999 resultados para cheating behaviour
Resumo:
Joint ventures can take many forms and can be formed for different reasons, from sharing resources to creating future business opportunities. At the same time, there is increasing interest and discussion of alternative procurement methods, moving away from traditional procurement systems to relational approaches. Business systems and strategies need to be redefined and move from a short-term project to project culture to a more strategic, long-term perspective. Joint ventures of construction organisations, global and local, have become increasingly popular to deliver large-scale infrastructure construction projects. However, successful strategic collaborations require project organisations to formulate a fit between contractual and operational arrangements for each situation. This study reviews the movement from traditional procurement methods towards relational contracting approaches in Queensland, Australia. The study examines the organisational factors that facilitates sustainable relationship between project organisations and hence, lead to long-term business success. This paper reports on initial findings captured from a survey undertaken with construction contracting organisations in Australia, focusing on the supply chain relationships. Contractors’ perceptions of the relationship management process and the engagement of the supply chain are also presented.
Resumo:
Diachasmimorpha kraussii (Hymenoptera: Braconidae: Opiinae) is a koinobiont larval parasitoid of dacine fruit flies of the genus Bactrocera (Diptera: Tephritidae) in its native range (Australia, Papua New Guinea, Solomon Islands). The wasp is a potentially important control agent for pest fruit flies, having been considered for both classical and inundative biological control releases. I investigated the host searching, selection and utilisation mechanisms of the wasp against native host flies within its native range (Australia). Such studies are rare in opiine research where the majority of studies, because of the applied nature of the research, have been carried out using host flies and environments which are novel to the wasps. Diachasmimorpha kraussii oviposited equally into maggots of four fruit fly species, all of which coexist with the wasp in its native range (Australia), when tested in a choice trial using a uniform artificial diet media. While eggs laid into Bactrocera tryoni and B. jarvisi developed successfully through to adult wasps, eggs laid into B. cucumis and B. cacuminata were encapsulated. These results suggest that direct larval cues are not an important element in host selection by D. kraussii. Further exploring how D. kraussii locates suitable host larvae, I investigated the role of plant cues in host searching and selection. This was examined in a laboratory choice trial using uninfested fruit or fruit infested with either B. tryoni or B. jarvisi maggots. The results showed a consistent preference ranking among infested fruits by the wasp, with guava and peach most preferred, but with no response to uninfested fruits. Thus, it appears the wasp uses chemical cues emitted in response to fruit fly larval infestation for host location, but does not use cues from uninfested fruits. To further tease apart the role of (i) suitable and non-suitable maggots, (ii) infested and uninfested fruits of different plant species, and (iii) adult flies, in wasp host location and selection, I carried out a series of behavioural tests where I manipulated these attributes in a field cage. These trials confirmed that D. kraussii did not respond to cues in uninfested fruits, that there were consistent preferences by the wasps for different maggot infested fruits, that fruit preference did not vary depending on whether the maggots were physiologically suitable or not suitable for wasp offspring development, and finally, that adult flies appear to play a secondary role as indicators of larval infestation. To investigate wasp behaviour in an unrestrained environment, I concurrently observed diurnal foraging behaviours of both the wasp and one of its host fly in a small nectarine orchard. Wasp behaviour, both spatially and temporally, was not correlated with adult fruit fly behaviour or abundance. This study reinforced the point that infested fruit seems to be the primary cue used by foraging wasps. Wasp and fly feeding and mating was not observed in the orchard, implying these activities are occurring elsewhere. It is highly unlikely that these behaviours were happening within the orchard during the night as both insects are diurnal. As the final component of investigating host location, I carried out a habitat preference study for the wasp at the landscape scale. Using infested sentinel fruits, I tested the parasitism rate of B. tryoni in eucalyptus sclerophyll forest, rainforest and suburbia in South East Queensland. Although, rainforest is the likely endemic habitat of both B. tryoni and D. kraussii, B. tryoni abundance is significantly greater in suburban environments followed by eucalyptus sclerophyll forest. Parasitism rate was found to be higher in suburbia than in the eucalyptus sclerophyll forest, while no parasitism was recorded in the rainforest. This result suggests that wasps orient within the landscape towards areas of high host density and are not restricted by habitat types. Results from the different experiments suggest that host searching, selection and utilisation behaviour of D. kraussii are strongly influenced by cues associated with fruit fly larval feeding. Cues from uninfested fruits, the host larvae themselves, and the adult host flies play minimal roles. The discussion focuses on the fit of D. kraussii to Vinson’s classical parasitoid host location model and the implications of results for biological control, including recommendations for host and plant preference screening protocols and release regimes.
Resumo:
Young people aged 17–24 years are at high risk of being killed in road crashes around the world. Road safety interventions consider some influences upon young driver behaviour; for example, imposing passenger restrictions on young novice drivers indirectly minimises the potential negative social influences of peers as passengers. To change young driver risky behaviour, the multitude of psychosocial influences upon its initiation and maintenance must be identified. A study questionnaire was developed to investigate the relationships between risky driving and Akers’ social learning theory, social identity theory, and thrill seeking variables. The questionnaire was completed by 165 participants (105 women,60 men) residing in south-east Queensland, Australia. The sociodemographic variables of age, gender, and exposure explained 19% of the variance in self-reported risky driving behaviour, whilst Akers’ social learning variables explained an additional 42%. Thrill seeking and social identity variables did not explain any significant additional variance. Significant predictors of risky driving included imitation of the driving behaviours of, and anticipated rewards and punishments administered by, parents and peers. Road safety policy that directly considers and incorporates these factors in their design, implementation, and enforcement of young driver road safety interventions should prove more efficacious than current approaches.
Resumo:
Despite ongoing enhancements to graduated licensing systems, young drivers continue to have a high risk of being killed or injured in car crashes. This study investigated the influence of parents and peers on the risky behaviour of young drivers, utilising Akers’ social learning theory. The specific factors examined related to parent and peer norms perceived by the young driver, and the rewards and punishments anticipated by the young driver from their parents and peers. A questionnaire was completed by 165 young drivers. Regression analysis revealed that these factors explained 54% of the variance in risky driving. The strongest predictor was anticipated parent rewards, followed by peer norms, and anticipated peer rewards. Exploratory analyses however revealed the profile of predictors varied for male and female participants, and for self-reported offenders and non-offenders. The results highlight the role of psychosocial factors in the risky behaviour of young drivers and the need for road safety policies and programs to consider the influence of both parents and peers upon this behaviour.
Resumo:
The purpose of this paper is to examine the legal implications of the continuing rise in the number of school children diagnosed with behaviour disorders. Not only are teachers now subject to a dense grid of legal regulation, they are also increasingly vulnerable to actions in tort. It will be argued here that as more and more children are labelled ‘disordered’, the duty of care become more onerous, and hence harder for teachers to meet. As a consequence, teachers are more likely to face claims of negligence. It is concluded that while the schooling system needs to retain a healthy scepticism about each new pathologising disorder that seeks special status for its sufferers, it also needs to provide greater training and resources for teachers regarding disorder management. It is also concluded that recent changes to negligence law regarding the issue of ‘reasonable foreseeability’ within breach of duty of care, may not be as significant as might have been hoped by the teaching community. Indeed, the elevated standard of care required by the increasing numbers of disordered pupils, places teachers in an ever more difficult legal position.
Resumo:
This paper is a deductive theoretical enquiry into the flow of effects from the geometry of price bubbles/busts, to price indices, to pricing behaviours of sellers and buyers, and back to price bubbles/busts. The intent of the analysis is to suggest analytical approaches to identify the presence, maturity, and/or sustainability of a price bubble. We present a pricing model to emulate market behaviour, including numeric examples and charts of the interaction of supply and demand. The model extends into dynamic market solutions myopic (single- and multi-period) backward looking rational expectations to demonstrate how buyers and sellers interact to affect supply and demand and to show how capital gain expectations can be a destabilising influence – i.e. the lagged effects of past price gains can drive the market price away from long-run market-worth. Investing based on the outputs of past price-based valuation models appear to be more of a game-of-chance than a sound investment strategy.
Resumo:
This paper reports findings from a study investigating the effect of integrating sponsored and nonsponsored search engine links into a single web listing. The premise underlying this research is that web searchers are chiefly interested in relevant results. Given the reported negative bias that web searchers have concerning sponsored links, separate listings may be a disservice to web searchers as it might not direct them to relevant websites. Some web meta-search engines integrate sponsored and nonsponsored links into a single listing. Using a web search engine log of over 7 million interactions from hundreds of thousands of users from a major web meta-search engine, we analysed the click-through patterns for both sponsored and nonsponsored links. We also classified web queries as informational, navigational and transactional based on the expected type of content and analysed the click-through patterns of each classification. The findings show that for more than 35% of queries, there are no clicks on any result. More than 80% of web queries are informational in nature and approximately 10% are transactional, and 10% navigational. Sponsored links account for approximately 15% of all clicks. Integrating sponsored and nonsponsored links does not appear to increase the clicks on sponsored listings. We discuss how these research results could enhance future sponsored search platforms.
Resumo:
The black rat (Rattus rattus) has been shown to be the primary species responsible for causing significant crop losses within the Australian macadamia industry. This species success within macadamia orchards is directly related to the flexibility expressed in its foraging behaviour. In this paper a conceptual foraging model is presented which proposes that the utilisation of resources by rodents within various components of the system is related not only to their relative abundance, but also to predator avoidance behaviour. Nut removal from high predation risk habitats during periods of low resource abundance in low risk compartments of the system is considered an essential behaviour that allows high rodent densities to be maintained throughout the year.
Resumo:
The purpose of this paper is to examine the legal implications of the continuing rise in the number of school children diagnosed with behaviour disorders. Not only are teachers now subject to a dense grid of legal regulation, they are also increasingly vulnerable to actions in tort. It will be argued here that as more and more children are labelled ‘disordered’, then the concomitant duty of care requirements for teachers becomes more onerous. As a consequence, teachers are less likely to be able to defend themselves against claims of negligence. It is concluded that while the schooling system needs to retain a healthy scepticism about each new pathologising disorder that seeks special status for its sufferers, it also needs to provide greater training and resources for teachers regarding disorder management. It is also concluded that recent changes to negligence law regarding the issue of ‘reasonable foreseeability’ within breach of duty of care, may not be as significant as might have been hoped by the teaching community. Indeed, the elevated standard of care, as required by increasing numbers of disordered pupils, place teachers in an ever more difficult legal position.
Resumo:
Despite the increasing popularity of social networking websites (SNWs), very little is known about the psychosocial variables which predict people’s use of these websites. The present study used an extended model of the theory of planned behaviour (TPB), including the additional variables of self-identity and belongingness, to predict high level SNW use intentions and behaviour in a sample of young people aged between 17 and 24 years. Additional analayses examined the impact of self-identity and belongingness on young people’s addictive tendencies towards SNWs. University students (N = 233) completed measures of the standard TPB constructs (attitude, subjective norm and perceived behavioural control), the additional predictor variables (self-identity and belongingness), demographic variables (age, gender, and past behaviour) and addictive tendencies. One week later, they reported their engagement in high level SNW use during the previous week. Regression analyses partially supported the TPB, as attitude and subjective norm signficantly predicted intentions to engage in high level SNW use with intention signficantly predicting behaviour. Self-identity, but not belongingness, signficantly contributed to the prediction of intention, and, unexpectedly, behaviour. Past behaviour also signficantly predicted intention and behaviour. Self-identity and belongingness signficantly predicted addictive tendencies toward SNWs. Overall, the present study revealed that high level SNW use is influenced by attitudinal, normative, and self-identity factors, findings which can be used to inform strategies that aim to modify young people’s high levels of use or addictive tendencies for SNWs.
Resumo:
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.
Resumo:
This study explored the role of donor prototype evaluations (perceptions of the typical organ donor) in organ donation communication decisions using an extended theory of planned behaviour (TPB) model. The model incorporated attitude, subjective norm, perceived behavioural control, moral norm, self-identity, and donor prototype evaluations to predict intentions to record consent on an organ donor register and discuss the organ donation decision with significant others. Participants completed surveys assessing the extended TPB constructs related to registering (n = 359) and discussing (n = 282). Results supported a role for donor prototype evaluations in predicting discussing intentions only. Both extended TPB structural equation models were a good fit to the data, accounting for 74 and 76% of the variance in registering and discussing intentions, respectively. Participants’ self-reported discussing behaviour (but not registering behaviour given low numbers of behavioural performers) was assessed 4 weeks later, with discussing intention as the only significant predictor of behaviour (Nagelkerke R2 = 0.11). These findings highlight the impact of people's perceptions of a typical donor on their decisions to discuss their organ donation preference, assisting our understanding of the factors influencing individuals' communication processes in efforts to bridge the gap between organ supply and demand.
Resumo:
Cold-formed steel members have been widely used in residential, industrial and commercial buildings as primary load bearing structural elements and non-load bearing structural elements (partitions) due to their advantages such as higher strength to weight ratio over the other structural materials such as hot-rolled steel, timber and concrete. Cold-formed steel members are often made from thin steel sheets and hence they are more susceptible to various buckling modes. Generally short columns are susceptible to local or distortional buckling while long columns to flexural or flexural-torsional buckling. Fire safety design of building structures is an essential requirement as fire events can cause loss of property and lives. Therefore it is essential to understand the fire performance of light gauge cold-formed steel structures under fire conditions. The buckling behaviour of cold-formed steel compression members under fire conditions is not well investigated yet and hence there is a lack of knowledge on the fire performance of cold-formed steel compression members. Current cold-formed steel design standards do not provide adequate design guidelines for the fire design of cold-formed steel compression members. Therefore a research project based on extensive experimental and numerical studies was undertaken at the Queensland University of Technology to investigate the buckling behaviour of light gauge cold-formed steel compression members under simulated fire conditions. As the first phase of this research, a detailed review was undertaken on the mechanical properties of light gauge cold-formed steels at elevated temperatures and the most reliable predictive models for mechanical properties and stress-strain models based on detailed experimental investigations were identified. Their accuracy was verified experimentally by carrying out a series of tensile coupon tests at ambient and elevated temperatures. As the second phase of this research, local buckling behaviour was investigated based on the experimental and numerical investigations at ambient and elevated temperatures. First a series of 91 local buckling tests was carried out at ambient and elevated temperatures on lipped and unlipped channels made of G250-0.95, G550-0.95, G250-1.95 and G450-1.90 cold-formed steels. Suitable finite element models were then developed to simulate the experimental conditions. These models were converted to ideal finite element models to undertake detailed parametric study. Finally all the ultimate load capacity results for local buckling were compared with the available design methods based on AS/NZS 4600, BS 5950 Part 5, Eurocode 3 Part 1.2 and the direct strength method (DSM), and suitable recommendations were made for the fire design of cold-formed steel compression members subject to local buckling. As the third phase of this research, flexural-torsional buckling behaviour was investigated experimentally and numerically. Two series of 39 flexural-torsional buckling tests were undertaken at ambient and elevated temperatures. The first series consisted 2800 mm long columns of G550-0.95, G250-1.95 and G450-1.90 cold-formed steel lipped channel columns while the second series contained 1800 mm long lipped channel columns of the same steel thickness and strength grades. All the experimental tests were simulated using a suitable finite element model, and the same model was used in a detailed parametric study following validation. Based on the comparison of results from the experimental and parametric studies with the available design methods, suitable design recommendations were made. This thesis presents a detailed description of the experimental and numerical studies undertaken on the mechanical properties and the local and flexural-torsional bucking behaviour of cold-formed steel compression member at ambient and elevated temperatures. It also describes the currently available ambient temperature design methods and their accuracy when used for fire design with appropriately reduced mechanical properties at elevated temperatures. Available fire design methods are also included and their accuracy in predicting the ultimate load capacity at elevated temperatures was investigated. This research has shown that the current ambient temperature design methods are capable of predicting the local and flexural-torsional buckling capacities of cold-formed steel compression members at elevated temperatures with the use of reduced mechanical properties. However, the elevated temperature design method in Eurocode 3 Part 1.2 is overly conservative and hence unsuitable, particularly in the case of flexural-torsional buckling at elevated temperatures.
Resumo:
Describes a brief intensive program of cognitive therapy for depression that was designed for 4 adult residents of country towns in Australia, who resided some distance from treatment centers. Ss were assessed prior to treatment, at posttreatment, and at 4-wk, 8-wk, and 20-mo follow-ups. Treatments took place over 3 consecutive days for a total period of 15 hrs. Effects were highly consistent with the impact of group treatments delivered on a more traditional schedule. If confirmed in a controlled group study, these results suggest that cognitive therapy may be applied more economically and more widely than was previously realized.
Resumo:
This report focuses on our examination of extant data which have been sourced with respect to personally and socially risky behaviour associated with males living in regional and remote Australia . The AIHW (2008: PHE 97:89) defines personally risky behaviour, on the one hand, as working, swimming, boating, driving or operating hazardous machinery while intoxicated with alcohol or an illicit drug. Socially risky behaviour, on the other hand, is defined as creating a public disturbance, damaging property, stealing or verbally or physically abusing someone while intoxicated with alcohol or an illicit drug. Additional commentary resulting from exploration, examination and analyses of secondary data is published online in complementary reports in this series.