915 resultados para Institutional context
Resumo:
Video surveillance systems using Closed Circuit Television (CCTV) cameras, is one of the fastest growing areas in the field of security technologies. However, the existing video surveillance systems are still not at a stage where they can be used for crime prevention. The systems rely heavily on human observers and are therefore limited by factors such as fatigue and monitoring capabilities over long periods of time. This work attempts to address these problems by proposing an automatic suspicious behaviour detection which utilises contextual information. The utilisation of contextual information is done via three main components: a context space model, a data stream clustering algorithm, and an inference algorithm. The utilisation of contextual information is still limited in the domain of suspicious behaviour detection. Furthermore, it is nearly impossible to correctly understand human behaviour without considering the context where it is observed. This work presents experiments using video feeds taken from CAVIAR dataset and a camera mounted on one of the buildings Z-Block) at the Queensland University of Technology, Australia. From these experiments, it is shown that by exploiting contextual information, the proposed system is able to make more accurate detections, especially of those behaviours which are only suspicious in some contexts while being normal in the others. Moreover, this information gives critical feedback to the system designers to refine the system.
Resumo:
This report is an update of an earlier version produced in January 2010 (see Carrington et al. 2010) which remains as an ePrint through the project’s home page. The report provides an introduction to our analyses of extant secondary data with respect to violent acts and incidents relating to males living in rural settings in Australia using data which were available in public data bases at the time of production. It clarifies important aspects of our overall approach primarily by concentrating on three elements that required early scoping and resolution.
Resumo:
This report is an update of an earlier one produced in September 2009 (see Carrington et al. 2009) which remains as an ePrint through the project’s home page. The report focuses on our examination of extant data which have been sourced with respect to self-harm and suicide among males living in regional and remote Australia and which were available in public data bases at production time. Moreover, specific areas of concern regarding elevated rates of suicide for rural males and data anomalies which emerged during our examination of these data are discussed.
Resumo:
This report is an update of an earlier one produced in January 2010 (see Carrington et al. 2010) which remains as an ePrint through the project’s home page. This report focuses on our examination of extant data which have been sourced with respect to intentional violence perpetrated or experienced by males living in regional and remote Australia . and which were available in public data bases at production. The nature of intentional violent acts can be physical, sexual or psychological or involve deprivation or neglect.
Resumo:
This report is an update of an earlier one produced in January 2010 (see Carrington et al. 2010) which remains as an ePrint through the project’s home page. This report focuses on our examination of extant data which have been sourced with respect to unintentional serious and violent harm, including injuries, to males living in regional and remote Australia . and which were available in public data bases at production. Such harm typically might be caused by, for example, transport accidents, occupational exposures and hazards, burns and so on. Thus unintentional violent harm can cause physical trauma the consequences of which can lead to chronic conditions including psychological harm or substance abuse.
Resumo:
This report is an update of an earlier one produced in January 2010 (see Carrington et al. 2010) which remains as an ePrint through the project’s home page. The report focus on our examination of extant data which have been sourced with respect to personally and socially risky behaviour associated with males living in regional and remote Australia and which were available in public data bases at production.
Resumo:
This report is an update of an earlier one produced in January 2010 (see Carrington et al. 2010) which remains as an ePrint through the project’s home page. The report considers extant data which have been sourced with respect to some of the consequences of violent acts, incidents, harms and risky behaviour involving males living in regional and remote Australia and which were available in public data bases at production.
Resumo:
This study examined the everyday practices of families within the context of family mealtime to investigate how members accomplished mealtime interactions. Using an ethnomethodological approach, conversation analysis and membership categorization analysis, the study investigated the interactional resources that family members used to assemble their social orders moment by moment during family mealtimes. While there is interest in mealtimes within educational policy, health research and the media, there remain few studies that provide fine-grained detail about how members produce the social activity of having a family meal. Findings from this study contribute empirical understandings about families and family mealtime. Two families with children aged 2 to 10 years were observed as they accomplished their everyday mealtime activities. Data collection took place in the family homes where family members video recorded their naturally occurring mealtimes. Each family was provided with a video camera for a one-month period and they decided which mealtimes they recorded, a method that afforded participants greater agency in the data collection process and made available to the analyst a window into the unfolding of the everyday lives of the families. A total of 14 mealtimes across the two families were recorded, capturing 347 minutes of mealtime interactions. Selected episodes from the data corpus, which includes centralised breakfast and dinnertime episodes, were transcribed using the Jeffersonian system. Three data chapters examine extended sequences of family talk at mealtimes, to show the interactional resources used by members during mealtime interactions. The first data chapter explores multiparty talk to show how the uniqueness of the occasion of having a meal influences turn design. It investigates the ways in which members accomplish two-party talk within a multiparty setting, showing how one child "tells" a funny story to accomplish the drawing together of his brothers as an audience. As well, this chapter identifies the interactional resources used by the mother to cohort her children to accomplish the choralling of grace. The second data chapter draws on sequential and categorical analysis to show how members are mapped to a locally produced membership category. The chapter shows how the mapping of members into particular categories is consequential for social order; for example, aligning members who belong to the membership category "had haircuts" and keeping out those who "did not have haircuts". Additional interactional resources such as echoing, used here to refer to the use of exactly the same words, similar prosody and physical action, and increasing physical closeness, are identified as important to the unfolding talk particularly as a way of accomplishing alignment between the grandmother and grand-daughter. The third and final data analysis chapter examines topical talk during family mealtimes. It explicates how members introduce topics of talk with an orientation to their co-participant and the way in which the take up of a topic is influenced both by the sequential environment in which it is introduced and the sensitivity of the topic. Together, these three data chapters show aspects of how family members participated in family mealtimes. The study contributes four substantive themes that emerged during the analytic process and, as such, the themes reflect what the members were observed to be doing. The first theme identified how family knowledge was relevant and consequential for initiating and sustaining interaction during mealtime with, for example, members buying into the talk of other members or being requested to help out with knowledge about a shared experience. Knowledge about members and their activities was evident with the design of questions evidencing an orientation to coparticipant’s knowledge. The second theme found how members used topic as a resource for social interaction. The third theme concerned the way in which members utilised membership categories for producing and making sense of social action. The fourth theme, evident across all episodes selected for analysis, showed how children’s competence is an ongoing interactional accomplishment as they manipulated interactional resources to manage their participation in family mealtime. The way in which children initiated interactions challenges previous understandings about children’s restricted rights as conversationalists. As well as making a theoretical contribution, the study offers methodological insight by working with families as research participants. The study shows the procedures involved as the study moved from one where the researcher undertook the decisions about what to videorecord to offering this decision making to the families, who chose when and what to videorecord of their mealtime practices. Evident also are the ways in which participants orient both to the video-camera and to the absent researcher. For the duration of the mealtime the video-camera was positioned by the adults as out of bounds to the children; however, it was offered as a "treat" to view after the mealtime was recorded. While situated within family mealtimes and reporting on the experiences of two families, this study illuminates how mealtimes are not just about food and eating; they are social. The study showed the constant and complex work of establishing and maintaining social orders and the rich array of interactional resources that members draw on during family mealtimes. The family’s interactions involved members contributing to building the social orders of family mealtime. With mealtimes occurring in institutional settings involving young children, such as long day care centres and kindergartens, the findings of this study may help educators working with young children to see the rich interactional opportunities mealtimes afford children, the interactional competence that children demonstrate during mealtimes, and the important role/s that adults may assume as co-participants in interactions with children within institutional settings.
Resumo:
This article continues the critical analysis of ‘meaningful relationships’ in the context of the operation of the ‘twin pillars’ which underpin the parenting provisions. It will be argued that the attitude of judicial officers to three key questions influence how they interpret this concept and consequently apply the best interest considerations. Relevant to this discussion is an examination of the Full Court’s approach to the key parenting sections, particularly the interaction of the primary and additional considerations. Against this backdrop, a current proposal to amend the ‘twin pillars’ will be examined.
Resumo:
From location-aware computing to mining the social web, representations of context have promised to make better software applications. The opportunities and challenges of context-aware computing from representational, situated and interactional perspectives have been well documented, but arguments from the perspective of design are somewhat disparate. This paper draws on both theoretical perspectives and a design framing, using the problem of designing a social mobile agile ridesharing system, in order to reflect upon and call for broader design approaches for context-aware computing and human-computer Interaction research in general.
Resumo:
A broad range of positions is articulated in the academic literature around the relationship between recordings and live performance. Auslander (2008) argues that “live performance ceased long ago to be the primary experience of popular music, with the result that most live performances of popular music now seek to replicate the music on the recording”. Elliott (1995) suggests that “hit songs are often conceived and produced as unambiguous and meticulously recorded performances that their originators often duplicate exactly in live performances”. Wurtzler (1992) argues that “as socially and historically produced, the categories of the live and the recorded are defined in a mutually exclusive relationship, in that the notion of the live is premised on the absence of recording and the defining fact of the recorded is the absence of the live”. Yet many artists perform in ways that fundamentally challenge such positions. Whilst it is common practice for musicians across many musical genres to compose and construct their musical works in the studio such that the recording is, in Auslander’s words, the ‘original performance’, the live version is not simply an attempt to replicate the recorded version. Indeed in some cases, such replication is impossible. There are well known historical examples. Queen, for example, never performed the a cappella sections of Bohemian Rhapsody because it they were too complex to perform live. A 1966 recording of the Beach Boys studio creation Good Vibrations shows them struggling through the song prior to its release. This paper argues that as technology develops, the lines between the recording studio and live performance change and become more blurred. New models for performance emerge. In a 2010 live performance given by Grammy Award winning artist Imogen Heap in New York, the artist undertakes a live, improvised construction of a piece as a performative act. She invites the audience to choose the key for the track and proceeds to layer up the various parts in front of the audience as a live performance act. Her recording process is thus revealed on stage in real time and she performs a process that what would have once been confined to the recording studio. So how do artists bring studio production processes into the live context? What aspects of studio production are now performable and what consistent models can be identified amongst the various approaches now seen? This paper will present an overview of approaches to performative realisations of studio produced tracks and will illuminate some emerging relationships between recorded music and performance across a range of contexts.
Resumo:
Trusted health care outcomes are patient centric. Requirements to ensure both the quality and sharing of patients’ health records are a key for better clinical decision making. In the context of maintaining quality health, the sharing of data and information between professionals and patients is paramount. This information sharing is a challenge and costly if patients’ trust and institutional accountability are not established. Establishment of an Information Accountability Framework (IAF) is one of the approaches in this paper. The concept behind the IAF requirements are: transparent responsibilities, relevance of the information being used, and the establishment and evidence of accountability that all lead to the desired outcome of a Trusted Health Care System. Upon completion of this IAF framework the trust component between the public and professionals will be constructed. Preservation of the confidentiality and integrity of patients’ information will lead to trusted health care outcomes.
Resumo:
This paper calls for a renewed focus on the teaching of writing. It proposes a conceptual model, based on a social realist perspective, which takes account of the ways in which teachers reflexively mediate personal, professional and political considerations in enacting their writing pedagogies. This model extends understanding of the factors contextualising the teaching of writing. It also provides a useful guide for research into the teaching of writing and a prompt for reflexivity in professional development.
Resumo:
Over the last decade, Papua New Guinea (PNG) has pursued educational reform in elementary teacher education. Because elementary teachers and teacher education are central to the reform agenda, there is a need to gain empirical evidence about how PNG teacher trainers’ understandings about learning and teaching impact on their practice. The study uses cultural-authorship as a theoretical framework to investigate the nature of changes in understanding about learning and teaching for 18 teacher trainers as they progressed through a two-year Bachelor of Early Childhood upgrade course. It addresses the research question: What do elementary teacher trainers in PNG understanding about learning and teaching and how has this changed during their course? The focus on such understandings provides valuable insights into their professional identities at a critical time in PNG’s education reform agenda. Analysis of journal entries at the beginning and end of the course showed that, over time, teacher trainers described increasingly more complex ways of understanding learning and teaching. These views shifted from a focus on learning and teaching as transmission of ideas to one in which the critical role played by communities and families in educational processes and the teacher as a change agent became focal. This watershed finding demonstrates notable shifts in teacher trainers’ professional identities from trainers to community leaders in elementary education.
Resumo:
The paper draws on a three year Australian Research Council funded project entitled Sexual Harassment in Australia: Context Outcomes and Prevention. The research to date suggests there is some slippage between legal definitions and community understandings of what constitutes sexual harassment. Moreover, while sexual harassment is often seen by the community and within organisations as the fault of one aberrant individual, in certain workplace contexts sexual harassment is used to ‘police the gender borders’, that is to exclude women and men who do not conform to the dominant workplace gender norms. This type of sexual harassment is a collective form of behaviour often perpetrated by co-workers in male-dominated workplaces which is designed to humiliate ‘outsiders’ so they appear incompetent and will be forced to leave the organisation. While much previous research that has focused on this type of sexual harassment has taken place in military and policing settings, our emerging findings suggest that it is present in a far broader range of workplace contexts. Prevention of this form of sexual harassment is challenging and goes to the heart of organisational culture and work organisation.