75 resultados para Cyber-rencontre


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Given their ubiquitous presence as witnesses to school-yard bullying, the role of the ‘bystander’ has been studied extensively. The prevalence and behaviour of bystanders to cyberbullying, however, is less understood. In an anonymous, school-based questionnaire, 716 secondary school students from South-East Queensland reported whether they had witnessed traditional and/or cyberbullying, and how they responded to each type. Overlap in bystander roles between online and offline environments was examined, as was their relationship to age and gender. Students who witnessed traditional bullying were more likely to have witnessed cyberbullying. Bystanders’ behaviour was sometimes similar in both contexts of traditional and cyberbullying, mainly if they were outsiders but half of the 256 students who reported witnessing both traditional and cyberbullying, acted in different roles across the two environments. The implications of the findings are discussed in the context of previous research on cyberbullying and traditional-bystanders. Future research should further explore the role of bystanders online, including examining whether known predictors of traditional-bystander behaviour similarly predict cyber-bystander behaviour.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

An estimated A$75,000 is lost by Australians everyday to online fraud, according to the Australian Competition and Consumer Commission (ACCC). Given that this is based on reported crime, the real figure is likely to be much higher. It is well known that fraud, particularly online fraud, has a very low reporting rate. This also doesn’t even begin to encompass non-financial costs to victims. The real cost is likely to be much, much higher. There are many challenges to policing this type of crime, and victims who send money to overseas jurisdictions make it even harder, as does the likelihood of offenders creating false identities or simply stealing legitimate ones. But despite these challenges police have started to do something to prevent the impact and losses of online fraud. By accessing financial intelligence, police are able to identify individuals who are sending money to known high-risk countries for fraud. They then notify these people with their suspicions that they may be involved in fraud. In many cases the people don’t even know they may be victims or involved in online fraud.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article investigates the perceptions of 156 students who were victims of both traditional and cyberbullying (117 female, 45 male), ages 10 to 17 years, as to which form of bullying was more hurtful. Overall, students perceived traditional victimization to be more hurtful than cyber victimization. Reasons identified in the data to explain the different perceptions of victims were categorized and found to relate to: the bully, the bystanders, the bullying incidents, the emotional impact on the victim, and the victim’s ability to respond. The perceptions of these students challenge a number of suppositions presented in the literature that attempt to explain why cyberbullying is associated with more negative outcomes than traditional bullying. The implications for antibullying programs to address these issues are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present an approach for detecting sensor spoofing attacks on a cyber-physical system. Our approach consists of two steps. In the first step, we construct a safety envelope of the system. Under nominal conditions (that is, when there are no attacks), the system always stays inside its safety envelope. In the second step, we build an attack detector: a monitor that executes synchronously with the system and raises an alarm whenever the system state falls outside the safety envelope. We synthesize safety envelopes using a modified machine learning procedure applied on data collected from the system when it is not under attack. We present experimental results that show effectiveness of our approach, and also validate the several novel features that we introduced in our learning procedure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article argues that copyright law is not just a creature of statute, but it is also a social and imaginative contruct. It evaluates a number of critiques of legal formalism. Part 1 examines whether the positive rules and principles of copyright law are the product of historical contingency and political expediency. Part 2 considers the social operation of copyright law in terms of its material effects and cultural significance. Part 3 investigates the future of copyright law, in light of the politics of globalisation and the impact of new information technologies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report describes the Year One Pilot Study processes, and articulates findings from the major project components designed to address these challenges noted above (See Figure 1). Specifically, the pilot study tested the campaign research and development process involving participatory design with young people and sector partners, and the efficacy and practicality of conducting a longitudinal, randomised control trial online with minors, including ways oflinking survey data to campaign data. Each sub-study comprehensively considered the ethical requirements of conducting online research with minors in school settings. The theoretical and methodological framework for measuring campaign engagement and efficacy (Sub-studies 3, 4 and 5) drew on the Model of Goal-Directed Behaviour (MGB) (Perugini & Bagozzi 2001) and Nudge Theory (Thaler & Sunstein, 2008).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Little is known about the prevalence of cyberbullying among university students and less about whether they utilise anti-bullying policies. However, failure to report cyberbullying incidents to authorities would lessen the efficacy of these policies. This study investigated the prevalence of cyberbullying among university students and their reporting intentions for cyberbullying incidents. Two hundred and eighty- two students completed a survey on their intentions to report cyberbullying. Results found cyberbullying exists among university students and they would report to authorities if the policy outlined specific information. Students who had been cyber victimised were more likely to report than those students who had not been cyberbullied. Implications for universities are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The beliefs, attitudes and understandings of pre-service teachers towards bullying and more recently, cyberbullying remains unclear. Previous studies have found them to be generally lacking confidence to address bullying, which could impact negatively on school climate if, when they enter the profession, these beliefs undermine existing anti-bullying initiatives. This study explores Australian pre-service teachers' (N= 717) understanding and knowledge of traditional bullying and cyberbullying and their confidence and capacity to deal with it. Findings from self-report, anonymous questionnaires from students attending three universities in Australia indicated that two thirds (66%) of current pre-service teachers felt informed to very informed and capable to very capable (62%) of dealing with school bullying and 90% could discern cyber and traditional bullying behaviours from other online and offline aggressive acts. Gender and Year level differences were found. The potential impact of their knowledge and understanding of bullying and cyberbullying on school climate, and sustaining and maintaining anti-bullying interventions as they enter the profession is discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The importance of developing effective disaster management strategies has significantly grown as the world continues to be confronted with unprecedented disastrous events. Factors such as climate instability, recent urbanization along with rapid population growth in many cities around the world have unwittingly exacerbated the risks of potential disasters, leaving a large number of people and infrastructure exposed to new forms of threats from natural disasters such as flooding, cyclones, and earthquakes. With disasters on the rise, effective recovery planning of the built environment is becoming imperative as it is not only closely related to the well-being and essential functioning of society, but it also requires significant financial commitment. In the built environment context, post-disaster reconstruction focuses essentially on the repair and reconstruction of physical infrastructures. The reconstruction and rehabilitation efforts are generally performed in the form of collaborative partnerships that involve multiple organisations, enabling the restoration of interdependencies that exist between infrastructure systems such as energy, water (including wastewater), transport, and telecommunication systems. These interdependencies are major determinants of vulnerabilities and risks encountered by critical infrastructures and therefore have significant implications for post-disaster recovery. When disrupted by natural disasters, such interdependencies have the potential to promote the propagation of failures between critical infrastructures at various levels, and thus can have dire consequences on reconstruction activities. This paper outlines the results of a pilot study on how elements of infrastructure interdependencies have the potential to impede the post-disaster recovery effort. Using a set of unstructured interview questionnaires, plausible arguments provided by seven respondents revealed that during post-disaster recovery, critical infrastructures are mutually dependent on each other’s uninterrupted availability, both physically and through a host of information and communication technologies. Major disruption to their physical and cyber interdependencies could lead to cascading failures, which could delay the recovery effort. Thus, the existing interrelationship between critical infrastructures requires that the entire interconnected network be considered when managing reconstruction activities during the post-disaster recovery period.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

BACKGROUND Experimental learning, traditionally conducted in on-campus laboratory venues, is the cornerstone of science and engineering education. In order to ensure that engineering graduates are exposed to ‘real-world’ situations and attain the necessary professional skill-sets, as mandated by course accreditation bodies such as Engineers Australia, face-to-face laboratory experimentation with real equipment has been an integral component of traditional engineering education. The online delivery of engineering coursework endeavours to mimic this with remote and simulated laboratory experimentation. To satisfy student and accreditation requirements, the common practice has been to offer equivalent remote and/or simulated laboratory experiments in lieu of the ones delivered, face-to face, on campus. The current implementations of both remote and simulated laboratories tend to be specified with a focus on technical characteristics, instead of pedagogical requirements. This work attempts to redress this situation by developing a framework for the investigation of the suitability of different experimental educational environments to deliver quality teaching and learning. PURPOSE For the tertiary education sector involved with technical or scientific training, a research framework capable of assessing the affordances of laboratory venues is an important aid during the planning, designing and evaluating stages of face-to-face and online (or cyber) environments that facilitate student experimentation. Providing quality experimental learning venues has been identified as one of the distance-education providers’ greatest challenges. DESIGN/METHOD The investigation draws on the expertise of staff at three Australian universities: Swinburne University of Technology (SUT), Curtin University (Curtin) and Queensland University of Technology (QUT). The aim was to analyse video recorded data, in order to identify the occurrences of kikan-shido (a Japanese term meaning ‘between desks instruction’ and over-the-shoulder learning and teaching (OTST/L) events, thereby ascertaining the pedagogical affordances in face-to-face laboratories. RESULTS These will be disseminated at a Master Class presentation at this conference. DISCUSSION Kikan-shido occurrences did reflect on the affordances of the venue. Unlike with other data collection methods, video recorded data and its analysis is repeatable. Participant bias is minimised or even eradicated and researcher bias tempered by enabling re-coding by others. CONCLUSIONS Framework facilitates the identification of experiential face-to-face learning venue affordances. Investigation will continue with on-line venues.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Gene expression is arguably the most important indicator of biological function. Thus identifying differentially expressed genes is one of the main aims of high throughout studies that use microarray and RNAseq platforms to study deregulated cellular pathways. There are many tools for analysing differentia gene expression from transciptomic datasets. The major challenge of this topic is to estimate gene expression variance due to the high amount of ‘background noise’ that is generated from biological equipment and the lack of biological replicates. Bayesian inference has been widely used in the bioinformatics field. In this work, we reveal that the prior knowledge employed in the Bayesian framework also helps to improve the accuracy of differential gene expression analysis when using a small number of replicates. We have developed a differential analysis tool that uses Bayesian estimation of the variance of gene expression for use with small numbers of biological replicates. Our method is more consistent when compared to the widely used cyber-t tool that successfully introduced the Bayesian framework to differential analysis. We also provide a user-friendly web based Graphic User Interface for biologists to use with microarray and RNAseq data. Bayesian inference can compensate for the instability of variance caused when using a small number of biological replicates by using pseudo replicates as prior knowledge. We also show that our new strategy to select pseudo replicates will improve the performance of the analysis. - See more at: http://www.eurekaselect.com/node/138761/article#sthash.VeK9xl5k.dpuf

Relevância:

10.00% 10.00%

Publicador:

Resumo:

New Video Gamer: Africa Needs More Technology (CNN 12/12/2011) In December 2011 CNN news service online edition (Sutter, 2011) posted a short item about Cwi Nqane, a Khoisan man who entered Samsung’s Namibian World Cyber Games (WCG) heats held at the 2011 the annual Windhoek Show. Cwi Nqane won a place on the Namibian WCG team playing a smartphone game called Asphalt 6: Adrena-line (Gameloft, 2011). Cwi was presented with a ‘top of the line’ Samsung Galaxy tablet and subsequently sent to compete in Korea. Later, other news and game news websites re-reported the incident, which inspired a variety of enthusiastic comment about tech-nology and ‘new knowledge’. Then Kotaku news service picked up the item (Narcisse, 2011) and took a very different slant. Kotaku proposed that Samsung was exploiting Cwi and had assumed the role of a Techno-Tarzan: “striding into Nqane’s homeland and swinging him off into the wonders of the modern world where they can trot him out as a curiosity”. These two perspectives on the story of Cwi’s WCG entry expose two dominant views on Indigenous knowledges and technologies: ICTs as progress for in-digenous peoples and ICTs as disruptive and exploitative. Neither position, however, allows for the claiming of digital technology by indigenous communities, indeed both views position indigenous cultures as being outsiders.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background Despite decades of research, bullying in all its forms is still a significant problem within schools in Australia, as it is internationally. Anti-bullying policies and guidelines are thought to be one strategy as part of a whole school approach to reduce bullying. However, although Australian schools are required to have these policies, their effectiveness is not clear. As policies and guidelines about bullying and cyberbullying are developed within education departments, this paper explores the perspectives of those who are involved in their construction. Purpose This study examined the perspectives of professionals involved in policy construction, across three different Australian states. The aim was to determine how their relative jurisdictions define bullying and cyberbullying, the processes for developing policy, the bullying prevention and intervention recommendations given to schools and the content considered essential in current policies. Sample Eleven key stakeholders from three Australian states with similar education systems were invited to participate. The sample selection criteria included professionals with experience and training in education, cyber-safety and the responsibility to contribute to or make decisions which inform policy in this area for schools in their state. Design and methods Participants were interviewed about the definitions of bullying they used in their state policy frameworks; the extent to which cyberbullying was included; and the content they considered essential for schools to include in anti-bullying policies. Data were collected through in-depth, semi-structured interviews and analysed thematically. Findings Seven themes were identified in the data: - (1) Definition of bullying and cyberbullying; - (2) Existence of a policy template; - (3) Policy location; - (4) Adding cyberbullying; - (5) Distinguishing between bullying and cyberbullying; - (6) Effective policy, and; - (7) Policy as a prevention or intervention tool. The results were similar both across state boundaries and also across different disciplines. Conclusion Analysis of the data suggested that, across the themes, there was some lack of information about bullying and cyberbullying. This limitation could affect the subsequent development, dissemination and sustainability of school anti-bullying policies, which have implications for the translation of research to inform better student outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Microvolunteering is bite-size volunteering with no commitment to repeat and minimum formality, involving short and specific actions. Online microvolunteering occurs through an internet-connected device. University students' online microvolunteering decisions were investigated using an extended theory of planned behavior (TPB) comprising attitudes and normative and control perceptions, with the additional variables of moral norm and group norm. Participants (N = 303) completed the main TPB questionnaire and 1-month follow-up survey (N = 171) assessing engagement in online microvolunteering. Results generally supported standard and additional TPB constructs predicting intention. Intention predicted behavior. The findings suggest an important role for attitudes and moral considerations in understanding what influences this increasingly popular form of online activity.