948 resultados para International Federation for Documentation


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Recent releases from the International Federation of Accountants (IFAC) highlight the importance of ethics education. Academic institutions employ varying methods of teaching ethics and place varying levels of emphasis on ethics teaching during a business/accounting degree. This paper attempts to evaluate whether teaching ethics to final year accountancy students is beneficial. At the commencement of a semester 85 final year accounting students were given five ethical scenarios on which to make an ethical decision. During the semester they were subject to two different methods of teaching ethics, a traditional lecture/tutorial process and a group assignment. ----- After a significant gap, students were re-presented with the ethical scenarios and asked what action they now considered appropriate. In all five instances students offered a more ethical response the second time. When asked to evaluate the methodologies the students considered both training methods to have a positive effect on their ethical thinking. The results suggest it is beneficial to include ethics teaching in accountancy courses, if the profession’s goal of ethical practitioners is to be achieved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

ERP systems generally implement controls to prevent certain common kinds of fraud. In addition however, there is an imperative need for detection of more sophisticated patterns of fraudulent activity as evidenced by the legal requirement for company audits and the common incidence of fraud. This paper describes the design and implementation of a framework for detecting patterns of fraudulent activity in ERP systems. We include the description of six fraud scenarios and the process of specifying and detecting the occurrence of those scenarios in ERP user log data using the prototype software which we have developed. The test results for detecting these scenarios in log data have been verified and confirm the success of our approach which can be generalized to ERP systems in general.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Ecological networks are often represented as utopian webs of green meandering through cities, across states, through regions and even across a country (Erickson, 2006, p.28; Fabos, 2004, p.326; Walmsley, 2006). While this may be an inspiring goal for some in developed countries, the reality may be somewhat different in developing countries. China, in its shift to urbanisation and suburbanisation, is also being persuaded to adjust its planning schemes according to these aspirational representations of green spaces (Yu et al, 2006, p.237; Zhang and Wang, 2006, p.455). The failure of other countries to achieve regional goals of natural and cultural heritage protection on the ground in this way (Peterson et al, 2007; Ryan et al, 2006; von Haaren and Reich, 2006) suggests that there may be flaws in the underpinning concepts that are widely circulated in North American and Western European literature (Jongman et al, 2004; Walmsley, 2006). In China, regional open space networks, regional green infrastructure or regional ecological corridors as we know them in the West, are also likely to be problematic, at least in the foreseeable future. Reasons supporting this view can be drawn from lessons learned from project experience in landscape planning and related fields of study in China and overseas. Implementation of valuable regional green space networks is problematic because: • the concept of region as a spatial unit for planning green space networks is ambiguous and undefinable for practical purposes; • regional green space networks traditionally require top down inter-governmental cooperation and coordination which are generally hampered by inequalities of influence between and within government agencies; • no coordinating body with funding powers exists for regional green space development and infrastructure authorities are still in transition from engineering authorities; • like other infrastructure projects, green space is likely to become a competitive rather than a complementary resource for city governments; • stable long-term management, maintenance and uses of green space networks must fit into a ‘family’ social structure rather than a ‘public good’ social structure, particularly as rural and urban property rights are being re-negotiated with city governments; and • green space provision is a performance indicator of urban improvement in cities within the city hierarchy and remains quantitatively-based (land area, tree number and per capita share) rather than qualitatively-based with local people as the focus.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Denial of Service Testing Framework (dosTF) being developed as part of the joint India-Australia research project for ‘Protecting Critical Infrastructure from Denial of Service Attacks’ allows for the construction, monitoring and management of emulated Distributed Denial of Service attacks using modest hardware resources. The purpose of the testbed is to study the effectiveness of different DDoS mitigation strategies and to allow for the testing of defense appliances. Experiments are saved and edited in XML as abstract descriptions of an attack/defense strategy that is only mapped to real resources at run-time. It also provides a web-application portal interface that can start, stop and monitor an attack remotely. Rather than monitoring a service under attack indirectly, by observing traffic and general system parameters, monitoring of the target application is performed directly in real time via a customised SNMP agent.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Predicate encryption has an advantage over traditional public-key or identity-based encryption, since predicate encryption systems provide more flexible control over access to encrypted data. We focus on delegation capabilities in predicate systems. More specifically, we investigate delegatable encryption systems supporting disjunctive predicate evaluations. We present formal security definitions of delegatable predicate encryption and provide the first delegatable predicate encryption scheme which supports disjunctive predicate evaluations in the public-key setting. We analyze the security of the proposed system and give a security proof. In addition, we present a delegatable predicate encryption in the symmetric-key setting and discuss the related security issues.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper provides an overview of the current QUT Spatial Science undergraduate program based in Brisbane, Queensland, Australia. It discusses the development and implementation of a broad-based educational model for the faculty of built environment and engineering courses and specifically to the course structure of the new Bachelor of Urban Development (Spatial Science) study major. A brief historical background of surveying courses is discussed prior to the detailing of the three distinct and complementary learning themes of the new course structure with a graphical course matrix. Curriculum mapping of the spatial science major has been undertaken as the course approaches formal review in late 2010. Work-integrated learning opportunities have been embedded into the curriculum and a brief outline is presented. Some issues relevant to the tertiary surveying/ spatial sector are highlighted in the context of changing higher education environments in Australia.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Malaysian urban river corridors are facing major physical transformations in the 21st century. The effects of rapid development exacerbated by the competition between two key industry sectors, commercial base and tourism development in conjunction with urbanisation and industrialisation, have posted a high demand for the uses of these spaces. The political scenario and lack on consideration of ecological principles in its design solution have sparked stiff environmental and cultural constraint towards its landscape character as well as the ecological system. Therefore, a holistic approach towards improving the landscape design processes is extremely necessary to protect values of these places. Limited research has been carried out and further has created an urgent need to explore better ways to improve the landscape design processes of Malaysian urban river corridor developments that encompass the needs and aspirations of its multi-ethnic society without making any drastic changes to the landscape character of the rivers. This paper provides a brief introduction to address this significant gap and hence serves to contribute to the literature review.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We investigate known security flaws in the context of security ceremonies to gain an understanding of the ceremony analysis process. The term security ceremonies is used to describe a system of protocols and humans which interact for a specific purpose. Security ceremonies and ceremony analysis is an area of research in its infancy, and we explore the basic principles involved to better understand the issues involved.We analyse three ceremonies, HTTPS, EMV and Opera Mini, and use the information gained from the experience to establish a list of typical flaws in ceremonies. Finally, we use that list to analyse a protocol proven secure for human use. This leads to a realisation of the strengths and weaknesses of ceremony analysis.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Exploring information use within everyday or community contexts is a recent area of interest for information literacy research endeavours. Within this domain, health information literacy (HIL) has emerged as a focus of interest due to identified synergies between information use and health status. However, while HIL has been acknowledged as a core ingredient that can assist people to take responsibility for managing and improving their own health, limited research has explored how HIL is experienced in everyday community life. This article will present the findings of ongoing research undertaken using phenomenography to explore how HIL is experienced among older Australians within everyday contexts. It will also discuss how these findings may be used to inform policy formulation in health communication and as an evidence base for the design and delivery of consumer health information resources and services.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Objectives To evaluate differences among patients with different clinical features of ALS, we used our Bayesian method of motor unit number estimation (MUNE). Methods We performed serial MUNE studies on 42 subjects who fulfilled the diagnostic criteria for ALS during the course of their illness. Subjects were classified into three subgroups according to whether they had typical ALS (with upper and lower motor neurone signs) or had predominantly upper motor neurone weakness with only minor LMN signs, or predominantly lower motor neurone weakness with only minor UMN signs. In all subjects we calculated the half life of MUs, defined as the expected time for the number of MUs to halve, in one or more of the abductor digiti minimi (ADM), abductor pollicis brevis (APB) and extensor digitorum brevis (EDB) muscles. Results The mean half life of MUs was less in subjects who had typical ALS with both upper and lower motor neurone signs than in those with predominantly upper motor neurone weakness or predominantly lower motor neurone weakness. In 18 subjects we analysed the estimated size of the MUs and demonstrated the appearance of large MUs in subjects with upper or lower motor neurone predominant weakness. We found that the appearance of large MUs was correlated with the half life of MUs. Conclusions Patients with different clinical features of ALS have different rates of loss and different sizes of MUs. Significance: These findings could indicate differences in disease pathogenesis.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how to protect their own privacy through online mechanisms. What is required is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting users’ personal information. The research has also posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online information systems.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Objective: To assess the relationship between Bayesian MUNE and histological motor neuron counts in wild-type mice and in an animal model of ALS. Methods: We performed Bayesian MUNE paired with histological counts of motor neurons in the lumbar spinal cord of wild-type mice and transgenic SOD1 G93A mice that show progressive weakness over time. We evaluated the number of acetylcholine endplates that were innervated by a presynaptic nerve. Results: In wild-type mice, the motor unit number in the gastrocnemius muscle estimated by Bayesian MUNE was approximately half the number of motor neurons in the region of the spinal cord that contains the cell bodies of the motor neurons supplying the hindlimb crural flexor muscles. In SOD1 G93A mice, motor neuron numbers declined over time. This was associated with motor endplate denervation at the end-stage of disease. Conclusion: The number of motor neurons in the spinal cord of wild-type mice is proportional to the number of motor units estimated by Bayesian MUNE. In SOD1 G93A mice, there is a lower number of estimated motor units compared to the number of spinal cord motor neurons at the end-stage of disease, and this is associated with disruption of the neuromuscular junction. Significance: Our finding that the Bayesian MUNE method gives estimates of motor unit numbers that are proportional to the numbers of motor neurons in the spinal cord supports the clinical use of Bayesian MUNE in monitoring motor unit loss in ALS patients. © 2012 International Federation of Clinical Neurophysiology.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Objective: To use our Bayesian method of motor unit number estimation (MUNE) to evaluate lower motor neuron degeneration in ALS. Methods: In subjects with ALS we performed serial MUNE studies. We examined the repeatability of the test and then determined whether the loss of MUs was fitted by an exponential or Weibull distribution. Results: The decline in motor unit (MU) numbers was well-fitted by an exponential decay curve. We calculated the half life of MUs in the abductor digiti minimi (ADM), abductor pollicis brevis (APB) and/or extensor digitorum brevis (EDB) muscles. The mean half life of the MUs of ADM muscle was greater than those of the APB or EDB muscles. The half-life of MUs was less in the ADM muscle of subjects with upper limb than in those with lower limb onset. Conclusions: The rate of loss of lower motor neurons in ALS is exponential, the motor units of the APB decay more quickly than those of the ADM muscle and the rate of loss of motor units is greater at the site of onset of disease. Significance: This shows that the Bayesian MUNE method is useful in following the course and exploring the clinical features of ALS. 2012 International Federation of Clinical Neurophysiology.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Argon ions were implanted on titanium discs to study its effect on bone cell adhesion and proli feration. Polished titanium discs were prepared and implanted with argon ions with different doses. Afterwards the samples were sterilized using UV light, inocu lated with human bone cells and incubated. Once fixed and rinsed, image analysis has been used to quantify the number of cells attached to the titanium discs. Cell proliferation tests were also conducted after a period of 120 hours. Cell adhesion was seen to be higher with ion im planted surface. SEM analysis has shown that the cells attached spread more on ion implanted surface. The numbers of cells attached were seen to be higher on implanted surfaces; they tend to occupy wider areas with healthier cells.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper describes a method for measuring the creative potential of computer games. The research approach applies a behavioral and verbal protocol to analyze the factors that influence the creative processes used by people as they play computer games from the puzzle genre. Creative potential is measured by examining task motivation and domain-relevant and creativity-relevant skills. This paper focuses on the reliability of the factors used for measurement, determining those factors that are more strongly related to creativity. The findings show that creative potential may be determined by examining the relationship between skills required and the effect of intrinsic motivation within game play activities.