792 resultados para 1504
Resumo:
Incorporating knowledge based urban development (KBUD) strategies in the urban planning and development process is a challenging and complex task due to the fragmented and incoherent nature of the existing KBUD models. This paper scrutinizes and compares these KBUD models with an aim of identifying key and common features that help in developing a new comprehensive and integrated KBUD model. The features and characteristics of the existing KBUD models are determined through a thorough literature review and the analysis reveals that while these models are invaluable and useful in some cases, lack of a comprehensive perspective and absence of full integration of all necessary development domains render them incomplete as a generic model. The proposed KBUD model considers all central elements of urban development and sets an effective platform for planners and developers to achieve more holistic development outcomes. The proposed model, when developed further, has a high potential to support researchers, practitioners and particularly city and state administrations that are aiming to a knowledge-based development.
Resumo:
Phenomenology is a term that has been described as a philosophy, a research paradigm, a methodology, and equated with qualitative research. In this paper first we clarify phenomenology by tracing its movement both as a philosophy and as a research method. Next we make a case for the use of phenomenology in empirical investigations of management phenomena. The paper discusses a selection of central concepts pertaining to phenomenology as a scientific research method, which include description, phenomenological reduction and free imaginative variation. In particular, the paper elucidates the efficacy of Giorgi’s descriptive phenomenological research praxis as a qualitative research method and how its utility can be applied in creating a deeper and richer understanding of management practice.
Resumo:
Triggered by highly publicized corporate scandals, changing societal expectations and the collapse of financial markets, the roles of boards of directors have changed significantly in safeguarding the interest of shareholders and other stakeholders. Yet relatively little is known about contemporary challenges non-executive directors face and whether their boards are well-equipped for their new tasks. Based on self-assessment reports by supervisory boards, a survey and interviews with supervisory board members, this paper investigates the challenges non-executive directors face in the Netherlands, particularly after a decade of corporate governance reform. Non-executive directors’ inadequate role in scrutinizing executive directors’ performance, information asymmetries and dysfunctional working relationships between executive and non-executive directors are among the greatest challenges indicated by non-executive directors on Dutch supervisory boards. The paper discusses several implications for scholars and practitioners and provides a unique insight in boardroom dynamics (word count: 138).
Resumo:
Shadow nations face particular problems in constructing competitive film industries. Shadow nations refer to nations whose relative competitiveness suffers from easy product substitutability by products initiated, produced and distributed by powerful actors, such as media conglomerates located in Hollywood. The dominant literature has so far neglected the developing policy recommendations for dealing explicitly with the challenges of shadow nations. This paper aims to develop and apply a normative model for the development of film industries in shadow nations. The model integrates insights from innovation system studies and place branding. The developed model is applied to the Australian film industry as Australia represents a typical shadow nation within the film industry.
Resumo:
Every day we are confronted with social interactions with other people. Our social life is characterised by norms that manifest as attitudinal and behavioural uniformities among people. With greater awareness about our social context, we can interact more efficiently. Any theory or model of human interaction that fails to include social concepts could be suggested to lack a critical element. This paper identifies the construct of social concepts that need to be supported by future context-aw are systems from an interdisciplinary perspective. It discusses the limitations of existing context-aware systems to support social psychology theories related to the identification and membership of social groups. We argue that social norms are among the core modelling concepts that future context-aware systems need to capture with the view to support and enhance social interactions. A detailed summary of social psychology theory relevant to social computing is given, followed by a formal definition of the process with each such norm advertised and acquired. The social concepts identified in this paper could be used to simulate agent interactions imbued with social norms or use ICT to facilitate, assist, enhance or understand social interactions. They also could be used in virtual communities modelling where the social awareness of a community as well as the process of joining and exiting a community are important.
Resumo:
In this work, ab initio spin-polarised Density Functional Theory (DFT) calculations are performed to study the interaction of a Ti atom with a NaAlH4(001) surface. We confirm that an interstitially located Ti atom in the NaAlH4 subsurface is the most energetically favoured configuration as recently reported (Chem. Comm. (17) 2006, 1822). On the NaAlH4(001) surface, the Ti atom is most stable when adsorbed between two sodium atoms with an AlH4 unit beneath. A Ti atom on top of an Al atom is also found to be an important structure at low temperatures. The diffusion of Ti from the Al-top site to the Na-bridging site has a low activation barrier of 0.20 eV and may be activated at the experimental temperatures (∼323 K). The diffusion of a Ti atom into the energetically favoured subsurface interstitial site occurs via the Na-bridging surface site and is essentially barrierless.
Resumo:
Purpose The purpose of this paper is to investigate the role of multiple actors in the value creation process for a preventative health service, and observe the subsequent impact on key service outcomes of satisfaction and customer behaviour intentions to use a preventative health service again in the future. Design/methodology/approach An online self-completion survey of Australian women (n=797) was conducted to test the proposed framework in the context of a free, government-provided breastscreening service. Data were analysed using Structural Equation Modelling (SEM). Findings The findings indicate that functional and emotional value are created from organisational and customer resources. These findings indicate that health service providers and customers are jointly responsible for the successful creation of value, leading to desirable outcomes for all stakeholders. Practical implications The results highlight to health professionals the aspects of service that can be managed in order to create value with target audiences. The findings also indicate the importance of the resources provided by users in the creation of value, signifying the importance of customer education and management. Originality/value This study provides a significant contribution to social marketing through the provision of an empirically validated model of value creation in a preventative health service. The model demonstrates how the creation and provision of value can lead to the achievement of desirable social behaviours - a key aim of social marketing.
Resumo:
Modern health information systems can generate several exabytes of patient data, the so called "Health Big Data", per year. Many health managers and experts believe that with the data, it is possible to easily discover useful knowledge to improve health policies, increase patient safety and eliminate redundancies and unnecessary costs. The objective of this paper is to discuss the characteristics of Health Big Data as well as the challenges and solutions for health Big Data Analytics (BDA) – the process of extracting knowledge from sets of Health Big Data – and to design and evaluate a pipelined framework for use as a guideline/reference in health BDA.
Resumo:
Road networks are a national critical infrastructure. The road assets need to be monitored and maintained efficiently as their conditions deteriorate over time. The condition of one of such assets, road pavement, plays a major role in the road network maintenance programmes. Pavement conditions depend upon many factors such as pavement types, traffic and environmental conditions. This paper presents a data analytics case study for assessing the factors affecting the pavement deflection values measured by the traffic speed deflectometer (TSD) device. The analytics process includes acquisition and integration of data from multiple sources, data pre-processing, mining useful information from them and utilising data mining outputs for knowledge deployment. Data mining techniques are able to show how TSD outputs vary in different roads, traffic and environmental conditions. The generated data mining models map the TSD outputs to some classes and define correction factors for each class.
Resumo:
This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the main design parameter. Finally, we catalogue the strengths and weaknesses of each construction according to a few theoretical and many applied comparison criteria.
Resumo:
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.
Resumo:
This paper aims to develop a comprehensive approach to innovate urban policymaking and planning to successfully deliver the knowledge-based agenda. The paper, first, examines the concept of knowledge-based urban development, which has become a popular urban development policy and strategy in recent years, through a comprehensive review of the literature. It, then, introduces and discusses a novel methodological approach for effective policymaking and planning mechanism to deliver the knowledge-based agenda of cities. The paper, with the proposed methodology, brings together urban policymaking and planning approaches, and introduces a novel way to assess knowledge-based urban development achievements and potentials of emerging and prosperous knowledge cities. The paper, thus, provides an invaluable instrument to inform local and regional decision and plan making mechanisms to deliver their knowledge-based agendas and help them in moving towards building their sustainable knowledge cities.
Resumo:
This paper examines the use of Twitter for long-term discussions around Australian politics, at national and state levels, tracking two hashtags during 2012: #auspol, denoting national political topics, and #wapol, which provides a case study of state politics (representing Western Australia). The long-term data collection provides the opportunity to analyse how the Twitter audience responds to Australian politics: which themes attract the most attention and which accounts act as focal points for these discussions. The paper highlights differences in the coverage of state and national politics. For #auspol, a small number of accounts are responsible for the majority of tweets, with politicians invoked but not directly contributing to the discussion. In contrast, #wapol stimulates a much lower level of tweeting. This example also demonstrates that, in addition to citizen accounts, traditional participants within political debate, such as politicians and journalists, are among the active contributors to state-oriented discussions on Twitter.
Resumo:
Security protocols are designed in order to provide security properties (goals). They achieve their goals using cryptographic primitives such as key agreement or hash functions. Security analysis tools are used in order to verify whether a security protocol achieves its goals or not. The analysed property by specific purpose tools are predefined properties such as secrecy (confidentiality), authentication or non-repudiation. There are security goals that are defined by the user in systems with security requirements. Analysis of these properties is possible with general purpose analysis tools such as coloured petri nets (CPN). This research analyses two security properties that are defined in a protocol that is based on trusted platform module (TPM). The analysed protocol is proposed by Delaune to use TPM capabilities and secrets in order to open only one secret from two submitted secrets to a recipient