983 resultados para Communication complexity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Examined communication between frail older people and their caregiving spouses (CGSs), and its relation to well-being in older care receivers. 53 community residing spousal dyads completed questionnaires about their well-being, relational satisfaction, and communication patterns. Conversations between the dyads were also videotaped and analyzed. The type of communication used by the CGSs was influenced by their sex, their earlier relationship with their spouse, and their level of well-being. CGSs who used an overly directive communication tone with their spouse were likely to be wives and CGSs who had a high degree of autonomy in their earlier relationship with their spouse. Low levels of life satisfaction and high affect balance in CGSs were associated with CGSs using a more patronizing tone. The well-being of care receivers was also related to their perceptions of their CGSs' communication. Care receivers who perceived their CGSs' communication as patronizing reported low levels of affect balance and high levels of conflict in the relationship. Findings suggest that certain characteristics of CGSs are related to the type of communication they use when conversing with their partner, although the relations are not always as expected.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Focuses on the importance of communication to the well-being of older people in Australia. Role of communication for the design, delivery and evaluation of health services for the elderly; Impact of aging on communication; Importance of communication between health care providers and nursing home residents.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of the study was to determine how aspects of communication between nurses and the elderly were perceived by elderly people, future nurses, and uninvolved observers. Respondents (elderly women and nursing and psychology students) rated videotapes of interactions between a nurse and an elderly woman on three dimensions: patronizing, status, and solidarity. Three communication strategies and their combinations were represented in the vignettes. Because the strategies presented were perceived as patronizing by all three groups, no group effect was found for the patronizing dimension. The results show clear group differences particularly between the nursing students and the elderly, with the elderly rating many of the strategies more positively than did the nursing students. The results are discussed in relation to previous evaluations of overaccommodation, and implications of the different perceptions are considered.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New technologies and the pace of change in modern society mean changes for classroom teaching and learning. Information and communication technologies (ICTs) feature in everyday life and provide ample opportunities for enhancing classroom programs. This article outlines how ICTs complement curriculum implementation in one year two classroom. It suggests practical strategies demonstrating how teachers can make ICTs work for them and progressively teach children how to make ICTs work for them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sfinks is a shift register based stream cipher designed for hardware implementation and submitted to the eSTREAM project. In this paper, we analyse the initialisation process of Sfinks. We demonstrate a slid property of the loaded state of the Sfinks cipher, where multiple key-IV pairs may produce phase shifted keystream sequences. The state update functions of both the initialisation process and keystream generation and also the pattern of the padding affect generation of the slid pairs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Student performance on examinations is influenced by the level of difficulty of the questions. It seems reasonable to propose therefore that assessment of the difficulty of exam questions could be used to gauge the level of skills and knowledge expected at the end of a course. This paper reports the results of a study investigating the difficulty of exam questions using a subjective assessment of difficulty and a purpose-built exam question complexity classification scheme. The scheme, devised for exams in introductory programming courses, assesses the complexity of each question using six measures: external domain references, explicitness, linguistic complexity, conceptual complexity, length of code involved in the question and/or answer, and intellectual complexity (Bloom level). We apply the scheme to 20 introductory programming exam papers from five countries, and find substantial variation across the exams for all measures. Most exams include a mix of questions of low, medium, and high difficulty, although seven of the 20 have no questions of high difficulty. All of the complexity measures correlate with assessment of difficulty, indicating that the difficulty of an exam question relates to each of these more specific measures. We discuss the implications of these findings for the development of measures to assess learning standards in programming courses.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter explores a cultural perspective on the development of strategic communication. It identifies cultural influences on organizational knowledge structures and the work of cultural schema on organizational processes of environmental interpretation. It describes the implications of the structures and processes for strategic communication. The chapter documents that strategic communication may reflect outcomes of cultural selection acting in the knowledge system of an organization as much as it reflects empirical imperatives of the external social environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation platform ( NeSSi 2 ). Built-in functionalities include dynamic group formation based on node preferences, group-internal communication, group management and an approach for handling the infection process for malware-based attacks. The CIDE simulation environment provides functionalities for easy implementation of collaborating nodes in large-scale setups. We evaluate the group communication mechanism on the one hand and provide a case study and evaluate our collaborative security evaluation platform in a signature exchange scenario on the other.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Review of Soft Power in China: Public diplomacy through communication, edited by J IAN WANG, New York, Palgrave Macmillan, 2011, US$89 (hard), 220 pp

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ICT integration has been advocated to provide opportunities to improve students’ achievement and engagement through transforming the educational setting. A valuable tool that contributes in enhancing and developing students’ cognitive skills for lifelong learning, ICT integration has introduced a new educational philosophy, shifting the role of students into a more central position in the pedagogical processes. Kuwait, as with many other countries, has recently planned ICT integration to develop its citizen’s capacities. This study sought to capture the principals’, teachers’, and students’ perceptions of ICT integration in pedagogical activities, as well as how ICT is being used for learning and teaching activities in three ICT leading Kuwaiti secondary schools. Interviews with principals, teachers, and students were conducted, along with an open-ended questionnaire for the teachers, researcher observations, and document analysis. The findings revealed that ICT integration in Kuwait needed to be reinforced to accomplish the ICT integration objectives. A call for further support for teachers, and a reconsideration of the ICT integration strategies were also recommended.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kuwait is an oil rich country planning for a future that is not dependent on exploiting natural resources. A major policy initiative has been the introduction of Information Communication and Technology (ICT) to schools. However, contextual issues and teacher capabilities in the use of ICT have limited the success of this initiative. The study examines the leadership strategies of two secondary school principals whose schools have achieved this goal. The case study draws on intensive data collected through interviews of the principals, and teachers supported by document analysis and observations. Analysis was guided by theoretical perspectives drawn from the literature which identified a range of strategies used by the principals to manage change. The principals of Schools A and B employed three key strategies to maximise the impact on the teaching staff incorporating ICT into their teaching and learning practices. These strategies were: (a) encouragement for teaching staff to implement ICT in their teaching; (b) support to meet the material and human needs of teaching staff using ICT; and (c) provision of instructions and guidance for teaching staff in how and why such behaviours and practices should be performed. The outcome of this study proposes an innovative change leadership model that informs emerging countries, which are also undergoing major change related to ICT. However, the study also revealed limitations in the implementation of ICT in the classroom and provides insights into further strategies that principals need to adopt.