492 resultados para communications issues
em Queensland University of Technology - ePrints Archive
Resumo:
Many educators are currently interested in using computer-mediated communications (CMCs) to support learning and creative practice. In my work I have been looking at how we might create drama through using cyberspaces, working with teachers and students in secondary school contexts. In trying to understand issues that have arisen and ways of working with the data I have found a number of frameworks helpful for analysing the online interactions. These frameworks draw from O'Toole's work on contexts negotiated in the creation of drama and other frameworks drawn from Wertsch, Bakhtin and Vygotsky's work on speech utterances, dialogic processes and internalisation of learning. The contexts and factors which must be negotiated in online communications within learning contexts are quite complex and educators may need to provide parameters and protocols to ensure appropriate languages, genres and utterances are utilised. The paper explores some of the types of languages, genres and utterances that emerged from a co-curricula drama project and issues that arose, including the importance of establishing processes for giving and receiving critical feedback This paper is of relevance to those whose research strategies may involve the use of computer-mediated communications as well as those utilising cyberspaces in educational contexts.
Resumo:
Advances in information and communications technologies during the last two decades have allowed organisations to capture and utilise data on a vast scale, thus heightening the importance of adequate measures for protecting unauthorised disclosure of personal information. In this respect, data breach notification has emerged as an issue of increasing importance throughout the world. It has been the subject of law reform in the United States and in other international jurisdictions. Following the Australian Law Reform Commission’s review of privacy, data breach notification will soon be addressed in Australia. This article provides a review of US and Australian legal initiatives regarding the notification of data breaches. The authors highlight areas of concern based on the extant US literature that require specific consideration in Australia regarding the development of an Australian legal framework for the notification of data breaches.
Resumo:
Tracking/remote monitoring systems using GNSS are a proven method to enhance the safety and security of personnel and vehicles carrying precious or hazardous cargo. While GNSS tracking appears to mitigate some of these threats, if not adequately secured, it can be a double-edged sword allowing adversaries to obtain sensitive shipment and vehicle position data to better coordinate their attacks, and to provide a false sense of security to monitoring centers. Tracking systems must be designed with the ability to perform route-compliance and thwart attacks ranging from low-level attacks such as the cutting of antenna cables to medium and high-level attacks involving radio jamming and signal / data-level simulation, especially where the goods transported have a potentially high value to terrorists. This paper discusses the use of GNSS in critical tracking applications, addressing the mitigation of GNSS security issues, augmentation systems and communication systems in order to provide highly robust and survivable tracking systems.
Advertising & Promotion : An Integrated Marketing Communications Approach, 2nd Edition [Book Review]
Resumo:
Advertising & Promotion’s second edition maintains a sharp and updated focus on the advertising industry, providing interesting ideas for both students and advertising professionals. Not only does the author demonstrate how agencies, businesses and organisations research, create and monitor particular campaigns, but also the extent to which advertising texts are themselves embedded in everyday contemporary culture. For me one of the strengths of the book is how the research brings together the managerial side of the industry, its sociology and political dynamics, with the cultural and ethical implications of advertising consumption.
Resumo:
Environmental manipulation removes students from their everyday worlds to unfamiliar worlds, to facil- itate learning. This article reports that this strategy was effective when applied in a university design unit, using the tactic of immersion in the Second Life online virtual environment. The objective was for teams of stu- dents each to design a series of modules for an orbiting space station using supplied data. The changed and futuristic environment led the students to an important but previously unconsidered design decision which they were able to address in novel ways because of, rather than in spite of, the Second Life immersion.
Resumo:
In this paper, an integrated inter-vehicles wireless communications and positioning system supporting alternate positioning techniques is proposed to meet the requirements of safety applications of Cooperative Intelligent Transportation Systems (C-ITS). Recent advances have repeatedly demonstrated that road safety problems can be to a large extent addressed via a range of technologies including wireless communications and positioning in vehicular environments. The novel communication stack utilizing a dedicated frequency spectrum (e.g. at 5.9 GHz band), known as Dedicated Short-Range Communications (DSRC), has been particularly designed for Wireless Access in Vehicular Environments (WAVE) to support safety applications in highly dynamic environments. Global Navigation Satellite Systems (GNSS) is another essential enabler to support safety on rail and roads. Although current vehicle navigation systems such as single frequency Global Positioning System (GPS) receivers can provide route guidance with 5-10 meters (road-level) position accuracy, positioning systems utilized in C-ITS must provide position solutions with lane-level and even in-lane-level accuracies based on the requirements of safety applications. This article reviews the issues and technical approaches that are involved in designing a vehicular safety communications and positioning architecture; it also provides technological solutions to further improve vehicular safety by integrating the DSRC and GNSS-based positioning technologies.
Resumo:
The most widely used introduction to the Australian media, fully updated to reflect the increasing prominence of the internet in the communication and entertainment industries. Description Traditional media are being reshaped by digital technologies. The funding model for quality journalism has been undermined by the drift of advertising online, demarcations between different forms of media are rapidly fading, and audiences have fragmented. We can catch up with our favourite TV show on a tablet, social media can be more important than mainstream radio in a crisis, and organisations large and small have become publishers in their own right on apps. Nevertheless mainstream media remain powerful. The Media and Communications in Australia offers a systematic introduction to this dynamic field. Fully updated and revised to take account of recent developments, this fourth edition outlines the key media industries and explains how communications technologies are impacting on them. It provides a thorough overview of the main approaches taken in studying the media, and includes an expanded 'issues' section with new chapters on social media, gaming, apps, the environment, media regulation, ethics and privacy. With contributions from some of Australia's best researchers and teachers in the field, The Media and Communications in Australia remains the most comprehensive and reliable introduction to media and communications available. It is an ideal student text, and a reference for teachers of media and anyone interested in this influential industry.
Resumo:
As business increasingly operates on a global basis, courts are called upon more often to adjudicate insolvency cases with international connections. The financial collapse of Lehman Brothers Holding Inc (‘Lehman Holdings’) provides a recent example where courts across many jurisdictions were called upon to determine issues arising from a multistate insolvent enterprise. Lehman Holdings filed for Chapter 11 bankruptcy protection in the United States on 15 September 2008. Lehman Brothers was the fourth largest investment bank in America and the largest company ever to file for bankruptcy in the United States. However the effects of its collapse were felt worldwide, including within Australia.
Resumo:
Nth-Dimensional Truncated Polynomial Ring (NTRU) is a lattice-based public-key cryptosystem that offers encryption and digital signature solutions. It was designed by Silverman, Hoffstein and Pipher. The NTRU cryptosystem was patented by NTRU Cryptosystems Inc. (which was later acquired by Security Innovations) and available as IEEE 1363.1 and X9.98 standards. NTRU is resistant to attacks based on Quantum computing, to which the standard RSA and ECC public-key cryptosystems are vulnerable to. In addition, NTRU has higher performance advantages over these cryptosystems. Considering this importance of NTRU, it is highly recommended to adopt NTRU as part of a cipher suite along with widely used cryptosystems for internet security protocols and applications. In this paper, we present our analytical study on the implementation of NTRU encryption scheme which serves as a guideline for security practitioners who are novice to lattice-based cryptography or even cryptography. In particular, we show some non-trivial issues that should be considered towards a secure and efficient NTRU implementation.
Resumo:
Cooperative Intelligent Transportation Systems (C-ITS) allow in-vehicle systems, and ultimately the driver, to enhance their awareness of their surroundings by enabling communication between vehicles and road infrastructure. C-ITS are widely considered as the next major step in driving assistance systems, aiming at increasing safety, comfort and mobility for drivers. However, any communicating systems are subjected to security threats. A key component for providing secure communications at a large scale is a Public Key Infrastructure (PKI). Due to the safety-critical nature of Vehicle-to-Vehicle (V2V) communications, a C-ITS PKI has functional, performance and scalability requirements that differ from traditional non-automotive environments. This paper identifies and defines the key functional and security requirements for C-ITS PKI systems and analyses proposed C-ITS PKI standards against these requirements. In particular, the proposed US and European C-ITS PKI systems are identified as being too complex and not scalable. The paper also highlights various privacy, security and scalability concerns that should be considered for a secure C-ITS PKI solution in the Australian transport landscape.
Resumo:
This chapter addresses the areas more commonly found in everyday practice (NB circuit layouts and plant breeder's rights are not covered). Importantly, IP law has become very specialised, and as such one for which practitioners will need expertise or access to relevant experts in order to properly provide advice. The following therefore is an overview only of relevant issues.
Resumo:
Communications are important for relationships within a marketing channel from both a theoretical and managerial perspective. Yet it is a problematic area for scholars. Thus, this research addresses the problem of how do customers of a financial services institution perceive communications with an ideal institution? This study's case research methodology used in-depth interviews with 34 carefully selected customers of a building society. The factors that make up customers' attitudes about corporate communications for an ideal financial services institution were identified and actual perceptions were compared against that ideal. The findings confirmed the importance of communications for customers in a relationship with a financial services provider and suggested communication priorities for customers in this context. In addition, the findings suggested sources of communication dissatisfaction for customers. These findings build upon the literature that speculates about customer perceptions of communications with organizations but provides little evidence to support hypotheses. The contributions arose from the emphasis on the customers' own attitudes and the patterns found within them.