52 resultados para Artillery drill and tactics.

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

When I was first invited to teach a women's studies course called Sex Trafficking in 2002, most of my students had never heard of the issue. Internet and literature searches for "trafficking" mostly turned up references to trafficking in drugs and weapons, not people. When I revised the course for a topical capstone in Criminology, Justice, and Policy Studies in 2006, all of my students had heard about human trafficking, and a handful had already studied it in other classes. The availability of books, films, scholarly articles, and advocacy pieces had all increased exponentially since I first became engaged in the field. This bounty provided a wealth of resources for teaching but also presented a greater challenge when it came to deciding which texts to include. It also added to the inevitable pedagogical angst over what to leave out. I came to know about trafficking by accident, when I was hired as a research assistant at The Protection Project (TPP) in 1999. In my time at TPP I authored a literature review on human trafficking. At that time, my comprehensive database of sources contained fewer than one hundred books and articles, a few UN documents, a handful of films, and some websites from nongovernmental organizations. My review of the literature inevitably reflected the ideological chasm between those who saw trafficking as primarily a labor, migration, and rights issue and those who saw it as primarily a sexual exploitation issue. On the policy end, these ideological orientations created bizarre bedfellows of individuals and organizations that otherwise would have been at odds. The ideological divide has not diminished in the intervening years, and it is important to be aware of and to negotiate this in designing a course on trafficking. As a feminist teacher, I was very aware of the divisions among feminists on the subject of trafficking, and was interested in communicating these differences to students who were not well versed in the varieties of feminist thought. I was also mindful of the difficulties my American students had in engaging with some of the course texts and issues the first time around. For some students, moral judgments about prostitutes were as far as they were able to go in engaging with the course. These students could not find a way in to think about the many issues involved in trafficking. How could I reach them? In this article, I share some of my texts and tactics with others who might find themselves in a position to teach about human trafficking. I include my case for why feminist teachers should teach trafficking, an overview of the debate that divides the field, my rationale for organizing the course the way that I did, issues to consider when designing a course on trafficking, and some suggested readings, films, and web resources.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Contemporary cities no longer offer the same types of permanent environments that we planned for in the latter part of the twentieth century. Our public spaces are increasingly temporary, transient, and ephemeral. The theories, principles and tactics with which we designed these spaces in the past are no longer appropriate. We need a new theory for understanding the creation, use, and reuse of temporary public space. Moe than a theory, we need new architectural tactics or strategies that can be reliably employed to create successful temporary public spaces. This paper will present ongoing research that starts that process through critical review and technical analysis of existing and historic temporary public spaces. Through the analysis of a number of public spaces, that were either designed for temporary use or became temporary through changing social conditions, this research identifies the tactics and heuristics used in such projects. These tactics and heuristics are then analysed to extract some broader principles for the design of temporary public space. The theories of time related building layers, a model of environmental sustainability, and the recycling of social meaning, are all explored. The paper will go on to identify a number of key questions that need to be explored and addressed by a theory for such developments: How can we retain social meaning in the fabric of the city and its public spaces while we disassemble it and recycle it into new purposes? What role will preservation have in the rapidly changing future; will exemplary temporary spaces be preserved and thereby become no longer temporary? Does the environmental advantage of recycling materials, components and spaces outweigh the removal or social loss of temporary public space? This research starts to identify the knowledge gaps and proposes a number of strategies for making public space in the age of temporary, recyclable, and repurposing of our urban infrastructure; a way of creating lighter, cheaper, quicker, and temporary interventions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It’s never been easier for rights advocates to create and distribute their own media productions, using text, audio, video and the internet. Rights advocates can make media to raise awareness about an issue, to convey new information that is not in the public domain, or to mobilise people to take action. However, careful planning, in the form of a strategy document, is essential to ensure that the media you make genuinely contributes to reaching your advocacy goals. Whether you are an individual rights advocate, a group or an organisation, this chapter will take you through the steps involved in creating a strategic plan for making any kind of media as part of a campaign or project.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Blair Witch Project was a low budget movie made by student filmmakers that become an international box office hit in 1999. Blair Witch was a landmark in movie marketing and distribution because it was the first time that any movie had successfully leveraged the Internet as a marketing platform to reach a wide audience. The marketing team employed a range of innovative strategies and tactics to stimulate audience demand. This case study describes and analyses the success of the marketing launch of The Blair Witch Project.It also provides an Instructors booklet comprising seven questions and answers related to the marketing success of the movie.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper explores how young children are constructed in educational policy for citizenship in Australia, investigating tensions between early childhood educational discourses that construct young children as active citizens and the broader discourses of citizenship in Australian educational policy. There is a widespread discourse within early childhood education that regards young children as citizens and democratic participants in their own lives. This view is a reflection of the oft cited Article 12 in the UN Convention on the Rights of the Child (UNCRC 1989). However, educational policy and curriculum for citizenship in Australia, by and large, adheres to age and stage understandings of children, implicitly deeming young children unable to conceptualise abstract ideas of what it means to ‘be a good citizen’. This paper is located in the borders and intersections between discourses of early childhood education, young children as active participants in their own lives and what it means to be an active citizen in Australia. We are concerned with the interweaving of these ideas and how they are played out in educational policy making. This is an important perspective to take for governing and policy making are exercises in harnessing existing ideas and discourses, thereby rendering strategies and tactics for managing populations thinkable and sayable (Rose 1999). The ‘views from the margins’ (Burman 2008, p. 7) can provide alternative perspectives on policymaking, illuminating discursive tactics and strategies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper explores grassroots leadership, an under-researched and often side-lined approach to leadership that operates outside of formal bureaucratic structures. The paper’s central purpose is the claim that an understanding of grassroots leadership and tactics used by grassroots leaders provides valuable insights for the study of school leadership. In this paper, we present and discuss an original model of grassroots leadership based on the argument that this under-researched area can further our understanding of school leadership. Drawing upon the limited literature in the field, we present a model consisting of two approaches to change (i.e. conflict and consensus) and two categories of change (i.e. reform and refinement) and then provide illustrations of how the model works in practice. We make the argument that the model has much merit for conceptualizing school leadership, and this is illustrated by applying the model to formal bureaucratic leadership within school contexts. Given the current climate in education where business and management language is pervasive within leadership-preparation programs, we argue that it is timely for university academics, who are responsible for preparing school leaders to consider broadening their approach by exposing school leaders to a variety of change-based strategies and tactics used by grassroots leaders.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Real-world AI systems have been recently deployed which can automatically analyze the plan and tactics of tennis players. As the game-state is updated regularly at short intervals (i.e. point-level), a library of successful and unsuccessful plans of a player can be learnt over time. Given the relative strengths and weaknesses of a player’s plans, a set of proven plans or tactics from the library that characterize a player can be identified. For low-scoring, continuous team sports like soccer, such analysis for multi-agent teams does not exist as the game is not segmented into “discretized” plays (i.e. plans), making it difficult to obtain a library that characterizes a team’s behavior. Additionally, as player tracking data is costly and difficult to obtain, we only have partial team tracings in the form of ball actions which makes this problem even more difficult. In this paper, we propose a method to overcome these issues by representing team behavior via play-segments, which are spatio-temporal descriptions of ball movement over fixed windows of time. Using these representations we can characterize team behavior from entropy maps, which give a measure of predictability of team behaviors across the field. We show the efficacy and applicability of our method on the 2010-2011 English Premier League soccer data.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Knowledge management (KM) provides a structured process to establish the link between knowledgebased assets within an organisation and its desired business objectives. Although KM issues are becoming increasingly important to the construction industry, there is currently no measurement tool for assessing the implementation of KM programmes. This paper reports on the development of such a tool which can be used as both a means of self-assessment and also for benchmarking purposes. Important practices needed for successful KM implementation were identified from the literature and via a self-administered survey targeting large and medium construction organisations in Hong Kong. Survey findings demonstrate the potential of the proposed self-assessment tool to measure the individual’s perception of the relative importance of KM antecedents and practices, also providing early insight of KM implementation by highlighting the negative gaps between what “is” and “should be” happening, thus identifying areas that need re alignment of KM strategies and tactics. The paper also suggests this tool could be further developed to help organisations to formulate and modify their KM programmes according to their own specific internal business environment, and the nature of their projects.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

‘Engagement’ is one of the buzzwords of 21st century public relations theory and practice. Yet the concept of engagement remains frustratingly nebulous and intangible, lacking clear definition and consistent use. This paper suggests that the concept of dialogue can provide public relations practitioners and academics with a framework for defining engagement that allows deep insights into the range of ideas and contexts it covers. Specifically, this paper argues for the use of a pragmatic practitioner perspective on dialogue as a lens through which to study engagement. Current literature clearly articulates the normative and prescriptive perspectives on dialogue in public relations, but leaves the story of the reality of the practitioner experience of dialogue largely untold. New research tells this ‘missing’ story of the practitioner perspective on dialogue, which in turn offers some insights into the forms and functions of engagement in practice. Dialogue is seen as encompassing three different types of public relations practice: informing stakeholders of organisational decisions and receiving their feedback; consulting with stakeholders on the strategies and tactics used by organisations to achieve their chosen goals; and including stakeholder input in the making of decisions on what organisational goals should be. Adopting this pragmatic practitioner perspective on dialogue to view engagement provides scaffolding that is strong enough to encourage development of a consistent definition of its meaning; while still allowing the freedom and scope necessary to develop deep and rich understanding of the phenomenon.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The philosophical promise of community development to “resource and empower people so that they can collectively control their own destinies” (Kenny 1996:104) is no doubt alluring to Indigenous Australia. Given the historical and contemporary experiences of colonial control and surveillance of Aboriginal bodies, alongside the continuing experiences of socio-economic disadvantage, community development reaffirms the aspirational goal of Indigenous Australians for self-determination. Self-determination as a national policy agenda for Indigenous Australians emerged in the 1970s and saw the establishment of a wide range of Aboriginal community-controlled services (Tsey et al 2012). Sullivan (2010:4) argues that the Aboriginal community controlled service sector during this time has, and continues to be, instrumental to advancing the plight of Indigenous Australians both materially and politically. Yet community development and self-determination remain highly problematic and contested in how they manifest in Indigenous social policy agendas and in practice (Hollinsworth 1996; Martin 2003; McCausland 2005; Moreton-Robinson 2009). Moreton-Robinson (2009:68) argues that a central theme underpinning these tensions is a reading of Indigeneity in which Aboriginal and Torres Strait Islander people, behaviours, cultures, and communities are pathologised as “dysfunctional” thus enabling assertions that Indigenous people are incapable of managing their own affairs. This discourse distracts us from the “strategies and tactics of patriarchal white sovereignty” that inhibit the “state’s earlier policy of self-determination” (Moreton-Robinson 2009:68). We acknowledge the irony of community development espoused by Ramirez above (1990), that the least resourced are expected to be most resourceful.; however, we wish to interrogate the processes that inhibit Indigenous participation and control of our own affairs rather than further interrogate Aboriginal minds as uneducated, incapable and/or impaired...

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Sexual harassment can be conceptualised as an interaction between harassers and targets. Utilising 23 detailed legal transcripts, this study explored evidence of a range of perpetrator tactics and target counter-tactics. These tactics can be readily fitted into the backfire framework, which proposes that powerful perpetrators of perceived unjust acts are likely to cover up the actions, devalue the target, reinterpret the events, use official channels to give an appearance of justice, and intimidate or bribe people involved. Targets can respond using counter-tactics of exposure, validation, reframing, mobilisation of support, and resistance. The findings have implications for raising awareness of harassing tactics and recommendations for effective informal responses in organisations.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Defining the difference between successful and mediocre leaders is a quest that has attracted many renowned scholars, drawing vast amounts of research effort. Yet while there are excellent theoretical explanations of what leaders should do: exhibit transformational behaviours, demonstrate authenticity, build productive relationships with followers and so on; there is still a scarcity of empirically-based research advising practicing leaders how to do these things. This study seeks to provide guidance about the fine-grained processes that effective leaders use on a daily basis to undertake the core process of all leadership activity; influencing followers. Using a grounded research approach, this study employs qualitative methods to capture the detail of effective leader behaviour and the micro-level influence processes that leaders use to create effective follower outcomes. Conducted in the health services industry with medical and allied health leaders, the study sought to answer the question: What influence methods might effective, contemporary leaders be using? The study builds on existing influence research, seeking to extend and update the typology of 11 influence tactics originally developed by Yukl and others, and which has been static since the late 1990s. Eight new influence tactics were identified, offering practicing leaders a powerful suite of potential strategies and representing a significant contribution to the field. Further research is recommended to confirm the identified influence constructs and test the generalisability of these findings to broader leader populations in health organisations and other knowledge-based organisations.