654 resultados para Technology. Elderly. Humanization. Bed bath
Resumo:
In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.
Resumo:
Mesothelioma is a rare malignancy arising from mesothelial cells lining the pleura and peritoneum. Advances in modern technology have allowed the development of array based approaches to the study of disease allowing researchers the opportunity to study many genes or proteins in a high-throughput fashion. This review describes the current knowledge surrounding array based approaches with respect to mesothelioma research. © 2009 by the International Association for the Study of Lung Cancer.
Resumo:
This study uses the well-known social networking site, Facebook (FB), for a study of differences in perceptions on the use of technologies in the classroom around the world. This study is part of a larger project exploring telecollaboration and the use of online discussions between graduate students in an online masters program based in Australia and students in the graduate education program at a regional university in Greece. Postings reveal more similarities between the situations and perceptions of the participants from the different countries than differences. Most participants indicated that while they and their students had access in general to computers and the internet, they did not necessarily have this access in the classroom. Even when technologies were available in schools, participants identified a critical need for professional development to increase teachers’ use of ICT. These findings are relevant to educators and policy development in terms of implementation of ICT or social networking in the language classroom.
Resumo:
We examine the role of politico-economic influences on macroeconomic performance within the framework of an endogenous growth model with costly technology adoption and uncertainty. The model is aimed at understanding the diversity in growth and inequality experiences across countries. Agents adopt either of two risky technologies, one of which is only available through financial intermediaries, who are able to alleviate some of this risk. The entry cost of financial intermediation depends on the proportion of government revenue that is allocated towards cost-reducing financial development expenditure, and agents vote on this proportion. The results show that agents at the top and bottom ends of the distribution prefer alternative means of re-distribution, thereby effectively blocking the allocation of resources towards cost-reducing financial development expenditure. Thus political factors have a role in delaying financial and capital deepening and economic development. Furthermore, the model provides a political-economy perspective on the Kuznets curve; uncertainty interacts with the political economy mechanism to produce transitional inequality patterns that, depending on initial conditions, can unearth the Kuznets-curve experience. Finally, the political outcomes are inefficient relative to policies aimed at maximizing the collective welfare of agents in the economy.
Resumo:
This thesis examined the influence of mobile digital technology on the brand identity of luxury brands. Specifically it focused on the use of mobile applications by automobile, hotel and beauty brands and compared the perceptions of marketing managers with consumers on how mobile applications influenced luxury brand identity and image. Outcomes of this research included a model to depict the ongoing process between mobile-mediated luxury brand identity and image, and a typology of luxury brand mobile applications listing key features of mobile-mediated luxemosphere. Overall findings suggest that the influence of mobile applications on luxury brand identity has been negative, as their brand image appeared to be degraded, resulting in diminishing the brand identity.
Resumo:
In plants, double-stranded RNA (dsRNA) is an effective trigger of RNA silencing, and several classes of endogenous small RNA (sRNA), processed from dsRNA substrates by DICER-like (DCL) endonucleases, are essential in controlling gene expression. One such sRNA class, the microRNAs (miRNAs) control the expression of closely related genes to regulate all aspects of plant development, including the determination of leaf shape, leaf polarity, flowering time, and floral identity. A single miRNA sRNA silencing signal is processed from a long precursor transcript of nonprotein-coding RNA, termed the primary miRNA (pri-miRNA). A region of the pri-miRNA is partially self-complementary allowing the transcript to fold back onto itself to form a stem-loop structure of imperfectly dsRNA. Artificial miRNA (amiRNA) technology uses endogenous pri-miRNAs, in which the miRNA and miRNA*(passenger strand of the miRNA duplex) sequences have been replaced with corresponding amiRNA/ amiRNA*sequences that direct highly efficient RNA silencing of the targeted gene. Here, we describe the rules for amiRNA design, as well as outline the PCR and bacterial cloning procedures involved in the construction of an amiRNA plant expression vector to control target gene expression in Arabidopsis thaliana. © 2014 Springer Science+Business Media New York.
Australian Research to Encourage School Students’ Positive Use of Technology to Reduce Cyberbullying
Resumo:
Information and Communications Technology (ICT) has spread rapidly in Australia. Mobile phones, which increasingly have advanced capabilities including Internet access, mobile television and multimedia storage, are owned by 22% of Australian children aged 9-11 years and 73% of those aged 12-14 years (Australian Bureau of Statistics, 2012b), as well as by over 90% of Australians aged 15 years and over(Australian Communications and Media Authority (ACMA), 2010). Nearly 80% of Australian households have access to the Internet and 73% have a broadband Internet connection, ensuring that Internet access is typically reliable and high-speed (Australian Bureau of Statistics, 2012a). Ninety percent of Australian children aged 5-14 years (comprising 79% of 5-8 year olds; 96% of 9-11 year olds; and 98% of 12-14 year olds) reported having accessed the Internet during 2011-2012, a significant increase from 79% in 2008-2009 (Australian Bureau of Statistics, 2012b). Approximately 90% of 5-14 year olds have accessed the Internet both from home and from school, with close to 49% accessing the Internet from other places (Australian Bureau of Statistics, 2012b). Young people often make use of borrowed Internet access (e.g. in friends’ homes), commercial access (e.g. cybercafés), public access (e.g. libraries), and mobile device access in areas offering free Wi-Fi (Lim, 2009).
Resumo:
Increasingly, organizations are looking to employ Social Technology (ST) to enhance their capability with Business Process Improvement (BPI). However, little is known about how the characteristics or qualities of ST actually influence an organizations' capability at Business Process Improvement (BPI). This paper discusses the potential role of ST in process improvement by presenting an a-priory model derived by an investigation of extant research. First, the qualities of social technology that potentially support high level action possibilities related to BPI are presented (we refer to these as affordances), next these affordances are mapped to the De Bruin (2009) BPM Maturity model as a first step to understanding how ST influences BPI. This work is expected to contribute to our knowledge and understanding of the relationship between ST and BPI, and will extend existing theory on Business Process Management capability and maturity.
Resumo:
This paper presents a vulnerability within the generic object oriented substation event (GOOSE) communication protocol. It describes an exploit of the vulnerability and proposes a number of attack variants. The attacks sends GOOSE frames containing higher status numbers to the receiving intelligent electronic device (IED). This prevents legitimate GOOSE frames from being processed and effectively causes a hijacking of the communication channel, which can be used to implement a denial–of–service (DoS) or manipulate the subscriber (unless a status number roll-over occurs). The authors refer to this attack as a poisoning of the subscriber. A number of GOOSE poisoning attacks are evaluated experimentally on a test bed and demonstrated to be successful.
Resumo:
More than 2 million older adults identify as lesbian, gay, bisexual, or transgender (LGBT). The purpose of this article is to present an overview of the physical and mental health needs of LGBT older adults to sensitize nurses to the specific needs of this group. Nurses are in a prominent position to create health care environments that will meet the needs of this invisible, and often misunderstood, group of people.
Resumo:
BACKGROUND Inconsistencies in research findings on the impact of the built environment on walking across the life course may be methodologically driven. Commonly used methods to define 'neighbourhood', from which built environment variables are measured, may not accurately represent the spatial extent to which the behaviour in question occurs. This paper aims to provide new methods for spatially defining 'neighbourhood' based on how people use their surrounding environment. RESULTS Informed by Global Positioning Systems (GPS) tracking data, several alternative neighbourhood delineation techniques were examined (i.e., variable width, convex hull and standard deviation buffers). Compared with traditionally used buffers (i.e., circular and polygon network), differences were found in built environment characteristics within the newly created 'neighbourhoods'. Model fit statistics indicated that exposure measures derived from alternative buffering techniques provided a better fit when examining the relationship between land-use and walking for transport or leisure. CONCLUSIONS This research identifies how changes in the spatial extent from which built environment measures are derived may influence walking behaviour. Buffer size and orientation influences the relationship between built environment measures and walking for leisure in older adults. The use of GPS data proved suitable for re-examining operational definitions of neighbourhood.
Resumo:
We present a review of literature from the fields of gerontology, gerontechnology, HCI and government policy that deals with social and technical solutions for the ageing population. We highlight common assumptions about ageing people, which we argue are still embedded in much of the research related to the domain of ageing. This paper challenges six common assumptions across four broad themes that we identified in the literature. It aims to provide a reminder and resource for designers to eschew assumptions during designing technology for 'older' users.
Resumo:
Research Statement: In 2011 The State Library of Queensland in collaboration with Queensland University of Technology School of Design held a screening of six student urban films shot on location in several inner-city sites under my supervision. The films are now a permanent "exhibit" on The Edge State Library electronic site. The students were directed to explore the realist film ethos, which forms a platform for the research project, in its focus on the nonrepresentational aesthetics of the street, the unfinished and the sensory. The research demonstrates that film is a powerful instrument for the urban imaginary, for screening the city.
Resumo:
Much of what is written about digital technologies in preschool contexts focuses on young children’s acquisition of skills rather than their meaning-making during use of technologies. In this paper, we consider how the viewing of a YouTube video was used by a teacher and children to produce shared understandings about it. Conversation analysis of talk and interaction during the viewing of the video establishes some of the ways that individual accounts of events were produced for others and then endorsed as shared understandings. The analysis establishes how adults and children made use of verbal and embodied actions during interactions to produce shared understandings of the YouTube video, the events it recorded and written commentary about those events