336 resultados para emotional security


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In order to understand better the role of affect in learning about socio-scientificissues (SSI), this study investigated Year 12 students’ emotional arousal as they participated in an online writing-to-learn science project about the socio-scientific issue of biosecurity. Students wrote a series of hybridised scientific narratives, or BioStories, that integrate scientific information about biosecurity with narrative storylines, and uploaded these to a dedicated website. Throughout their participation in the project, students recorded their emotional responses to the various activities (N=50). Four case students were also video recorded during selected science lessons as they researched, composed and uploaded their BioStories for peer review. Analysis of these data, as well as interview data obtained from the case students, revealed that pride, strength, determination, interest and alertness were among the positive emotions most strongly elicited by the project. These emotions reflected students’ interest in learning about a new socio-scientific issue, and their enhanced feelings of self-efficacy in successfully writing hybridised scientific narratives in science. The results of this study suggest that the elicitation of positive emotional responses as students engage in hybridised writing about SSI with strong links to environmental education, such as biosecurity, can be valuable in engaging students in education for sustainability.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on a six month longitudinal study exploring people’s emotional experience with two categories of portable interactive devices (PIDs); media and health related PIDs. The focus is on emotions and how PIDs mediate these experiences in everyday contexts. Previous findings presented by the authors (Gomez 2009, 2010) revealed that people’s emotional experiences with PIDs over time are influenced by whether interactions were at a personal or social level. This paper presents four categories of activities identified and their relationship to emotional experiences with PIDs that have been developed through further analysis of the data. It concludes with a discussion of the findings and their implications to the field of Design on the design of future PIDs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With estimates that two billion of the world’s population will be 65 years or older by 2050, ensuring that older people ‘age well’ is an international priority. To date, however, there is significant disagreement and debate about how to define and measure ‘ageing well’, with no consensus on either terminology or measurement. Thus, this chapter describes the research rationale, methodology and findings of the Australian Active Ageing Study (Triple A Study), which surveyed 2620 older Australians to identify significant contributions to quality of life for older people: work, learning, social participation, spirituality, emotional wellbeing, health, and life events. Exploratory factor analyses identified eight distinct elements (grouped into four key concepts) which appear to define ‘active ageing’ and explained 55% of the variance: social and life participation (25%), emotional health (22%), physical health and functioning (4%) and security (4%). These findings highlight the importance of understanding and supporting the social and emotional dimensions of ageing, as issues of social relationships, life engagement and emotional health dominated the factor structure. Our intension is that this paper will prompt informed debate and discussion on defining and measuring active ageing, facilitating exploration and understanding of the complexity of issues that intertwine, converge and enhance the ageing experience.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The interactive effects of emotion and attention on attentional startle modulation were investigated in two experiments. Participants performed a discrimination and counting task with two visual stimuli during which acoustic eyeblink startle-eliciting probes were presented at long lead intervals. In Experiment 1, this task was combined with aversive Pavlovian conditioning. In Group Attend CS+, the attended stimulus was followed by an aversive unconditional stimulus (US) and the ignored stimulus was presented alone whereas the ignored stimulus was paired with the US in Group Attend CS−. In Experiment 2, a non-aversive reaction time task US replaced the aversive US. Regardless of the conditioning manipulation and consistent with a modality non-specific account of attentional startle modulation, startle magnitude was larger during attended than ignored stimuli in both experiments. Blink latency shortening was differentially affected by the conditioning manipulations suggesting additive effects of conditioning and discrimination and counting task on blink startle.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The present study investigated whether facial expressions of emotion presented outside consciousness awareness will elicit evaluative responses as assessed in affective priming. Participants were asked to evaluate pleasant and unpleasant target words that were preceded by masked or unmasked schematic (Experiment 1) or photographic faces (Experiments 1 and 2) with happy or angry expressions. They were either required to perform the target evaluation only or to perform the target evaluation and to name the emotion expressed by the face prime. Prime-target interval was 300 ms in Experiment 1 and 80 ms in Experiment 2. Naming performance confirmed the effectiveness of the masking procedure. Affective priming was evident after unmasked primes in tasks that required naming of the facial expressions for schematic and photographic faces and after unmasked primes in tasks that did not require naming for photographic faces. No affective priming was found after masked primes. The present study failed to provide evidence for affective priming with masked face primes, however, it indicates that voluntary attention to the primes enhances affective priming.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In most of the digital image watermarking schemes, it becomes a common practice to address security in terms of robustness, which is basically a norm in cryptography. Such consideration in developing and evaluation of a watermarking scheme may severely affect the performance and render the scheme ultimately unusable. This paper provides an explicit theoretical analysis towards watermarking security and robustness in figuring out the exact problem status from the literature. With the necessary hypotheses and analyses from technical perspective, we demonstrate the fundamental realization of the problem. Finally, some necessary recommendations are made for complete assessment of watermarking security and robustness.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sustainable property practices will be essential for Australia’s future. The various levels of government offer incentives aimed at encouraging residents to participate in sustainable practices. Many of these programmes however are only accessible by owner occupiers, or landlords and tenants with long term tenancies. Improving security of tenure for tenants, to enable longer term tenancies, would positively impact upon property practices. This article explains what security of tenure is and identifies how a lack of security of tenure adversely impacts property practices. By comparison with Genevan property practices, it concludes by making suggestions as to how security of tenure can be reinforced.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Effective enterprise information security policy management requires review and assessment activities to ensure information security policies are aligned with business goals and objectives. As security policy management involves the elements of policy development process and the security policy as output, the context for security policy assessment requires goal-based metrics for these two elements. However, the current security management assessment methods only provide checklist types of assessment that are predefined by industry best practices and do not allow for developing specific goal-based metrics. Utilizing theories drawn from literature, this paper proposes the Enterprise Information Security Policy Assessment approach that expands on the Goal-Question-Metric (GQM) approach. The proposed assessment approach is then applied in a case scenario example to illustrate a practical application. It is shown that the proposed framework addresses the requirement for developing assessment metrics and allows for the concurrent undertaking of process-based and product-based assessment. Recommendations for further research activities include the conduct of empirical research to validate the propositions and the practical application of the proposed assessment approach in case studies to provide opportunities to introduce further enhancements to the approach.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study describes the treatment of obese individuals who rated high on emotional eating using four case studies that involved 22 sessions of either cognitive behavioral therapy (CBT) or dialectical behavioral therapy (DBT). Outcomes measures relating to weight, body mass index, emotional eating, depression, anxiety, and stress were all assessed with each participant prior to each baseline (three weekly sessions), during treatment and posttherapy. At the 8-week follow-up, the two cases that had received DBT had lost 10.1% and 7.6% of their initial body weight, whereas the two cases that had received CBT had lost 0.7% and 0.6% of their initial body weight. The two DBT cases also exhibited reductions in emotional distress, frequency of emotional eating or quantity of food eating in response to emotions, whereas the two CBT cases showed no overall reductions in these areas. Important processes from all four cases are described as are the implications to clinicians for developing more effective interventions for obese clients who engage in emotional eating.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

DRAMA often develops around the idea of a return: a return to events of the past, memories of the past, or people from the past...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examined the relationship between special health care needs and social-emotional and learning competence in the early years, reporting on two waves of data from the Kindergarten Cohort of Growing up in Australia: The Longitudinal Study of Australian Children (LSAC). Six hundred and fifty children were identified through the 2-question Special Health Care Needs Screener as having special health care needs. Children with special health care needs were more likely to be male, to have been of low birth weight, to be taking prescription medications, to be diagnosed with a specific health condition and to be from families where the mother was less well educated. These children scored significantly lower on teacher-rated social-emotional and learning competencies prior to school compared to a control group of children without special health care needs. Multiple regression analyses indicated that being identified with a special health care need prior to school predicted lower social-emotional and learning competencies in the early years of school. Results are discussed in terms of the implications for policy and practice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

How do we create strong urban narratives? How do we create affection for our cities? Play, an essential part of any species' biological existence and development, can often be perceived as chaotic and derogatory to social and spatial order. Play is also often perceived as a creative force which generates social and spatial value. This paper looks at the design approaches to both chaotic and creative perceptions of publics at play in urban space. Commonly, Urban and Architectural Design constitutes reactive management of perceived chaos, which derogatorily effects our sensory and emotional engagement with space. Alternatively, Urban and Architectural Design can appeal to the creativity of play, by encouraging unsolicited novelty that is vital to strong experiential narratives in the city and iterating environments that encourage the emergence of physical, emotional and cultural invention. These perceptions of chaos and creativity affect the design methodology of professional practice. Tested through the exciting vehicle of Parkour as urban narrative, the constraints and opportunities of both approaches are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information security has been recognized as a core requirement for corporate governance that is expected to facilitate not only the management of risks, but also as a corporate enabler that supports and contributes to the sustainability of organizational operations. In implementing information security, the enterprise information security policy is the set of principles and strategies that guide the course of action for the security activities and may be represented as a brief statement that defines program goals and sets information security and risk requirements. The enterprise information security policy (alternatively referred to as security policy in this paper) that represents the meta-policy of information security is an element of corporate ICT governance and is derived from the strategic requirements for risk management and corporate governance. Consistent alignment between the security policy and the other corporate business policies and strategies has to be maintained if information security is to be implemented according to evolving business objectives. This alignment may be facilitated by managing security policy alongside other corporate business policies within the strategic management cycle. There are however limitations in current approaches for developing and managing the security policy to facilitate consistent strategic alignment. This paper proposes a conceptual framework for security policy management by presenting propositions to positively affect security policy alignment with business policies and prescribing a security policy management approach that expounds on the propositions.