899 resultados para Group communication
Resumo:
It might still sound strange to dedicate an entire journal issue exclusively to a single internet platform. But it is not the company Twitter Inc. that draws our attention; this issue is not about a platform and its features and services. It is about its users and the ways in which they interact with one another via the platform, about the situations that motivate people to share their thoughts publicly, using Twitter as a means to reach out to one another. And it is about the digital traces people leave behind when interacting with Twitter, and most of all about the ways in which these traces – as a new type of research data – can also enable new types of research questions and insights.
Resumo:
Community-based protests against major construction and engineering projects are becoming increasingly common as concerns over issues such as corporate social accountability, climate change and corruption become more prominent in the public's mind. Public perceptions of risk associated with these projects can have a contagious effect, which mismanaged can escalate into long-term and sometimes acrimonious protest stand-offs that have negative implications for the community, firms involved and the construction industry as a whole. This paper investigates the role of core group members in sustaining community-based protest against construction and engineering projects. Using a thematic story telling approach which draws on ethnographic method and social contagion theories, it presents an in-depth analysis of a single case study - one of Australia's longest standing community protests against a construction project. It concludes that core group members play a critical role, within anarchic structures which provide a high degree of spontaneity and improvisation, in sustaining movement continuity by building collective identity, mobilising resources and a moving interface which developers find hard to communicate with.
Resumo:
In 1993 the Auditing Practices Board issued an expanded audit report, SAS 600 Auditors’ Reports on Financial Statements, in an attempt to educate users and to clarify certain matters pertaining to the audit function. This paper investigates the extent to which the new audit report, SAS 600, has been successful in aligning the views of auditors, preparers and users about issues dealt with in the expanded audit report, and the extent to which the three groups considered that it would be useful for additional matters, including corporate governance, to be reported upon by the auditor. Our findings suggest that SAS 600 has been successful in clarifying the purpose of the audit and the respective responsibilities of auditors and directors. However, to meet the expectations of users and to add more value, the audit report needs to provide more information about the findings of the audit.
Resumo:
This thesis investigates the influence of passenger group dynamics on passengers' behaviour in an international airport. A simulation model is built to analyse passengers' behaviour during airport departure processes and during an emergency event. Results from the model showed that passengers' group dynamics have significant influences on the performance and utilisation of airport services. The agent-based model also provides a convenient way to investigate the effectiveness of space design and service allocations, which may contribute to the enhancement of passenger airport experiences.
Resumo:
This study explored the stress and wellbeing of Emergency Medical Dispatchers (EMD) who remotely provide crisis intervention to medical emergencies through telehealth support. Semi-structured interviews with 16 EMDs were conducted and Interpretative Phenomenological Analysis was used to identify themes in the data. These results indicated that despite their physical distance from the crisis scene, EMDs can experience vicarious trauma through acute and cumulative exposure to traumatic incidents and their perceived lack of control which can expound feelings of helplessness. Three superordinate themes of operational stress and trauma, organisational stress, and posttraumatic growth were identified. Practical implications are suggested to enable emergency services organisations to counteract this job related stress and promote more positive mental health outcomes.
Resumo:
Employee engagement is linked to higher productivity, lower attrition, and improved organizational reputations resulting in increased focus and resourcing by managers to foster an engaged workforce. While drivers of employee engagement have been identified as perceived support, job characteristics, and value congruence, internal communication is theoretically suggested to be a key influence in both the process and maintenance of employee engagement efforts. However, understanding the mechanisms by which internal communication influences employee engagement has emerged as a key question in the literature. The purpose of this research is to investigate whether social factors, namely perceived support and identification, play a mediating role in the relationship between internal communication and engagement. To test the theoretical model, data are collected from 200 non-executive employees using an online self-administered survey. The study applies linear and mediated regression to the model and finds that organizations and supervisors should focus internal communication efforts toward building greater perceptions of support and stronger identification among employees in order to foster optimal levels of engagement.
Resumo:
In this paper we tackle the problem of finding an efficient signature verification scheme when the number of signatures is signi.- cantly large and the verifier is relatively weak. In particular, we tackle the problem of message authentication in many-to-one communication networks known as concast communication. The paper presents three signature screening algorithms for a variant of ElGamal-type digital signatures. The cost for these schemes is n applications of hash functions, 2n modular multiplications, and n modular additions plus the verification of one digital signature, where n is the number of signatures. The paper also presents a solution to the open problem of finding a fast screening signature for non-RSA digital signature schemes.
Resumo:
We first classify the state-of-the-art stream authentication problem in the multicast environment and group them into Signing and MAC approaches. A new approach for authenticating digital streams using Threshold Techniques is introduced. The new approach main advantages are in tolerating packet loss, up to a threshold number, and having a minimum space overhead. It is most suitable for multicast applications running over lossy, unreliable communication channels while, in same time, are pertain the security requirements. We use linear equations based on Lagrange polynomial interpolation and Combinatorial Design methods.
Resumo:
This paper demonstrates the use of a spreadsheet in exploring non-linear difference equations that describe digital control systems used in radio engineering, communication and computer architecture. These systems, being the focus of intensive studies of mathematicians and engineers over the last 40 years, may exhibit extremely complicated behaviour interpreted in contemporary terms as transition from global asymptotic stability to chaos through period-doubling bifurcations. The authors argue that embedding advanced mathematical ideas in the technological tool enables one to introduce fundamentals of discrete control systems in tertiary curricula without learners having to deal with complex machinery that rigorous mathematical methods of investigation require. In particular, in the appropriately designed spreadsheet environment, one can effectively visualize a qualitative difference in the behviour of systems with different types of non-linear characteristic.
Resumo:
In this paper the renormalization group (RG) method of Chen, Goldenfeld, and Oono [Phys. Rev. Lett., 73 (1994), pp.1311-1315; Phys. Rev. E, 54 (1996), pp.376-394] is presented in a pedagogical way to increase its visibility in applied mathematics and to argue favorably for its incorporation into the corresponding graduate curriculum.The method is illustrated by some linear and nonlinear singular perturbation problems. Key word. © 2012 Society for Industrial and Applied Mathematics.
Resumo:
This paper introduces a straightforward method to asymptotically solve a variety of initial and boundary value problems for singularly perturbed ordinary differential equations whose solution structure can be anticipated. The approach is simpler than conventional methods, including those based on asymptotic matching or on eliminating secular terms. © 2010 by the Massachusetts Institute of Technology.
Resumo:
This article elucidates and analyzes the fundamental underlying structure of the renormalization group (RG) approach as it applies to the solution of any differential equation involving multiple scales. The amplitude equation derived through the elimination of secular terms arising from a naive perturbation expansion of the solution to these equations by the RG approach is reduced to an algebraic equation which is expressed in terms of the Thiele semi-invariants or cumulants of the eliminant sequence { Zi } i=1 . Its use is illustrated through the solution of both linear and nonlinear perturbation problems and certain results from the literature are recovered as special cases. The fundamental structure that emerges from the application of the RG approach is not the amplitude equation but the aforementioned algebraic equation. © 2008 The American Physical Society.