473 resultados para Personal Security.


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigated changes in pre-service teachers’ personal epistemologies as they engaged in an integrated teaching program. Personal epistemology refers to individual beliefs about the nature of knowing and knowledge and has been shown to influence teaching practice. An integrated approach to teaching, based on both an implicit and explicit focus on personal epistemology, was developed by an academic team within a Bachelor of Education (Early Childhood). The teaching program integrated content across four units of study, modelling personal epistemologies implicitly through collaborative reflexive practice. The students were also required to engage in explicit reflections on their personal epistemologies. Quantitative measures of personal epistemology were collected at the beginning and end of the semester using the Epistemological Beliefs Survey (EBS) to assess changes across the teaching period. Results indicated that pre-service teachers’ epistemological beliefs about the integration of knowledge became more sophisticated over the course of the teaching period. Qualitative data included pre-service teachers’ responses to open ended questions and field experience journal reflections about their perceptions of the teaching program and were collected at the end of the semester. These data showed that pre-service teachers held different conceptions about learning as integration, which provided a more nuanced understanding of the EBS data. Understanding pre-service teachers’ epistemological beliefs provides promising directions for teacher preparation and professional enrichment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Privacy has become one of the main impediments for e-health in its advancement to providing better services to its consumers. Even though many security protocols are being developed to protect information from being compromised, privacy is still a major issue in healthcare where privacy protection is very important. When consumers are confident that their sensitive information is safe from being compromised, their trust in these services will be higher and would lead to better adoption of these systems. In this paper we propose a solution to the problem of patient privacy in e-health through an information accountability framework could enhance consumer trust in e-health services and would lead to the success of e-health services.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A growing body of personal epistemology research shows that personal epistemologies influence student learning, particularly in academic contexts. However, we know little about how personal epistemologies relate to teaching, and even less about teacher education. This introductory chapter sets the stage for this book which brings together a range of international researchers in the field of personal epistemology, teaching, and teacher education. This introductory chapter explores personal epistemology as a construct in the field of teaching and teacher education. In particular, it focuses on teacher education a one contextual influence on personal epistemologies by exploring the nature of teachers' personal epistemologies, teachers' personal epistemologies and learning, teachers' personal epistemologies and teaching, and changing personal epistemology in teacher education programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The interoperable and loosely-coupled web services architecture, while beneficial, can be resource-intensive, and is thus susceptible to denial of service (DoS) attacks in which an attacker can use a relatively insignificant amount of resources to exhaust the computational resources of a web service. We investigate the effectiveness of defending web services from DoS attacks using client puzzles, a cryptographic countermeasure which provides a form of gradual authentication by requiring the client to solve some computationally difficult problems before access is granted. In particular, we describe a mechanism for integrating a hash-based puzzle into existing web services frameworks and analyze the effectiveness of the countermeasure using a variety of scenarios on a network testbed. Client puzzles are an effective defence against flooding attacks. They can also mitigate certain types of semantic-based attacks, although they may not be the optimal solution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes an effective method for signal-authentication and spoofing detection for civilian GNSS receivers using the GPS L1 C/A and the Galileo E1-B Safety of Life service. The paper discusses various spoofing attack profiles and how the proposed method is able to detect these attacks. This method is relatively low-cost and can be suitable for numerous mass-market applications. This paper is the subject of a pending patent.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter summarizes the responses to four questions in each of the chapters in this volume. The questions addressed the use of a conceptual framework that guides the chapter, issues of domain-generality, how personal epistemology relates to teaching, and how personal epistemologies change. We concluded that all of the chapters discussed the distinction between constructivist and transmission teaching practices, while suggesting that there are many inconsistencies in understanding the relationship between the nature of beliefs and teachers’ practices regardless of the relative sophistication of teachers’ personal epistemologies. We also summarized a multi-component instructional model for calibrating teaching practices based on suggestions in each of the chapters, and made four suggestions for future research, including the need for an integrated theory that accounts for the development and manifestations of personal pistemology in the classroom, the generalizability of fi ndings across different measurements, a set of guidelines to promote teacher epistemological change, and an explicit instructional model that explains the development and calibration of beliefs and practices. The goal of this volume was to examine the relationship between teachers’ personal epistemologies and teacher education. Sixteen different chapters addressed one or more aspects of this issue. Although each of the chapters addressed different aspects of teachers’ personal epistemologies, a number of common themes are apparent across the chapters. We believe it is useful to articulate these themes in greater detail to provide a better retrospective understanding of this volume, as well as a better prospective framework for future research and changes to teacher training programs. We divide this chapter into two main sections. The fi rst section addresses four key questions about the nature of teachers’ personal epistemologies that were discussed in the introductory chapter as part of a larger set of questions. These questions focus on how to conceptualize these beliefs as explicit models; whether beliefs are domain-specifi c or domain-general; how beliefs are related to teaching; and how beliefs change over time. We provide a summary of each chapter in terms of these four questions. The second section proposes four general suggestions for future research based on the studies reported within this volume.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender’s strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker’s incentives and knowledge.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Machine learning has become a valuable tool for detecting and preventing malicious activity. However, as more applications employ machine learning techniques in adversarial decision-making situations, increasingly powerful attacks become possible against machine learning systems. In this paper, we present three broad research directions towards the end of developing truly secure learning. First, we suggest that finding bounds on adversarial influence is important to understand the limits of what an attacker can and cannot do to a learning system. Second, we investigate the value of adversarial capabilities-the success of an attack depends largely on what types of information and influence the attacker has. Finally, we propose directions in technologies for secure learning and suggest lines of investigation into secure techniques for learning in adversarial environments. We intend this paper to foster discussion about the security of machine learning, and we believe that the research directions we propose represent the most important directions to pursue in the quest for secure learning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia has witnessed a continual increase in maternal employment over the past two decades, which has placed focus on child care- its effects on the child and on early childhood education and care policy and provision. The engagement of women in the paid workforce contributes to national economic development, and is recognised in government policy incentives such as cash subsidies and tax relief for child care fees. These incentives are targeted towards mothers, to encourage them to engage in paid work. Making a contribution to the family’s economy and to a mother’s economic self sufficiency are two key drivers for women’s engagement in satisfying paid work. Many women also seek to maintain a personal investment in the development of their career, simultaneously ensuring that the child is experiencing suitable care. Policies that support women’s choices for satisfying workforce engagement and care arrangements are prudent for ensuring productivity of the economy as well as for enhancing the wellbeing of parents and children (OECD, 2007). Policies that provide family friendly employment arrangements, paid parental leave, and child care support, directly affect maternal employment decisions. Availability of family friendly employment policies is viewed as one way to not only promote gender equity in employment opportunities but also support the wellbeing of children and families (OECD, 2007). Yet there are not comprehensive and coherent policies on work and family in Australia. Australia is due to implement its first paid parental leave scheme in January, 2011. At the time of the data collection of this research, June 2007 to December 2008, Australia had no statutory provision for paid parental leave. To date, most research has focused on the consequences of paid work and care decisions made by women. Far less is known about the processes of decision-making and reasons underlying women’s choices. Investigation of what is most salient for women as they make decisions regarding engagement in paid work, and care for their child is important in order to inform policy and practices related to parental leave, family friendly employment and care for the child. This prospective longitudinal research was of 124 Australian expectant first-time mothers who completed questionnaires in their third trimester of pregnancy, and again at six and twelve months postpartum. First-time expectant mothers' decisions regarding engaging in paid work and selecting care for their child represent those of a group who are invested in motherhood and have usually had direct experience of engaging in paid work. They therefore provide an important insight into society’s idealised views about motherhood and the emotional and social uncertainty of making personal decisions where the consequences of such decisions are unknown. These decisions reflect public beliefs about the role of women in contributing to the country’s productivity and decisions about providing for the economic and emotional care needs of their family. As so little is known about the reasoning and processes of decision-making of women’s choices regarding paid work and care of the child this research was designed to capture expectant first-time mother’s preferred options for engaging in paid work and the care of their child, and investigate their actual decisions made at six and 12 months postpartum. To capture preferred options, decisions and outcomes of decisions regarding paid work and care of the child a prospective longitudinal research design was utilised. This design had three important components that addressed key limitations in the extant literature. First the research commenced in pregnancy in order to investigate preferences and beliefs about paid work and care and to examine baseline data that may influence decisions made as the women returned to paid work. Second the research involved longitudinal tracking from the antenatal time point to six and 12 months postpartum in order to identify the influences on decisions made. Third the research measured outcomes of the decisions made at each time point. This research examined the intentions, preferences, beliefs, influences, and outcomes of the decisions about engagement in paid work and choice of care. The analyses examined factors predicting return to paid work, the timing of return and extent of engagement in paid work; the care for the child; satisfaction with paid work; satisfaction with care for the child, motherhood and fulfilment; and maternal wellbeing at six and 12 months postpartum. The factors of interest were both rational/economic (availability and extent of paid and unpaid maternity leave; flexible work patterns) and emotional/affective (career satisfaction, investment in motherhood, and concern with quality of care for the child). Results indicated a group preference, and realisation for, return to paid work within the first year after the birth of a child but with reduction in hours to part-time. Most women saw paid work not only as a source of income but also as source of personal satisfaction. There were four key themes arising from this research. First, the women strived to feel emotionally secure when deciding about engaging in paid work and care of the child. To achieve emotional security women made their decisions for paid work and care of the child differently. A woman’s decision for maternal employment is a function of her personal beliefs, preferences and context regarding paid work and care of the child. She adjusts her established work identity with her new identity as a mother. The second key theme from this research is that the women made their decisions for maternal employment in response to their personal context and there were different levels of opportunities between the women’s choices. There is inequity of entitlement regarding work conditions associated with a woman’s education level. This has implications for the woman’s engagement in paid work, and her child’s health and wellbeing. The third key theme is that the quality of the child’s care mattered to the women in the research. They preferred care provided by parents and/or relatives more than any other types of care. The fourth key theme identified that satisfaction and wellbeing outcomes experienced as a result of maternal employment decisions were a complex interaction between multiple factors that change across time with the ongoing development of the mother’s identity, and the development of the child. The implications for policy within Australia are that the employment of mothers in the workforce necessitates that non-parental care becomes a public concern, where there is universal access to good quality affordable care for every child, not just for those who can afford it. This is equitable and represents real choice while supporting the rights of the child (Thorpe, Cloney & Tayler, 2010), protecting and promoting the public interest (Cleveland & Krashinsky, 2010). Children’s health and wellbeing will be supported (Moore & Oberklaid, 2010) while children are in non-parental care, and they will be exposed to environments and experiences that support their learning and development. The significant design of the research enabled the trajectories of first-time expectant women to be tracked from the antenatal point to 12 months postpartum. But there were limitations: the small sample size, the over-representation of the sample being highly educated and the nature of a longitudinal research that is set within the economic, social and political context at that time. These limitations are discussed in relation to suggestions for future research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Historical vignettes are interesting short stories which encapsulate a brief period of scientific history. They can be useful tools for teaching the nature of science, demonstrating the practices of science and making science fun. Historical vignettes illustrate the role of people and social processes in science. In this paper I describe my experience with writing and presenting an historical vignette during a Biology unit. Included is a copy of the vignette and I have identified some possible improvements that might lead to better outcomes. This may be helpful for other teachers who wish to try this strategy for themselves.