837 resultados para support needs
Resumo:
The common presupposition of Enterprise Systems (ES) is that they lead to significant efficiency gains. However, this is only the case for well-implemented ES that meet organisational requirements. The list of major ES implementation failures is as long as the list of success stories. We argue here that this arises from a more fundamental problem, the functionalist approach to ES development and provision. As long as vendors will continue to develop generic, difficult-to-adapt ES packages, this problem will prevail because organisations have a non-generic character. A solution to this problem can only consist in rethinking the way ES packages are provided. We propose a strict abstraction layer of ES functionalities and their representation as conceptual models. ES vendors must provide sufficient means for configuring these conceptual models. We discuss in this paper what generic situations can occur during process model configuration in order to understand process model configuration in depth.
Resumo:
It is a big challenge to find useful associations in databases for user specific needs. The essential issue is how to provide efficient methods for describing meaningful associations and pruning false discoveries or meaningless ones. One major obstacle is the overwhelmingly large volume of discovered patterns. This paper discusses an alternative approach called multi-tier granule mining to improve frequent association mining. Rather than using patterns, it uses granules to represent knowledge implicitly contained in databases. It also uses multi-tier structures and association mappings to represent association rules in terms of granules. Consequently, association rules can be quickly accessed and meaningless association rules can be justified according to the association mappings. Moreover, the proposed structure is also an precise compression of patterns which can restore the original supports. The experimental results shows that the proposed approach is promising.
Resumo:
This paper outlines how commercial sponsorship can be conceptualized using an item and relational information framework, and supports this with empirical data. The model presented allows for predictions about consumer memory for sponsorship information, and hence has both theoretical and practical value. Data are reported which show that sponsors considered congruent with an event benefit by providing consumers with sponsor-specific item information, while sponsors considered incongruent benefit by providing sponsor-event relational information. Overall the provision of sponsor-event relational information is shown to result in superior memory to the provision of sponsor-specific item information, which is superior to basic sponsor mentions.
Resumo:
The present study examined the historical basis of the Australian disability income support system from 1908 to 2007. Although designed as a safety net for people with a disability, the disability income support system within Australia has been highly targeted. The original eligibility criteria of "permanently incapacitated for work", medical criteria and later "partially capacitated for work" potentially contained ideological inferences that permeated across the time period. This represents an important area for study given the potential consequence for disability income support to marginalise people with a disability. Social policy and disability policy theorists, including Saunders (2007, Social Policy Research Centre [SPRC]) and Gibilisco (2003) have provided valuable insight into some of the effects of disability policy and poverty. Yet while these theorists argued for some form of income support they did not propose a specific form of income security for further exploration. Few studies have undertaken a comprehensive review of the history of disability income support within the Australian context. This thesis sought to redress these gaps by examining disability income support policy within Australia. The research design consisted of an in-depth critical historical-comparative policy analysis methodology. The use of critical historical-comparative policy analysis allowed the researcher to trace the construction of disability within the Australian disability income support policy across four major historical epochs. A framework was developed specifically to guide analysis of the data. The critical discourse analysis method helped to understand the underlying ideological dimensions that led to the predominance of one particular approach over another. Given this, the research purpose of the study centred on: i. Tracing the history of the Australian disability income support system. ii. Examining the historical patterns and ideological assumptions over time. iii. Exploring the historical patterns and ideological assumptions underpinning an alternative model (Basic Income) and the extent to which each model promotes the social citizenship of people with a disability. The research commitment to a social-relational ontology and the quest for social change centred on the idea that "there has to be a better way" in the provision of disability income support. This theme of searching for an alternative reality in disability income support policy resonated throughout the thesis. This thesis found that the Australian disability income support system is disabling in nature and generates categories of disability on the basis of ableness. From the study, ableness became a condition for citizenship. This study acknowledged that, in reality, income support provision reflects only one aspect of the disabling nature of society which requires redressing. Although there are inherent tensions in any redistributive strategy, the Basic Income model potentially provides an alternative to the Australian disability income support system, given its grounding in social citizenship. The thesis findings have implications for academics, policy-makers and practitioners in terms of developing better ways to understand disability constructs in disability income support policy. The thesis also makes a contribution in terms of promoting income support policies based on the rights of all people, not just a few.
Resumo:
This paper outlines how commercial sponsorship can be conceptualized using an item and relational information framework, and supports this with empirical data. The model presented allows for predictions about consumer memory for sponsorship information, and hence has both theoretical and practical value. Data are reported which show that sponsors considered congruent with an event benefit by providing consumers with sponsor-specific item information, while sponsors considered incongruent benefit by providing sponsor-event relational information. Overall the provision of sponsor-event relational information is shown to result in superior memory to the provision of sponsor-specific item information, which is superior to basic sponsor mentions.
Resumo:
Teachers of construction economics and estimating have for a long time recognised that there is more to construction pricing than detailed calculation of costs (to the contractor). We always get to the point where we have to say "of course, experience or familiarity of the market is very important and this needs judgement, intuition, etc". Quite how important is the matter in construction pricing is not known and we tend to trivialise its effect. If judgement of the market has a minimal effect, little harm would be done, but if it is really important then some quite serious consequences arise which go well beyond the teaching environment. Major areas of concern for the quantity surveyor are in cost modelling and cost planning - neither of which pay any significant attention to the market effect. There are currently two schools of thought about the market effect issue. The first school is prepared to ignore possible effects until more is known. This may be called the pragmatic school. The second school exists solely to criticise the first school. We will call this the antagonistic school. Neither the pragmatic nor the antagonistic schools seem to be particularly keen to resolve the issue one way or the other. The founder and leader of the antagonistic school is Brian Fine whose paper in 1974 is still the basic text on the subject, and in which he coined the term 'socially acceptable' price to describe what we now recognise as the market effect. Mr Fine's argument was then, and is since, that the uncertainty surrounding the contractors' costing and cost estimating process is such that the uncertainty surrounding the contractors' cost that it logically leads to a market-orientated pricing approach. Very little factual evidence, however, seems to be available to support these arguments in any conclusive manner. A further, and more important point for the pragmatic school, is that, even if the market effect is as important as Mr Fine believes, there are no indications of how it can be measured, evaluated or predicted. Since 1974 evidence has been accumulating which tends to reinforce the antagonists' view. A review of the literature covering both contractors' and designers' estimates found many references to the use of value judgements in construction pricing (Ashworth & Skitmore, 1985), which supports the antagonistic view in implying the existence of uncertainty overload. The most convincing evidence emerged quite by accident in some research we recently completed with practicing quantity surveyors in estimating accuracy (Skitmore, 1985). In addition to demonstrating that individual quantity surveyors and certain types of buildings had significant effect on estimating accuracy, one surprise result was that only a very small amount of information was used by the most expert surveyors for relatively very accurate estimates. Only the type and size of building, it seemed, was really relevant in determining accuracy. More detailed information about the buildings' specification, and even a sight to the drawings, did not significantly improve their accuracy level. This seemed to offer clear evidence that the constructional aspects of the project were largely irrelevant and that the expert surveyors were somehow tuning in to the market price of the building. The obvious next step is to feed our expert surveyors with more relevant 'market' information in order to assess its effect. The problem with this is that our experts do not seem able to verbalise their requirements in this respect - a common occurrence in research of this nature. The lack of research into the nature of market effects on prices also means the literature provides little of benefit. Hence the need for this study. It was felt that a clearer picture of the nature of construction markets would be obtained in an environment where free enterprise was a truly ideological force. For this reason, the United States of America was chosen for the next stage of our investigations. Several people were interviewed in an informal and unstructured manner to elicit their views on the action of market forces on construction prices. Although a small number of people were involved, they were thought to be reasonably representative of knowledge in construction pricing. They were also very well able to articulate their views. Our initial reaction to the interviews was that our USA subjects held very close views to those held in the UK. However, detailed analysis revealed the existence of remarkably clear and consistent insights that would not have been obtained in the UK. Further evidence was also obtained from literature relating to the subject and some of the interviewees very kindly expanded on their views in later postal correspondence. We have now analysed all the evidence received and, although a great deal is of an anecdotal nature, we feel that our findings enable at least the basic nature of the subject to be understood and that the factors and their interrelationships can now be examined more formally in relation to construction price levels. I must express my gratitude to the Royal Institution of Chartered Surveyors' Educational Trust and the University of Salford's Department of Civil Engineering for collectively funding this study. My sincere thanks also go to our American participants who freely gave their time and valuable knowledge to us in our enquiries. Finally, I must record my thanks to Tim and Anne for their remarkable ability to produce an intelligible typescript from my unintelligible writing.
Resumo:
Electronic word-of-mouth (eWOM) has gained significant attention from academics and practitioners since it has become an important source of consumers’ product information, which can influence consumer purchase intentions (Cheung & Lee, 2012). eWOM exchanges exist in two types of online communities: online communities of practice and online communities of interest. A few prior studies in online communities of interest have examined members’ motivations for product knowledge exchange (Hung & Li, 2007; Ma & Agarwal, 2007). However, there is a lack of understanding of member motivations for exchanging social bonds and enjoyment in addition to exchanging knowledge pertaining to products in the community. It is important to have an initial comprehension of motivation as an antecedent of these three eWOM exchanges so as to be able to determine the driving factors that lead members to generate eWOM communication. Thus, the research problem "What are the driving factors for members to exchange eWOM in an online community?" was justified for investigation. The purpose of this study was to examine different member motivations for exchanging three types of eWOM. Resource exchange theory and theory on consumer motivation and behavior were applied to develop a conceptual framework for this study. This study focused on an online beauty community since there is an increasing trend of consumers turning to online beauty resources so as to exchange useful beauty product information (SheSpot, 2011). As this study examined consumer motivation in an online beauty community, a web-based survey was the most effective and efficient way to gain responses from beauty community members and these members were appropriate samples from which to draw a conclusion about the whole population. Multiple regression analysis was used to test the relationships between member motivations and eWOM exchanges. It was found that members have different motivations for exchanging knowledge, social bonds, and enjoyment related to products: self-development, problem solving support, and relaxation, respectively. This study makes three theoretical contributions. First, this study identifies the influence of self-development motivation on knowledge exchange in an online community of interest, just as this motivation has previously been found in online communities of practice. This study highlights that members of the two different types of online communities share similar goals of knowledge exchange, despite the two communities evincing different attributes (e.g., member characteristics and tasks’ objectives). Further, this study will assist researchers to understand other motivations identified by prior research in online communities of practice since such motivations may be applicable to online communities of interest. Second, this study offers a new perspective on member motivation for social bonding. This study indicates that in addition to social support from friends and family, consumers are motivated to build social bonds with members in an online community of interest since they are an important source of problem solving support in regard to products. Finally, this study extends the body of knowledge pertaining to member motivation for enjoyment exchange. This study provides a basis for researchers to understand that members in an online community of interest value experiential aspects of enjoyable consumption activities, and thus based on group norms, members have a mutual desire for relaxation from enjoyment exchange. The major practical contribution is that this study provides an important guideline for marketing managers to develop different marketing strategies based on member motivations for exchanging three types of eWOM in an online community of interest, such as an online beauty community. This will potentially help marketing managers increase online traffic and revenue, and thus bring success to the community. Although, this study contributes to the literature by highlighting three distinctive member motivations for eWOM exchanges in an online community of interest, there are some possible research limitations. First, this study was conducted in an online beauty community in Australia. Hence, further research should replicate this study in other industries and nations so as to give the findings greater generalisability. Next, online beauty community members are female skewed. Thus, future research should examine whether similar patterns of motivations would emerge in other online communities that tend to be populated by males (e.g., communities focused on football). Further, a web-based survey has its limitations in terms of self-selection and self-reporting (Bhatnagar & Ghose, 2004). Therefore, further studies should test the framework by employing different research methods in order to overcome these weaknesses.
Resumo:
The trafficking of women has attracted considerable international and national policy attention, particularly since the UN Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children (2000), of which the Australian Government has been a signatory since 2005. The provision of health and community services for trafficked women is a central feature of this Protocol, but in Australia service provision is made difficult by how trafficked women are understood and treated in policy and legal terms. This study aimed to explore the provision of health and community services for trafficked women in the Greater Sydney region through a series of interviews with government and non-government organisations. The findings reveal that services have been inaccessible as a result of sparse, uncoordinated, and poorly funded provision. The major obstacle to adequate and appropriate service provision has been a national policy approach focusing on 'border protection' and criminalisation rather than on trafficked women and their human rights. We conclude that further policy development needs to focus on the practical implications of how such rights can be translated into the delivery of health and community services that trafficked women can access and be supported by more effectively.
Resumo:
Organisations are engaging in e-learning as a mechanism for delivering flexible learning to meet the needs of individuals and organisations. In light of the increasing use and organisational investment in e-learning, the need for methods to evaluate the success of its design and implementation seems more important than ever. To date, developing a standard for the evaluation of e-learning appears to have eluded both academics and practitioners. The currently accepted evaluation methods for e-learning are traditional learning and development models, such as Kirkpatrick’s model (1976). Due to the technical nature of e-learning it is important to broaden the scope and consider other evaluation models or techniques, such as the DeLone and McLean Information Success Model, that may be applicable to the e-learning domain. Research into the use of e-learning courses has largely avoided considering the applicability of information systems research. Given this observation, it is reasonable to conclude that e-learning implementation decisions and practice could be overlooking useful or additional viewpoints. This research investigated how existing evaluation models apply in the context of organisational e-learning, and resulted in an Organisational E-learning success Framework, which identifies the critical elements for success in an e-learning environment. In particular this thesis highlights the critical importance of three e-learning system creation elements; system quality, information quality, and support quality. These elements were explored in depth and the nature of each element is described in detail. In addition, two further elements were identified as factors integral to the success of an e-learning system; learner preferences and change management. Overall, this research has demonstrated the need for a holistic approach to e-learning evaluation. Furthermore, it has shown that the application of both traditional training evaluation approaches and the D&M IS Success Model are appropriate to the organisational e-learning context, and when combined can provide this holistic approach. Practically, this thesis has reported the need for organisations to consider evaluation at all stages of e-learning from design through to implementation.
Resumo:
This is the first research focusing on Gold Coast school libraries and teacher- librarians. It presents a detailed picture of library provision and staffing at a representative group of 27 government and non-government schools at the Gold Coast. It shows links between employment of a teacher-librarian and higher NAPLAN reading and writing scores. And it presents the principals’ generally positive views about teacher-librarians’ contribution to reading and literacy at their schools. The findings respond in part to the recent government inquiry’s call (House of Representatives, 2011) for research about the current staffing of school libraries in Australia, and the influence of school libraries and teacher-librarians on students’ literacy and learning outcomes. While the study has focused on a relatively small group of school libraries, it has produced a range of significant outcomes: • An extensive review of international and Australian research showing impacts of school libraries and teacher-librarians on students’ literacy and learning outcomes • Findings consistent with international research showing: - An inverse relationship between lower student to EFT library staff ratio and higher school NAPLAN scores for reading and writing - Schools that employ a teacher-librarian tend to achieve school NAPLAN scores for respective year levels that are higher than the national mean It is anticipated that the study’s findings will be of interest to education authorities, school leadership teams, teacher-librarians, teachers and researchers. The findings provide evidence to: • inform policy development and strategic planning for school libraries that respond to the literacy development needs of 21st century learners • inform school-based management of school libraries • inform curriculum development and teacher-librarian practice • support further collaborative research on a State or national level • enhance conceptual understandings about relationship(s) between school libraries, teacher-librarians and literacy/information literacy development • support advocacy about school libraries, teacher-librarians and their contribution to literacy development and student learning in Australian schools SLAQ President Toni Leigh comments: “It is heartening to see findings which validate the critical role teacher-librarians play in student literacy development and the positive correlation of higher NAPLAN scores and schools with a qualified teacher-librarian. Also encouraging is the high percentage of school principals who recognise the necessity of a well resourced school library and the positive influence of these libraries on student literacy”. This research arises from a research partnership between School Library Association of Queensland (SLAQ) and Children and Youth Research Centre, QUT. Lead researcher: Dr Hilary Hughes, Children and Youth Research Centre, QUT Research assistants: Dr Hossein Bozorgian, Dr Cherie Allan, Dr Michelle Dicinoski, QUT SLAQ Research Reference Group: Toni Leigh, Marj Osborne, Sally Fraser, Chris Kahl and Helen Reynolds Reference: House of Representatives. (2011). School libraries and teacher librarians in 21st century Australia. Canberra: Commonwealth of Australia. http://www.aph.gov.au/Parliamentary_Business/Committees/House_of_Representatives_Committees?url=ee/schoollibraries/report.htm
Resumo:
In this paper we present an examination of the literature on the psychosocial aspects of hepatitis C (HCV), and ask what are the implications for patients and clinicians regarding access to treatment? Hepatitis C (HCV) is a blood-borne communicable disease that was identified in 1988. In Australia, an estimated 217,000 people live with HCV. The virus causes serious liver inflammation, can lead to liver cirrhosis and a small percentage of sufferers will develop hepatocellular carcinoma. Reports about the psychosocial aspects of HCV appeared from around 1994 indicating a similar set of societal responses to people with HIV; stigmatisation and discrimination. A number of calls were made for the establishment of counselling and support services to address the specific mental health needs of people with HCV. We conducted a systematic review of the literature between 2002-2012 about the psychosocial aspects of HCV and its relationship to access to treatment and identified a number of key issues that suggest the anticipated progress in this area has not been made. The majority of people with HCV already experience marginalisation, and the diagnosis of HCV further compounds their marginalisation through stigma and discrimination and complicates clinical decision-making around treatment. We conclude that the need for mental health services that are capable of addressing the complexities of the psychosocial aspects of HCV remains. Concomitantly, primary care clinicians require greater clarity and consistency about the clinical guidelines for HCV to meet the increasing expectations on them to deliver comprehensive patient management within primary care. (248 words)
Resumo:
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as conjunctions of equality, comparison and subset queries, disjunctions of equality queries, and more generally, arbitrary combinations of conjunctive and disjunctive equality queries. We advance PE to evaluate more expressive predicates, e.g., disjunctive comparison or disjunctive subset queries. Such expressiveness is achieved at the cost of computational and space overhead. To improve the performance, we appropriately revise the PE to reduce the computational and space cost. Furthermore, we propose a heuristic method to reduce disjunctions in the predicates. Our schemes are proved in the standard model. We then introduce the concept of Revocable Predicate Encryption (RPE), which extends the previous PE setting with revocation support: private keys can be used to decrypt an RPE ciphertext only if they match the decryption policy (defined via attributes encoded into the ciphertext and predicates associated with private keys) and were not revoked by the time the ciphertext was created. We propose two RPE schemes. Our first scheme, termed Attribute- Hiding RPE (AH-RPE), offers attribute-hiding, which is the standard PE property. Our second scheme, termed Full-Hiding RPE (FH-RPE), offers even stronger privacy guarantees, i.e., apart from possessing the Attribute-Hiding property, the scheme also ensures that no information about revoked users is leaked from a given ciphertext. The proposed schemes are also proved to be secure under well established assumptions in the standard model. Secrecy of decryption keys is an important pre-requisite for security of (H)PE and compromised private keys must be immediately replaced. The notion of Forward Security (FS) reduces damage from compromised keys by guaranteeing confidentiality of messages that were encrypted prior to the compromise event. We present the first Forward-Secure Hierarchical Predicate Encryption (FS-HPE) that is proved secure in the standard model. Our FS-HPE scheme offers some desirable properties: time-independent delegation of predicates (to support dynamic behavior for delegation of decrypting rights to new users), local update for users' private keys (i.e., no master authority needs to be contacted), forward security, and the scheme's encryption process does not require knowledge of predicates at any level including when those predicates join the hierarchy.
Resumo:
New ways of working are being embraced by early childhood educators as they cope with demands from national reforms and changing communities. While reformers are pressing for social equity and improved outcomes for families and children, communities are diverging in terms of ethnicity, culture, language and socioeconomic status. As a consequence, early childhood educators are being challenged to expand their existing repertoire of practices in order to more effectively provide quality learning experiences for every child in their care. Practice enhancement and differentiated pedagogy are needed to address the additional needs of an increasing number of diverse learners. Community expectations are particularly focused on better educational supports for children in five cluster areas: • Culturally diverse and Indigenous backgrounds • ‘at risk’ because of socio-economic and abuse conditions • Communicative, emotional and behavioural disorders • Disabilities and learning difficulties and • Recognised gifts and talents This chapter focuses on some everyday ractices that can be used strategically to better support all children, including those with additional educational needs. All practices are well supported in the literature and are substantiated by either research findings or strong, socially determined values. They also very ‘doable’ and sustainable in today’s dynamic and multifaceted early childhood settings. Seven keys practices will be introduced, together with examples of how they can be applied to both enhance the learning of individual children and to strengthen a sense of group belonging. The practices are: • Having positive beliefs about all children • Learning about each child • Building meaningful relationships around the child • Creating supportive learning environments for the child • Providing engaging learning experiences for the child • Differentiating instruction for the child • Using child progress data to improve learning and teaching
Resumo:
Many software applications extend their functionality by dynamically loading executable components into their allocated address space. Such components, exemplified by browser plugins and other software add-ons, not only enable reusability, but also promote programming simplicity, as they reside in the same address space as their host application, supporting easy sharing of complex data structures and pointers. However, such components are also often of unknown provenance and quality and may be riddled with accidental bugs or, in some cases, deliberately malicious code. Statistics show that such component failures account for a high percentage of software crashes and vulnerabilities. Enabling isolation of such fine-grained components is therefore necessary to increase the stability, security and resilience of computer programs. This thesis addresses this issue by showing how host applications can create isolation domains for individual components, while preserving the benefits of a single address space, via a new architecture for software isolation called LibVM. Towards this end, we define a specification which outlines the functional requirements for LibVM, identify the conditions under which these functional requirements can be met, define an abstract Application Programming Interface (API) that encompasses the general problem of isolating shared libraries, thus separating policy from mechanism, and prove its practicality with two concrete implementations based on hardware virtualization and system call interpositioning, respectively. The results demonstrate that hardware isolation minimises the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution’s correctness. This thesis concludes that, not only is it feasible to create such isolation domains for individual components, but that it should also be a fundamental operating system supported abstraction, which would lead to more stable and secure applications.
Resumo:
The decentralisation reform in Indonesia has mandated the Central Government to transfer some functions and responsibilities to local governments including the transfer of human resources, assets and budgets. Local governments became giant asset holders almost overnight and most were ill prepared to handle these transformations. Assets were transferred without analysing local government need, ability or capability to manage the assets and no local government was provided with an asset management framework. Therefore, the aim of this research is to develop a Public Asset Management Framework for provincial governments in Indonesia, especially for infrastructure and real property assets. This framework will enable provincial governments to develop integrated asset management procedures throughout asset‘s lifecycle. Achieving the research aim means answering the following three research questions; 1) How do provincial governments in Indonesia currently manage their public assets? 2) What factors influence the provincial governments in managing these public assets? 3) How is a Public Asset Management Framework developed that is specific for the Indonesian provincial governments‘ situation? This research applied case studies approach after a literature review; document retrieval, interviews and observations were collated. Data was collected in June 2009 (preliminary data collection) and January to July 2010 in the major eastern Indonesian provinces. Once the public asset management framework was developed, a focus group was used to verify the framework. Results are threefold and indicate that Indonesian provincial governments need to improve the effectiveness and efficiency of current practice of public asset management in order to improve public service quality. The second result shows that the 5 major concerns that influence the local government public asset management processes are asset identification and inventory systems, public asset holding, asset guidance and legal arrangements, asset management efficiency and effectiveness, and, human resources and their organisational arrangements. The framework was then applied to assets already transferred to local governments and so included a system of asset identification and a needs analysis to classify the importance of these assets to local governments, their functions and responsibilities in delivering public services. Assets that support local government functions and responsibilities will then be managed using suitable asset lifecycle processes. Those categorised as surplus assets should be disposed. Additionally functions and responsibilities that do not need an asset solution should be performed directly by local governments. These processes must be measured using performance measurement indicators. All these stages should be guided and regulated with sufficient laws and regulations. Constant improvements to the quality and quantity of human resources hold an important role in successful public asset management processes. This research focuses on developing countries, and contributes toward the knowledge of a Public Asset Management Framework at local government level, particularly Indonesia. The framework provides local governments a foundation to improve their effectiveness and efficiency in managing public assets, which could lead to improved public service quality. This framework will ensure that the best decisions are made throughout asset decision ownership and provide a better asset life cycle process, leading to selection of the most appropriate asset, improve its acquisition and delivery process, optimise asset performance, and provide an appropriate disposal program.