914 resultados para Computer security - Employees - Certification


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Reviews the book 'Asia Pacific Security Outlook 2000,' edited by Richard W. Baker and Charles M. Morrison.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the use of technological devices in everyday environments becomes more prevalent, it is clear that access to these devices has become an important aspect of occupational performance. Children are increasingly required to competently manipulate technology such as the computer to fulfil occupational roles of student and player. Occupational therapists are in a position to facilitate the successful interface between children and standard computer technologies. The literature has supported the use of direct manipulation interfaces in computing that requires mastery of devices such as the mouse. Identification of children likely to experience difficulties with mouse use will inform the development of appropriate methods of intervention promoting mouse skill and further enhance participation in occupational tasks. The aim of this paper is to discuss the development of an assessment of mouse proficiency for children. It describes the construction of the assessment, the content of the test, and its content validity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper describes the inception, planning and first delivery of a security course as part of a postgraduate ecommerce program. The course is reviewed in terms of existing literature on security courses, the common body of knowledge established for security professionals and the job market into which students will graduate. The course described in this paper is a core subject for the e-commerce program. This program was established in 1999 and the first batch of students graduated in 2001. The program is offered at both postgraduate and undergraduate level. The work described here relates to the postgraduate offering. Students on this program are graduates of diverse disciplines and do not have a common e-commerce or business background.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines occupational performance in Australia across three racial groups in Australia: Indigenous Australians; Asian people, defined as all those whose language spoken at home was either Chinese, Vietnamese or other forms of a South-east or East Asian language; and white people, defined as the residual category. The paper has as its starting point, observed differences in occupational attainment among the three groups in Australia and sets out to account for these observed differences on the basis of both race and non-racial attributes such as, age, education and area of residence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article tells about the relationship between resource politics and security in international relations. Using the Mekong River Basin as its case study, the article examines the place of resource and development issues in attempts to develop regional institutions. The question of whether a resource development regime with apparently low productivity in terms of technical output, but high levels of resilience and longevity, should be considered a failure or not, is considered. This question is examined within the broader context of Southeast Asian politics during the First, Second, and Third Indochina conflicts as well as the post-cold war era. The article argues that survival and a capacity to change to meet the challenges of extreme broader events are clear evidence of regime success. From this standpoint, the article explores ways in which the Mekong resource regime is linked to more general concerns for political security and stability and may in fact reflect political concerns for subregional neighborhood maintenance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper outlines research on the processes taking place within the coal mineral matter at high temperatures and development of the relationship between ash fusion temperatures (AFT) and phase equilibria of the coal ash slags. A new thermodynamic database for the Al-Ca-Fe-O-Si system developed by the author was used in conjunction with the thermodynamic computer package F*A*C*T for these purposes. In addition, high temperature experimental studies were undertaken that involved heat treatment and quenching of the ash cones followed by the analyses using different techniques. The study provided new information on the processes taking place during AFT test and demonstrated the validity of the AFTs predictions with F*A*C*T. Examples of practical applications of the AFT prediction method are given in the paper. The results of this study are important not only for the AFT predictions, but also in general for the application of phase equilibrium science to the characterisation of the coal mineral matter interactions at high temperature. (C) 2002 Elsevier Science Ltd. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Thomas & Tow's evaluation of the utility of human security is an important contribution to an ongoing debate about what security is and for whom security should be provided. In particular, the authors' engagement with the human security agenda is important given the centrality of this approach to recent attempts to rethink security. This article argues, however, that Thomas & Tow's approach to the human security agenda is problematic for two central reasons. First, their attempt to narrow security to make this approach amenable to state policymakers risks reifying the sources of insecurity for individuals everywhere. Second, the conception of human security they put forward appears largely inconsistent with the normative concerns inherent in the human security agenda.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study integrated the research streams of computer-mediated communication (CMC) and group conflict by comparing the expression of different types of conflict in CMC groups and face-to face (FTF) groups over time. The main aim of the study was to compare the cues-filtered-out approach against the social information processing theory A laboratory study was conducted with 39 groups (19 CMC and 20 FTF) in which members were required to work together over three sessions. The frequencies of task, process, and relationship conflict were analyzed. Findings supported the social information processing theory. There was more process and relationship conflict in CMC groups compared to FTF groups on Day 1. However, this difference disappeared on Days 2 and 3. There was no difference between CMC and FTF groups in the amount of task conflict expressed on any day.