19 resultados para schema
Resumo:
Email is an important form of asynchronous communication. Visualizing analyses of email communication patterns during a collaborative activity help us better understand the nature of collaboration, and identify the key players. By analysing the contents of email communication and adding reflective comments on its perceived importance from the participants of a collaboration new information can be gleaned not immediately obvious in its original flat form. This paper outlines a proof-of-concept prototype collaborative email visualisation schema. Data from a collaboration case study is analysed and subsequently employed to construct a display of the relative impact of both key players and the types of email used.
Resumo:
The part-of or part-whole construct is a fundamental element of many conceptual modeling grammars that is used to associate one thing (a component) with another thing (a composite). Substantive theoretical issues surrounding the part-whole construct remain to be resolved, however. For instance, contrary to widespread claims, the relationship between components and composites is not always transitive. Moreover, how the partwhole construct should be represented in a conceptual schema diagram remains a contentious issue. Some analysts argue composites should be represented as a relationship or association. Others argue they should be represented as an entity. In this paper we use an ontological theory to support our arguments that composites should be represented as entities and not relationships or associations. We also describe an experiment that we undertook to test whether representing composites as relationships or entities enables users to understand a domain better. Our results support our arguments that using entities to represent composites enables users to better understand a domain.
Resumo:
Security protocols are often modelled at a high level of abstraction, potentially overlooking implementation-dependent vulnerabilities. Here we use the Z specification language's rich set of data structures to formally model potentially ambiguous messages that may be exploited in a 'type flaw' attack. We then show how to formally verify whether or not such an attack is actually possible in a particular protocol using Z's schema calculus.
Resumo:
Empathic engagement by the trauma therapist with another person's traumatic experiences is believed to create risks for the helping professional. Much attention has been focused upon the mental health professional experiencing symptoms of distress as a result of their exposure to the material of clients who survive traumatic incidents. This thesis contains the findings of a qualitative study that centres on a group of male mental health professionals and their experiences of exposure to the trauma material of survivor clients. The participants of the study practise within an internal Employee Assistance Program that provides, among other duties, a 24 hour, 7 day response to critical incidents to a heavy transport industry. Using semi-structured, in-depth interviews, the effects on the trauma therapists are explored by analysing their reactions to their survivor clients' accounts, the impact of these experiences upon their psychological schema, the organisational culture in which they practise and its influence upon their experiences and the methods participants use to cope with the psychological effects of exposure to trauma material. Participants' experiences are closely examined for critical comparisons with vicarious traumatization. Therapists' responses reveal their continued ability and motivation to empathically engage with the trauma material of survivor clients despite the potential risks.