421 resultados para Boulton, Matthew, 1728-1809.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter will address psychodynamic, cognitive-behavioural, and developmental models in supervision by initially considering the historical underpinnings of each and then examining in turn some of the key processes that are evident in the supervisory relationships. Case studies are included where appropriate to highlight the application of theory to practice and several processes are fully elaborated over all models to enable a contemporary view of style and substance in the supervision context.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Attributions of laziness, reflected in teacher comments such as “just try harder and you will shine” may mask specific cognitive, learning, attentional or emotional problems that could explain low motivation in some children. This paper reports findings from an investigation of 20 children, aged 7 to 10 years, who were regarded as lazy by their parents and teachers. Questionnaire measures provided evidence of low levels of motivation and classroom engagement. Psychometric assessments revealed the presence of a range of difficulties including phonologically-based learning disabilities and significant problems with attention in 17 of the 20 children. The paper concludes that the special needs of an unknown number of children may be overlooked because they are simply presumed to be lazy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Intimate partner violence (IPV) is not only a problem for heterosexual couples. Although research in the area is beset by methodological and definitional problems, studies generally demonstrate that IPV also affects those who identify as non-heterosexual; that is, those sexualities that are typically categorized as lesbian, gay, bisexual, transgender, or intersex (LGBTI). IPV appears to be at least as prevalent in LGBTI relationships as it is in heterosexual couples, and follows similar patterns (e.g. Australian Research Centre on Sex, Health and Society 2006; Donovan et al. 2006; Chan 2005; Craft and Serovich 2005; Burke et al. 2002; Jeffries and Ball 2008; Kelly and Warshafsky 1987; Letellier 1994; Turrell 2000; Ristock 2003; Vickers 1996). There is, however, little in the way of specific community or social services support available to either victims or perpetrators of violence in same-sex relationships (see Vickers 1996). In addition, there are important differences in the experience of IPV between LGBTI and non-LGBTI victims, and even among LGBTI individuals; for example, among transgender populations (Chan 2005), and those who are HIV sero-positive (Craft and Serovich 2005). These different experiences of IPV include the use of HIV and the threat of “outing” a partner as tools of control, as just two examples (Jeffries and Ball 2008; Salyer 1999; WA Government 2008b). Such differences impact on how LGBTI victims respond to the violence, including whether or not and how they seek help, what services they are able to avail themselves of, and how likely they are to remain with, or return to, their violent partners (Burke et al. 2002). This chapter explores the prevalent heteronormative discourses that surround IPV, both within the academic literature, and in general social and government discourses. It seeks to understand how same-sex IPV remains largely invisible, and suggests that these dominant discourses play a major role in maintaining this invisibility. In many respects, it builds on work by a number of scholars who have begun to interrogate the criminal justice and social discourses surrounding violent crime, primarily sexual violence, and who problematize these discourses (see for example Carmody 2003; Carmody and Carrington 2000; Marcus 1992). It will begin by outlining these dominant discourses, and then problematize these by identifying some of the important differences between LGBTI IPV and IPV in heterosexual relationships. In doing so, this chapter will suggest some possible reasons for the silence regarding IPV in LGBTI relationships, and the effects that this can have on victims. Although an equally important area of research, and another point at which the limitations of dominant social discourses surrounding IPV can be brought to light, this chapter will not examine violence experienced by heterosexual men at the hands of their intimate female partners. Instead, it will restrict itself to IPV perpetrated within same-sex relationships.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Heteronormative discourses provide the most common lens through which sexuality is understood within university curricula. This means that sexuality is discussed in terms of categories of identity, with heterosexuality accorded primacy and all ‘others’ indeed ‘othered.’ This paper reports on research carried out by the authors in a core first year university justice class, in which students of law and/or justice were required to engage with, discuss, and reflect on discourses on sexuality. It uses a poststructural framework to identify how students understand non-heterosexualities and how they personally relate to queer identities, in the sense that it asks questions about gender and sexual identity, and the discourses surrounding them. It was found that strongly negative attitudes to non-heterosexualities are quite resistant to challenge, and that some students express being confronted with queerness as a deep-seated fear of being drawn into otherness against their will. The result was that, while many students were able to unpack their attitudes towards queerness and engage in critical reflection and re-evaluation of their attitudes, students with strongly negative views towards non-heterosexualities conversely refused to engage at all, typically perceiving even the engagement itself as a threat to their core heterosexual identity. However, the authors caution against relying on the idea that students are simply “homophobic” to explain this reluctance, as this term does not necessarily account for the complexity of the discourses that inform students’ reactions in this context. This “homophobia” may simply be related to a way of performing gender and sexual identity as opposed to overt discrimination and fear.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The social construction of sexuality over the past one hundred and fifty years has created a dichotomy between heterosexual and non-heterosexual identities that essentially positions the former as “normal” and the latter as deviant. Even Kinsey’s and others’ work on the continuum of sexualities did little to alter the predominantly heterosexist perception of the non-heterosexual as “other” (Kinsey, Pomeroy and Martin 2007; Esterberg 2006; Franceour and Noonan 2007). Some political action and academic work is beginning to challenge such perceptions. Even some avenues of social interaction, such as the recent proliferation of online communities, may also challenge such views, or at least contribute to their being rethought in some ways. This chapter explores a specific kind of online community devoted to fan fiction, specifically homoerotic – or what is known colloquially as “slash” – fan fiction. Fan fiction is fiction, published on the internet, and written by fans of well-known books and television shows, using the characters to create new and varied plots. “Slash” refers to the pairing of two of the male characters in a romantic relationship, and the term comes from the punctuation mark dividing the named pair as, for example, Spock/Kirk from the Star Trek television series. Although there are some slash fan-fiction stories devoted to female-female relationships – called “femmeslash” – the term “slash” generally refers to male-male relationships, and will be utilized throughout this chapter, given that the research discussed focuses on communities centered around one such male pairing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The aim of this research is to examine the changing nature of risks that face journalists and media workers in the world's difficult, remote and hostile environments, and consider the 'adequacy' of managing hostile environment safety courses that some media organizations require prior to foreign assignments. The study utilizes several creative works and contributions to this area of analysis, which includes a documentary film production, course contributions, an emergency reference handbook, security and incident management reviews and a template for evacuation and contingency planning. The research acknowledges that employers have a 'duty of care' to personnel working in these environments, identifies the necessity for pre-deployment training and support, and provides a solution for organizations that wish to initiate a comprehensive framework to advise, monitor, protect and respond to incidents. Finally, it explores the possible development of a unique and holistic service to facilitate proactive and responsive support, in the form of a new profession of 'Editorial Logistics Officer' or 'Editorial Safety Officer' within media organizations. This area of research is vitally important to the profession, and the intended contribution is to introduce a simple and cost-efficient framework for media organizations that desire to implement pre-deployment training and field-support – as these programs save lives. The complete proactive and responsive services may be several years from implementation. However, this study demonstrates that the facilitation of Managing Hostile Environment (MHE) courses should be the minimum professional standard. These courses have saved lives in the past and they provide journalists with the tools to "cover the story, and not become the story."

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Integral attacks are well-known to be effective against byte-based block ciphers. In this document, we outline how to launch integral attacks against bit-based block ciphers. This new type of integral attack traces the propagation of the plaintext structure at bit-level by incorporating bit-pattern based notations. The new notation gives the attacker more details about the properties of a structure of cipher blocks. The main difference from ordinary integral attacks is that we look at the pattern the bits in a specific position in the cipher block has through the structure. The bit-pattern based integral attack is applied to Noekeon, Serpent and present reduced up to 5, 6 and 7 rounds, respectively. This includes the first attacks on Noekeon and present using integral cryptanalysis. All attacks manage to recover the full subkey of the final round.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Providing precise positioning services in regional areas to support agriculture, mining, and construction sectors depends on the availability of ground continuously operating GNSS reference stations and communications linking these stations to central computers and users. With the support of CRC for Spatial Information, a more comprehensive review has been completed recently to examine various wired and wireless communication links available for precise positioning services, in particular in the Queensland regional areas. The study covers a wide range of communication technologies that are currently available, including fixed, mobile wireless, and Geo-stationary and or low earth orbiting satellites. These technologies are compared in terms of bandwidth, typical latency, reliability, coverage, and costs. Additionally, some tests were also conducted to determine the performances of different systems in the real environment. Finally, based on user application requirements, the paper discusses the suitability of different communication links.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Mainstream business process modelling techniques promote a design paradigm wherein the activities to be performed within a case, together with their usual execution order, form the backbone of a process model, on top of which other aspects are anchored. This paradigm, while eective in standardised and production-oriented domains, shows some limitations when confronted with processes where case-by-case variations and exceptions are the norm. In this thesis we develop the idea that the eective design of exible process models calls for an alternative modelling paradigm, one in which process models are modularised along key business objects, rather than along activity decompositions. The research follows a design science method, starting from the formulation of a research problem expressed in terms of requirements, and culminating in a set of artifacts that have been devised to satisfy these requirements. The main contributions of the thesis are: (i) a meta-model for object-centric process modelling incorporating constructs for capturing exible processes; (ii) a transformation from this meta-model to an existing activity-centric process modelling language, namely YAWL, showing the relation between object-centric and activity-centric process modelling approaches; and (iii) a Coloured Petri Net that captures the semantics of the proposed meta-model. The meta-model has been evaluated using a framework consisting of a set of work ow patterns. Moreover, the meta-model has been embodied in a modelling tool that has been used to capture two industrial scenarios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last decade, system integration has grown in popularity as it allows organisations to streamline business processes. Traditionally, system integration has been conducted through point-to-point solutions – as a new integration scenario requirement arises, a custom solution is built between the relevant systems. Bus-based solutions are now preferred, whereby all systems communicate via an intermediary system such as an enterprise service bus, using a common data exchange model. This research investigates the use of a common data exchange model based on open standards, specifically MIMOSA OSA-EAI, for asset management system integration. A case study is conducted that involves the integration of processes between a SCADA, maintenance decision support and work management system. A diverse number of software platforms are employed in developing the final solution, all tied together through MIMOSA OSA-EAI-based XML web services. The lessons learned from the exercise are presented throughout the paper.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aims : The aim of this study was to conduct an exploratory investigation into the in-session processes and behaviours that occur between therapists and young people in online counseling. Method: The Consensual Qualitative Research method was employed to identify in-session behaviours and a coding instrument was developed to determine their frequency of use and assess whether nuances carried in the meaning of text messages have an influential effect during sessions. Eighty-five single-session transcripts were examined in total by two independent coders. Results: Sample statistics revealed that, on average, rapport-building processes were used more consistently across cases with both types of processes having a moderately strong positive effect on young people. However, closer examination of these processes revealed weaker positive effects for in-session behaviours that rely more heavily on verbal and non-verbal cues to be accurately interpreted. Implications for Practice and Future Research: These findings imply that therapists may focus more on building rapport than accomplishing tasks with young people during online counselling sessions due to the absence of verbal and non-verbal information when communicating via text messages.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Clinical supervision has traditionally been considered an important part of training and the professional development of therapists, being rated highly in the experience of trainees as well as practitioners in the field (Orlinsky, Botermans, & Ronnestad, 2001; Steven, Goodyear, & Robertson, 1998). However, the evidence base for any supervision approach improving outcomes with clients is lacking (Bambling, & King, 2000). In this chapter an alternate non‐approach bound model of supervision is presented that has preliminary evidence for enhancing client outcomes in brief psychological treatment. The focus of this Three‐Stage Alliance Supervision (TSAS) prioritises the interpersonal process of counselling as an independent factor as well as the core construct through which all technical interventions should be given. Below is a basic introduction to the supervision model used in the first empirical investigation of supervision and client outcome (Bambling, King, Raue, Schweitzer, & Lambert 2006). While this chapter does not constitute the supervision manual it should provide the reader with sufficient knowledge to adopt an alliance focus in their supervision practice.