367 resultados para group interview
Resumo:
While much narrative inquiry is concerned with issues of self and identity, doing study on the processes (the how) of self-making offers ongoing challenges to methodology. This article explores the creation of a dialogic space that assisted young adolescents to write about themselves and their daily lives using email journals as an alternative to face-to-face interviews. With the researcher acting as a listener-responder, and in the absence of researcher-designed questions, a dynamic field was opened up for participant-led self-making to emerge over a six month period of self-reflective written expression. The article describes a shared email relationship based on a dialogic pattern of thinking, writing, listening and response intended to foster participants’ voices as ontological narratives of self. Findings show the use of email journals created a synergy for self-disclosure and a safe space for self-expression where the willingness of participants to be themselves was encouraged. The self-representations of a specific group of gifted young adolescents thus emerged as written versions of “who” they are —offering data that differs from interview approaches and contributing to discussion of the value of ontology narratives.
Resumo:
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
Resumo:
In ‘something 2.0’, a section of a Hollywood film is re-edited to include textual elements that appear as ‘Pinocchio-ish’ protrusions from the actors faces. As they sit in what appears to be an interview or therapy session, this re-editing and looping imposes a new fictionalized narrative upon the characters. The histrionic yet vague nature of the text, and its imperfect integration into the footage, can be read as both a comical imposition and a failed critical gesture, both speaking to the complications involved in the relationship of the artist and the fan as they engage with popular culture. Thw work was included in the group show 'Perfection' part of the Metro Arts Artistic Program 2008.
Resumo:
Many education systems are experiencing a re-scaling and consolidation of governance through rolling national agendas of standardisation and centralisation. This paper considers the case of Australia as it moves towards implementing its first national curriculum, to explore how teacher educators plan to retain pedagogical space for debate, diversity and contestation of such systemic curricular reform. This paper reports on an interview study conducted with nine teacher educators across the four curriculum areas included in the first wave of the Australian Curriculum: English, Science, Mathematics and History. The analysis reveals how teacher educators reported professional dilemmas around curricular design, and planned to resolve such dilemmas between the anticipated changes and their preferences for what might have been. While different curricular areas displayed different patterns of professional dilemma, the teacher educators are shown to construe their role as one of active curriculum mediators, who, in recontextualising curricular reforms, will use the opportunity to reinsert both residualised and emergent alternatives in their students’ professional value sets. The study also identifies a new set of dilemmas emerging around the politicisation and standardisation of curriculum, and its impact on the teaching profession and teacher educators.
Resumo:
Previous research has shown resistance to extinction of fear conditioned to racial out-group faces, suggesting that these stimuli may be subject to prepared fear learning. The current study replicated and extended previous research by using a different racial out-group, and testing the prediction that prepared fear learning is unaffected by verbal instructions. Four groups of Caucasian participants were trained with male in-group (Caucasian) or out-group (Chinese) faces as conditional stimuli; one paired with an electro-tactile shock (CS+) and one presented alone (CS). Before extinction, half the participants were instructed that no more shocks would be presented. Fear conditioning, indexed by larger electrodermal responses to, and blink startle modulation during the CS+, occurred during acquisition in all groups. Resistance to extinction of fear learning was found only in the racial out-group, no instruction condition. Fear conditioned to a racial out-group face was reduced following verbal instructions, contrary to predictions for the nature of prepared fear learning.
Resumo:
Three types of shop scheduling problems, the flow shop, the job shop and the open shop scheduling problems, have been widely studied in the literature. However, very few articles address the group shop scheduling problem introduced in 1997, which is a general formulation that covers the three above mentioned shop scheduling problems and the mixed shop scheduling problem. In this paper, we apply tabu search to the group shop scheduling problem and evaluate the performance of the algorithm on a set of benchmark problems. The computational results show that our tabu search algorithm is typically more efficient and faster than the other methods proposed in the literature. Furthermore, the proposed tabu search method has found some new best solutions of the benchmark instances.
Resumo:
Acknowledgement that many children in Australia travel in restraints that do not offer them the best protection has led to recent changes in legislation such that the type of restraint for children under 7 years is now specified. This paper reports the results of two studies (observational; focus group/ survey) carried out in the state of Queensland to evaluate the effectiveness of these changes to the legislation. Observations suggested that almost all of the children estimated as aged 0-12 years were restrained (95%). Analysis of the type of restraint used for target-aged children (0-6 year olds) suggests that the proportion using an age-appropriate restraint has increased by an estimated 7% since enactment of the legislation. However, around 1 in 4 children estimated as aged under 7 years were using restraints too large for good fit. Results from the survey and focus group suggested parents were supportive of the changes in legislation. Non-Indigenous parents agreed that the changes had been necessary, were effective at getting children into the right restraints, were easy to understand as well as making it clear what restraint to use with children. Moreover, they did not see the legislation as too complicated or too hard to comply with. Indigenous parents who participated in a focus group also regarded the legislation as improving children’s safety. However, they identified the cost of restraints as an important barrier to compliance. In summary, the legislation appears to have had a positive effect on compliance levels and on raising parental awareness of the need to restrain children child-specific restraints for longer. However, it would seem that an important minority of parents transition their children into larger restraints too early for optimal protection. Intervention efforts should aim to better inform these parents about appropriate ages for transition, especially from forward facing childseats. This could potentially be through use of other important transitions that occur at the same age, such as starting school. The small proportion of parents who do not restrain their children at all are also an important community sector to target. Finally, obtaining restraints presents a significant barrier to compliance for parents on limited incomes and interventions are needed to address this.
Resumo:
We derive an explicit method of computing the composition step in Cantor’s algorithm for group operations on Jacobians of hyperelliptic curves. Our technique is inspired by the geometric description of the group law and applies to hyperelliptic curves of arbitrary genus. While Cantor’s general composition involves arithmetic in the polynomial ring F_q[x], the algorithm we propose solves a linear system over the base field which can be written down directly from the Mumford coordinates of the group elements. We apply this method to give more efficient formulas for group operations in both affine and projective coordinates for cryptographic systems based on Jacobians of genus 2 hyperelliptic curves in general form.
Resumo:
Safety psychology and workplace safety Commitment, Motivational and attitudinal components of safety Leadership Group Dynamics and Group Change Case Study from Construction
Resumo:
This paper reports on a unique study of a large, random sample of business start-ups that were identified prior to the actual, commercial launch of the ventures. The purpose of this paper is two-fold. First, to present frequencies on the involvement of the Swedish population in the small business sector (particularly in start-ups of firms) and to compare these with estimates from Norway and the USA, which are based on studies using a similar research design. The authors also discuss the possible reasons for the differences that emerge between countries. Second, the characteristics of nascent entrepreneurs (i.e. individuals trying to start an independent business) are analysed and compared for sub-groups within the sample and with characteristics of business founders as they appear in theoretical accounts or retrospective empirical studies of surviving all firms. In order to get a representative sample from the working age population, respondents (n = 30,427) were randomly selected and interviewed by telephone. It was found that 2.0% of the Swedish population at the time of the interview were trying to start an independent business. Sweden had a significantly lower prevalence rate of nascent entrepreneurs compared to Norway and the USA. Nascent entrepreneurs were then compared to a control group of people not trying to start a business. The results confirmed findings from previous studies of business founders pointing to the importance of role models and the impression of self-employment obtained through these, employment status, age, education and experience. Marital status, the number of children in the household, and length of employment experience were unrelated to the probability of becoming a nascent entrepreneur. The gender of the respondent was the strongest distinguishing factor. Importantly, the results suggest that while one has a reasonably good understanding of the characteristics associated with men going into business for themselves, the type of variables investigated here have very limited ability to predict nascent entrepreneur status for women.
Resumo:
Introduction The suitability of video conferencing (VC) technology for clinical purposes relevant to geriatric medicine is still being established. This project aimed to determine the validity of the diagnosis of dementia via VC. Methods This was a multisite, noninferiority, prospective cohort study. Patients, aged 50 years and older, referred by their primary care physician for cognitive assessment, were assessed at 4 memory disorder clinics. All patients were assessed independently by 2 specialist physicians. They were allocated one face-to-face (FTF) assessment (Reference standard – usual clinical practice) and an additional assessment (either usual FTF assessment or a VC assessment) on the same day. Each specialist physician had access to the patient chart and the results of a battery of standardized cognitive assessments administered FTF by the clinic nurse. Percentage agreement (P0) and the weighted kappa statistic with linear weight (Kw) were used to assess inter-rater reliability across the 2 study groups on the diagnosis of dementia (cognition normal, impaired, or demented). Results The 205 patients were allocated to group: Videoconference (n = 100) or Standard practice (n = 105); 106 were men. The average age was 76 (SD 9, 51–95) and the average Standardized Mini-Mental State Examination Score was 23.9 (SD 4.7, 9–30). Agreement for the Videoconference group (P0= 0.71; Kw = 0.52; P < .0001) and agreement for the Standard Practice group (P0= 0.70; Kw = 0.50; P < .0001) were both statistically significant (P < .05). The summary kappa statistic of 0.51 (P = .84) indicated that VC was not inferior to FTF assessment. Conclusions Previous studies have shown that preliminary standardized assessment tools can be reliably administered and scored via VC. This study focused on the geriatric assessment component of the interview (interpretation of standardized assessments, taking a history and formulating a diagnosis by medical specialist) and identified high levels of agreement for diagnosing dementia. A model of service incorporating either local or remote administered standardized assessments, and remote specialist assessment, is a reliable process for enabling the diagnosis of dementia for isolated older adults.
Resumo:
RAP-A was developed to meet the need for a universal resilience building program for teenagers which could be readily implemented in a school setting. A universal program targets all teenagers in a particular grade as opposed to those at higher risk for depression (indicated or selective approaches) or a treatment group. It is easier to recruit and engage adolescents in a universal approach where students do not face the risk of stigmatisation by being singled out for intervention. The Resourceful Adolescent Program (RAP: Shochet, Holland & Whitefield, 1997) was developed to meet this need.