410 resultados para others
Resumo:
The structures of bis(guanidinium)rac-trans-cyclohexane-1,2-dicarboxylate, 2(CH6N3+) C8H10O4- (I), guanidinium 3-carboxybenzoate monohydrate CH6N3+ C8H5O4- . H2O (II) and bis(guanidinium) benzene-1,4-dicarboxylate trihydrate, 2(CH6N3+) C8H4O4^2- . 3H2O (III) have been determined and the hydrogen bonding in each examined. All three compounds form three-dimensional hydrogen-bonded framework structures. In anhydrous (I), both guanidinium cations give classic cyclic R2/2(8) N--H...O,O'(carboxyl) and asymmetric cyclic R1/2(6) hydrogen-bonding interactions while one cation gives an unusual enlarged cyclic interaction with O acceptors of separate ortho-related carboxyl groups [graph set R2/2(11)]. Cations and anions also associate across inversion centres giving cyclic R2/4(8) motifs. In the 1:1 guanidinium salt (II), the cation gives two separate cyclic R1/2(6) interactions, one with a carboxyl O-acceptor, the other with the water molecule of solvation. The structure is unusual in that both carboxyl groups give short inter-anion O...H...O contacts, one across a crystallographic inversion centre [2.483(2)\%A], the other about a two-fold axis of rotation [2.462(2)\%A] with a half-occupancy hydrogen delocalized on the symmetry element in each. The water molecule links the cation--anion ribbon structures into a three-dimensional framework. In (III), the repeating molecular unit comprises a benzene-1,4-dicarboxylate dianion which lies across a crystallographic inversion centre, two guanidinium cations and two water molecules of solvation (each set related by two-fold rotational symmetry), and a single water molecule which lies on a two-fold axis. Each guanidinium cation gives three types of cyclic interactions with the dianions: one R^1^~2~(6), the others R2/3(8) and R3/3(10) (both of these involving the water molecules), giving a three-dimensional structure through bridges down the b cell direction. The water molecule at the general site also forms an unusual cyclic R2/2(4) homodimeric association across an inversion centre [O--H...O, 2.875(2)\%A]. The work described here provides further examples of the common cyclic guanidinium cation...carboxylate anion hydrogen-bonding associations as well as featuring other less common cyclic motifs.
Resumo:
Instrumental music performance is a well-established case of real-time interaction with technology and, when extended to ensembles, of interaction with others. However, these interactions are fleeting and the opportunities to reflect on action is limited, even though audio and video recording has recently provided important opportunities in this regard. In this paper we report on research to further extend these reflective opportunities through the capture and visualization of gestural data collected during collaborative virtual performances; specifically using the digital media instrument Jam2jam AV and the specifically-developed visualization software Jam2jam AV Visualize. We discusses how such visualization may assist performance development and understanding. The discussion engages with issues of representation, authenticity of virtual experiences, intersubjectivity and wordless collaboration, and creativity support. Two usage scenarios are described showing that collaborative intent is evident in the data visualizations more clearly than in audio-visual recordings alone, indicating that the visualization of performance gestures can be an efficient way of identifying deliberate and co-operative performance behaviours.
Resumo:
Lack of a universally accepted and comprehensive taxonomy of cybercrime seriously impedes international efforts to accurately identify, report and monitor cybercrime trends. There is, not surprisingly, a corresponding disconnect internationally on the cybercrime legislation front, a much more serious problem and one which the International Telecommunication Union (ITU) says requires „the urgent attention of all nations‟. Yet, and despite the existence of the Council of Europe Convention on Cybercrime, a proposal for a global cybercrime treaty was rejected by the United Nations (UN) as recently as April 2010. This paper presents a refined and comprehensive taxonomy of cybercrime and demonstrates its utility for widespread use. It analyses how the USA, the UK, Australia and the UAE align with the CoE Convention and finds that more needs to be done to achieve conformance. We conclude with an analysis of the approaches used in Australia, in Queensland, and in the UAE, in Abu Dhabi, to fight cybercrime and identify a number of shared problems.
Resumo:
In this world of continuous change, there’s probably one certainty: more change lies ahead. Our students will encounter challenges and opportunities that we can’t even imagine. How do we prepare our students as future citizens for the challenges of the 21st century? One of the most influential public intellectuals of our time, Howard Gardner, suggests that in the future individuals will depend to a great extent on the capacity to synthesise large amounts of information. ‘They will need to be able to gather together information from disparate sources and put it together in ways that work for themselves and can be communicated to other persons’(Gardner 2008, p. xiii). One of the first steps in ‘putting things together’ so they ‘work’ in the mind is ‘to group objects and events together on the basis of some similarity between them’ (Lee & das Gupta 1995, p. 116). When we do this and give them a collective name, we are conceptualising. Apart from helping to save our sanity by simplifying the vast amounts of data we encounter every day, concepts help us to understand and gain meaning from what we experience. Concepts are essential for synthesising information and they also help us to communicate with others. Put simply, concepts serve as building blocks for knowledge, understanding and communication. This chapter addresses the importance of teaching and learning about concepts and conceptual development in studies of society and environment. It proceeds as follows: first, it considers how individuals use concepts, and, second, it explores the characteristics of concepts; the third section presents a discussion of approaches that might be adopted by teachers intending to help their students build concepts in the classroom.
Resumo:
Like other nations, Australia has experienced significant change in the past few decades as its society has become increasingly diverse. The new cultures and traditions that result from ethnic and religious diversity have both enriched Australian society and presented it with some challenges. Other challenges have resulted from increased globalisation. For example, the economic fallout from the recent global financial crisis indicates that global issues can impact across a range of levels, from multinational corporations and nation-states to local sites and individual livelihoods. Some suggest that Australia fared better than other nations during this economic crisis because of its export trade with China. Although this is disputed by economists, it highlights another facet of change that is impacting on Australian society and this relates to Australia’s growing engagement with the nations of Asia. There is increasing awareness in education systems that if young people are to achieve their potential as future citizens they need to be able to negotiate the cultural, social, political and economic ties that connect them to the global and regional community through work, leisure and citizenship. Multicultural education, global studies and studies of Asia play a particular part in helping young people to: • appreciate cultural diversity within and beyond their own nation • imagine with some accuracy how others view their world • participate in shaping a better future. This chapter explores the origins, distinctions and common features of each approach.
Resumo:
Globally, teaching has become more complex and more challenging over recent years, with new and increased demands being placed on teachers by students, their families, governments and wider society. Teachers work with more diverse communities in times characterised by volatility, uncertainty and moral ambiguity. Societal, political, economic and cultural shifts have transformed the contexts in which teachers work and have redefined the ways in which teachers interact with students. This qualitative study uses phenomenographic methods to explore the nature of pedagogic teacherstudent interactions. The data analysis reveals five qualitatively different ways in which teachers experience pedagogic engagements with students. The resultant categories of description ranged from information providing, with teachers viewed as transmitters of a body of knowledge through to mentoring in which teachers were perceived as significant others in the lives of students with their influence extending beyond the walls of the classroom and beyond the years of schooling. The paper concludes by arguing that if teachers are to prepare students for the challenges and opportunities in changing times, teacher education programs need to consider ways to facilitate the development of mentoring capacities in new teachers.
Resumo:
This paper takes the position that children are at risk of being marginalised when research methods are not tailored to their requirements. In particular, children who are negotiating early adolescence are presented as an ideal group for involvement with narrative research approaches that attempt to be flexible and creative. With the premise that the need to juggle multiple realities within complex societal structures is challenging and isolating for such children, narrative methods offer a promising mode of access to their individual realities. Children's own self-narratives in the form of email journal entries are proposed as research tools that can help to minimise issues arising from resistance to adults and problems of shared vocabulary that may occur using more traditional methods. Digital journaling, as a means of capturing self-narratives, can provide a convenient space for young people to generate and share their own personal accounts of their lives and their experiences that can also serve to inform others. Guidelines are offered for how to manage a journaling project that is not reliant on children's physical presence within school settings. Digital journals are thus described as multi-function mechanisms that can support personal growth as well as promote shared understandings and social fairness between adults and children.
Resumo:
This book (256 pages, written in Korean) is a critical essay that reviews, questions, and criticises Korean and Eastern immigrants’ thinking and behaviour styles in Australia from their cultural perspectives, and discuss and proposes a creative cultural dimension for their better life in a multicultural context. Multiculturalism is not supportive of Eastern cultures because of individualistic collection of cultures, while transculturalism facilitates nurture of their culture in a community-oriented way within multicultural circumstances. Korean and Eastern immigrants, sharing oriental cultural systems and values, should approach to the Australian multicultural context with transculturalism which allows creating new cultural values in collaboration with and by participation into local communities. ------------------------------------------------------------ Many Eastern immigrants live in their own ethnic communities without or less interacting with Australian (communities). The author defines this phenomenon as “reverse immigration”. Reverse immigration refers to re-immigrating to their ethnic community in Australia or to their birth country despite they did not anticipate that this would happen to them before immigration to Australia. The author argues that Easterners’ collectivistic culture often devalues individuality and vice versa. Cultural clash between West and East often forces the immigrants to choose reverse immigration because of their lack of understanding of Western culture and their cultural characteristics such as low individuality, high power distance, and high uncertainty avoidance. For example, a vague boundary between individualist and collectivist in a collectivistic context (within their ethnic group) often leads to maladjustment to local communities and enhancement of cultural conservatism. The author proposes that the cultural clash can be overcome by cross-cultural activities named “transculturalism”. To Eastern immigrants, transculturalism can be achieved by acculturation of their two predominant cultures, the third-person perspective and generalised others. In a multicultural context, the former refers to the ability to share another person's feelings and emotions as if they were your own, and the latter does the ability to manage community and public expectations. When both cultural values are used for quality interactions between East and West, they allow Eastern immigrants to be more creative and critical and Australian to be more socially inclusive and culturally tolerant. With these discussions, the author discusses cultural differences throughout the book with four topics (chapters) and proposes transculturalism as a solution to the reverse immigration. ------------------------------------------------------------ Chapter 1 criticises Koreans’ attitudes and methods towards learning English that is less pragmatic and practical, but more likely to be a scholarly study. The author explains that Koreans’ non-pragmatic towards learning English has been firmly built based on their traditional systems and values that Koreans view English as a discipline and an aim of academic achievements rather than a means of communication. Within their cultural context, English can be perceived as more than a language, but something like vastly superior to their language and culture. Their collectivistic culture regards English as an unreachable and heterogeneous one that may threaten their cultural identity, so that “scholarly studying” is only the way to achieve (not learn) it. This discourages the immigrants to engage and involve in daily dialogues by “using” English as a second language. The author further advises the readers to be aware of Eastern collectivistic culture in communication and interaction that sometimes completely reverses private and public topics in a Western context. This leads them to feel that they have no content to talk to natives. ------------------------------------------------------------ Chapter 2 compares between Korea and Australia in terms of their educational systems and values, and proposes how Eastern overseas students can achieve critical and creative thinking within a Western educational setting. Interestingly, this chapter includes an explanation of why Eastern overseas students easily fail assessments including essay writing, oral presentations and discussions. One of the reasons the author explains is that Eastern students are not familiar to criticise others and think creatively, especially when they recognise that their words and ideas may harm the collectivistic harmony. Western educational systems focuses on enhancement of individuality such as self-confidence, self-esteem, and self-expression, while Eastern educational systems foster group-oriented values such as interpersonal relationship, and strong moral and spiritual values. Yet, the author argues that the collectivistic approach to criticism and creativity is often more critical and creative than Western individuals when they know what they are supposed to do for a group (or a community). Therefore, Eastern students need to think their cultural merits and demerits by using an individual perspective rather than generalised others’ perspective. The latter often discourages individual participation in a community, and the generalised others in a Western culture is weaker than Eastern. Furthermore, Western educational systems do not educate students to transform (loose) their individuality to fit into a group or a community. Rather they cultivate individuality for community prosperity. ------------------------------------------------------------ Chapter 3 introduces various cases of reverse immigration in workplaces that many immigrants return to their country or their ethnic community after many trials for acculturation. Reverse immigration is unexpected and not planned before immigration, so that its emotional embarrassment increases such severe social loneliness. Most Eastern immigrant workers have tried to adjust themselves in this new cultural environment at the early stages of immigration. However, their cultural features of collectivism, high power distance, high uncertainty avoidance, and long-term oriented cultures suppress individual initiative and eliminate the space for experiments in ways of acculturation. The author argues that returning to their ethnic community (physically and psychologically) leads to two significant problems: their distorted parenting and becoming more conservatives. The former leads the first generation of immigrants to pressure their children to pursue extrinsic or materialist values, such as financial success, fame and physical appearance, rather than on intrinsic values, while the latter refers to their isolated conservative characters because of their remoteness from the changes of their own country. The author also warns that their ethnic and religious groups actively strengthens immigrants’ social loneliness and systematically discourages immigrants’ interests and desire to be involving into local communities. The ethnic communities and leaders have not been interacting with Australian local communities and, as a result, are eager to conserve outdated cultural systems values. Even they have a tendency to weed out those people who wish to settle down within Australian local communities. They believe that those people can threaten their community’s survival and continuity. ------------------------------------------------------------ Chapter 4 titled multiculturalism argues that Korean and Eastern immigrants should more precisely understand Australia as a multicultural society in a way of collaboratively creating new cultural values. The author introduces multiculturalism with its definitions and history in Australia and argues the limitations of multiculturalism from an Easterner’s perspective. With well known tragedies of the second generations of U.S. immigrants, Cho Seung-Hui, a university student, massacred 32 people on the Virginia Tech before committing suicide and Hidal Hassan, an Army psychiatrist, killed 13 people at Fort Hood and the responses of ethnic community, the author explains that their mental illness may be derived from their parents’ (or ethnic group) culturally isolated attitude and socially static viewpoint of U.S. (Western system and values). The author insists that multiculturalism may restrict Eastern immigrants’ engagement and involvement in local communities. Multiculturalism has been systematically and historically developed based on Western systems and cultural values. In other words, multiculturalism requires high self-confidence and self-esteem that Eastern immigrants less prioritise them. It has been generally known that Easterners put more weight on human relationship than Westerners, but the author claims that this is not true. Within an individualistic culture, Westerners are more interested in building person-to-person connections and relationships. While Easterners are more interested in how individuals can achieve a sense of belonging within a group and a community. Therefore, multiculturalism is an ideology which forces Eastern immigrants to discard their strong desire to be part of a group and does not give a sense of belonging. In a consequence, the author advises that Eastern immigrants should aim towards “transculturalism” which allows them to actively participate in and contribute to their multicultural community. Transculturalism does not ask Easterners to discard their cultural values, but enables them to be a collectivistic individualist (a community leader) who is capable of developing new cultural values in a more creative and productive way. Furthermore, transculturalism encourages Western Australians in a multicultural context to collaborate with ethnic minorities to build a better community.
Resumo:
It is noted from observations of Compton (2009), Richards (2008), Taylor and Bennett (2002), and others that succession leadership planning and development fails to receive adequate attention in the corporate sector (see Byham 2002; Richards 2008; Wellins and Byham 2001). This paper acknowledges a marked paucity of systematic succession leadership development in education organisations. The need would seem to be compounded at a time when substantial attrition in the leadership ranks is expected over the next five years, reflecting widespread workforce demographics (Busine and Watt 2005; Jacobzone, Cambois, Chaplain, and Robine 1998; Taylor and Bennett 2002). The Lantern model has been developed in response to a perceived need to offer an integrated, systematic approach to organisational and succession leadership development. The model offers an organising framework for considering succession leadership development in a strategic, integrated way. The concept is based on organisational development and leadership literature which sees leadership development not as a series of 'tacked on' activities but as an organic 'whole of organisation' approach fostering the relevant knowledge, skills and understandings which support and 'grow' leaders as the organisation goes about its business. This paper explores how such an ideal might happen, and it suggests that pursuing such an ideal is timely. The leadership baton is set to shift at an accelerated rate in universities, as for organisations broadly, owing to age-related attrition. Moreover, given the increased complexity and demands of the leadership remit in the education leadership environment, it would seem particularly opportune to explore a framework concentrating on engendering a positive, connected organisational climate capable of growing strategic leadership strength from within. Eight core elements of the model, derived from the literature and practice research, are explored. The Lantern model purports to 'cover the bases' of succession leadership development, with particular reference to the education environment. The model is next described
Resumo:
Background: This study provides the latest available relative survival data for Australian childhood cancer patients. Methods: Data from the population-based Australian Paediatric Cancer Registry were used to describe relative survival outcomes using the period method for 11 903 children diagnosed with cancer between 1983 and 2006 and prevalent at any time between 1997 and 2006. Results: The overall relative survival was 90.4% after 1 year, 79.5% after 5 years and 74.7% after 20 years. Where information onstage at diagnosis was available (lymphomas, neuroblastoma, renal tumours and rhabdomyosarcomas), survival was significantly poorer for more-advanced stage. Survival was lower among infants compared with other children for those diagnosed with leukaemia, tumours of the central nervous system and renal tumours but higher for neuroblastoma. Recent improvements in overall childhood cancer survival over time are mainly because of improvements among leukaemia patients. Conclusion: The high and improving survival prognosis for children diagnosed with cancer in Australia is consistent with various international estimates. However, a 5-year survival estimate of 79% still means that many children who are diagnosed with cancer will die within 5 years, whereas others have long-term health morbidities and complications associated with their treatments. It is hoped that continued developments in treatment protocols will result in further improvements in survival.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
It is proposed from this study that engaging productively with others to achieve change has never been more critical in educational environments, such as universities. Via semi-structured interviews with a cohort of senior leaders from one Australian university, this paper explores their perceptions of the key issues and challenges facing them in their work. The study found that the most significant challenges centred around the need for strategic leadership, flexibility, creativity and change-capability; responding to competing tensions and remaining relevant; maintaining academic quality; and managing fiscal and people resources. Sound interpersonal engagement, particularly in terms of change leadership capability, was found to be critical to meeting the key challenges identified by most participants. In light of the findings from the sample studied some tentative implications for leadership and leadership development in university environments are proposed, along with suggestions for further empirical exploration.
Building a methodology for context-aware business processes: insights from an exploratory case study
Resumo:
This paper describes the findings derived from an exploratory case study into the business processes at a leading Australian insurance provider. The business processes are frequently subjected to changes and deviations due to contextual events such as weather, financial conditions and others. In this study, we examine how context impacts business processes and how resulting business process changes are enacted. From our analysis, we suggest a methodological framework to guide organisations in the complex challenge of linking changing contextual factors with internal process design.
Resumo:
Continuum diffusion models are often used to represent the collective motion of cell populations. Most previous studies have simply used linear diffusion to represent collective cell spreading, while others found that degenerate nonlinear diffusion provides a better match to experimental cell density profiles. In the cell modeling literature there is no guidance available with regard to which approach is more appropriate for representing the spreading of cell populations. Furthermore, there is no knowledge of particular experimental measurements that can be made to distinguish between situations where these two models are appropriate. Here we provide a link between individual-based and continuum models using a multi-scale approach in which we analyze the collective motion of a population of interacting agents in a generalized lattice-based exclusion process. For round agents that occupy a single lattice site, we find that the relevant continuum description of the system is a linear diffusion equation, whereas for elongated rod-shaped agents that occupy L adjacent lattice sites we find that the relevant continuum description is connected to the porous media equation (pme). The exponent in the nonlinear diffusivity function is related to the aspect ratio of the agents. Our work provides a physical connection between modeling collective cell spreading and the use of either the linear diffusion equation or the pme to represent cell density profiles. Results suggest that when using continuum models to represent cell population spreading, we should take care to account for variations in the cell aspect ratio because different aspect ratios lead to different continuum models.
Resumo:
Driver aggression is an increasing concern for motorists, with some research suggesting that drivers who behave aggressively perceive their actions as justified by the poor driving of others. Thus attributions may play an important role in understanding driver aggression. A convenience sample of 193 drivers (aged 17-36) randomly assigned to two separate roles (‘perpetrators’ and ‘victims’) responded to eight scenarios of driver aggression. Drivers also completed the Aggression Questionnaire and Driving Anger Scale. Consistent with the actor-observer bias, ‘victims’ (or recipients) in this study were significantly more likely than ‘perpetrators’ (or instigators) to endorse inadequacies in the instigator’s driving skills as the cause of driver aggression. Instigators were significantly more likely attribute the depicted behaviours to external but temporary causes (lapses in judgement or errors) rather than stable causes. This suggests that instigators recognised drivers as responsible for driving aggressively but downplayed this somewhat in comparison to ‘victims’/recipients. Recipients and instigators agreed that the behaviours were examples of aggressive driving but instigators appeared to focus on the degree of intentionality of the driver in making their assessments while recipients appeared to focus on the safety implications. Contrary to expectations, instigators gave mean ratings of the emotional impact of driving aggression on recipients that were higher in all cases than the mean ratings given by the recipients. Drivers appear to perceive aggressive behaviours as modifiable, with the implication that interventions could appeal to drivers’ sense of self-efficacy to suggest strategies for overcoming plausible and modifiable attributions (e.g. lapses in judgement; errors) underpinning behaviours perceived as aggressive.