77 resultados para Tactics


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this thesis we descend into the swampy lowlands to meet with student-teachers and their supervisors and observe them working together at different sites across the Top End of Australia. In the process we discover the multiple relationships that comprise the practicum text and the discomforting untidiness and unwieldiness, as well as the awkwardness of complexity, which surrounds research into supervisory practice. The thesis demonstrates the need to attend to the subjectivities of the participants and highlights the conflicting attitudes, beliefs, interests, and desires which are only partially realised or understood. It moves us beyond language to the sentient world of anger, love, disgust, hope, fear, despair, joy, anguish, and pain and we become immersed in a murky, incoherent, interior world of hints, shadows, and unfamiliar sounds, a world of lost innocence and conflict in which knowledge is truly embodied. Encompassing a view of supervision as moral praxis, particular attention was given to the care and protection of the self and a romanticist conception of the self was seen to predominate. The thesis demonstrates the part played by positioning and agency in the process of subjectification, the importance of emotional and relational bonding in the emergence of collegiality, the tactics of power employed by supervisors, the struggle for personal autonomy, the presence of anxiety induced by failure to pro vide feedback, the inculcation of guilt, and the complex interplay of age-related and gender effects. Attention is also given to the degree to which supervisors adopt reflective and constructivist approaches to their work. The stories reveal that supervision is much more than advising student-teachers on curriculum content, resource availability and lesson presentation. It is a process of interiority in which supervisors may need to provide emotional support in the face of displacement and disorientation, and assume the role of an abiding presence, someone capable of imaginative introjection, someone who ‘knows’. Particular attention is paid to the language of supervision which was marked by indirection, diffidence, imprecision, irony, and understatement. At the same time, the agonistic nature of language associated with the politics of the personal is made apparent. Whilst in the opinion of Liaison Lecturers, context-of-site did not appear to matter as far as acquiring teaching competence was concerned, the failure to attend to context-of-site affected how student-teachers engaged with difference and diversity. In spite of attempts to contest the myths of Aboriginal education and interrupt the discourse of impoverishment, colonialist attitudes and resistance to liberatory education persisted. The thesis ends with suggestions for alternatives to the traditional practicum and discusses the introduction of Field-Based Teacher Education into Northern Territory schools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dramatic changes in the information security risk landscape over several decades have not yet been matched by similar changes in organizational information security which is still mainly based on a mindset that security is achieved through extensive preventive controls. As a result, maintenance cost of information security is increasing rapidly, but this increased expenditure has not really made an attack more difficult. The opposite seems to be true, information security attacks have become easier to perpetrate and appear more like information warfare tactics. At the same time, the damage caused by a successful attack has increased significantly and may sometimes become critical to an organization. In this paper we evaluate one particular extremely asymmetric risk where a strongly motivated attacker unleashes a prolonged attack on an organization with the aim to do maximum damage, and suggest that the probability of such an attack is increasing. We discuss how preventive controls are unlikely to ever be effective against such an attack and propose more advanced strategies that aim to limit the damage when such an attack occurs. One crucial lesson to be learned for those organizations that are dependant on their information security, such as critical infrastructure organizations, is the need to deny motivated attackers access to any information about the success of their attack. Successful deception in this area is likely to significantly reduce any potential escalation of the incident.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Consistent with FIFA president Sepp Blatter’s proclamation that the future of football is female, the Australian Football League (AFL) has instituted a range of initiatives in an attempt to present a ‘female friendly’ face and garner women’s support for the national game. Given the large number of women who follow the AFL, especially in comparison to other football codes nationally, it’s worth considering the motivations behind the AFL’s tactics. To what extent does what the AFL think women want correlate with women supporters’ experiences and realities of being a football fan? This paper presents findings from semi-structured and focus group interviews with female AFL fans to gauge their perceptions of being an Australian rules football supporter and its impact on their lived experiences and sense of self. The responses of women supporters are critically assessed in order to contemplate how women negotiate gender identity through their support of a male dominated sport. As well as offering insights into the role gender plays in leisure pursuits such as sport spectatorship, this paper considers how femininity and masculinity might be contested and/or remade through the practice of following football in the Australian context. By demonstrating the range and diversity of women’s experiences, this research has the capacity to generate alternative imaginings of fanship and sporting community beyond gender stereotypes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Examining the background, training and conduct of Australian Second World War battalion commanders, this thesis rejects the notion of a single Australian command style. Rather, it shows command practice was a product of the interaction between terrain, tactics, technology and training, and that increasing professionalisation was central to battlefield success.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anecdotal evidence suggests that service guarantees and personal requests by service workers encourage customers to voice following failure. However, empirical support for these tactics in facilitating complaints to the organisation is limited. To address this deficiency, a 3 (guarantee treatment: none, unconditional or combined) x 2 (personal request to voice: yes or no) x 2 (failure severity: minor or major) full factorial, between subjects experiment was conducted in a restaurant context. Findings suggest that offering a service guarantee, regardless of whether it is unconditional or combined, can encourage voice. Severity of the failure was also found to be associated with voice. Surprisingly, however, a personal request to voice was not related to customers’ voice intentions. Implications of the findings are discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Spam is commonly known as unsolicited or unwanted email messages in the Internet causing potential threat to Internet Security. Users spend a valuable amount of time deleting spam emails. More importantly, ever increasing spam emails occupy server storage space and consume network bandwidth. Keyword-based spam email filtering strategies will eventually be less successful to model spammer behavior as the spammer constantly changes their tricks to circumvent these filters. The evasive tactics that the spammer uses are patterns and these patterns can be modeled to combat spam. This paper investigates the possibilities of modeling spammer behavioral patterns by well-known classification algorithms such as Naïve Bayesian classifier (Naive Bayes), Decision Tree Induction (DTI) and Support Vector Machines (SVMs). Preliminary experimental results demonstrate a promising detection rate of around 92%, which is considerably an enhancement of performance compared to similar spammer behavior modeling research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper re-examines the relationship between affect and effect, discussing them as research values that have emerged from the life sciences, the arts and philosophy and, more importantly, considering them as systems of relations underpinning experiential orientation by which to initiate change and hold the world in place. The notion of æffect may be defined as the continuous measure performed upon the systems of affect/effect and reapplied to events and things. Æffect is a coordinated system of cognition where concurrent measures impact on each other. In doing so, they specify perception and action on multiple registers and scales of events. It is important to recognise that the functioning of affective and effective systems in the body allows, and even requires, paradoxical logics to coexist and be deployed as processes that shape the organism-person-environment. Discussion of selected works from Arakawa and Gins will supply examples of tactics that combine built environments with discursive constraints to guide embodied attention. The practice of embodied cognition dilates the thresholds separating the organism from person and the person from environment, and moves towards an atmospheric intricateness (Arakawa and Gins 2003a:25) that may become the blocs of a new materialism for heuristic life.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper suggests ways in which art processes may contribute to the interdisciplinary study of perception and action and the relationships between body, person, and environment. Artists-turned-architects Arakawa and Gins serve as the most advanced example of an interdisciplinary research project in terms of coordinating material processes with contemporary findings, methods, and orientations from across the arts, humanities, and hard and soft sciences. In the first section of the paper, I discuss Arakawa and Gins's Reversible Destiny Lofts at Mitaka as an example of their procedural approach to long-term sustainable experimental environments. In the second section, the tactics through which Arakawa and Gins have repositioned art for the nonart purposes and common research goals are posited. Finally, I briefly outline the disciplinary positions and research values needed in order to move toward a more inclusive and interdisciplinary research practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Propagation of Peer-to-Peer (P2P) worms in the Internet is posing a serious challenge to network security research because of P2P worms' increasing complexity and sophistication. Due to the complexity of the problem, no existing work has solved the problem of modeling the propagation of P2P worms, especially when quarantine of peers is enforced. This paper presents a study on modeling the propagation of P2P worms. It also presents our applications of the proposed approach in worm propagation research.

Motivated by our aspiration to invent an easy-to-employ instrument for worm propagation research, the proposed approach models the propagation processes of P2P worms by difference equations of a logic matrix, which are essentially discrete-time deterministic propagation models of P2P worms. To the best of our knowledge, we are the first using a logic matrix in network security research in general and worm propagation modeling in particular.

Our major contributions in this paper are firstly, we propose a novel logic matrix approach to modeling the propagation of P2P worms under three different conditions; secondly, we find the impacts of two different topologies on a P2P worm's attack performance; thirdly, we find the impacts of the network-related characteristics on a P2P worm's attack performance in structured P2P networks; and fourthly, we find the impacts of the two different quarantine tactics on the propagation characteristics of P2P worms in unstructured P2P networks. The approach's ease of employment, which is demonstrated by its applications in our simulation experiments, makes it an attractive instrument to conduct worm propagation research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In some mating systems males should benefit from mating with virgin females because of their higher reproductive value. We determined experimentally whether and how males distinguish between virgin and recently mated females in the guppy, Poecilia reticulata, a promiscuous livebearer. In a free-swimming experiment, males showed flexible mating behaviour by adjusting their tactics according to the mating status of the female they encountered, virgin or mated. Males followed, nipped and copulated with virgins more than with mated females, but they performed more sneaky copulations with mated females, possibly because the latter were more reluctant to mate than virgin females. When, in another set of experiments, males received only the visual cues of both virgins and mated females they showed no preference for either, but when they were exposed only to the female olfactory cues, they associated considerably more with the smell of virgin females. These results suggest that male guppies assess female behavioural and olfactory cues to determine female virginity and then use different mating tactics depending on the female's status. It is possible that the changes in male mating behaviour increase male reproductive success.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Locating potential mates is critical to mating. We studied males’ association with females and mate-searching patterns in the guppy, Poecilia reticulata, a promiscuous live-bearer. In the field, we examined whether male guppies respond differently to a shoal of conspecific fish based on the members of the shoal. We found that more males were attracted to shoals that contained receptive females than to shoals of nonreceptive females or males. We also conducted laboratory experiments to investigate how males use olfactory cues of nonreceptive and receptive females to search for and associate with females. We gave males the option to associate with nonreceptive females when olfactory cues of receptive or nonreceptive females were present and absent, and when olfactory cues were presented alone. Males associated with females most strongly when both cues were presented simultaneously, but when cues were presented separately males’ association with females differed with respect to the olfactory cues that were added. Males associated with females equally with visual and olfactory cues presented separately when the odour cues were from receptive females. However, when the odour cues were from nonreceptive females, males associated with females less with olfactory than visual cues. Searching activity increased when males had access only to olfactory cues. Taken together these results suggest that olfactory cues influence males’ association with females and searching behaviour, and these changes in behaviour are likely to maximize a male’s opportunity to encounter receptive females.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study empirically examines the social capital that facilitates the flow of export knowledge, thereby supporting the entrepreneurial stance of small export firms. By applying the VRIO (value, rarity, inimitability and organisation of firm resources) framework to the resource-based view (RBV) of the firm, this study suggests that superior performance is a function of resources that are valuable, rare, inimitable and sufficiently organised to develop and sustain the firm's competitive advantage. This study argues that small, resource-constrained export firms in a developing economy are able to adopt entrepreneurial tactics and reap positive rates of return by exploiting their relational capital to acquire export knowledge. A survey of 175 small export firms in the Philippines was conducted, and the data were analysed using structural equation modelling. The results suggest positive relationships between the firm's social capital and export knowledge. Export knowledge is associated with entrepreneurial orientation, which then correlates with export performance.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Active Peer-to-Peer worms are great threat to the network security since they can propagate in automated ways and flood the Internet within a very short duration. Modeling a propagation process can help us to devise effective strategies against a worm's spread. This paper presents a study on modeling a worm's propagation probability in a P2P overlay network and proposes an optimized patch strategy for defenders. Firstly, we present a probability matrix model to construct the propagation of P2P worms. Our model involves three indispensible aspects for propagation: infected state, vulnerability distribution and patch strategy. Based on a fully connected graph, our comprehensive model is highly suited for real world cases like Code Red II. Finally, by inspecting the propagation procedure, we propose four basic tactics for defense of P2P botnets. The rationale is exposed by our simulated experiments and the results show these tactics are of effective and have considerable worth in being applied in real-world networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Since Jacqueline Rose published The Case of Peter Pan in 1984, scholars in the field of children’s literature have taken up a rhetorical stance which treats child readers as colonised, and children’s books as a colonising site. This article takes issue with Rose’s rhetoric of colonisation and its deployment by scholars, arguing that it is tainted by logical and ethical flaws. Rather, children’s literature can be a site of decolonisation which revisions the hierarchies of value promoted through colonisation and its aftermath by adopting what Bill Ashcroft refers to as tactics of interpolation. To illustrate how decolonising strategies work in children’s texts, the article considers several alphabet books by Indigenous author-illustrators from Canada and Australia, arguing that these texts for very young children interpolate colonial discourses by valorising minority languages and by attributing to English words meanings produced within Indigenous cultures.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Study guide for a marketing unit at TAFE