Does health care for knowledge management?
- Authors: Van Beveren, John
- Date: 2003
- Type: Text , Journal article
- Relation: Journal of Knowledge Management Vol. 7, no. 1 (2003), p. 90-95
- Full Text: false
- Reviewed:
- Description: This study explores knowledge management within an Australian regional health care organization. Many barriers inherent in the organizational structure and design of the organization that are indicative of the public health sector have been identified and discussed. From the results and discussion it is concluded that new models, tools and techniques for knowledge management specific to the environment of the public sector and particularly the health sector are required.
- Description: C1
- Description: 2003000617
ESL Library Skills: an information literacy program for adults with low levels of English literacy
- Authors: Macdonald, Katrina
- Date: 2008
- Type: Text , Journal article
- Relation: The Australian Library Journal Vol. August, no. (2008), p. 295-309
- Full Text:
- Reviewed:
- Description: This paper introduces the ESL Information Literacy Project (ESLILP) at University of Ballarat. It describes the development, implementation and evaluation of a library orientation course designed in a TAFE context for adult, non-academic students who speak English as a Second Language (ESL). The paper seeks to raise awareness of an apparent lack of research and information literacy programs for adult ESL speakers in a non-academic environment. It also offers a framework for developing information literacy education programs for people with very low levels of literacy. The framework may be of particular use to librarians working in this area with limited backgrounds in ESL teaching or practical resources. The paper concludes by inviting other libraries to trial the ESL Library Skills course.
- Description: C1
Automated opinion detection : Implications of the level of agreement between human raters
- Authors: Osman, Deanna , Yearwood, John , Vamplew, Peter
- Date: 2010
- Type: Text , Journal article
- Relation: Information Processing and Management Vol. 46, no. 3 (2010), p. 331-342
- Full Text: false
- Reviewed:
- Description: The ability to agree with the TREC Blog06 opinion assessments was measured for seven human assessors and compared with the submitted results of the Blog06 participants. The assessors achieved a fair level of agreement between their assessments, although the range between the assessors was large. It is recommended that multiple assessors are used to assess opinion data, or a pre-test of assessors is completed to remove the most dissenting assessors from a pool of assessors prior to the assessment process. The possibility of inconsistent assessments in a corpus also raises concerns about training data for an automated opinion detection system (AODS), so a further recommendation is that AODS training data be assembled from a variety of sources. This paper establishes an aspirational value for an AODS by determining the level of agreement achievable by human assessors when assessing the existence of an opinion on a given topic. Knowing the level of agreement amongst humans is important because it sets an upper bound on the expected performance of AODS. While the AODSs surveyed achieved satisfactory results, none achieved a result close to the upper bound. © 2009 Elsevier Ltd. All rights reserved.
To registrate and/or deregistrate : Getting onto and off the postgraduate supervisor register
- Authors: Zeegers, Margaret , Barron, Deirdre
- Date: 2004
- Type: Text , Journal article
- Relation: International Journal of Learning Vol. 10, no. (2004), p. 721-726
- Full Text:
- Reviewed:
- Description: This paper focuses on the registration of supervisors as a crucial element in constructs and practices of postgraduate studies in Australian universities. It examines two processes in a number of Australian universities postgraduate divisions' practices in compilation of postgraduate supervisor registers-how people get onto the register, and how people get off it. It takes issue with the reliance on custom and tradition as a dominant practice of registration and/or deregistration for supervision of postgraduate research studies. It suggests a model of supervisor registration and deregistration as intentional and systematic intervention, based on literature deriving from research in postgraduate supervision which acknowledges the problematic natures of relationships between teaching, learning and knowledge production. In doing so, it examines issues of discursive practice and the problematic nature of power differentials in supervisor/supervisee relationships and the possibilities presented by both registration and deregistration for such relationships.
- Description: C1
- Description: 2003000803
A model of knowledge acquisition that refocuses knowledge management
- Authors: Van Beveren, John
- Date: 2002
- Type: Text , Journal article
- Relation: Journal of Knowledge Management Vol. 6, no. (2002), p. 18-22
- Full Text: false
- Reviewed:
- Description: This paper presents a model of knowledge acquisition from definitions of data, information and knowledge. The model asserts that knowledge cannot exist outside of the human brain, and that any expression of the knowledge requires it to be transformed into information to be communicated outside of the brain. The model asserts that information is acquired through the sensors to the brain where it is processed with prior knowledge and that new knowledge can be created from the processing of information within the brain only. From a discussion of this model in the context of alternative viewpoints, it is concluded that the future focus for knowledge management should be toward human resource strategies that leverage human-intellectual capital within firms and for the dissemination and sharing of important information that promotes creativity and innovation within and between employees.
- Description: C1
- Description: 2003000231
Swirling students: A study of professional and vocational training avenues for the library and information industry
- Authors: Carroll, Mary , Murray, Janet
- Date: 2010
- Type: Text , Journal article
- Relation: Library Trends Vol. 59, no. 1-2 (2010), p. 188-207
- Full Text: false
- Reviewed:
- Description: Australian education has been traditionally divided between the university sector and the vocational training sector. In Australia, the movement or "articulation" of students between these sectors has interested governments and professional bodies concerned with the associated structural and workforce issues. Such articulation includes movement from vocational training into professional education, from professional education to vocational training, and what has been called a "swirling" combination of movement back and forth between the sectors. The authors have considered why students who already hold a university degree and wish to pursue a career in librarianship/information management choose to undertake a vocational sector qualification in preference to a postgraduate professional qualification in Library and Information Studies (LIS). This article will provide historical context and report the results of research undertaken to investigate the underlying motivation of these students. The methodology included a survey of current students undertaking Vocational Education and Training (VE) in LIS paraprofessional qualifications at Australian educational institutions, and an analysis of statistical data from the VE sector. The study will contribute to a broader understanding of student motivations, career choices, and understanding of the concept of lifelong learning. It may also lead to a re-evaluation of how entry into the LIS industry should be managed.
A Chaotic field of practice: Financial reporting of the Library collections of Australia's public Universities, 2007-2011
- Authors: Carnegie, Garry , Sidaway, Shannon , West, Brian
- Date: 2013
- Type: Text , Journal article
- Relation: Australian Academic and Research Libraries Vol. 44, no. 4 (2013), p. 195-216
- Full Text: false
- Reviewed:
- Description: The accounting practices adopted by Australia's 36 public universities in accounting for their library collections - including heritage and special collections - are identified and analysed. The data is collected from a survey of these institutions' annual reports over the period 2007 to 2011 and the analysis is guided by theoretical perspectives drawn from new institutional sociology (NIS). Consistent with prior research by West and Carnegie (2010), accounting for university library collections is depicted as a chaotic field of practice. Inconsistent and idiosyncratic policies that compromise the overall reliability, comparability and usefulness of university financial reports are observed, along with instances of dramatic valuation adjustments. However, the beginnings of some amelioration of the chaos are also detected, as regulatory activity and a voluntary homogenisation of accounting policies begin to take effect. In particular, a general trend towards more conservative accounting practices is evident as universities perhaps seek to guard against accounting debacles - most notably massive valuation write-downs - of the kind that have been suffered by several institutions over the last decade. Assigning financial values to the library collections and other non-financial resources of not-for-profit public institutions remains a problematic issue. © 2013 Australian Library & Information Association.
- Description: The accounting practices adopted by Australia's 36 public universities in accounting for their library collections - including heritage and special collections - are identified and analysed. The data is collected from a survey of these institutions' annual reports over the period 2007 to 2011 and the analysis is guided by theoretical perspectives drawn from new institutional sociology (NIS). Consistent with prior research by West and Carnegie (2010), accounting for university library collections is depicted as a chaotic field of practice. Inconsistent and idiosyncratic policies that compromise the overall reliability, comparability and usefulness of university financial reports are observed, along with instances of dramatic valuation adjustments. However, the beginnings of some amelioration of the chaos are also detected, as regulatory activity and a voluntary homogenisation of accounting policies begin to take effect. In particular, a general trend towards more conservative accounting practices is evident as universities perhaps seek to guard against accounting debacles - most notably massive valuation write-downs - of the kind that have been suffered by several institutions over the last decade. Assigning financial values to the library collections and other non-financial resources of not-for-profit public institutions remains a problematic issue. © 2013 © 2013 Australian Library & Information Association.
A review of cloud application assessment practices at the University of Ballarat
- Authors: Wilmott, Deirdre , Knox, Ian
- Date: 2012
- Type: Text , Journal article
- Relation: Education for Information Vol. 29, no. 3-4 (2012), p. 229-242
- Full Text: false
- Reviewed:
- Description: It has been suggested that traditional assessment practices in tertiary institutions tend not to equip students well for the processes of effective learning in a learning society [1]. This paper reviews alternative Internet based assessment practices used in Library, Business and Education courses at the University of Ballarat, Victoria, Australia in 2011. © 2012 - IOS Press and the authors. All rights reserved. © 2012 - IOS Press and the authors. All rights reserved.
Young people, child pornography, and subcultural norms on the Internet
- Authors: Prichard, Jeremy , Spiranovic, Caroline , Watters, Paul , Lueg, Christopher
- Date: 2013
- Type: Text , Journal article
- Relation: Journal of the American Society for Information Science and Technology Vol. 64, no. 5 (2013), p. 992-1000
- Full Text: false
- Reviewed:
- Description: Literature to date has treated as distinct two issues (a) the influence of pornography on young people and (b) the growth of Internet child pornography, also called child exploitation material (CEM). This article discusses how young people might interact with, and be affected by, CEM. The article first considers the effect of CEM on young victims abused to generate the material. It then explains the paucity of data regarding the prevalence with which young people view CEM online, inadvertently or deliberately. New analyses are presented from a 2010 study of search terms entered on an internationally popular peer-to-peer website, isoHunt. Over 91 days, 162 persistent search terms were recorded. Most of these related to file sharing of popular movies, music, and so forth. Thirty-six search terms were categorized as specific to a youth market and perhaps a child market. Additionally, 4 deviant, and persistent search terms were found, 3 relating to CEM and the fourth to bestiality. The article discusses whether the existence of CEM on a mainstream website, combined with online subcultural influences, may normalize the material for some youth and increase the risk of onset (first deliberate viewing). Among other things, the article proposes that future research examines the relationship between onset and sex offending by youth. © 2013 ASIS&T.
- Description: 2003011027
Fuzzy clustering for image segmentation using generic shape information
- Authors: Ali, Mohammad , Karmakar, Gour , Dooley, Laurence
- Date: 2008
- Type: Text , Journal article
- Relation: Malaysian Journal of Computer Science Vol. 21, no. 2 (2008), p. 122-138
- Full Text: false
- Reviewed:
- Description: The performance of clustering algorithms for image segmentation are highly sensitive to the features used and types of objects in the image, which ultimately limits their generalization capability. This provides strong motivation to investigate integrating shape information into the clustering framework to improve the generality of these algorithms. Existing shape-based clustering techniques mainly focus on circular and elliptical clusters and so are unable to segment arbitrarily-shaped objects. To address this limitation, this paper presents a new shape-based algorithm called fuzzy clustering for image segmentation using generic shape information (FCGS), which exploits the B-spline representation of an object’s shape in combination with the Gustafson-Kessel clustering algorithm. Qualitative and quantitative results for FCGS confirm its superior segmentation performance consistently compared to well-established shape-based clustering techniques, for a wide range of test images comprising various regular and arbitrary-shaped objects
A review of cloud application assessment practices at the University of Ballarat
- Authors: Wilmott, Deirdre , Knox, Ian
- Date: 2012
- Type: Text , Journal article
- Relation: Education for Information Vol. 29, no. 3-4 (2012), p. 229-242
- Full Text: false
- Reviewed:
- Description: It has been suggested that traditional assessment practices in tertiary institutions tend not to equip students well for the processes of effective learning in a learning society [1]. This paper reviews alternative Internet based assessment practices used in Library, Business and Education courses at the University of Ballarat, Victoria, Australia in 2011.© 2012 - IOS Press and the authors
- Description: C1
Using psycholinguistic features for profiling first language of authors
- Authors: Torney, Rosemary , Vamplew, Peter , Yearwood, John
- Date: 2012
- Type: Text , Journal article
- Relation: Journal of the American Society for Information Science and Technology Vol. 63, no. 6 (2012), p. 1256-1269
- Full Text: false
- Reviewed:
- Description: This study empirically evaluates the effectiveness of different feature types for the classification of the first language of an author. In particular, it examines the utility of psycholinguistic features, extracted by the Linguistic Inquiry and Word Count (LIWC) tool, that have not previously been applied to the task of author profiling. As LIWC is a tool that has been developed in the psycholinguistic field rather than the computational linguistics field, it was hypothesized that it would be effective, both as a single type feature set because of its psycholinguistic basis, and in combination with other feature sets, because it should be sufficiently different to add insight rather than redundancy. It was found that LIWC features were competitive with previously used feature types in identifying the first language of an author, and that combined feature sets including LIWC features consistently showed better accuracy rates and average F measures than were achieved by the same feature sets without the LIWC features. As a secondary issue, this study also examined how effectively first language classification scaled up to a larger number of possible languages. It was found that the classification scheme scaled up effectively to the entire 16 language collection from the International Corpus of Learner English, when compared with results achieved on just 5 languages in previous research. 2012 ASIS&T.
A participatory information management framework for patient centred care of autism spectrum disorder
- Authors: De Silva, Daswin , Burstein, Frada , Stranieri, Andrew , Williams, Katrina , Rinehart, Nicole
- Date: 2013
- Type: Text , Conference paper
- Relation: Information systems: Transforming the future 24th Australasian Conference on Information p. 2-11
- Full Text: false
- Reviewed:
Exploring ways in which social networkers contribute to online groups : A case study of one facebook group's discussion of australian broadcaster channel 9 during the 2010 winter olympic games
- Authors: Scott, Olan , Bradshaw, Ryan , Larkin, Paul
- Date: 2013
- Type: Text , Journal article
- Relation: First Monday Vol. 18, no. 4 (2013), p.
- Full Text:
- Reviewed:
- Description: The advent of the Internet has allowed consumers more opportunities to communicate than ever before. The emergence of the Internet has decreased the gate-keeping role of the media in that Internet users can interact with media outlets and other users in real time. This study breaks ground in the analysis of media messages as one Facebook group is studied to uncover how Internet users virtually protested media outlets on social networking Web sites. © First Monday. 2013, Olan Kees Martin Scott, Ryan Bradshaw, and Paul Larkin.
- Description: 2003011106
Being savvy in cyberspace
- Authors: Greenway, Nikki , Miller, Charlynn
- Date: 2010
- Type: Text , Conference paper
- Relation: 6th Australian Womens Health Conference
- Full Text: false
- Reviewed:
Development of a suicidal ideation detection tool for primary Healthcare settings : Using open access online psychosocial data
- Authors: Meyer, Denny , Abbott, Jo-Anne , Rehm, Imogen , Bhar, Sunil , Barak, Azy , Deng, Gary , Wallace, Klaire , Ogden, Edward , Klein, Britt
- Date: 2017
- Type: Text , Journal article
- Relation: Telemedicine and e-Health Vol. 23, no. 4 (2017), p. 273-281
- Full Text: false
- Reviewed:
- Description: Background: Suicidal patients often visit healthcare professionals in their last month before suicide, but medical practitioners are unlikely to raise the issue of suicide with patients because of time constraints and uncertainty regarding an appropriate approach. Introduction: A brief tool called the e-PASS Suicidal Ideation Detector (eSID) was developed for medical practitioners to help detect the presence of suicidal ideation (SI) in their clients. If SI is detected, the system alerts medical practitioners to address this issue with a client. The eSID tool was developed due to the absence of an easy-to-use, evidence-based SI detection tool for general practice. Material and Methods: The tool was developed using binary logistic regression analyses of data provided by clients accessing an online psychological assessment function. Ten primary healthcare professionals provided advice regarding the use of the tool. Results: The analysis identified eleven factors in addition to the Kessler-6 for inclusion in the model used to predict the probability of recent SI. The model performed well across gender and age groups 18-64 (AUR 0.834, 95% CI 0.828-0.841, N = 16,703). Healthcare professionals were interviewed; they recommended that the tool be incorporated into existing medical software systems and that additional resources be supplied, tailored to the level of risk identified. Conclusion: The eSID is expected to trigger risk assessments by healthcare professionals when this is necessary. Initial reactions of healthcare professionals to the tool were favorable, but further testing and in situ development are required. © 2017, Mary Ann Liebert, Inc.
A patient agent to manage blockchains for remote patient monitoring
- Authors: Uddin, Ashraf , Stranieri, Andrew , Gondal, Iqbal , Balasubramanian, Venki
- Date: 2018
- Type: Text , Conference proceedings
- Relation: 7th International Conference on Global Telehealth, GT 2018; Colombo, Sri Lanka; 10th-11th October 2018; published in Studies in Health Technology and Informatics Vol. 254, p. 105-115
- Full Text: false
- Reviewed:
- Description: Continuous monitoring of patient's physiological signs has the potential to augment traditional medical practice, particularly in developing countries that have a shortage of healthcare professionals. However, continuously streamed data presents additional security, storage and retrieval challenges and further inhibits initiatives to integrate data to form electronic health record systems. Blockchain technologies enable data to be stored securely and inexpensively without recourse to a trusted authority. Blockchain technologies also promise to provide architectures for electronic health records that do not require huge government expenditure that challenge developing nations. However, Blockchain deployment, particularly with streamed data challenges existing Blockchain algorithms that take too long to place data in a block, and have no mechanism to determine whether every data point in every stream should be stored in such a secure way. This article presents an architecture that involves a Patient Agent, coordinating the insertion of continuous data streams into Blockchains to form an electronic health record.
- Description: Studies in Health Technology and Informatics
The impact of web-based and face-to-face simulation on patient deterioration and patient safety : Protocol for a multi-site multi-method design
- Authors: Cooper, Simon J. , Kinsman, Leigh , Chung, Catherine , Cant, Robyn , Boyle, Jayne , Bull, Loretta , Cameron, Amanda , Connell, Cliff , Kim, Jeong-Ah , McInnes, Denise , McKay, Angela , Nankervis, Katrina , Penz, Erika , Rotter, Thomas
- Date: 2016
- Type: Text , Journal article
- Relation: BMC Health Services Research Vol. 16, no. 1 (2016), p. 1-8
- Full Text:
- Reviewed:
- Description: Background: There are international concerns in relation to the management of patient deterioration which has led to a body of evidence known as the 'failure to rescue' literature. Nursing staff are known to miss cues of deterioration and often fail to call for assistance. Medical Emergency Teams (Rapid Response Teams) do improve the management of acutely deteriorating patients, but first responders need the requisite skills to impact on patient safety. Methods/design: In this study we aim to address these issues in a mixed methods interventional trial with the objective of measuring and comparing the cost and clinical impact of face-to-face and web-based simulation programs on the management of patient deterioration and related patient outcomes. The education programs, known as 'FIRST2ACT', have been found to have an impact on education and will be tested in four hospitals in the State of Victoria, Australia. Nursing staff will be trained in primary (the first 8 min) responses to emergencies in two medical wards using a face-to-face approach and in two medical wards using a web-based version FIRST2ACTWeb. The impact of these interventions will be determined through quantitative and qualitative approaches, cost analyses and patient notes review (time series analyses) to measure quality of care and patient outcomes. Discussion: In this 18 month study it is hypothesised that both simulation programs will improve the detection and management of deteriorating patients but that the web-based program will have lower total costs. The study will also add to our overall understanding of the utility of simulation approaches in the preparation of nurses working in hospital wards. (ACTRN12616000468426, retrospectively registered 8.4.2016). © 2016 The Author(s).
Investigating the social implications of biometrics and the need for global biometric uniformity
- Authors: Leicester, Phillip , Kulkarni, Siddhivinayak
- Date: 2013
- Type: Text , Journal article
- Relation: International Journal for Infonomics Vol. 6, no. 3/4 (2013), p. 731-735
- Full Text: false
- Reviewed:
- Description: This research paper looks at the social implications of biometrics pertaining to the ethics of privacy and the ownership of individual biometric data, including how these issues can be resolved through the establishment of a Biometric Commission by introducing global standardised biometric uniformity and the guidelines that will ensure their technological foundations. Much of the distrust that engulfs society is due to the past performances and policy implementations that governments have initiated surrounding biometric technology and its miss use beyond the realms of individual identification for security purposes. There needs to be total transparency from governments and organisations that use biometric technology for security identification in how every individuals biometric data will be used, stored and the ethical standards provided in eliminating many of the implications that every society has towards on how their biometric data will be used.
An efficient data extraction framework for mining wireless sensor networks
- Authors: Rashid, Md. Mamunur , Gondal, Iqbal , Kamruzzaman, Joarder
- Date: 2016
- Type: Text , Conference paper
- Relation: 23rd International Conference, ICONIP 2016; Kyoto, Japan; 16th-21st October 2016; published in Neural Information Processing, Part III (Lecture Notes in Computer Science series) Vol. 9949, p. 491-498
- Full Text:
- Reviewed:
- Description: Behavioral patterns for sensors have received a great deal of attention recently due to their usefulness in capturing the temporal relations between sensors in wireless sensor networks. To discover these patterns, we need to collect the behavioral data that represents the sensor's activities over time from the sensor database that attached with a well-equipped central node called sink for further analysis. However, given the limited resources of sensor nodes, an effective data collection method is required for collecting the behavioral data efficiently. In this paper, we introduce a new framework for behavioral patterns called associated-correlated sensor patterns and also propose a MapReduce based new paradigm for extract data from the wireless sensor network by distributed away. Extensive performance study shows that the proposed method is capable to reduce the data size almost 50% compared to the centralized model.