997 resultados para Sim authentication messaggistica online
Blended delivery and online assessment : scaffolding student reflections in work-integrated learning
Resumo:
This paper documents a teaching innovation addressing the challenges of embedding and assessing reflective practice in work-integrated learning, specifically marketing internships. We identify four issues relating to this problem: lack of knowledge or skill for reflection, limitations of physical journals, facilitation of different forms of reflection, and suitable models for teaching and assessing reflection. The paper outlines a blended approach combining face-to-face workshops and online resources, and using online reflective journals and digital stories as assessment. The approach and assessment tasks can be implemented in a variety of marketing and business units.
Resumo:
The interest in potentially economically valuable plants (for food, timber, dyes, fabric, and drugs) was part of the concerted effort given by colonial governments towards providing botanic gardens in new colonies. While convicts and guards laboured in Brisbane Town from 1825 until 1849, botanists such as Alan Cunningham were discovering the delights of native plants in their numerous excursions. Their observations and collections of seeds were sent south (to the local botanic gardens at Melbourne and Sydney) and onward to the Royal Botanic Gardens in Britain (at Kew and Edinburgh). This set the local pattern for future exchanges among the global British Imperial botanic garden network...
Resumo:
Secure protocols for password-based user authentication are well-studied in the cryptographic literature but have failed to see wide-spread adoption on the Internet; most proposals to date require extensive modifications to the Transport Layer Security (TLS) protocol, making deployment challenging. Recently, a few modular designs have been proposed in which a cryptographically secure password-based mutual authentication protocol is run inside a confidential (but not necessarily authenticated) channel such as TLS; the password protocol is bound to the established channel to prevent active attacks. Such protocols are useful in practice for a variety of reasons: security no longer relies on users' ability to validate server certificates and can potentially be implemented with no modifications to the secure channel protocol library. We provide a systematic study of such authentication protocols. Building on recent advances in modelling TLS, we give a formal definition of the intended security goal, which we call password-authenticated and confidential channel establishment (PACCE). We show generically that combining a secure channel protocol, such as TLS, with a password authentication protocol, where the two protocols are bound together using either the transcript of the secure channel's handshake or the server's certificate, results in a secure PACCE protocol. Our prototype based on TLS is available as a cross-platform client-side Firefox browser extension and a server-side web application which can easily be installed on deployed web browsers and servers.
Resumo:
Many educators are currently interested in using computer-mediated communications (CMCs) to support learning and creative practice. In my work I have been looking at how we might create drama through using cyberspaces, working with teachers and students in secondary school contexts. In trying to understand issues that have arisen and ways of working with the data I have found a number of frameworks helpful for analysing the online interactions. These frameworks draw from O'Toole's work on contexts negotiated in the creation of drama and other frameworks drawn from Wertsch, Bakhtin and Vygotsky's work on speech utterances, dialogic processes and internalisation of learning. The contexts and factors which must be negotiated in online communications within learning contexts are quite complex and educators may need to provide parameters and protocols to ensure appropriate languages, genres and utterances are utilised. The paper explores some of the types of languages, genres and utterances that emerged from a co-curricula drama project and issues that arose, including the importance of establishing processes for giving and receiving critical feedback This paper is of relevance to those whose research strategies may involve the use of computer-mediated communications as well as those utilising cyberspaces in educational contexts.
Resumo:
Reality television, alongside shows such as Q&A – which may be Reality TV in all but name – frequently drives social media conversations about the Australian television industry. Big Brother, currently screening on Channel 9, is consistently among the shows with the highest levels of chatter in that regard. The precise Facebook data is hard to quantify but the Official Big Brother page boasts 805,400 likes and more than 59,000 comments since the start of the series, suggesting it has established a firm presence on that platform too...
Resumo:
What do we know? • Customer Experience is increasingly becoming the new standard for differentiation in both offline and online retailing, and offers a sustainable competitive advantage. o The economic value of a company’s offering has been observed to increase when the customer has a fulfilling shopping experience (Pine & Gilmore, 1998) o Crafting engaging and customer experience is a known method of generating loyalty, advocacy and word of mouth (Tynan & McKechnie, 2009). o A good experience can entice consumers to shop for longer and spend more (Kim, 2001). • The customer’s experience is made up of diverse elements occurring before, during and after the purchase itself. (Discussed further on page 5). It is cumulative over time and can be influenced by touch points across multiple channels. What remains unclear? • How do Coles customers respond to the elements of online customer experience? • How does the online customer experience differ for frequent and infrequent purchasers? • Do differences between genders and age cohorts for online customer experience exist?
Resumo:
The travel and tourism industry has come to rely heavily on information and communication technologies to facilitate relations with consumers. Compiling consumer data profiles has become easier and it is widely thought that consumers place great importance on how that data is handled by firms. Lack of trust may cause consumers to have privacy concerns and may, in turn, have an adverse impact on consumers’ willingness to purchase online. Three specific aspects of privacy that have received attention from researchers are unauthorized use of secondary data, invasion of privacy, and errors. A survey study was undertaken to examine the effects of these factors on both prior purchase of travel products via the Internet and future purchase probability. Surprisingly, no significant relationships were found to indicate that such privacy concerns affect online purchase behavior within the travel industry. Implications for managers are discussed.
Resumo:
The strain data acquired from structural health monitoring (SHM) systems play an important role in the state monitoring and damage identification of bridges. Due to the environmental complexity of civil structures, a better understanding of the actual strain data will help filling the gap between theoretical/laboratorial results and practical application. In the study, the multi-scale features of strain response are first revealed after abundant investigations on the actual data from two typical long-span bridges. Results show that, strain types at the three typical temporal scales of 10^5, 10^2 and 10^0 sec are caused by temperature change, trains and heavy trucks, and have their respective cut-off frequency in the order of 10^-2, 10^-1 and 10^0 Hz. Multi-resolution analysis and wavelet shrinkage are applied for separating and extracting these strain types. During the above process, two methods for determining thresholds are introduced. The excellent ability of wavelet transform on simultaneously time-frequency analysis leads to an effective information extraction. After extraction, the strain data will be compressed at an attractive ratio. This research may contribute to a further understanding of actual strain data of long-span bridges; also, the proposed extracting methodology is applicable on actual SHM systems.
Resumo:
The advances in modern information and communication (ICT) technology continue to address the challenges and improve` health outcomes for the survivors of chronic disease such as prostate cancer. The management of survivorship is increasingly becoming an important need for the survivors to manage their chronic conditions. The technology interventions such as tele-health as well as self-managed technology applications have shown a potential to improve survivorship outcomes. However, the application of these tools should be supported by strong health economics evidence. This work discusses the challenges of technology led survivorship care models and presents an integrated approach to address these challenges.
Resumo:
Introduction The professional doctorate is specifically designed for professionals investigating real-world problems and relevant issues for a profession, industry, and/or the community. The focus is scholarly research into professional practices. The research programme bridges academia and the professions, and offers doctoral candidates the opportunity to investigate issues relevant to their own practices and to apply these understandings to their professional contexts. The study on which this article is based sought to track the scholarly skill development of a cohort of professional doctoral students who commenced the course in January 2008 at an Australian university. Because they hold positions of responsibility and are time-poor, many doctoral students have difficulty transitioning from professional practitioner to researcher and scholar. The struggle many experience is in the development of a theoretical or conceptual standpoint for argumentation (Lesham, 2007; Weese et al., 1999). It was thought that the use of a scaffolded learning environment that drew upon a blended learning approach incorporating face to face intensive blocks and collaborative knowledge-building tools such as wikis would provide a data source for understanding the development of scholarly skills. Wikis, weblogs and similar social networking software have the potential to support communities to share, learn, create and collaborate. The development of a wiki page by each candidate in the 2008 cohort was encouraged to provide the participants and the teaching team members with textual indicators of progress. Learning tasks were scaffolded with the expectation that the candidates would complete these tasks via the wikis. The expectation was that cohort members would comment on each other’s work, together with the supervisor and/or teaching team member who was allocated to each candidate. The supervisor is responsible for supervising the candidate’s work through to submission of the thesis for examination and the teaching team member provides support to both the supervisor and the candidate through to confirmation. This paper reports on the learning journey of a cohort of doctoral students during the first seven months of their professional doctoral programme to determine if there had been any qualitative shifts in understandings, expectations and perceptions regarding their developing knowledge and skills. The paper is grounded in the literature pertaining to doctoral studies and examines the structure of the professional doctoral programme. Following this is a discussion of the qualitative study that helped to unearth key themes regarding the participants’ learning journey.
Resumo:
A new online method is presented for estimation of the angular randomwalk and rate randomwalk coefficients of inertial measurement unit gyros and accelerometers. In the online method, a state-space model is proposed, and recursive parameter estimators are proposed for quantities previously measured from offline data techniques such as the Allan variance method. The Allan variance method has large offline computational effort and data storage requirements. The technique proposed here requires no data storage and computational effort of approximately 100 calculations per data sample.
Resumo:
Now is not the time to increase the strength of copyright law. Copyright law is facing a crisis of legitimacy: consumers increasingly appear to doubt its moral weight. To a large extent, this can be traced to the fact that Australian consumers do not believe they are being treated fairly by (predominantly US-based) copyright producers and distributors. Compared to their overseas peers, Australian consumers pay much more for access to books, films, television, and computer games, and are often subjected to long delays before material is available in Australia. Our research shows that this perceived unfairness increases the willingness of Australian consumers to seek out alternative distribution channels. Put simply, the failure of content distributors to meet consumer demand in Australia is a leading factor in copyright infringement. This submission argues that the best strategy to reduce copyright infringement in Australia, at the present time, is for distributors to focus on providing timely, affordable, convenient and fair access to copyright goods. Until this is done, the prevalence of copyright infringement in Australia should be seen as essentially a market problem, rather than a legal one. The Australian Government, meanwhile, should address the recommendations of the IT Pricing Report as a matter a priority. As a first step, the Government should urgently consider repealing the IP exception to competition law in s 51(3), as recommended by the Ergas committee, the IT Pricing report, and the ALRC. This change alone may go a long way to enhancing the efficiency of the copyright market in Australia.
Resumo:
This submission focuses on the adverse effects that the Government’s proposals are likely to have on the legitimate use of copyright works. Copyright exists to support the production of new expression. Because new expression always builds on existing culture, any extension of copyright protection necessarily also increases the costs of creative expression. As a threshold matter, we do not believe that these further increases to the force of copyright law are justified. In recent years, the balance at the heart of copyright law has tipped too far in the direction of established producers and distributors, and now imposes unnecessary costs on ordinary creators. The available evidence does not support a further increase in the penalties and enforcement mechanisms available under copyright law.
Resumo:
This research is a step forward in improving the accuracy of detecting anomaly in a data graph representing connectivity between people in an online social network. The proposed hybrid methods are based on fuzzy machine learning techniques utilising different types of structural input features. The methods are presented within a multi-layered framework which provides the full requirements needed for finding anomalies in data graphs generated from online social networks, including data modelling and analysis, labelling, and evaluation.