567 resultados para llw (send)


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Cyber bullying – or bullying through the use of technology – is a growing phenomenon which is currently most commonly experienced by young people and the consequences manifested in schools. Cyber bullying shares many of the same attributes as face-to-face bullying such as a power imbalance and a sense of helplessness on the part of the target. Not surprisingly, targets of face-to-face bullying are increasingly turning to the law, and it is likely that targets of cyber bullying may also do so in an appropriate case. This article examines the various criminal, civil and vilification laws that may apply to cases of cyber bullying and assesses the likely effectiveness of these laws as a means of redressing that power imbalance between perpetrator and target.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Despite the dangers and illegality, there is a continued prevalence of texting while driving amongst young Australian drivers. The present study tested an extended theory of planned behaviour (TPB) to predict young drivers’ (17 to 24 years) intentions to [1] send and [2] read text messages while driving. Participants (N = 169 university students) completed measures of attitudes, subjective norm, perceived behavioural control, intentions, and the additional social influence measures of group norm and moral norm. One week later, participants reported on the number of texts sent and read while driving in the previous week. Attitude predicted intentions to both send and read texts while driving, and subjective norm and perceived behavioural control determined sending, but not reading, intentions. Further, intention, but not perceptions of control, predicted both texting behaviours 1 week later. In addition, both group norm and moral norm added predictive ability to the model. These findings provide support for the TPB in understanding students’ decisions to text while driving as well as the inclusion of additional normative influences within this context, suggesting that a multi-strategy approach is likely to be useful in attempts to reduce the incidence of these risky driving behaviours.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation is primarily an applied statistical modelling investigation, motivated by a case study comprising real data and real questions. Theoretical questions on modelling and computation of normalization constants arose from pursuit of these data analytic questions. The essence of the thesis can be described as follows. Consider binary data observed on a two-dimensional lattice. A common problem with such data is the ambiguity of zeroes recorded. These may represent zero response given some threshold (presence) or that the threshold has not been triggered (absence). Suppose that the researcher wishes to estimate the effects of covariates on the binary responses, whilst taking into account underlying spatial variation, which is itself of some interest. This situation arises in many contexts and the dingo, cypress and toad case studies described in the motivation chapter are examples of this. Two main approaches to modelling and inference are investigated in this thesis. The first is frequentist and based on generalized linear models, with spatial variation modelled by using a block structure or by smoothing the residuals spatially. The EM algorithm can be used to obtain point estimates, coupled with bootstrapping or asymptotic MLE estimates for standard errors. The second approach is Bayesian and based on a three- or four-tier hierarchical model, comprising a logistic regression with covariates for the data layer, a binary Markov Random field (MRF) for the underlying spatial process, and suitable priors for parameters in these main models. The three-parameter autologistic model is a particular MRF of interest. Markov chain Monte Carlo (MCMC) methods comprising hybrid Metropolis/Gibbs samplers is suitable for computation in this situation. Model performance can be gauged by MCMC diagnostics. Model choice can be assessed by incorporating another tier in the modelling hierarchy. This requires evaluation of a normalization constant, a notoriously difficult problem. Difficulty with estimating the normalization constant for the MRF can be overcome by using a path integral approach, although this is a highly computationally intensive method. Different methods of estimating ratios of normalization constants (N Cs) are investigated, including importance sampling Monte Carlo (ISMC), dependent Monte Carlo based on MCMC simulations (MCMC), and reverse logistic regression (RLR). I develop an idea present though not fully developed in the literature, and propose the Integrated mean canonical statistic (IMCS) method for estimating log NC ratios for binary MRFs. The IMCS method falls within the framework of the newly identified path sampling methods of Gelman & Meng (1998) and outperforms ISMC, MCMC and RLR. It also does not rely on simplifying assumptions, such as ignoring spatio-temporal dependence in the process. A thorough investigation is made of the application of IMCS to the three-parameter Autologistic model. This work introduces background computations required for the full implementation of the four-tier model in Chapter 7. Two different extensions of the three-tier model to a four-tier version are investigated. The first extension incorporates temporal dependence in the underlying spatio-temporal process. The second extensions allows the successes and failures in the data layer to depend on time. The MCMC computational method is extended to incorporate the extra layer. A major contribution of the thesis is the development of a fully Bayesian approach to inference for these hierarchical models for the first time. Note: The author of this thesis has agreed to make it open access but invites people downloading the thesis to send her an email via the 'Contact Author' function.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ubiquitous access to patient medical records is an important aspect of caring for patient safety. Unavailability of sufficient medical information at the point-ofcare could possibly lead to a fatality. The U.S. Institute of Medicine has reported that between 44,000 and 98,000 people die each year due to medical errors, such as incorrect medication dosages, due to poor legibility in manual records, or delays in consolidating needed information to discern the proper intervention. In this research we propose employing emergent technologies such as Java SIM Cards (JSC), Smart Phones (SP), Next Generation Networks (NGN), Near Field Communications (NFC), Public Key Infrastructure (PKI), and Biometric Identification to develop a secure framework and related protocols for ubiquitous access to Electronic Health Records (EHR). A partial EHR contained within a JSC can be used at the point-of-care in order to help quick diagnosis of a patient’s problems. The full EHR can be accessed from an Electronic Health Records Centre (EHRC) when time and network availability permit. Moreover, this framework and related protocols enable patients to give their explicit consent to a doctor to access their personal medical data, by using their Smart Phone, when the doctor needs to see or update the patient’s medical information during an examination. Also our proposed solution would give the power to patients to modify the Access Control List (ACL) related to their EHRs and view their EHRs through their Smart Phone. Currently, very limited research has been done on using JSCs and similar technologies as a portable repository of EHRs or on the specific security issues that are likely to arise when JSCs are used with ubiquitous access to EHRs. Previous research is concerned with using Medicare cards, a kind of Smart Card, as a repository of medical information at the patient point-of-care. However, this imposes some limitations on the patient’s emergency medical care, including the inability to detect the patient’s location, to call and send information to an emergency room automatically, and to interact with the patient in order to get consent. The aim of our framework and related protocols is to overcome these limitations by taking advantage of the SIM card and the technologies mentioned above. Briefly, our framework and related protocols will offer the full benefits of accessing an up-to-date, precise, and comprehensive medical history of a patient, whilst its mobility will provide ubiquitous access to medical and patient information everywhere it is needed. The objective of our framework and related protocols is to automate interactions between patients, healthcare providers and insurance organisations, increase patient safety, improve quality of care, and reduce the costs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Given there is currently a migration trend from traditional electrical supervisory control and data acquisition (SCADA) systems towards a smart grid based approach to critical infrastructure management. This project provides an evaluation of existing and proposed implementations for both traditional electrical SCADA and smart grid based architectures, and proposals a set of reference requirements which test bed implementations should implement. A high-level design for smart grid test beds is proposed and initial implementation performed, based on the proposed design, using open source and freely available software tools. The project examines the move towards smart grid based critical infrastructure management and illustrates the increased security requirements. The implemented test bed provides a basic framework for testing network requirements in a smart grid environment, as well as a platform for further research and development. Particularly to develop, implement and test network security related disturbances such as intrusion detection and network forensics. The project undertaken proposes and develops an architecture of the emulation of some smart grid functionality. The Common Open Research Emulator (CORE) platform was used to emulate the communication network of the smart grid. Specifically CORE was used to virtualise and emulate the TCP/IP networking stack. This is intended to be used for further evaluation and analysis, for example the analysis of application protocol messages, etc. As a proof of concept, software libraries were designed, developed and documented to enable and support the design and development of further smart grid emulated components, such as reclosers, switches, smart meters, etc. As part of the testing and evaluation a Modbus based smart meter emulator was developed to provide basic functionality of a smart meter. Further code was developed to send Modbus request messages to the emulated smart meter and receive Modbus responses from it. Although the functionality of the emulated components were limited, it does provide a starting point for further research and development. The design is extensible to enable the design and implementation of additional SCADA protocols. The project also defines an evaluation criteria for the evaluation of the implemented test bed, and experiments are designed to evaluate the test bed according to the defined criteria. The results of the experiments are collated and presented, and conclusions drawn from the results to facilitate discussion on the test bed implementation. The discussion undertaken also present possible future work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The significant challenge faced by government in demonstrating value for money in the delivery of major infrastructure resolves around estimating costs and benefits of alternative modes of procurement. Faced with this challenge, one approach is to focus on a dominant performance outcome visible on the opening day of the asset, as the means to select the procurement approach. In this case, value for money becomes a largely nominal concept and determined by selected procurement mode delivering, or not delivering, the selected performance outcome, and notwithstanding possible under delivery on other desirable performance outcomes, as well as possibly incurring excessive transaction costs. This paper proposes a mind-set change in this particular practice, to an approach in which the analysis commences with the conditions pertaining to the project and proceeds to deploy transaction cost and production cost theory to indicate a procurement approach that can claim superior value for money relative to other competing procurement modes. This approach to delivering value for money in relative terms is developed in a first-order procurement decision making model outlined in this paper. The model developed could be complementary to the Public Sector Comparator (PSC) in terms of cross validation and the model more readily lends itself to public dissemination. As a possible alternative to the PSC, the model could save time and money in preparation of project details to lesser extent than that required in the reference project and may send a stronger signal to the market that may encourage more innovation and competition.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This report analyses the national curriculum and workforce needs of the social work and human services workforce. Australia’s community and health services are among the fastest growing sectors of employment in the nation but the sustainability of an appropriately qualified workforce is threatened. Yet there is little integration of education and workforce planning for the community services sector. This contrasts markedly with the health services sector, where key stakeholders are collaboratively addressing workforce challenges. Our research confirmed rapid growth in the social work and human services workforce and it also identified: • an undersupply of professionally qualified social work and human service practitioners to meet workforce demand; • the rapid ageing of the workforce with many workers approaching retirement; • limited career and salary structures creating disincentives to retention; • a highly diverse qualification base across the workforce. This diversity is inconsistent with the specialist knowledge and skills required of practitioners in many domains of community service provision. Our study revealed a lack of co-ordination across VET and higher education to meet the educational needs of the social work and human services workforce. Our analysis identified: • strong representation of equity groups in social work and related human service programs, although further participation of these groups is still needed; • the absence of clear articulation pathways between VET and higher education programs due the absence of co-ordination and planning between these sectors; • substantial variation in the content of the diverse range of social work and human service programs, with accredited programs conforming to national standards and some others in social and behavioural sciences lacking any external validation; • financial obstacles and disincentives to social work and human service practitioners in achieving postgraduate level qualifications. We recommend that: • DEEWR identify accredited social work and human services courses as a national education priority (similar to education and nursing). This will help ensure the supply of professional workers to this sector; • VET and higher education providers are encouraged to collaboratively develop clear and accessible educational pathways across the educational sectors; • DEEWR undertake a national workforce analysis and planning processes in collaboration with CSDMAC, and all social and community services stakeholders, to ensure workforce sustainability; and • COAG develop a national regulation framework for the social and community services workforce. This would provide sound accountability systems, and rigorous practice and educational standards necessary for quality service provision. It will also ensure much needed public confidence in this workforce.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present paper addresses the findings of a preliminary investigation into policy and codes of conduct pertaining to the use of laptops and PDA’s in business meetings. The purpose of this study was to conduct a review of policies or codes of conduct pertaining to the use of laptops and PDAs in meetings. The investigation included academic literature, policy searches in the public domain of the Internet, as well as personal contact with target industries (large corporations – N=1000 + employees). The results highlight the dearth of policy and codes of conducts pertaining to the use of laptops and PDA’s in business meetings. Consequently, given the growing interdependence between mobile technologies and the contemporary workplace, there exists an opportunity for communication professionals to further research and develop policy and codes of conduct in this area. Implications for corporate communication policies and practices are also discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we highlight how current approaches to design for disability have failed to consider the emotional needs not only of those with disabilities but their families and other carers as well. In conjunction with this, we demonstrate through a review of literature the significance of the house, the home and home in the support and growth of the person as a whole in association with their loved ones, and the potential inequity that arises when the emotional and holistic dimensions of 'being' are neglected. With a growing trend nationally and internationally away from group and shared housing, a greater focus on the family and their home is required. However, as research has shown, home for families where a family member has a disability is not necessarily a positive experience; it can be a source of stress, work, conflict and burden, arousing emotions ranging from loss of control through guilt. As proposed in the paper, consideration of the negative as well as positive emotions demands exploration of the 'middle ground' between institutions and home-based care models. This paper outlines the beginning of one such exploration.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This publication is the first in a series of scholarly reports on research-based practice related to the First Year Experience in Higher Education. This report synthesises evidence about practice-based initiatives and pragmatic approaches in Aotearoa (New Zealand) and Australia that aim to enhance the experience of commencing students in the higher education sector. Trends in policies, programs and practices ... examines the first year experience literature from 2000-2010. It acknowledges the uniqueness of the Australasian socio-political context and its influence on the interests and output of researchers. The review surveyed almost 400 empirical reports and conceptual discussions produced over the decade that dealt with the stakeholders, institutions and the higher education sector in Australasia. The literature is examined through two theoretical constructs or “lenses”: first, a set of first year curriculum design principles and second, the generational approach to describing the maturation of initiatives. These outcomes and suggested directions for further research provide the challenges and the opportunities for FYE adherents, both scholars and practitioners, to grapple with in the next decade.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This is the final report of an Australian Learning and Teaching Council Teaching Fellowship which addressed the needs of two separate groups of learners: (1) final year law students studying ethics and (2) law academics and other interested educators in higher education wishing to use information and communication technologies (ICT) to create engaging learning environments for their students but lacking the capacity to do so. The Fellowship resulted in final year law students being infused with an improved appreciation of ethical practice than they receive from traditional lecture/tutorial means by the development of an integrated program of blended learning including an online program entitled "Entry into Valhalla". This "ethics capstone‟ utilises multimedia produced using cost effective resources (including the "Second Life" virtual environment) to create engaging, contextualised learning experiences. The Fellowship also constructed the knowledge of producing cost-effective multimedia projects in other law academics and other educators in higher education by staff development activities comprising workshops, conference presentations and an interactive website using the "Entry into Valhalla" program as a case study exemplar.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article reports on the first year of the Exceptional Teachers for Disadvantaged Schools project, a teacher education approach designed to prepare high quality teachers for low socio-economic schools. The Exceptional Teachers for Disadvantaged Schools (ETDS) project is an innovative way to prepare high-quality teachers for employment in low-SES schools. The program, based at Queensland University of Technology (QUT), offers a specialised curriculum, designed to equip high-achieving pre-service teachers for work in the schools that need them most. Selected pre-service teachers at QUT are invited to take part in the trial course, based on their academic performance over the first two years of their four-year Bachelor of Education degree, and on a demonstrated commitment to social justice. These participants undertake a modified version of QUT's B Ed on-campus curriculum. They have their practicum/field experience at one of a range of disadvantaged schools throughout Queensland which have agreed to partner with QUT in the program. In the past, teacher education for disadvantaged schools has been described as applying a 'missionary' or deficit model (Larabee, 2010; Comber and Kamler, 2004; Flessa, 2007). The principals of schools participating in the ETDS react strongly against such an approach, and have explicitly asked project staff not to send them anyone who 'thinks they can save the world'. The ETDS project has moved well away from such a model, towards a position that is explicitly centred on notions of academic excellence. The project is now at the end of its first trial year.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As part of the Australian Government’s Clean Energy Plan, the Government has attempted to harness the legal innovation of the tradeable emissions unit, within a capped carbon trading system, to reduce greenhouse gas emissions. Such an approach promises to send a price signal to the market which will influence emitting behaviours and reduce our emissions in a cost-effective manner. However, if the carbon trading scheme is to successfully achieve cost-effective emissions reductions then the carbon market must be supported by an appropriate legal framework. This paper will consider the key features of the Australian Carbon Pricing Mechanism, including the Carbon Farming Initiative, and critique whether it has all the hallmarks of an effective legal framework to reduce Australia’s net greenhouse gas emissions. The likely future of the trading scheme, following the 2013 elections, will also be addressed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work is an installation featuring three video projections, music and mirror balls. The three projections fill the walls with scrolling text borrowed from love song lyrics. Headphones in the gallery space allow you to hear a male voice sing the same words to an impromptu tune. Mirror balls send fragments of light spinning around the room while The Righteous Brothers’ Unchained Melody plays on repeat. This work emphasizes fragmentary, repetitious and spatio-temporal experiences of language in order to question the symbolic conventions of romance. By exaggerating and mixing hackneyed symbolic elements, this work extends on some of Nicolas Bourriaud’s theoretical insights into the creative and critical strategies of ‘postproduction’. In particular, it toys with the intersections between popular culture and inter-subjective experiences.