169 resultados para The Internet


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Posttraumatic stress disorder (PTSD) is a debilitating mental health condition frequently associated with psychiatric comorbidity and diminished quality of life, and it typically follows a chronic, often lifelong, course. Previous research has shown that trauma‐related psychopathology (but not necessarily clinical PTSD) can be effectively treated via the Internet. This study is the first of its kind to report on the online treatment of patients with a Diagnostic and Statistical Manual of Mental Disorders (fourth edition) clinical diagnosis of PTSD with therapist support by e‐mail only. Preliminary findings are presented of an open trial involving a 10‐week Internet‐based therapist‐assisted cognitive behavioural treatment for PTSD (PTSD Online). Pre and posttreatment measures of PTSD and related symptomatology were compared for 16 participants with a variety of trauma experiences. Participants showed clinically significant reductions in PTSD severity and symptomatology, moderate tolerance of the program content, and high therapeutic alliance ratings. No significant change was found on measures of more general psychological symptoms. The results suggest that PTSD Online appears to be an effective and accessible clinical treatment for people with a confirmed PTSD diagnosis.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Mobile applications (in short: mobile apps) are software applications designed to run on mobile devices such as smart phones and tablet computers. These technologies have come a long way since the opening of the Apple App Store in 2008, especially in their applications for business, information, communication, health and gaming. Most mobile devices are capable of processing and disseminating information in an efficient way. Smart devices, such as the iPhone or iPad, are equipped with innovative functionalities and unique features for easy delivery of content, information sharing, and collaborative work over the Internet. This is the basis for the use of these technologies in the education industry.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Increasingly, web applications are being developed over the Internet. Securing these web applications is becoming important as they hold critical security features. However, cybercriminals are becoming smarter by developing a crime toolkit, and employing sophisticated techniques to evade detection. These crime toolkits can be used by any person to target Internet users. In this paper, we explore the techniques used in crime toolkits. We present a current state-of-the-art analysis of crime toolkits and focus on attacks against web applications. The crime toolkit techniques are compared with the vulnerability of web applications to help reveal particular behaviour such as popular web application vulnerabilities that malicious writers prefer. In addition, we outline the existing protection mechanism, and observe that the possibility for damage is rising, particularly as specialization and scale increase in cybercrime.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Lawyers and fans of legal drama will recognise the phrase “the truth, the whole truth and nothing but the truth”. But relevance is also required. In a different context, students often mistakenly believe that quantity of truth will compensate for any deficiencies in quality and relevance.

The curricula of the various Australian jurisdictions, and the National Curriculum, encourage students to conduct research on the Internet. There is a wealth of good information on the Internet; there is also a lot of poor information. Students should learn to interrogate sources to discover if the author has expert knowledge in that area, and if the publisher or website has any quality assurance protocols.

Correctness and quantity of information does not compensate for deficiencies in quality and relevance. Useful scientific information has appropriate precision, accuracy and conciseness.

The Internet gives access to databases, to vast amounts of information, to primary and second-hand data, and to summaries and analyses of information. Nobel Laureate Linus Pauling often said that the use of computers is not a substitute for thinking, and the same is true of the Internet. Teachers will always be needed to guide students on the appropriate use of learning tools on the journey of discovery that we call education.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Background Voluntary home quarantine of cases and close contacts was the main non-pharmaceutical intervention used to limit transmission of pandemic (H1N1) 2009 influenza (pH1N1) in the initial response to the outbreak of the disease in Australia. The effectiveness of voluntary quarantine logically depends on affected families having a clear understanding of what they are being asked to do. Information may come from many sources, including the media, health officials, family and friends, schools, and health professionals. We report the extent to which families who entered home quarantine received and used information on what they were supposed to do. Specifically, we outline their sources of information; the perceived usefulness of each source; and associations between understanding of recommendations and compliance. Methods Cross-sectional survey administered via the internet and computer assisted telephone interview to families whose school children were recommended to go into home quarantine because they were diagnosed with H1N1 or were a close contact of a case. The sample included 314 of 1157 potentially eligible households (27% response rate) from 33 schools in metropolitan Melbourne. Adjusting for clustering within schools, we describe self-reported 'understanding of what they were meant to do during the quarantine period'; source of information (e.g. health department) and usefulness of information. Using logistic regression we examine whether compliance with quarantine recommendations was associated with understanding and the type of information source used. Results Ninety per cent understood what they were meant to do during the quarantine period with levels of understanding higher in households with cases (98%, 95% CI 93%-99% vs 88%, 95% CI 84%-91%, P = 0.006). Over 87% of parents received information about quarantine from the school, 63% from the health department and 44% from the media. 53% of households were fully compliant and there was increased compliance in households that reported that they understood what they were meant to do (Odds Ratio 2.27, 95% CI 1.35-3.80). Conclusions It is critical that public health officials work closely with other government departments and media to provide clear, consistent and simple information about what to do during quarantine as high levels of understanding will maximise compliance in the quarantined population.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The present study on politeness is an attempt to examine (dis)agreeing strategies utilized by EFL learners while chatting on the internet. Subjects of the study were forty male and thirty-three female Iranian natives whose internet relay chat (IRC) interactions, composed of 400 excerpts, were collected between December 2007 and September 2008. Data analysis was based on the general taxonomy of politeness strategies suggested by Brown and Levinson (1987) which is the baseline of many politeness studies today. The results indicate that IRC is a mode of communication whose characteristics are typically different from face-to-face and real-life conversational settings. Some common face threatening acts (FTAs) like ‘direct disagreements’ are performed widely in chat channels. Furthermore, gender-oriented differences were found not to be statistically significant on the internet.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Surfing on the Internet 2.0 revolution, Patani 2.0 has allowed Patani neojihadist militants to access new competitive spaces and create their own imagined online community by penetrating new realms of the Internet. This article discusses the use of new media militant propaganda by Patani militants and how it is Janus faced. It further examines how the Patani 2.0 social interaction enabled by social media such as YouTube leads to group cohesion among certain actors and the formation of a collective identity that is clustered around the notions of Muslim victimization and defensive jihad; and how, at the same time, it reinforces antithetical identities and fosters group identity competition, where one religious group is often pitted against another. As a result, the Janus effect of Patani neojihadist YouTube online propaganda, while it primarily seeks to radicalize, also generates a reactionary, often virulent, anti-Muslim response from the movement's critics.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Wang Nima launched baozoumanhua.com in 2008 to introduce rage comics (baozou manhua) to China after noticing its popularity in the USA. The emergence of baozou manhua signifies a new form of expression for ordinary netizens where they move from simply being consumers of comics to producers, combining image and text in a humorous way and distributing them via a wide variety of communication tools. This paper examines how the genre of baozou manhua enables Chinese netizens to vent about their everyday experiences and frustrations of daily life. It also explores how computer software technology and the Internet have influenced contemporary Chinese visual humour by focusing on the baozoumanhua.com Internet community. Although baozou manhua is an Internet phenomenon emerging from the specific sociopolitical context of contemporary China, examining this form of expression not only sheds light on popular online culture in China and the issues Chinese netizens grapple with but also provides an understanding of how digital visual culture changes across time and space as North American rage faces circulate around the world and garner new meaning after being appropriated and reinterpreted in the ‘interpretative community’ of Chinese cyberspace.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Radio-frequency identification (RFID) is seen as one of the requirements for the implementation of the Internet-of-Things (IoT). However, an RFID system has to be equipped with a holistic security framework for a secure and scalable operation. Although much work has been done to provide privacy and anonymity, little focus has been given to performance, scalability and customizability issues to support robust implementation of IoT. Also, existing protocols suffer from a number of deficiencies such as insecure or inefficient identification techniques, throughput delay and inadaptability. In this paper, we propose a novel identification technique based on a hybrid approach (group-based approach and collaborative approach) and security check handoff (SCH) for RFID systems with mobility. The proposed protocol provides customizability and adaptability as well as ensuring the secure and scalable deployment of an RFID system to support a robust distributed structure such as the IoT. The protocol has an extra fold of protection against malware using an incorporated malware detection technique. We evaluated the protocol using a randomness battery test and the results show that the protocol offers better security, scalability and customizability than the existing protocols. © 2014 Elsevier B.V. All rights reserved.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Around one billion people access the Internet using their mobile phones today, and many of the mobile phones are prone to be compromised by hackers due to their inherited vulnerability. It is critical to identify these compromised mobile phones to effectively eliminate cyber attacks. However, we see few research works in the field. In order to address this desperate situation, we design a practical traceback framework to identify active compromised mobiles in the mobile Internet environment in this letter. In the proposed framework, we creatively use the IMEI number of mobile hardware as unique marks for the traceback purpose. Two-layer traceback tables are designed to collect global attack information and identify local attacking bots, respectively. Our analysis and simulation demonstrate that the proposed traceback method is effective and feasible, and it can identify every possible attacking mobile in the current mobile Internet environment with single packet marking.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Purpose – Over the last 20 years, food banks in Australia have expanded nationwide and are a well-organised “industry” operating as a third tier of the emergency food relief system. The purpose of this paper is to overview the expansion and operation of food banks as an additional self-perpetuating “tier” in the response to hunger.

Design/methodology/approach – This paper draws on secondary data sourced from the internet; as well as information provided by Foodbank Australia and Food Bank South Australia (known as Food Bank SA) to outline the history, development and operation of food banks. Food banking is then critically analysed by examining the nature and framing of the social problems and policies that food banking seeks to address. This critique challenges the dominant intellectual paradigm that focuses on
solving problems; rather it questions how problem representation may imply certain understandings.

Findings – The issue of food banks is framed as one of food re-distribution and feeding hungry people; however, the paper argue that “the problem” underpinning the food bank industry is one of maintaining food system efficiency. Food banks continue as a neo-liberal mechanism to deflect query, debate and structural action on food poverty and hunger. Consequently their existence does little to ameliorate the problem of food poverty.

Practical implications – New approaches and partnerships with stakeholders remain key challenges for food banks to work more effectively to address food poverty.

Social implications – While the food bank industry remains the dominant solution to food poverty in Australia, debate will be deflected from the underlying structural causes of hunger.

Originality/value – This paper contributes to the limited academic literature and minimal critique of the food bank industry in Australia. It proposes that the rapid expansion of food banks is a salient marker of government and policy failure to address food poverty.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

With the arrival of big data era, the Internet traffic is growing exponentially. A wide variety of applications arise on the Internet and traffic classification is introduced to help people manage the massive applications on the Internet for security monitoring and quality of service purposes. A large number of Machine Learning (ML) algorithms are introduced to deal with traffic classification. A significant challenge to the classification performance comes from imbalanced distribution of data in traffic classification system. In this paper, we proposed an Optimised Distance-based Nearest Neighbor (ODNN), which has the capability of improving the classification performance of imbalanced traffic data. We analyzed the proposed ODNN approach and its performance benefit from both theoretical and empirical perspectives. A large number of experiments were implemented on the real-world traffic dataset. The results show that the performance of “small classes” can be improved significantly even only with small number of training data and the performance of “large classes” remains stable.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Purpose – The purpose of this study is to explore Australian public and stakeholders views towards the regulation of the Internet and its content. The federal government called for submissions addressing their proposal, and this paper analyses these submissions for themes and provides clarity as to the Australian public and stakeholders key concerns in regards to the proposed policy. Design/methodology/approach – The paper uses a qualitative approach to analyse the public consultations to the Australian Federal Government. These documents are coded and analysed to determine negative and positive viewpoints. Findings – The research has shown, based upon the analysis of the consultation, that there was no public support for any of the measures put forward, that the Australian Federal Government in its response has not recognised this public feedback and instead has only utilised some of the qualitative feedback obtained through the public consultation process to try to justify its case to proceed with its proposals. Research limitations/implications – The study is focussed on Australia. Practical implications – The paper analyses a proposed national approach to filtering the content of the Internet and discussed the public reaction to such an approach. Social implications – The paper looks at how different parts of Australian society view Internet filtering in a positive or negative manner. Originality/value – The only study that directly looks at the viewpoint of the Australian public.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

With the advent of Web 2.0 tools such as Weblogs (blogs), lay people can more easily share knowledge with the public and have far greater reach and impact. At the same time a literature review reveals that experts have been criticised on many fronts. This paper explores key criticisms of experts using 1) a literature review and 2) an interpretive study of lay blogger perceptions of experts. The paper provides important insights into lay blogger criticisms of experts. Findings indicate that a major lay blogger criticism of experts is class-based and powerbased. Experts are perceived as elitists who wish to control the flow of knowledge. Interestingly, many of the lay bloggers studied held mixed feelings about experts and the value of lay knowledge on the internet. Implications for theory and practice are discussed. © 2009 Sharman Lichtenstein.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

As the new millennium approaches, we are living in a society that is increasingly dependent upon information technology. However, whilst technology can deliver a number of benefits, it also introduces new vulnerabilities that can be exploited by persons with the necessary technical skills. Hackers represent a well-known threat in this respect and are responsible for a significant degree of disruption and damage to information systems. However, they are not the only criminal element that has to be taken into consideration. Evidence suggests that technology is increasingly seen as potential tool for terrorist organizations. This is leading to the emergence of a new threat in the form of 'cyber terrorists', who attack technological infrastructures such as the Internet in order to help further their cause. The paper discusses the problems posed by these groups and considers the nature of the responses necessary to preserve the future security of our society.