269 resultados para 105-646
Resumo:
Cultural policy studies have previously highlighted the importance of multiple logics, friction and contradiction in cultural policy. Recent developments in institutional theory provide a framework for analysing change in cultural policy which explores movement between these multiple and sometimes contradictory logics. This paper analyses the role of friction in the evolution of Australian film industry policy and in particular the tension between competing logics regarding nationalism, commercialism and the state. The paper is suggestive of the relevance of institutional theory as a framework for understanding cultural policy evolution.
Resumo:
Increasingly the health and welfare needs of individuals and communities are being met by third sector, or not-for-profit, organizations. Since the 1980s third sector organizations have been subject to significant, sector-wide changes, such as the development of contractual funding and an increasing need to collaborate with governments and other sectors. In particular, the processes of ‘professionalization’ and ‘bureaucratization’ have received significant attention and are now well documented in third sector literature. These processes are often understood to create barriers between organizations and their community groups and neutralize alternative forms of service provision. In this article we provide a case study of an Australian third sector organization undergoing professionalization. The case study draws on ethnographic and qualitative interviews with staff and volunteers at a health-based third sector organization involved in service provision to marginalized community groups. We examine how professionalization alters organizational spaces and dynamics and conclude that professionalized third sector spaces may still be ‘community’ spaces where individuals may give and receive care and services. Moreover, we suggest that these community spaces hold potential for resisting the neutralizing effects of contracting.
Resumo:
Drawing on the textual evidence of a number of referees’ reports, this article maps key differences between the humanities and social sciences approaches to the study of pornography, in order to facilitate better understanding and communication between the areas. 1. Social scientists avoid ‘vulgar’ language to describe sex. Humanities scholars need not do so. 2. Social scientists remain committed to the idea of ‘objectivity’ while humanities scholars reject the idea – although this may be a confusion in language, with the term in the social sciences used to mean something more like ‘falsifiability’. 3. Social science assumes that the primary effects of exposure to pornography must be negative. 4. More generally, social science resists paradigm changes, insisting that all new work agrees with research that has gone before. 5. Social science believes that casual sex and sadomasochism are negative; humanities research need not do so.
Resumo:
Young people aged 17–24 years are at high risk of being killed in road crashes around the world. Road safety interventions consider some influences upon young driver behaviour; for example, imposing passenger restrictions on young novice drivers indirectly minimises the potential negative social influences of peers as passengers. To change young driver risky behaviour, the multitude of psychosocial influences upon its initiation and maintenance must be identified. A study questionnaire was developed to investigate the relationships between risky driving and Akers’ social learning theory, social identity theory, and thrill seeking variables. The questionnaire was completed by 165 participants (105 women,60 men) residing in south-east Queensland, Australia. The sociodemographic variables of age, gender, and exposure explained 19% of the variance in self-reported risky driving behaviour, whilst Akers’ social learning variables explained an additional 42%. Thrill seeking and social identity variables did not explain any significant additional variance. Significant predictors of risky driving included imitation of the driving behaviours of, and anticipated rewards and punishments administered by, parents and peers. Road safety policy that directly considers and incorporates these factors in their design, implementation, and enforcement of young driver road safety interventions should prove more efficacious than current approaches.
Resumo:
Well implemented criterion-referenced assessment (CRA) requires dedicated time and effort, especially in describing realistic expectations of evidence of achievement to students in the form of criteria sheets (or grading rubrics). It is also takes time out of delivering content to teach students how to judge their own work using criteria sheets. In 2007, to engage third year Microbiology students in using criteria sheets for the first time in their degree, we devised an innovative assessment tutorial supported by online resources. We were sceptical of much of the literature that reported ‘agreed’ characteristics of our predominantly gen Y cohort, because of the older ages of the majority of authors. These authors claim gen Y has a propensity for digital media, overconfidence in their own abilities and a collaborative orientation. We rejected this stereotype when developing the tutorial. Evaluations by students were positive and there was no dramatic change to grades for the unit. These results are similar to those in the literature for non gen Y cohorts. This lends support to our claim that giving students control over their own learning, irrespective of their generational label, is worth the time and effort.
Resumo:
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.
Resumo:
The aim of this work was to investigate ultrafine particles (< 0.1 μm) in primary school classrooms, in relation to the classrooms activities. The investigations were conducted in three classrooms during two measuring campaigns, which together encompassed a period of 60 days. Initial investigations showed that under the normal operating conditions of the school there were many occasions in all three classrooms where indoor particle concentrations increased significantly compared to outdoor levels. By far the highest increases in the classroom resulted from art activities (painting, gluing and drawing), at times reaching over 1.4 x 105 particle cm-3. The indoor particle concentrations exceeded outdoor concentrations by approximately one order of magnitude, with a count median diameter ranging from 20-50 nm. Significant increases also occurred during cleaning activities, when detergents were used. GC-MS analysis conducted on 4 samples randomly selected from about 30 different paints and glues, as well as the detergent used in the school, showed that d-limonene was one of the main organic compounds of the detergent, however, it was not detected in the samples of the paints and the glue. Controlled experiments showed that this monoterpene, emitted from the detergent, reacted with O3 (at outdoor ambient concentrations ranging from 0.06-0.08ppm) and formed secondary organic aerosols. Further investigations to identify other liquids which may be potential sources of the precursors of secondary organic aerosols, were outside the scope of this project, however, it is expected that the problem identified by this study could be more widely spread, since most primary schools use liquid materials for art classes, and all schools use detergents for cleaning. Further studies are therefore recommended to better understand this phenomenon and also to minimize school children exposure to ultrafine particles from these indoor sources.
Resumo:
This chapter is a condensation of a guide written by the chapter authors for both university teachers and students (Fowler et al., 2006). All page references given in this chapter are to this guide, unless otherwise stated. University students often work in groups. It may be a formal group (i.e. one that has been formed for a group presentation, writing a report, or completing a project) or an informal group (i.e. some students have decided to form a study group or undertake research together). Whether formal or informal, this chapter aims to make working in groups easier for you. Health care professionals also often work in groups. Yes, working in groups will extend well beyond your time at university. In fact, the skills and abilities to work effectively in groups are some of the most sought-after attributes in health care professionals. It seems obvious, then, that taking the opportunity to develop and enhance your skills and abilities for working in groups is a wise choice.
Resumo:
AIMS: Alcohol use disorders and depression co-occur frequently and are associated with poorer outcomes than when either condition occurs alone. The present study (Depression and Alcohol Integrated and Single-focused Interventions; DAISI) aimed to compare the effectiveness of brief intervention, single-focused and integrated psychological interventions for treatment of coexisting depression and alcohol use problems. METHODS: Participants (n = 284) with current depressive symptoms and hazardous alcohol use were assessed and randomly allocated to one of four individually delivered interventions: (i) a brief intervention only (single 90-minute session) with an integrated focus on depression and alcohol, or followed by a further nine 1-hour sessions with (ii) an alcohol focus; (iii) a depression focus; or (iv) an integrated focus. Follow-up assessments occurred 18 weeks after baseline. RESULTS: Compared with the brief intervention, 10 sessions were associated with greater reductions in average drinks per week, average drinking days per week and maximum consumption on 1 day. No difference in duration of treatment was found for depression outcomes. Compared with single-focused interventions, integrated treatment was associated with a greater reduction in drinking days and level of depression. For men, the alcohol-focused rather than depression-focused intervention was associated with a greater reduction in average drinks per day and drinks per week and an increased level of general functioning. Women showed greater improvements on each of these variables when they received depression-focused rather than alcohol-focused treatment. CONCLUSIONS: Integrated treatment may be superior to single-focused treatment for coexisting depression and alcohol problems, at least in the short term. Gender differences between single-focused depression and alcohol treatments warrant further study.
Resumo:
Computer vision is much more than a technique to sense and recover environmental information from an UAV. It should play a main role regarding UAVs’ functionality because of the big amount of information that can be extracted, its possible uses and applications, and its natural connection to human driven tasks, taking into account that vision is our main interface to world understanding. Our current research’s focus lays on the development of techniques that allow UAVs to maneuver in spaces using visual information as their main input source. This task involves the creation of techniques that allow an UAV to maneuver towards features of interest whenever a GPS signal is not reliable or sufficient, e.g. when signal dropouts occur (which usually happens in urban areas, when flying through terrestrial urban canyons or when operating on remote planetary bodies), or when tracking or inspecting visual targets—including moving ones—without knowing their exact UMT coordinates. This paper also investigates visual serving control techniques that use velocity and position of suitable image features to compute the references for flight control. This paper aims to give a global view of the main aspects related to the research field of computer vision for UAVs, clustered in four main active research lines: visual serving and control, stereo-based visual navigation, image processing algorithms for detection and tracking, and visual SLAM. Finally, the results of applying these techniques in several applications are presented and discussed: this study will encompass power line inspection, mobile target tracking, stereo distance estimation, mapping and positioning.
Resumo:
Digital forensics investigations aim to find evidence that helps confirm or disprove a hypothesis about an alleged computer-based crime. However, the ease with which computer-literate criminals can falsify computer event logs makes the prosecutor's job highly challenging. Given a log which is suspected to have been falsified or tampered with, a prosecutor is obliged to provide a convincing explanation for how the log may have been created. Here we focus on showing how a suspect computer event log can be transformed into a hypothesised actual sequence of events, consistent with independent, trusted sources of event orderings. We present two algorithms which allow the effort involved in falsifying logs to be quantified, as a function of the number of `moves' required to transform the suspect log into the hypothesised one, thus allowing a prosecutor to assess the likelihood of a particular falsification scenario. The first algorithm always produces an optimal solution but, for reasons of efficiency, is suitable for short event logs only. To deal with the massive amount of data typically found in computer event logs, we also present a second heuristic algorithm which is considerably more efficient but may not always generate an optimal outcome.
Resumo:
The unusual (1:1) complex ‘adduct’ salt of copper(II) with 4,5-dichlorophthalic acid (H2DCPA), having formula [Cu(H2O)4(C8H3Cl2O4) (C8H4Cl2O4)] . (C8H3Cl2O4) has been synthesized and characterized using single-crystal X-ray diffraction. Crystals are monoclinic, space group P21/c, with Z = 4 in a cell with dimensions a = 20.1376(7), b =12.8408(4) c = 12.1910(4) Å, β = 105.509(4)o. The complex is based on discrete tetragonally distorted octahedral [CuO6] coordination centres with the four water ligands occupying the square planar sites [Cu-O, 1.962(4)-1.987(4) Å] and the monodentate carboxyl-O donors of two DCPA ligand species in the axial sites. The first of these bonds [Cu-O, 2.341(4) Å] is with an oxygen of a HDCPA monoanion, the second with an oxygen of a H2DCPA acid species [Cu-O, 2.418(4) Å]. The un-coordinated ‘adduct’ molecule is a HDCPA counter anion which is strongly hydrogen-bonded to the coordinated H2DCPA ligand [O… O, 2.503(6) Å] while a number of peripheral intra- and intermolecular hydrogen-bonding interactions give a two-dimensional network structure.
Resumo:
In the paper, the flow-shop scheduling problem with parallel machines at each stage (machine center) is studied. For each job its release and due date as well as a processing time for its each operation are given. The scheduling criterion consists of three parts: the total weighted earliness, the total weighted tardiness and the total weighted waiting time. The criterion takes into account the costs of storing semi-manufactured products in the course of production and ready-made products as well as penalties for not meeting the deadlines stated in the conditions of the contract with customer. To solve the problem, three constructive algorithms and three metaheuristics (based one Tabu Search and Simulated Annealing techniques) are developed and experimentally analyzed. All the proposed algorithms operate on the notion of so-called operation processing order, i.e. the order of operations on each machine. We show that the problem of schedule construction on the base of a given operation processing order can be reduced to the linear programming task. We also propose some approximation algorithm for schedule construction and show the conditions of its optimality.