258 resultados para Primitive societies.
Resumo:
In the absence of telehealth technology, rural patients must travel to a regional or metropolitan hospital for a preadmission consultation one week before their surgery. Currently, examination of the patient’s chest using a stethoscope (auscultation) is not possible over a telehealth network as existing digital stethoscopes have been designed for in-person auscultation. We report on the initial phase of research which ultimately aims to design a digital stethoscope for use in the telehealth context. This initial research phase describes the complexity of the activity of preadmission clinics and the implications for the design of the stethoscope. The research is conducted through field studies of existing face-to-face and remote consultations.
Resumo:
Rapid advances in information and communications technology (ICT) - particularly the development of online technologies -have transformed the nature of economic, social and cultural relations across the globe. In the context of higher education in post-industrial societies, technological change has had a significant impact on university operating environments. In a broad sense, technological advancement has contributed significantly to the increasing complexity of global economies and societies, which is reflected in the rise of lifelong learning discourses with which universities are engaging. More specifically, the ever-expanding array of ICT available within the university sector has generated new management and pedagogical imperatives for higher education in the information age.
Resumo:
The MDG deadline is fast approaching and the climate within the United Nations remains positive but skeptical. A common feeling is that a great deal of work and headway has been made, but the MDG goals will not be achieved in full by 2015. The largest problem facing the success of the MDGs is, and unless mitigated may remain, mismanaged governance. This argument is confirmed by a strong line of publications stemming from the United Nations and targeting methods (depending on a region or country context) such as improving governance via combating corruption, instituting accountability, peace and stability, as well as transparency. Furthermore, a logical assessment of the framework which MDGs operate in (i.e. international pressure and local civil socio-economic and/or political initiatives pushing governments to progress with MDGs) identifies the State's governing apparatus as the key to the success of MDGs. It is argued that a new analytic framework and grounded theory of democracy (the Element of Democracy) is needed in order to improve governance and enhance democracy. By looking beyond the confines of the MDGs and focusing on properly rectifying poor governance, the progress of MDGs can be accelerated as societies and their governments will be - at minimum - held more accountable to the success of programs in their respective countries. The paper demonstrates the logic of this argument - especially highlighting a new way of viewing democracy - and certain early practices which can accelerate MDGs in the short to medium term.
Resumo:
Maximisation of Knowledge-Based Development (KBD) benefits requires effective dissemination and utilisation mechanisms to accompany the initial knowledge creation process. This work highlights the potential for interactions between Supply Chains (SCs) and Small and Medium sized Enterprise Clusters (SMECs), (including via ‘junction’ firms which are members of both networks), to facilitate such effective dissemination and utilisation of knowledge. In both these network types there are firms that readily utilise their relationships and ties for ongoing business success through innovation. The following chapter highlights the potential for such beneficial interactions between SCs and SMECs in key elements of KBD, particularly knowledge management, innovation and technology transfer. Because there has been little focus on the interactions between SCs and SMECs, particularly when firms simultaneously belong to both, this chapter examines the conduits through which information and knowledge can be transferred and utilised. It shows that each network type has its own distinct advantages in the types of information searched for and transferred amongst network member firms. Comparing and contrasting these advantages shows opportunities for both networks to leverage the knowledge sharing strengths of each other, through these ‘junctions’ to address their own weaknesses, allowing implications to be drawn concerning new ways of utilising relationships for mutual network gains.
Resumo:
Residents, businesses, local, state and national government stakeholders all want to have their say when airports expand or develop. While stakeholder engagement is increasingly a strategy employed for managing the tensions attracted to airport development, different stakeholders have different expectations and demands of airports. This requires different approaches to stakeholder engagement. Identifying the public interests that are at stake in developing airports provides an initial step towards building a platform for selecting and applying stakeholder engagement strategies in airport and more general infrastructure contexts. This paper uses the existing literature of public interests and values to build a general typology of public values for the stakeholders of airport development. A range of semi-privatised and state owned airport case studies from Europe have been used to demonstrate the universal nature of the identified values. The result is a framework that identifies both the substantive and procedural values, separated into local, state/regional and national levels of interest. The typology provides a generalised view of public interests in airport development; however, the public interests identified may be limited to more western oriented societies due to the skew of airport cases reviewed. Contributions are made to the literature with a typology of public values derived from existing knowledge and explored using empirical case examples. The provided typology enables research of airport development decision-making to delineate public interests both within and between stakeholder groups, and helps to explain the different perspectives that stakeholders have towards airport development. Future research may focus on refining the typology for different types of airport governance structures, such as differences between public values in state and market-led airport development; include more airport cases from eastern societies to draw parallels or differences between western and eastern societies; or utilise the typology as a framework for analysing changes in public interests of airports over time.
Resumo:
This paper extends Appadurai’s notion of “scapes” to delineate what we see as “iScapes”. We contend that iScapes captures the way online technologies shape interactions that invariably filter into offline contexts, giving shape and meaning to human actions and motivations. By drawing on research on high school students’ online activities we examine the flow of iScapes they inhabit in the process of constructing identities and forming social relations.
Resumo:
For most of the 20th Century a ‘closed’ system of adoption was practised throughout Australia and other modern Western societies. This ‘closed’ system was characterised by sealed records; amended birth certificates to conceal the adoption, and prohibited contact with all biological family. Despite claims that these measures protected these children from the taint of illegitimacy the central motivations were far more complex, involving a desire to protect couples from the stigma of infertility and to provide a socially acceptable family structure (Triseliotis, Feast, & Kyle, 2005; Marshall & McDonald, 2001). From the 1960s significant evidence began to emerge that many adopted children and adults were experiencing higher incidences of psychological difficulties, characterised by problems with psychological adjustment, building self-esteem and forming a secure personal identity. These difficulties became grouped under the term ‘genealogical bewilderment’. As a result, new policies and practices were introduced to try to place the best interests of the child at the forefront. These changes reflected new understandings of adoption; as not only an individual process but also as a social and relational process that continues throughout life. Secrecy and the withholding of birth information are now prohibited in the overwhelming majority of all domestic adoptions processed in Australia (Marshall & McDonald, 2001). One little known consequence of this ‘closed’ system of adoption was the significant number of children who were never told of their adoptive status. As a consequence, some have discovered or had this information disclosed to them, as adults. The first study that looked at the late discovery of genetic origins experiences was conducted by the Post Adoption Resource Centre in New South Wales in 1999. This report found that the participants in their study expressed feelings of disbelief, confusion, anger, sorrow and loss. Further, the majority of participants continued to struggle with issues arising from this intentional concealment of their genetic origins (Perl & Markham, 1999). A second and more recent study (Passmore, Feeney & Foulstone, 2007) looked at the issue of secrecy in adoptive families as part of a broader study of 144 adult adoptees. This study found that secrecy and/or lies or misinformation on the part of adoptive parents had negative effects on both personal identity and relationships with others. The authors noted that those adoptees who found out about their adoption as adults were ‘especially likely to feel a sense of betrayal’ (p.4). Over recent years, stories of secrecy and late discovery have also started to emerge from sperm donor conceived adults (Spencer, 2007; Turner & Coyle, 2000). Current research evidence shows that although a majority of couples during the donor assisted conception process indicate that they intend to tell the offspring about their origins, as many as two-thirds or more of couples continue to withhold this information from their children (Akker, 2006; Gottlieb, A. McWhinnie, 2001; Salter-Ling, Hunter, & Glover, 2001). Why do they keep this secret? Infertility involves a range of complex factors that are often left unresolved or poorly understood by those choosing insemination by donor as a form of family building (Schaffer, J. A., & Diamond, R., 1993). These factors may only impact after the child is born, when resemblance talk becomes most pronounced. Resemblance talk is an accepted form of public discourse and a social convention that legitimises the child as part of the family and is part of the process of constructing the child’s identity within the family. Couples tend to become focused on resemblance as this is where they feel most vulnerable, and the lack of resemblance to the parenting father may trigger his sense of loss (Becker, Butler, & Nachtigall, 2005).
Resumo:
The economic literature on marriage identifies a number of benefits of marriage and discusses mechanisms that cause societies to prefer certain marital structures such as polygamy or monogamy. In principle, however, these benefits and mechanisms might lead societies towards polyandry and even cenogamy. The rareness of polyandry and the absence of cenogamy, however, clearly indicate that important aspects of marriage are omitted. This paper argues that the reproductive nature of marital arrangements must be taken into account when analyzing the foundations of marriage. Monogamy always achieves efficient parental investments in offspring. For polygamous arrangements this might be often true. It fails, however, in polyandry because paternity cannot be established with certainty. Cenogamy is shown to be an unstable arrangement.
Resumo:
This is not a book about the perils of global warming and its impact on children, although climate change provides an impetus. Nor is it a response to environmental issues that shifts responsibilities from adults to children, asking them to fix what we leave behind. Instead, it is a book of positive ideas and actions that shows what early childhood educational communities can do when children, teachers and parents work together to address, arguably, one of the most serious issues of our time. It is about what early childhood education – and specifically, early childhood teacher education – can and must do to play its part in helping societies move towards sustainable living. It is about the emerging field of early childhood education for sustainability (ECEfS).
Resumo:
This paper discusses how internet services can be brought one step closer to the rural dispersed communities by improving wireless broadband communications in those areas. To accomplish this objective we describe the use of an innovative Multi-User-Single-Antenna for MIMO (MUSA-MIMO) technology using the spectrum currently allocated to analogue TV. MUSA-MIMO technology can be considered as a special case of MIMO technology, which is beneficial when provisioning reliable and high-speed communication channels. This paper describes channel modelling techniques to characterise the MUSA-MIMO system allowing an effective deployment of this technology. Particularly, it describes the development of a novel MUSA MIMO channel model that takes into account temporal variations in the rural wireless environment. This can be considered as a novel approach tailor-maid to rural Australia for provisioning efficient wireless broadband communications.
Resumo:
Occidentalism, which treats the other as the same, can be detected in both the criminological and rural sociological treatment of violence in the sociospatial sites of rural countrysides. Criminology tends to mistakenly assume that violence in the modern world is primarily an urban phenomenon (Baldwin & Bottoms, 1976, p. 1; Braithwaite, 1989, p. 47). If violence in rural settings is encountered it tends to be treated as a smaller scale version of the urban problem, or the importation of an otherwise urban problem - as the corrupting influence of the gesellschaft within the gemeinschaft. Within much rural sociology violence is rendered invisible by the assumption that rural communities conform to the idealised conception of the typical gemeinschaft society, small-scale traditional societies based on strong cohesiveness, intimacy and organic forms of solidarity. What these bonds conceal, rather than reveal - violence within the family - remains invisible to the public gaze. The visibility of violence within Aboriginal families and communities presents a major exception to the spatially ordered social relations which render so much white family violence hidden. The need to take into account the complexity and diversity of these sociospatial relations is concretely highlighted in our research which has taken us out of the urban context and confronted us not only with the phenomenon of the violence of other rurals, but also with fundamentally competing claims on, and conceptions of, space and place in the context of a racially divided Australian interior. This article represents the second installment of conceptual reflections on this research, with the first having been published in this journal in 1998.
Resumo:
Residents, businesses, local, state and national government stakeholders all want to have their say when airports expand or develop. While stakeholder engagement is increasingly a strategy employed for managing the tensions attracted to airport development, different stakeholders have different expectations and demands of airports. This requires different approaches to stakeholder engagement. Identifying the public values that are at stake in developing airports provides an initial step towards building a platform for selecting and applying stakeholder engagement strategies in airport and more general infrastructure contexts. -------- This paper uses the existing literature of public values to build a general typology of public values for the stakeholders of airport development. A range of semi-privatised and state owned airport case studies from Europe have been used to demonstrate the universal nature of the identified values. The result is a framework that identifies both the substantive and procedural values, separated into local, state/regional and national levels of interest. The typology provides a generalised view of public values in airport development; however, the public values identified may be limited to more western oriented societies due to the skew of airport cases reviewed. --------- Contributions are made to the literature with a typology of public values derived from existing knowledge and explored using empirical case examples. The provided typology enables research of airport development decision-making to delineate public values both within and between stakeholder groups, and helps to explain the different perspectives that stakeholders have towards airport development. Future research may focus on refining the typology for different types of airport governance structures, such as differences between public values in state and market-led airport development; include more airport cases from eastern societies to draw parallels or differences between western and eastern societies; or utilise the typology as a framework for analysing changes in public values of airports over time.
Resumo:
This collaborative event was organised to coincide with International celebrations by the International Council of Societies of Industrial Design (ICSID). The panel discussion involved industrial designers from a variety of backgrounds including academics, theorists and practitioners. Each panel member was given time to voice their opinion surrounding the theme of WIDD2010 "Industrial Design: Humane Solutions for a Resilient World". The discussion was then extended to the audience through active question and answer time. The panel included: * Professor Vesna Popovic FDIA - Queensland University of Technology * Adam Doyle, Studio Manager - Infinity Design Development * Scott Cox MDIA, Creative Director - Formwerx * Alexander Lotersztain, Director - Derlot * Philip Whiting FDIA, Design Convenor - QCA * Professor Tony Fry, Director Team D/E/S & QCA After this, the documentary by Gary Hewtsit "Objectified" was then screened (75 min).
Resumo:
This paper examines three functions of music technology in the study of music. Firstly, as a tool, secondly, as an instrument and, lastly, as a medium for thinking. As our societies become increasingly embroiled in digital media for representation and communication, our philosophies of music education need to adapt to integrate these developments while maintaining the essence of music. The foundation of music technology in the 1990s is the digital representation of sound. It is this fundamental shift to a new medium with which to represent sound that carries with it the challenge to address digital technology and its multiple effects on music creation and presentation. In this paper I suggest that music institutions should take a broad and integrated approach to the place of music technology in their courses, based on the understanding of digital representation of sound and these three functions it can serve. Educators should reconsider digital technologies such as synthesizers and computers as music instruments and cognitive amplifiers, not simply as efficient tools.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.