307 resultados para Disabled readers
Resumo:
This paper examines a case of academic plagiarism and the subsequent treatment of the issues across several academic institutions. It calls for academic leaders in universities to act on what constitutes a serious breach of standards, engendered in part by broader institutional norms and values promoting the need for publications in a ‘publish or perish’ environment. While universities often promote high-sounding ideals and would generally wish to be seen to uphold high academic standards, it is argued that silence and complicity surround the way in which instances of plagiarism in academic publications are often dealt with. Actions (and inaction) by academic leaders in universities in dealing with cases of academic plagiarism speak volumes in terms of the values academic institutions profess, and those they actually uphold. The paper prompts readers to consider the need for a more consistent and proactive stance on the part of their own institutions to exercise ethical leadership in identifying and addressing academic plagiarism when it occurs.
Resumo:
OBJECTIVE: To determine the point at which differences in clinical assessment scores on physical ability, pain and overall condition are sufficiently large to correspond to a subjective perception of a meaningful difference from the perspective of the patient. METHODS: Forty patients with a diagnosis of rheumatoid arthritis participated in an evening of clinical assessment and one-on-one conversations with each other regarding their arthritic condition. The assessments included tender and swollen joint counts, clinician and patient global assessments, participant assessment of pain and the Health Assessment Questionnaire (HAQ) on physical ability. After each conversation, participants rated themselves relative to their conversational partner on physical ability, pain and overall condition. These subjective comparative ratings were compared to the differences of the individual clinical assessments. RESULTS: In total there were 120 conversations. Generally participants judged themselves as less disabled than others. They rated themselves as "somewhat better" than their conversation partner when they had a (mean) 7% better score on the HAQ, 6% less pain, and 9% better global assessment. In contrast, they rated themselves as "somewhat worse" when they had a (mean) 16% worse score on the HAQ, 16% more pain, and 29% worse global assessment. CONCLUSIONS: Patients view clinically important differences in an asymmetric manner. These results can provide guidance in interpreting results and planning clinical trials.
Resumo:
Ghrelin is a multifunctional hormone, with roles in stimulating appetite and regulating energy balance, insulin secretion and glucose homeostasis. The ghrelin gene locus (GHRL) is highly complex and gives rise to a range of novel transcripts derived from alternative first exons and internally spliced exons. The wild-type transcript encodes a 117 amino acid preprohormone that is processed to yield the 28 amino acid peptide ghrelin. Here, we identified insulin-responsive transcription corresponding to cryptic exons in intron 2 of the human ghrelin gene. A transcript, termed in2c-ghrelin (intron 2-cryptic), was cloned from the testis and the LNCaP prostate cancer cell line. This transcript may encode an 83 AA preproghrelin isoform that codes for the ghrelin, but not obestatin. It is expressed in a limited number of normal tissues and in tumours of the prostate, testis, breast and ovary. Finally, we confirmed that in2c-ghrelin transcript expression, as well as the recently described in1-ghrelin transcript, is significantly upregulated by insulin in cultured prostate cancer cells. Metabolic syndrome and hyperinsulinaemia has been associated with prostate cancer risk and progression. This may be particularly significant after androgen deprivation therapy for prostate cancer, which induces hyperinsulinaemia, and this could contribute to castrate resistant prostate cancer growth. We have previously demonstrated that ghrelin stimulates prostate cancer cell line proliferation in vitro. This study is the first description of insulin regulation of a ghrelin transcript in cancer, and should provide further impetus for studies into the expression, regulation and function of ghrelin gene products.
Resumo:
The internet has become important in political communication in Australia. Using Habermas' ideal types, it is argued that political blogs can be viewed as public spheres that might provide scope for the expansion of deliberative democratic discussion. This hypothesis is explored through analysis of the group political blog Pineapple Party Time. It is evident that the bloggers and those who commented on their posts were highly knowledgeable about and interested in politics. Form an examination of these posts and the comments on them, Pineapple Party Time did act as a public sphere to some degree, and did provide for the deliberative discussion essential for a democracy, but it was largely restricted to Crikey readers. For a deliberative public sphere and democratic discussion to function to any extent, the public sphere must be open to all citizens, who need to have the access and knowledge to engage in deliberative discussion.
Resumo:
Two hundred years ago life writing was already highly popular in the form of autobiography, memoir, biography, journals, essays and diaries. It now commands a huge share of the publishing market, as there is an enormous demand from readers for narratives based directly on 'real lives'. There is a lot of common ground between the two main forms - autobiography/memoir and biography: both require skilled storytelling [rather than listing facts and events], research and imagination. The quality of the writing itself is crucial to the impact on the reader. A person can have an existing, worthy life but unfortunately write about it (or be written about) in a dull way. And how a person is remembered and valued can be a factor of life writing about or by them. This chapter will define and contextualise life writing, look at specific detailed examples, and offer guidance on how to write effectively.
Resumo:
'Contemporary Australia: Women' is the second in a series of triennial exhibitions at the Gallery of Modern Art in Queensland, providing a survey of contemporary art practices across the country. This exhibition's focus on women artists comes in the wake of a number of high profile international exhibitions looking at women artists in both contemporary and historical contexts. This review situates the exhibition within this field and considers its significance.
Resumo:
What is contemporary art and what are the key components of contemporary culture? This review demonstrates where Terry Smith provides important answers to this question. The books thus help to improve understanding of how art has changed in recent decades and how a global culture now shapes its parameters. This review does not however concur that Smith provides a convincing case for a complete cultural paradigm transformation.
Resumo:
In this paper, the author describes recent developments in the assessment of research activity and publication in Australia. Of particular interest to readers will be the move to rank academic journals. Educational Philosophy and Theory (EPAT) received the highest possible ranking, however, the process is far from complete. Some implications for the field, for this journal and particularly, for the educational foundations are discussed.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
This is the protocol for a review and there is no abstract. The objectives are as follows:The primary objective of the review is to assess the effectiveness of primary, secondary and tertiary intervention programmes utilised to reduce or prevent, or both, elderly abuse in organisational, institutional and community settings. We will also identify and report on adverse consequences or effects of the intervention/s in the review.The secondary objective is to investigate whether intervention?s effects are modified by types of abuse, types of participants, setting of intervention or cognitive status of the elderly.
Resumo:
Tax law and policy is a vital part of Australian society. Australian society insists that the Federal Government provide extensive public programs, such as health services, education, social security, foreign aid, legal infra¬structure, regulation, police services, national defence and funding for sports development. These programs are costly to provide and are funded by taxation. The aim of this book is to introduce and explain the principles of tax law and tax policy in plain English. The book contains detailed commentary on tax principles together with extracts from cases and materials that illustrate the application of the principles. The book considers tax policy and the economic and social aspects of tax law. While tax students must develop technical competence in tax law, given the speed with which changes are made to the technical details of tax law, it is also important to grasp tax principles and policy to understand why tax law has changed or why it should change. The chapters are structured to direct readers to the key provisions of the tax law. Each case is introduced by an explanation of the facts, followed by the taxpayer’s arguments, the Commissioner’s assertions and the decision of the Administrative Appeals Tribunal or a court. The commentary guides readers through the issues considered in the judgments. The book contains extracts from: articles; materials dealing with tax policy; and the Commissioner’s rulings. The book also has references for further reading and medium-neutral citations (Internet citations) for cases decided since 1998.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
This paper reports on an action-learning project conducted within the first year criminal justice curriculum in an Australian university. The project was initiated after an audit of first year units and student feedback revealed that there were gaps in the curriculum that possibly were disadvantaging certain groups of students, including mature, international, queer and disabled students, rendering them invisible. Official (university controlled student surveys and other feedback mechanisms) and anecdotal feedback found that at least some students in these groups felt disenfranchised; that is, unable to relate to either the subject mater, other students, or the university setting itself. As a school in which social justice provides the context for learning about criminal justice, first year subject coordinators as a group came to recognise the need for embedding diversity in the curriculum.
Resumo:
Explores the experiences of Vietnamese immigrants in Australia. Description What is it like to be a refugee in a country that has a completely different culture from your own, where you feel very different from those around you? With a fine eye for detail and keen empathy for her interviewees, Mandy Thomas explores the experiences of Vietnamese living in Australia. She examines displacement and loss, the ongoing effects of war trauma, and international and community politics. While reflecting on many of the contemporary debates on identity and communality, she explores the concrete realities of Vietnamese lives through their daily experiences. She discusses how Vietnamese families have adapted Western domestic architecture to create a more comfortable home environment, how traditional festivals now serve new purposes, and the changing nature of status and gender relations. She describes the reception of the Vietnamese by the wider Australian society and in the media, and she explores the ongoing ties that overseas Vietnamese have with their homeland. Dreams in the Shadows is a valuable resource for anyone working with immigrant communities, for readers interested in Vietnamese immigration to Western countries, and for researchers of migration and multiculturalism. 'Dreams in the Shadows is a wonderfully sensitive account of Vietnamese in Australia that provides insight into the worlds of Vietnamese immigrants and the often marginalizing orders of the host society.' Bruce Kapferer, Professor of Anthropology, James Cook University and University College London 'A perceptive, sensitive and culturally nuanced account of one of the most recently formed diasporas - that of Vietnamese in Sydney. Deserves to be widely read.' Pnina Werbner, Reader in Social Anthropology, Keele University
Resumo:
"Language, Literacy and Literature combines concepts of language, literature and literacy within a pedagogical framework that leads readers through a series of learning processes. In other words, it is as much a book about teaching English as it is a book about learning how to learn about teaching. The book provides models for pre-service teachers to help identify the kinds of dispositions towards learning that a teacher needs to develop, such as curiosity, collaboration and willingness to ‘give things a go’. It further challenges the pre-service teacher to question what they think they know, as well as discover what they need to know. A range of practical and relevant exercises and activities assist in building habits of reflexive practice."-- publisher website