668 resultados para Security Studies
Resumo:
We write in response to the letter by Liu et al. [1] commenting on our article, ‘‘Mesenchymal Stem Cells Regulate Angiogenesis According to Their Mechanical Environment’’ [2]. The study by Liu et al. demonstrates that the commonly used endogeneous reference gene (ERG), b-actin, is upregulated by mechanical loading, indicating a potential bias in the determined target gene expression when normalizing to b-actin, such as in our report on unchanged vascular endothelial growth factor (VEGF) and hypoxia-inducible factors (HIF)-1a mRNA levels in mechanically loaded mesenchymal stem cells (MSCs).
Resumo:
Lesson studies are a powerful form of professional development (Doig and Groves, 2011). The processes of creating, enacting, analyzing, and refining lessons to improve teaching practices are key components of lesson studies. Lesson studies have been the primary form of professional development in Japanese classrooms for many years (Lewis, Perry and Hurd, 2009). This model is now used to improve instruction in many South-East Asian countries (White and Lim, 2008), as well as increasingly in North America (Lesson Study Research Group, 2004), and South Africa (Ono and Ferreira, 2010). In China, this form of professional development aimed at improving teaching, has also been adopted, originating from Soviet models of teacher professional development arising from influences post 1949 (China Education Yearbook, 1986). Thus, China too has a long history of improving teaching and learning through this form of school-based professional learning.
Resumo:
The purpose of this paper is to empirically examine the state of cloud computing adoption in Australia. I specifically focus on the drivers, risks, and benefits of cloud computing from the perspective of IT experts and forensic accountants. I use thematic analysis of interview data to answer the research questions of the study. The findings suggest that cloud computing is increasingly gaining foothold in many sectors due to its advantages such as flexibility and the speed of deployment. However, security remains an issue and therefore its adoption is likely to be selective and phased. Of particular concern are the involvement of third parties and foreign jurisdictions, which in the event of damage may complicate litigation and forensic investigations. This is one of the first empirical studies that reports on cloud computing adoption and experiences in Australia.
Resumo:
The article discusses the issues of resistance; that is resistance by prisoners to the various manifestations of power operating in high security prisons, as well as that of attempted shifts in the regime from physical to psychological control. Other topics highlighted include legitimacy and 'official discourse', mourning and the construction of 'ungrievable lives' and the importance of finding a way out of the cycle of violence, which high security regimes perpetuate.
Resumo:
Emotions are inherently social, and are central to learning, online interaction and literacy practices (Shen, Wang, & Shen, 2009). Demonstrating the dynamic sociality of literacy practice, we used e-motion diaries or web logs to explore the emotional states of pre-service high school teachers’ experiences of online learning activities. This is because the methods of communication used by university educators in online learning and writing environments play an important role in fulfilling students’ need for social interaction and inclusion (McInnerney & Roberts, 2004). Feelings of isolation and frustration are common emotions experienced by students in many online learning environments, and are associated with the success or failure of online interactions and learning (Su, et al., 2005). The purpose of the study was to answer the research question: What are the trajectories of pre-service teachers’ emotional states during online learning experiences? This is important because emotions are central to learning, and the current trend toward Massive Open Online Courses (MOOCs) needs research about students’ emotional connections in online learning environments (Kop, 2011). The project was conducted with a graduate class of 64 high school science pre-service teachers in Science Education Curriculum Studies in a large Australian university, including males and females from a variety of cultural backgrounds, aged 22-55 years. Online activities involved the students watching a series of streamed live lectures for the first 5 weeks providing a varied set of learning experiences, such as viewing science demonstrations (e.g., modeling the use of discrepant events). Each week, students provided feedback on learning by writing and posting an e-motion diary or web log about their emotional response. Students answered the question: What emotions did you experience during this learning experience? The descriptive data set included 284 online posts, with students contributing multiple entries. Linguistic appraisal theory, following Martin and White (2005), was used to regroup the 22 different discrete emotions reported by students into the six main affect groups – three positive and three negative: unhappiness/happiness, insecurity/security, and dissatisfaction/satisfaction. The findings demonstrated that the pre-service teachers’ emotional responses to the streamed lectures tended towards happiness, security, and satisfaction within the typology of affect groups – un/happiness, in/security, and dis/satisfaction. Fewer students reported that the streamed lectures triggered negative feelings of frustration, powerlessness, and inadequacy, and when this occurred, it often pertained to expectations of themselves in the forthcoming field experience in classrooms. Exceptions to this pattern of responses occurred in relation to the fifth streamed lecture presented in a non-interactive slideshow format that compressed a large amount of content. Many students responded to the content of the lecture rather than providing their emotional responses to this lecture, and one student felt “completely disengaged”. The social practice of online writing as blogs enabled the students to articulate their emotions. The findings primarily contribute new understanding about students' wide range of differing emotional states, both positive and negative, experienced in response to streamed live lectures and other learning activities in higher education external coursework. The is important because the majority of previous studies have focused on particular negative emotions, such as anxiety in test taking. The research also highlights the potentials of appraisal theory for studying human emotions in online learning and writing.
Resumo:
The growing importance of logistics in increasingly globalised production and consumption systems strengthens the case for explicit consideration of the climate risks that may impact on the operation of ports in the future, as well as the formulation of adaptation responses that act to enhance their resilience. Within a logistics chain, seaports are functional nodes of significant strategic importance, and are considered as critical gateways linking local and national supply chains to global markets. However, they are more likely to be exposed to vagaries of climate-related extreme events due to their coastal locations. As such, they need to be adaptive and respond to the projected impacts of climate change, in particular extreme weather events. These impacts are especially important in the logistics context as they could result in varying degrees of business interruption; including business closure in the worst case scenario. Since trans-shipment of freight for both the import and export of goods and raw materials has a significant impact on Australia’s sustained economic growth it was considered important to undertake a study of port functional assets, to assess their vulnerability to climate change, to model the potential impacts of climate-related extreme events, and to highlight possible adaptation responses.
Resumo:
“Supermax” prisons, conceived by the United States in the early 1980s, are typically reserved for convicted political criminals such as terrorists and spies and for other inmates who are considered to pose a serious ongoing threat to the wider community, to the security of correctional institutions, or to the safety of other inmates. Prisoners are usually restricted to their cells for up to twenty-three hours a day and typically have minimal contact with other inmates and correctional staff. Not only does the Federal Bureau of Prisons operate one of these facilities, but almost every state has either a supermax wing or stand-alone supermax prison. The Globalization of Supermax Prisons examines why nine advanced industrialized countries have adopted the supermax prototype, paying particular attention to the economic, social, and political processes that have affected each state. Featuring essays that look at the U.S.-run prisons of Abu Ghraib and Guantanemo, this collection seeks to determine if the American model is the basis for the establishment of these facilities and considers such issues as the support or opposition to the building of a supermax and why opposition efforts failed; the allegation of human rights abuses within these prisons; and the extent to which the decision to build a supermax was influenced by developments in the United States. Additionally, contributors address such domestic matters as the role of crime rates, media sensationalism, and terrorism in each country’s decision to build a supermax prison.
Resumo:
In Responsibility to Protect and Women, Peace and Security: Aligning the Protection Agendas, editors Davies, Nwokora, Stamnes and Teitt address the intersections of the Responsibility to Protect (R2P) principle and the Women, Peace, and Security (WPS) agenda. Widespread or systematic sexual or gender-based violence is a war crime, a crime against humanity and an act of genocide, all of which are clearly addressed in the R2P principle. The protection of those at risk of widespread sexual violence is therefore not only relative to the Women, Peace and Security (WPS) agenda, but a fundamental sovereign obligation for all states as part of their commitment to R2P. Contributions from policy-makers and academics consider both the merits and the utility of aligning the protection agendas of R2P and WPS. Ultimately, a number of actionable recommendations are made concerning a unification of the agendas to best support the global empowerment of women and prevention of mass atrocities.
Resumo:
This research introduces a general methodology in order to create a Coloured Petri Net (CPN) model of a security protocol. Then standard or user-defined security properties of the created CPN model are identified. After adding an attacker model to the protocol model, the security property is verified using state space method. This approach is applied to analyse a number of trusted computing protocols. The results show the applicability of proposed method to analyse both standard and user-defined properties.
Resumo:
The syntheses, properties and electronic structures of a series of porphyrin dimers connected by two-atom bridges were compared. The study found that an azo linker results in the most efficient electronic communication between the two porphyrin rings, and is the superior connector for dimers, trimers and oligomers in the design of nonlinear optical materials. This has implications for the design of molecular probes and sensors, photodynamic therapy, microfabrication, and three-dimensional optical data storage. The research led to the synthesis of a number of new porphyrin monomers and dimers, which were characterised using structural, spectroscopic and spectrometric techniques.
Resumo:
Proton-bound dimers consisting of two glycerophospholipids with different headgroups were prepared using negative ion electrospray ionization and dissociated in a triple quadrupole mass spectrometer. Analysis of the tandem mass spectra of the dimers using the kinetic method provides, for the first time, an order of acidity for the phospholipid classes in the gas phase of PE < PA << PG < PS < PI. Hybrid density functional calculations on model phospholipids were used to predict the absolute deprotonation enthalpies of the phospholipid classes from isodesmic proton transfer reactions with phosphoric acid. The computational data largely support the experimental acidity trend, with the exception of the relative acidity ranking of the two most acidic phospholipid species. Possible causes of the discrepancy between experiment and theory are discussed and the experimental trend is recommended. The sequence of gas phase acidities for the phospholipid headgroups is found to (1) have little correlation with the relative ionization efficiencies of the phospholipid classes observed in the negative ion electrospray process, and (2) correlate well with fragmentation trends observed upon collisional activation of phospholipid \[M - H](-) anions. (c) 2005 American Society for Mass Spectrometry.
Resumo:
Review question/objective The review objective is to synthesise the best available evidence on experiences and perceptions of family members of intensive care unit patients on the adequacy of end-of-life care, where life-support modalities have been withheld or withdrawn. Inclusion criteria Types of participants This review will consider studies that report on the experiences and perceptions of patients’ families on EOLC in the ICU, where life-support modalities have been withheld or withdrawn. The family is defined as “those who are closest to the patient... the family may include the biological family, family by acquisition, and the family of choice and friends”. Phenomena of interest The phenomena of interest for this review are the patients’ families experiences, perceptions or views on the adequacy of EOLC delivered in the ICU, where life-support modalities were withheld or withdrawn. These experiences may refer to the following views on domains of care considered important at the end-of-life in the ICU, which have been described already in the existing literature: timely, consistent, and compassionate communication, clinician availability, clinical decision making based on patients’ preferences, goals and values, physical care implemented to maintain patient comfort, holistic interdisciplinary care and bereavement care for families of patients who died.
Resumo:
It has been an assumption of most anti-pornography discourse that porn damages women (and children) in a variety of ways. In Porno? Chic!, the author interrogated this assumption by examining the correlation between the incidence of sexual violence and other indicators of misogyny, and the availability and accessibility of pornography within a number of societies. This article develops that work with a specific focus on the regulatory environment as it relates to pornography and sexual representation. Does a liberal regulatory regime in sexual culture correlate with a relatively advanced state of sexual politics in a given country? Conversely, does an illiberal regime, where pornography and other forms of sexual culture are banned or severely restricted, correlate with relatively strong patriarchal structures? A comparative cross-country analysis seeks to explain the correlations identified, and to assess the extent to which the availability of porn can be viewed as a causal or a consequential characteristic of those societies where feminism has achieved significant advances.
Resumo:
For the past several decades, cryptographers have consistently provided us with stronger and more capable primitives and protocols that have found many applications in security systems in everyday life. One of the central tenets of cryptographic design is that, whereas a system’s architecture ought to be public and open to scrutiny, the keys on which it depends — long, utterly random, unique strings of bits — will be perfectly preserved by their owner, and yet nominally inaccessible to foes.