157 resultados para Protein P-1


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Information behavior studies are a growing body of research that highlights the importance of information for everyone in the information age. This e-book presents an international and diverse range of studies and insights into the current state of theories and models of information behavior. There is an emphasis on the socialpersonalhuman dimensions of information seeking using social science methods and theoretical frameworks. The studies particularly draw on the methods and theories of anthropology, sociology and psychology to produce interpretations of the way in which information is experienced in the lives of individuals working as critical care nurses in a medical environment, the information seeking behavior of the visually impaired, the social interactions within knitting circles in public libraries, and attempts to apply information behavior theory to the design of information solutions. Collectively the papers contribute more generally to our understanding of information behavior theory and models, including the medical and retrieval contexts.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The article examines the role of the Internet and Web 2.0 technologies when used by expatriates for maintaining relationships back in their home country. It is based on recent research which studied the experience of Australian expatriates.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Time magazine ‘Person of theYear’ award is a venerable institution. Established by Time’s founder Henry Luce in 1927 as ‘Man of the Year’, it is an annual award given to ‘a person, couple, group, idea, place, or machine that ‘for better or for worse ... has done the most to influence the events of the year’ (Time 2002, p. 1). In 2010, the award was given to Mark Zuckerberg, the founder and CEO of the social networking site Facebook.There was, however, a strong campaign for the ‘People’s Choice’ award to be given to Julian Assange, the founder and editor-in-chief of Wikileaks, the online whistleblowing site. Earlier in the year Wikileaks had released more than 250 000 US government diplomatic cables through the internet, and the subsequent controver- sies around the actions of Wikileaks and Assange came to be known worldwide as ‘Cablegate’. The focus of this chapter is not on the implications of ‘Cablegate’ for international diplomacy, which continue to have great significance, but rather upon what the emergence of Wikileaks has meant for journalism, and whether it provides insights into the future of journalism. Both Facebook and Wikileaks, as well as social media platforms such as Twitter and YouTube, and independent media practices such as blogging, citizen journalism and crowdsourcing, are manifestations of the rise of social media, or what has also been termed web 2.0.The term ‘web 2.0’ was coined by Tim O’Reilly, and captures the rise of online social media platforms and services, that better realise the collaborative potential of digitally networked media. They do this by moving from the relatively static, top-down notions of interactivity that informed early internet development, towards more open and evolutionary models that better harness collective intelligence by enabling users to become the creators and collaborators in the development of online media content (Musser and O’Reilly 2007; Bruns 2008).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This Exceptional Teachers for Disadvantaged Schools (ETDS) project sets out to design a new model of Australian teacher education responding to recent demands for quality education in low SES and disadvantaged schools. The project moves teacher education from the ‘missionary’ (Larabee, 2010) or deficit (Comber and Kamler 2004; Flessa, 2007) approaches, towards a focus on notions of quality and academic excellence. Rice (2008, p.1) argues for a need to place more of the “very best teachers into the most challenging schools”, yet the problem is not merely one of training more teachers, for disadvantaged schools already receive disproportionate numbers of beginning teachers (Connell, 1994; Vickers & Ferfolja, 2006). Rather, Grossman and Loeb (2010, p. 245) argue the problem centers on the common practice of “[p]lacing the least experienced teachers with the most needy students”. This paper reports on the first year trial of the project. The ETDS project is at present, the only mainstream Australian teacher education model that targets cohorts of academically high achieving pre-service teachers with the overt aim of preparing graduates of the program to teach in disadvantaged schools. At the end of its first year, the ETDS program graduated 20 new teachers, each of whom had over the previous 18 months engaged with a specialized curriculum and carefully monitored/scaffolded practicum placements in disadvantaged schools around Brisbane, Australia.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

It is a startling fact that when in the mid-80s a ‘third wave’ of democracy took hold in Latin America and Eastern Europe, both democracy and violence were simultaneously on the rise worldwide. Almost by definition democracies represent an institutionalized framework and a way of life that ensures non-violent means to share power between communities of people with widely differing values and beliefs. As Keane (2004) points out, ‘violence is anathema to [democracy’s] spirit and substance’ (p. 1). Accordingly, the process of democratization was accompanied by expectations that violence would generally decrease, and that these countries would embark on a process of reducing levels of violence as Western European countries had done earlier in the 19th and 20th century.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Background: Most skin cancers are preventable by encouraging consistent use of sun protective behaviour. In Australia, adolescents have high levels of knowledge and awareness of the risks of skin cancer but exhibit significantly lower sun protection behaviours than adults. There is limited research aimed at understanding why people do or do not engage in sun protective behaviour, and an associated absence of theory-based interventions to improve sun safe behaviour. This paper presents the study protocol for a school-based intervention which aims to improve the sun safe behaviour of adolescents. Methods/design: Approximately 400 adolescents (aged 12-17 years) will be recruited through Queensland, Australia public and private schools and randomized to the intervention (n = 200) or 'wait-list' control group (n = 200). The intervention focuses on encouraging supportive sun protective attitudes and beliefs, fostering perceptions of normative support for sun protection behaviour, and increasing perceptions of control/self-efficacy over using sun protection. It will be delivered during three × one hour sessions over a three week period from a trained facilitator during class time. Data will be collected one week pre-intervention (Time 1), and at one week (Time 2) and four weeks (Time 3) post-intervention. Primary outcomes are intentions to sun protect and sun protection behaviour. Secondary outcomes include attitudes toward performing sun protective behaviours (i.e., attitudes), perceptions of normative support to sun protect (i.e., subjective norms, group norms, and image norms), and perceived control over performing sun protective behaviours (i.e., perceived behavioural control). Discussion: The study will provide valuable information about the effectiveness of the intervention in improving the sun protective behaviour of adolescents.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper will provide an overview of a joint research initiative by the Queensland University of Technology in conjunction with the Australian Smart Services Cooperative Research Centre into the development and analysis of online communities (OLCs). This project aimed to create an exciting and innovative web space (Staywild.com.au) around the concept of adventure travel. This paper considers the literature on promoting and building online communities. It also discusses methods for promotion and encouraging participation. These methods emerged from the literature and the results of a Staywild user survey. In our research for this paper we found little work that focused on promoting and building OLCs for non-profit organisations. This paper thus contributes to the field in its work towards developing a standardised method of marketing and promotion that can be applied to niche non-profit communities.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The relationship between design process and business systems has been of interest to both practitioners and researchers exploring the numerous opportunities and challenges of this unlikely relationship. Often the relationship is presented as building design thinking capability within an organization, which can be broadly described as the union of design and strategy. Brown (2008) notes that design thinking is ‘‘a discipline that uses the designer’s sensibility and methods to match people’s needs with what is technically feasible and what business strategy can convert into customer value and market opportunities’’ (p. 1). The value that design thinking brings to an organization is a different way of framing situations and possibilities, doing things, and tackling problems: essentially a cultural transformation of the way it undertakes its business. The work of Martin (2009) has clearly shown the generalized differences between design thinking and business thinking, highlighting many instances in which these differences have been overcome, but also noting the many obstacles of trying to unify both approaches within an organization. Liedtka (2010) encourages firms to try and persist in overcoming these barriers, as she has noted that ‘‘business strategy desperately needs design ... because design is all about action and business strategy too often turns out to be only about talk ... fewer than 10 percent of new strategies are ever fully executed’’ (p. 9).

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper examines the paradoxical and ubiquitous nature of Butler’s heterosexual matrix, and opens it up to an alternative Deleuzian analysis. Drawing on stories and art works produced in a collective biography workshop on girls and sexuality this paper extends previous work on the subversion of the heterosexual matrix undertaken by Renold and Ringrose (2008). The paper moves, as they do, from a molar to a molecular analysis, but extends that work by re-thinking the girl/subject in terms of Deleuze and Guattari’s endlessly transforming multiplicities where “the self is only a threshold, a door, a becoming between two multiplicities” (Deleuze and Guattari, 1987: 249)

Relevância:

80.00% 80.00%

Publicador:

Resumo:

It is more than 10 years since the anthropologist DiGiacomo (1999) answered the question “Can there be a cultural epidemiology?” with disappointment, concluding ethnographic and epidemiological narratives are divergent not complementary. In the same year, the epidemiologist Krieger (1999, p. 1151) asked related questions about the epistemological foundations of epidemiology: “Epidemiology is–or is not—the basic science of public health. Epidemiology is—or is not—an objective science. Science and advocacy are—or are not—distinct and contrary endeavours.” Again in the same year the Indigenous researcher Smith (1999, p. 1) wrote, “From the vantage point of the colonized, a position from which I write, and choose to privilege, the term ‘research’ is inextricably linked to European imperialism and colonialism.” The act of conceptualizing and practicing cultural epidemiology thus brings with it a series of deep epistemological questions about the nature of knowledge production. The Western academy of health research assumes an intellectual and moral privilege to fill gaps in knowledge aimed at yielding improvements in health status. With such privilege comes responsibility, since the power to conceptualize health problems and their solutions deserves considerable critical, historical, and political reflexivity, particularly at the boundaries between dominant and oppressed cultural spaces...

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Internet technologies have fundamentally changed the way we obtain access to legal documents and information about the law. However, for judgments of courts and tribunals, copyright management and licensing practices have not kept pace with the digital and online technologies which are now ubiquitous in the web 2.0 era. Under the provisions of the Copyright Act 1968 and the licensing statements on the Australian courts’ websites, judgments may generally be read online, downloaded, reproduced and printed out for personal, non-commercial use or ”in house” use by an organisation. However, beyond these permitted acts, the extent to which judgments can be copied and distributed in digital form online remains unclear. Open content licences (in particular, the Creative Commons (CC) licences) offer an effective mechanism for managing copyright in judgments in a manner that supports their wide public dissemination and reuse while also protecting their integrity and accuracy.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Genome-wide association studies (GWAS) have identified multiple common genetic variants associated with an increased risk of prostate cancer (PrCa), but these explain less than one-third of the heritability. To identify further susceptibility alleles, we conducted a meta-analysis of four GWAS including 5953 cases of aggressive PrCa and 11 463 controls (men without PrCa). We computed association tests for approximately 2.6 million SNPs and followed up the most significant SNPs by genotyping 49 121 samples in 29 studies through the international PRACTICAL and BPC3 consortia. We not only confirmed the association of a PrCa susceptibility locus, rs11672691 on chromosome 19, but also showed an association with aggressive PrCa [odds ratio = 1.12 (95% confidence interval 1.03-1.21), P = 1.4 × 10(-8)]. This report describes a genetic variant which is associated with aggressive PrCa, which is a type of PrCa associated with a poorer prognosis.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

“Our students have changed radically. Today’s students are no longer the people our educational system was designed to teach” (Prensky, 2001, p. 1). The influx of available new technology has helped to democratise knowledge, transforming when, where and how learning takes place, and changing perceptions of traditional learning landscapes (JISC, 2006; Neary et al., 2010). Mobile computers combined with wireless technology, have completely transformed the educational world; students have turned nomad[ic], engaging in conversations and thinking across traditional campus spaces (Alexander, 2004; Fisher, 2005). In this workshop we will be attempting to de-mystify a facet of mobile learning, by working in small groups to set up and kick start a number of social media sites, which can be used for collaboration and information exchange, in the design studio.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In Burrage and Burrage [1] it was shown that by introducing a very general formulation for stochastic Runge-Kutta methods, the previous strong order barrier of order one could be broken without having to use higher derivative terms. In particular, methods of strong order 1.5 were developed in which a Stratonovich integral of order one and one of order two were present in the formulation. In this present paper, general order results are proven about the maximum attainable strong order of these stochastic Runge-Kutta methods (SRKs) in terms of the order of the Stratonovich integrals appearing in the Runge-Kutta formulation. In particular, it will be shown that if an s-stage SRK contains Stratonovich integrals up to order p then the strong order of the SRK cannot exceed min{(p + 1)/2, (s - 1)/2), p greater than or equal to 2, s greater than or equal to 3 or 1 if p = 1.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.