9 resultados para Tactic
em Queensland University of Technology - ePrints Archive
Resumo:
This paper compares perceptions of integrated marketing communication (IMC) to establish whether consumers perceive integration in the same way as the literature. It begins by reviewing the literature to identify shared assumptions about integration and factors thought to contribute to the integration of marketing communication and, in an experiment, compares these with the perceptions of consumers. Many of the shared assumptions in the literature have been supported by the findings of this study. Integration has been demonstrated to be both a strategy and a tactic. The strategic side is part of a management process and is unable to be observed by consumers from the marketing communication output. Consumers can, however, identify the tactics and are able to recall a number of integration factors such as logo, corporate colours and image. Consumers in the total message integration groups perceived the messages they received as more integrated than those in partial integration or no integration groups.
Resumo:
As with the broader field of education research, most writing on the subject of school excursions and field trips has centred around progressive/humanist concerns for building pupil’s self-esteem and for the development of the ‘whole child’. Such research has also stressed the importance of a broad, grounded, and experiential curriculum - as exemplified by subjects containing these extra-school activities - as well as the possibility of strengthening the relationship between student and teacher. Arguing that this approach to the field trip is both exhausted of ideas and conceptually flawed, this paper proposes some alternate routes into the area for the prospective researcher. First, it is argued that by historicising the subject matter, it can be seen that school excursions are not simply the product of the contemporary humanist desire for diverse and fulfilling educational experiences, rather they can, in part, be traced to eighteenth century beliefs among the English gentry that travel formed a crucial component of a good education, to the advent of an affordable public rail system, and to school tours associated with the Temperance movement. Second, field trips can be understood from within the associated framework of concerns over the governance of tourism and the organisation of disciplinary apparatuses for the production of an educated and regulated citizenry. Far from being a simple learning experience, museums and art galleries form part of a complex of disciplinary and power relations designed to produce a populace with very specific capacities, aspirations and styles of public conduct. Finally, rather than allowing children ‘freedom’ from the constraints of the classroom, on the contrary, through the medium of the field-trip, children can become accustomed to having their activities governed in the broader domain of the generalised community . School excursions thereby constitute an effective tactic through which young people have their conduct managed, and their social and scholastic identities shaped and administered.
Resumo:
Recent research has stressed the integral part played by teachers in both preliminary diagnosis and ongoing treatment of a range of conduct and personality disorders. Teachers are not only required to be aware of a variety of new categories of difference (Attention Deficit Disorder, Selective Mutism, Borderline Personality Disorder, Antisocial Personality Disorder, to name but a few), but are also now lauded for extending the role of education into new areas of social management. This paper will take issue with this understanding on two counts: first, teachers have always sought to mould the personalities of students, and the pathologisation of specific forms of conduct is simply a new tactic within a very old and familiar strategy. Second, schools do not simply discover disorders such as ADD as objective facts of nature. Rather, they are part of the process through which such differences are created, and by which individuals can be more effectively governed.
Resumo:
The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.
Resumo:
Environmental manipulation removes students from their everyday worlds to unfamiliar worlds, to facil- itate learning. This article reports that this strategy was effective when applied in a university design unit, using the tactic of immersion in the Second Life online virtual environment. The objective was for teams of stu- dents each to design a series of modules for an orbiting space station using supplied data. The changed and futuristic environment led the students to an important but previously unconsidered design decision which they were able to address in novel ways because of, rather than in spite of, the Second Life immersion.
Resumo:
Under current law Australia appears to be a tax haven for certain non-governmental institutions. Millions of ordinary business income may go untaxed and the deductibility for donations is unlimited - both are very generous tax measures in an international context. The basic problems of most Australian nonprofit organisations are not taxation; they are just that: nonprofit. Anybody interested in the non-governmental sector should be willing to face the question: What is an equitable tax treatment? The short-term tactic of ducking the question may not be the best or most beneficial long term strategy.
Resumo:
Models of cell invasion incorporating directed cell movement up a gradient of an external substance and carrying capacity-limited proliferation give rise to travelling wave solutions. Travelling wave profiles with various shapes, including smooth monotonically decreasing, shock-fronted monotonically decreasing and shock-fronted nonmonotone shapes, have been reported previously in the literature. The existence of tacticallydriven shock-fronted nonmonotone travelling wave solutions is analysed for the first time. We develop a necessary condition for nonmonotone shock-fronted solutions. This condition shows that some of the previously reported shock-fronted nonmonotone solutions are genuine while others are a consequence of numerical error. Our results demonstrate that, for certain conditions, travelling wave solutions can be either smooth and monotone, smooth and nonmonotone or discontinuous and nonmonotone. These different shapes correspond to different invasion speeds. A necessary and sufficient condition for the travelling wave with minimum wave speed to be nonmonotone is presented. Several common forms of the tactic sensitivity function have the potential to satisfy the newly developed condition for nonmonotone shock-fronted solutions developed in this work.
Resumo:
In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.
Resumo:
More than 14 million Dish Network subscribers have been without Breaking Bad, Mad Men, and The Walking Dead since June when the satellite provider pulled AMC Networks—AMC, Sundance, IFC, and WE tv—from its lineup in a dispute over carriage fees. The tactic is called a blackout, and it’s becoming increasingly common in the television landscape as pay-TV operators and station owners battle over the nearly $5 billion at stake in the next 5 years.