911 resultados para Security Studies


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Open and Trusted Health Information Systems (OTHIS) Research Group has formed in response to the health sector’s privacy and security requirements for contemporary Health Information Systems (HIS). Due to recent research developments in trusted computing concepts, it is now both timely and desirable to move electronic HIS towards privacy-aware and security-aware applications. We introduce the OTHIS architecture in this paper. This scheme proposes a feasible and sustainable solution to meeting real-world application security demands using commercial off-the-shelf systems and commodity hardware and software products.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

I would argue that the problems that contemporary capitalism gives rise to are not the result of the classic exercise of power and hegemony characteristic of the monopoly phase of capitalism but of the “creative destruction” of such a phase. Schumpeter’s famous phrase is reflective of Lash and Urry’s (1987) notion of “disorganised capitalism” or of Robert Reich’s (2007) claim that large corporations have significantly less power now than three decades ago. The consequence is that there is a need to explore an economic “middle way” in debates about the narrative of the relationship between culture and economy, between the Scylla of total explanatory political economy and the Charybdis of tedium-by-case-study. This involves a Schumpeterian emphasis on entrepreneurial or enterprise economics (Cunningham, Banks, and Potts 2008). Schumpeter, in 1962, in Capitalism, Socialism and Democracy, argued that Marx had “no adequate theory of enterprise” and failed to “distinguish the entrepreneur from the capitalist” (quoted in McCraw 2007: 349). Schumpeter, his most recent biographer, Thomas McCraw, “told of capitalism in the way most people experience it: as consumer desires aroused by endless advertising; as forcible jolts up and down the social pecking order; as goals reached, shattered, altered, then reached once more as people try, try again.” He knew that “creative destruction fosters economic growth but also that it undercuts cherished human values” (p. 6). Schumpeter’s most recent biographer, Thomas McCraw, says that he elucidated what capitalism “really feels like” (as quoted in McCraw 2007: 349, 6).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The world’s population is ageing rapidly. Ageing has an impact on all aspects of human life, including social, economic, cultural, and political. Understanding ageing is therefore an important issue for the 21st century. This chapter will consider the active ageing model. This model is based on optimising opportunities for health, participation, and security in order to enhance quality of life. There is a range of exciting options developing for personal health management, for and by the ageing population, that make use of computer technology, and these should support active ageing. Their use depends however on older people learning to use computer technology effectively. The ability to use such technology will allow them to access relevant health information, advice, and support independently from wherever they live. Such support should increase rapidly in the future. This chapter is a consideration of ageing and learning, ageing and use of computer technology, and personal health management using computers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although full-term pregnancies reduce the risk of ovarian cancer, it has not been conclusively established whether incomplete pregnancies also influence risk. We investigated the relationship between a history of incomplete pregnancy and incident epithelial ovarian cancer among over 4,500 women who participated in two large Australian population-based case-control studies in 1990-1993 and 2002-2005. They provided responses to detailed questions about their reproductive histories and other personal factors. Summary odds ratios (OR) and confidence intervals (CI) derived from each study using the same covariates were aggregated. We found no significant associations between the number of incomplete pregnancies and ovarian cancer, for parous (OR = 0.98, 95% CI: 0.89, 1.08) or nulliparous (OR = 1.06, 95% CI: 0.75, 1.48) women, nor for the number of spontaneous or induced abortions and ovarian cancer for parous women (OR = 0.95, 95% CI 0.82, 1.09; OR = 1.08, 95% CI: 0.86, 1.36) or nulliparous women (OR = 1.2, 95% CI: 0.6, 2.4; OR = 0.8, 95% CI: 0.47, 1.38), respectively. A systematic review of 37 previous studies of the topic confirmed our findings that a history of incomplete pregnancy does not influence a woman’s risk of epithelial ovarian cancer.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

You’ve got a thirteen week course to take students through the most important programs in television history. The programs should be the most popular, the most successful, the most important, giving students a sense of what audiences like, what is possible in the medium, and what counts more generally as a successful television program. The course is based around screenings of the programs. Which programs are you going to choose?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The shift from 20th century mass communications media towards convergent media and Web 2.0 has raised the possibility of a renaissance of the public sphere, based around citizen journalism and participatory media culture. This paper will evaluate such claims both conceptually and empirically. At a conceptual level, it is noted that the question of whether media democratization is occurring depends in part upon how democracy is understood, with some critical differences in understandings of democracy, the public sphere and media citizenship. The empirical work in this paper draws upon various case studies of new developments in Australian media, including online- only newspapers, developments in public service media, and the rise of commercially based online alternative media. It is argued that participatory media culture is being expanded if understood in terms of media pluralism, but that implications for the public sphere depend in part upon how media democratization is defined.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis develops a critical realist explanatory critique of alternative schooling programs for youth at risk taking place at three case study sites. Throughout the thesis the author pursues the question, \Are alternative provisions of schooling working academically and socially for youth at risk?. The academic lens targets literacy learning and associated pedagogies. Social outcomes are posited as positive social behaviours and continued engagement in learning. A four phased analysis, drawing on critical realism, interpretive and subject specific theories is used to elicit explanations for the research question. An overall framework is a critical realist methodology as set out by Danermark, Ekstrom, Jakobsen and Karlsson (2002, p. 129). Consequently phase one describes the phenomena of alternative schooling programs taking place at three case study sites. This is reported first as staff narratives that are resolved into imaginable historical causal components of \generative events., \prior schooling structures., \models of alternative schooling., \purpose., \individual agency., and \relations with linked community organisations.. Then transcendental questions are posed about each component using retroduction to uncover structures, underlying mechanisms and powers, and individual agency. In the second phase the researcher uses modified grounded theory methodology to theoretically redescribe causal categories related to a \needed different teaching and administrative approach. that emerged from the previous critique. A transcendental question is then applied to this redescription. The research phenomena are again theoretically redescribed in the third phase, this time using three theoretically based constructs associated with literacy and literacy pedagogies; the NRS, the 4 Resources Model, and Productive Pedagogies. This redescription is again questioned in terms of its core or \necessary. components. The fourth phase makes an explanatory critique by comparing and critiquing all previous explanations, recontextualising them in a wider macro reality of alternative schooling. Through this critical realist explanatory critiquing process, a response emerges not only to whether alternative provisions of schooling are working, but also how they are working, and how they are not working, with realistically based implications for future improvement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Critical skills such as identifying and appreciating issues that confront firms engaging in international business, and the ability to undertake creative decision-making, are considered fundamental to the study of International Business. It has been argued that using audio-visual case studies can help develop such skills. However, this is difficult due to a lack of Australian case studies. This paper reviews the literature outlining the advantages believed to result from the use of audio-visual case studies, describes a project implemented in a large cohort of students studying International Business, reports on a pilot evaluation of the project, and outlines the findings and conclusions of the survey.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Synchronous fluorescence spectroscopy (SFS) was applied for the investigation of interactions of the antibiotic, tetracycline (TC), with DNA in the presence of aluminium ions (Al3+). The study was facilitated by the use of the Methylene Blue (MB) dye probe, and the interpretation of the spectral data with the aid of the chemometrics method, parallel factor analysis (PARAFAC). Three-way synchronous fluorescence analysis extracted the important optimum constant wavelength differences, Δλ, and showed that for the TC–Al3+–DNA, TC–Al3+ and MB dye systems, the associated Δλ values were different (Δλ = 80, 75 and 30 nm, respectively). Subsequent PARAFAC analysis demonstrated the extraction of the equilibrium concentration profiles for the TC–Al3+, TC–Al3+–DNA and MB probe systems. This information is unobtainable by conventional means of data interpretation. The results indicated that the MB dye interacted with the TC–Al3+–DNA surface complex, presumably via a reaction intermediate, TC–Al3+–DNA–MB, leading to the displacement of the TC–Al3+ by the incoming MB dye probe.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The interaction of quercetin, which is a bioflavonoid, with bovine serum albumin (BSA) was investigated under pseudo-physiological conditions by the application of UV–vis spectrometry, spectrofluorimetry and cyclic voltammetry (CV). These studies indicated a cooperative interaction between the quercetin–BSA complex and warfarin, which produced a ternary complex, quercetin–BSA–warfarin. It was found that both quercetin and warfarin were located in site I. However, the spectra of these three components overlapped and the chemometrics method – multivariate curve resolution-alternating least squares (MCR-ALS) was applied to resolve the spectra. The resolved spectra of quercetin–BSA and warfarin agreed well with their measured spectra, and importantly, the spectrum of the quercetin–BSA–warfarin complex was extracted. These results allowed the rationalization of the behaviour of the overlapping spectra. At lower concentrations ([warfarin] < 1 × 10−5 mol L−1), most of the site marker reacted with the quercetin–BSA, but free warfarin was present at higher concentrations. Interestingly, the ratio between quercetin–BSA and warfarin was found to be 1:2, suggesting a quercetin–BSA–(warfarin)2 complex, and the estimated equilibrium constant was 1.4 × 1011 M−2. The results suggest that at low concentrations, warfarin binds at the high-affinity sites (HAS), while low-affinity binding sites (LAS) are occupied at higher concentrations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Public key cryptography, and with it,the ability to compute digital signatures, have made it possible for electronic commerce to flourish. It is thus unsurprising that the proposed Australian NECS will also utilise digital signatures in its system so as to provide a fully automated process from the creation of electronic land title instrument to the digital signing, and electronic lodgment of these instruments. This necessitates an analysis of the fraud risks raised by the usage of digital signatures because a compromise of the integrity of digital signatures will lead to a compromise of the Torrens system itself. This article will show that digital signatures may in fact offer greater security against fraud than handwritten signatures; but to achieve this, digital signatures require an infrastructure whereby each component is properly implemented and managed.