623 resultados para Security issues


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The literature on humour in teaching frequently defaults to a series of maxims about how it can be used most appropriately: ‘Never tease students', ‘Don't joke about sensitive issues', ‘Never use laughter for disciplinary purposes'. This paper outlines recent research into the boundaries of humour-use within teacher education, which itself forms one part of a large scale, broadly-based study into the use of humour within tertiary teaching. This particular part of the research involves semi-structured, in-depth interviews with university academics. Following the ‘benign violations' theory of humour - wherein, to be funny, a situation/statement must be some kind of a social violation, that violation must be regarded as relatively benign, and the two ideas must be held simultaneously - this paper suggests that the willingness of academics to use particular types of humour in their teaching revolves around the complexities of determining the margins of ‘the benign'. These margins are shaped in part by pedagogic limitations, but also by professional delimitations. In terms of limitations, the boundaries of humour are set by the academic environment of the university, by the characteristics of different cohorts of students, and by what those students are prepare to laugh at. In terms of delimitations, most academics are prepared to tease their student, and many are prepared to use laughter as a form of discipline, however their own humour orientation, academic seniority, and employment security play a large role in determining what kinds of humour will be used, and where boundaries will be set. The central conclusion here is that formal maxims of humour provide little more than vague strategic guidelines, largely failing to account for the complexity of teaching relationships, for the differences between student cohorts, and for the talents and standing of particular teachers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our approach consists of two steps. In the first step, we construct a safety envelope of the system. Under nominal conditions (that is, when there are no attacks), the system always stays inside its safety envelope. In the second step, we build an attack detector: a monitor that executes synchronously with the system and raises an alarm whenever the system state falls outside the safety envelope. We synthesize safety envelopes using a modified machine learning procedure applied on data collected from the system when it is not under attack. We present experimental results that show effectiveness of our approach, and also validate the several novel features that we introduced in our learning procedure.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes current research at the Australian Centre for Field Robotics (ACFR) in collaboration with the Commonwealth Scientific and Industrial Research Organisation (CSIRO) within the Cooperative Research Centre (CRC) for Mining Technology and Equipment (CMTE) towards achieving autonomous navigation of underground vehicles, like a Load-Haul-Dump (LHD) truck. This work is being sponsored by the mining industry through the Australian Mineral Industries Research Association Limited (AMIRA). Robust and reliable autonomous navigation can only be realised by achieving high level tasks such as path-planning and obstacle avoidance. This requires determining the pose (position and orientation) of the vehicle at all times. A minimal infrastructure localisation algorithm that has been developed for this purpose is outlined and the corresponding results are presented. Further research issues that are under investigation are also outlined briefly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses a Dumber of key issues for the development of robust, obstacle detection systems for autonomous mining and construction vehicles. A taxonomy of obstacle detection systems is described; An overview of the state-of- the-art in obstacle detection for outdoor autonomous vehicles is presented with their applicability to the mining and construction environments noted. The issue of so-called fail-safe obstacle detection is then discussed. Finally, we describe the development of an obstacle detection system for a mining vehicle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The synthesis of organoclays (OC) by intercalation of quaternary ammonium cation (QAC) into expanding clay minerals, notably montmorillonite (Mt), has attracted a great deal of attention during the past two decades. The OC have also found applications in the manufacture of clay polymer nanocomposites (CPN) and environmental remediation. Despite the wealth of information that exists on the formation and properties of OC, some problems remain to be resolved. The present contribution is an attempt at clarifying two outstanding issues, based on the literature and experimental data obtained by the authors over the past years. The first issue concerns the relationship between the cation exchange capacity (CEC) of the Mt and the basal spacing of the OC which, in turn, is dependent on the concentration and the nature of the added QAC. At a concentration less than 1 CEC, organo-Mt (OMt) formed using the QAC with a short alkyl chain length with nc < 16 (e.g., dodecyl trimethylammonium) gives basal spacings of 1.4–1.6 nm that are essentially independent of the CEC. However, for long-chain QAC with nc ≥ 16 (e.g., hexadecyl trimethylammonium), the basal spacing varies with the QAC concentration. For Mt with a CEC of 80–90 meq/100 g, the basal spacing of the OC increases gradually with the CEC and shows a sudden (stepwise) increase to 3.2–3.8 nm at a QAC concentration of 1.5 CEC and to 3.5–4.0 nm at a concentration of 2.0 CEC. The second issue pertains to the “locking” effect in QAC- and silane-modified pillared interlayered clays (PILC) and Mt. For silylated Mt, the “locking” effect results from the covalent bonding of silane to two adjacent layers within a single clay mineral particle. The same mechanism can operate in silane-grafted PILC but in this case, the “locking” effect may primarily be ascribed to the pillaring of adjacent basal surfaces by metal hydr(oxides).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Over the last two decades, housing affordability has been a problem for young people, and identified as factor leading to youth homelessness. The National Youth Commission Inquiry into Youth Homelessness developed a roadmap for preventing this problem (National Youth Commission, 2008). The roadmap recommends increasing the supply of affordable housing for young people as an important strategy to reduce the risk of homelessness problems. In addition, understanding the barriers and the needs of young people is a significant part of the development of a national affordable housing strategy. This paper explores issues encountered by young people when they enter the housing market as first home buyers. A short survey was conducted to review the barriers to entry, classified by income levels, housing cost and availability of affordable housing. In the current competitive job market, young people have minimal work experience, relatively low job security and low income. In addition to these barriers, participants also suggested other barriers towards the purchase of their first home, such as lack of knowledge of legal issues and lack of government funding. This study suggests the need for both government and educational support for young people around housing choices and the development of financial strategies to manage barriers towards owning their first home.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2012 the Australian Commonwealth government was scheduled to release the first dedicated policy for culture and the arts since the Keating government's Creative Nation (1994). Investing in a Creative Australia was to appear after a lengthy period of consultation between the Commonwealth government and all interested cultural sectors and organisations. When it eventuates, the policy will be of particular interest to those information professionals working in the GLAM (galleries, libraries, archives and museums) environment. GLAM is a cross-institutional field which seeks to find points of commonality among various cultural-heritage institutions, while still recognising their points of difference. Digitisation, collaboration and convergence are key themes and characteristics of the GLAM sector and its associated theoretical discipline. The GLAM movement has seen many institutions seeking to work together to create networks of practice that are beneficial to the cultural-heritage industry and sector. With a new Australian cultural policy imminent, it is timely to reflect on the issues and challenges that GLAM principles present to national cultural-heritage institutions by discussing their current practices. In doing so, it is possible to suggest productive ways forward for these institutions which could then be supported at a policy level by the Commonwealth government. Specifically, this paper examines four institutions: the National Gallery of Australia, the National Library of Australia, the National Archives of Australia and the National Museum of Australia. The paper reflects on their responses to the Commonwealth's 2011 Cultural Policy Discussion Paper. It argues that by encouraging and supporting collecting institutions to participate more fully in GLAM practices the Commonwealth government's cultural policy would enable far greater public access to, and participation in, Australia's cultural heritage. Furthermore, by considering these four institutions, the paper presents a discussion of the challenges and the opportunities that GLAM theoretical and disciplinary principles present to the cultural-heritage sector. Implications for Best Practice * GLAM is a developing field of theory and practice that encompasses many issues and challenges for practitioners in this area. * GLAM principles and practices are increasingly influencing the cultural-heritage sector. * Cultural policy is a key element in shaping the future of Australia's cultural-heritage sector and needs to incorporate GLAM principles.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Our contemporary concerns about food range from food security to agricultural sustainability to getting dinner on the table for family and friends. This book investigates food issues as they intersect with participatory Internet culture--blogs, wikis, online photo- and video-sharing platforms, and social networks in efforts to bring about a healthy, socially inclusive, and sustainable food future. Focusing on our urban environments provisioned with digital and network capacities, and drawing on such "bottom-up" sociotechnical trends as DIY and open source, the chapters describe engagements with food and technology that engender (re-)creative interactions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Decision-making is such an integral aspect in health care routine that the ability to make the right decisions at crucial moments can lead to patient health improvements. Evidence-based practice, the paradigm used to make those informed decisions, relies on the use of current best evidence from systematic research such as randomized controlled trials. Limitations of the outcomes from randomized controlled trials (RCT), such as “quantity” and “quality” of evidence generated, has lowered healthcare professionals’ confidence in using EBP. An alternate paradigm of Practice-Based Evidence has evolved with the key being evidence drawn from practice settings. Through the use of health information technology, electronic health records (EHR) capture relevant clinical practice “evidence”. A data-driven approach is proposed to capitalize on the benefits of EHR. The issues of data privacy, security and integrity are diminished by an information accountability concept. Data warehouse architecture completes the data-driven approach by integrating health data from multi-source systems, unique within the healthcare environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim To review recent studies which identify the factors that contribute to stress, burnout and job satisfaction for nurses who are working in haemodialysis units. Background Regardless of where nurses work, stress, job burnout and dissatisfaction are known to cause high rates of nurse resignations and for many of those to leave the profession entirely. Understanding factors that contribute to job satisfaction, stress and burnout could increase haemodialysis nurse retention and improve health outcomes for people receiving haemodialysis. Evaluation Studies of job stress, burnout and satisfaction for nurses working in haemodialysis units published in English from January 2000 to December 2009 were identified. Specific inclusion criteria were developed resulting in eleven articles selected for this review. Key issues Specifically for haemodialysis nurses’ job stress and burnout was found to originate from two factors related to either patient care or organisations. Patient care factors included unrealistic patient expectations, progressive decline of a patient’s health, and violence and verbal abuse from patients. Organisational factors included shortage of time to complete tasks, lack of resources and unsupportive work environments. Increased job satisfaction for haemodialysis nurses was due to having job security, freedom to use one’s judgement and the quality of nurse/physician interactions. Conclusion Job stress and burnout are problematic for haemodialysis nurses. Instituting strategies which prevent and/or ameliorate stress or burnout could result in improved job satisfaction and also the retention of highly skilled haemodialysis nurses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study questions how the categories of security, education and literacy were brought together as related elements of a whole-of-government strategy in the production of civil society. Drawing on an analysis of key political texts, the study argues that the categories of education and literacy have been used in diverse ways in the production of national, social, economic and geopolitical security interests. As dialogue about security has intensified, rationalisations about the national interest have engaged notions of security leading to the legitimation of a diverse set of policy instruments, strategically used to contain the rise of complex social forces and protect homogenous cultural values.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Stakeholders commonly agree that food systems need to be urgently reformed. Yet, how food systems should be reformed is extremely contested. Public international law and regulations are uniquely placed to influence and guide law, policy, programmes and action at regional, national and local levels. Although plenty of international legal instruments intersect with food-related issues, the international regulation of food systems is fragmented, understudied and contested. In order to address these issues, this paper maps and analyses the public international regulatory aspects of food production with a view to providing recommendations for reform. Accordingly, this paper brings together a variety of binding and non-binding international regulatory instruments that to varying degrees and from a range of angles deals with the first activity in the food system: food production. The following paper traces the regulatory tools from natural resources, to the farmers and farm workers that apply skill and experience, and finally to the different dimension of world trade in food. The various regulatory instruments identified, and their collective whole, will be analysed against a rights-based approach to food security.