1000 resultados para HUMSN BEHAVIOUR
Resumo:
Young people aged 17–24 years are at high risk of being killed in road crashes around the world. Road safety interventions consider some influences upon young driver behaviour; for example, imposing passenger restrictions on young novice drivers indirectly minimises the potential negative social influences of peers as passengers. To change young driver risky behaviour, the multitude of psychosocial influences upon its initiation and maintenance must be identified. A study questionnaire was developed to investigate the relationships between risky driving and Akers’ social learning theory, social identity theory, and thrill seeking variables. The questionnaire was completed by 165 participants (105 women,60 men) residing in south-east Queensland, Australia. The sociodemographic variables of age, gender, and exposure explained 19% of the variance in self-reported risky driving behaviour, whilst Akers’ social learning variables explained an additional 42%. Thrill seeking and social identity variables did not explain any significant additional variance. Significant predictors of risky driving included imitation of the driving behaviours of, and anticipated rewards and punishments administered by, parents and peers. Road safety policy that directly considers and incorporates these factors in their design, implementation, and enforcement of young driver road safety interventions should prove more efficacious than current approaches.
Resumo:
Despite ongoing enhancements to graduated licensing systems, young drivers continue to have a high risk of being killed or injured in car crashes. This study investigated the influence of parents and peers on the risky behaviour of young drivers, utilising Akers’ social learning theory. The specific factors examined related to parent and peer norms perceived by the young driver, and the rewards and punishments anticipated by the young driver from their parents and peers. A questionnaire was completed by 165 young drivers. Regression analysis revealed that these factors explained 54% of the variance in risky driving. The strongest predictor was anticipated parent rewards, followed by peer norms, and anticipated peer rewards. Exploratory analyses however revealed the profile of predictors varied for male and female participants, and for self-reported offenders and non-offenders. The results highlight the role of psychosocial factors in the risky behaviour of young drivers and the need for road safety policies and programs to consider the influence of both parents and peers upon this behaviour.
Resumo:
The purpose of this paper is to examine the legal implications of the continuing rise in the number of school children diagnosed with behaviour disorders. Not only are teachers now subject to a dense grid of legal regulation, they are also increasingly vulnerable to actions in tort. It will be argued here that as more and more children are labelled ‘disordered’, the duty of care become more onerous, and hence harder for teachers to meet. As a consequence, teachers are more likely to face claims of negligence. It is concluded that while the schooling system needs to retain a healthy scepticism about each new pathologising disorder that seeks special status for its sufferers, it also needs to provide greater training and resources for teachers regarding disorder management. It is also concluded that recent changes to negligence law regarding the issue of ‘reasonable foreseeability’ within breach of duty of care, may not be as significant as might have been hoped by the teaching community. Indeed, the elevated standard of care required by the increasing numbers of disordered pupils, places teachers in an ever more difficult legal position.
Resumo:
This paper is a deductive theoretical enquiry into the flow of effects from the geometry of price bubbles/busts, to price indices, to pricing behaviours of sellers and buyers, and back to price bubbles/busts. The intent of the analysis is to suggest analytical approaches to identify the presence, maturity, and/or sustainability of a price bubble. We present a pricing model to emulate market behaviour, including numeric examples and charts of the interaction of supply and demand. The model extends into dynamic market solutions myopic (single- and multi-period) backward looking rational expectations to demonstrate how buyers and sellers interact to affect supply and demand and to show how capital gain expectations can be a destabilising influence – i.e. the lagged effects of past price gains can drive the market price away from long-run market-worth. Investing based on the outputs of past price-based valuation models appear to be more of a game-of-chance than a sound investment strategy.
Resumo:
This paper reports findings from a study investigating the effect of integrating sponsored and nonsponsored search engine links into a single web listing. The premise underlying this research is that web searchers are chiefly interested in relevant results. Given the reported negative bias that web searchers have concerning sponsored links, separate listings may be a disservice to web searchers as it might not direct them to relevant websites. Some web meta-search engines integrate sponsored and nonsponsored links into a single listing. Using a web search engine log of over 7 million interactions from hundreds of thousands of users from a major web meta-search engine, we analysed the click-through patterns for both sponsored and nonsponsored links. We also classified web queries as informational, navigational and transactional based on the expected type of content and analysed the click-through patterns of each classification. The findings show that for more than 35% of queries, there are no clicks on any result. More than 80% of web queries are informational in nature and approximately 10% are transactional, and 10% navigational. Sponsored links account for approximately 15% of all clicks. Integrating sponsored and nonsponsored links does not appear to increase the clicks on sponsored listings. We discuss how these research results could enhance future sponsored search platforms.
Resumo:
The black rat (Rattus rattus) has been shown to be the primary species responsible for causing significant crop losses within the Australian macadamia industry. This species success within macadamia orchards is directly related to the flexibility expressed in its foraging behaviour. In this paper a conceptual foraging model is presented which proposes that the utilisation of resources by rodents within various components of the system is related not only to their relative abundance, but also to predator avoidance behaviour. Nut removal from high predation risk habitats during periods of low resource abundance in low risk compartments of the system is considered an essential behaviour that allows high rodent densities to be maintained throughout the year.
Resumo:
The purpose of this paper is to examine the legal implications of the continuing rise in the number of school children diagnosed with behaviour disorders. Not only are teachers now subject to a dense grid of legal regulation, they are also increasingly vulnerable to actions in tort. It will be argued here that as more and more children are labelled ‘disordered’, then the concomitant duty of care requirements for teachers becomes more onerous. As a consequence, teachers are less likely to be able to defend themselves against claims of negligence. It is concluded that while the schooling system needs to retain a healthy scepticism about each new pathologising disorder that seeks special status for its sufferers, it also needs to provide greater training and resources for teachers regarding disorder management. It is also concluded that recent changes to negligence law regarding the issue of ‘reasonable foreseeability’ within breach of duty of care, may not be as significant as might have been hoped by the teaching community. Indeed, the elevated standard of care, as required by increasing numbers of disordered pupils, place teachers in an ever more difficult legal position.
Resumo:
Despite the increasing popularity of social networking websites (SNWs), very little is known about the psychosocial variables which predict people’s use of these websites. The present study used an extended model of the theory of planned behaviour (TPB), including the additional variables of self-identity and belongingness, to predict high level SNW use intentions and behaviour in a sample of young people aged between 17 and 24 years. Additional analayses examined the impact of self-identity and belongingness on young people’s addictive tendencies towards SNWs. University students (N = 233) completed measures of the standard TPB constructs (attitude, subjective norm and perceived behavioural control), the additional predictor variables (self-identity and belongingness), demographic variables (age, gender, and past behaviour) and addictive tendencies. One week later, they reported their engagement in high level SNW use during the previous week. Regression analyses partially supported the TPB, as attitude and subjective norm signficantly predicted intentions to engage in high level SNW use with intention signficantly predicting behaviour. Self-identity, but not belongingness, signficantly contributed to the prediction of intention, and, unexpectedly, behaviour. Past behaviour also signficantly predicted intention and behaviour. Self-identity and belongingness signficantly predicted addictive tendencies toward SNWs. Overall, the present study revealed that high level SNW use is influenced by attitudinal, normative, and self-identity factors, findings which can be used to inform strategies that aim to modify young people’s high levels of use or addictive tendencies for SNWs.
Resumo:
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.
Resumo:
This study explored the role of donor prototype evaluations (perceptions of the typical organ donor) in organ donation communication decisions using an extended theory of planned behaviour (TPB) model. The model incorporated attitude, subjective norm, perceived behavioural control, moral norm, self-identity, and donor prototype evaluations to predict intentions to record consent on an organ donor register and discuss the organ donation decision with significant others. Participants completed surveys assessing the extended TPB constructs related to registering (n = 359) and discussing (n = 282). Results supported a role for donor prototype evaluations in predicting discussing intentions only. Both extended TPB structural equation models were a good fit to the data, accounting for 74 and 76% of the variance in registering and discussing intentions, respectively. Participants’ self-reported discussing behaviour (but not registering behaviour given low numbers of behavioural performers) was assessed 4 weeks later, with discussing intention as the only significant predictor of behaviour (Nagelkerke R2 = 0.11). These findings highlight the impact of people's perceptions of a typical donor on their decisions to discuss their organ donation preference, assisting our understanding of the factors influencing individuals' communication processes in efforts to bridge the gap between organ supply and demand.
Resumo:
Cold-formed steel members have been widely used in residential, industrial and commercial buildings as primary load bearing structural elements and non-load bearing structural elements (partitions) due to their advantages such as higher strength to weight ratio over the other structural materials such as hot-rolled steel, timber and concrete. Cold-formed steel members are often made from thin steel sheets and hence they are more susceptible to various buckling modes. Generally short columns are susceptible to local or distortional buckling while long columns to flexural or flexural-torsional buckling. Fire safety design of building structures is an essential requirement as fire events can cause loss of property and lives. Therefore it is essential to understand the fire performance of light gauge cold-formed steel structures under fire conditions. The buckling behaviour of cold-formed steel compression members under fire conditions is not well investigated yet and hence there is a lack of knowledge on the fire performance of cold-formed steel compression members. Current cold-formed steel design standards do not provide adequate design guidelines for the fire design of cold-formed steel compression members. Therefore a research project based on extensive experimental and numerical studies was undertaken at the Queensland University of Technology to investigate the buckling behaviour of light gauge cold-formed steel compression members under simulated fire conditions. As the first phase of this research, a detailed review was undertaken on the mechanical properties of light gauge cold-formed steels at elevated temperatures and the most reliable predictive models for mechanical properties and stress-strain models based on detailed experimental investigations were identified. Their accuracy was verified experimentally by carrying out a series of tensile coupon tests at ambient and elevated temperatures. As the second phase of this research, local buckling behaviour was investigated based on the experimental and numerical investigations at ambient and elevated temperatures. First a series of 91 local buckling tests was carried out at ambient and elevated temperatures on lipped and unlipped channels made of G250-0.95, G550-0.95, G250-1.95 and G450-1.90 cold-formed steels. Suitable finite element models were then developed to simulate the experimental conditions. These models were converted to ideal finite element models to undertake detailed parametric study. Finally all the ultimate load capacity results for local buckling were compared with the available design methods based on AS/NZS 4600, BS 5950 Part 5, Eurocode 3 Part 1.2 and the direct strength method (DSM), and suitable recommendations were made for the fire design of cold-formed steel compression members subject to local buckling. As the third phase of this research, flexural-torsional buckling behaviour was investigated experimentally and numerically. Two series of 39 flexural-torsional buckling tests were undertaken at ambient and elevated temperatures. The first series consisted 2800 mm long columns of G550-0.95, G250-1.95 and G450-1.90 cold-formed steel lipped channel columns while the second series contained 1800 mm long lipped channel columns of the same steel thickness and strength grades. All the experimental tests were simulated using a suitable finite element model, and the same model was used in a detailed parametric study following validation. Based on the comparison of results from the experimental and parametric studies with the available design methods, suitable design recommendations were made. This thesis presents a detailed description of the experimental and numerical studies undertaken on the mechanical properties and the local and flexural-torsional bucking behaviour of cold-formed steel compression member at ambient and elevated temperatures. It also describes the currently available ambient temperature design methods and their accuracy when used for fire design with appropriately reduced mechanical properties at elevated temperatures. Available fire design methods are also included and their accuracy in predicting the ultimate load capacity at elevated temperatures was investigated. This research has shown that the current ambient temperature design methods are capable of predicting the local and flexural-torsional buckling capacities of cold-formed steel compression members at elevated temperatures with the use of reduced mechanical properties. However, the elevated temperature design method in Eurocode 3 Part 1.2 is overly conservative and hence unsuitable, particularly in the case of flexural-torsional buckling at elevated temperatures.
Resumo:
Describes a brief intensive program of cognitive therapy for depression that was designed for 4 adult residents of country towns in Australia, who resided some distance from treatment centers. Ss were assessed prior to treatment, at posttreatment, and at 4-wk, 8-wk, and 20-mo follow-ups. Treatments took place over 3 consecutive days for a total period of 15 hrs. Effects were highly consistent with the impact of group treatments delivered on a more traditional schedule. If confirmed in a controlled group study, these results suggest that cognitive therapy may be applied more economically and more widely than was previously realized.
Resumo:
This report focuses on our examination of extant data which have been sourced with respect to personally and socially risky behaviour associated with males living in regional and remote Australia . The AIHW (2008: PHE 97:89) defines personally risky behaviour, on the one hand, as working, swimming, boating, driving or operating hazardous machinery while intoxicated with alcohol or an illicit drug. Socially risky behaviour, on the other hand, is defined as creating a public disturbance, damaging property, stealing or verbally or physically abusing someone while intoxicated with alcohol or an illicit drug. Additional commentary resulting from exploration, examination and analyses of secondary data is published online in complementary reports in this series.
Resumo:
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the most predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Resumo:
This thesis by publication contributes to our knowledge of psychological factors underlying a modern day phenomenon, young people’s mobile phone behaviour. Specifically, the thesis reports a PhD program of research which adopted a social psychological approach to explore mobile phone behaviour among young Australians aged between 15 and 24 years. A particular focus of the research program was to explore both the cognitive and behavioural aspects of young people’s mobile phone behaviour which for the purposes of this thesis is defined as mobile phone involvement. The research program comprised three separate stages which were developmental in nature, in that, the findings of each stage of the research program informed the next. The overarching goal of the program of research was to improve our understanding of the psychosocial factors influencing young people’s mobile phone behaviour. To achieve this overall goal, there were a number of aims to the research program which reflect the developmental nature of this thesis. Given the limited research into the mobile phone behaviour in Australia, the first two aims of the research program were to explore patterns of mobile phone behaviour among Australian youth and explore the social psychological factors relating to their mobile phone behaviour. Following this exploration, the research program sought to develop a measure which captures the cognitive and behavioural aspects of mobile phone behaviour. Finally, the research program aimed to examine and differentiate the psychosocial predictors of young people’s frequency of mobile phone use and their level of involvement with their mobile phone. Both qualitative and quantitative methodologies were used throughout the program of research. Five papers prepared during the three stages of the research program form the bulk of this thesis. The first stage of the research program was a qualitative investigation of young people’s mobile phone behaviour. Thirty-two young Australians participated in a series of focus groups in which they discussed their mobile phone behaviour. Thematic data analysis explored patterns of mobile phone behaviour among young people, developed an understanding of psychological factors influencing their use of mobile phones, and identified that symptoms of addiction were emerging in young people’s mobile phone behaviour. Two papers (Papers 1 and 2) emanated from this first stage of the research program. Paper 1 explored patterns of mobile phone behaviour and revealed that mobile phones were perceived as being highly beneficial to young people’s lives, with the ability to remain in constant contact with others being particularly valued. The paper also identified that symptoms of behavioural addiction including withdrawal, cognitive and behavioural salience, and loss of control, emerged in participants’ descriptions of their mobile phone behaviour. Paper 2 explored how young people’s need to belong and their social identity (two constructs previously unexplored in the context of mobile phone behaviour) related to their mobile phone behaviour. It was revealed that young people use their mobile phones to facilitate social attachments. Additionally, friends and peers influenced young people’s mobile phone behaviour; for example, their choice of mobile phone carrier and their most frequent type of mobile phone use. These papers laid the foundation for the further investigation of addictive patterns of behaviour and the role of social psychological factors on young people’s mobile behaviour throughout the research program. Stage 2 of the research program focussed on developing a new parsimonious measure of mobile phone behaviour, the Mobile Phone Involvement Questionnaire (MPIQ), which captured the cognitive and behavioural aspects of mobile phone use. Additionally, the stage included a preliminary exploration of factors influencing young people’s mobile phone behaviour. Participants (N = 946) completed a questionnaire which included a pool of items assessing symptoms of behavioural addiction, the uses and gratifications relating to mobile phone use, and self-identity and validation from others in the context of mobile phone behaviour. Two papers (Papers 3 & 4) emanated from the second stage of the research program. Paper 3 provided an important link between the qualitative and quantitative components of the research program. Qualitative data from Stage 1 indicated the reasons young people use their mobile phones and identified addictive characteristics present in young people’s mobile phone behaviour. Results of the quantitative study conducted in Stage 2 of the research program revealed the uses and gratifications relating to young people’s mobile phone behaviour and the effect of these gratifications on young people’s frequency of mobile phone use and three indicators of addiction, withdrawal, salience, and loss of control. Three major uses and gratifications: self (such as feeling good or as a fashion item), social (such as contacting friends), and security (such as use in an emergency) were found to underlie much of young people’s mobile phone behaviour. Self and social gratifications predicted young people’s frequency of mobile phone use and the three indicators of addiction but security gratifications did not. These results provided an important foundation for the inclusion of more specific psychosocial predictors in the later stages of the research program. Paper 4 reported the development of the mobile phone involvement questionnaire and a preliminary exploration of the effect of self-identity and validation from others on young people’s mobile phone behaviour. The MPIQ assessed a unitary construct and was a reliable measure amongst this cohort. Results found that self-identity influenced the frequency of young people’s use whereas self-identity and validation from others influenced their level of mobile phone involvement. These findings provided an important indication that, in addition to self factors, other people have a strong influence on young people’s involvement with their mobile phone and that mobile phone involvement is conceptually different to frequency of mobile phone use. Stage 3 of the research program empirically examined the psychosocial predictors of young people’s mobile behaviour and one paper, Paper 5, emanated from this stage. Young people (N = 292) from throughout Australia completed an online survey assessing the role of self-identity, ingroup norm, the need to belong, and self-esteem on their frequency of mobile phone use and their mobile phone involvement. Self-identity was the only psychosocial predictor of young people’s frequency of mobile phone use. In contrast, self-identity, ingroup norm, and need to belong all influenced young people’s level of involvement with their mobile phone. Additionally, the effect of self-esteem on young people’s mobile phone involvement was mediated by their need to belong. These results indicate that young people who perceive their mobile phone to be an integral part of their self-identity, who perceive that mobile phone is common amongst friends and peers, and who have a strong need for attachment to others, in some cases driven by a desire to enhance their self-esteem, are most likely to become highly involved with their mobile phones. Overall, this PhD program of research has provided an important contribution to our understanding of young Australians’ mobile phone behaviour. Results of the program have broadened our knowledge of factors influencing mobile phone behaviour beyond the approaches used in previous research. The use of various social psychological theories combined with a behavioural addiction framework provided a novel examination of young people’s mobile behaviour. In particular, the development of a new measure of mobile phone behaviour in the research program facilitated the differentiation of the psychosocial factors influencing frequency of young people’s mobile phone behaviour and their level of involvement with their mobile phone. Results of the research program indicate the important role that mobile phone behaviour plays in young people’s social development and also signals the characteristics of those people who may become highly involved with their mobile phone. Future research could build on this thesis by exploring whether mobile phones are affecting traditional social psychological processes and whether the results in this research program are generalisable to other cohorts and other communication technologies.