987 resultados para Differentiating Hostile


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Over the last few decades, there has been a marked increase in media and debate surrounding a specific group of offences in modern Democratic nations which bear the brunt of the label ‘crimes against morality’. Included within this group are offences related to prostitution and pornography, homosexuality and incest and child sexual abuse. This book examines the nexus between sex, crime and morality from a theoretical perspective. This is the first academic text to offer an examination and analysis of the philosophical underpinnings of sex-related crimes and social attitudes towards them and the historical, anthropological and moral reasons for differentiating these crimes in contemporary western culture. The book is divided into three sections corresponding to three theoretical frameworks: - Part 1 examines the moral temporality of sex and taboo as a foundation for legislation governing sex crimes - Part 2 focuses on the geography of sex and deviance, specifically notions of public morality and the public private divide - Part 3 examines the moral economy of sex and harm, including the social construction of harm. Sex, Crime and Morality will be key reading for students of criminology, criminal justice, gender studies and ethics, and will also be of interest to justice professionals.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this article we identify how computational automation achieved through programming has enabled a new class of music technologies with generative music capabilities. These generative systems can have a degree of music making autonomy that impacts on our relationships with them; we suggest that this coincides with a shift in the music-equipment relationship from tool use to a partnership. This partnership relationship can occur when we use technologies that display qualities of agency. It raises questions about the kinds of skills and knowledge that are necessary to interact musically in such a partnership. These are qualities of musicianship we call eBility. In this paper we seek to define what eBility might consist of and how consideration of it might effect music education practice. The 'e' in eBility refers not only to the electronic nature of computing systems but also to the ethical, enabling, experiential and educational dimensions of the creative relationship with technologies with agency. We hope to initiate a discussion around differentiating what we term representational technologies from those with agency and begin to uncover the implications of these ideas for music educators in schools and communities. We hope also to elucidate the emergent theory and practice that has enabled the development of strategies for optimising this kind of eBility where the tool becomes partner. The identification of musical technologies with agency adds to the authors’ list of metaphors for technology use in music education that previously included tool, medium and instrument. We illustrate these ideas with examples and with data from our work with the jam2jam interactive music system. In this discussion we will outline our experiences with jam2jam as an example of a technology with agency and describe the aspects of eBility that interaction with it promotes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We examine the relationship between the effectiveness of IT steering committee-driven IT governance initiatives and firm’s IT management and IT infrastructure related capabilities. We test these relationships empirically by a field survey of 216 firms. Results of this study suggest that a firms’ effectiveness of IT steering committee-driven IT governance initiatives positively relate to the level of their IT-related capabilities. We also found positive relationships between IT-related capabilities and internal process-level performance, which positively relate to improvement in customer service and firm-level performance. For researchers, we demonstrate that the resourcebased theory provides a more robust explanation of the determinants of firms IT governance initiatives. This would be ideal in evaluating other IT governance initiatives effectiveness in relation to how they contribute to building performance-differentiating IT-related capabilities. For decision makers, we hope our study has reiterated the notion that IT governance is truly a coordinated effort, embracing all levels of human resources.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A wireless sensor network collected real-time water-quality measurements to investigate how current irrigation practices—in particular, underground water salination—affect the environment. New protocols provided high end-to-end packet delivery rates in the hostile deployment environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Organizations today make radical use of the IT resources to sustain or better their existing competitive position. One such initiative is forming alliances on a shared IT backbone with partners of their value chain. We term these alliances the collaborative organizational structures (COS). Regardless of the nature of engagement with IT resources, organizations will require unique competencies to obtain performance-differentiating value from these IT resources. In a collaborative environment, these competencies would be a result of the synergy between the alliances’ unique competences. We call these the inter-firm IT-related capabilities. The resource centric theoretical frameworks suggest a trajectory of competence development and the structure of inter-firm competencies, but does not inform on the nature of these competencies. We employ an interpretive design to suggest three inter-firm IT-related capabilities for IT-backed collaborative alliances. We discuss these capabilities in this research and suggest that their effectiveness be measured directly against the collaborative rent, and indirectly against the firm-level performance of the alliance partners. This forms a model of leveraging and evaluating value within IT-backed collaborative alliances.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Clinicians regularly face the confronting challenge of differentiating a choroidal naevus from a melanoma. Uveal naevi are a relatively common finding during routine eye examinations: a prevalence of 6.5 per cent has been reported.1 In contrast, malignant melanomata are uncommon, being found in six persons per million population, but they can have devastating implications and consequences.2 Differential diagnoses can be difficult to make with certainty; any additional information that can assist in this process is advantageous...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Decade after decade, violence against women has gained more attention from scholars, policy makers, and the general public. Social scientists in particular have contributed significant empirical and theoretical understandings to this issue. Strikingly, scant attention has focused on the victimization of women who want to leave their hostile partners. This groundbreaking work challenges the perception that rural communities are safe havens from the brutality of urban living. Identifying hidden crimes of economic blackmail and psychological mistreatment, and the complex relationship between patriarchy and abuse, Walter S. DeKeseredy and Martin D. Schwartz propose concrete and effective solutions, giving voice to women who have often suffered in silence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article is based on an analysis of narratives of 26 offenders with mental health problems living in the United Kingdom. It explores the impact of an ascribed dangerous status and the construction of the self as moral and responsible in response to this label with reference to the literature on denial, deviance disavowal and other “techniques of neutralization” and Goffman's presentation of self. Two dominant strands are identified in relation to the construction of moral self-hood: “Not my fault” and “Good at heart” narratives. “Techniques of neutralization” are widely drawn on, particularly denial of responsibility in the “Not my fault” narratives that seek to explain anti-social behavior with reference to external forces such as a hostile environment inhibiting their ability to control their lives. In contrast, “Good at heart” narratives draw on the essentially good and moral nature of the inner-self. Both are used as evidence of sharing and adhering to moral norms in order to present an acceptable and credible self.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Structural health monitoring (SHM) refers to the procedure used to assess the condition of structures so that their performance can be monitored and any damage can be detected early. Early detection of damage and appropriate retrofitting will aid in preventing failure of the structure and save money spent on maintenance or replacement and ensure the structure operates safely and efficiently during its whole intended life. Though visual inspection and other techniques such as vibration based ones are available for SHM of structures such as bridges, the use of acoustic emission (AE) technique is an attractive option and is increasing in use. AE waves are high frequency stress waves generated by rapid release of energy from localised sources within a material, such as crack initiation and growth. AE technique involves recording these waves by means of sensors attached on the surface and then analysing the signals to extract information about the nature of the source. High sensitivity to crack growth, ability to locate source, passive nature (no need to supply energy from outside, but energy from damage source itself is utilised) and possibility to perform real time monitoring (detecting crack as it occurs or grows) are some of the attractive features of AE technique. In spite of these advantages, challenges still exist in using AE technique for monitoring applications, especially in the area of analysis of recorded AE data, as large volumes of data are usually generated during monitoring. The need for effective data analysis can be linked with three main aims of monitoring: (a) accurately locating the source of damage; (b) identifying and discriminating signals from different sources of acoustic emission and (c) quantifying the level of damage of AE source for severity assessment. In AE technique, the location of the emission source is usually calculated using the times of arrival and velocities of the AE signals recorded by a number of sensors. But complications arise as AE waves can travel in a structure in a number of different modes that have different velocities and frequencies. Hence, to accurately locate a source it is necessary to identify the modes recorded by the sensors. This study has proposed and tested the use of time-frequency analysis tools such as short time Fourier transform to identify the modes and the use of the velocities of these modes to achieve very accurate results. Further, this study has explored the possibility of reducing the number of sensors needed for data capture by using the velocities of modes captured by a single sensor for source localization. A major problem in practical use of AE technique is the presence of sources of AE other than crack related, such as rubbing and impacts between different components of a structure. These spurious AE signals often mask the signals from the crack activity; hence discrimination of signals to identify the sources is very important. This work developed a model that uses different signal processing tools such as cross-correlation, magnitude squared coherence and energy distribution in different frequency bands as well as modal analysis (comparing amplitudes of identified modes) for accurately differentiating signals from different simulated AE sources. Quantification tools to assess the severity of the damage sources are highly desirable in practical applications. Though different damage quantification methods have been proposed in AE technique, not all have achieved universal approval or have been approved as suitable for all situations. The b-value analysis, which involves the study of distribution of amplitudes of AE signals, and its modified form (known as improved b-value analysis), was investigated for suitability for damage quantification purposes in ductile materials such as steel. This was found to give encouraging results for analysis of data from laboratory, thereby extending the possibility of its use for real life structures. By addressing these primary issues, it is believed that this thesis has helped improve the effectiveness of AE technique for structural health monitoring of civil infrastructures such as bridges.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The objective of this study was to identify key factors differentiating between exporters and non-exporters in the Chilean wine industry. Based on survey data collected from 61 wineries, the findings show that the main barriers for non-exporters are the lack of financial resources, limited quantities of stock for market expansion, management’s lack of knowledge and experience, and the high cost of travelling and participating in trade shows. The results also show that managers have educational levels and international experience exceeding those of other comparable New World wineries. Finally, in developing their main international markets, Chilean wineries did not target psychically close markets as identified in previous wine industry studies

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Relocated people habitually seek the familiar within their new social milieus as a means of easing their transition into ways strange and alien. However, from networks and food to everyday customs, efforts to hold on to such home comforts are often viewed with a measure of hostile disdain and regarded as preludes to the formation of ethnic enclaves. Through a pilot study on the access of satellite television by mainland Chinese migrants in Perth, Western Australia, this chapter seeks to shed some light on how migrants understand and employ these comforting strategies and how Chinese-Australians are using technology to achieve a sense of sanctuary from the views and habits of Australians while (re)constructing and articulating multiple belongings in their new homes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

How do you identify "good" teaching practice in the complexity of a real classroom? How do you know that beginning teachers can recognise effective digital pedagogy when they see it? How can teacher educators see through their students’ eyes? The study in this paper has arisen from our interest in what pre-service teachers “see” when observing effective classroom practice and how this might reveal their own technological, pedagogical and content knowledge. We asked 104 pre-service teachers from Early Years, Primary and Secondary cohorts to watch and comment upon selected exemplary videos of teachers using ICT (information and communication technologies) in Science. The pre-service teachers recorded their observations using a simple PMI (plus, minus, interesting) matrix which were then coded using the SOLO Taxonomy to look for evidence of their familiarity with and judgements of digital pedagogies. From this, we determined that the majority of preservice teachers we surveyed were using a descriptive rather than a reflective strategy, that is, not extending beyond what was demonstrated in the teaching exemplar or differentiating between action and purpose. We also determined that this method warrants wider trialling as a means of evaluating students’ understandings of the complexity of the digital classroom.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aggressive driving is considered an important road-safety concern for drivers in highly motorised countries. However, understanding of the causes and maintenance factors fundamental to aggressive driving is limited. In keeping with theoretical advances from general aggression research such as the General Aggression Model (GAM), research has begun to examine the emotional and cognitive antecedents of aggressive driving in order to better understand the underlying processes motivating aggressive driving. Early findings in the driving area have suggested that greater levels of aggression are elicited in response to an intentionally aggressive on-road event. In contrast, general aggression research suggests that greater levels of aggression are elicited in response to an ambiguous event. The current study examined emotional and cognitive responses to two hypothetical driving scenarios with differing levels of aggressive intent (intentional versus ambiguous). There was also an interest in whether factors influencing responses were different for hostile aggression (that is, where the action is intended to harm the other) versus instrumental aggression (that is, where the action is motivated by an intention to remove an impediment or attain a goal). Results were that significantly stronger negative emotion and negative attributions, as well as greater levels of threat were reported in response to the scenario which was designed to appear intentional in nature. In addition, participants were more likely to endorse an aggressive behavioural response to a situation that appeared deliberately aggressive than to one where the intention was ambiguous. Analyses to determine if greater levels of negative emotions and cognitions are able to predict aggressive responses provided different patterns of results for instrumental aggression from those for hostile aggression. Specifically, for instrumental aggression, negative emotions and negative attributions were significant predictors for both the intentional and the ambiguous scenarios. In addition, perceived threat was also a significant predictor where the other driver’s intent was clearly aggressive. However, lower rather than higher, levels of perceived threat were associated with greater endorsement of an aggressive response. For hostile aggressive behavioural responses, trait aggression was the strongest predictor for both situations. Overall the results suggest that in the driving context, instrumental aggression is likely to be a much more common response than hostile aggression. Moreover, aggressive responses are more likely in situations where another driver’s behaviour is clearly intentional rather than ambiguous. The results also support the conclusion that there may be different underlying mechanisms motivating an instrumental aggressive response to those motivating a hostile one. In addition, understanding the emotions and cognitions underlying aggressive driving responses may be helpful in predicting and intervening to reduce driving aggression. The finding that drivers appear to regard tailgating as an instrumental response is of concern since this behaviour has the potential to result in crashes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tensions exist between teacher-centred and learner-centred approaches with constructivism as being favoured for learning in the 21st Century. There is little evidence of teaching strategies being used in the field for differentiating student learning. In addition, preservice teachers need to learn about teaching strategies for which observations of their mentor teachers can provide practical applications. This study explores 16 preservice teachers’ observations of their mentors’ teaching strategies over a four-week professional experience. They provided a minimum of five written observations during this period. Findings indicated that these preservice teachers observed their mentors’ practices and recorded four key teaching strategies used to differentiate learning, namely: (1) designating facilitators for students’ learning, including teacher, peers, parents, and support staff such as teachers aides, (2) managing student groups, (3) contexts for learning, and (4) using a range of teaching aids (visual, auditory, games) and resources. Preservice teachers’ observations of their mentor teachers indicated that they can commence at early stages for identifying teaching strategies and how they work for differentiating student learning.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Secure communications in wireless sensor networks operating under adversarial conditions require providing pairwise (symmetric) keys to sensor nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node a key-chain. For large sensor networks it is infeasible to store a unique key for all other nodes in the key-chain of a sensor node. Consequently, for secure communication either two nodes have a key in common in their key-chains and they have a wireless link between them, or there is a path, called key-path, among these two nodes where each pair of neighboring nodes on this path have a key in common. Length of the key-path is the key factor for efficiency of the design. This paper presents novel deterministic and hybrid approaches based on Combinatorial Design for deciding how many and which keys to assign to each key-chain before the sensor network deployment. In particular, Balanced Incomplete Block Designs (BIBD) and Generalized Quadrangles (GQ) are mapped to obtain efficient key distribution schemes. Performance and security properties of the proposed schemes are studied both analytically and computationally. Comparison to related work shows that the combinatorial approach produces better connectivity with smaller key-chain sizes.