272 resultados para revised
Resumo:
Personality factors implicated in alcohol misuse have been extensively investigated in adult populations. Fewer studies have clarified the robustness of personality dimensions in predicting early onset alcohol misuse in adolescence. The aim of this study was to examine the predictive utility of two prominent models of personality (Cloninger, 1987; Eysenck & Eysenck, 1975) in emergent alcohol misuse in adolescence. One hundred and 92 secondary school students (mean age = 13.8 years, SD = 0.5) were administered measures of personality (Revised Junior Eysenck Personality Questionnaire – abbreviated; Temperament scale of Junior Temperament and Character Inventory) and drinking behavior (quantity and frequency of consumption, Alcohol Use Disorders Identification Test) at Time 1. At 12-month follow-up, 170 students (88.5%) were retained. Hierarchical multiple regressions revealed the dimensions of psychoticism, extraversion, and Novelty-Seeking to be the most powerful predictors of future alcohol misuse in adolescents. Results provide support for the etiological relevance of these dimensions in the development of early onset alcohol misuse. Findings can be used to develop early intervention programs that target personality risk factors for alcohol misuse in high-risk youth.
Resumo:
As Web searching becomes more prolific for information access worldwide, we need to better understand users’ Web searching behaviour and develop better models of their interaction with Web search systems. Web search modelling is a significant and important area of Web research. Searching on the Web is an integral element of information behaviour and human–computer interaction. Web searching includes multitasking processes, the allocation of cognitive resources among several tasks, and shifts in cognitive, problem and knowledge states. In addition to multitasking, cognitive coordination and cognitive shifts are also important, but are under-explored aspects of Web searching. During the Web searching process, beyond physical actions, users experience various cognitive activities. Interactive Web searching involves many users’ cognitive shifts at different information behaviour levels. Cognitive coordination allows users to trade off the dependences among multiple information tasks and the resources available. Much research has been conducted into Web searching. However, few studies have modelled the nature of and relationship between multitasking, cognitive coordination and cognitive shifts in the Web search context. Modelling how Web users interact with Web search systems is vital for the development of more effective Web IR systems. This study aims to model the relationship between multitasking, cognitive coordination and cognitive shifts during Web searching. A preliminary theoretical model is presented based on previous studies. The research is designed to validate the preliminary model. Forty-two study participants were involved in the empirical study. A combination of data collection instruments, including pre- and post-questionnaires, think-aloud protocols, search logs, observations and interviews were employed to obtain users’ comprehensive data during Web search interactions. Based on the grounded theory approach, qualitative analysis methods including content analysis and verbal protocol analysis were used to analyse the data. The findings were inferred through an analysis of questionnaires, a transcription of think-aloud protocols, the Web search logs, and notes on observations and interviews. Five key findings emerged. (1) Multitasking during Web searching was demonstrated as a two-dimensional behaviour. The first dimension was represented as multiple information problems searching by task switching. Users’ Web searching behaviour was a process of multiple tasks switching, that is, from searching on one information problem to searching another. The second dimension of multitasking behaviour was represented as an information problem searching within multiple Web search sessions. Users usually conducted Web searching on a complex information problem by submitting multiple queries, using several Web search systems and opening multiple windows/tabs. (2) Cognitive shifts were the brain’s internal response to external stimuli. Cognitive shifts were found as an essential element of searching interactions and users’ Web searching behaviour. The study revealed two kinds of cognitive shifts. The first kind, the holistic shift, included users’ perception on the information problem and overall information evaluation before and after Web searching. The second kind, the state shift, reflected users’ changes in focus between the different cognitive states during the course of Web searching. Cognitive states included users’ focus on the states of topic, strategy, evaluation, view and overview. (3) Three levels of cognitive coordination behaviour were identified: the information task coordination level, the coordination mechanism level, and the strategy coordination level. The three levels of cognitive coordination behaviour interplayed to support multiple information tasks switching. (4) An important relationship existed between multitasking, cognitive coordination and cognitive shifts during Web searching. Cognitive coordination as a management mechanism bound together other cognitive processes, including multitasking and cognitive shifts, in order to move through users’ Web searching process. (5) Web search interaction was shown to be a multitasking process which included information problems ordering, task switching and task and mental coordinating; also, at a deeper level, cognitive shifts took place. Cognitive coordination was the hinge behaviour linking multitasking and cognitive shifts. Without cognitive coordination, neither multitasking Web searching behaviour nor the complicated mental process of cognitive shifting could occur. The preliminary model was revisited with these empirical findings. A revised theoretical model (MCC Model) was built to illustrate the relationship between multitasking, cognitive coordination and cognitive shifts during Web searching. Implications and limitations of the study are also discussed, along with future research work.
Resumo:
In the current thesis, the reasons for the differential impact of Holocaust trauma on Holocaust survivors, and the differential intergenerational transmission of this trauma to survivors’ children and grandchildren were explored. A model specifically related to Holocaust trauma and its transmission was developed based on trauma, family systems and attachment theories as well as theoretical and anecdotal conjecture in the Holocaust literature. The Model of the Differential Impact of Holocaust Trauma across Three Generations was tested firstly by extensive meta-analyses of the literature pertaining to the psychological health of Holocaust survivors and their descendants and secondly via analysis of empirical study data. The meta-analyses reported in this thesis represent the first conducted with research pertaining to Holocaust survivors and grandchildren of Holocaust survivors. The meta-analysis of research conducted with children of survivors is the first to include both published and unpublished research. Meta-analytic techniques such as meta-regression and sub-set meta-analyses provided new information regarding the influence of a number of unmeasured demographic variables on the psychological health of Holocaust survivors and descendants. Based on the results of the meta-analyses it was concluded that Holocaust survivors and their children and grandchildren suffer from a statistically significantly higher level or greater severity of psychological symptoms than the general population. However it was also concluded that there is statistically significant variation in psychological health within the Holocaust survivor and descendant populations. Demographic variables which may explain a substantial amount of this variation have been largely under-assessed in the literature and so an empirical study was needed to clarify the role of demographics in determining survivor and descendant mental health. A total of 124 participants took part in the empirical study conducted for this thesis with 27 Holocaust survivors, 69 children of survivors and 28 grandchildren of survivors. A worldwide recruitment process was used to obtain these participants. Among the demographic variables assessed in the empirical study, aspects of the survivors’ Holocaust trauma (namely the exact nature of their Holocaust experiences, the extent of family bereavement and their country of origin) were found to be particularly potent predictors of not only their own psychological health but continue to be strongly influential in determining the psychological health of their descendants. Further highlighting the continuing influence of the Holocaust was the finding that number of Holocaust affected ancestors was the strongest demographic predictor of grandchild of survivor psychological health. Apart from demographic variables, the current thesis considered family environment dimensions which have been hypothesised to play a role in the transmission of the traumatic impact of the Holocaust from survivors to their descendants. Within the empirical study, parent-child attachment was found to be a key determinant in the transmission of Holocaust trauma from survivors to their children and insecure parent-child attachment continues to reverberate through the generations. In addition, survivors’ communication about the Holocaust and their Holocaust experiences to their children was found to be more influential than general communication within the family. Ten case studies (derived from the empirical study data set) are also provided; five Holocaust survivors, three children of survivors and two grandchildren of survivors. These cases add further to the picture of heterogeneity of the survivor and descendant populations in both experiences and adaptations. It is concluded that the legacy of the Holocaust continues to leave its mark on both its direct survivors and their descendants. Even two generations removed, the direct and indirect effects of the Holocaust have yet to be completely nullified. Research with Holocaust survivor families serves to highlight the differential impacts of state-based trauma and the ways in which its effects continue to be felt for generations. The revised and empirically tested Model of the Differential Impact of Holocaust Trauma across Three Generations presented at the conclusion of this thesis represents a further clarification of existing trauma theories as well as the first attempt at determining the relative importance of both cognitive, interpersonal/interfamilial interaction processes and demographic variables in post-trauma psychological health and transmission of traumatic impact.
Resumo:
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.
Resumo:
We report the long term outcome of the flangeless, cemented all polyethylene Exeter cup at a mean of 14.6 years (range 10-17) after operation. Of the 263 hips in 243 patients, 122 hips are still in situ, 112 patients (119 hips) have died, eighteen hips were revised, and three patients (four hips) had moved abroad and were lost to follow-up (1.5%). Radiographs demonstrated two sockets had migrated and six more had radiolucent lines in all three zones. The Kaplan Meier survivorship at 15 years with endpoint revision for all causes is 89.9% (95% CI 84.6 to 95.2%) and for aseptic cup loosening or lysis 91.7% (CI 86.6 to 96.8%). In 210 hips with a diagnosis of primary osteoarthritis survivorship for all causes is 93.2% (95% CI 88.1 to 98.3%), and for aseptic cup loosening 95.0% (CI 90.3 to 99.7%). The cemented all polyethylene Exeter cup has an excellent long-term survivorship.
Resumo:
Grassland management affects soil organic carbon (SOC) storage and can be used to mitigate greenhouse gas emissions. However, for a country to assess emission reductions due to grassland management, there must be an inventory method for estimating the change in SOC storage. The Intergovernmental Panel on Climate Change (IPCC) has developed a simple carbon accounting approach for this purpose, and here we derive new grassland management factors that represent the effect of changing management on carbon storage for this method. Our literature search identified 49 studies dealing with effects of management practices that either degraded or improved conditions relative to nominally managed grasslands. On average, degradation reduced SOC storage to 95% +/- 0.06 and 97% +/- 0.05 of carbon stored under nominal conditions in temperate and tropical regions, respectively. In contrast, improving grasslands with a single management activity enhanced SOC storage by 14% 0.06 and 17% +/- 0.05 in temperate and tropical regions, respectively, and with an additional improvement(s), storage increased by another 11% +/- 0.04. We applied the newly derived factor coefficients to analyze C sequestration potential for managed grasslands in the U.S., and found that over a 20-year period changing management could sequester from 5 to 142 Tg C yr(-1) or 0.1 to 0.9 Mg C ha(-1) yr(-1), depending on the level of change. This analysis provides revised factor coefficients for the IPCC method that can be used to estimate impacts of management; it also provides a methodological framework for countries to derive factor coefficients specific to conditions in their region.
Resumo:
Thoroughly revised and updated, this popular book provides a comprehensive yet easy to read guide to modern contact lens practice. Beautifully re-designed in a clean, contemporary layout, this second edition presents relevant and up-to-date information in a systematic manner, with a logical flow of subject matter from front to back. This book wonderfully captures the ‘middle ground’ in the contact lens field … somewhere between a dense research-based tome and a basic fitting guide. As such, it is ideally suited for both students and general eye care practitioners who require a practical, accessible and uncluttered account of the contact lens field. Contents Part 1 Introduction Historical perspective. The anterior eye Visual optics Clinical instruments Part 2 Soft contact lenses Soft lens materials Soft lens manufacture Soft lens optics Soft lens measurement Soft lens design and fitting Soft toric lens design and fitting Soft lens care systems Part 3 Rigid contact lenses Rigid lens materials Rigid lens manufacture Rigid lens optics Rigid lens measurement Rigid lens design and fitting Rigid toric lens design and fitting Rigid lens care systems Part 4 Lens replacement modalities Unplanned lens replacement Daily soft lens replacement Planned soft lens replacement Planned rigid lens replacement Part 5 Special lenses and fitting considerations Scleral lenses Tinted lenses Presbyopia Continuous wear Sport Keratoconus High ametropia Paediatric fitting Therapeutic applications Post-refractive Surgery Post-keratoplasty Orthokeratology Diabetes Part 6 Patient examination and management History taking Preliminary examination Patient education Aftercare Complications Digital imaging Compliance Practice management Appendices Index
Resumo:
Textual cultural heritage artefacts present two serious problems for the encoder: how to record different or revised versions of the same work, and how to encode conflicting perspectives of the text using markup. Both are forms of textual variation, and can be accurately recorded using a multi-version document, based on a minimally redundant directed graph that cleanly separates variation from content.
Resumo:
The Queensland University of Technology badges itself as “a university for the real world”. For the last decade the Law Faculty has aimed to provide its students with a ‘real world’ degree, that is, a practical law degree. This has seen skills such as research, advocacy and negotiation incorporated into the undergraduate degree under a University Teaching & Learning grant, a project that gained international recognition and praise. In 2007–2008 the Law Faculty undertook another curriculum review of its undergraduate law degree. As a result of the two year review, QUT’s undergraduate lawdegree has fewer core units, a focus on first year student transition, scaffolding of law graduate capabilities throughout the degree,work integrated learning and transition to the workplace. The revised degree commenced implementation in 2009. This paper focuses on the “real world” approach to the degree achieved through the first year programme, embedding and scaffolding law graduate capabilities through authentic and valid assessment and work integrated learning.
Resumo:
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a client to solve some moderately hard problem before being granted access to a resource. However, recent client puzzle difficulty definitions (Stebila and Ustaoglu, 2009; Chen et al., 2009) do not ensure that solving n puzzles is n times harder than solving one puzzle. Motivated by examples of puzzles where this is the case, we present stronger definitions of difficulty for client puzzles that are meaningful in the context of adversaries with more computational power than required to solve a single puzzle. A protocol using strong client puzzles may still not be secure against DoS attacks if the puzzles are not used in a secure manner. We describe a security model for analyzing the DoS resistance of any protocol in the context of client puzzles and give a generic technique for combining any protocol with a strong client puzzle to obtain a DoS-resistant protocol.
Resumo:
Increasingly, large amounts of public and private money are being invested in education and as a result, schools are becoming more accountable to stakeholders for this financial input. In terms of the curriculum, governments worldwide are frequently tying school funding to students‟ and schools‟ academic performances, which are monitored through high-stakes testing programs. To accommodate the resultant pressures from these testing initiatives, many principals are re-focussing their school‟s curriculum on the testing requirements. Such a re-focussing, which was examined critically in this thesis, constituted an externally facilitated rapid approach to curriculum change. In line with previously enacted change theories and recommendations from these, curriculum change in schools has tended to be a fairly slow, considered, collaborative process that is facilitated internally by a deputy-principal (curriculum). However, theoretically based research has shown that such a process has often proved to be difficult and very rarely successful. The present study reports and theorises the experiences of an externally facilitated process that emerged from a practitioner model of change. This case study of the development of the controlled rapid approach to curriculum change began by establishing the reasons three principals initiated curriculum change and why they then engaged an outsider to facilitate the process. It also examined this particular change process from the perspectives of the research participants. The investigation led to the revision of the practitioner model as used in the three schools and challenged the current thinking about the process of school curriculum change. The thesis aims to offer principals and the wider education community an alternative model for consideration when undertaking curriculum change. Finally, the thesis warns that, in the longer term, the application of study‟s revised model (the Controlled Rapid Approach to Curriculum Change [CRACC] Model) may have less then desirable educational consequences.
Resumo:
Up to fifty per cent of individuals with Alcohol use disorders (AUD) also have alexithymia a personality construct hypothesized to be related to attachment difficulties. The relationship between alexithymia, craving, anxious attachment and alcohol-dependence severity was examined in 254 patients participating in a Cognitive-Behavioral Therapy (CBT) program for alcohol-dependence. Participants completed the Toronto Alexithymia Scale (TAS-20), the Obsessive Compulsive Drinking Scale (OCDS), the Revised Adult Attachment Anxiety Subscale (RAAS-Anxiety) and the Alcohol Use Disorder Identification Test (AUDIT). MANOVA indicated that individuals with alexithymia reported significantly higher levels of total OCDS, obsessive thoughts about alcohol, and compulsive drinking urges and behavior, compared to the non-alexithymic group. Regression analyses found that anxious attachment partially mediated the relationship between alexithymia and craving. Anxious attachment may be a potential treatment target to reduce alcohol consumption in those with alcohol-dependence and alexithymia. Research Highlights ► There were significant relationships of alexithymia, craving and anxious attachment. ► Alexithymic alcoholics reported higher levels of craving and alcoholism severity. ► Anxious attachment partially mediated the relationship of alexithymia and craving.
Resumo:
Attachment theory has been conceptualised as an affect regulation theory, proposing that attachment is associated with the expression and recognition of emotions as well as interpersonal functioning. Previous research has reported affect regulation difficulties in substance use disorders and addiction has been considered an attachment disorder. However, scarce empirical research exists on the relationship of attachment in relation to affect regulation and interpersonal functioning in those with substance use problems. Thus, the objective of the present study was to investigate potential associations between attachment, negative mood regulation (NMR) expectancies, fear of intimacy and self-differentiation in substance abusers. The revised adult attachment scale (RAAS), the NMR expectancies scale, the fear of intimacy scale and the differentiation of self inventory were administered to a sample of 100 substance use disorder inpatients. Attachment accounted for significant variance in NMR expectancies and was also a strong predictor of fear of intimacy. The predictive utility of attachment also extended to self-differentiation, suggesting that attachment was strongly related to overall self-differentiation score, Emotional reactivity, Emotional cut-off and I position. These findings support attachment theory suggesting that attachment is associated with and predicts affect regulation abilities and difficulties in interpersonal functioning in a sample of substance use disorder inpatients. The inclusion and assessment of attachment appears to be important in the development of treatment programmes for substance abusing individuals.
Resumo:
In today's technological age, fraud has become more complicated, and increasingly more difficult to detect, especially when it is collusive in nature. Different fraud surveys showed that the median loss from collusive fraud is much greater than fraud perpetrated by a single person. Despite its prevalence and potentially devastating effects, collusion is commonly overlooked as an organizational risk. Internal auditors often fail to proactively consider collusion in their fraud assessment and detection efforts. In this paper, we consider fraud scenarios with collusion. We present six potentially collusive fraudulent behaviors and show their detection process in an ERP system. We have enhanced our fraud detection framework to utilize aggregation of different sources of logs in order to detect communication and have further enhanced it to render it system-agnostic thus achieving portability and making it generally applicable to all ERP systems.