668 resultados para Security Studies


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The world’s population is ageing rapidly. Ageing has an impact on all aspects of human life, including social, economic, cultural, and political. Understanding ageing is therefore an important issue for the 21st century. This chapter will consider the active ageing model. This model is based on optimising opportunities for health, participation, and security in order to enhance quality of life. There is a range of exciting options developing for personal health management, for and by the ageing population, that make use of computer technology, and these should support active ageing. Their use depends however on older people learning to use computer technology effectively. The ability to use such technology will allow them to access relevant health information, advice, and support independently from wherever they live. Such support should increase rapidly in the future. This chapter is a consideration of ageing and learning, ageing and use of computer technology, and personal health management using computers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although full-term pregnancies reduce the risk of ovarian cancer, it has not been conclusively established whether incomplete pregnancies also influence risk. We investigated the relationship between a history of incomplete pregnancy and incident epithelial ovarian cancer among over 4,500 women who participated in two large Australian population-based case-control studies in 1990-1993 and 2002-2005. They provided responses to detailed questions about their reproductive histories and other personal factors. Summary odds ratios (OR) and confidence intervals (CI) derived from each study using the same covariates were aggregated. We found no significant associations between the number of incomplete pregnancies and ovarian cancer, for parous (OR = 0.98, 95% CI: 0.89, 1.08) or nulliparous (OR = 1.06, 95% CI: 0.75, 1.48) women, nor for the number of spontaneous or induced abortions and ovarian cancer for parous women (OR = 0.95, 95% CI 0.82, 1.09; OR = 1.08, 95% CI: 0.86, 1.36) or nulliparous women (OR = 1.2, 95% CI: 0.6, 2.4; OR = 0.8, 95% CI: 0.47, 1.38), respectively. A systematic review of 37 previous studies of the topic confirmed our findings that a history of incomplete pregnancy does not influence a woman’s risk of epithelial ovarian cancer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

You’ve got a thirteen week course to take students through the most important programs in television history. The programs should be the most popular, the most successful, the most important, giving students a sense of what audiences like, what is possible in the medium, and what counts more generally as a successful television program. The course is based around screenings of the programs. Which programs are you going to choose?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The shift from 20th century mass communications media towards convergent media and Web 2.0 has raised the possibility of a renaissance of the public sphere, based around citizen journalism and participatory media culture. This paper will evaluate such claims both conceptually and empirically. At a conceptual level, it is noted that the question of whether media democratization is occurring depends in part upon how democracy is understood, with some critical differences in understandings of democracy, the public sphere and media citizenship. The empirical work in this paper draws upon various case studies of new developments in Australian media, including online- only newspapers, developments in public service media, and the rise of commercially based online alternative media. It is argued that participatory media culture is being expanded if understood in terms of media pluralism, but that implications for the public sphere depend in part upon how media democratization is defined.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis develops a critical realist explanatory critique of alternative schooling programs for youth at risk taking place at three case study sites. Throughout the thesis the author pursues the question, \Are alternative provisions of schooling working academically and socially for youth at risk?. The academic lens targets literacy learning and associated pedagogies. Social outcomes are posited as positive social behaviours and continued engagement in learning. A four phased analysis, drawing on critical realism, interpretive and subject specific theories is used to elicit explanations for the research question. An overall framework is a critical realist methodology as set out by Danermark, Ekstrom, Jakobsen and Karlsson (2002, p. 129). Consequently phase one describes the phenomena of alternative schooling programs taking place at three case study sites. This is reported first as staff narratives that are resolved into imaginable historical causal components of \generative events., \prior schooling structures., \models of alternative schooling., \purpose., \individual agency., and \relations with linked community organisations.. Then transcendental questions are posed about each component using retroduction to uncover structures, underlying mechanisms and powers, and individual agency. In the second phase the researcher uses modified grounded theory methodology to theoretically redescribe causal categories related to a \needed different teaching and administrative approach. that emerged from the previous critique. A transcendental question is then applied to this redescription. The research phenomena are again theoretically redescribed in the third phase, this time using three theoretically based constructs associated with literacy and literacy pedagogies; the NRS, the 4 Resources Model, and Productive Pedagogies. This redescription is again questioned in terms of its core or \necessary. components. The fourth phase makes an explanatory critique by comparing and critiquing all previous explanations, recontextualising them in a wider macro reality of alternative schooling. Through this critical realist explanatory critiquing process, a response emerges not only to whether alternative provisions of schooling are working, but also how they are working, and how they are not working, with realistically based implications for future improvement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Critical skills such as identifying and appreciating issues that confront firms engaging in international business, and the ability to undertake creative decision-making, are considered fundamental to the study of International Business. It has been argued that using audio-visual case studies can help develop such skills. However, this is difficult due to a lack of Australian case studies. This paper reviews the literature outlining the advantages believed to result from the use of audio-visual case studies, describes a project implemented in a large cohort of students studying International Business, reports on a pilot evaluation of the project, and outlines the findings and conclusions of the survey.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Synchronous fluorescence spectroscopy (SFS) was applied for the investigation of interactions of the antibiotic, tetracycline (TC), with DNA in the presence of aluminium ions (Al3+). The study was facilitated by the use of the Methylene Blue (MB) dye probe, and the interpretation of the spectral data with the aid of the chemometrics method, parallel factor analysis (PARAFAC). Three-way synchronous fluorescence analysis extracted the important optimum constant wavelength differences, Δλ, and showed that for the TC–Al3+–DNA, TC–Al3+ and MB dye systems, the associated Δλ values were different (Δλ = 80, 75 and 30 nm, respectively). Subsequent PARAFAC analysis demonstrated the extraction of the equilibrium concentration profiles for the TC–Al3+, TC–Al3+–DNA and MB probe systems. This information is unobtainable by conventional means of data interpretation. The results indicated that the MB dye interacted with the TC–Al3+–DNA surface complex, presumably via a reaction intermediate, TC–Al3+–DNA–MB, leading to the displacement of the TC–Al3+ by the incoming MB dye probe.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The interaction of quercetin, which is a bioflavonoid, with bovine serum albumin (BSA) was investigated under pseudo-physiological conditions by the application of UV–vis spectrometry, spectrofluorimetry and cyclic voltammetry (CV). These studies indicated a cooperative interaction between the quercetin–BSA complex and warfarin, which produced a ternary complex, quercetin–BSA–warfarin. It was found that both quercetin and warfarin were located in site I. However, the spectra of these three components overlapped and the chemometrics method – multivariate curve resolution-alternating least squares (MCR-ALS) was applied to resolve the spectra. The resolved spectra of quercetin–BSA and warfarin agreed well with their measured spectra, and importantly, the spectrum of the quercetin–BSA–warfarin complex was extracted. These results allowed the rationalization of the behaviour of the overlapping spectra. At lower concentrations ([warfarin] < 1 × 10−5 mol L−1), most of the site marker reacted with the quercetin–BSA, but free warfarin was present at higher concentrations. Interestingly, the ratio between quercetin–BSA and warfarin was found to be 1:2, suggesting a quercetin–BSA–(warfarin)2 complex, and the estimated equilibrium constant was 1.4 × 1011 M−2. The results suggest that at low concentrations, warfarin binds at the high-affinity sites (HAS), while low-affinity binding sites (LAS) are occupied at higher concentrations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Public key cryptography, and with it,the ability to compute digital signatures, have made it possible for electronic commerce to flourish. It is thus unsurprising that the proposed Australian NECS will also utilise digital signatures in its system so as to provide a fully automated process from the creation of electronic land title instrument to the digital signing, and electronic lodgment of these instruments. This necessitates an analysis of the fraud risks raised by the usage of digital signatures because a compromise of the integrity of digital signatures will lead to a compromise of the Torrens system itself. This article will show that digital signatures may in fact offer greater security against fraud than handwritten signatures; but to achieve this, digital signatures require an infrastructure whereby each component is properly implemented and managed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aims: Influenza is commonly spread by infectious aerosols; however, detection of viruses in aerosols is not sensitive enough to confirm the characteristics of virus aerosols. The aim of this study was to develop an assay for respiratory viruses sufficiently sensitive to be used in epidemiological studies. Method: A two-step, nested real-time PCR assay was developed for MS2 bacteriophage, and for influenza A and B, parainfluenza 1 and human respiratory syncytial virus. Outer primer pairs were designed to nest each existing real-time PCR assay. The sensitivities of the nested real-time PCR assays were compared to those of existing real-time PCR assays. Both assays were applied in an aerosol study to compare their detection limits in air samples. Conclusions: The nested real-time PCR assays were found to be several logs more sensitive than the real-time PCR assays, with lower levels of virus detected at lower Ct values. The nested real-time PCR assay successfully detected MS2 in air samples, whereas the real-time assay did not. Significance and Impact of the Study: The sensitive assays for respiratory viruses will permit further research using air samples from naturally generated virus aerosols. This will inform current knowledge regarding the risks associated with the spread of viruses through aerosol transmission.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security measures, the RSNs remain vulnerable to a number of attacks. Failure of preventative measures to address all RSN vulnerabilities dictates the need for a comprehensive monitoring capability to detect all attacks on RSNs and also to proactively address potential security vulnerabilities by detecting security policy violations in the WLAN. This research proposes novel wireless intrusion detection techniques to address these monitoring requirements and also studies correlation of the generated alarms across wireless intrusion detection system (WIDS) sensors and the detection techniques themselves for greater reliability and robustness. The specific outcomes of this research are: A comprehensive review of the outstanding vulnerabilities and attacks in IEEE 802.11i RSNs. A comprehensive review of the wireless intrusion detection techniques currently available for detecting attacks on RSNs. Identification of the drawbacks and limitations of the currently available wireless intrusion detection techniques in detecting attacks on RSNs. Development of three novel wireless intrusion detection techniques for detecting RSN attacks and security policy violations in RSNs. Development of algorithms for each novel intrusion detection technique to correlate alarms across distributed sensors of a WIDS. Development of an algorithm for automatic attack scenario detection using cross detection technique correlation. Development of an algorithm to automatically assign priority to the detected attack scenario using cross detection technique correlation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

EPR study of both blue and green sapphire samples confirms the presence of Cr(III) in four different octahedral sites. The g (1.98) value is the same but D values differ for the two the samples. The EPR spectra suggest that the blue sapphire contains more chromium than the green sapphire. No Fe(III) impurity was noted in the EPR spectrum.