696 resultados para Tactics


Relevância:

10.00% 10.00%

Publicador:

Resumo:

When I was first invited to teach a women's studies course called Sex Trafficking in 2002, most of my students had never heard of the issue. Internet and literature searches for "trafficking" mostly turned up references to trafficking in drugs and weapons, not people. When I revised the course for a topical capstone in Criminology, Justice, and Policy Studies in 2006, all of my students had heard about human trafficking, and a handful had already studied it in other classes. The availability of books, films, scholarly articles, and advocacy pieces had all increased exponentially since I first became engaged in the field. This bounty provided a wealth of resources for teaching but also presented a greater challenge when it came to deciding which texts to include. It also added to the inevitable pedagogical angst over what to leave out. I came to know about trafficking by accident, when I was hired as a research assistant at The Protection Project (TPP) in 1999. In my time at TPP I authored a literature review on human trafficking. At that time, my comprehensive database of sources contained fewer than one hundred books and articles, a few UN documents, a handful of films, and some websites from nongovernmental organizations. My review of the literature inevitably reflected the ideological chasm between those who saw trafficking as primarily a labor, migration, and rights issue and those who saw it as primarily a sexual exploitation issue. On the policy end, these ideological orientations created bizarre bedfellows of individuals and organizations that otherwise would have been at odds. The ideological divide has not diminished in the intervening years, and it is important to be aware of and to negotiate this in designing a course on trafficking. As a feminist teacher, I was very aware of the divisions among feminists on the subject of trafficking, and was interested in communicating these differences to students who were not well versed in the varieties of feminist thought. I was also mindful of the difficulties my American students had in engaging with some of the course texts and issues the first time around. For some students, moral judgments about prostitutes were as far as they were able to go in engaging with the course. These students could not find a way in to think about the many issues involved in trafficking. How could I reach them? In this article, I share some of my texts and tactics with others who might find themselves in a position to teach about human trafficking. I include my case for why feminist teachers should teach trafficking, an overview of the debate that divides the field, my rationale for organizing the course the way that I did, issues to consider when designing a course on trafficking, and some suggested readings, films, and web resources.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores grassroots leadership, an under-researched and often side-lined approach to leadership that operates outside of formal bureaucratic structures. The paper’s central purpose is the claim that an understanding of grassroots leadership and tactics used by grassroots leaders provides valuable insights for the study of school leadership. In this paper, we present and discuss an original model of grassroots leadership based on the argument that this under-researched area can further our understanding of school leadership. Drawing upon the limited literature in the field, we present a model consisting of two approaches to change (i.e. conflict and consensus) and two categories of change (i.e. reform and refinement) and then provide illustrations of how the model works in practice. We make the argument that the model has much merit for conceptualizing school leadership, and this is illustrated by applying the model to formal bureaucratic leadership within school contexts. Given the current climate in education where business and management language is pervasive within leadership-preparation programs, we argue that it is timely for university academics, who are responsible for preparing school leaders to consider broadening their approach by exposing school leaders to a variety of change-based strategies and tactics used by grassroots leaders.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Real-world AI systems have been recently deployed which can automatically analyze the plan and tactics of tennis players. As the game-state is updated regularly at short intervals (i.e. point-level), a library of successful and unsuccessful plans of a player can be learnt over time. Given the relative strengths and weaknesses of a player’s plans, a set of proven plans or tactics from the library that characterize a player can be identified. For low-scoring, continuous team sports like soccer, such analysis for multi-agent teams does not exist as the game is not segmented into “discretized” plays (i.e. plans), making it difficult to obtain a library that characterizes a team’s behavior. Additionally, as player tracking data is costly and difficult to obtain, we only have partial team tracings in the form of ball actions which makes this problem even more difficult. In this paper, we propose a method to overcome these issues by representing team behavior via play-segments, which are spatio-temporal descriptions of ball movement over fixed windows of time. Using these representations we can characterize team behavior from entropy maps, which give a measure of predictability of team behaviors across the field. We show the efficacy and applicability of our method on the 2010-2011 English Premier League soccer data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our objective was to measure the prevalence of wife abuse in an urban teaching hospital family practice unit and compare this to the frequency of documentation by family physicians. A modified Conflicts Tactics Scale Questionnaire was administered to all female patients either married or common-law older than 16 years during the study period. The respective patients' charts were reviewed for documentation of wife abuse. Three hundred eighty-three charts were reviewed, and 275 surveys were completed (72% response rate). Physical and mental abuse were reported in 8% and 23%, respectively, of the respondents. Four percent of respondents had considered suicide. One percent of the charts had wife assault documented (p = 0.0001). Wife abuse is reported in at least 8% of our patients. There appear to be significant health risks to these women, including homicide, suicide, and rape. Family physician documentation of wife abuse was poor.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research in construction innovation highlights construction industry as having many barriers and resistance to innovations and suggests that it needs champions. A hierarchical structural model is presented, to assess the impact of the role of the project manager (PM) on the levels of innovation and project performance. The model adopts the structural equation modelling technique and uses the survey data collected from PMs and project team members working for general contractors in Singapore. The model fits well to the observed data, accounting for 24%, 37% and 49% of the variance in championing behaviour, the level of innovation and project performance, respectively. The results of this study show the importance of the championing role of PMs in construction innovation. However, in order to increase their effectiveness, such a role should be complemented by their competency and professionalism, tactical use of influence tactics, and decision authority. Moreover, senior management should provide adequate resources and a sustained support to innovation and create a conducive environment or organizational culture that nurtures and facilitates the PM’s role in the construction project as a champion of innovation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Knowledge management (KM) provides a structured process to establish the link between knowledgebased assets within an organisation and its desired business objectives. Although KM issues are becoming increasingly important to the construction industry, there is currently no measurement tool for assessing the implementation of KM programmes. This paper reports on the development of such a tool which can be used as both a means of self-assessment and also for benchmarking purposes. Important practices needed for successful KM implementation were identified from the literature and via a self-administered survey targeting large and medium construction organisations in Hong Kong. Survey findings demonstrate the potential of the proposed self-assessment tool to measure the individual’s perception of the relative importance of KM antecedents and practices, also providing early insight of KM implementation by highlighting the negative gaps between what “is” and “should be” happening, thus identifying areas that need re alignment of KM strategies and tactics. The paper also suggests this tool could be further developed to help organisations to formulate and modify their KM programmes according to their own specific internal business environment, and the nature of their projects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this study was to determine factors (internal and external) that influenced Canadian provincial (state) politicians when making funding decisions about public libraries. Using the case study methodology, Canadian provincial/state level funding for public libraries in the 2009-10 fiscal year was examined. After reviewing funding levels across the country, three jurisdictions were chosen for the case: British Columbia's budget revealed dramatically decreased funding, Alberta's budget showed dramatically increased funding, and Ontario's budget was unchanged from the previous year. The primary source of data for the case was a series of semi-structured interviews with elected officials and senior bureaucrats from the three jurisdictions. An examination of primary and secondary documents was also undertaken to help set the political and economic context as well as to provide triangulation for the case interviews. The data were analysed to determine whether Cialdini's theory of influence (2001) and specifically any of the six tactics of influence (i.e, commitment and consistency, authority, liking, social proof, scarcity and reciprocity) were instrumental in these budget processes. Findings show the principles of "authority", "consistency and commitment" and "liking" were relevant, and that "liking" were especially important to these decisions. When these decision makers were considering funding for public libraries, they most often used three distinct lenses: the consistency lens (what are my values? what would my party do?), the authority lens (is someone with hierarchical power telling me to do this? are the requests legitimate?), and most importantly, the liking lens (how much do I like and know about the requester?). These findings are consistent with Cialdini's theory, which suggests the quality of some relationships is one of six factors that can most influence a decision maker. The small number of prior research studies exploring the reasons for increases or decreases in public library funding allocation decisions have given little insight into the factors that motivate those politicians involved in the process and the variables that contribute to these decisions. No prior studies have examined the construct of influence in decision making about funding for Canadian public libraries at any level of government. Additionally, no prior studies have examined the construct of influence in decision making within the context of Canadian provincial politics. While many public libraries are facing difficult decisions in the face of uncertain funding futures, the ability of the sector to obtain favourable responses to requests for increases may require a less simplistic approach than previously thought. The ability to create meaningful connections with individuals in many communities and across all levels of government should be emphasised as a key factor in influencing funding decisions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study aims to redefine spaces of learning to places of learning through the direct engagement of local communities as a way to examine and learn from real world issues in the city. This paper exemplifies Smart City Learning, where the key goal is to promote the generation and exchange of urban design ideas for the future development of South Bank, in Brisbane, Australia, informing the creation of new design policies responding to the needs of local citizens. Specific to this project was the implementation of urban informatics techniques and approaches to promote innovative engagement strategies. Architecture and Urban Design students were encouraged to review and appropriate real-time, ubiquitous technology, social media, and mobile devices that were used by urban residents to augment and mediate the physical and digital layers of urban infrastructures. Our study’s experience found that urban informatics provide an innovative opportunity to enrich students’ place of learning within the city.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we describe a method to represent and discover adversarial group behavior in a continuous domain. In comparison to other types of behavior, adversarial behavior is heavily structured as the location of a player (or agent) is dependent both on their teammates and adversaries, in addition to the tactics or strategies of the team. We present a method which can exploit this relationship through the use of a spatiotemporal basis model. As players constantly change roles during a match, we show that employing a "role-based" representation instead of one based on player "identity" can best exploit the playing structure. As vision-based systems currently do not provide perfect detection/tracking (e.g. missed or false detections), we show that our compact representation can effectively "denoise" erroneous detections as well as enabe temporal analysis, which was previously prohibitive due to the dimensionality of the signal. To evaluate our approach, we used a fully instrumented field-hockey pitch with 8 fixed high-definition (HD) cameras and evaluated our approach on approximately 200,000 frames of data from a state-of-the-art real-time player detector and compare it to manually labelled data.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

‘Engagement’ is one of the buzzwords of 21st century public relations theory and practice. Yet the concept of engagement remains frustratingly nebulous and intangible, lacking clear definition and consistent use. This paper suggests that the concept of dialogue can provide public relations practitioners and academics with a framework for defining engagement that allows deep insights into the range of ideas and contexts it covers. Specifically, this paper argues for the use of a pragmatic practitioner perspective on dialogue as a lens through which to study engagement. Current literature clearly articulates the normative and prescriptive perspectives on dialogue in public relations, but leaves the story of the reality of the practitioner experience of dialogue largely untold. New research tells this ‘missing’ story of the practitioner perspective on dialogue, which in turn offers some insights into the forms and functions of engagement in practice. Dialogue is seen as encompassing three different types of public relations practice: informing stakeholders of organisational decisions and receiving their feedback; consulting with stakeholders on the strategies and tactics used by organisations to achieve their chosen goals; and including stakeholder input in the making of decisions on what organisational goals should be. Adopting this pragmatic practitioner perspective on dialogue to view engagement provides scaffolding that is strong enough to encourage development of a consistent definition of its meaning; while still allowing the freedom and scope necessary to develop deep and rich understanding of the phenomenon.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study determined factors which influenced Canadian provincial (state) politicians when making funding decisions for public libraries. Using the case study methodology, Canadian provincial/state-level funding for public libraries in the 2009-2010 fiscal year was examined. The data were analyzed to determine whether Cialdini’s theory of influence and specifically any of the six tactics of influence (i.e., commitment and consistency, authority, liking, social proof, scarcity, and reciprocity) were instrumental in these budgetary decision-making processes. Findings show the principles of “authority,” “consistency and commitment,” and “liking” were relevant, and that “liking” was especially important to these decisions.