963 resultados para Security token service
Resumo:
While there is growing use of online counselling, little is known about its interactional organisation and how it compares to telephone counselling. This is despite past research suggesting that both counsellors and clients report the impact of the different modalities on the presentation and management of the counselling interaction. This paper compares the interactional affordances of telephone and online web counselling in opening sequences on Kids Help Line, a 24-hour Australian counselling service for children and young people up to the age of 25. We examine two ways that counsellors show active listening through response tokens and formulations. The analysis describes how counsellors’ use of minimal response tokens facilitate the clients’ problem presentation and are used in the management of turn taking and sequence organisation. For example, counsellors use the response token Mm hm to show that they understand that the client’s unit of talk to is not yet complete, and to affirm or invite the client to continue speaking. Formulations in phone and web counselling are another way that counsellors display active listening to re-present stretches of the clients’ preceding talk. In phone and web counselling, however, the respective modalities can complicate matters of turn transition and sequence organisation. By examining actual phone and online counselling sessions, this paper offers empirical demonstrations of the interactional affordances of phone and online counselling, and shows how the institutional practice of active listening is accomplished across different counselling modalities
Resumo:
Action research proved a useful strategy for monitoring the evolution of microteaching task as an authentic assessment for post-graduate pre-service teachers. Through four iterations of continually reflecting on the structure, purpose and outcomes of utilising microteaching as assessment, unit coordinators implemented an authentic assessment task that simulated real world experience.
Resumo:
With service interaction modelling, it is customary to distinguish between two types of models: choreographies and orchestrations. A choreography describes interactions within a collection of services from a global perspective, where no service plays a privileged role. Instead, services interact in a peer-to-peer manner. In contrast, an orchestration describes the interactions between one particular service, the orchestrator, and a number of partner services. The main proposition of this work is an approach to bridge these two modelling viewpoints by synthesising orchestrators from choreographies. To start with, choreographies are defined using a simple behaviour description language based on communicating finite state machines. From such a model, orchestrators are initially synthesised in the form of state machines. It turns out that state machines are not suitable for orchestration modelling, because orchestrators generally need to engage in concurrent interactions. To address this issue, a technique is proposed to transform state machines into process models in the Business Process Modelling Notation (BPMN). Orchestrations represented in BPMN can then be augmented with additional business logic to achieve value-adding mediation. In addition, techniques exist for refining BPMN models into executable process definitions. The transformation from state machines to BPMN relies on Petri nets as an intermediary representation and leverages techniques from theory of regions to identify concurrency in the initial Petri net. Once concurrency has been identified, the resulting Petri net is transformed into a BPMN model. The original contributions of this work are: an algorithm to synthesise orchestrators from choreographies and a rules-based transformation from Petri nets into BPMN.
Resumo:
An examination of Information Security (IS) and Information Security Management (ISM) research in Saudi Arabia has shown the need for more rigorous studies focusing on the implementation and adoption processes involved with IS culture and practices. Overall, there is a lack of academic and professional literature about ISM and more specifically IS culture in Saudi Arabia. Therefore, the overall aim of this paper is to identify issues and factors that assist the implementation and the adoption of IS culture and practices within the Saudi environment. The goal of this paper is to identify the important conditions for creating an information security culture in Saudi Arabian organizations. We plan to use this framework to investigate whether security culture has emerged into practices in Saudi Arabian organizations.
Resumo:
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.
Resumo:
There has been an extended engagement with how young people experience policing, with a focus on the intersection between policing and indigeneity, ethnicity, gender, and social class. Interestingly, sexuality and/or gender diversity has been almost completely overlooked, both nationally and internationally. This paper reports on LGBT youth service providers’ accounts about police and LGBT young people interactions. It overviews the outcomes of semi-structured interviews with key LGBT youth service providers in different regions of Brisbane, Queensland. As the first qualitative engagement with these issues from the perspective of service providers, it highlights not only how LGBT young people experience policing, but also how service providers need to ‘work the system’ of policing to produce the best outcomes for LGBT young people.
Resumo:
Background: There are indications that pre-hospital emergency care and management of patients can help reduce the demand for hospital emergency departments (EDs). Ambulance services play a significant role at this stage of care. In 2003, the Queensland Government introduced a Community Ambulance Cover (CAC) levy in return for a free ambulance service at the point of access to all Queenslanders. This may have led to the impression in consumers of an entitlement to free ambulance services under any circumstances regardless of the urgency of the matter which may have in turn contributed to the crowding of EDs in Queensland. Objectives: This paper aims to answer the following questions: - How many patients arrive at hospital EDs by ambulance in Queensland, compared to other modes of arrival? - How has this changed over time, particularly after the CAC introduction in 2003? What percentage of ambulance arrivals are urgent ED patients? - Has the perceived free ambulance services created extra demand for EDs in Queensland, compared with other Australian jurisdictions that charge patients for ambulance services? Methods: We will secondary analyse the data from sources such as Queensland Ambulance Services, Department of Health and Australian Bureau of Statistics to answer the research questions. Findings and Conclusions Queensland has the highest utilization rate of ambulance services (about 18% in 2007-08) and the highest annual growth rate in demand for these services (7.7% on average since 2000-01), well above the population growth. On the other hand, the proportion of ED patients arriving by ambulance in Queensland has increased by about 4% annually. However, when compared with other states and territories with charge at the point of access, it seems that the growth in demand for EDs cannot be explained solely or mainly by CAC or ambulance utilisation in Queensland.
Resumo:
People with intellectual disability are a relatively new but growing minority group within Australia's ageing population. Disability policies point to the equal right of people with disabilities to a quality of life similar to that of other citizens. Disability services are increasingly required to provide individualised and responsive services, irrespective of age, for people with lifelong disabilities. The present study explored the everyday lives of older people with intellectual disability in Victoria and Queensland, examining their experiences of using disability services and the ways in which services responded to their ageing. The aim of the study was to inform practice and service development for older people with intellectual disability. The findings suggest that services facilitate important social relationships with other service users and staff. Most older people had a sense of belonging and led busy but directionless lives in two disconnected worlds. Their lives were subject to significant external present-focused control. Yet, despite this, neither services nor family members took responsibility for ensuring their sense of continuity or supporting the development of plans about their future. The experiences described suggest an urgent need for, but significant challenges in the implementation of, holistic indivdualised planning similar to the UK concept of person-centred planning.
Resumo:
We argue that web service discovery technology should help the user navigate a complex problem space by providing suggestions for services which they may not be able to formulate themselves as (s)he lacks the epistemic resources to do so. Free text documents in service environments provide an untapped source of information for augmenting the epistemic state of the user and hence their ability to search effectively for services. A quantitative approach to semantic knowledge representation is adopted in the form of semantic space models computed from these free text documents. Knowledge of the user’s agenda is promoted by associational inferences computed from the semantic space. The inferences are suggestive and aim to promote human abductive reasoning to guide the user from fuzzy search goals into a better understanding of the problem space surrounding the given agenda. Experimental results are discussed based on a complex and realistic planning activity.
Resumo:
Community service learning is the integration of experiential learning and community service into coursework such that community needs are met and students gain both professional skills and a sense of civic responsibility. A critical component is student reflection. This paper provides an example of the application of community service learning within an undergraduate health unit at the Queensland University of Technology. Based on survey data from 36 program participants, it demonstrates the impact of CSL on student outcomes. Results show that students benefited by developing autonomy through real world experiences, through increased self-assurance and achievement of personal growth, through gaining new insights into the operations of community service organisations and through moving towards becoming responsible citizens. Students expect their CSL experience to have long-lasting impact on their lives, with two-thirds of participants noting that they would like to continue volunteering as part of their future development.
Resumo:
Service-orientation has gained widespread acceptance and is increasingly being employed as a paradigm for structuring both business and IT architectures. An earlier study of extant service analysis and design methodologies discovered a need for holistic approaches that equally account for both business and software services, which motivated the design of a new, consolidated service analysis and design methodology. A challenge in design-oriented research is to evaluate the utility of the newly created artefacts (here: the methodology), as they are often intended to become part of complex socio-technical systems. Therefore, after presenting a brief overview of the consolidated methodology, the paper discusses possible approaches for the “evaluate” phase of this design-science research process and presents the results of an empirical evaluation conducted in an Action Research study at one of Australia’s largest financial services providers.
Resumo:
Services in the form of business services or IT-enabled (Web) Services have become a corporate asset of high interest in striving towards the agile organisation. However, while the design and management of a single service is widely studied and well understood, little is known about how a set of services can be managed. This gap motivated this paper, in which we explore the concept of Service Portfolio Management. In particular, we propose a Service Portfolio Management Framework that explicates service portfolio goals, tasks, governance issues, methods and enablers. The Service Portfolio Management Framework is based upon a thorough analysis and consolidation of existing, well-established portfolio management approaches. From an academic point of view, the Service Portfolio Management Framework can be positioned as an extension of portfolio management conceptualisations in the area of service management. Based on the framework, possible directions for future research are provided. From a practical point of view, the Service Portfolio Management Framework provides an organisation with a novel approach to managing its emerging service portfolios.
Resumo:
This position paper examines the development of a dedicated service aggregator role in business networks. We predict that these intermediaries will soon emerge in service ecosystems and add value through the application of dedicated domain knowledge in the process of creating new, innovative services or service bundles based on the aggregation, composition, integration or orchestration of existing services procured from different service providers in the service ecosystem. We discuss general foundations of service aggregators and present Fourth-Party Logistics Providers as a real-world example of emerging business service aggregators. We also point out a demand for future research, e.g. into governance models, risk management tools, service portfolio management approaches and service bundling techniques, to be able to better understand core determinants of competitiveness and success of service aggregators.
Resumo:
A method of improving the security of biometric templates which satisfies desirable properties such as (a) irreversibility of the template, (b) revocability and assignment of a new template to the same biometric input, (c) matching in the secure transformed domain is presented. It makes use of an iterative procedure based on the bispectrum that serves as an irreversible transformation for biometric features because signal phase is discarded each iteration. Unlike the usual hash function, this transformation preserves closeness in the transformed domain for similar biometric inputs. A number of such templates can be generated from the same input. These properties are illustrated using synthetic data and applied to images from the FRGC 3D database with Gabor features. Verification can be successfully performed using these secure templates with an EER of 5.85%
Resumo:
The first Workshop on Service-Oriented Business Networks and Ecosystems (SOBNE ’09) is held in conjunction with the 13th IEEE International EDOC Conference on 2 September 2009 in Auckland, New Zealand. The SOBNE ’09 program includes 9 peer-reviewed papers (7 full and 2 short papers) and an open discussion session. This introduction to the Proceedings of SOBNE ’09 starts with a brief background of the motivation for the workshop. Next, it contains a short description of the peer-reviewed papers, and finally, after some concluding statements and the announcement of the winners of the Best Reviewer Award and the Most Promising Research Award, it lists the members of the SOBNE ’09 Program Committee and external reviewers of the workshop submissions.