949 resultados para interdependent preferences


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Women who birth in private facilities in Australia are more likely to have a caesarean birth than women who birth in public facilities and these differences remain after accounting for sector differences in the demographic and health risk profiles of women. However, the extent to which women’s preferences and/or freedom to choose their mode of birth further account for differences in the likelihood of caesarean birth between the sectors remains untested. Method: Women who birthed in Queensland, Australia during a two-week period in 2009 were mailed a self-report survey approximately three months after birth. Seven hundred and fifty-seven women provided cross-sectional retrospective data on where they birthed (public or private facility), mode of birth (vaginal or caesarean) and risk factors, along with their preferences and freedom to choose their mode of birth. A hierarchical logistic regression was conducted to determine the extent to which maternal risk and freedom to choose one’s mode of birth explain sector differences in the likelihood of having a caesarean birth. Findings: While there was no sector difference in women’s preference for mode of birth, women who birthed in private facilities had higher odds of feeling able to choose either a vaginal or caesarean birth, and feeling able to choose only a caesarean birth. Women had higher odds of having caesarean birth if they birthed in private facilities, even after accounting for significant risk factors such as age, body mass index, previous caesarean and use of assisted reproductive technology. However, there was no association between place of birth and odds of having a caesarean birth after also accounting for freedom to choose one’s mode of birth. Conclusions: These findings call into question suggestions that the higher caesarean birth rate in the private sector in Australia is attributable to increased levels of obstetric risk among women birthing in the private sector or maternal preferences alone. Instead, the determinants of sector differences in the likelihood of caesarean births are complex and are linked to differences in the perceived choices for mode of birth between women birthing in the private and public systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although the drivers of innovation have been studied extensively in construction, greater attention is required on how innovation diffusion can be effectively assessed within this complex and interdependent project-based industry. The authors draw on a highly cited innovation diffusion model by Rogers (2006) and develop a tailored conceptual framework to guide future empirical work aimed at assessing innovation diffusion in construction. The conceptual framework developed and discussed in this paper supports a five-stage process model of innovation diffusion namely: 1) knowledge and idea generation, 2) persuasion and evaluation; 3) decision to adopt, 4) integration and implementation, and 5) confirmation. As its theoretical contribution, this paper proposes three critical measurements constructs which can be used to assess the effectiveness of the diffusion process. These measurement constructs comprise: 1) nature and introduction of an innovative idea, 2) organizational capacity to acquire, assimilate, transform and exploit an innovation, and 3) rates of innovation facilitation and adoption. The constructs are interpreted in the project-based context of the construction industry, extending the contribution of general management theorists. Research planned by the authors will test the validity and reliability of the constructs developed in this paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We compare the consistency of choices in two methods to used elicit risk preferences on an aggregate as well as on an individual level. We asked subjects to choose twice from a list of nine decision between two lotteries, as introduced by Holt and Laury (2002, 2005) alternating with nine decisions using the budget approach introduced by Andreoni and Harbaugh (2009). We find that while on an aggregate(subject pool) level the results are (roughly) consistent, on an individual(within-subject) level,behavior is far from consistent. Within each method as well as across methods we observe low correlations. This again questions the reliability of experimental risk elicitation measures and the ability to use results from such methods to control for the risk aversion of subjects when explaining e�ects in other experimental games.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Dieting has historically been the main behavioural treatment paradigm for overweight/obesity, although a non-dieting paradigm has more recently emerged based on the criticisms of the original dieting approach. There is a dearth of research contrasting why these approaches are adopted. To address this, we conducted a qualitative investigation into the determinants of dieting and non-dieting approaches based on the perspectives and experiences of overweight/obese Australian adults. Methods Grounded theory was used inductively to generate a model of themes contrasting the determinants of dieting and non-dieting approaches based on the perspectives of 21 overweight/obese adults. Data was collected using semi-structured interviews to elicit in-depth individual experiences and perspectives. Results Several categories emerged which distinguished between the adoption of a dieting or non-dieting approach. These categories included the focus of each approach (weight/image or lifestyle/health behaviours); internal or external attributions about dieting failure; attitudes towards established diets, and personal autonomy. Personal autonomy was also influenced by another category; the perceived knowledge and self-efficacy about each approach, with adults more likely to choose an approach they knew more about and were confident in implementing. The time perspective of change (short or long-term) and the perceived identity of the person (fat/dieter or healthy person) also emerged as determinants of dieting or non-dieting approaches respectively. Conclusions The model of determinants elicited from this study assists in understanding why dieting and non-dieting approaches are adopted, from the perspectives and experiences of overweight/obese adults. Understanding this decision-making process can assist clinicians and public health researchers to design and tailor dieting and non-dieting interventions to population subgroups that have preferences and characteristics suitable for each approach.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research identifies residential mobility behaviour impacts of residential dissonance in Transit Oriented Developments (TODs) vs. non-TODs in Brisbane, Australia. Based on the characteristics of living environments (density, diversity, connectivity, and accessibility) and the travel preferences of 4545 individuals, respondents in 2009 were classified into one of four categories including: TOD consonants, TOD dissonants, non-TOD dissonants, and non-TOD consonants. Binary logistic regression analyses were employed to identify residential mobility behaviour of groups between 2009 and 2011; controlling for time varying covariates. The findings show that both TOD dissonants and TOD consonants move residences at an equal rate. However, TOD dissonants are more likely to move residences to their preferred non-TOD areas. In contrast, non-TOD dissonants not only moved residences at a lower rate, but their rate of mobility to their preferred TOD neighbourhood is also significantly lower due to costs and other associated factors. The findings suggest that discrete land use policy development is required to integrate non-TOD dissonant and TOD dissonant behaviours to support TOD development in Brisbane.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is growing and converging evidence that cannabis may be a major risk factor in people with psychotic disorders and prodromal psychotic symptoms. The lack of available pharmacological treatments for cannabis use indicates that psychological interventions should be a high priority, especially among people with psychotic disorders. However, there have been few randomised controlled trials (RCTs) of psychological interventions among this group. In the present study we critically overview RCTs of psychological and pharmacologic interventions among people with psychotic disorders, giving particular attention to those studies which report cannabis use outcomes. We then review data regarding treatment preferences among this group. RCTs of interventions within "real world" mental health systems among adults with severe mental disorders suggest that cannabis use is amenable to treatment in real world settings among people with psychotic disorders. RCTs of manual guided interventions among cannabis users indicate that while brief interventions are associated with reductions in cannabis use, longer interventions may be more effective. Additionally, RCTs reviewed suggest treatment with antipsychotic medication is not associated with a worsening of cannabis cravings or use and may be beneficial. The development of cannabinoid agonist medication may be an effective strategy for cannabis dependence and suitable for people with psychotic disorders. The development of cannabis use interventions for people with psychotic disorders should also consider patients' treatment preferences. Initial results indicate face-to-face interventions focussed on cannabis use may be preferred. Further research investigating the treatment preferences of people with psychotic disorders using cannabis is needed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In order to drive sustainable financial profitability, service firms make significant investments in creating service environments that consumers will prefer over the environments of their competitors. To date, servicescape research is over-focused on understanding consumers’ emotional and physiological responses to servicescape attributes, rather than taking a holistic view of how consumers cognitively interpret servicescapes. This thesis argues that consumers will cognitively ascribe symbolic meanings to servicescapes and then evaluate if those meanings are congruent with their sense of Self in order to form a preference for a servicescape. Consequently, this thesis takes a Self Theory approach to servicescape symbolism to address the following broad research question: How do ascribed symbolic meanings influence servicescape preference? Using a three-study, mixed-method approach, this thesis investigates the symbolic meanings consumers ascribe to servicescapes and empirically tests whether the joint effects of congruence between consumer Self and the symbolic meanings ascribed to servicescapes influence consumers’ servicescape preference. First, Study One identifies the symbolic meanings ascribed to salient servicescape attributes using a combination of repertory tests and laddering techniques within 19 semi-structured individual depth interviews. Study Two modifies an existing scale to create a symbolic servicescape meaning scale in order to measure the symbolic meanings ascribed to servicescapes. Finally, Study Three utilises the Self-Congruity Model to empirically examine the joint effects of consumer Self and servicescape on consumers’ preference for servicescapes. Using polynomial regression with response surface analysis, 14 joint effect models demonstrate that both Self-Servicescape incongruity and congruity influence consumers’ preference for servicescapes. Combined, the findings of three studies suggest that the symbolic meanings ascribed to servicescapes and their (in)congruities with consumers’ sense of self can be used to predict consumers’ preferences for servicescapes. These findings have several key theoretical and practical contributions to services marketing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since the architectural design studio learning environment was first established in the early 19th century at the École des Beaux-Arts in Paris, there has been a complete transformation in how the discipline of architecture is practiced and how students of architecture acquire information. Digital technologies allow students to access information instantly and learning is no longer confined to the rigid boundaries of a physical campus environment. In many schools of architecture in Australia, the physical design studio learning environments however, remain largely unchanged. Many learning environments could be mistaken for those last refurbished 30 years ago, being devoid of any significant technological intervention. While some teaching staff are eagerly embracing new digital technologies and attempting to modify their pedagogical approaches, the physical design studio learning environment is resistant to such efforts. In a study aimed at better understanding how staff and students adapt to new blended learning environments, a group of 165 second year architecture students at a large school of architecture in Australia were separated into two different design studio learning environments. 70% of students were allocated to a traditional design studio setting and 30% to a new, high technology embedded, prototype digital learning laboratory. The digital learning laboratory was purpose designed for the case-study users, adapted Student-Centred Active Learning Environment for Undergraduate Programs [SCALE-UP] principles, and built as part of a larger university research project. The architecture students attended the same lectures, followed the same studio curriculum and completed the same pieces of assessment; the only major differences were the teaching staff and physical environment within which the studios were conducted. At the end of the semester, all staff and students were asked to complete a questionnaire about their experiences and preferences within the two respective learning environments. The questionnaire response rate represented the opinions of 100% of the 10 teaching staff and over 70% of the students. Using a qualitative grounded theory approach, data were coded, extrapolated and compared, to reveal emerging key themes. The key themes formed the basis for in-depth interviews and focus groups of teaching staff and students, allowing the researchers to understand the data in more detail. The results of the data verified what had become increasingly evident during the course of the semester: an underlying negative resistance to the new digital studio learning environment, by both staff and students. Many participants openly exhibited a yearning for a return to the traditional design studio learning environments, particularly when the new technology caused frustration, by being unreliable or failing altogether. This paper reports on the study, discusses the negative resistance and explores the major contributors to resistance. The researchers are not aware of any similar previous studies across these particular settings and believe that it offers a necessary and important contribution to emergent research about adaptation to new digital learning environments.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The impact of voters’ gender on leader evaluations in parliamentary systems has been largely unexplored, while the impact of female leaders on voter attitudes and preferences remains to be fully established. This paper uses Julia Gillard’s historic candidacy in the 2010 Australian federal election to explore how voters evaluated Australia’s first female prime minister, and to test the impact of their assessments on vote choice. The authors also examine whether Gillard’s high-profile candidacy affected women’s levels of political interest, awareness and engagement in what had been largely a ‘man’s game’. Their findings confirm that Gillard enjoyed a gender-affinity effect in 2010 in terms of both leader evaluations and vote choice, and women’s political engagement was significantly affected by the Gillard candidacy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is global competition for engineering talent with some industries struggling to attract quality candidates. The ‘brands’ of industries and organisations are important elements in attracting talent in a competitive environment. Using brand equity and signalling theory, this paper reports a quantitative study examining factors that attract graduating engineers and technicians to engineering careers in a weak brand profile industry. The survey measures graduating engineers’ preferences for career benefits and their perceptions of the rail industry, which has identified a significant skilled labour shortfall. Knowledge of young engineers’ preferences for certain benefits and segmenting preferences can inform branding and communications strategies. The findings have implications for all industries and organisations, especially those with a weaker brand profile and issues with attracting talent.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The social tags in Web 2.0 are becoming another important information source to profile users' interests and preferences to make personalized recommendations. To solve the problem of low information sharing caused by the free-style vocabulary of tags and the long tails of the distribution of tags and items, this paper proposes an approach to integrate the social tags given by users and the item taxonomy with standard vocabulary and hierarchical structure provided by experts to make personalized recommendations. The experimental results show that the proposed approach can effectively improve the information sharing and recommendation accuracy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Foreword For children and youth, as citizens in a society, being a part of educational systems means being involved in a community. Through participation in educational systems, there is important learning about the self and others, both for individual development and social solidarity. Individual development and social solidarity are interrelated. These are important values in education at all levels. Individuals are social beings and are necessarily interdependent on others. Nevertheless, individualism and social solidarity are values that sometimes can diverge and come into conflict. These values can be defined and interpreted in various ways. In a time of neo-liberalism, for example, where individual choices and rights are put at the forefront of the societal and educational discourses in many countries it is relevant to raise questions on how issues of solidarity and individualism are interpreted and negotiated in education. What kind of shape and definitions do these concepts take when schools and preschools live under the intense pressures for the accountability of educational outcomes(Biesta, 2009)? Under what conditions can values, such as solidarity and individualism, co-exist and develop in multicultural and globalized societies, without one dominating the other...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation platform ( NeSSi 2 ). Built-in functionalities include dynamic group formation based on node preferences, group-internal communication, group management and an approach for handling the infection process for malware-based attacks. The CIDE simulation environment provides functionalities for easy implementation of collaborating nodes in large-scale setups. We evaluate the group communication mechanism on the one hand and provide a case study and evaluate our collaborative security evaluation platform in a signature exchange scenario on the other.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The majority of current first year university students belong to Generation Y. Consequently, research suggests that, in order to more effectively engage them, their particular learning preferences should be acknowledged in the organisation of their learning environments and in the support provided. These preferences are reflected in the Torts Student Peer Mentor Program, which, as part of the undergraduate law degree at the Queensland University of Technology, utilises active learning, structured sessions and teamwork to supplement student understanding of the substantive law of Torts with the development of life-long skills. This article outlines the Program, and its relevance to the learning styles and experiences of Generation Y first year law students transitioning to university, in order to investigate student perceptions of its effectiveness – both generally and, more specifically, in terms of the Program’s capacity to assist students to develop academic and work-related skills.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.