donate at Time 2, while donors' behavior at Time 1 strengthened self-identity as a blood donor at Time 2. CONCLUSION: An extended TPB framework proved efficacious in revealing the determinants of first-time donor retention in an initial 8-month period. The results suggest that collection agencies should intervene to bolster donors' attitudes, perceived control, and identity as a donor during this crucial post–first donation period.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When it comes to discussing art and complex cultural issues, does the emphasis on provocation merely reduce issues into straightforward oppositions, at the cost of developed argument, consistency and any nuanced engagement? A response to Camille Paglia's "how capitalism can save art?"

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The representation of business process models has been a continuing research topic for many years now. However, many process model representations have not developed beyond minimally interactive 2D icon-based representations of directed graphs and networks, with little or no annotation for information overlays. In addition, very few of these representations have undergone a thorough analysis or design process with reference to psychological theories on data and process visualization. This dearth of visualization research, we believe, has led to problems with BPM uptake in some organizations, as the representations can be difficult for stakeholders to understand, and thus remains an open research question for the BPM community. In addition, business analysts and process modeling experts themselves need visual representations that are able to assist with key BPM life cycle tasks in the process of generating optimal solutions. With the rise of desktop computers and commodity mobile devices capable of supporting rich interactive 3D environments, we believe that much of the research performed in computer human interaction, virtual reality, games and interactive entertainment have much potential in areas of BPM; to engage, provide insight, and to promote collaboration amongst analysts and stakeholders alike. We believe this is a timely topic, with research emerging in a number of places around the globe, relevant to this workshop. This is the second TAProViz workshop being run at BPM. The intention this year is to consolidate on the results of last year's successful workshop by further developing this important topic, identifying the key research topics of interest to the BPM visualization community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rises recorded for girls’ violence in countries like Australia, Canada, United Kingdom and United States have been hotly contested. One view is these rising rates of violence are an artefact of new forms of policy, policing, criminalisation and social control over young women. Another view is that young women may indeed have become more violent as they have increasingly participated in youth subcultural activities involving gangs and drugs, and cyber‐cultural activities that incite and reward girls’ violence. Any comprehensive explanation will need to address how a complex interplay of cultural, social, behavioural, and policy responses contribute to these rises. This article argues that there is no singular cause, explanation or theory that accounts for the rises in adolescent female violence, and that many of the simple explanations circulating in popular culture are driven by an anti‐feminist ideology. By concentrating on females as victims of violence and very rarely as perpetrators, feminist criminology has for the most part ducked the thorny issue of female violence, leaving a discursive space for anti‐feminist sentiment to reign. The article concludes by arguing the case for developing a feminist theory of female violence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This book provides a general framework for specifying, estimating, and testing time series econometric models. Special emphasis is given to estimation by maximum likelihood, but other methods are also discussed, including quasi-maximum likelihood estimation, generalized method of moments estimation, nonparametric estimation, and estimation by simulation. An important advantage of adopting the principle of maximum likelihood as the unifying framework for the book is that many of the estimators and test statistics proposed in econometrics can be derived within a likelihood framework, thereby providing a coherent vehicle for understanding their properties and interrelationships. In contrast to many existing econometric textbooks, which deal mainly with the theoretical properties of estimators and test statistics through a theorem-proof presentation, this book squarely addresses implementation to provide direct conduits between the theory and applied work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mathematical models of mosquito-borne pathogen transmission originated in the early twentieth century to provide insights into how to most effectively combat malaria. The foundations of the Ross–Macdonald theory were established by 1970. Since then, there has been a growing interest in reducing the public health burden of mosquito-borne pathogens and an expanding use of models to guide their control. To assess how theory has changed to confront evolving public health challenges, we compiled a bibliography of 325 publications from 1970 through 2010 that included at least one mathematical model of mosquito-borne pathogen transmission and then used a 79-part questionnaire to classify each of 388 associated models according to its biological assumptions. As a composite measure to interpret the multidimensional results of our survey, we assigned a numerical value to each model that measured its similarity to 15 core assumptions of the Ross–Macdonald model. Although the analysis illustrated a growing acknowledgement of geographical, ecological and epidemiological complexities in modelling transmission, most models during the past 40 years closely resemble the Ross–Macdonald model. Modern theory would benefit from an expansion around the concepts of heterogeneous mosquito biting, poorly mixed mosquito-host encounters, spatial heterogeneity and temporal variation in the transmission process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study aimed to identify how school leaders’ practices influence department activities during school transformation. The method used to explore emerging disturbances and contradictions within and between school departments was based on Cultural Historical Activity Theory (CHAT). The findings show that in order to implement educational changes in schools successfully, leaders should promote the change they envision as being highly consistent with the current collective identity (shared object) of the departments. From this perspective, the systemic components of the school departments are given a sense of preservation and continuity, rather than loss.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Presently organisations engage in what is termed as Global Business Transformation Projects [GBTPs], for consolidating, innovating, transforming and restructuring their processes and business strategies while undergoing fundamental change. Culture plays an important role in global business transformation projects as these involve people of different cultural backgrounds and span across countries, industries and disciplinary boundaries. Nevertheless, there is scant empirical research on how culture is conceptualised beyond national and organisational cultures but also on how culture is to be taken into account and dealt with within global business transformation projects. This research is situated in a business context and discovers a theory that aids in describing and dealing with culture. It draws on the lived experiences of thirty-two senior management practitioners, reporting on more than sixty-one global business transformation projects in which they were actively involved. The research method used is a qualitative and interpretive one and applies a grounded theory approach, with rich data generated through interviews. In addition, vignettes were developed to illustrate the derived theoretical models. The findings from this study contribute to knowledge in multiple ways. First, it provides a holistic account of global business transformation projects that describe the construct of culture by the elements of culture types, cultural differences and cultural diversity. A typology of culture types has been developed which enlarges the view of culture beyond national and organisational culture including an industry culture, professional service firm culture and 'theme' culture. The amalgamation of the culture types instantiated in a global business transformation project compromises its project culture. Second, the empirically grounded process for managing culture in global business transformation projects integrates the stages of recognition, understanding and management as well as the enablement providing a roadmap for dealing with culture in global business transformation projects. Third, this study identified contextual variables to global business transformation projects, which provide the means of describing the environment global business transformation projects are situated, influence the construct of culture and inform the process for managing culture. Fourth, the contribution to the research method is the positioning of interview research as a strategy for data generation and the detailed documentation applying grounded theory to discover theory.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Streamciphers are common cryptographic algorithms used to protect the confidentiality of frame-based communications like mobile phone conversations and Internet traffic. Streamciphers are ideal cryptographic algorithms to encrypt these types of traffic as they have the potential to encrypt them quickly and securely, and have low error propagation. The main objective of this thesis is to determine whether structural features of keystream generators affect the security provided by stream ciphers.These structural features pertain to the state-update and output functions used in keystream generators. Using linear sequences as keystream to encrypt messages is known to be insecure. Modern keystream generators use nonlinear sequences as keystream.The nonlinearity can be introduced through a keystream generator's state-update function, output function, or both. The first contribution of this thesis relates to nonlinear sequences produced by the well-known Trivium stream cipher. Trivium is one of the stream ciphers selected in a final portfolio resulting from a multi-year project in Europe called the ecrypt project. Trivium's structural simplicity makes it a popular cipher to cryptanalyse, but to date, there are no attacks in the public literature which are faster than exhaustive keysearch. Algebraic analyses are performed on the Trivium stream cipher, which uses a nonlinear state-update and linear output function to produce keystream. Two algebraic investigations are performed: an examination of the sliding property in the initialisation process and algebraic analyses of Trivium-like streamciphers using a combination of the algebraic techniques previously applied separately by Berbain et al. and Raddum. For certain iterations of Trivium's state-update function, we examine the sets of slid pairs, looking particularly to form chains of slid pairs. No chains exist for a small number of iterations.This has implications for the period of keystreams produced by Trivium. Secondly, using our combination of the methods of Berbain et al. and Raddum, we analysed Trivium-like ciphers and improved on previous on previous analysis with regards to forming systems of equations on these ciphers. Using these new systems of equations, we were able to successfully recover the initial state of Bivium-A.The attack complexity for Bivium-B and Trivium were, however, worse than exhaustive keysearch. We also show that the selection of stages which are used as input to the output function and the size of registers which are used in the construction of the system of equations affect the success of the attack. The second contribution of this thesis is the examination of state convergence. State convergence is an undesirable characteristic in keystream generators for stream ciphers, as it implies that the effective session key size of the stream cipher is smaller than the designers intended. We identify methods which can be used to detect state convergence. As a case study, theMixer streamcipher, which uses nonlinear state-update and output functions to produce keystream, is analysed. Mixer is found to suffer from state convergence as the state-update function used in its initialisation process is not one-to-one. A discussion of several other streamciphers which are known to suffer from state convergence is given. From our analysis of these stream ciphers, three mechanisms which can cause state convergence are identified.The effect state convergence can have on stream cipher cryptanalysis is examined. We show that state convergence can have a positive effect if the goal of the attacker is to recover the initial state of the keystream generator. The third contribution of this thesis is the examination of the distributions of bit patterns in the sequences produced by nonlinear filter generators (NLFGs) and linearly filtered nonlinear feedback shift registers. We show that the selection of stages used as input to a keystream generator's output function can affect the distribution of bit patterns in sequences produced by these keystreamgenerators, and that the effect differs for nonlinear filter generators and linearly filtered nonlinear feedback shift registers. In the case of NLFGs, the keystream sequences produced when the output functions take inputs from consecutive register stages are less uniform than sequences produced by NLFGs whose output functions take inputs from unevenly spaced register stages. The opposite is true for keystream sequences produced by linearly filtered nonlinear feedback shift registers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this research, we suggest appropriate information technology (IT) governance structures to manage the cloud computing resources. The interest in acquiring IT resources a utility is gaining momentum. Cloud computing resources present organizations with opportunities to manage their IT expenditure on an ongoing basis, and are providing organizations access to modern IT resources to innovate and manage their continuity. However, cloud computing resources are no silver bullet. Organizations would need to have appropriate governance structures and policies in place to ensure its effective management and fit into existing business processes to leverage the promised opportunities. Using a mixed method design, we identified four possible governance structures for managing the cloud computing resources. These structures are a chief cloud officer, a cloud management committee, a cloud service facilitation centre, and a cloud relationship centre. These governance structures ensure appropriate direction of cloud computing resources from its acquisition to fit into the organizations business processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research suggests information technology (IT) governance structures to manage cloud computing resources. The interest in acquiring IT resources as a utility from the cloud is gaining momentum. Cloud computing resources present organizations with opportunities to manage their IT expenditure on an ongoing basis, and are providing organizations access to modern IT resources to innovate and manage their continuity. However, cloud computing resources are no silver bullet. Organizations would need to have appropriate governance structures and policies in place to manage the cloud resources. The subsequent decisions from these governance structures will ensure effective management of cloud resources. This management will facilitate a better fit of cloud resources into organizations existing processes to achieve business (process-level) and financial (firm-level) objectives. Using a triangulation approach, we suggest four possible governance structures for managing the cloud computing resources. These structures are a chief cloud officer, a cloud management committee, a cloud service facilitation centre, and a cloud relationship centre. We also propose that these governance structures would relate to organizations cloud-related business objectives directly and indirectly to cloud-related financial objectives. Perceptive field survey data from actual and prospective cloud service adopters confirmed that the suggested structures would contribute directly to cloud-related business objectives and indirectly to cloud-related financial objectives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using a longitudinal study, an overall behavioural model with three related phases (cognitive, motivational and volitional phase) across three studies was examined to identify the factors that most prominently drive consumer environmental behaviour. This thesis provides empirical evidence to support the behavioural model in an environmental consumption context and shows a new avenue for promoting consumer environmental behaviour.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research background For almost 80 years the Chuck Taylor (or Chuck T's) All Star basketball shoe has been an iconic item of fashion apparel. The Chuck T's were first designed in 1921 by Converse, an American shoe company and over the decades they became a popular item not purely for sports and athletic purposes but rather evolved into the shoe of choice for many subcultural groups as a fashion item. In some circles the Chuck Taylor is still seen as the "coolest" sneaker of all time - one which will never go out of fashion regardless of changing trends. With over 600 millions pairs sold all over the world since its release, the Converse shoe is representative of not only a fashion culture - but also of a consumption culture - that evolved as the driving force behind the massive growth of the Western economic system during the 20th Century. Artisan Gallery (Brisbane), in conjunction with the exhibition Reboot: Function, Fashion and the Sneaker, a history of the sneaker, selected 20 designers to customise and re-design the classic Converse Chuck Taylor All Stars shoe and in doing so highlighted the diversity of forms possible for creative outcomes. As Artisan Gallery Curator Kirsten Fitzpatrick states “We were expecting people to draw and paint on them. Instead, we had shoes... mounted as trophies.." referring to the presentation of "Converse Consumption". The exhibition ran from 21 June – 16 August 2012: Research question The Chuck T’s is one of many overwhelmingly commercially successful designs of the last century. Nowadays we are faced with the significant problems of overconsumption and the stress this causes on the natural ecosystem; and on people as a result. As an active member of the industrial design fraternity – a discipline that sits at the core of this problem - how can I use this opportunity to comment on the significant issue of consumption? An effective way to do this was to associate consumption of goods with consumption of sugar. There are significant similarities between our ceaseless desires to consume products and our fervent need to consume indulgent sweet foods. Artisan Statement Delicious, scrumptious, delectable... your pupils dilate, your blood pressure spikes, your liver goes into overdrive. Immediately, your brain cuts off the adenosine receptors, preventing drowsiness. Your body increases dopamine production, in-turn stimulating the pleasure receptors in your brain. Your body absorbs all the sweetness and turns it into fat – while all the nutrients that you actually require are starting to be destroyed, about to be expelled. And this is only after one bite! After some time though, your body comes crashing back to earth. You become irritable and begin to feel sluggish. Your eyelids seem heavy while your breathing pattern changes. Your body has consumed all the energy and destroyed all available nutrients. You literally begin to shut down. These are the physiological effects of sugar consumption. A perfect analogy for our modern day consumer driven world. Enjoy your dessert! Research contribution “Converse Consumption” contributes to the conversation regarding over-consumption by compelling people to reflect on their consumption behaviour through the reconceptualising of the deconstructed Chuck T’s in an attractive edible form. By doing so the viewer has to deal with the desire to consume the indulgent looking dessert with the contradictory fact that it is comprised of a pair of shoes. The fact that the shoes are Chuck T’s make the effect even more powerful due to their iconic status. These clashing motivations are what make “Converse Consumption” a bizarre yet memorable experience. Significance The exhibition was viewed by an excess of 1000 people and generated exceptional media coverage and public exposure/impact. As Artisan Gallery Curator Kirsten Fitzpatrick states “20 of Brisbane's best designers were given the opportunity to customise their own Converse Sneakers, with The Converse Blank Canvas Project.” And to be selected in this category demonstrates the calibre of importance for design prominence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electricity is the cornerstone of modern life. It is essential to economic stability and growth, jobs and improved living standards. Electricity is also the fundamental ingredient for a dignified life; it is the source of such basic human requirements as cooked food, a comfortable living temperature and essential health care. For these reasons, it is unimaginable that today's economies could function without electricity and the modern energy services that it delivers. Somewhat ironically, however, the current approach to electricity generation also contributes to two of the gravest and most persistent problems threatening the livelihood of humans. These problems are anthropogenic climate change and sustained human poverty. To address these challenges, the global electricity sector must reduce its reliance on fossil fuel sources. In this context, the object of this research is twofold. Initially it is to consider the design of the Renewable Energy (Electricity) Act 2000 (Cth) (Renewable Electricity Act), which represents Australia's primary regulatory approach to increase the production of renewable sourced electricity. This analysis is conducted by reference to the regulatory models that exist in Germany and Great Britain. Within this context, this thesis then evaluates whether the Renewable Electricity Act is designed effectively to contribute to a more sustainable and dignified electricity generation sector in Australia. On the basis of the appraisal of the Renewable Electricity Act, this thesis contends that while certain aspects of the regulatory regime have merit, ultimately its design does not represent an effective and coherent regulatory approach to increase the production of renewable sourced electricity. In this regard, this thesis proposes a number of recommendations to reform the existing regime. These recommendations are not intended to provide instantaneous or simple solutions to the current regulatory regime. Instead, the purpose of these recommendations is to establish the legal foundations for an effective regulatory regime that is designed to increase the production of renewable sourced electricity in Australia in order to contribute to a more sustainable and dignified approach to electricity production.