912 resultados para ”we” identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper presents background of our research and result of our pilot study to find methods for convincing building users to become active building participants. We speculate this is possible by allowing and motivating users to customise and manage their own built environments. The ultimate aim of this research is to develop open, flexible and adaptive systems that bring awareness to building users to the extent they recognise spaces are for them to change rather than accept spaces are fixed and they are the ones to adapt. We argue this is possible if the architectural hardware is designed to adapt to begin with and more importantly if there are appropriate user interfaces that are designed to work with the hardware. A series of simple prototypes were made to study possibilities through making, installing and experiencing them. Ideas discussed during making and experiencing of prototypes were evaluated to generate further ideas. This method was very useful to speculate unexplored and unknown issues with respect to developing user interfaces for active buildings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research related to personal epistemology in teacher education indicates that teachers’ beliefs about knowing and learning influence their pedagogical practices. In the current study, we interviewed 31 child care students to investigate the relationship between personal epistemology and beliefs about children’s learning as they engaged in teaching practices with young children. We drew on self authorship theory to analyze this data, which considers the evolving capacity of learners to analyze and make informed judgments about knowledge (personal epistemology)in the light of their professional identity (intrapersonal beliefs) and interdependent social relationships (interpersonal beliefs). The majority of students described practical personal epistemologies which involved either modeling, reflection on, or evaluation of practical strategies. These epistemologies have implications for child care teachers’ professional identities and their relationships with families, children, and staff in child care contexts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background:  The aims of this study were to determine the documentation of pharmacotherapy optimization goals in the discharge letters of patients with the principal diagnosis of chronic heart failure. Methods:  A retrospective practice audit of 212 patients discharged to the care of their local general practitioner from general medical units of a large tertiary hospital. Details of recommendations regarding ongoing pharmacological and non-pharmacological management were reviewed. The doses of medications on discharge were noted and whether they met current guidelines recommending titration of angiotensin-converting enzyme inhibitors and beta-blockers. Ongoing arrangements for specialist follow up were also reviewed. Results:  The mean age of patients whose letters were reviewed was 78.4 years (standard deviation ± 8.6); 50% were men. Patients had an overall median of six comorbidities and eight regular medications on discharge. Mean length of stay for each admission was 6 days. Discharge letters were posted a median of 4 days after discharge, with 25% not posted at 10 days. No discharge letter was sent in 9.4% (20) of the cases. Only six (2.8%) letters had any recommendations regarding future titration of angiotensin-converting enzyme inhibitors and 6.6% (14) for beta-blockers. Recommendations for future non-pharmacological management, for example, diuretic action plans, regular weight monitoring and exercise plans were not found in the letters in this audit. Conclusion:  Hospital discharge is an opportunity to communicate management plans for treatment optimization effectively, and while this opportunity is spurned, implementation gaps in the management of cardiac failure will probably remain.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Assessment for Learning is a pedagogical practice with anticipated gains of increased student motivation, mastery and autonomy as learners develop their capacity to monitor and plan their own learning progress. Assessment for Learning (AfL) differs from Assessment of learning in its timing, occurring within the regular flow of learning rather than end point, in its purpose of improving student learning rather than summative grading and in the ownership of the learning where the student voice is heard in judging quality. Since Black and Wiliam (1998) highlighted the achievement gains that AfL practices seem to bring to all learners in classrooms, it has become part of current educational policy discourse in Australia, yet teacher adoption of the practices is not a straightforward implementation of techniques within an existing classroom repertoire. As can be seen from the following meta-analysis, recent research highlights a more complex interrelationship between teacher and student beliefs about learning and assessment, and the social and cultural interactions in and contexts of the classroom. More research is needed from a sociocultural perspective that allows meaning to emerge from practice. Before another policy push, we need to understand better the many factors within the assessment relationship. We need to hear from teachers and students through long-term AfL case studies both to inform AfL theory and to shed light on the complexities of pedagogical change for enhancing learner autonomy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The bulk of the homicide research to date has focused on male offending, with little consideration given to women's offending and in particular, their constructions within the courtroom following a homicide-related charge. This thesis examines, in detail, nineteen homicide cases finalised in the Queensland Supreme Courts between 01/01/1997 and 31/12/2002, in order to document and discuss the various legal stories available to women who kill. Predominantly, two “stock stories” are available within the court. The first, presented by the defence, offers the accused woman a victimised position to occupy. Evidence of victimisation is made available through previous abuse, expert testimony from psychologists and psychiatrists, challenges to her mental health, or appeals to her emotional nature. The second stock story, presented by the prosecution, positions the accused woman as angry, full of revenge, calculating and self serving. Such a script is usually supported by witnesses, police evidence, and family members. This thesis examines these competing and contradictory scripts using thematic discourse analysis to examine the court transcripts in detail. It argues that the "truth" of the fatal incident is based on one of these two prevailing scripts. This research destabilises the dominant script of violent female offending in the feminist literature. Most research to date has focussed on explaining the circumstances in which women kill, concentrating attention on the victimisation of the violent offending woman and negating or de-prioritising any volition on her part. By analysing all transcripts of women whose trials were held within the specified period, this research is able to demonstrate the stories used to describe their complex offending, and draw attention to the anger and intent that can occur alongside the victimisation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Public relations educators need new solutions to prepare students to become tomorrow's practitioner today. Managers and employers in the new creative workforce (McWilliam, 2008) expect graduates to be problem solvers, critical and creative thinkers, reflective, and self reliant (Barrie, 2008; David, 2004). Enabling students to develop these attributes requires a collaborative and creative approach to pedagogy (Jeffrey & Craft, 2001, 2004). A model for the next generation of public relations education was developed to integrate industry partnerships as a way to bridge pedagogy and professional practice. The model suggests (a) that industry partnerships be embedded in learning activities, (b) that assessment items be considered on a continuum and delivered incrementally across a course of study, and (c) that connections between classroom and workplace activities are clearly signposted for students.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract]: Traditional technology adoption models identified ‘ease of use’ and ‘usefulness’ as the dominating factors for technology adoption. However, recent studies in healthcare have established that these two factors are not always reliable on their own and other factors may influence technology adoption. To establish the identity of these additional factors, a mixed method approach was used and data were collected through interviews and a survey. The survey instrument was specifically developed for this study so that it is relevant to the Indian healthcare setting. We identified clinical management and technological barriers as the dominant factors influencing the wireless handheld technology adoption in the Indian healthcare environment. The results of this study showed that new technology models will benefit by considering the clinical influences of wireless handheld technology, in addition to known factors. The scope of this study is restricted to wireless handheld devices such as PDAs, smart phones, and handheld PCs Gururajan, Raj and Hafeez-Baig, Abdul and Gururajan, Vijaya

Relevância:

20.00% 20.00%

Publicador:

Resumo:

When an artist is put in charge of a city, he will use the town as his canvas. Edi Rama became Mayor of Tirana in 2000 and since them has undertaken an unusual and colourful renewal program for the Albania capital.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the cloning and characterization of a new member of the vascular endothelial growth factor (VEGF) gene family, which we have designated VRF for VEGF-related-factor. Sequencing of cDNAs from a human fetal brain library and RT-PCR products from normal and tumor tissue cDNA pools indicate two alternatively spliced messages with open reading frames of 621 and 564 bp, respectively. The predicted proteins differ at their carboxyl ends resulting from a shift in the open reading frame. Both isoforms show strong homology to VEGF at their amino termini, but only the shorter isoform maintains homology to VEGF at its carboxyl terminus and conserves all 16 cysteine residues of VEGF165. Similarity comparisons of this isoform revealed overall protein identity of 48% and conservative substitution of 69% with VEGF189. VRF is predicted to contain a signal peptide, suggesting that it may be a secreted factor. The VRF gene maps to the D11S750 locus at chromosome band 11q13, and the protein coding region, spanning approximately 5 kb, is comprised of 8 exons that range in size from 36 to 431 bp. Exons 6 and 7 are contiguous and the two isoforms of VRF arise through alternate splicing of exon 6. VRF appears to be ubiquitously expressed as two transcripts of 2.0 and 5.5 kb; the level of expression is similar among normal and malignant tissues.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report details the findings of the Food Literacy Delphi Study. This study was the first of three studies commissioned by Health Promotion Queensland, Queensland Health. It examines the views of experts from around Australia about food literacy; its meaning, potential components and relationship to nutrition.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

CCTV and surveillance networks are increasingly being used for operational as well as security tasks. One emerging area of technology that lends itself to operational analytics is soft biometrics. Soft biometrics can be used to describe a person and detect them throughout a sparse multi-camera network. This enables them to be used to perform tasks such as determining the time taken to get from point to point, and the paths taken through an environment by detecting and matching people across disjoint views. However, in a busy environment where there are 100's if not 1000's of people such as an airport, attempting to monitor everyone is highly unrealistic. In this paper we propose an average soft biometric, that can be used to identity people who look distinct, and are thus suitable for monitoring through a large, sparse camera network. We demonstrate how an average soft biometric can be used to identify unique people to calculate operational measures such as the time taken to travel from point to point.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.