394 resultados para referendum and information campaign
Resumo:
Process models are used to convey semantics about business operations that are to be supported by an information system. A wide variety of professionals is targeted to use such models, including people who have little modeling or domain expertise. We identify important user characteristics that influence the comprehension of process models. Through a free simulation experiment, we provide evidence that selected cognitive abilities, learning style, and learning strategy influence the development of process model comprehension. These insights draw attention to the importance of research that views process model comprehension as an emergent learning process rather than as an attribute of the models as objects. Based on our findings, we identify a set of organizational intervention strategies that can lead to more successful process modeling workshops.
Resumo:
Objective To identify predictors for initiating and maintaining active commuting (AC) to work following the 2003 Australia's Walk to Work Day (WTWD) campaign. Methods Pre- and post-campaign telephone surveys of a cohort of working age (18–65years) adults (n = 1100, 55% response rate). Two dependent campaign outcomes were assessed: initiating or maintaining AC (i.e., walk/cycle and public transport) on a single day (WTWD), and increasing or maintaining health-enhancing active commuting (HEAC) level (≥ 30min/day) in a usual week following WTWD campaign. Results A significant population-level increase in HEAC (3.9%) was observed (McNemar's χ2 = 6.53, p = 0.01) with 136 (19.0%) achieving HEAC at post campaign. High confidence in incorporating walking into commute, being active pre-campaign and younger age (< 46years) were positively associated with both outcomes. The utility of AC for avoiding parking hassles (AOR = 2.1, 95% CI: 1.2–3.6), for less expense (AOR = 1.8, 95% CI: 1.1–3.1), for increasing one's health (AOR = 2.5, 95% CI: 1.1–5.6) and for clean air (AOR = 2.2, 95% CI: 1.0–4.4) predicted HEAC outcome whereas avoiding the stress of driving (AOR = 2.6, 95% CI: 1.4–5.0) and the hassle of parking predicted the single-day AC. Conclusions Transportation interventions targeting parking and costs could be further enhanced by emphasizing health benefits of AC. AC was less likely to occur among inactive employees.
Resumo:
Topic modelling, such as Latent Dirichlet Allocation (LDA), was proposed to generate statistical models to represent multiple topics in a collection of documents, which has been widely utilized in the fields of machine learning and information retrieval, etc. But its effectiveness in information filtering is rarely known. Patterns are always thought to be more representative than single terms for representing documents. In this paper, a novel information filtering model, Pattern-based Topic Model(PBTM) , is proposed to represent the text documents not only using the topic distributions at general level but also using semantic pattern representations at detailed specific level, both of which contribute to the accurate document representation and document relevance ranking. Extensive experiments are conducted to evaluate the effectiveness of PBTM by using the TREC data collection Reuters Corpus Volume 1. The results show that the proposed model achieves outstanding performance.
Resumo:
This study describes the first aid used and clinical outcomes of all patients who presented to the Royal Children's Hospital, Brisbane, Australia in 2005 with an acute burn injury. A retrospective audit was performed with the charts of 459 patients and information concerning burn injury, first-aid treatment, and clinical outcomes was collected. First aid was used on 86.1% of patients, with 8.7% receiving no first aid and unknown treatment in 5.2% of cases. A majority of patients had cold water as first aid (80.2%), however, only 12.1% applied the cold water for the recommended 20 minutes or longer. Recommended first aid (cold water for >or=20 minutes) was associated with significantly reduced reepithelialization time for children with contact injuries (P=.011). Superficial depth burns were significantly more likely to be associated with the use of recommended first aid (P=.03). Suboptimal treatment was more common for children younger than 3.5 years (P<.001) and for children with friction burns. This report is one of the few publications to relate first-aid treatment to clinical outcomes. Some positive clinical outcomes were associated with recommended first-aid use; however, wound outcomes were more strongly associated with burn depth and mechanism of injury. There is also a need for more public awareness of recommended first-aid treatment.
Resumo:
Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.
Resumo:
Many mature term-based or pattern-based approaches have been used in the field of information filtering to generate users’ information needs from a collection of documents. A fundamental assumption for these approaches is that the documents in the collection are all about one topic. However, in reality users’ interests can be diverse and the documents in the collection often involve multiple topics. Topic modelling, such as Latent Dirichlet Allocation (LDA), was proposed to generate statistical models to represent multiple topics in a collection of documents, and this has been widely utilized in the fields of machine learning and information retrieval, etc. But its effectiveness in information filtering has not been so well explored. Patterns are always thought to be more discriminative than single terms for describing documents. However, the enormous amount of discovered patterns hinder them from being effectively and efficiently used in real applications, therefore, selection of the most discriminative and representative patterns from the huge amount of discovered patterns becomes crucial. To deal with the above mentioned limitations and problems, in this paper, a novel information filtering model, Maximum matched Pattern-based Topic Model (MPBTM), is proposed. The main distinctive features of the proposed model include: (1) user information needs are generated in terms of multiple topics; (2) each topic is represented by patterns; (3) patterns are generated from topic models and are organized in terms of their statistical and taxonomic features, and; (4) the most discriminative and representative patterns, called Maximum Matched Patterns, are proposed to estimate the document relevance to the user’s information needs in order to filter out irrelevant documents. Extensive experiments are conducted to evaluate the effectiveness of the proposed model by using the TREC data collection Reuters Corpus Volume 1. The results show that the proposed model significantly outperforms both state-of-the-art term-based models and pattern-based models
Resumo:
Facilitated discussion with early childhood staff working with children and families affected by natural disasters in Queensland, Australia, raises issues regarding educational communication in emergencies. This paper reports on these discussions as ‘reflections on talk’. It examines discrepancies between the literature and staff talk, gaps in the literature, and the inaccessible style of some literature-demanded collaborative debate and information re-interpretation. Reframing of the discourse style was used to support staff de-briefing, mutual encouragement, and sharing of insights on promoting resilience in children and families. Formal investigation is required regarding effective emergency-situation talk between staff, as well as with children and families.
Resumo:
In the present study, we examined the associations of early nutrition with adult lean body mass (LBM) and muscle strength in a birth cohort that was established to assess the long-term impact of a nutrition program. Participants (n = 1,446, 32% female) were born near Hyderabad, India, in 29 villages from 1987 to 1990, during which time only intervention villages (n = 15) had a government program that offered balanced protein-calorie supplementation to pregnant women and children. Participants’ LBM and appendicular skeletal muscle mass were measured using dual energy x-ray absorptiometry; grip strength and information on lifestyle indicators, including diet and physical activity level, were also obtained. Ages (mean = 20.3 years) and body mass indexes (weight (kg)/height (m)2; mean = 19.5) of participants in 2 groups were similar. Current dietary energy intake was higher in the intervention group. Unadjusted LBM and grip strength were similar in 2 groups. After adjustment for potential confounders, the intervention group had lower LBM (β = −0.75; P = 0.03), appendicular skeletal muscle mass, and grip strength than did controls, but these differences were small in magnitude (<0.1 standard deviation). Multivariable regression analyses showed that current socioeconomic position, energy intake, and physical activity level had a positive association with adult LBM and muscle strength. This study could not detect a “programming” effect of early nutrition supplementation on adult LBM and muscle strength.
Resumo:
Introduction This paper reports on university students' experiences of learning information literacy. Method Phenomenography was selected as the research approach as it describes the experience from the perspective of the study participants, which in this case is a mixture of undergraduate and postgraduate students studying education at an Australian university. Semi-structured, one-on-one interviews were conducted with fifteen students. Analysis The interview transcripts were iteratively reviewed for similarities and differences in students' experiences of learning information literacy. Categories were constructed from an analysis of the distinct features of the experiences that students reported. The categories were grouped into a hierarchical structure that represents students' increasingly sophisticated experiences of learning information literacy. Results The study reveals that students experience learning information literacy in six ways: learning to find information; learning a process to use information; learning to use information to create a product; learning to use information to build a personal knowledge base; learning to use information to advance disciplinary knowledge; and learning to use information to grow as a person and to contribute to others. Conclusions Understanding the complexity of the concept of information literacy, and the collective and diverse range of ways students experience learning information literacy, enables academics and librarians to draw on the range of experiences reported by students to design academic curricula and information literacy education that targets more powerful ways of learning to find and use information.
Resumo:
We present a technique for delegating a short lattice basis that has the advantage of keeping the lattice dimension unchanged upon delegation. Building on this result, we construct two new hierarchical identity-based encryption (HIBE) schemes, with and without random oracles. The resulting systems are very different from earlier lattice-based HIBEs and in some cases result in shorter ciphertexts and private keys. We prove security from classic lattice hardness assumptions.
Resumo:
Event report on the Open Access and Research 2013 conference which focused on recent developments and the strategic advantages they bring to the research sector.
Resumo:
Enterprise resource planning (ERP) systems are rapidly being combined with “big data” analytics processes and publicly available “open data sets”, which are usually outside the arena of the enterprise, to expand activity through better service to current clients as well as identifying new opportunities. Moreover, these activities are now largely based around relevant software systems hosted in a “cloud computing” environment. However, the over 50- year old phrase related to mistrust in computer systems, namely “garbage in, garbage out” or “GIGO”, is used to describe problems of unqualified and unquestioning dependency on information systems. However, a more relevant GIGO interpretation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems based around ERP and open datasets as well as “big data” analytics, particularly in a cloud environment, the ability to verify the authenticity and integrity of the data sets used may be almost impossible. In turn, this may easily result in decision making based upon questionable results which are unverifiable. Illicit “impersonation” of and modifications to legitimate data sets may become a reality while at the same time the ability to audit any derived results of analysis may be an important requirement, particularly in the public sector. The pressing need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment is discussed in this paper. Some current and appropriate technologies currently being offered are also examined. However, severe limitations in addressing the problems identified are found and the paper proposes further necessary research work for the area. (Note: This paper is based on an earlier unpublished paper/presentation “Identity, Addressing, Authenticity and Audit Requirements for Trust in ERP, Analytics and Big/Open Data in a ‘Cloud’ Computing Environment: A Review and Proposal” presented to the Department of Accounting and IT, College of Management, National Chung Chen University, 20 November 2013.)
Resumo:
This paper makes a formal security analysis of the current Australian e-passport implementation using model checking tools CASPER/CSP/FDR. We highlight security issues in the current implementation and identify new threats when an e-passport system is integrated with an automated processing system like SmartGate. The paper also provides a security analysis of the European Union (EU) proposal for Extended Access Control (EAC) that is intended to provide improved security in protecting biometric information of the e-passport bearer. The current e-passport specification fails to provide a list of adequate security goals that could be used for security evaluation. We fill this gap; we present a collection of security goals for evaluation of e-passport protocols. Our analysis confirms existing security weaknesses that were previously identified and shows that both the Australian e-passport implementation and the EU proposal fail to address many security and privacy aspects that are paramount in implementing a secure border control mechanism. ACM Classification C.2.2 (Communication/Networking and Information Technology – Network Protocols – Model Checking), D.2.4 (Software Engineering – Software/Program Verification – Formal Methods), D.4.6 (Operating Systems – Security and Privacy Protection – Authentication)
Resumo:
In this age of electronic money transactions, the opportunities for electronic crime expanded at the same rate as ever expanding rise of on-line services. With world becoming a global village, crime over the internet transcends no boundaries, borders or jurisdictions. This paper critically examines the available literature on spam, and the control measures available to control spam. This study is followed by the literature overview related to mobility of devices and how the application of mobile technologies as communication medium has impacted the handling of spam. The conclusion of this literature review with proposed direction of study is summarized.
Resumo:
The concept of cloud computing services is appealing to the small and medium enterprises (SMEs), with the opportunity to acquire modern information technology resources as a utility and avoid costly capital investments in technology resources. However, the adoption of the cloud computing services presents significant challenges to the SMEs. The SMEs need to determine a path to adopting the cloud computing services that would ensure their sustainable presence in the cloud computing environment. Information about approaches to adopting the cloud computing services by the SMEs is fragmented. Through an interpretive design, we suggest that the SMEs need to have a strategic and incremental intent, understand their organizational structure, understand the external factors, consider the human resource capacity, and understand the value expectations from the cloud computing services to forge a successful path to adopting the cloud computing services. These factors would contribute to a model of cloud services for SMEs.