18 resultados para Puerto Ricans
em Queensland University of Technology - ePrints Archive
Resumo:
With the growth of service industry occupations, managing emotions at work has increased as a topic of interest among scholars and practitioners in organisational behaviour and human resource management(Grandey, 2000). Emotional dissonance occurs when there is discrepancy between organisational sanctioned emotions and actual emotions of employees(Zapf, Vogt, Seifert, Mertini, & Isic, 1999). This discrepancy can be associated with significant levels of psychological ill-health (Zapf, Seifert, Schmutte, Mertini, & Holz, 2001). Policing is consistently ranked among the top five stressful/high-risk occupations (e.g. Coman, Evans, Stanley, & Burrows, 1991). Police officers act as the front-line contact when dealing directly with community members; they are expected to be social workers, teachers, role models, and counsellors. Operational police officers are often required to suppress their actual emotions during their work, in order to perform their job to formally designated procedures and standards.
Resumo:
"International Journalism and Democracy" explores a new form of journalism that has been dubbed ‘deliberative journalism’. As the name suggests, these forms of journalism support deliberation — the processes in which citizens recognize and discuss the issues that affect their communities, appraise the potential responses to those issues, and make decisions about whether and how to take action. Authors from across the globe identify the types of journalism that assist deliberative politics in different cultural and political contexts. Case studies from 15 nations spotlight different approaches to deliberative journalism, including strategies that have been sometimes been labeled as public or civic journalism, peace journalism, development journalism, citizen journalism, the street press, community journalism, social entrepreneurism, or other names. Countries that are studied in-depth include the United States, the United Kingdom, Germany, Finland, China, India, Japan, Indonesia, Australia, New Zealand, South Africa, Nigeria, Brazil, Colombia and Puerto Rico. Each of the approaches that are described offers a distinctive potential to support deliberative democracy. However, the book does not present any of these models or case studies as examples of categorical success. Instead, it explores different elements of the nature, strengths, limitations and challenges of each approach, as well as issues affecting their longer-term sustainability and effectiveness. The book also describes the underlying principles of deliberation, the media’s potential role in deliberation from a theoretical and practical perspective, and ongoing issues for deliberative media practitioners.
Resumo:
In the multi-view approach to semisupervised learning, we choose one predictor from each of multiple hypothesis classes, and we co-regularize our choices by penalizing disagreement among the predictors on the unlabeled data. We examine the co-regularization method used in the co-regularized least squares (CoRLS) algorithm, in which the views are reproducing kernel Hilbert spaces (RKHS's), and the disagreement penalty is the average squared difference in predictions. The final predictor is the pointwise average of the predictors from each view. We call the set of predictors that can result from this procedure the co-regularized hypothesis class. Our main result is a tight bound on the Rademacher complexity of the co-regularized hypothesis class in terms of the kernel matrices of each RKHS. We find that the co-regularization reduces the Rademacher complexity by an amount that depends on the distance between the two views, as measured by a data dependent metric. We then use standard techniques to bound the gap between training error and test error for the CoRLS algorithm. Experimentally, we find that the amount of reduction in complexity introduced by co regularization correlates with the amount of improvement that co-regularization gives in the CoRLS algorithm.
Resumo:
The legend of Hunter S. Thompson*the great gonzo*has grown deeper and more layered since his death in February 2005 than it was even in his exotic and controversyfilled life. The most recent addition to the mythology*The Rum Diary(Bruce Robinson, 2011)*stars Johnny Depp, possibly Thompson’s greatest fan, and certainly a man dedicated to keeping the man’s memory alive. Not for the first time, Depp brings his A-list status and good looks to playing the Thompson character on the big screen. In Terry Gilliam’s adaptation of Fear and Loathing in Las Vegas (1998) he played the writer’s alter ego, Raoul Duke. Duke was Thompson, and Fear and Loathing in Las Vegas a fictionalized account of what is generally accepted to have been a real-life episode. In The Rum Diary he plays Paul Kemp, the young journalist who lands a job as a crime reporter on a struggling Puerto Rican newspaper. Again, the protagonist is a version of Thompson himself, who did indeed spend time in 1960 working for the Puerto Rican press. Both films join Gonzo (Alex Gibney, 2008) to form a trilogy of Depp-infused movies about a journalist some regard as one of the greatest of the twentieth century, and others view as an overrated charlatan who leveraged his one big idea into a four decades-long career brought low by drugs, booze, dysfunctional sex and, finally, Hemingwayesque despair...
Resumo:
In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.
Resumo:
Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an "ecosystem-in-an-ecosystem" which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.
Resumo:
This chapter briefly introduces the concepts and modeling of gas/isotope separation by two dimensional carbon frameworks, i.e. porous graphene and carbon nanomeshes, on the basis of reviewing recent literatures. The small size of evenly distributed pores on these carbon frameworks make them ideal not only for the separation of small gas molecules but also for isotope separation by utilizing the different zero point energies induced by confinement of the pores. The related simulations were treated by transition state theory, an affordable yet precise method that could be adopted in combination with different levels of theory. Such method could be employed to evaluate the performance, as well as to aid the design, of other 2D carbon frameworks toward the goal of gas/isotope separation in the future.
Resumo:
Echolocation calls of 119 bats belonging to 12 species in three families from Antillean islands of Puerto Rico, Dominica, and St. Vincent were recorded by using time-expansion methods. Spectrograms of calls and descriptive statistics of five temporal and frequency variables measured from calls are presented. The echolocation calls of many of these species, particularly those in the family Phyllostomidae, have not been described previously. The wing morphology of each taxon is described and related to the structure of its echolocation calls and its foraging ecology. Of slow aerial-hawking insectivores, the Mormoopidae and Natalidae Mormoops blainvillii, Pteronotus davyi davyi, P. quadridens fuliginosus, and Natalus stramineus stramineus can forage with great manoeuvrability in background-cluttered space (close to vegetation), and are able to hover. Pteronotus parnellii portoricensis is able to fly and echolocate in highly-cluttered space (dense vegetation). Among frugivores, nectarivores and omnivores in the family Phyllostomidae, Brachyphylla cavernarum intermedia is adapted to foraging in the edges of vegetation in background-cluttered space, while Erophylla bombifrons bombifrons, Glossophaga longirostris rostrata, Artibeus jamaicensis jamaicensis, A. jamaicensis schwartzi and Stenoderma rufum darioi are adapted to foraging under canopies in highly-cluttered space and do not have speed or efficiency in commuting flight. In contrast, Monophyllus plethodon luciae, Sturnira lilium angeli and S. lilium paulsoni are adapted to fly in highly-cluttered space, but can also fly fast and efficiently in open areas.
Resumo:
Compression is desirable for network applications as it saves bandwidth; however, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. This side channel has led to successful CRIME and BREACH attacks on web traffic protected by the Transport Layer Security (TLS) protocol. The general guidance in light of these attacks has been to disable compression, preserving confidentiality but sacrificing bandwidth. In this paper, we examine two techniques - heuristic separation of secrets and fixed-dictionary compression|for enabling compression while protecting high-value secrets, such as cookies, from attack. We model the security offered by these techniques and report on the amount of compressibility that they can achieve.
Resumo:
A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among departments. A specification of HD wallets has even been accepted as Bitcoin standard BIP32. Unfortunately, in all existing HD wallets---including BIP32 wallets---an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided. We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called "one more" discrete logarithm problem.