744 resultados para School setting


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The terms ‘literacy’ and ‘technology’ remain highly contentious within the field of education. What is meant by ‘literacy’ and the methods used to measure it vary quite markedly in educational and historical contexts across the world. Similarly, while there is a shared concern to research the potential impact of new information and communication technologies (ICTs) on patterns of teaching and learning, there are major discrepancies about which aspects and uses of these technologies should be incorporated into formal learning environments and how this can be accomplished. While government policy makers tend to regard ICTs in relation to ideas of ‘smartness’, efficiency, and the ‘knowledge’ (or ‘new’) economy, educators and educational researchers promote them as offering new tools for learning and critical thinking and the development of new literacies and socio-cultural identities. This clearly has ramifications for the ways literacy is taught and conceptualised throughout the years of schooling, K-12. Outside school, meanwhile, students engage with ICTs on another level entirely, as tools for the maintenance of social networks, for leisure, and for learning and participating in the cultures of their peers. Whatever the differences in perspective, it remains the case that a society’s dominant understandings about literacy and technology will have significant implications for the development of school curriculum.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ultimate goal of an authorisation system is to allocate each user the level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting because on one hand employees need enough access to perform their tasks, while on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally through carelessness, losing the information or being socially engineered to give access to an adversary. With the goal of developing a more dynamic authorisation model, we have adopted a game theoretic framework to reason about the factors that may affect users’ likelihood to misuse a permission at the time of an access decision. Game theory provides a useful but previously ignored perspective in authorisation theory: the notion of the user as a self-interested player who selects among a range of possible actions depending on their pay-offs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bullying and victimisation among school age children is recognised as a major public health problem. The Australian Covert Bullying Prevalence Study (ACBPS) reports that just over one quarter (27%) of school students aged 8 to 14 years were bullied and 9% bullied others on a frequent basis (every few weeks or more often) (Cross et al., 2009). Bullying is associated with a host of detrimental effects, including loneliness (Nansel, Overpeck, Pilla, & Ruan, 2001), low self‐esteem (Jankauskiene, Kardelis, Sukys, & Kardeliene, 2008; Salmivalli, Kaukiainen, Kaistaniemi, & Lagerspetz, 1999), anxiety, depression (Kaltiala‐Heino, Rimpela, Rantanen, & Rimpela, 2000), suicide ideation (Kaltiala‐Heino, Rimpela, Marttunen, Rimpela, & Rantanen, 1999), impaired academic achievement (Nansel et al., 2001), and poorer physical health (Wolke, Woods, Bloomfield, & Karstadt, 2001).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Electronic Blocks are a new programming environment, designed specifically for children aged between three and eight years. As such, the design of the Electronic Block environment is firmly based on principles of developmentally appropriate practices in early childhood education. The Electronic Blocks are physical, stackable blocks that include sensor blocks, action blocks and logic blocks. Evaluation of the Electronic Blocks with both preschool and primary school children shows that the blocks' ease of use and power of engagement have created a compelling tool for the introduction of meaningful technology education in an early childhood setting. The key to the effectiveness of the Electronic Blocks lies in an adherence to theories of development and learning throughout the Electronic Blocks design process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background: Waist circumference has been identified as a valuable predictor of cardiovascular risk in children. The development of waist circumference percentiles and cut-offs for various ethnic groups are necessary because of differences in body composition. The purpose of this study was to develop waist circumference percentiles for Chinese children and to explore optimal waist circumference cut-off values for predicting cardiovascular risk factors clustering in this population.----- ----- Methods: Height, weight, and waist circumference were measured in 5529 children (2830 boys and 2699 girls) aged 6-12 years randomly selected from southern and northern China. Blood pressure, fasting triglycerides, low-density lipoprotein cholesterol, high-density lipoprotein cholesterol, and glucose were obtained in a subsample (n = 1845). Smoothed percentile curves were produced using the LMS method. Receiver-operating characteristic analysis was used to derive the optimal age- and gender-specific waist circumference thresholds for predicting the clustering of cardiovascular risk factors.----- ----- Results: Gender-specific waist circumference percentiles were constructed. The waist circumference thresholds were at the 90th and 84th percentiles for Chinese boys and girls respectively, with sensitivity and specificity ranging from 67% to 83%. The odds ratio of a clustering of cardiovascular risk factors among boys and girls with a higher value than cut-off points was 10.349 (95% confidence interval 4.466 to 23.979) and 8.084 (95% confidence interval 3.147 to 20.767) compared with their counterparts.----- ----- Conclusions: Percentile curves for waist circumference of Chinese children are provided. The cut-off point for waist circumference to predict cardiovascular risk factors clustering is at the 90th and 84th percentiles for Chinese boys and girls, respectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The world we live in is well labeled for the benefit of humans but to date robots have made little use of this resource. In this paper we describe a system that allows robots to read and interpret visible text and use it to understand the content of the scene. We use a generative probabilistic model that explains spotted text in terms of arbitrary search terms. This allows the robot to understand the underlying function of the scene it is looking at, such as whether it is a bank or a restaurant. We describe the text spotting engine at the heart of our system that is able to detect and parse wild text in images, and the generative model, and present results from images obtained with a robot in a busy city setting.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines the problem of patent ambush in standard setting, where patent owners are sometimes able to capture industry standards in order to secure monopoly power and windfall profits. Because standardisation generally introduces high switching costs, patent ambush can impose significant costs on downstream manufacturers and consumers and drastically reduce the efficiency gains of standardisation.This article considers how Australian competition law is likely to apply to patent ambush both in the development of a standard (through misrepresenting the existence of an essential patent) and after a standard is implemented (through refusing to license an essential patented technology either at all or on reasonable and non-discriminatory (RAND) terms). This article suggests that non-disclosure of patent interests is unlikely to restrained by Part IV of the Trade Practices Act (TPA), and refusals to license are only likely to be restrained if the refusal involves leveraging or exclusive dealing. By contrast, Standard Setting Organisations (SSOs) which seek to limit this behaviour through private ordering may face considerable scrutiny under the new cartel provisions of the TPA. This article concludes that SSOs may be best advised to implement administrative measures to prevent patent hold-up, such as reviewing which patents are essential for the implementation of a standard, asking patent holders to make their licence conditions public to promote transparency, and establishing forums where patent licensees can complain about licence terms that they consider to be unreasonable or discriminatory. Additionally, the ACCC may play a role in authorising SSO policies that could otherwise breach the new cartel provisions, but which have the practical effect of promoting competition in the standards setting environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: To explore the role of psychological distress in the self-reported risky driving of young novice drivers. Design: Cross-sectional online survey of 761 tertiary students aged 17-25 years with an intermediate (Provisional) driving licence who completed Kessler’s Psychological Distress Scale and the Behaviour of Young Novice Drivers Scale. Setting: Queensland, Australia, August-October 2009. Main outcome measures: Psychological distress, risky driving. Results: Regression analyses revealed that psychological distress uniquely explained 8.5% of the variance in young novice’s risky driving, with adolescents experiencing psychological distress also reporting higher levels of risky driving. Psychological distress uniquely explained a significant 6.7% and 9.5% of variance in risky driving for males and females respectively. Conclusions: Medical practitioners treating adolescents who have been injured through risky behaviour need to aware of the potential contribution of psychological distress, whilst mental health professionals working with adolescents experiencing psychological distress need to be aware of this additional source of potential harm. The nature of the causal relationships linking psychological distress and risky driving behaviour are not yet fully understood, indicating a need for further research so that strategies such as screening can be investigated.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the last decade, a gradual but significant shift in education has taken place. Schools have transformed from hermetically sealed, impermeable bureaucracies to dynamic and flexible organisations characterised by openness to local communities and connectedness to global issues and cultures. They are also more responsive to the aspirations of students and parents. A central feature of what Christian Maroy (2009) has described as the post bureaucratic era of education has been the relationships formed between schools and other organisations through formalised partnerships. Partnerships have been a significant feature of schooling in Queensland since the 1980s when schools developed Vocational Education Programs (VET) providing alternative pathways from schooling to post school training or employment. However, partnerships that have emerged in recent times have been more structured in their organisation and more targeted in terms of the outcomes they aim to achieve. Examples here have included Queensland’s District Youth Achievement plans that linked schools, business, industry bodies, training organisations and community groups to improve transition outcomes, particularly for young people at risk in their transitions from school to post-school life.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information and communication technologies (ICTs) are essential components of the knowledge economy, and have an immense complementary role in innovation, education, knowledge creation, and relations with government, civil society, and business within city regions. The ability to create, distribute, and exploit knowledge has become a major source of competitive advantage, wealth creation, and improvements in the new regional policies. Growing impact of ICTs on the economy and society, rapid application of recent scientific advances in new products and processes, shifting to more knowledge-intensive industry and services, and rising skill requirements have become crucial concepts for urban and regional competitiveness. Therefore, harnessing ICTs for knowledge-based urban development (KBUD) has a significant impact on urban and regional growth (Yigitcanlar, 2005). In this sense, e-region is a novel concept utilizing ICTs for regional development. Since the Helsinki European Council announced Turkey as a candidate for European Union (EU) membership in 1999, the candidacy has accelerated the speed of regional policy enhancements and adoption of the European regional policy standards. These enhancements and adoption include the generation of a new regional spatial division, NUTS-II statistical regions; a new legislation on the establishment of regional development agencies (RDAs); and new orientations in the field of high education, science, and technology within the framework of the EU’s Lisbon Strategy and the Bologna Process. The European standards posed an ambitious new agenda in the development and application of contemporary regional policy in Turkey (Bilen, 2005). In this sense, novel regional policies in Turkey necessarily endeavor to include information society objectives through efficient use of new technologies such as ICTs. Such a development seeks to be based on tangible assets of the region (Friedmann, 2006) as well as the best practices deriving from grounding initiatives on urban and local levels. These assets provide the foundation of an e-region that harnesses regional development in an information society context. With successful implementations, the Marmara region’s local governments in Turkey are setting the benchmark for the country in the implementation of spatial information systems and e-governance, and moving toward an e-region. Therefore, this article aims to shed light on organizational and regional realities of recent practices of ICT applications and their supply instruments based on evidence from selected local government organizations in the Marmara region. This article also exemplifies challenges and opportunities of the region in moving toward an e-region and provides a concise review of different ICT applications and strategies in a broader urban and regional context. The article is organized in three parts. The following section scrutinizes the e-region framework and the role of ICTs in regional development. Then, Marmara’s opportunities and challenges in moving toward an e-region are discussed in the context of ICT applications and their supply instruments based on public-sector projects, policies, and initiatives. Subsequently, the last section discusses conclusions and prospective research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Speeding in school zones is a problem in both Malaysia and Australia. While there are differences between the countries in terms of school zone treatments and more generally, these differences do not explain why people choose to speed in school zones. Because speeding is usually an intentional behaviour, the Theory of Planned Behaviour (TPB) has been used to understand speeding and develop interventions, however it has limitations which can be addressed by extending the model to incorporate other constructs. One promising construct is mindfulness, which can improve the explanatory value of the TPB by taking into account unintentional speeding attributable to a lack of focus on important elements of the driving environment. We explain what mindfulness is (and is not), how it can assist in providing a better understanding of speeding in school zones, and how it can contribute to the development of interventions. We then outline a program of research which has been commenced, investigating the contribution of mindfulness to an understanding of speed choice in school zones in two different settings (Australia and Malaysia) using the TPB.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Adolescents engage in many risk-taking behaviors that have the potential to lead to injury. The school environment has a significant role in shaping adolescent behavior, and this study aimed to provide additional information about the benefits associated with connectedness to school. Early adolescents aged 13 to 15 years (N = 509, 49% boys) were surveyed about school connectedness, engagement in transport and violence risk-taking, and injury experiences. Significant relations were found between school connectedness and reduced engagement in both transport and violence risk-taking, as well as fewer associated injuries. This study has implications for the area of risk-taking and injury prevention, as it suggests the potential for reducing adolescents' injury through school based interventions targeting school connectedness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mentoring has been identified as a valuable learning activity for beginners and more experienced personnel across a range of professions. For example, education, nursing, medicine, law, accounting , and public administration are among those professions that have utilised mentoring programs as a way of socialising and developing the skills and competencies of new professionals. The definition of mentoring used in this paper comes from Hansford, Tennent, and Ehrich (2002, 2003) that describes mentoring as a process whereby a more experienced practitioner works with, supports, guides and provides professional development to a less experienced practitioner. Mentoring, then, is often used to develop novice or less experienced professionals at two important phases in their career: (i) during their initial university training; and (ii) after graduation from university. For example, within the field experience components of many university degrees in education, nursing, medicine, social work, and other human service programs, students are assigned workplace mentors who assist them in transferring important skills and knowledge learned at university into practical setting. For concentrated periods of time during their degree, pre-service teachers, pre-service nurses and medical students work in the field alongside a workplace mentor.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To quantify the lagged effects of mean temperature on deaths from cardiovascular diseases in Brisbane, Australia. Design Polynomial distributed lag models were used to assess the percentage increase in mortality up to 30 days associated with an increase (or decrease) of 1°C above (or below) the threshold temperature. Setting Brisbane, Australia. Patients 22 805 cardiovascular deaths registered between 1996 and 2004. Main outcome measures Deaths from cardiovascular diseases. Results The results show a longer lagged effect in cold days and a shorter lagged effect in hot days. For the hot effect, a statistically significant association was observed only for lag 0–1 days. The percentage increase in mortality was found to be 3.7% (95% CI 0.4% to 7.1%) for people aged ≥65 years and 3.5% (95% CI 0.4% to 6.7%) for all ages associated with an increase of 1°C above the threshold temperature of 24°C. For the cold effect, a significant effect of temperature was found for 10–15 lag days. The percentage estimates for older people and all ages were 3.1% (95% CI 0.7% to 5.7%) and 2.8% (95% CI 0.5% to 5.1%), respectively, with a decrease of 1°C below the threshold temperature of 24°C. Conclusions The lagged effects lasted longer for cold temperatures but were apparently shorter for hot temperatures. There was no substantial difference in the lag effect of temperature on mortality between all ages and those aged ≥65 years in Brisbane, Australia.