56 resultados para Insider
Resumo:
Purpose: This paper aims to show that identification of expectations and software functional requirements via consultation with potential users is an integral component of the development of an emergency department patient admissions prediction tool. ---------- Design/methodology/approach: Thematic analysis of semi-structured interviews with 14 key health staff delivered rich data regarding existing practice and future needs. Participants included emergency department staff, bed managers, nurse unit managers, directors of nursing, and personnel from health administration. ---------- Findings: Participants contributed contextual insights on the current system of admissions, revealing a culture of crisis, imbued with misplayed communication. Their expectations and requirements of a potential predictive tool provided strategic data that moderated the development of the Emergency Department Patient Admissions Prediction Tool, based on their insistence that it feature availability, reliability and relevance. In order to deliver these stipulations, participants stressed that it should be incorporated, validated, defined and timely. ---------- Research limitations/implications: Participants were envisaging a concept and use of a tool that was somewhat hypothetical. However, further research will evaluate the tool in practice. ---------- Practical implications: Participants' unsolicited recommendations regarding implementation will not only inform a subsequent phase of the tool evaluation, but are eminently applicable to any process of implementation in a healthcare setting. ---------- Originality/value: The consultative process engaged clinicians and the paper delivers an insider view of an overburdened system, rather than an outsider's observations.
Resumo:
The focus of this paper is the role of Australian parents in early childhood education and care (ECEC), in particular, their role in shaping ECEC public policy. The paper reports the findings of a study investigating the different ways in which a group of parents viewed and experienced this role. Set against a policy backdrop where parents are positioned as 'consumers' and 'participants' in ECEC, the study employed a phenomenographic research approach to describe this role as viewed and experienced by parents. The study identified four logically related, qualitatively different ways of constituting this role among this group of parents, ranging from 'no role in shaping public policy' (the no role conception) to 'participating in policy decision-making, particularly where policy was likely to affect their child and family (the participating in policy decision-making conception). The study provides an insider-perspective on the role of parents in shaping policy and highlights variation in how this role is constituted by parents. The study also identifies factors perceived by parents as influencing their participation and discusses their implications for both policy and practice.
Resumo:
We describe research into the identification of anomalous events and event patterns as manifested in computer system logs. Prototype software has been developed with a capability that identifies anomalous events based on usage patterns or user profiles, and alerts administrators when such events are identified. To reduce the number of false positive alerts we have investigated the use of different user profile training techniques and introduce the use of abstractions to group together applications which are related. Our results suggest that the number of false alerts that are generated is significantly reduced when a growing time window is used for user profile training and when abstraction into groups of applications is used.
Resumo:
Women are substantially under-represented in the professoriate in Australia with a ratio of one female professor to every three male professors. This gender imbalance has been an ongoing concern with various affirmative action programs implemented in universities but to limited effect. Hence, there is a need to investigate the catalysts for and inhibitors to women’s ascent to the professoriate. This investigation focussed on women appointed to the professoriate between 2005, when a research quality assessment was first proposed, and 2008. Henceforth, these women are referred to as “New Women Professors”. The catalysts and inhibitors in these women’s careers were investigated through an electronic survey and focus group interviews. The survey was administered to new women professors (n=255) and new men professors (n=240) to enable a comparison of responses. However, only women participated in focus group discussions (n=21). An analysis of the survey and interview data revealed that the most critical catalysts for women’s advancement to the professoriate were equal employment opportunities and mentoring. Equal opportunity initiatives provided women with access to traditionally male-dominated forums. Mentoring gave women an insider perspective on the complexity of academia and the politics of the academy. The key inhibitors to women’s career advancement were negative discrimination, the culture of the boys’ club, the tension between personal and professional life, and isolation. Negative discrimination and the boys’ club are problematic because they favour men and marginalise women. The tension between personal and professional life is a particular concern for women who bear children and typically assume the major role in a family for child rearing. Isolation was a concern for both women and men with isolation appearing to increase after ascent to the professoriate. Knowledge of the significant catalysts and inhibitors provides a pragmatic way to orient universities towards redressing the gender balance in the professoriate.
Resumo:
Adolescents are both aware of and have the impetuous to exploit aspects of Science, Technology, Engineering and Mathematics (STEM) within their personal lives. Whether they are surfing, cycling, skateboarding or shopping, STEM concepts impact their lives. However science, mathematics, engineering and technology are still treated in the classroom as separate fragmented entities in the educational environment where most classroom talk is seemingly incomprehensible to the adolescent senses. The aim of this study was to examine the experiences of young adolescents with the aim of transforming school learning at least of science into meaningful experiences that connected with their lives using a self-study approach. Over a 12-month period, the researcher, an experienced secondary-science teacher, designed, implemented and documented a range of pedagogical practices with his Year-7 secondary science class. Data for this case study included video recordings, journals, interviews and surveys of students. By setting an environment empathetic to adolescent needs and understandings, students were able to actively explore phenomena collaboratively through developmentally appropriate experiences. Providing a more contextually relevant environment fostered meta-cognitive practices, encouraged new learning through open dialogue, multi-modal representations and assessments that contributed to building upon, re-affirming, or challenging both the students' prior learning and the teacher’s pedagogical content knowledge. A significant outcome of this study was the transformative experiences of an insider, the teacher as researcher, whose reflections provided an authentic model for reforming pedagogy in STEM classes.
Resumo:
In dynamic and uncertain environments such as healthcare, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. The uncertainty stems from the unpredictability of users’ operational needs as well as their private incentives to misuse permissions. In Role Based Access Control (RBAC), a user’s legitimate access request may be denied because its need has not been anticipated by the security administrator. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. This paper introduces a novel approach to access control under uncertainty and presents it in the context of RBAC. By taking insights from the field of economics, in particular the insurance literature, we propose a formal model where the value of resources are explicitly defined and an RBAC policy (entailing those predictable access needs) is only used as a reference point to determine the price each user has to pay for access, as opposed to representing hard and fast rules that are always rigidly applied.
Resumo:
In dynamic and uncertain environments, where the needs of security and information availability are difficult to balance, an access control approach based on a static policy will be suboptimal regardless of how comprehensive it is. Risk-based approaches to access control attempt to address this problem by allocating a limited budget to users, through which they pay for the exceptions deemed necessary. So far the primary focus has been on how to incorporate the notion of budget into access control rather than what or if there is an optimal amount of budget to allocate to users. In this paper we discuss the problems that arise from a sub-optimal allocation of budget and introduce a generalised characterisation of an optimal budget allocation function that maximises organisations expected benefit in the presence of self-interested employees and costly audit.
Resumo:
Women are substantially under-represented in the professoriate in Australia with a ratio of one female professor to every three male professors. This gender imbalance has been an ongoing concern with various affirmative action programs implemented in universities but to limited effect. Hence, there is a need to investigate the catalysts for and inhibitors to women’s ascent to the professoriate. This investigation focussed on women appointed to the professoriate between 2005, when a research quality assessment was first proposed, and 2008. Henceforth, these women are referred to as “New Women Professors”. The catalysts and inhibitors in these women’s careers were investigated through an electronic survey and focus group interviews. The survey was administered to new women professors (n=255) and new men professors (n=240) to enable a comparison of responses. However, only women participated in focus group discussions (n=21). An analysis of the survey and interview data revealed that the most critical catalysts for women’s advancement to the professoriate were equal employment opportunities and mentoring. Equal opportunity initiatives provided women with access to traditionally male-dominated forums. Mentoring gave women an insider perspective on the complexity of academia and the politics of the academy. The key inhibitors to women’s career advancement were negative discrimination, the culture of the boys’ club, the tension between personal and professional life, and isolation. Negative discrimination and the boys’ club are problematic because they favour men and marginalise women. The tension between personal and professional life is a particular concern for women who bear children and typically assume the major role in a family for child rearing. Isolation was a concern for both women and men with isolation appearing to increase after ascent to the professoriate. Knowledge of the significant catalysts and inhibitors provides a pragmatic way to orient universities towards redressing the gender balance in the professoriate.
Resumo:
The majority of Australians will work, sleep and die in the garments of the mass market. Yet, as Ian Griffiths has termed it, the designers of these garments are ‘invisible’ (2000). To the general public, the values, opinions and individual design processes of these designers are as unknown as their names. However, the designer’s role is crucial in making decisions which will have impacts throughout the life of the garment. The high product volume within the mass market ensures that even a small decision in the design process to source a particular fabric, or to use a certain trim or textile finish, can have a profound environmental or social effect. While big companies in Australia have implemented some visible strategies for sustainability, it is uncertain how these may have flowed through to design practices. To explore this question, this presentation will discuss preliminary findings from in-depth semi-structured interviews with Australian mass market fashion designers and product developers. The aim of the interviews was to hear the voice of the insider – to listen to mass market designers describe their design process, discuss the Australian fashion industry and its future challenges and opportunities, and to comment on what a ‘sustainability’ for their industry could look like. These interviews will be discussed within the framework of design philosopher Tony Fry’s writing on design redirection for sustainability.
Resumo:
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.
Resumo:
A considerable body of knowledge has been constructed perpetuating the notion single parenthood is a significant problem for society, and while this is supported by specific research designs and sampling practices, it is also maintained by two key discourses. The first constitutes single parenthood as a deficit, while the second identifies it as a risk. In both cases, these discourses are operationalised by the philosophy of neo-liberalism, which envisions good citizenship as economic autonomy. Historically, it has been the convergence of the risk and deficit discourses that has constituted single parenthood as a social problem. More recently, however, risk discourses have come to dominate thinking about single parenthood. As a result, this thesis terms risk discourses as dominant discourses. As dominant discourses, risk sidelines or discounts other ways of thinking about single parenthood. While a few exceptions are notable, including some feminist, poststructural and family resilience scholars, most researchers appear unable to see past the positioning of these discourses and envision another way of being for parents who are single. This means that alternative subjectivities are obscured and have limited influence in this field of research. Because this thesis aimed to problematise dominant subjectivities of single parenthood, a poststructural Foucauldian framework has been utilized in order to document the discursive constructions of single parenthood through literature, insider discourses, and outsider discourses. For the purposes of this thesis, outsider discourses are constituted as those outside the subjectivities of single parenthood, such as media and research discourses. An examination of the Australian media has been undertaken over a one year period, the results of which form the basis for the analysis of media discourses of single parenthood. Parents who are single were also targeted for self selection into this project to provide insider discourses about single parenthood. This analysis explored how respondents negotiated the discourses of single parenthood and how they themselves used or rejected the subjectivities constructed for them via these discourses to constitute their own subjectivities. This thesis aimed to explore the role of discourses in the construction of individuals' subjectivities. Specifically, it draws attention to the way in which knowledge and power work through discourses to emphasize what is allowable, both publicly and privately, in relation to single parenthood. Most importantly, this thesis offers alternative subjectivities for single parenthood to facilitate new ways of thinking about parents who are single.
Resumo:
This article investigates the profile of the companies that have been investigated for corporate fraud and misconduct. Our definition of fraud includes financial statement fraud, market misconduct fraud such as insider trading or false disclosures, and managerial fraud. The particular evidence presented relates to those instances of corporate fraud and misconduct investigated by the Australian corporate regulatory, Australian Securities and Investments Commission (ASIC), and relates to sanctions for fraud, misconduct or compliance breaches. Using data compiled from the public announcements in the ASIC reports over the period 2004-2008, we categorise the type of fraud and misconduct breaches ASIC chooses to report and investigate.
Resumo:
The suitability of Role Based Access Control (RBAC) is being challenged in dynamic environments like healthcare. In an RBAC system, a user's legitimate access may be denied if their need has not been anticipated by the security administrator at the time of policy specification. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. The heart of the challenge is the intrinsic unpredictability of users' operational needs as well as their incentives to misuse permissions. In this paper we propose a novel Budget-aware Role Based Access Control (B-RBAC) model that extends RBAC with the explicit notion of budget and cost, where users are assigned a limited budget through which they pay for the cost of permissions they need. We propose a model where the value of resources are explicitly defined and an RBAC policy is used as a reference point to discriminate the price of access permissions, as opposed to representing hard and fast rules for making access decisions. This approach has several desirable properties. It enables users to acquire unassigned permissions if they deem them necessary. However, users misuse capability is always bounded by their allocated budget and is further adjustable through the discrimination of permission prices. Finally, it provides a uniform mechanism for the detection and prevention of misuses.
Resumo:
J.W.Lindt’s Colonial man and Aborigine image from the GRAFTON ALBUM: “On chemistry and optics all does not depend, art must with these in triple union blend” (text from J.W. Lindt’s photographic backing card) In this paper, I follow an argument that Lindt held a position in his particular colonial environment where he was simultaneously both an insider and an outsider and that such a position may be considered prerequisite in stimulating exchange. A study of the transition of J.W. Lindt in Grafton, N.S.W. in the 1860s from a traveller to a migrant and subsequently to a professional photographer, as well as Lindt’s photographic career, which evolved through strategic action and technical approaches to photography, bears witness to his cultural relativity. One untitled photograph from this period of work constructs a unique commentary of Australian colonial life that illustrates a non-hegemonic position, particularly as it was included in one of the first albums of photographs of Aborigines that Lindt gifted to an illustrious person (in this case the Mayor of Grafton). As in his other studio constructions, props and backdrops were arranged and sitters were positioned with care, but this photograph is the only one in the album that includes a non-Aborigine in a relationship to an Aborigine. An analysis of the props, technical details of the album and the image suggests a reconciliatory aspect that thwarts the predominant attitudes towards Aborigines in the area at that time.
Resumo:
The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting. On one hand employees need enough access to the organisation’s resources in order to perform their jobs and on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally, through carelessness or being socially engineered to give access to an adversary. This thesis investigates issues of existing approaches to access control in allocating optimal level of access to users and proposes solutions in the form of new access control models. These issues are most evident when uncertainty surrounding users’ access needs, incentive to misuse and accountability are considered, hence the title of the thesis. We first analyse access control in environments where the administrator is unable to identify the users who may need access to resources. To resolve this uncertainty an administrative model with delegation support is proposed. Further, a detailed technical enforcement mechanism is introduced to ensure delegated resources cannot be misused. Then we explicitly consider that users are self-interested and capable of misusing resources if they choose to. We propose a novel game theoretic access control model to reason about and influence the factors that may affect users’ incentive to misuse. Next we study access control in environments where neither users’ access needs can be predicted nor they can be held accountable for misuse. It is shown that by allocating budget to users, a virtual currency through which they can pay for the resources they deem necessary, the need for a precise pre-allocation of permissions can be relaxed. The budget also imposes an upper-bound on users’ ability to misuse. A generalised budget allocation function is proposed and it is shown that given the context information the optimal level of budget for users can always be numerically determined. Finally, Role Based Access Control (RBAC) model is analysed under the explicit assumption of administrators’ uncertainty about self-interested users’ access needs and their incentives to misuse. A novel Budget-oriented Role Based Access Control (B-RBAC) model is proposed. The new model introduces the notion of users’ behaviour into RBAC and provides means to influence users’ incentives. It is shown how RBAC policy can be used to individualise the cost of access to resources and also to determine users’ budget. The implementation overheads of B-RBAC is examined and several low-cost sub-models are proposed.