994 resultados para COMPUTER sex
Resumo:
Food has been a major agenda in political, socio-cultural, and environmental domains throughout history. The significance of food has been particularly highlighted in recent years with the growing public awareness of the unfolding impacts of climate change, challenging our understanding, practice, and expectations of our relationship with food. Parallel to this development has been the rise of web applications such as blogs, wikis, video and photo sharing sites, and social networking systems that are arguably more open, collaborative, and personalisable. These so-called ‘Web 2.0’ technologies have contributed to a more participatory Internet experience than what had previously been possible. An increasing number of these social applications are now available on mobile technologies where they take advantage of device-specific features such as sensors, location and context awareness, further expanding potential for the culture of participation and creativity. This international volume assembles a diverse collection of book chapters that contribute towards exploring and better understanding the opportunities and challenges provided by tools, interfaces, methods, and practices of social and mobile technology to enable engagement with people and creativity in the domain of food in contemporary society. It brings together an international group of academics and practitioners from a diverse range of disciplines such as computing and engineering, social sciences, digital media and human-computer interaction to critically examine a range of applications of social and mobile technology, such as social networking, mobile interaction, wikis, twitter, blogging, mapping, shared displays and urban screens, and their impact to foster a better understanding and practice of environmentally, socio-culturally, economically, and health-wise sustainable food culture.
Resumo:
This chapter provides an overview of the contribution of feminist criminologies to understandings of the complex intersections between sex, gender and crime. Dozens of scholars and activists have participated in these debates over the past four decades. For our contribution to this handbook, we interviewed ten distinguished scholars whose contributions are recognized internationally. Through the commentary provided by these scholars, this chapter examines some of the distinctive contributions of feminism to our knowledge about sex, gender, and crime, as well as some of the challenges it continues to face in the field of criminology. We conclude that feminist work within criminology continues to face a number of lingering challenges, most notably in relation to the struggle to maintain relevance in a world where concerns about gender inequality are marginalized and considered as historical relics not contemporary issues; where there are on-going tensions around the best strategies for change, as well as difficulties in challenging distorted representations of female crime and violence; and where a backlash, anti-feminist politics seeks to discredit explanations that draw a link between sex, gender, and crime. This chapter critically reviews these lingering challenges—locating feminist approaches (of which there are many) at the centre and not the periphery of advancing knowledge about gender, sex, and crime.
Resumo:
Stimulation of the androgen receptor via bioavailable androgens, including testosterone and testosterone metabolites, is a key driver of prostate development and the early stages of prostate cancer. Androgens are hydrophobic and as such require carrier proteins, including sex hormone-binding globulin (SHBG), to enable efficient distribution from sites of biosynthesis to target tissues. The similarly hydrophobic corticosteroids also require a carrier protein whose affinity for steroid is modulated by proteolysis. However, proteolytic mechanisms regulating the SHBG/androgen complex have not been reported. Here, we show that the cancer-associated serine proteases, kallikrein-related peptidase (KLK)4 and KLK14, bind strongly to SHBG in glutathione S-transferase interaction analyses. Further, we demonstrate that active KLK4 and KLK14 cleave human SHBG at unique sites and in an androgen-dependent manner. KLK4 separated androgen-free SHBG into its two laminin G-like (LG) domains that were subsequently proteolytically stable even after prolonged digestion, whereas a catalytically equivalent amount of KLK14 reduced SHBG to small peptide fragments over the same period. Conversely, proteolysis of 5α-dihydrotestosterone (DHT)-bound SHBG was similar for both KLKs and left the steroid binding LG4 domain intact. Characterization of this proteolysis fragment by [(3)H]-labeled DHT binding assays revealed that it retained identical affinity for androgen compared with full-length SHBG (dissociation constant = 1.92 nM). Consistent with this, both full-length SHBG and SHBG-LG4 significantly increased DHT-mediated transcriptional activity of the androgen receptor compared with DHT delivered without carrier protein. Collectively, these data provide the first evidence that SHBG is a target for proteolysis and demonstrate that a stable fragment derived from proteolysis of steroid-bound SHBG retains binding function in vitro.
Resumo:
This article explores legal, scholarly and social responses to women identified as sex offenders. While much has been written on the male paedophile, rapist and sex offender, little research has been done on the role of gender and sexuality in sex offending. This article examines the ways in which the female sex offender is currently theorized and the discourses surrounding policy, legislative and media responses to their crimes. We identify contradictory public discourses where perceptions of female child abusers in particular often succumb to moral panic, in spite of many such offenders being given lenient sentences for their crimes. An examination of the discursive construction of female child abusers suggests that these contradictions are informed by underlying assumptions concerning harm and subjectivity in sex crimes. In exploring these contradictions we illustrate the ways in which such discourses are impacted by social moralities, and how social moralities construct offender and victim subjectivities differently, based on differences in gender, age and sexuality.
Resumo:
The City of the Gold Coast in Queensland, Australia, will host the Commonwealth Games in 2018. In advance of the Games, the City is beginning to reposition the traditional marketing programs that were based around the four S’s- ‘sun, sand, surf and sex.’ There is a new emphasis on urban sophistication, sport, science, education and the environment. At the same time, local communities are asking for renewed attention to residential issues, particularly relating to recognising the importance of culture to the region. In this paper I explore the development of integrated computer technologies (ICTs) as a way of linking tourism, culture and place in the experience economy of the Gold Coast. The discussion is framed by theories of the post-tourist, contemporary cultural tourism and the role of mobile technologies, and the figure of the ‘referential tourist.’ An examination of stakeholder responses to changing business and social frameworks on the Gold Coast shows how discussions about a range of issues coalesce around cultural tourism. Local communities have the opportunity to engage with the new tourist as they move quickly between leisure and cultural experiences, at once connected to tourist expectations but increasingly self-directed. The Surfers Paradise Nights campaign, which is based around social media, is a case in point. This campaign aims to interest visitors in becoming a part of a familiar third place, an online space, but one that will sustain an emotive connection to the physical location and events. The paper also draws on research carried out in Brisbane, Queensland, in relation to building connections between place and culture on designated, self-directed journeys via iPhone technology. Participant responses indicate the importance of narrative to developing cultural frameworks.
Resumo:
We blend research from human-computer interface (HCI) design with computational based crypto- graphic provable security. We explore the notion of practice-oriented provable security (POPS), moving the focus to a higher level of abstraction (POPS+) for use in providing provable security for security ceremonies involving humans. In doing so we high- light some challenges and paradigm shifts required to achieve meaningful provable security for a protocol which includes a human. We move the focus of security ceremonies from being protocols in their context of use, to the protocols being cryptographic building blocks in a higher level protocol (the security cere- mony), which POPS can be applied to. In order to illustrate the need for our approach, we analyse both a protocol proven secure in theory, and a similar proto- col implemented by a �nancial institution, from both HCI and cryptographic perspectives.
Resumo:
Organizations from every industry sector seek to enhance their business performance and competitiveness through the deployment of contemporary information systems (IS), such as Enterprise Systems (ERP). Investments in ERP are complex and costly, attracting scrutiny and pressure to justify their cost. Thus, IS researchers highlight the need for systematic evaluation of information system success, or impact, which has resulted in the introduction of varied models for evaluating information systems. One of these systematic measurement approaches is the IS-Impact Model introduced by a team of researchers at Queensland University of technology (QUT) (Gable, Sedera, & Chan, 2008). The IS-Impact Model is conceptualized as a formative, multidimensional index that consists of four dimensions. Gable et al. (2008) define IS-Impact as "a measure at a point in time, of the stream of net benefits from the IS, to date and anticipated, as perceived by all key-user-groups" (p.381). The IT Evaluation Research Program (ITE-Program) at QUT has grown the IS-Impact Research Track with the central goal of conducting further studies to enhance and extend the IS-Impact Model. The overall goal of the IS-Impact research track at QUT is "to develop the most widely employed model for benchmarking information systems in organizations for the joint benefit of both research and practice" (Gable, 2009). In order to achieve that, the IS-Impact research track advocates programmatic research having the principles of tenacity, holism, and generalizability through extension research strategies. This study was conducted within the IS-Impact Research Track, to further generalize the IS-Impact Model by extending it to the Saudi Arabian context. According to Hofsted (2012), the national culture of Saudi Arabia is significantly different from the Australian national culture making the Saudi Arabian culture an interesting context for testing the external validity of the IS-Impact Model. The study re-visits the IS-Impact Model from the ground up. Rather than assume the existing instrument is valid in the new context, or simply assess its validity through quantitative data collection, the study takes a qualitative, inductive approach to re-assessing the necessity and completeness of existing dimensions and measures. This is done in two phases: Exploratory Phase and Confirmatory Phase. The exploratory phase addresses the first research question of the study "Is the IS-Impact Model complete and able to capture the impact of information systems in Saudi Arabian Organization?". The content analysis, used to analyze the Identification Survey data, indicated that 2 of the 37 measures of the IS-Impact Model are not applicable for the Saudi Arabian Context. Moreover, no new measures or dimensions were identified, evidencing the completeness and content validity of the IS-Impact Model. In addition, the Identification Survey data suggested several concepts related to IS-Impact, the most prominent of which was "Computer Network Quality" (CNQ). The literature supported the existence of a theoretical link between IS-Impact and CNQ (CNQ is viewed as an antecedent of IS-Impact). With the primary goal of validating the IS-Impact model within its extended nomological network, CNQ was introduced to the research model. The Confirmatory Phase addresses the second research question of the study "Is the Extended IS-Impact Model Valid as a Hierarchical Multidimensional Formative Measurement Model?". The objective of the Confirmatory Phase was to test the validity of IS-Impact Model and CNQ Model. To achieve that, IS-Impact, CNQ, and IS-Satisfaction were operationalized in a survey instrument, and then the research model was assessed by employing the Partial Least Squares (PLS) approach. The CNQ model was validated as a formative model. Similarly, the IS-Impact Model was validated as a hierarchical multidimensional formative construct. However, the analysis indicated that one of the IS-Impact Model indicators was insignificant and can be removed from the model. Thus, the resulting Extended IS-Impact Model consists of 4 dimensions and 34 measures. Finally, the structural model was also assessed against two aspects: explanatory and predictive power. The analysis revealed that the path coefficient between CNQ and IS-Impact is significant with t-value= (4.826) and relatively strong with â = (0.426) with CNQ explaining 18% of the variance in IS-Impact. These results supported the hypothesis that CNQ is antecedent of IS-Impact. The study demonstrates that the quality of Computer Network affects the quality of the Enterprise System (ERP) and consequently the impacts of the system. Therefore, practitioners should pay attention to the Computer Network quality. Similarly, the path coefficient between IS-Impact and IS-Satisfaction was significant t-value = (17.79) and strong â = (0.744), with IS-Impact alone explaining 55% of the variance in Satisfaction, consistent with results of the original IS-Impact study (Gable et al., 2008). The research contributions include: (a) supporting the completeness and validity of IS-Impact Model as a Hierarchical Multi-dimensional Formative Measurement Model in the Saudi Arabian context, (b) operationalizing Computer Network Quality as conceptualized in the ITU-T Recommendation E.800 (ITU-T, 1993), (c) validating CNQ as a formative measurement model and as an antecedent of IS Impact, and (d) conceptualizing and validating IS-Satisfaction as a reflective measurement model and as an immediate consequence of IS Impact. The CNQ model provides a framework to perceptually measure Computer Network Quality from multiple perspectives. The CNQ model features an easy-to-understand, easy-to-use, and economical survey instrument.
Resumo:
This article considers the regulatory position concerning altruistic surrogacy in Queensland, focusing on the intended changes to the current legal framework announced by the government in June 2012. The previous government had made significant progress by reforming surrogacy laws in 2010. However, that progress is at risk of being reversed. The proposed changes to the law would make it a criminal offence to enter into an altruistic surrogacy arrangement for certain individuals or couples. If enacted, the offence would only apply in altruistic surrogacy cases where the intended parent or parents are either single, in a same-sex relationship, or are in a heterosexual relationship of less than two years. Moreover, if enacted, the offence would apply extra-territorially. The authors argue that these changes represent a retrograde step for the law and urge the government to reconsider. This is based on the fact that they are out of step with current social attitudes, are contrary to the spirit of anti-discrimination laws, and that they are unjustified in terms of child welfare concerns.
Resumo:
This paper reports on the implementation of a non-invasive electroencephalography-based brain-computer interface to control functions of a car in a driving simulator. The system is comprised of a Cleveland Medical Devices BioRadio 150 physiological signal recorder, a MATLAB-based BCI and an OKTAL SCANeR advanced driving experience simulator. The system utilizes steady-state visual-evoked potentials for the BCI paradigm, elicited by frequency-modulated high-power LEDs and recorded with the electrode placement of Oz-Fz with Fz as ground. A three-class online brain-computer interface was developed and interfaced with an advanced driving simulator to control functions of the car, including acceleration and steering. The findings are mainly exploratory but provide an indication of the feasibility and challenges of brain-controlled on-road cars for the future, in addition to a safe, simulated BCI driving environment to use as a foundation for research into overcoming these challenges.
Resumo:
The publication of the fourth edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM-IV; American Psychiatric Association, 1994) introduced the notion that a life-threatening illness can be a stressor and catalyst for Posttraumatic Stress Disorder (PTSD). Since then a solid body of research has been established investigating the post-diagnosis experience of cancer. These studies have identified a number of short and long-term life changes resulting from a diagnosis of cancer and associated treatments. In this chapter, we discuss the psychosocial response to the cancer experience and the potential for cancer-related distress. Cancer can represent a life-threatening diagnosis that may be associated with aggressive treatments and result in physical and psychological changes. The potential for future trauma through the lasting effects of the disease and treatment, and the possibility of recurrence, can be a source of continued psychological distress. In addition to the documented adverse repercussions of cancer, we also outline the recent shift that has occurred in the psycho-oncology literature regarding positive life change or posttraumatic growth that is commonly reported after a diagnosis of cancer. Adopting a salutogenic framework acknowledges that the cancer experience is a dynamic psychosocial process with both negative and positive repercussions. Next, we describe the situational and individual factors that are associated with posttraumatic growth and the types of positive life change that are prevalent in this context. Finally, we discuss the implications of this research in a therapeutic context and the directions of future posttraumatic growth research with cancer survivors. This chapter will present both quantitative and qualitative research that indicates the potential for personal growth from adversity rather than just mere survival and return to pre-diagnosis functioning. It is important to emphasise however, that the presence of growth and prevalence of resilience does not negate the extremely distressing nature of a cancer diagnosis for the patient and their families and the suffering that can accompany treatment regimes. Indeed, it will be explained that for growth to occur, the experience must be one that quite literally shatters previously held schemas in order to act as a catalyst for change.
Resumo:
The Australian Business Assessment of Computer User Security (ABACUS) survey is a nationwide assessment of the prevalence and nature of computer security incidents experienced by Australian businesses. This report presents the findings of the survey which may be used by businesses in Australia to assess the effectiveness of their information technology security measures.
Resumo:
Historically a significant gap between male and female wages has existed in the Australian labour market. Indeed this wage differential was institutionalised in the 1912 arbitration decision which determined that the basic female wage would be set at between 54 and 66 per cent of the male wage. More recently however, the 1969 and 1972 Equal Pay Cases determined that male/female wage relativities should be based upon the premise of equal pay for work of equal value. It is important to note that the mere observation that average wages differ between males and females is not sine qua non evidence of sex discrimination. Economists restrict the definition of wage discrimination to cases where two distinct groups receive different average remuneration for reasons unrelated to differences in productivity characteristics. This paper extends previous studies of wage discrimination in Australia (Chapman and Mulvey, 1986; Haig, 1982) by correcting the estimated male/female wage differential for the existence of non-random sampling. Previous Australian estimates of male/female human capital basedwage specifications together with estimates of the corresponding wage differential all suffer from a failure to address this issue. If the sample of females observed to be working does not represent a random sample then the estimates of the male/female wage differential will be both biased and inconsistent.
Resumo:
This paper explores the implications of the difference between the occupational distribution for males and females in a joint model determining earnings and occupation. The male/female wage differential is evaluated for a number of broad occupational classifications. This is followed by an evaluation of the role and relative importance of inter-occupational and intra-occupational effects as contributors to the overall male/female wage differential The main conclusion following from the econometric results is that intra-occupational effects dominate Thus, policies which attempt to address the gender wage differential by re-allocation of labour across occupations are unlikely to solve the problem.
Resumo:
Purpose: The measurement of broadband ultrasonic attenuation (BUA) in cancellous bone for the assessment of osteoporosis follows a parabolic-type dependence with bone volume fraction; having minima values corresponding to both entire bone and entire marrow. Langton has recently proposed that the primary BUA mechanism may be significant phase interference due to variations in propagation transit time through the test sample as detected over the phase-sensitive surface of the receive ultrasound transducer. This fundamentally simple concept assumes that the propagation of ultrasound through a complex solid : liquid composite sample such as cancellous bone may be considered by an array of parallel ‘sonic rays’. The transit time of each ray is defined by the proportion of bone and marrow propagated, being a minimum (tmin) solely through bone and a maximum (tmax) solely through marrow. A Transit Time Spectrum (TTS), ranging from tmin to tmax, may be defined describing the proportion of sonic rays having a particular transit time, effectively describing lateral inhomogeneity of transit time over the surface of the receive ultrasound transducer. Phase interference may result from interaction of ‘sonic rays’ of differing transit times. The aim of this study was to test the hypothesis that there is a dependence of phase interference upon the lateral inhomogenity of transit time by comparing experimental measurements and computer simulation predictions of ultrasound propagation through a range of relatively simplistic solid:liquid models exhibiting a range of lateral inhomogeneities. Methods: A range of test models was manufactured using acrylic and water as surrogates for bone and marrow respectively. The models varied in thickness in one dimension normal to the direction of propagation, hence exhibiting a range of transit time lateral inhomogeneities, ranging from minimal (single transit time) to maximal (wedge; ultimately the limiting case where each sonic ray has a unique transit time). For the experimental component of the study, two unfocused 1 MHz ¾” broadband diameter transducers were utilized in transmission mode; ultrasound signals were recorded for each of the models. The computer simulation was performed with Matlab, where the transit time and relative amplitude of each sonic ray was calculated. The transit time for each sonic ray was defined as the sum of transit times through acrylic and water components. The relative amplitude considered the reception area for each sonic ray along with absorption in the acrylic. To replicate phase-sensitive detection, all sonic rays were summed and the output signal plotted in comparison with the experimentally derived output signal. Results: From qualtitative and quantitative comparison of the experimental and computer simulation results, there is an extremely high degree of agreement of 94.2% to 99.0% between the two approaches, supporting the concept that propagation of an ultrasound wave, for the models considered, may be approximated by a parallel sonic ray model where the transit time of each ray is defined by the proportion of ‘bone’ and ‘marrow’. Conclusions: This combined experimental and computer simulation study has successfully demonstrated that lateral inhomogeneity of transit time has significant potential for phase interference to occur if a phase-sensitive ultrasound receive transducer is implemented as in most commercial ultrasound bone analysis devices.