438 resultados para Conferences


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 1999 I convened Industrial Relations, the annual ADSA Conference hosted by QUT in Brisbane. This event was promoted as ‘a conference exploring the links between theatre scholarship and professional theatre practice’. As well as academics, there was to be substantial representation by ‘industry professionals’, although interest from the latter category turned out to be modest. One day of the conference was designated a special ‘Links with Industry’ day, during which the Association launched its now defunct ADSAIL (ADSA Industry Links) initiative. Keynote speaker Wesley Enoch commented on ‘the very strong resistance in “the industry” to acknowledging any role of academics’. ‘What is the practical role of having them?’ he asked the ‘them’ gathered before him. In a letter declining our invitation to speak (he later changed his mind), David Williamson remarked that he always felt ‘uneasy at such conferences’: My view of my work is that I’ve successfully filled theatres for 30 years now, something dramatists are supposed to do. I suppose there’s part of me that hopes this will be celebrated. It often is, but rarely in academic drama departments …. Perhaps in fifty years time someone in academe will realise that I wasn’t just reinforcing the attitudes of the Anglo Celtic ruling class. Several years on it seems timely to revisit Industrial Relations; to look again at the extent to which problems of intercultural communication between industry and academy are being addressed. And what are the implications of this for the ADSA History project, which seeks to investigate ADSA’s contribution to the development of theatre / performance studies in Australasia? What are the ‘external’ impacts of ADSA’s ongoing conference enterprise, and how might these be measured? Reflections from delegates on these and other questions will be warmly encouraged.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We all know that the future of news is digital. But mainstream news providers are still grappling with how to entice more customers to their online sites. This paper provides context for a survey currently underway on user intentions towards online news and entertainment, by exploring: 1. Consumer behaviours and intentions with regards to accessing online news and information; 2. Current trends in the Australian online news and information sector; and 3. Key issues and emerging opportunities in the Australian (and global) environment. Key influences on use of online news and information are pricing and access. The paper highlights emerging technical opportunities and flags service gaps. These gaps include multiple disconnects between: 1. Changing user intentions towards online and location based news (news based on a specific locality as chosen by the user) and information; 2. The ability by consumers to act on these intentions via the availability and cost of technologies; 3. Younger users may prefer entertainment to news, or ‘infotainment’; and 4. Current online offerings of traditional news providers and opportunities. These disconnects present an opportunity for online news suppliers to appraise and resolve. Doing so may enhance their online news and information offering, attract consumers and improve loyalty. Outcomes from this paper will be used to identify knowledge gaps and contribute to the development of further analysis on Australian consumers and their behaviours and intentions towards online news and information. This will be undertaken via focus groups as part of a broader study.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

UCON is an emerging access control framework that lacks an administration model. In this paper we define the problem of administration and propose a novel administrative model. At the core of this model is the concept of attribute, which is also the central component of UCON. In our model, attributes are created by the assertions of subjects, which ascribe properties/rights to other subjects or objects. Through such a treatment of attributes, administration capabilities can be delegated from one subject to another and as a consequence UCON is improved in three aspects. First, immutable attributes that are currently considered as external to the model can be incorporated and thereby treated as mutable at- tributes. Second, the current arbitrary categorisation of users (as modifiers of attributes), to system and administrator can be removed. Attributes and objects are only modifiable by those who possess administration capability over them. Third, the delegation of administration over objects and properties that is not currently expressible in UCON is made possible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been considerable interest over the years within the IS research community into how to shape articles for successful publication. Little effort has been made, however, to examine the reviewing criteria that make a difference to publication. We argue that, to provide better guidance to authors, more solid evidence is needed into the factors that contribute to acceptance decisions. This paper examines empirically the outcomes of the reviewing processes of three well-known IS conferences held in 2007. Our analyses reveal four major findings. First, the evaluation criteria that influence the acceptance/rejection decision vary by conference. Second, those differences can be explained in terms of the maturity and breadth of the specific conference of interest. Third, while objective review criteria influence acceptance/rejection decisions, subjective assessment on the part of the program committees may also play a substantial role. Fourth, while high scores on objective criteria are essential for acceptance, they do not guarantee acceptance. On the other hand, low scores on any criterion are likely to result in rejection.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The work was derived from terrestrial laser scan data of a bio-diverse landscape on the SE coast of Western Australia. The digital three dimensional scan data has been converged and then a portion of that computer aided design (CAD) file has been captured via ‘screen capture’ to produce Blackcloud.---------- The primary intention behind the production of the work was to expand understanding on the means of representing and then designing for sites in ‘kwongan’ landscapes which are constituted by highly biodiverse, bushfire prone heath vegetation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session key security, our security model also provides for credential privacy: a participating party learns nothing more about the other party's credentials than whether they satisfy the given predicate. Our model also encompasses attribute-based key exchange since it is a special case of predicate-based key exchange.---------- We demonstrate how to realize a secure predicate-based key exchange protocol by combining any secure predicate-based signature scheme with the basic Diffie-Hellman key exchange protocol, providing an efficient and simple solution.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using a feminist reflexive approach this paper reports on interviews with single mother’s in the Brisbane area about their experiences with food shopping and household food security. Preliminary findings suggest that most experience significant stress around the amount of money they have available for food. As the price of food and other costs of living increase, the only budget item that is flexible – groceries - is squeezed tighter. All women expressed a reluctance to ask for help from strangers at agencies instead relying on the support of family and friends to keep them food secure. Sometimes family and friends had no spare resources to help or were not aware of the extent their friend or relative might be struggling. The increased risks of poverty and food insecurity mean many go without as feeding the children takes precedence. The quality of their diets is variable with many reporting on aiming for quantity rather than being concerned with nutritional balance. Exhaustion and stress from being over-committed doing three roles, mother, father and housekeeper was self-identified as a key factor leading to mental health conditions such as depression, burnout and break down. Female single parent households are vulnerable to reducing welfare benefits as children grow or child support changes. Current policy forces single parents out to work but many can only manage part-time work for lower wages and are barely able to cope with this extra burden often resenting the reduction in benefits it brings. Public perceptions, derision and the notions of choice surrounding single parenting leave the cohort divided and silent for fear of reprisals. In my investigation issues arise about welfare policy that keep benefits low and workplace patriarchal power that can contribute to systemic poverty and the widening of the gender gap in poverty. So far analysis suggests a better support system around community food security including some hands on home help services, nutritional information, cooking classes, community gardening and other social capital building activities are needed for these women in order to avoid long-term health problems and help them better care for the next generation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Client-side project managers face challenges in motivating project organisations to pursue exceptional design and construction performance. One approach to improving the motivation of project organisations is by offering a financial incentive reward for the achievement of voluntary performance standards above the minimum required standard. However, little investigation has been undertaken into the features of a successful incentive system as a part of an overall procurement strategy. In response to a lack of information available to client-side project managers tasked with the initial design of an incentive system, the paper explores motivation under a successful incentive and identifies key learnings for client-side project managers to consider when designing incentives. Our findings are based on the results of a large Australian case study which is interpreted against a conceptual framework based on both economic and psychological perspectives of motivation. The results suggest that motivation towards incentive goals is influenced by the value the project organisations place on the incentive reward as a commercial opportunity to increase their profit margins. However, perhaps more important are the relationship management processes that promote commitment to the project; and pride in the achievement of project goals. In the case study, these processes intensified the direct motivational effect of the incentive reward on offer. The findings also highlight the importance of ensuring that incentive goals and performance measurement processes remain relevant to the organisations throughout a project to continuously encourage motivation under changing project conditions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With a lack of places to gain an education in the craft of romance writing, novelists have few places to turn to gain real feedback. This paper investigates an alternative to textbooks, conferences, and workshops through an examination of the role provided to the writer by critique groups. How these groups work, how they benefit an author, and the critique groups as a whole are discussed. This work studies the form of Peer Assessment and Learning (PAL) and compares the technique used by educational institutions all over the world with the practice of author groups critiquing their own work. The research shows how a critique group can assist a writer to learn, grow and develop, helping to enhance the writer’s skills through constructive feedback, which gives them confidence to sell their work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper examines the role of staff training and support in the experience of staff with online teaching at Australian Catholic University. Australian Catholic University’s online education is differentiated from other Australian universities for two reasons: 1) It has 6 nationally based campuses spread across a geographical reach of 2,500 kilometres, 2) It has no internal Flexible Learning or Distance Education unit as such, and out sources the provision of web based teaching and learning services to NextEd Pty Ltd, a commercial online education company. Both factors provide challenges and benefits to the effective training, support and coordination of online education in the university.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In setting the scene for this paper, it is useful to briefly outline the history of the Queensland legal system. Our legal system was largely inherited from Britain, so it is, therefore, based in European-Western cultural and legal traditions. Alongside this, and over many thousands of years, Australian Indigenous communities devised their own socio-cultural-legal structures. As a result, when Indigenous people are drawn into interactions with our English-based law and court system, which is very different from Aboriginal law, they face particular disadvantages. Problems may include structural and linguistic differences, the complex language of the law and court processes, cultural differences, gender issues, problems of age, communication differences, the formalities of the courtroom, communication protocols used by judges, barristers, and court administrators, and particularly, the questioning techniques used by police and lawyers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The traditional model for information dissemination in disaster response is unidirectional from official channels to the public. However recent crises in the US, such as Hurricane Katrina and the Californian Bushfires show that civilians are now turning to Web 2.0 technologies as a means of sharing disaster related information. These technologies present enormous potential benefits to disaster response authorities that cannot be overlooked. In Australia, the Victorian Bushfires Royal Commission has recently recommended that Australian disaster response authorities utilize information technologies to improve the dissemination of disaster related, bushfire information. However, whilst the use of these technologies has many positive attributes, potential legal liabilities for disaster response authorities arise. This paper identifies some potential legal liabilities arising from the use of Web 2.0 technologies in disaster response situations thereby enhancing crisis related information sharing by highlighting legal concerns that need to be addressed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

US state-based data breach notification laws have unveiled serious corporate and government failures regarding the security of personal information. These laws require organisations to notify persons who may be affected by an unauthorized acquisition of their personal information. Safe harbours to notification exist if personal information is encrypted. Three types of safe harbour have been identified in the literature: exemptions, rebuttable presumptions and factors. The underlying assumption of exemptions is that encrypted personal information is secure and therefore unauthorized access does not pose a risk. However, the viability of this assumption is questionable when examined against data breaches involving encrypted information and the demanding practical requirements of effective encryption management. Recent recommendations by the Australian Law Reform Commission (ALRC) would amend the Privacy Act 1988 (Cth) to implement a data breach scheme that includes a different type of safe harbour, factor based analysis. The authors examine the potential capability of the ALRC’s proposed encryption safe harbour in relation to the US experience at the state legislature level.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

One of the main aims in artificial intelligent system is to develop robust and efficient optimisation methods for Multi-Objective (MO) and Multidisciplinary Design (MDO) design problems. The paper investigates two different optimisation techniques for multi-objective design optimisation problems. The first optimisation method is a Non-Dominated Sorting Genetic Algorithm II (NSGA-II). The second method combines the concepts of Nash-equilibrium and Pareto optimality with Multi-Objective Evolutionary Algorithms (MOEAs) which is denoted as Hybrid-Game. Numerical results from the two approaches are compared in terms of the quality of model and computational expense. The benefit of using the distributed hybrid game methodology for multi-objective design problems is demonstrated.