36 resultados para Harding, Warren G. (Warren Gamaliel), 1865-1923

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of this thesis, as set out in the Introduction, is to assess the (seminal) significance of Troeltsch as one who set the agenda for twentieth century theology, particularly modern sociopolitical theology, and whose thought still has a special relevance. The first main chapter deals with the implications of the philosophy of history for theology. The Protestant theological orthodoxy of Troeltsch's time was essential ahistorical: he thought this to be untenable. Theology had to come to terms with the historical method, which was ‘a leaven which transforms everything, and finally bursts all previous forms of theological method.’ This chapter discusses Troeltsch's work concerning the principles, the cultural matrix, and the philosophy of history. The second main chapter examines another main concern of Troeltsch, namely, the status of Christianity vis-a-vis other religions. The background to this was the increasing awareness of the existence of other religions and the question of relativity and universality which this posed. Troeltschfs major response was Die Absolutheit des Christentums in which the ideas of essence, Europeanism, and absolutism were discussed, The third, and longest, chapter looks at the impact of social theory on theology. Sociology gave Troeltsch ‘a new way of seeing things’, and this new perspective is to be seen pre-eminently in The Social Teaching of the Christian Churches. Discussion of this centres on the three main concepts that Troeltsch delineated, compromise, natural law, and church/sect typology.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Two Socceroos in close-quarter action for their clubs. Charlie Yankos (left) and Warren Spink (right), c.1980s.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Physical activity is ranked second in importance only to tobacco control in health promotion and disease prevention in Australia. Individuals can be active in many ways every day, including –walking to and/or from school, work and other places of interest; participating in sports clubs; going to the YMCA or community leisure centre where you can be active through gyms, group fitness classes or in the swimming pool; visiting local parks and walking trails, and even at home and in the backyard. You can always find ways to be active in the community.

Promoting physical activity to young people is important for developing healthy lifestyles now and maintaining them for the future. A physically active lifestyle can be of benefit to physical, mental and social health. Despite these benefits, adolescent girls and young women are considerably less active than their male counterparts, and sport participation decreases dramatically among girls during their secondary school years. Many physical education teachers have also expressed concern about girls minimising their participation in school physical education. Consequently, it is timely that a project such as Triple G Girls Get Going in Tennis, in Football, and at the YMCA’ should be developed and implemented in an effort to arrest the decline in girls’ participation in sport, physical activity and physical education.

The Triple G program aims to develop, implement and evaluate a program to promote participation in physical activity by girls in rural and regional schools and communities. The impact of the Triple G program on the mental and physical wellbeing of the girls will also be evaluated. The program specifically aims to create school and community linkages through the introduction of tennis coaches, football coaches, and YMCA instructors into the physical education class to team teach with physical education staff during the 2011 school year. As part of the school-based program, Year 7 – 9 girls will participate in a YMCA unit and one of tennis or football during their physical education classes (6 sessions x 100mins each). Each unit is then followed by an eight week afterschool program at the local tennis or football club, or YMCA centre.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objective: This study investigated young women’s perceptions of the feasibility of physical activity and healthy eating behaviours, and how these vary by socioeconomic status, domestic characteristics and weight status. Design: This population-based study used a mailed questionnaire to investigate perceptions of the feasibility of commonly recommended healthy eating and physical activity behaviours among a sample of young women. The feasibility of 29 physical activity behaviours (e.g. relating to frequency, intensity, duration, domain/setting) and 15 healthy eating behaviours (e.g. relating to location/setting, fruit and vegetable intake, fat/sugar intake) was assessed. Height, weight and sociodemographic details were also obtained. Setting: Nation-wide community-based survey. Subjects: A total of 445 women aged 18–32 years selected randomly from the Australian electoral roll. Results: Most women reported that they either were already engaged in many of the healthy eating behaviours or saw these as highly feasible. Many physical activity behaviours, on the other hand, were perceived as less feasible, particularly among women with children and women who were overweight. Conclusions: Health promotion messages and strategies aimed at increasing physical activity and healthy eating are unlikely to succeed unless they take into account perceptions that these behaviours are not feasible. For young women, this may involve promoting more time-effective, flexible ways of achieving recommended physical activity. Messages specifically targeted to women with children, and women who are overweight, are required.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In an environment where commercial software is continually patched to correct security flaws, penetration testing can provide organisations with a realistic assessment of their security posture. Penetration testing uses the same principles as criminal hackers to penetrate corporate networks and thereby verify the presence of software vulnerabilities. Network administrators can use the results of a penetration test to correct flaws and improve overall security. The use of hacking techniques, however, raises several ethical questions that centre on the integrity of the tester to maintain professional distance and uphold the profession. This paper discusses the ethics of penetration testing and presents our conceptual model and revised taxonomy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Reasons for the adoption of smart cards and biometric authentication mechanisms have been discussed in the past, yet many organisations are still resorting to traditional methods of authentication. Passwords possess several encumbrances not the least of which includes the difficulty some users have in remembering them. Often users inadvertently write difficult passwords down near the workstation, which negates any security password authentication, may provide and opens the floodgates to identity theft. In the current mainstream authentication paradigm, system administrators must ensure all users are educated on the need for a password policy, and implement it strictly. This paper discusses a conceptual framework for an alternative authentication paradigm. The framework attempts to reduce complexity for the user as well as increase security at the network and application levels.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In an environment where commercial software is continually patched to correct security flaws, penetration testing can provide organisations with a realistic assessment of their security posture. Penetration testing uses the same principles as criminal hackers to penetrate corporate networks and thereby verify the presence of software vulnerabilities. Network administrators can use the results of a penetration test to correct flaws and improve overall security. The use of hacking techniques, however, raises several ethical questions that centre on the integrity of the tester to maintain professional distance and uphold the profession. This paper discusses the ethics of penetration testing and presents our conceptual model and revised taxonomy.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Granulocyte colony-stimulating factor (G-CSF) is the major regulator of granulopoiesis and acts through binding to its specific receptor (G-CSF-R) on neutrophilic granulocytes. Previous studies of signaling from the 4 G-CSF-R cytoplasmic tyrosine residues used model cell lines that may have idiosyncratic, nonphysiological responses. This study aimed to identify specific signals transmitted by the receptor tyrosine residues in primary myeloid cells. To bypass the presence of endogenous G-CSF-R, a chimeric receptor containing the extracellular domain of the epidermal growth factor receptor in place of the entire extracellular domain of the G-CSF-R was used. A series of chimeric receptors containing tyrosine mutations to phenylalanine, either individually or collectively, was constructed and expressed in primary bone marrow cells from G-CSF-deficient mice. Proliferation and differentiation responses of receptor-expressing bone marrow cells stimulated by epidermal growth factor were measured. An increased 50% effective concentration to stimulus of the receptor Ynull mutant indicated that specific signals from tyrosine residues were required for cell proliferation, particularly at low concentrations of stimulus. Impaired responses by mutant receptors implicated G-CSF-R Y764 in cell proliferation and Y729 in granulocyte differentiation signaling. In addition, different sensitivities to ligand stimulation between mutant receptors indicated that G-CSF-R Y744 and possibly Y729 have an inhibitory role in cell proliferation. STAT activation was not affected by tyrosine mutations, whereas ERK activation appeared to depend, at least in part, on Y764. These observations have suggested novel roles for the G-CSF-R tyrosine residues in primary cells that were not observed previously in studies in cell lines.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Actor Network Theory (ANT) is explored as a useful tool in researching the intersection of English teaching and Information Communication Technologies (ICTs), to understand the complex interaction of influences, both human and non-human, that combine to achieve a particular outcome, in this case the uptake of ICTs by English teachers in an Australian school. What this means is that alongside interviewing the teachers, administrators and technical support people, recognition is given to the influence of inanimate objects such as computers, bluestone walls and curriculum documents. This constructs a more complex picture of the change process accounting both for the invisible ideology of teacher beliefs as well as the technical capacity and incapacity of machines, buildings and policies. At the heart of ANT lies the metaphor of the heterogeneous network which is made up of diverse, not simply human, materials. Often these networks become consolidated as single point actors e.g. the English curriculum, the computer laboratory, the library, which are then seen as fixed entities rather than an amalgamation of parts prone to change. ANT allows for the constituent parts to be investigated, and following Bruno Latour's Aramis, (1996) this can be done creatively by literally giving voice to inanimate objects such as computers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research begins by examining the foundation issues of content censorship from a literary perspective and then proceeds in comparison to discuss the issues of online content appropriateness and whether the same censorship principles of literature are transitional to the online world. Currently, uncertainty exists in how to tackle this issue as there appears to be a lack of formal rules or suggested guidelines applied to the content appropriateness, management and availability of online material. Therefore, where does the onus of online content censorship exist in this medium? Or is it left to the ethical and moral standards of the material source/creator, online access provider or the cultural ethics of the wider community to adjudicate?