963 resultados para Security token service


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Community Child Health Nursing Services provide support for new mothers; however, the focus has often been on individual consultations, complemented by a series of group sessions soon after birth. We describe a new model of community care for first-time mothers that centres on group sessions throughout the whole contact period. The model was developed by practicing child health nurses for a large health service district in south-east Queensland, which offers a comprehensive community child health service. Issues identified by clinicians working within existing services, feedback from clients and the need for more resource-efficient methods of service provision underpinned the development of the model. The pilot program was implemented in two community child health centres in Brisbane. An early individual consultation to engage the family with the service was added in response to feedback from clinicians and clients. The modified model has since been implemented service-wide as the ‘First Steps Program’. The introduction of this model has ensured that the service has been able to retain a comprehensive service for first-time parents from a universal population, while responding to the challenges of population growth and the increasing number of complex clients placing demands on resources.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australian Universities are very successful in attracting large number of international students. A large proportion of University revenue comes from the full fee paying international students. However, there have been many reports that international students face numerous problems when they arrive in Australia. The common management practice is to provide support staff services to deal with the orientation and welfare of international students. Such service units act as intermediaries between the students and the teaching and learning community of the university. However, the actual experience of international students may be difficult for support staff, counsellors, advisers and academic staff to anticipate. There is little information on the actual experience of students relative to their expectations. This study aimed at securing a deeper understanding of the contextually relevant issues facing by international students in Australian universities in order to develop management strategies aimed at improved teaching and learning outcomes for international students. Using a highly reliable survey questionnaire, a questionnaire survey was conducted among the international students at Queensland University of Technology (QUT), Brisbane, Australia. About 180 engineering students responded in the survey resulting in a response rate of 81%. Results indicate that international students face many difficulties including understanding colloquial language, Australian accent, cost of tuition, feelin isolation, safety, security, health services, accommodation and part time jobs. They also face difficulty in coping with learning methods in Australia, particularly in research report writing. However, they are happy with their lecturers and find them very helpful. Many of the students lacked the information regarding various community groups, recreational and sports facilities in Australia before arriving. Findings of the study show that there is a significant gap between the expectation of the students before coming to Australia and actual experience they experience here. Importantly, there is a lack of coordination between international students, international student services (ISS) and university management and as a consequence there have been little improvement in conditions. There is no direct link between student experience and University management. Many important suggestions arisen from this study and most important suggestion is that the student information system should be integrated with the University enterprise resource planning (ERP) to reduce the huge gap between international student expectation and actual experiences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Operators of busy contemporary airports have to balance tensions between the timely flow of passengers, flight operations, the conduct of commercial business activities and the effective application of security processes. In addition to specific onsite issues airport operators liaise with a range of organisations which set and enforce aviation-related policies and regulations as well as border security agencies responsible for customs, quarantine and immigration, in addition to first response security services. The challenging demands of coordinating and planning in such complex socio-technical contexts place considerable pressure on airport management to facilitate coordination of what are often conflicting goals and expectations among groups that have standing in respect to safe and secure air travel. What are, as yet, significantly unexplored issues in large airports are options for the optimal coordination of efforts from the range of public and private sector participants active in airport security and crisis management. A further aspect of this issue is how airport management systems operate when there is a transition from business-as-usual into an emergency/crisis situation and then, on recovery, back to ‘normal’ functioning. Business Continuity Planning (BCP), incorporating sub-plans for emergency response, continuation of output and recovery of degraded operating capacity, would fit such a context. The implementation of BCP practices in such a significant high security setting offers considerable potential benefit yet entails considerable challenges. This paper presents early results of a 4 year nationally funded industry-based research project examining the merger of Business Continuity Planning and Transport Security Planning as a means of generating capability for improved security and reliability and, ultimately, enhanced resilience in major airports. The project is part of a larger research program on the Design of Secure Airports that includes most of the gazetted ‘first response’ international airports in Australia, key Aviation industry groups and all aviation-related border and security regulators as collaborative partners. The paper examines a number of initial themes in the research, including: ? Approaches to integrating Business Continuity & Aviation Security Planning within airport operations; ? Assessment of gaps in management protocols and operational capacities for identifying and responding to crises within and across critical aviation infrastructure; ? Identification of convergent and divergent approaches to crisis management used across Austral-Asia and their alignment to planned and possible infrastructure evolution.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

SAP and its research partners have been developing a lan- guage for describing details of Services from various view- points called the Unified Service Description Language (USDL). At the time of writing, version 3.0 describes technical implementation aspects of services, as well as stakeholders, pricing, lifecycle, and availability. Work is also underway to address other business and legal aspects of services. This language is designed to be used in service portfolio management, with a repository of service descriptions being available to various stakeholders in an organisation to allow for service prioritisation, development, deployment and lifecycle management. The structure of the USDL metadata is specified using an object-oriented metamodel that conforms to UML, MOF and EMF Ecore. As such it is amenable to code gener-ation for implementations of repositories that store service description instances. Although Web services toolkits can be used to make these programming language objects available as a set of Web services, the practicalities of writing dis- tributed clients against over one hundred class definitions, containing several hundred attributes, will make for very large WSDL interfaces and highly inefficient “chatty” implementations. This paper gives the high-level design for a completely model-generated repository for any version of USDL (or any other data-only metamodel), which uses the Eclipse Modelling Framework’s Java code generation, along with several open source plugins to create a robust, transactional repository running in a Java application with a relational datastore. However, the repository exposes a generated WSDL interface at a coarse granularity, suitable for distributed client code and user-interface creation. It uses heuristics to drive code generation to bridge between the Web service and EMF granularities.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a resource constrained business world, strategic choices must be made on process improvement and service delivery. There are calls for more agile forms of enterprises and much effort is being directed at moving organizations from a complex landscape of disparate application systems to that of an integrated and flexible enterprise accessing complex systems landscapes through service oriented architecture (SOA). This paper describes the analysis of strategies to detect supporting business services. These services can then be delivered in a variety of ways: web-services, new application services or outsourced services. The focus of this paper is on strategy analysis to identify those strategies that are common to lines of business and thus can be supported through shared services. A case study of a state government is used to show the analytical method and the detection of shared strategies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The emergence of ePortfolios is relatively recent in the university sector as a way to engage students in their learning and assessment, and to produce records of their accomplishments. An ePortfolio is an online tool that students can utilise to record, catalogue, retrieve and present reflections and artefacts that support and demonstrate the development of graduate students’ capabilities and professional standards across university courses. The ePortfolio is therefore considered as both process and product. Although ePortfolios show promise as a useful tool and their uptake has grown, they are not yet a mainstream higher education technology. To date, the emphasis has been on investigating their potential to support the multiple purposes of learning, assessment and employability, but less is known about whether and how students engage with ePortfolios in the university setting. This thesis investigates student engagement with an ePortfolio in one university. As the educational designer for the ePortfolio project at the University, I was uniquely positioned as a researching professional to undertake an inquiry into whether students were engaging with the ePortfolio. The participants in this study were a cohort (defined by enrolment in a unit of study) of second and third year education students (n=105) enrolled in a four year Bachelor of Education degree. The students were introduced to the ePortfolio in an introductory lecture and a hands-on workshop in a computer laboratory. They were subsequently required to complete a compulsory assessment task – a critical reflection - using the ePortfolio. Following that, engagement with the ePortfolio was voluntary. A single case study approach arising from an interpretivist paradigm directed the methodological approach and research design for this study. The study investigated the participants’ own accounts of their experiences with the ePortfolio, including how and when they engaged with the ePortfolio and the factors that impacted on their engagement. Data collection methods consisted of an attitude survey, student interviews, document collection, a researcher reflective journal and researcher observations. The findings of the study show that, while the students were encouraged to use the ePortfolio as a learning and employability tool, most students ultimately chose to disengage after completing the assessment task. Only six of the forty-five students (13%) who completed the research survey had used the ePortfolio in a sustained manner. The data obtained from the students during this research has provided insight into reasons why they disengaged from the ePortfolio. The findings add to the understandings and descriptions of student engagement with technology, and more broadly, advance the understanding of ePortfolios. These findings also contribute to the interdisciplinary field of technology implementation. There are three key outcomes from this study, a model of student engagement with technology, a set of criteria for the design of an ePortfolio, and a set of recommendations for effective practice for those implementing ePortfolios. The first, the Model of Student Engagement with Technology (MSET) (Version 2) explored student engagement with technology by highlighting key engagement decision points for students The model was initially conceptualised by building on work of previous research (Version 1), however, following data analysis a new model emerged, MSET (Version 2). The engagement decision points were identified as: • Prior Knowledge and Experience, leading to imagined usefulness and imagined ease of use; • Initial Supported Engagement, leading to supported experience of usefulness and supported ease of use; • Initial Independent Engagement, leading to actual experience of independent usefulness and actual ease of use; and • Ongoing Independent Engagement, leading to ongoing experience of usefulness and ongoing ease of use. The Model of Student Engagement with Technology (MSET) goes beyond numerical figures of usage to demonstrate student engagement with an ePortfolio. The explanatory power of the model is based on the identification of the types of decisions that students make and when they make them during the engagement process. This model presents a greater depth of understanding student engagement than was previously available and has implications for the direction and timing of future implementation, and academic and student development activities. The second key outcome from this study is a set of criteria for the re-conceptualisation of the University ePortfolio. The knowledge gained from this research has resulted in a new set of design criteria that focus on the student actions of writing reflections and adding artefacts. The process of using the ePortfolio is reconceptualised in terms of privileging student learning over administrative compliance. The focus of the ePortfolio is that the writing of critical reflections is the key function, not the selection of capabilities. The third key outcome from this research consists of five recommendations for university practice that have arisen from this study. They are that, sustainable implementation is more often achieved through small steps building on one another; that a clear definition of the purpose of an ePortfolio is crucial for students and staff; that ePortfolio pedagogy should be the driving force not the technology; that the merit of the ePortfolio is fostered in students and staff; and finally, that supporting delayed task performance is crucial. Students do not adopt an ePortfolio just because it is provided. While students must accept responsibility for their own engagement with the ePortfolio, the institution has to accept responsibility for providing the environment, and technical and pedagogical support to foster engagement. Ultimately, an ePortfolio should be considered as a joint venture between student and institution where strong returns on investment can be realised by both. It is acknowledged that the current implementation strategies for the ePortfolio are just the beginning of a much longer process. The real rewards for students, academics and the university lie in the future.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter reports on a narrative project recording the experiences of LGBT former and current police officers in the Queensland Police Service (QPS), Australia. It begins by examining the historical and research contexts of LGBT police officers, followed by a discussion of the methodology employed for the project. The chapter then examines and analyzes key themes emerging from the data about coming out, macho police culture, and the double life syndrome often experienced by LGBT police officers. Finally, it suggests that further research might uncover a more widespread application of these findings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This report examines the involvement of manufacturers in value-adding through service-enhancement of product offerings. This focus has been prompted by:  emphasis in the knowledge-economy literature on the increasing role played by services in economic growth; and  recent analysis which suggests that the most dynamic sector of many economies is an integrated manufacturing-services sector (see Part One of this report). The report initially describes the emergence of an integrated manufacturing-services sector in the context of increasingly knowledge-based economic systems. Part Two reports on the results of a survey of manufacturers in the building and construction product system, investigating their involvement in service provision. Parts Three and Four present two case studies of exemplary manufacturers involved in adding value to their manufacturing operations through services offered on building and construction projects. The report examines manufacturers of materials, products, equipment and machinery used on building and construction projects. The two case study sections of the report, in part, focus on a major project undertaken by each of the manufacturers. This project element of activity is focussed on (as opposed to wholesale or retail supply), because this area of activity involves a broader array of service-enhancement mechanisms and more complex bundling of products and services.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australia is currently witnessing considerable change in conceptualisation of the role of child care. This is a response to the strong evidence from developmental science that demonstrates the lifelong impact of early experiences. The recent commitment made by the Council of Australian Governments (COAG) (Communiqué, December 2009a) to improved qualifications and quality of those working in child care is a manifestation of this shift and highlights the importance of the childcare workforce. This study focused on the considerations of a third year cohort of B.Ed (EC) pre-service teachers (n = 55), about entering the childcare workforce. It examines their willingness to work in child care and identifies barriers and incentives for so doing. Our results indicate that, although attitudes to maternal work and child care were largely positive, few would prefer to work in child care under the current conditions. Key barriers were the pay and work conditions, particularly as they compare to other forms of potential employment. Incentives were the opportunity for leadership, creativity and a commitment to advocate for the rights of children. Those more willing to consider work in child care were distinguished from those less willing by altruism—foregoing personal gain to advocate for improved quality as a child’s right.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We present a hierarchical model for assessing an object-oriented program's security. Security is quantified using structural properties of the program code to identify the ways in which `classified' data values may be transferred between objects. The model begins with a set of low-level security metrics based on traditional design characteristics of object-oriented classes, such as data encapsulation, cohesion and coupling. These metrics are then used to characterise higher-level properties concerning the overall readability and writability of classified data throughout the program. In turn, these metrics are then mapped to well-known security design principles such as `assigning the least privilege' and `reducing the size of the attack surface'. Finally, the entire program's security is summarised as a single security index value. These metrics allow different versions of the same program, or different programs intended to perform the same task, to be compared for their relative security at a number of different abstraction levels. The model is validated via an experiment involving five open source Java programs, using a static analysis tool we have developed to automatically extract the security metrics from compiled Java bytecode.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the prominent topics in Business Service Management is business models for (new) services. Business models are useful for service management and engineering as they provide a broader and more holistic perspective on services. Business models are particularly relevant for service innovation as this requires paying attention to the business models that make new services viable and business model innovation can drive the innovation of new and established services. Before we can have a look at business models for services, we first need to understand what business models are. This is not straight-forward as business models are still not well comprehended and the knowledge about business models is fragmented over different disciplines, such as information systems, strategy, innovation, and entrepreneurship. This whitepaper, ‘Understanding business models,’ introduces readers to business models. This whitepaper contributes to enhancing the understanding of business models, in particular the conceptualisation of business models by discussing and integrating business model definitions, frameworks and archetypes from different disciplines. After reading this whitepaper, the reader will have a well-developed understanding about what business models are and how the concept is sometimes interpreted and used in different ways. It will help the reader in assessing their own understanding of business models and that and of others. This will contribute to a better and more beneficial use of business models, an increase in shared understanding, and making it easier to work with business model techniques and tools.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The proliferation of media services enabled by digital technologies poses a serious challenge to public service broadcasting rationales based on media scarcity. Looking to the past and future, we articulate an important role that the Australian Broadcasting Corporation (ABC) might play in the digital age. We argue that historically the ABC has acted beyond its institutional broadcasting remit to facilitate cultural development and, drawing on the example of Pool (an online community of creative practitioners established and maintained by the ABC), point to a key role it might play in fostering network innovation in what are now conceptualised as the creative industries.