744 resultados para critical approaches


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Protection of “critical infrastructure” has become a major issue for govern- ments worldwide. Yet in Australia, as in many other countries, including the United States, an estimated 90% of critical infrastructure is privately owned or operated commercially – in other words, critical infrastructure protection is not the exclusive domain of government. As a result, information sharing between government and the private sector has become a vitally important component of effective risk management. However, establishing effective arrangements of this kind between the public and private sector needs to take account of existing regimes of access and public disclosure which relate to government-held documents; in particular, that which is established by freedom of information (FOI) legislation. This article examines the extent to which the current Commonwealth FOI regime is likely to act as an impediment to the private sector operators of critical infrastructure participat- ing in government-operated information sharing arrangements. By examining developments in other jurisdictions, principally the United States, the article considers whether amendments to the current Australian FOI regime are necessary to ensure effective participation, consistent with the underlying object and purpose of FOI.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mark Taylor's new essay assesses the impact of the diagram on interior design from the late 19th century to the present. Taylor identifies the pop-cultural discourse of advice writing in both books and magazines as a starting point for his analysis. Drawing on diverse sources, his analysis focuses on texts relating to the dynamics of use and flexibility by Catherine Beecher, Harriet Beecher Stowe, Melusina Fay Peirce, Mary Haweis and Christine Frederick among others. The examples in these texts use the home, domestic housekeeping and kitchens as the sites and practices of intervention through which interior design innovations can be enacted. Taylor's analysis identified the innovations in both the social and the political aspects of space and the critique of static space behind these seemingly amateurish and innocuous texts. Identifying these contributions as early precursors of Modernism's open-plan and flexible, dynamic spaces, Taylor also interprets them with a critical concern for the oppositions and hierarchies that can exist in spatial design, and which are the hallmarks of recent Postmodern, phenomenological approaches to interior design and its theorisations. The progressive and subversive "paradigms for living" implicit in these diagrams can be argued to present a model of greater economic, social and political equality as well as representing a more balanced set of power relations in the home. Progressing through the 20th century to the present, Taylor's analysis shifts byond the dressed body and on to the more intimate rituals of the revealed body to further examine how diagrams of the interior, and the interior as a set of diagrams, are also mediators, sites and grounds for the design of social and sexual intimacy. Through a consideration of the link between design, indentity and intimacy (whether of the invisible, fashioned or sexualised body), the diagrms of interiors are reconfigured as radical and critical tools for an animate, material and emancipatory "redressing" of the balance between the body, identity, sexuality, gender, function, mis(use), aesthetics and the interior.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Street Computing workshop, held in conjunction with OZCHI 2009, solicits papers discussing new research directions, early research results, works-in-progress and critical surveys of prior research work in the areas of ubiquitous computing and interaction design for urban environments. Urban spaces have unique characteristics. Typically, they are densely populated, buzzing with life twenty-four hours a day, seven days a week. These traits afford many opportunities, but they also present many challenges: traffic jams, smog and pollution, stress placed on public services, and more. Computing technology, particularly the kind that can be placed in the hands of citizens, holds much promise in combating some of these challenges. Yet, computation is not merely a tool for overcoming challenges; rather, when embedded appropriately in our everyday lives, it becomes a tool of opportunity, for shaping how our cities evolve, for enabling us to interact with our city and its people in new ways, and for uncovering useful, but hidden relationships and correlations between elements of the city. The increasing availability of an urban computing infrastructure has lead to new and exciting ways inhabitants can interact with their city. This includes interaction with a wide range of services (e.g. public transport, public services), conceptual representations of the city (e.g. local weather and traffic conditions), the availability of a variety of shared and personal displays (e.g. public, ambient, mobile) and the use of different interaction modes (e.g. tangible, gesture-based, token-based). This workshop solicits papers that address the above themes in some way. We encourage researchers to submit work that deals with challenges and possibilities that the availability of urban computing infrastructure such as sensors and middleware for sensor networks pose. This includes new and innovative ways of interacting with and within urban environments; user experience design and participatory design approaches for urban environments; social aspects of urban computing; and other related areas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Context is acknowledged as a significant feature of a negotiation. Background information about the relationship between the parties, available resources and organisational data are readily identifiable as key components of the contextual make-up of negotiations. However, information deriving from the broader setting of the negotiation may be less well-utilised or simply taken-for-granted in a negotiation. This paper suggests that this broader setting, discussed under the rubric of governance, is a critical facet of the context of negotiations. The paper explores the notion of governance and traces its relationship with negotiation. It then offers a framework that sets out the different governance approaches and allows for identifying and assessing potential negotiation strategies according to the dominant governance mode. It concludes that while a mix of governance approaches may be present in negotiations, identifying ‘ideal types’ or dominant governance modes assists in choosing appropriate strategies for successfully undertaking negotiations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents several shaft voltage reduction techniques for doubly-fed induction generators in wind turbine applications. These techniques includes: pulse width modulated voltage without zero vectors, multi-level inverters with proper PWM strategy, better generator design to minimize effective capacitive couplings in shaft voltage, active common-mode filter, reducing dc-link voltage and increasing modulation index. These methods have been verified with mathematical analysis and simulations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Innovation can be defined broadly to include the development and uptake of new technology, the introduction of new products, the utilisation of new market opportunities and the implementation of new business processes including new forms of work organisation or management structures and approaches. Innovation, or the commercial application of new knowledge, is of increasing importance to economic competitiveness given the growth in production and trade in high technology industries and knowledge intensive service sectors such as business services (Edquist, Hommen and McKelvey 2001). An important field of innovation in modern economies is associated with the rapid development and application of information and communications technologies (ICTs). ICTs constitute an increasing share of value added, growth and employment and also impact on employment and productivity in other industry sectors. The structural transformation of modern economies associated with ICTs has led to an increase in the importance of information and knowledge resources (rather than physical capital) as inputs or factors of production. Technology and product innovations are often given central attention in innovation research, however, organisational and managerial changes have been recognised as critical. Over the last two decades, understandings of the nature and process of innovation have advanced significantly. In the 1950s and 1960s, there was a view that innovation resulted from basic research, or in essence that scientific research acted as a 'push' for innovation. As such there was a great deal of emphasis on formal research and development, undertaken either by governments or research and development units within business organisations. Radical innovations involving new products and new technological trajectories were thought to derive from basic research (Freeman 1995).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Few studies have evaluated the reliability of lifetime sun exposure estimated from inquiring about the number of hours people spent outdoors in a given period on a typical weekday or weekend day (the time-based approach). Some investigations have suggested that women have a particularly difficult task in estimating time outdoors in adulthood due to their family and occupational roles. We hypothesized that people might gain additional memory cues and estimate lifetime hours spent outdoors more reliably if asked about time spent outdoors according to specific activities (an activity-based approach). Using self-administered, mailed questionnaires, test-retest responses to time-based and to activity-based approaches were evaluated in 124 volunteer radiologic technologist participants from the United States: 64 females and 60 males 48 to 80 years of age. Intraclass correlation coefficients (ICC) were used to evaluate the test-retest reliability of average number of hours spent outdoors in the summer estimated for each approach. We tested the differences between the two ICCs, corresponding to each approach, using a t test with the variance of the difference estimated by the jackknife method. During childhood and adolescence, the two approaches gave similar ICCs for average numbers of hours spent outdoors in the summer. By contrast, compared with the time-based approach, the activity-based approach showed significantly higher ICCs during adult ages (0.69 versus 0.43, P = 0.003) and over the lifetime (0.69 versus 0.52, P = 0.05); the higher ICCs for the activity-based questionnaire were primarily derived from the results for females. Research is needed to further improve the activity-based questionnaire approach for long-term sun exposure assessment. (Cancer Epidemiol Biomarkers Prev 2009;18(2):464–71)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There are increasing indications that the contribution of holding costs and its impact on housing affordability is very significant. Their importance and perceived high level impact can be gauged from considering the unprecedented level of attention policy makers have given them recently. This may be evidenced by the embedding of specific strategies to address burgeoning holding costs (and particularly those cost savings associated with streamlining regulatory assessment) within statutory instruments such as the Queensland Housing Affordability Strategy, and the South East Queensland Regional Plan. However, several key issues require further investigation. Firstly, the computation and methodology behind the calculation of holding costs varies widely. In fact, it is not only variable, but in some instances completely ignored. Secondly, some ambiguity exists in terms of the inclusion of various elements of holding costs and assessment of their relative contribution. Perhaps this may in part be explained by their nature: such costs are not always immediately apparent. They are not as visible as more tangible cost items associated with greenfield development such as regulatory fees, government taxes, acquisition costs, selling fees, commissions and others. Holding costs are also more difficult to evaluate since for the most part they must be ultimately assessed over time in an ever-changing environment based on their strong relationship with opportunity cost which is in turn dependant, inter alia, upon prevailing inflation and / or interest rates. This paper seeks to provide a more detailed investigation of those elements related to holding costs, and in so doing determine the size of their impact specifically on the end user. It extends research in this area clarifying the extent to which holding costs impact housing affordability. Geographical diversity indicated by the considerable variation between various planning instruments and the length of regulatory assessment periods suggests further research should adopt a case study approach in order to test the relevance of theoretical modelling conducted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article develops a critical analysis of the ideological framework that informed the Australian Federal government’s 2007 intervention into Northern Territory Indigenous communities (ostensibly to address the problem of child sexual abuse). Continued by recently elected Prime Minister, Kevin Rudd, the NT ‘emergency response’ has aroused considerable public debate and scholarly inquiry. In addressing what amounts to a broad bi-partisan approach to Indigenous issues we highlight the way in which Indigenous communities are problematised and therefore subject to interventionist regimes that override differentiated Indigenous voices and intensify an internalised sense of rage occasioned by disempowering interventionist projects. We further argue that in rushing through the emergency legislation and suspending parts of the Racial Discrimination Act, the Howard and Rudd governments have in various ways perpetuated racialised and neo-colonial forms of intervention that override the rights of Indigenous people. Such policy approaches require critical understanding on the part of professions involved most directly in community practice, particularly when it comes to mounting effective opposition campaigns. The article offers a contribution to this end.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article uses critical discourse analysis to analyse material shifts in the political economy of communications. It examines texts of major corporations to describe four key changes in political economy: (1) the separation of ownership from control; (2) the separation of business from industry; (3) the separation of accountability from responsibility; and (4) the subjugation of ‘going concerns’ by overriding concerns. The authors argue that this amounts to a political economic shift from traditional concepts of ‘capitalism’ to a new ‘corporatism’ in which the relationships between public and private, state and individual interests have become redefined and obscured through new discourse strategies. They conclude that the present financial and regulatory ‘crisis’ cannot be adequately resolved without a new analytic framework for examining the relationships between corporation, discourse and political economy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Increasingly, major insurers and reinsurers are operating on a global basis. For example, General Re Corporation and Cologne Re operate in almost 150 countries : see "General Re Corporation 1999 Annual Report". This is also true for the world's major brokers, and the emergence of large broking conglomerates such as Aon and Marsh are good examples of global service providers. Against the background of this increasingly global insurance market with global participants, there are a range of common legal issues in this article but a selection of certain critical matters are canvassed in the secitons below. First there are a range of regulatory issues that must be addressed. Secondly globalisation of the industry does create added incentive for a common legal regime to cover the formation of insurance transactions and the resolution of disputes about claims, coverage and termination. In this contect codifcation of insurance laws is a critical issue. Thirdly, major advances in genetic research and biotechnology over recent years have resulted in a dramatic increase in the availability of genetic testing. These developments have given rise to concerns worldwide about the potential for misuse of genetic information by third parties such as insurers and employers. Fourthly, the essence of an insurance transaction is the transference of risk from one person to anther. It is generally accepted that this transference should occur in informed circumstances and without undue advantage being bestowed upon either party. Finally this article will consider some legal matter in relation to transacting insurance on the internet

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rapid advancements in the field of genetic science have engendered considerable debate, speculation, misinformation and legislative action worldwide. While programs such as the Human Genome Project bring the prospect of seemingly miraculous medical advancements within imminent reach, they also create the potential for significant invasions of traditional areas of privacy and human dignity through laying the potential foundation for new forms of discrimination in insurance, employment and immigration regulation. The insurance industry, which has of course, traditionally been premised on discrimination as part of its underwriting process, is proving to be the frontline of this regulatory battle with extensive legislation, guidelines and debate marking its progress.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis investigates the phenomenon of self-harm as a form of political protest using two different, but complementary, methods of inquiry: a theoretical research project and a novel. Through these two approaches, to the same research problem, I examine how we can re-position the body that self-harms in political protest from weapon to voice; and in doing so find a path towards ethical and equitable dialogue between marginalised and mainstream communities. The theoretical, or academic, portion of the thesis examines self-harm as protest, positing these acts as a form of tactical selfharm, and acknowledge its emergence as a voice for the otherwise silenced in the public sphere. Through the use of phenomenology and feminist theory I examine the body as site for political agency, the circumstances which surround the use of the body for protest, and the reaction to tactical self-harm by the individual and the state. Using Bakhtin’s concept of dialogism, and the dialogic space I propose that by ‘hearing’ the body engaged in tactical selfharm we come closer to entering into an ethical dialogue with the otherwise silenced in our communities (locally, nationally and globally). The novel, Imperfect Offerings, explores these ideas in a fictional world, and allows me to put faces, names and lives to those who are compelled to harm their bodies to be heard. Also using Bakhtin’s framework I encourage a dialogue between the critical and creative parts of the thesis, challenging the traditional paradigm of creative PhD projects as creative work and exegesis.