981 resultados para collaborative leadership
Resumo:
A video detailing our new virtual world BPMN process modelling tool developed by Erik Poppe. Enables better situational awareness via use of remotely connected avatars and a shared 3D process diagram.
Resumo:
There is an increasing expectation that early childhood teachers will be pedagogical leaders, particularly in a global context of curriculum reform. This paper reports on the distributed leadership experiences of early childhood teachers’ during the 2003 Preparatory Year (Prep) trial in Queensland, Australia. In 2010, 13 of the first Prep teachers participated in interviews to discuss their definitions of leadership and reflect on the opportunities they had to lead curriculum development during and since the 2003 trial. Data were examined using a conceptual framework based on the work of Woods et al. (2004), with a focus on the structural and agential aspects of distributed leadership. Participants identified a range of contextual influences, challenges, skills and enabling strategies that illustrate the complexities in leading curriculum.
Resumo:
This paper reports the findings of an in-depth literature review, which was designed as the first phase of a study that ultimately aims to rank the importance of key governance mechanisms on collaborative construction projects, in terms of impact on value-for-money. The absence of such information in the global knowledge base has prompted the current study. Seminal research completed recently concluded that deductive evidence with regard to the performance outcomes of collaborative procurement mechanisms is currently limited (Eriksson and Westerberg 2011). The authors aim to address this gap in current understanding. The literature review identifies key features of both formal and informal mechanisms which have been applied within collaborative contracting contexts. The literature review lays a solid foundation for designing a deductive research strategy to be implemented in the second phase of the study, which will employ a large-scale quantitative survey to shed light on the governance structures of collaborative contracts, and the ways in which they impact on realisation of VfM during project delivery in the Australian infrastructure industry. The current paper aims to identify the main categories of formal and informal governance mechanisms currently being employed globally. This will provide structure for the development of the survey in the second phase of the study.
Resumo:
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As smartphones become host for sensitive data and applications, extended malware detection mechanisms are necessary complying with the corresponding resource constraints. The contribution of this paper is twofold. First, we perform static analysis on the executables to extract their function calls in Android environment using the command readelf. Function call lists are compared with malware executables for classifying them with PART, Prism and Nearest Neighbor Algorithms. Second, we present a collaborative malware detection approach to extend these results. Corresponding simulation results are presented.
Resumo:
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.
Collaborative research into the affordances of place for primary school children’s literacy learning
Resumo:
In the context of culturally diverse high poverty areas of Australia, we have conducted collaborative research with teachers and students in a primary school for more than a decade. Teachers have been exploring the affordances of place‐based pedagogies (Gruenewald & Smith, 2008) for the development of students’ spatial literacies and their understandings of the politics of places and built environments (Comber, Nixon, Ashmore, Loo & Cook, 2006; Comber, Thomson and Wells, 2001). This paper reports on a project in which the affordances of placedbased pedagogy are being explored through teacher inquiries and classroom‐based design experiments (Cobb, Confrey, di Sessa, Lehrer & Schauble, 2003). Located within a large‐scale urban renewal project in which houses are being demolished and families relocated, the original school has been replaced by a larger school that serves a population from a wider area. In this paper we draw on the study to consider the challenges of working with teachers and primary school students to study innovative ideas and practices in educational research. Specifically we consider issues raised by collaborative studies of the affordances of cross curricular projects focusing on social and environmental change to engage students in academic learning and expand their literate repertoires in a changing policy climate.
Resumo:
Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation platform ( NeSSi 2 ). Built-in functionalities include dynamic group formation based on node preferences, group-internal communication, group management and an approach for handling the infection process for malware-based attacks. The CIDE simulation environment provides functionalities for easy implementation of collaborating nodes in large-scale setups. We evaluate the group communication mechanism on the one hand and provide a case study and evaluate our collaborative security evaluation platform in a signature exchange scenario on the other.
Resumo:
This article explores the role of principal leadership in creating a thinking school. It contributes to the school leadership literature by exploring the intersection of two important areas of study in education - school leadership and education for thinking - which is a particularly apt area of study, because effective school leadership is crucial if students are to learn to be critical and creative thinkers, yet this connection has not be widely investigated. We describe how one principal, Hinton, turned around an underperforming school by using critical and creative philosophical thinking as the focus for students, staff and parents. Then, drawing on the school leadership literature, the article describes seven attributes of school leadership beginning with four articulated by Leithwood and colleagues (2006) (building vision and setting direction; redesigning the organisation; understanding and developing people; managing the teaching and learning program), and adding three others (influence; self-development; and responding to context). This framework is then used in a case study format in a collaboration between practitioner and researchers to first explore evidence from empirical studies and personal reflection about Hinton's leadership of Buranda State School, and second to illuminate how these general features of school leadership apply to creating a thinking school. Based on the case study and using the general characteristics of school leadership, a framework for leading a thinking school is described. Because the framework is based on a turnaround school, this framework has wide applicability: to schools that are doing well as an indication of how to implement a contemporary approach to curriculum and pedagogy; and to schools that are underperforming and want a rigorous, high expectation and contemporary way to improve student learning.
Resumo:
We propose CIMD (Collaborative Intrusion and Malware Detection), a scheme for the realization of collaborative intrusion detection approaches. We argue that teams, respectively detection groups with a common purpose for intrusion detection and response, improve the measures against malware. CIMD provides a collaboration model, a decentralized group formation and an anonymous communication scheme. Participating agents can convey intrusion detection related objectives and associated interests for collaboration partners. These interests are based on intrusion objectives and associated interests for collaboration partners. These interests are based on intrusion detection related ontology, incorporating network and hardware configurations and detection capabilities. Anonymous Communication provided by CIMD allows communication beyond suspicion, i.e. the adversary can not perform better than guessing an IDS to be the source of a message at random. The evaluation takes place with the help of NeSSi² (www.nessi2.de), the Network Security Simulator, a dedicated environment for analysis of attacks and countermeasures in mid-scale and large-scale networks. A CIMD prototype is being built based on the JIAC agent framework(www.jiac.de).
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
Kuwait is an oil rich country planning for a future that is not dependent on exploiting natural resources. A major policy initiative has been the introduction of Information Communication and Technology (ICT) to schools. However, contextual issues and teacher capabilities in the use of ICT have limited the success of this initiative. The study examines the leadership strategies of two secondary school principals whose schools have achieved this goal. The case study draws on intensive data collected through interviews of the principals, and teachers supported by document analysis and observations. Analysis was guided by theoretical perspectives drawn from the literature which identified a range of strategies used by the principals to manage change. The principals of Schools A and B employed three key strategies to maximise the impact on the teaching staff incorporating ICT into their teaching and learning practices. These strategies were: (a) encouragement for teaching staff to implement ICT in their teaching; (b) support to meet the material and human needs of teaching staff using ICT; and (c) provision of instructions and guidance for teaching staff in how and why such behaviours and practices should be performed. The outcome of this study proposes an innovative change leadership model that informs emerging countries, which are also undergoing major change related to ICT. However, the study also revealed limitations in the implementation of ICT in the classroom and provides insights into further strategies that principals need to adopt.
Resumo:
This paper explores concepts of desire and rhizomatic working through a series of intergenerational collaborative drawing episodes. Particularly, mother/daughter relationships are examined via drawings created by the author and her young daughter. Drawings hold on their surface unpredictable connections to things experienced, known, conceptualized and imagined. In the context of this paper desire is seen to drive adults and children into expressing and making a mark, to make an imprint. Here, the prompts that inform a drawing are regarded as a rhizomatic network of chaotic actions and thoughts that connect each drawer to the tools, the paper and each other in unpredictable and mutable ways. The paper concludes by discussing how these intergenerational collaborative drawing episodes offer opportunities to re-imagine relationships, communications and learning in early childhood education.
Resumo:
The nonprofit funding landscape is in flux. Many organisations are having to think differently and develop fresh skills either to enter the fundraising market or to cope better with rising competition for community and corporate support. This new reality affects boards, CEOs and fundraisers alike. Against this backdrop, our exploratory study aimed to build an evidence base and spark more discussion about: - the role Australian nonprofit CEOs and boards play in supporting fundraising/development; - current engagement levels; and - perceptions of leadership in fundraising from two possibly contrasting perspectives: NP leaders (board members and CEOs); and fundraisers. This research has been supported by the Perpetual Foundation, the EF and SL Gluyas Trust and the Edward Corbould Charitable Trust under the management of Perpetual Trustee Company Ltd.
Resumo:
This paper addresses the question of how to open up pathways and build capacity to facilitate the movement towards sustainable sub-tropical cities. The focus is on outlining a collaborative planning and co-design process that can help catalyse the emergence of sustainable place-habitats and so re-weave and colour anew the tapestry of our sub-tropical cities. Cities are portrayed as self-organising complex adaptive system phenomena, being constantly re-shaped by local and global social-political, environmental, cultural and economic forces as well as planning regimes. While constructing a sustainable city is at essence a design process incorporating new sustainable practices and legislation to reinforce their use, these steps are necessary but not sufficient. Sustainable sub-tropical city-making could be re-thought as a dreaming-re-storying process. This paper explores a new co-design process, which can channel collaborative efforts around re-inventing sustainable place-habitats across the cityscape. A further outcome of this co-design process is the alignment of the emergent design principles and planning actions that can trigger the re-storying of a new sustainable sub-tropical city. Besides a new co-design process, we also advocate the building of sub-tropical city learning networks to facilitate the cross-fertilization for Dreaming sustainable sub-tropical cities.