840 resultados para critical supply chains


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Invited book review of Carolyn Carpan, 2009, Sisters, Schoolgirls and Sleuths : Girls' Series Books in America, MD: Scarecrow Press

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND/OBJECTIVES: This paper reports on the evaluation of the Smart Choices healthy food and drink supply strategy for Queensland schools (Smart Choices) implementation across the whole school environment in state government primary and secondary schools in Queensland, Australia. SUBJECTS/METHODS: Three concurrent surveys using different methods for each group of stakeholders that targeted all 1275 school Principals, all 1258 Parent and Citizens’ Associations (P&Cs) and a random sample of 526 tuckshop convenors throughout Queensland. Nine hundred and seventy-three Principals, 598 P&Cs and 513 tuckshop convenors participated with response rates of 78%, 48% and 98%, respectively. RESULTS: Nearly all Principals (97%), P&Cs (99%) and tuckshop convenors (97%) reported that their school tuckshop had implemented Smart Choices. The majority of Principals and P&Cs reported implementation, respectively, in: school breakfast programs (98 and 92%); vending machine stock (94 and 83%); vending machine advertising (85 and 84%); school events (87 and 88%); school sporting events (81 and 80%); sponsorship and advertising (93 and 84%); fundraising events (80 and 84%); and sporting clubs (73 and 75%). Implementation in curriculum activities, classroom rewards and class parties was reported, respectively, by 97%, 86% and 75% of Principals. Respondents also reported very high levels of understanding of Smart Choices and engagement of the school community. CONCLUSIONS: The results demonstrated that food supply interventions to promote nutrition across all domains of the school environment can be implemented successfully.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We investigated critical beliefs to target in interventions aimed at improving sun-protective behaviours of Australian adults, a population at risk for skin cancer. Participants (N = 816) completed a Theory of Planned Behaviour belief-based questionnaire and a 1-week follow-up of sun-protective behaviour. A range of behavioural, normative and control beliefs correlated with sun-protective behaviour, with no and only minimal differences observed in correlations between beliefs and behaviour by gender and age, respectively. A range of key beliefs made independent contributions to behaviour; however, the behavioural belief about being less likely to tan (β = 0.09); normative belief about friends (β = 0.20); and control beliefs about forgetfulness (β = −0.14), inconvenience (β = −0.17), knowing I will be in the sun for a long time (β = 0.16) and more fashionable sun-protective clothing (β = 0.13) were significant critical beliefs guiding people’s sun-protective behaviour. Our study fills a gap in the literature by investigating an at-risk population for skin cancer and using an established theoretical framework to identify critical beliefs that guide Australian adults’ decisions to sun protect. Attention to these critical beliefs will assist health campaigns and interventions aimed at combating the increasing rates of skin cancer for adults.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: This paper aims to explore new graduates experience working with clients with mental health issues using critical incident interviews. Methods: The qualitative research techniques were based on phenomenology. A purposive sample of 19 new graduate dietitians was drawn from a range of work settings and locations throughout Australia. Data was gathered using thirty minute Critical Incident Interviews. Audio-taped data was transcribed, coded to identify common themes, compared for congruence and then categorised into knowledge, skills and attitudes. Results: New graduates encountered a range of situations involving a variety of mental health, wellbeing, dietetic and clinical issues. Common themes highlighted the mental health knowledge, skills and attitudes required for entry-level dietitians which then informed the review of the National Competency Standards for Entry-Level Dietitians. Conclusion: New graduates encounter a variety of mental health and wellbeing issues in their everyday practice and therefore require training to address these situations competently.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article reports on a recent survey of employer attitudes and policies towards older workers in Australia at a time of sustained economic growth and ongoing concerns about labour shortages. Findings from a survey of 590 employers with more than 50 employees in the State of Queensland point to an unusually strong orientation towards the recruitment of older workers among respondents, although the retraining of older workers is not prioritised by the majority. The issue of workforce ageing is viewed as being of medium-term importance by the majority of respondents, although for a substantial number the issue is of immediate concern. Both sector and organisation size are predictive of the application of a broad range of policies targeting older workers, with public-sector and larger organisations more likely to be active. Concerns about workforce ageing and labour supply are predictive of employer behaviours regarding older workers, suggesting that sustained policy making may be emerging in response to population ageing over and above more immediate concerns about labour shortages and that this broad thrust of organisational policy making may be immune to the point in the economic cycle. This study found no evidence that the flexible firm will not countenance an ageing workforce.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article critically analyses the role that criminological theory and specific policy formulations of culture play in the New Zealand state’s response to the over-representation of Māori in the criminal justice system. Part one provides an overview of the changing criminological explanations of, and responses to, Māori offending in New Zealand from the 1980s onwards and how these understandings extended colonialist approaches to Māori and crime into the neo-colonial context. In particular, we chart the shift in policy development from theorising Māori offending as attributable to loss of cultural identity to a focus on socio-economic and institutional antecedents and, finally, through the risk factors, assessment, and criminogenic needs approaches that have gained prominence in the current policy context. In part two, the focus moves to the strategies employed by members of the academy to elevate their own epistemological constructions of Māori social reality within the policy development process. In particular, the critique scrutinises recent attempts to portray Indigenous responses to social harm as “unscientific” and, in part, responsible for the continuing over-representation of Māori in New Zealand’s criminal justice system. The purpose of this analysis is to focus the critical, criminological gaze firmly on the activities of policy makers and administrative criminologists, to examine how their policies and approaches impact on Māori as an Indigenous people.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Modern applications comprise multiple components, such as browser plug-ins, often of unknown provenance and quality. Statistics show that failure of such components accounts for a high percentage of software faults. Enabling isolation of such fine-grained components is therefore necessary to increase the robustness and resilience of security-critical and safety-critical computer systems. In this paper, we evaluate whether such fine-grained components can be sandboxed through the use of the hardware virtualization support available in modern Intel and AMD processors. We compare the performance and functionality of such an approach to two previous software based approaches. The results demonstrate that hardware isolation minimizes the difficulties encountered with software based approaches, while also reducing the size of the trusted computing base, thus increasing confidence in the solution's correctness. We also show that our relatively simple implementation has equivalent run-time performance, with overheads of less than 34%, does not require custom tool chains and provides enhanced functionality over software-only approaches, confirming that hardware virtualization technology is a viable mechanism for fine-grained component isolation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In defining the contemporary role of the specialist nurse it is necessary to challenge the concept of nursing as merely a combination of skills and knowledge. Nursing must be demonstrated and defined in the context of client care and include the broader notions of professional development and competence. This qualitative study sought to identify the competency standards for nurse specialists in critical care and to articulate the differences between entry-to-practice standards and the advanced practice of specialist nurses. Over 800 hours of specialist critical care nursing practice were observed and grouped into 'domains' or major themes of specialist practice using a constant comparison qualitative technique. These domains were further refined to describe attributes of the registered nurses which resulted in effective and/or superior performance (competency standards) and to provide examples of performance (performance criteria) which met the defined standard. Constant comparison of the emerging domains, competency standards and performance criteria to observations of specialist critical care practice, ensured the results provided a true reflection of the specialist nursing role. Data analysis resulted in 20 competency standards grouped into six domains: professional practice, reflective practice, enabling, clinical problem solving, teamwork, and leadership. Each of these domains is comprised of between two and seven competency standards. Each standard is further divided into component parts or 'elements' and the elements are illustrated with performance criteria. The competency standards are currently being used in several Australian critical care educational programmes and are the foundation for an emerging critical care credentialling process. They have been viewed with interest by a variety of non-critical care specialty groups and may form a common precursor from which further specialist nursing practice assessment will evolve.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines whether recent innovation in market design can address persistent problems of housing choice and affordability in the inner and middle suburbs of Australian cities. Australia's ageing middle suburbs are the result of a low density and highly car-dependent garden city greenfield approach to planning that failed to consider possible future resource or environmental constraints on urban development (Newton et al., 2011). Described as 'greyfield' sites in contrast to greenfield (signalling the change from rural to urban land use) and 'brownfield' (being the transformation of former industrial use to mixed use, including housing), intensification of development in such areas is expected to deliver positive social, economic and environmental outcomes (Trubka et al., 2008; Gurran et al., 2006; Newton et al., 2011; Goodman et al., 2010). Yet despite broad policy consensus progress remains elusive (Major Cities Unit, 2010). In this paper we argue that the application of market design theory, specifically through the internet-based coordination of market information, offers a new policy approach and practical measures to address these problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines whether innovation in market design can address persistent problems of housing choice and affordability in the ageing inner and middle suburbs of Australian cities. Despite policy consensus that urban intensification of these low density, ‘greyfield’ areas should be able to deliver positive social, economic and environmental outcomes, existing models of development have not increased housing stock or delivered adequate gains in sustainability, affordability or diversity of dwellings in greyfield localities. We argue that application of smart market and matching market principles to the supply of multi-unit housing can unlock land, reduce development costs and improve design.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 1991, McNabb introduced the concept of mean action time (MAT) as a finite measure of the time required for a diffusive process to effectively reach steady state. Although this concept was initially adopted by others within the Australian and New Zealand applied mathematics community, it appears to have had little use outside this region until very recently, when in 2010 Berezhkovskii and coworkers rediscovered the concept of MAT in their study of morphogen gradient formation. All previous work in this area has been limited to studying single–species differential equations, such as the linear advection–diffusion–reaction equation. Here we generalise the concept of MAT by showing how the theory can be applied to coupled linear processes. We begin by studying coupled ordinary differential equations and extend our approach to coupled partial differential equations. Our new results have broad applications including the analysis of models describing coupled chemical decay and cell differentiation processes, amongst others.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes in detail our Security-Critical Program Analyser (SCPA). SCPA is used to assess the security of a given program based on its design or source code with regard to data flow-based metrics. Furthermore, it allows software developers to generate a UML-like class diagram of their program and annotate its confidential classes, methods and attributes. SCPA is also capable of producing Java source code for the generated design of a given program. This source code can then be compiled and the resulting Java bytecode program can be used by the tool to assess the program's overall security based on our security metrics.