963 resultados para Security token service
Resumo:
Pre-service teacher education is a spatialized enterprise. It operates across a number of spaces that may or may not be linked ideologically and/or physically. These spaces can include daily practices, locations, infrastructure, relationships and representations of power and ideology. The interrelationships between and within these (sometimes competing) spaces for pre-service teachers will influence their identities as teachers and learners across time and space. Pre-service teachers are expected to make the connections between these often-contradictory spaces with little or no guidance on how to negotiate such complex relationships. These are difficult spaces, yet the slippages and gaps between these spaces offer generative possibilities. This paper explores these spaces of possibility for pre-service teacher education, and uses the spatial theories of Lefebvre (1991) and Foucault (1977, 1980) to argue that critical reflective practice can be used to create a ‘thirdspace’ (Soja, 1996) for reconstructing future practice.
Resumo:
All organisations, irrespective of size and type, need effective information security management (ISM) practices to protect vital organisational in- formation assets. However, little is known about the information security management practices of nonprofit organisations. Australian nonprofit organisations (NPOs) employed 889,900 people, managed 4.6 million volunteers and contributed $40,959 million to the economy during 2006-2007 (Australian Bureau of Statistics, 2009). This thesis describes the perceptions of information security management in two Australian NPOs and examines the appropriateness of the ISO 27002 information security management standard in an NPO context. The overall approach to the research is interpretive. A collective case study has been performed, consisting of two instrumental case studies with the researcher being embedded within two NPOs for extended periods of time. Data gathering and analysis was informed by grounded theory and action research, and the Technology Acceptance Model was utilised as a lens to explore the findings and provide limited generalisability to other contexts. The major findings include a distinct lack of information security management best practice in both organisations. ISM Governance and risk management was lacking and ISM policy was either outdated or non- existent. While some user focused ISM practices were evident, reference to standards, such as ISO 27002, were absent. The main factor that negatively impacted on ISM practices was the lack of resources available for ISM in the NPOs studied. Two novel aspects of information security dis- covered in this research were the importance of accuracy and consistency of information. The contribution of this research is a preliminary understanding of ISM practices and perceptions in NPOs. Recommendations for a new approach to managing information security management in nonprofit organisations have been proposed.
Resumo:
Data preprocessing is widely recognized as an important stage in anomaly detection. This paper reviews the data preprocessing techniques used by anomaly-based network intrusion detection systems (NIDS), concentrating on which aspects of the network traffic are analyzed, and what feature construction and selection methods have been used. Motivation for the paper comes from the large impact data preprocessing has on the accuracy and capability of anomaly-based NIDS. The review finds that many NIDS limit their view of network traffic to the TCP/IP packet headers. Time-based statistics can be derived from these headers to detect network scans, network worm behavior, and denial of service attacks. A number of other NIDS perform deeper inspection of request packets to detect attacks against network services and network applications. More recent approaches analyze full service responses to detect attacks targeting clients. The review covers a wide range of NIDS, highlighting which classes of attack are detectable by each of these approaches. Data preprocessing is found to predominantly rely on expert domain knowledge for identifying the most relevant parts of network traffic and for constructing the initial candidate set of traffic features. On the other hand, automated methods have been widely used for feature extraction to reduce data dimensionality, and feature selection to find the most relevant subset of features from this candidate set. The review shows a trend toward deeper packet inspection to construct more relevant features through targeted content parsing. These context sensitive features are required to detect current attacks.
Resumo:
Understanding consumer value is imperative in health care as the receipt of value drives the demand for health care services. While there is increasing research into health-care that adopts an economic approach to value, this paper investigates a non-financial exchange context and uses an experiential approach to value, guided by a social marketing approach to behaviour change. An experiential approach is deemed more appropriate for government health-care services that are free and for preventative rather than treatment purposes. Thus instead of using an illness-paradigm to view health services outcomes, we adopt a wellness paradigm. Using qualitative data gathered during 25 depth interviews the authors demonstrate how social marketing thinking has guided the identification of six themes that represent four dimensions of value (functional, emotional, social and altruistic) evident during the health care consumption process of a free government service.
Resumo:
Real-time sales assistant service is a problematic component of remote delivery of sales support for customers. Solutions involving web pages, telephony and video support prove problematic when seeking to remotely guide customers in their sales processes, especially with transactions revolving around physically complex artefacts. This process involves a number of services that are often complex in nature, ranging from physical compatibility and configuration factors, to availability and credit services. We propose the application of a combination of virtual worlds and augmented reality to create synthetic environments suitable for remote sales of physical artefacts, right in the home of the purchaser. A high level description of the service structure involved is shown, along with a use case involving the sale of electronic goods and services within an example augmented reality application. We expect this work to have application in many sales domains involving physical objects needing to be sold over the Internet.
Resumo:
The study examines non-Indigenous pre-service teacher responses to the authorisation of Indigenous knowledge perspectives in compulsory Indigenous studies with a primary focus on exploring the nature and effects of resistance. It draws on the philosophies of the Japanangka teaching and research paradigm (West, 2000), relationship theory (Graham, 1999), Indigenist methodologies and decolonisation approaches to examine this resistance. A Critical Indigenist Study was employed to investigate how non-Indigenous pre-service teachers managed their learning, and how they articulated shifts in resistance as they progressed through their studies. This study explains resistance to compulsory Indigenous and how it can be targeted by Indigenist Standpoint Pedagogy. The beginning transformations in pre-service teacher positioning in relation to Australian history, contemporary educational practice, and professional identity was also explored.
Resumo:
Railway timetabling is an important process in train service provision as it matches the transportation demand with the infrastructure capacity while customer satisfaction is also considered. It is a multi-objective optimisation problem, in which a feasible solution, rather than the optimal one, is usually taken in practice because of the time constraint. The quality of services may suffer as a result. In a railway open market, timetabling usually involves rounds of negotiations among a number of self-interested and independent stakeholders and hence additional objectives and constraints are imposed on the timetabling problem. While the requirements of all stakeholders are taken into consideration simultaneously, the computation demand is inevitably immense. Intelligent solution-searching techniques provide a possible solution. This paper attempts to employ a particle swarm optimisation (PSO) approach to devise a railway timetable in an open market. The suitability and performance of PSO are studied on a multi-agent-based railway open-market negotiation simulation platform.
Resumo:
Objectives: Comparatively few people with severe mental illness are employed despite evidence that many people within this group wish to obtain, can obtain and sustain employment, and that employment can contribute to recovery. This investigation aimed to: (i) describe the current policy and service environment within which people with severe mental illness receive employment services; (ii) identify evidence-based practices that improve employment outcomes for people with severe mental illness; (iii) determine the extent to which the current Australian policy environment is consistent with the implementation of evidence-based employment services for people with severe mental illness; and (iv) identify methods and priorities for enhancing employment services for Australians with severe mental illness through implementation of evidence-based practices. Method: Current Australian practices were identified, having reference to policy and legal documents, funding body requirements and anecdotal reports. Evidence-based employment services for people with severe mental illness were identified through examination of published reviews and the results of recent controlled trials. Results: Current policy settings support the provision of employment services for people with severe mental illness separate from clinical services. Recent studies have identified integration of clinical and employment services as a major factor in the effectiveness of employment services. This is usually achieved through co-location of employment and mental health services. Conclusions: Optimal evidence-based employment services are needed by Australians with severe mental illness. Providing optimal services is a challenge in the current policy environment. Service integration may be achieved through enhanced intersectoral links between employment and mental health service providers as well as by co-locating employment specialists within a mental health care setting.
Resumo:
The assessment of parenting capacity and appropriate provision of services to assist parents with mental illness requires improved understanding of how a mental illness may affect the parent-child relationship. Mothers with mental illness may be defensive when providing self-report accounts of their parenting. Within the framework of attachment theory, this study developed a methodology for investigating the quality and characteristics of caregiving through exploration of the mothers' perceptions and strategies in managing her child at bedtime. Utilising questions derived from caregiving attachment research, five mothers with schizophrenia participated in a semi-structured interview concerning bedtime separation. In addition the mothers completed a modified standardised measure of attachment style, the Parent Bonding Instrument, to provide information regarding how they perceived their parenting style. The mothers demonstrated very poor understanding of their child's bedtime anxiety. They described difficulty being effective with bedtime strategies and attributed it to medication-induced fatigue. The interview data contrasted significantly with the Parent Bonding Instrument data in which the mothers did not identify concerns in themselves as caregivers. This study demonstrated the feasibility of a novel approach to gathering information regarding parenting from mothers with a diagnosis of schizophrenia.
Resumo:
Emergency Health Services (EHS), encompassing hospital-based Emergency Departments (ED) and pre-hospital ambulance services, are a significant and high profile component of Australia’s health care system and congestion of these, evidenced by physical overcrowding and prolonged waiting times, is causing considerable community and professional concern. This concern relates not only to Australia’s capacity to manage daily health emergencies but also the ability to respond to major incidents and disasters. EHS congestion is a result of the combined effects of increased demand for emergency care, increased complexity of acute health care, and blocked access to ongoing care (e.g. inpatient beds). Despite this conceptual understanding there is a lack of robust evidence to explain the factors driving increased demand, or how demand contributes to congestion, and therefore public policy responses have relied upon limited or unsound information. The Emergency Health Services Queensland (EHSQ) research program proposes to determine the factors influencing the growing demand for emergency health care and to establish options for alternative service provision that may safely meet patient’s needs. The EHSQ study is funded by the Australian Research Council (ARC) through its Linkage Program and is supported financially by the Queensland Ambulance Service (QAS). This monograph is part of a suite of publications based on the research findings that examines the existing literature, and current operational context. Literature was sourced using standard search approaches and a range of databases as well as a selection of articles cited in the reviewed literature. Public sources including the Australian Institute of Health and Welfare (AIHW), the Council of Ambulance Authorities (CAA) Annual Reports, Australian Bureau of Statistics (ABS) and Department of Health and Ageing (DoHA) were examined for trend data across Australia.
Resumo:
Web service technology is increasingly being used to build various e-Applications, in domains such as e-Business and e-Science. Characteristic benefits of web service technology are its inter-operability, decoupling and just-in-time integration. Using web service technology, an e-Application can be implemented by web service composition — by composing existing individual web services in accordance with the business process of the application. This means the application is provided to customers in the form of a value-added composite web service. An important and challenging issue of web service composition, is how to meet Quality-of-Service (QoS) requirements. This includes customer focused elements such as response time, price, throughput and reliability as well as how to best provide QoS results for the composites. This in turn best fulfils customers’ expectations and achieves their satisfaction. Fulfilling these QoS requirements or addressing the QoS-aware web service composition problem is the focus of this project. From a computational point of view, QoS-aware web service composition can be transformed into diverse optimisation problems. These problems are characterised as complex, large-scale, highly constrained and multi-objective problems. We therefore use genetic algorithms (GAs) to address QoS-based service composition problems. More precisely, this study addresses three important subproblems of QoS-aware web service composition; QoS-based web service selection for a composite web service accommodating constraints on inter-service dependence and conflict, QoS-based resource allocation and scheduling for multiple composite services on hybrid clouds, and performance-driven composite service partitioning for decentralised execution. Based on operations research theory, we model the three problems as a constrained optimisation problem, a resource allocation and scheduling problem, and a graph partitioning problem, respectively. Then, we present novel GAs to address these problems. We also conduct experiments to evaluate the performance of the new GAs. Finally, verification experiments are performed to show the correctness of the GAs. The major outcomes from the first problem are three novel GAs: a penaltybased GA, a min-conflict hill-climbing repairing GA, and a hybrid GA. These GAs adopt different constraint handling strategies to handle constraints on interservice dependence and conflict. This is an important factor that has been largely ignored by existing algorithms that might lead to the generation of infeasible composite services. Experimental results demonstrate the effectiveness of our GAs for handling the QoS-based web service selection problem with constraints on inter-service dependence and conflict, as well as their better scalability than the existing integer programming-based method for large scale web service selection problems. The major outcomes from the second problem has resulted in two GAs; a random-key GA and a cooperative coevolutionary GA (CCGA). Experiments demonstrate the good scalability of the two algorithms. In particular, the CCGA scales well as the number of composite services involved in a problem increases, while no other algorithms demonstrate this ability. The findings from the third problem result in a novel GA for composite service partitioning for decentralised execution. Compared with existing heuristic algorithms, the new GA is more suitable for a large-scale composite web service program partitioning problems. In addition, the GA outperforms existing heuristic algorithms, generating a better deployment topology for a composite web service for decentralised execution. These effective and scalable GAs can be integrated into QoS-based management tools to facilitate the delivery of feasible, reliable and high quality composite web services.
Resumo:
This study explored the developing intercultural competence of fourth-year Australian education pre-service teachers through a core unit of study on inclusive education, following a service-learning pathway. The Australian pre-service teachers volunteered to be 'of service' to a cohort of second-year Malaysian pre-service teachers studying in Australia in a transnational twinning program. Students participated in a Patches program which included writing 'patches' (reflections) and engaging in social exchanges. Data were gathered from focus group interviews, written reflection logs and Patches writing books and were analysed through Butin's (2005) four-lenses of service-learning: technical, cultural, political and post-modern lenses. Data revealed that initially the Australian pre-service teachers felt their presumptions but by the end of the semester embraced the basic tenants of inclusion and were able to project how they could take their new understandings into the classroom as inclusive teachers.
Resumo:
The decision to represent the USDL abstract syntax as a metamodel, shown as a set of UML diagrams, has two main benefits: the ability to show a well- understood standard graphical representation of the concepts and their relation- ships to one another, and the ability to use object-oriented frameworks such as Eclipse Modeling Framework (EMF) to assist in the automated generation of tool support for USDL service descriptions.