155 resultados para Close and open communion.
Resumo:
In this digital age, as social media is emerging as a central site where information is shared and interpreted, it is essential to study information construction issues on social media sites in order to understand how social reality is constructed. While there is a number of studies taking an information-as-objective point of view, this proposed study emphasizes the constructed and interpretive nature of information and explores the processes through which information surrounding acute events comes into being on micro-blogs. In order to conduct this analysis systematically and theoretically, the concept of interpretive communities will be deployed. This research investigates if or not micro-blog based social groups can serve as interpretive communities, and, if so, what role might they play in the construction of information, and the social impacts that may arise. To understand how this process is entangled with the surrounding social, political, technical contexts, cases from both China (focusing on Sina Weibo) and Australia (focusing on Twitter) will be analysed.
Resumo:
We present a novel framework and algorithms for the analysis of Web service interfaces to improve the efficiency of application integration in wide-spanning business networks. Our approach addresses the notorious issue of large and overloaded operational signatures, which are becoming increasingly prevalent on the Internet and being opened up for third-party service aggregation. Extending upon existing techniques used to refactor service interfaces based on derived artefacts of applications, namely business entities, we propose heuristics for deriving relations between business entities, and in turn, deriving permissible orders in which operations are invoked. As a result, service operations are refactored on business entity CRUD which then leads to behavioural protocols generated, thus supportive of fine-grained and flexible service discovery, composition and interaction. A prototypical implementation and analysis of web services, including those of commercial logistic systems (Fedex), are used to validate the algorithms and open up further insights into service interface synthesis.
Resumo:
The idea of ‘wicked’ problems has made a valuable contribution to recognising the complexity and challenges of contemporary planning. However, some wicked policy problems are further complicated by a significant moral, psychological, religious or cultural dimension. This is particularly the case for problems that possess strong elements of abjection and symbolic pollution and high degrees of psychosocial sensitivity. Because this affects the way these problems are framed and discussed they are also characterised by high levels of verbal proscription. As a result, they are not discussed in the rational and emotion-free way that conventional planning demands and can become obscured or inadequately acknowledged in planning processes. This further contributes to their wickedness and intractability. Through paradigmatic urban planning examples, we argue that placing their unspeakable nature at the forefront of enquiry will enable planners to advocate for a more contextually and culturally situated approach to planning, which accommodates both emotional and embodied talk alongside more technical policy contributions. Re-imagining wicked problems in this way has the potential to enhance policy and plan-making and to disrupt norms, expose their contingency, and open new ways of planning for both the unspeakable and the merely wicked.
Resumo:
BACKGROUND As blood collection agencies (BCAs) face recurrent shortages of varying blood products, developing a panel comprising donors who are flexible in the product they donate based on same-time inventory demand could be an efficient, cost-effective inventory management strategy. Accounting for prior whole blood (WB) and plasmapheresis donation experience, this article explores current donors’ willingness to change their donation product and identifies the type of information required for such donation flexibility. STUDY DESIGN AND METHODS Telephone interviews (mean, 34 min; SD, 11 min) were conducted with 60 donors recruited via stratified purposive sampling representing six donor groups: no plasma, new to both WB and plasma, new to plasma, plasma, flexible (i.e., alternating between WB and plasma), and maximum (i.e., high frequency alternating between WB and plasma) donors. Participants responded to hypothetical scenarios and open-ended questions relating to their and other donors’ willingness to be flexible. Responses were transcribed and content was analyzed. RESULTS The most frequently endorsed categories varied between donor groups with more prominent differences emerging between the information and support that donors desired for themselves versus that for others. Most donors were willing to change donations but sought improved donation logistics and information regarding inventory levels to encourage flexibility. The factors perceived to facilitate the flexibility of other donors included providing donor-specific information and information regarding different donation types. CONCLUSION Regardless of donation history, donors are willing to be flexible with their donations. To foster a flexible donor panel, BCAs should continue to streamline the donation process and provide information relevant to donors’ experience.
Resumo:
Deep packet inspection is a technology which enables the examination of the content of information packets being sent over the Internet. The Internet was originally set up using “end-to-end connectivity” as part of its design, allowing nodes of the network to send packets to all other nodes of the network, without requiring intermediate network elements to maintain status information about the transmission. In this way, the Internet was created as a “dumb” network, with “intelligent” devices (such as personal computers) at the end or “last mile” of the network. The dumb network does not interfere with an application's operation, nor is it sensitive to the needs of an application, and as such it treats all information sent over it as (more or less) equal. Yet, deep packet inspection allows the examination of packets at places on the network which are not endpoints, In practice, this permits entities such as Internet service providers (ISPs) or governments to observe the content of the information being sent, and perhaps even manipulate it. Indeed, the existence and implementation of deep packet inspection may challenge profoundly the egalitarian and open character of the Internet. This paper will firstly elaborate on what deep packet inspection is and how it works from a technological perspective, before going on to examine how it is being used in practice by governments and corporations. Legal problems have already been created by the use of deep packet inspection, which involve fundamental rights (especially of Internet users), such as freedom of expression and privacy, as well as more economic concerns, such as competition and copyright. These issues will be considered, and an assessment of the conformity of the use of deep packet inspection with law will be made. There will be a concentration on the use of deep packet inspection in European and North American jurisdictions, where it has already provoked debate, particularly in the context of discussions on net neutrality. This paper will also incorporate a more fundamental assessment of the values that are desirable for the Internet to respect and exhibit (such as openness, equality and neutrality), before concluding with the formulation of a legal and regulatory response to the use of this technology, in accordance with these values.