750 resultados para Outreach programs
Resumo:
Boundary spanning links organisations to one another in order to create mutually beneficial relationships; it is a concept developed and used in organisational theory but rarely used to understand organisational structures in higher education (Pruitt & Schwartz, 1999). Yet understanding boundary spanning activity has the capacity to help universities respond to demands for continuous quality improvement, and to increase capacity to react to environmental uncertainty. At a time of rapid change characterised by a fluctuating economic environment, globalisation, increased mobility, and ecological issues, boundary spanning could be viewed as a key element in assisting institutions in effectively understanding and responding to such change. The literature suggests that effective boundary spanning could help universities improve organisational performance, use of infrastructure and resources, intergroup relations, leadership styles, performance and levels of job satisfaction, technology transfer, knowledge creation, and feedback processes, amongst other things. Our research aims to put a face on boundary spanning (Miller, 2008) by contextualising it within organisational systems and structures in university departments responsible for work related programs i.e. Work Integrated Learning (WIL) and Co-operative Education (Co-op). In this paper these approaches are referred to collectively as work related programs. The authors formed a research team in Victoria, British Columbia in 2009 at a sponsored international research forum, Two Days in June. The purpose of the invitation-only forum was to investigate commonalities and differences across programs and to formulate an international research agenda for work related programs over the next five to ten years. Researchers from Queensland University of Technology, University of Cincinnati, Baden-Wuerttemberg Cooperative State University, University of Ottawa,and Dublin City University agreed that further research was needed into the impact stakeholders, organisational systems, structures, policies, and practices have on departments delivering work related programs. This paper illustrates how policy and practice across the five institutions can be better understood through the lens of boundary spanning. It is argued that boundary spanning is an area of theory and practice with great applicability to a better understanding of the activity of these departments. The paper concludes by proposing topics for future research to examine how boundary spanning can be used to better understand practice and change in work related programs.
Developing a model of embedding academic numeracy in university programs : a case study from nursing
Resumo:
This is a study of the academic numeracy of nursing students. This study develops a theoretical model for the design and delivery of university courses in academic numeracy. The following objectives are addressed: 1. To investigate nursing students' current knowledge of academic numeracy; 2. To investigate how nursing students’ knowledge and skills in academic numeracy can be enhanced using a developmental psychology framework; and 3. To utilise data derived from meeting objectives 1 and 2 to develop a theoretical model to embed academic numeracy in university programs. This study draws from Valsiner’s Human Development Theory (Valsiner, 1997, 2007). It is a quasi-experimental intervention case study (Faltis, 1997) and takes a multimethod approach using pre- and post-tests; observation notes; and semi-structured teaching sessions to document a series of microgenetic studies of student numeracy. Each microgenetic study is centered on the lived experience of students becoming more numerate. The method for this section is based on Vygotsky’s double stimulation (Valsiner, 2000a; 2007). Data collection includes interviews on students’ past experience with mathematics; their present feelings and experiences and how these present feelings and experiences are transformed. The findings from this study have provided evidence that the course developed for nursing students, underpinned by an appropriate framework, does improve academic numeracy. More specifically, students improved their content knowledge of and confidence in mathematics in areas that were directly related to their degree. The study used Valsiner’s microgenetic approach to development to trace the course as it was being taught and two students’ personal academic numeracy journeys. It highlighted particularly troublesome concepts, then outlined scaffolding and pathways used to develop understanding. This approach to academic numeracy development was summarised into a four-faceted model at the university, program, course and individual level. This model can be applied successfully to similar contexts. Thus the thesis advances both theory and practice in this under-researched and under-theorised area.
Resumo:
Many of the undergraduate and postgraduate programs of the former Faculty of Built Environment and Engineering PLUS Faculty of Sciences and Technology are changing as a result of merging these two large organisations, with some disciplines relocating to faculties of Creative Industries and Health respectively. The new STEM precinct under construction has begun rising from the proverbial hole-in-the-ground. Existing Surveying and Spatial Sciences programs, assets and staff are being repositioned with the newly formed School of Earth, Environment and Biological Sciences.2011. Golden graduates morning tea organised by QUT Alumni. Technology upgrades to the Mapping Sciences lab benefits 3-D learning experiences. Second and third-year students are undertaking Work Integrated Learning (WIL) over the summer vacation period. Final year students recently presented capstone project presentations at mini-conference in the Gibson Rooms overlooking a vibrant Southbank and sparkling Brisbane River. Discussion on end of year graduation ceremony held at QPAC.
Resumo:
Sustainable living is high on the international agenda (Ginsberg & Frame, 2004; Sutton, 2004). If education is fundamental to global transformation towards sustainability, then schools are in strategic positions to facilitate this change. Over recent years, schools in Australia have become more active in encouraging sustainability with the implementation of programs such as Science Education for Sustainable Living (SESL) that focus on topics such as energy efficiency, recycling, enhancing biodiversity, protecting species, and managing resources. This paper reports on a government funded Australian School Innovation in Science, Technology and Mathematics (ASISTM) project titled “Integrating science, technology and mathematics for understanding sustainable living” in which teachers, preservice teachers and other science professionals worked collaboratively to plan and enact a range of SESL programs for primary school students. Participants in this study included: 6 teachers, 5 preservice teachers, 2 university partners, 2 scientists, 4 consultants, and over 250 primary students. The findings from this qualitative study revealed a need for: (1) professional development for understanding SESL, (2) procedures for establishing and implementing SESL, and (3) strategies to devise, implement and evaluate SESL units of work.
Resumo:
Embedded real-time programs rely on external interrupts to respond to events in their physical environment in a timely fashion. Formal program verification theories, such as the refinement calculus, are intended for development of sequential, block-structured code and do not allow for asynchronous control constructs such as interrupt service routines. In this article we extend the refinement calculus to support formal development of interrupt-dependent programs. To do this we: use a timed semantics, to support reasoning about the occurrence of interrupts within bounded time intervals; introduce a restricted form of concurrency, to model composition of interrupt service routines with the main program they may preempt; introduce a semantics for shared variables, to model contention for variables accessed by both interrupt service routines and the main program; and use real-time scheduling theory to discharge timing requirements on interruptible program code.
Resumo:
This publication is the first in a series of scholarly reports on research-based practice related to the First Year Experience in Higher Education. This report synthesises evidence about practice-based initiatives and pragmatic approaches in Aotearoa (New Zealand) and Australia that aim to enhance the experience of commencing students in the higher education sector. Trends in policies, programs and practices ... examines the first year experience literature from 2000-2010. It acknowledges the uniqueness of the Australasian socio-political context and its influence on the interests and output of researchers. The review surveyed almost 400 empirical reports and conceptual discussions produced over the decade that dealt with the stakeholders, institutions and the higher education sector in Australasia. The literature is examined through two theoretical constructs or “lenses”: first, a set of first year curriculum design principles and second, the generational approach to describing the maturation of initiatives. These outcomes and suggested directions for further research provide the challenges and the opportunities for FYE adherents, both scholars and practitioners, to grapple with in the next decade.
Resumo:
Although in the late 1990s there was much discussion as to whether the idea of information literacy was necessary or had longevity, global interest in the phenomenon has increased rather than diminished. In the midst of all this activity, what has happened to the way in which we interpret the idea of information literacy in the last decade or more? The label of information literacy has certainly become widely applied, especially to library based programs and remains more popular in formal learning environments.Ultimately information literacy is about peoples’ experience of using information wherever they happen to be. Information literacy is about people interacting, engaging, working with information in many contexts, either individually or in community. Emerging technologies may transform the kinds of information available and how it is engaged with. Nevertheless, we continue to need to understand the experience of information use in order to support people in their information environments. We continue to need to develop programs which reflect and enhance peoples’ experiences of using information to learn in ever widening and more complex settings (Bruce, 2008; Bruce & Hughes, 2010).
Resumo:
This chapter will first consider the rationale for a transition pedagogy for first and final year law students. It then discusses the elements of a transition pedagogy for both years, noting the synergies and differences between programs designed to assist transition into and out of a law degree. In doing so, the authors attempt to explore the extent to which the first year curriculum principles identified by Sally Kift under an Australian Learning and Teaching Council (ALTC) Senior Fellowship may also be applied to the final year university experience. During the course of the discussion, examples are drawn from universities and Law Schools in Australia and internationally which seek to address these imperatives...
Resumo:
An introduction to the "four resources" model of literacy, where coding, semantics, pragmatic and critical text work are viewed as necessary components for literacy in contemporary society.
Resumo:
Objectives To assess the effects of information interventions which orient patients and their carers/family to a cancer care facility and the services available within the facility. Design Systematic review of randomised controlled trials (RCTs), cluster RCTs and quasi-RCTs. Data sources MEDLINE, CINAHL, PsycINFO, EMBASE and the Cochrane Central Register of Controlled Trials. Methods We included studies evaluating the effect of an orientation intervention, compared with a control group which received usual care, or with trials comparing one orientation intervention with another orientation intervention. Results Four RCTs of 610 participants met the criteria for inclusion. Findings from two RCTs demonstrated significant benefits of the orientation intervention in relation to reduced levels of distress (mean difference (MD): −8.96, 95% confidence interval (95%CI): −11.79 to −6.13), but non-significant benefits in relation to the levels state anxiety levels (MD −9.77) (95%CI: −24.96 to 5.41). There are insufficient data on the other outcomes of interest. Conclusions This review has demonstrated the feasibility and some potential benefits of orientation interventions. There was a low level of evidence to suggest that orientation interventions can reduce distress in patients. However, other outcomes, including patient knowledge recall/satisfaction, remain inconclusive. The majority of trials were subjected to high risk of bias and were likely to be insufficiently powered. Further well conducted and powered RCTs are required to provide evidence for determining the most appropriate intensity, nature, mode and resources for such interventions. Patient and carer-focused outcomes should be included.
Resumo:
The article explains and compares sustainability programs available for use by residential and commercial premises; as well as the respective legal tenure frameworks of commercial and residential tenancies. It identifies that while the desire of commercial tenants drive the participation by landlords in these programs, residential tenants appear to be ignorant of sustainable measures. The article contends that the reason for this difference is rooted in the legal and social status of residential tenants. It explores the impact that secure tenure may have in promoting residential sustainability programs and concludes by observing that the lack of involvement of residential tenants in programs stems from the absence of tenure security, which prevents any long term cooperation between the parties.
Resumo:
Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.