862 resultados para email worms
Resumo:
With the increasing growth of cultural events both in Australia and internationally, there has also been an increase in event management studies; in theory and in practice. Although a series of related knowledge and skills required specifically by event managers has already been identified by many researchers (Perry et al., 1996; Getz, 2002 & Silvers et al., 2006) and generic event management models proposed, including ‘project management’ strategies in an event context (Getz, 2007), knowledge gaps still exist in relation to identifying specific types of events, especially for not-for-profit arts events. For events of a largely voluntary nature, insufficient resources are recognised as the most challenging; including finance, human resources and infrastructure. Therefore, the concepts and principles which are adopted by large scale commercial events may not be suitable for not-for-profit arts events aiming at providing professional network opportunities for artists. Building partnerships are identified as a key strategy in developing an effective event management model for this type of event. Using the 2008 World Dance Alliance Global Summit (WDAGS) in Brisbane 13-18 July, as a case study, the level, nature and relationship of key partners are investigated. Data is triangulated from interviews with organisers of the 2008 WDAGS, on-line and email surveys of delegates, participant observation and analysis of formal and informal documents, to produce a management model suited to this kind of event.
Resumo:
Dr Gillian Hallam is project leader for the Queensland Government Agency Libraries Review. As an initial step in the project, a literature review was commissioned to guide the research activities and inform the development of options for potential future service delivery models for the Government agency libraries. The review presents an environmental scan and review of the professional and academic literature to consider a range of current perspectives on library and information services. Significant in this review is the focus on the specific issues and challenges impacting on contemporary government libraries and their staff. The review incorporates four key areas: current directions in government administration; trends in government library services; issues in contemporary special libraries; and the skills and competencies of special librarians. Rather than representing an exhaustive review, the research has primarily centred on recent journal articles, conference papers, reports and web resources. Commentary prepared by national and international library associations has also played a role informing this review, as does the relevant State and Federal government documentation and reporting.
Resumo:
Monitoring Internet traffic is critical in order to acquire a good understanding of threats to computer and network security and in designing efficient computer security systems. Researchers and network administrators have applied several approaches to monitoring traffic for malicious content. These techniques include monitoring network components, aggregating IDS alerts, and monitoring unused IP address spaces. Another method for monitoring and analyzing malicious traffic, which has been widely tried and accepted, is the use of honeypots. Honeypots are very valuable security resources for gathering artefacts associated with a variety of Internet attack activities. As honeypots run no production services, any contact with them is considered potentially malicious or suspicious by definition. This unique characteristic of the honeypot reduces the amount of collected traffic and makes it a more valuable source of information than other existing techniques. Currently, there is insufficient research in the honeypot data analysis field. To date, most of the work on honeypots has been devoted to the design of new honeypots or optimizing the current ones. Approaches for analyzing data collected from honeypots, especially low-interaction honeypots, are presently immature, while analysis techniques are manual and focus mainly on identifying existing attacks. This research addresses the need for developing more advanced techniques for analyzing Internet traffic data collected from low-interaction honeypots. We believe that characterizing honeypot traffic will improve the security of networks and, if the honeypot data is handled in time, give early signs of new vulnerabilities or breakouts of new automated malicious codes, such as worms. The outcomes of this research include: • Identification of repeated use of attack tools and attack processes through grouping activities that exhibit similar packet inter-arrival time distributions using the cliquing algorithm; • Application of principal component analysis to detect the structure of attackers’ activities present in low-interaction honeypots and to visualize attackers’ behaviors; • Detection of new attacks in low-interaction honeypot traffic through the use of the principal component’s residual space and the square prediction error statistic; • Real-time detection of new attacks using recursive principal component analysis; • A proof of concept implementation for honeypot traffic analysis and real time monitoring.
Resumo:
E-commerce technologies such as a website, email and the use of web browsers enables access to large amounts of information, facilitates communication and provides niche companies with an effective mechanism for competing with larger organisations world-wide. However recent literature has shown Australian SMEs have been slow in the uptake of these technologies. The aim of this research was to determine which factors were important in impacting on small firms' decision making in respect of information technology and e-commerce adoption. Findings indicate that generally the more a firm was concerned about its competitive position such a firm was likely to develop a web site. Moreover the 'Industry and Skill Demands' dimension suggested that as the formal education of the owner/manager increased, coupled with the likelihood that the firm was in the transport and storage or communication services industries, and realising the cost of IT adoption was in effect an investment, then such a firm would be inclined to develop a web site.
Resumo:
Immersive environments are part of a recent media innovation that allow users to become so involved within a computer-based simulated environment that they feel part of that virtual world (Grigorovici, 2003). A specific example is Second Life, which is an internet-based, three-dimensional immersive virtual world in which users create an online representation of themselves (an avatar) to play games and interact socially with thousands of people simultaneously. This study focuses on Second Life as an example of an immersive environment, as it is the largest adult freeform virtual world, home to 12 million avatars (IOWA State University, 2008). Already in Second Life there are more than 100 real-life brands from a range of industries, including automotive, professional services, and consumer goods and travel, among others (KZero, 2007; New Business Horizons, 2009). Compared to traditional advertising media, this interactive media can immerse users in the environment. As a result of this interactivity, users can become more involved with a virtual environment, resulting in prolonged usage over weeks, months and even years. Also, it can facilitate presence. Despite these developments, little is known about the effectiveness of marketing messages in a virtual world context. Marketers are incorporating products into Second Life using a strategy of online product placement. This study, therefore, explores the perceived effectiveness of online product placement in Second Life in terms of effects on product/brand recall, purchase intentions and trial. This research examines the association between individuals’ involvement with Second Life and online product placement effectiveness, as well as the relationship between individuals’ Second Life involvement and the effectiveness of online product placement. In addition, it investigates the association of immersion and product placement involvement. It also examines the impact of product placement involvement on online product placement effectiveness and the role of presence in affecting this relationship. An exploratory study was conducted for this research using semi-structured in-depth interviews face-to-face, email-based and in-world. The sample comprised 24 active Second Life users. Results indicate that product placement effectiveness is not directly associated with Second Life involvement, but rather effectiveness is impacted through the effect of Second Life involvement on product placement involvement. A positive relationship was found between individuals’ product placement involvement and online product placement effectiveness. Findings also indicate that online product placement effectiveness is not directly associated with immersion. Rather, it appears that effectiveness is impacted through the effect of immersion on product placement involvement. Moreover, higher levels of presence appear to have a positive impact on the relationship between product placement involvement and product placement effectiveness. Finally, a model was developed from this qualitative study for future testing. In terms of theoretical contributions, this study provides a new model for testing the effectiveness of product placement within immersive environments. From a methodological perspective, in-world interviews as a new research method were undertaken. In terms of a practical contribution, findings identified useful information for marketers and advertising agencies that aim to promote their products in immersive virtual environments like Second Life.
Resumo:
Today’s evolving networks are experiencing a large number of different attacks ranging from system break-ins, infection from automatic attack tools such as worms, viruses, trojan horses and denial of service (DoS). One important aspect of such attacks is that they are often indiscriminate and target Internet addresses without regard to whether they are bona fide allocated or not. Due to the absence of any advertised host services the traffic observed on unused IP addresses is by definition unsolicited and likely to be either opportunistic or malicious. The analysis of large repositories of such traffic can be used to extract useful information about both ongoing and new attack patterns and unearth unusual attack behaviors. However, such an analysis is difficult due to the size and nature of the collected traffic on unused address spaces. In this dissertation, we present a network traffic analysis technique which uses traffic collected from unused address spaces and relies on the statistical properties of the collected traffic, in order to accurately and quickly detect new and ongoing network anomalies. Detection of network anomalies is based on the concept that an anomalous activity usually transforms the network parameters in such a way that their statistical properties no longer remain constant, resulting in abrupt changes. In this dissertation, we use sequential analysis techniques to identify changes in the behavior of network traffic targeting unused address spaces to unveil both ongoing and new attack patterns. Specifically, we have developed a dynamic sliding window based non-parametric cumulative sum change detection techniques for identification of changes in network traffic. Furthermore we have introduced dynamic thresholds to detect changes in network traffic behavior and also detect when a particular change has ended. Experimental results are presented that demonstrate the operational effectiveness and efficiency of the proposed approach, using both synthetically generated datasets and real network traces collected from a dedicated block of unused IP addresses.
Resumo:
Since the formal recognition of practice-led research in the 1990s, many higher research degree candidates in art, design and media have submitted creative works along with an accompanying written document or ‘exegesis’ for examination. Various models for the exegesis have been proposed in university guidelines and academic texts during the past decade, and students and supervisors have experimented with its contents and structure. With a substantial number of exegeses submitted and archived, it has now become possible to move beyond proposition to empirical analysis. In this article we present the findings of a content analysis of a large, local sample of submitted exegeses. We identify the emergence of a persistent pattern in the types of content included as well as overall structure. Besides an introduction and conclusion, this pattern includes three main parts, which can be summarized as situating concepts (conceptual definitions and theories); precedents of practice (traditions and exemplars in the field); and researcher’s creative practice (the creative process, the artifacts produced and their value as research). We argue that this model combines earlier approaches to the exegesis, which oscillated between academic objectivity, by providing a contextual framework for the practice, and personal reflexivity, by providing commentary on the creative practice. But this model is more than simply a hybrid: it provides a dual orientation, which allows the researcher to both situate their creative practice within a trajectory of research and do justice to its personally invested poetics. By performing the important function of connecting the practice and creative work to a wider emergent field, the model helps to support claims for a research contribution to the field. We call it a connective model of exegesis.
Resumo:
In a consumerist society obsessed with body image and thinness, obesity levels have reached an all-time high. This multi-faceted book written by a range of experts, explores the social, cultural, clinical and psychological factors that lie behind the Obesity Epidemic . It is required reading for the many healthcare professionals dealing with the effects of obesity and for anyone who wants to know more about the causes of weight gain and the best ways of dealing with it. Fat Matters covers a range of issues from sociology through medicine to technology. This is not a book for the highly specialised expert. Rather it is a book that shows the diversity of approaches to the phenomenon of obesity, tailored to the reader who wants to be up-to-date and well-informed on a subject that is possibly as frequently discussed and as misunderstood as the weather.
Resumo:
This research study investigated the factors that influenced the development of teacher identity in a small cohort of mature-aged graduate pre-service teachers over the course of a one-year Graduate Diploma program (Middle Years). It sought to illuminate the social and relational dynamics of these pre-service teachers’ experiences as they began new ways of being and learning during a newly introduced one-year Graduate Diploma program. A relational-ontological perspective underpinned the relational-cultural framework that was applied in a workshop program as an integral part of this research. A relational-ontological perspective suggests that the development of teacher identity is to be construed more as an ontological process than an epistemological one. Its focus is more on questions surrounding the person and their ‘becoming’ a teacher than about the knowledge they have or will come to have. Hence, drawing on work by researchers such as Alsup (2006), Gilligan, (1982), Isaacs, (2007), Miller (1976), Noddings, (2005), Stout (2001), and Taylor, (1989), teacher identity was defined as an individual pre-service teacher’s unique sense of self as a teacher that included his or her beliefs about teaching and learning (Alsup, 2006; Stout, 2001; Walkington, 2005). Case-study was the preferred methodology within which this research project was framed, and narrative research was used as a method to document the way teacher identity was shaped and negotiated in discursive environments such as teacher education programs, prior experiences, classroom settings and the practicum. The data that was collected included student narratives, student email written reflections, and focus group dialogue. The narrative approach applied in this research context provided the depth of data needed to understand the nature of the mature-aged pre-service teachers’ emerging teacher identities and experiences in the graduate diploma program. Findings indicated that most of the mature-aged graduate pre-service teachers came in to the one-year graduate diploma program with a strong sense of personal and professional selves and well-established reasons why they had chosen to teach Middle Years. Their choice of program involved an expectation of support and welcome to a middle-school community and culture. Two critical issues that emerged from the pre-service teachers’ narratives were the importance they placed on the human support including the affirmation of themselves and their emerging teacher identities. Evidence from this study suggests that the lack of recognition of preservice teachers’ personal and professional selves during the graduate diploma program inhibited the development of a positive middle-school teacher identity. However, a workshop program developed for the participants in this research and addressing a range of practical concerns to beginning teachers offered them a space where they felt both a sense of belonging to a community and where their thoughts and beliefs were recognized and valued. Thus, the workshops provided participants with the positive social and relational dynamics necessary to support them in their developing teacher identities. The overall findings of this research study strongly indicate a need for a relational support structure based on a relational-ontological perspective to be built into the overall course structure of Graduate Pre-service Diplomas in Education to support the development of teacher identity. Such a support structure acknowledges that the pre-service teacher’s learning and formation is socially embedded, relational, and a continual, lifelong process.
Resumo:
This dissertation is primarily an applied statistical modelling investigation, motivated by a case study comprising real data and real questions. Theoretical questions on modelling and computation of normalization constants arose from pursuit of these data analytic questions. The essence of the thesis can be described as follows. Consider binary data observed on a two-dimensional lattice. A common problem with such data is the ambiguity of zeroes recorded. These may represent zero response given some threshold (presence) or that the threshold has not been triggered (absence). Suppose that the researcher wishes to estimate the effects of covariates on the binary responses, whilst taking into account underlying spatial variation, which is itself of some interest. This situation arises in many contexts and the dingo, cypress and toad case studies described in the motivation chapter are examples of this. Two main approaches to modelling and inference are investigated in this thesis. The first is frequentist and based on generalized linear models, with spatial variation modelled by using a block structure or by smoothing the residuals spatially. The EM algorithm can be used to obtain point estimates, coupled with bootstrapping or asymptotic MLE estimates for standard errors. The second approach is Bayesian and based on a three- or four-tier hierarchical model, comprising a logistic regression with covariates for the data layer, a binary Markov Random field (MRF) for the underlying spatial process, and suitable priors for parameters in these main models. The three-parameter autologistic model is a particular MRF of interest. Markov chain Monte Carlo (MCMC) methods comprising hybrid Metropolis/Gibbs samplers is suitable for computation in this situation. Model performance can be gauged by MCMC diagnostics. Model choice can be assessed by incorporating another tier in the modelling hierarchy. This requires evaluation of a normalization constant, a notoriously difficult problem. Difficulty with estimating the normalization constant for the MRF can be overcome by using a path integral approach, although this is a highly computationally intensive method. Different methods of estimating ratios of normalization constants (N Cs) are investigated, including importance sampling Monte Carlo (ISMC), dependent Monte Carlo based on MCMC simulations (MCMC), and reverse logistic regression (RLR). I develop an idea present though not fully developed in the literature, and propose the Integrated mean canonical statistic (IMCS) method for estimating log NC ratios for binary MRFs. The IMCS method falls within the framework of the newly identified path sampling methods of Gelman & Meng (1998) and outperforms ISMC, MCMC and RLR. It also does not rely on simplifying assumptions, such as ignoring spatio-temporal dependence in the process. A thorough investigation is made of the application of IMCS to the three-parameter Autologistic model. This work introduces background computations required for the full implementation of the four-tier model in Chapter 7. Two different extensions of the three-tier model to a four-tier version are investigated. The first extension incorporates temporal dependence in the underlying spatio-temporal process. The second extensions allows the successes and failures in the data layer to depend on time. The MCMC computational method is extended to incorporate the extra layer. A major contribution of the thesis is the development of a fully Bayesian approach to inference for these hierarchical models for the first time. Note: The author of this thesis has agreed to make it open access but invites people downloading the thesis to send her an email via the 'Contact Author' function.
Resumo:
Values are fundamental to human activity. What makes us distinctive is our ability to understand the challenges we face in life, and to make choices about how to respond. Yet, as the Cheshire Cat from Lewis Carroll’s Alice’s Adventures in Wonderland observed, if we don’t care about how we make such choices, the outcome of our decision-making is diminished. Values education is a broad, complex and controversial area, and, while it has shifted in emphasis and focus, it continues to be an essential part of many education systems. For example, some international education systems are exploring the links between values education and student wellbeing. In Australia, the values basis for ethical behaviour is receiving emphasis as a general capability, or important component of education, that can be developed across the curriculum. Indeed, some syllabus and policy documents require that particular values are emphasised, while numerous schools aim to inculcate and foster a range of personal social, moral and spiritual values in their students, many of which are shared by members of the wider community. However, because values are also contested in the community, values education involves the exploration of controversial issues. Similarly, values education explores the underlying belief systems of different world views and how they influence value commitments, ways of behaving, and interfaith understanding in today’s globalised world. This chapter explores the significance and teaching possibilities of values, controversial issues and interfaith understanding.
Resumo:
In this world of continuous change, there’s probably one certainty: more change lies ahead. Our students will encounter challenges and opportunities that we can’t even imagine. How do we prepare our students as future citizens for the challenges of the 21st century? One of the most influential public intellectuals of our time, Howard Gardner, suggests that in the future individuals will depend to a great extent on the capacity to synthesise large amounts of information. ‘They will need to be able to gather together information from disparate sources and put it together in ways that work for themselves and can be communicated to other persons’(Gardner 2008, p. xiii). One of the first steps in ‘putting things together’ so they ‘work’ in the mind is ‘to group objects and events together on the basis of some similarity between them’ (Lee & das Gupta 1995, p. 116). When we do this and give them a collective name, we are conceptualising. Apart from helping to save our sanity by simplifying the vast amounts of data we encounter every day, concepts help us to understand and gain meaning from what we experience. Concepts are essential for synthesising information and they also help us to communicate with others. Put simply, concepts serve as building blocks for knowledge, understanding and communication. This chapter addresses the importance of teaching and learning about concepts and conceptual development in studies of society and environment. It proceeds as follows: first, it considers how individuals use concepts, and, second, it explores the characteristics of concepts; the third section presents a discussion of approaches that might be adopted by teachers intending to help their students build concepts in the classroom.
Resumo:
Like other nations, Australia has experienced significant change in the past few decades as its society has become increasingly diverse. The new cultures and traditions that result from ethnic and religious diversity have both enriched Australian society and presented it with some challenges. Other challenges have resulted from increased globalisation. For example, the economic fallout from the recent global financial crisis indicates that global issues can impact across a range of levels, from multinational corporations and nation-states to local sites and individual livelihoods. Some suggest that Australia fared better than other nations during this economic crisis because of its export trade with China. Although this is disputed by economists, it highlights another facet of change that is impacting on Australian society and this relates to Australia’s growing engagement with the nations of Asia. There is increasing awareness in education systems that if young people are to achieve their potential as future citizens they need to be able to negotiate the cultural, social, political and economic ties that connect them to the global and regional community through work, leisure and citizenship. Multicultural education, global studies and studies of Asia play a particular part in helping young people to: • appreciate cultural diversity within and beyond their own nation • imagine with some accuracy how others view their world • participate in shaping a better future. This chapter explores the origins, distinctions and common features of each approach.
Resumo:
The lives of gifted young adolescents are often subject to adult-generated and expert narratives that can impact a developing sense of self. However, opportunities for gifted young adolescents to represent themselves as informants can emerge through digital forms of qualitative research. This paper reports on the value of digital writing of journal entries, delivered by email to a researcher over several months, as an alternative to face-to-face interviews. Journaling methods combined with techniques of 'listening for voices' can support young adolescents in generating their own multi-vocal narratives of self. This method capturing self-narratives in email form has the potential to produce rich understandings of individual young adolescents' self-constructions.
Resumo:
This paper takes the position that children are at risk of being marginalised when research methods are not tailored to their requirements. In particular, children who are negotiating early adolescence are presented as an ideal group for involvement with narrative research approaches that attempt to be flexible and creative. With the premise that the need to juggle multiple realities within complex societal structures is challenging and isolating for such children, narrative methods offer a promising mode of access to their individual realities. Children's own self-narratives in the form of email journal entries are proposed as research tools that can help to minimise issues arising from resistance to adults and problems of shared vocabulary that may occur using more traditional methods. Digital journaling, as a means of capturing self-narratives, can provide a convenient space for young people to generate and share their own personal accounts of their lives and their experiences that can also serve to inform others. Guidelines are offered for how to manage a journaling project that is not reliant on children's physical presence within school settings. Digital journals are thus described as multi-function mechanisms that can support personal growth as well as promote shared understandings and social fairness between adults and children.