974 resultados para Shipping conferences
Resumo:
Globality generates increasingly diffuse networks of human and non-human innovators, carriers and icons of exotic, polyethnic cosmopolitan difference; and this diffusion is increasingly hard to ignore or police (Latour 1993). In fact, such global networks of material-symbolic exchange can frequently have the unintended consequence of promoting status systems and cultural relationships founded on uncosmopolitan values such as cultural appropriation and status-based social exclusion. Moreover, this materialsymbolic engagement with cosmopolitan difference could also be rather mundane, engaged in routinely without any great reflexive consciousness or capacity to destabilise current relations of cultural power, or interpreted unproblematically as just one component of a person’s social environment. Indeed, Beck’s (2006) argument is that cosmopolitanism, in an age of global risk, is being forced upon us unwillingly, so there should be no surprise if it is a bitter pill for some to swallow. Within these emergent cosmopolitan networks, which we call ‘cosmoscapes’, there is no certainty about the development of ethical or behavioural stances consistent with claims foundational to the current literature on cosmopolitanism. Reviewing historical and contemporary studies of globality and its dynamic generative capacity, this paper considers such literatures in the context of studies of cultural consumption and social status. When one positions these diverse bodies of literature against one another, it becomes clear that the possibility of widespread cosmopolitan cultural formations is largely unpromising.
Resumo:
New media, as a free and universal communication tool, has had an impact on the power of the general public to comment on a variety of issues. As the public can comment favourably or unfavourably on advertisements, such as on Youtube, the advertising industry must start using weblogs to research reaction to their advertising campaigns. This exploratory study examines the responses of some advertising industry practitioners, both advertisers and agencies, on the impact of new media, specifically weblogs, and the use of new media as a source of research on advertising campaigns.
Resumo:
Few frameworks exist for the teaching and assessment of programming subjects that are coherent and logical. Nor are they sufficiently generic and adaptable to be used outside the particular tertiary institutions in which they were developed. This paper presents the Teaching and Assessment of Software Development (TASD) frame-work. We describe its development and implementation at an Australian university and demonstrate, with examples, how it has been used, with supporting data. Extracts of criteria sheets (grading rubrics) for a variety of assessment tasks are included. The numerous advantages of this new framework are discussed with comparisons made to those reported in the published literature.
Resumo:
It has been 150 years since the Queensland public service was established. This paper looks back over the successive civil and public service acts in Queensland from 1859 to 2009, to examine the why the acts were passed, the changing structure of the public sector and the political justifications for the changes. It will establish how much has changed and how much has stayed the same over 150 years. Discussions regarding the success of the public service acts will be approached from an accountability perspective and will work to determine how effective the legislation has been in creating an independent and efficient public sector. The paper will demonstrate that change has occurred but some of it has turned back on itself;proposals that were rejected in the past have reappeared as fresh ideas and innovations. Finally, the paper will make conclusions as to the progress or repetition of public sector legislation in Queensland.
Resumo:
Digital forensics investigations aim to find evidence that helps confirm or disprove a hypothesis about an alleged computer-based crime. However, the ease with which computer-literate criminals can falsify computer event logs makes the prosecutor's job highly challenging. Given a log which is suspected to have been falsified or tampered with, a prosecutor is obliged to provide a convincing explanation for how the log may have been created. Here we focus on showing how a suspect computer event log can be transformed into a hypothesised actual sequence of events, consistent with independent, trusted sources of event orderings. We present two algorithms which allow the effort involved in falsifying logs to be quantified, as a function of the number of `moves' required to transform the suspect log into the hypothesised one, thus allowing a prosecutor to assess the likelihood of a particular falsification scenario. The first algorithm always produces an optimal solution but, for reasons of efficiency, is suitable for short event logs only. To deal with the massive amount of data typically found in computer event logs, we also present a second heuristic algorithm which is considerably more efficient but may not always generate an optimal outcome.
Resumo:
This 90 minute panel session is designed to explore issues relating to the teaching of drama, performance studies, and theatre studies within Higher Education. Some of the issues that will be raised include: developing an understanding of the learning that students believe they are experiencing through performance; contemporary models for teaching; and the suggestion that the body can be an important site for acquiring a variety of different knowledges. Paul Makeham will present a general position paper to commence the session (15 minutes). Maryrose Casey, Gillian Kehoul, and Delyse Ryan will each speak briefly (15 minutes) about aspects of their research into Higher Education teaching before opening the floor for a round-table discussion of issues affecting the teaching of these disciplines.
Resumo:
In 2003, Bill Dunstone, John McCallum and Paul Makeham began a collaboration with researchers at the Centre for the Management of Arid Environments (CMAE) in Kalgoorlie, Western Australia. CMAE researchers are keen to develop 'people-oriented' strategies for implementing agricultural extension initiatives in their region. Traditional hierarchies of knowledge-transfer have impeded the 'connectedness' between community and researchers that gives meaning and relevance to useful practice (Ison and Russell, 2000). Our aim is to establish a partnership between the Live Events Research Network (LERN) and CMAE, investigating ways to link creative, performance-based research and practice with the scientific methodologies associated with natural resources management. This accords with recent work undertaken by Deborah Mills and Paul Brown, showing how community cultural development strategies enhance the implementation of policy concerned with community wellbeing. Mills and Brown 'adopted a concept of wellbeing which builds on a social and environmental view of health', and considered such themes as ecological sustainability, rural economic revitalisation, community strengthening, health and wellbeing (Mills, 2003). We propose that rangeland communities can creatively manage some of the challenges confronting them through performance-based projects which: - activate the stories through which a community enacts its sense of place; - facilitate live events in which the community enacts ownership of its culture and identity; - directly involve the community in the formulation of research issues
Resumo:
In 1999 I convened Industrial Relations, the annual ADSA Conference hosted by QUT in Brisbane. This event was promoted as ‘a conference exploring the links between theatre scholarship and professional theatre practice’. As well as academics, there was to be substantial representation by ‘industry professionals’, although interest from the latter category turned out to be modest. One day of the conference was designated a special ‘Links with Industry’ day, during which the Association launched its now defunct ADSAIL (ADSA Industry Links) initiative. Keynote speaker Wesley Enoch commented on ‘the very strong resistance in “the industry” to acknowledging any role of academics’. ‘What is the practical role of having them?’ he asked the ‘them’ gathered before him. In a letter declining our invitation to speak (he later changed his mind), David Williamson remarked that he always felt ‘uneasy at such conferences’: My view of my work is that I’ve successfully filled theatres for 30 years now, something dramatists are supposed to do. I suppose there’s part of me that hopes this will be celebrated. It often is, but rarely in academic drama departments …. Perhaps in fifty years time someone in academe will realise that I wasn’t just reinforcing the attitudes of the Anglo Celtic ruling class. Several years on it seems timely to revisit Industrial Relations; to look again at the extent to which problems of intercultural communication between industry and academy are being addressed. And what are the implications of this for the ADSA History project, which seeks to investigate ADSA’s contribution to the development of theatre / performance studies in Australasia? What are the ‘external’ impacts of ADSA’s ongoing conference enterprise, and how might these be measured? Reflections from delegates on these and other questions will be warmly encouraged.
Resumo:
We all know that the future of news is digital. But mainstream news providers are still grappling with how to entice more customers to their online sites. This paper provides context for a survey currently underway on user intentions towards online news and entertainment, by exploring: 1. Consumer behaviours and intentions with regards to accessing online news and information; 2. Current trends in the Australian online news and information sector; and 3. Key issues and emerging opportunities in the Australian (and global) environment. Key influences on use of online news and information are pricing and access. The paper highlights emerging technical opportunities and flags service gaps. These gaps include multiple disconnects between: 1. Changing user intentions towards online and location based news (news based on a specific locality as chosen by the user) and information; 2. The ability by consumers to act on these intentions via the availability and cost of technologies; 3. Younger users may prefer entertainment to news, or ‘infotainment’; and 4. Current online offerings of traditional news providers and opportunities. These disconnects present an opportunity for online news suppliers to appraise and resolve. Doing so may enhance their online news and information offering, attract consumers and improve loyalty. Outcomes from this paper will be used to identify knowledge gaps and contribute to the development of further analysis on Australian consumers and their behaviours and intentions towards online news and information. This will be undertaken via focus groups as part of a broader study.
Resumo:
UCON is an emerging access control framework that lacks an administration model. In this paper we define the problem of administration and propose a novel administrative model. At the core of this model is the concept of attribute, which is also the central component of UCON. In our model, attributes are created by the assertions of subjects, which ascribe properties/rights to other subjects or objects. Through such a treatment of attributes, administration capabilities can be delegated from one subject to another and as a consequence UCON is improved in three aspects. First, immutable attributes that are currently considered as external to the model can be incorporated and thereby treated as mutable at- tributes. Second, the current arbitrary categorisation of users (as modifiers of attributes), to system and administrator can be removed. Attributes and objects are only modifiable by those who possess administration capability over them. Third, the delegation of administration over objects and properties that is not currently expressible in UCON is made possible.
Resumo:
There has been considerable interest over the years within the IS research community into how to shape articles for successful publication. Little effort has been made, however, to examine the reviewing criteria that make a difference to publication. We argue that, to provide better guidance to authors, more solid evidence is needed into the factors that contribute to acceptance decisions. This paper examines empirically the outcomes of the reviewing processes of three well-known IS conferences held in 2007. Our analyses reveal four major findings. First, the evaluation criteria that influence the acceptance/rejection decision vary by conference. Second, those differences can be explained in terms of the maturity and breadth of the specific conference of interest. Third, while objective review criteria influence acceptance/rejection decisions, subjective assessment on the part of the program committees may also play a substantial role. Fourth, while high scores on objective criteria are essential for acceptance, they do not guarantee acceptance. On the other hand, low scores on any criterion are likely to result in rejection.
Resumo:
The work was derived from terrestrial laser scan data of a bio-diverse landscape on the SE coast of Western Australia. The digital three dimensional scan data has been converged and then a portion of that computer aided design (CAD) file has been captured via ‘screen capture’ to produce Blackcloud.---------- The primary intention behind the production of the work was to expand understanding on the means of representing and then designing for sites in ‘kwongan’ landscapes which are constituted by highly biodiverse, bushfire prone heath vegetation.
Resumo:
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many passwords and use each password only once. If a single password is compromised, it can be only be used to impersonate the user once, limiting the damage caused. However, existing practical approaches to one-time passwords have been susceptible to sophisticated phishing attacks. ---------- We give a formal security treatment of this important practical problem. We consider the use of one-time passwords in the context of password-authenticated key exchange (PAKE), which allows for mutual authentication, session key agreement, and resistance to phishing attacks. We describe a security model for the use of one-time passwords, explicitly considering the compromise of past (and future) one-time passwords, and show a general technique for building a secure one-time-PAKE protocol from any secure PAKE protocol. Our techniques also allow for the secure use of pseudorandomly generated and time-dependent passwords.