904 resultados para networking
Resumo:
In most of the advanced economies, students are losing interest in careers especially in en¬gineering and related industries. Hence, western economies are confronting a critical skilled labour shortage in areas of technology, science and engineering. Decisions about career pathways are made as early as the primary years of schooling and hence cooperation be¬tween industry and schools to attract students to the professions is crucial. The aim of this paper is to document how the organisational and institutional elements of one industry-school partnerships initiative — The Gateway Schools Program — contribute to productive knowledge sharing and networking. In particular this paper focuses on an initiative of an Australian State government in response to a perceived crisis around the skills shortage in an economy transitioning from a localised to a global knowledge production economy. The Gateway Schools initiative signals the first sustained attempt in Australia to incorporate schools into production networks through strategic partnerships linking them to partner organisations at the industry level. We provide case examples of how four schools opera¬tionalise the partnerships with the minerals and energy industries and how these partner¬ships as knowledge assets impact the delivery of curriculum and capacity building among teachers. Our ultimate goal is to define those characteristics of successful partnerships that do contribute to enhanced interest and engagement by students in those careers that are currently experiencing critical shortages.
Resumo:
This thesis investigated how microblogging, a form of online social networking, was being employed by educators to support their professional learning. The study found that educators who participate in microblogging engage in a wide range of behaviours, with certain behaviours and activities commonly exhibited. An advantage of microblogging as a professional learning tool is its ability to link educators globally to exchange ideas from different perspectives and to share resources and teaching practices. Educators who microblog have access to relevant and timely learning that is not constrained by time or distance and can be tailored to meet their individual needs.
Resumo:
Networked identity work is the conscious negotiation or co-creation of identity, enacted by speaking and listening across differences among multiple publics, including those real and imagined, familiar and unknown, on and offline, present and future. It is a concept I explore extensively in research with queer Digital Storytellers who share their personal stories in public places to catalyse social change (Vivienne 2013). In this article I consider distinctions between ‘story’ and ‘identity’; ‘networking’ and ‘networked identity work’ and argue that the two concepts may be usefully employed in development of co-creative community projects. Finally I consider how variable definitions of co-creativity influence project development.
Resumo:
We conducted a systematic review of the literature on telemedicine use in long-term care facilities (LTCFs) and assessed the quality of the published evidence. A database search identified 22 papers which met the inclusion criteria. The quality of the studies was assessed and if they contained economic data, they were rated according to standard criteria. The clinical services provided by telemedicine included allied health (n = 5), dermatology (3), general practice (4), neurology (2), geriatrics (1), psychiatry (4) and multiple specialities (3). Most studies (17) employed real-time telemedicine using videoconferencing. The remaining five used store and forward telemedicine. The papers focused on economics (3), feasibility (9), stakeholder satisfaction (12), reliability (5) and service implementation (2). Overall, the quality of evidence for telemedicine in LTCFs was low. There was only one small randomised controlled trial (RCT). Most studies were observational and qualitative, and focused on utilisation. They were mainly based on surveys and interviews of stakeholders. A few studies evaluated the cost associated with implementing telemedicine services in LTCFs. The present review shows that there is evidence for feasibility and stakeholder satisfaction in using telemedicine in LTCFs in a number of clinical specialities.
Resumo:
Interdisciplinary research is often funded by national government initiatives or large corporate sponsorship, and as such, demands periodic reporting on the use of those funds. For reasons of accountability, governance and communication to the tax payer, knowledge of the outcomes of the research need to be measured and understood. The interdisciplinary approach to research raises many challenges for impact reporting. This presentation will consider what are the best practice workflow models and methodologies.Novel methodologies that can be added to the usual metrics of academic publications include analysis of percentage share of total publications in a subject or keyword field, calculating most cited publication in a key phrase category, analysis of who has cited or reviewed the work, and benchmarking of this data against others in that same category. At QUT, interest in how collaborative networking is trending in a research theme has led to the creation of some useful co-authorship graphs that demonstrate the network positions of authors and the strength of their scientific collaborations within a group. The scale of international collaborations is also worth including in the assessment. However, despite all of the tools and techniques available, the most useful way a researcher can help themselves and the process is to set up and maintain their researcher identifier and profile.
Resumo:
In the space of the past decade, the technologies, business models, everyday uses and public understandings of social media have co-evolved rapidly. In the early to mid 2000s, websites like MySpace, Facebook or Twitter were garnering interest in both the press and academia as places for amateur creativity, political subversion or trivial time-wasting on the behalf of subcultures of geeks or ‘digital natives’, but such websites were not seen as legitimate, mainstream media organisations, nor were they generally understood as respectable places for professionals (other than new media professionals) to conduct business. By late 2011, online marketing company Comscore was reporting that social networking was “the most popular online activity worldwide accounting for nearly 1 in every 5 minutes spent online”, reaching 82 percent of the world’s Internet population, or 1.2 billion users (Comscore, 2011). Today, social media is firmly established as an industry sector in its own right, and is deeply entangled with and embedded in the practices and everyday lives of media professionals, celebrities and ordinary users. We might now think of it as an embedded communications infrastructure extending across culture, society and the economy – ranging from local government Facebook pages alerting us to kerbside collection, to Tumblr blogs providing humorous cultural commentary by curating animated .gifs, to Telstra Twitter accounts responding to user requests for tech help, and to Yelp reviews helping us find somewhere to grab dinner in a strange town. As well as at least appearing to be near-ubiquitous, social media is increasingly seen as highly significant by scholars researching issues as diverse as journalistic practice (Hermida, 2012), the coordination of government and community responses to natural disasters (Bruns & Burgess, 2012), and the activities of global social and political protest movements (Howard & Hussain, 2013)...
Resumo:
"Principles of Addiction provides a solid understanding of the definitional and diagnostic differences between use, abuse, and disorder. It describes in great detail the characteristics of these syndromes and various etiological models. The book's three main sections examine the nature of addiction, including epidemiology, symptoms, and course; alcohol and drug use among adolescents and college students; and detailed descriptions of a wide variety of addictive behaviors and disorders, encompassing not only drugs and alcohol, but caffeine, food, gambling, exercise, sex, work, social networking, and many other areas. This volume is especially important in providing a basic introduction to the field as well as an in-depth review of our current understanding of the nature and process of addictive behaviors. Principles of Addiction is one of three volumes comprising the 2,500-page series, Comprehensive Addictive Behaviors and Disorders. This series provides the most complete collection of current knowledge on addictive behaviors and disorders to date. In short, it is the definitive reference work on addictions."--publisher website
Resumo:
Server consolidation using virtualization technology has become an important technology to improve the energy efficiency of data centers. Virtual machine placement is the key in the server consolidation technology. In the past few years, many approaches to the virtual machine placement have been proposed. However, existing virtual machine placement approaches consider the energy consumption by physical machines only, but do not consider the energy consumption in communication network, in a data center. However, the energy consumption in the communication network in a data center is not trivial, and therefore should be considered in the virtual machine placement. In our preliminary research, we have proposed a genetic algorithm for a new virtual machine placement problem that considers the energy consumption in both physical machines and the communication network in a data center. Aiming at improving the performance and efficiency of the genetic algorithm, this paper presents a hybrid genetic algorithm for the energy-efficient virtual machine placement problem. Experimental results show that the hybrid genetic algorithm significantly outperforms the original genetic algorithm, and that the hybrid genetic algorithm is scalable.
Resumo:
Wireless networked control systems (WNCSs) have been increasingly deployed in industrial applications. As they require timely data packet transmissions, it is difficult to make efficient use of the limited channel resources, particularly in contention based wireless networks in the layered network architecture. Aiming to maintain the WNCSs under critical real-time traffic condition at which the WNCSs marginally meet the real-time requirements, a cross-layer design (CLD) approach is presented in this paper to adaptively adjust the control period to achieve improved channel utilization while still maintaining effective and timely packet transmissions. The effectiveness of the proposed approach is demonstrated through simulation studies.
Resumo:
Major disasters, such as bushfires or floods, place significant stress on scarce public resources. Climate change is likely to exacerbate this stress. An integrated approach to disaster risk management (DRM) and climate change adaptation (CCA) could reduce the stress by encouraging the more efficient use of pooled resources and expertise. A comparative analysis of three extreme climate-related events that occurred in Australia between 2009 and 2011 indicated that a strategy to improve interagency communication and collaboration would be a key factor in this type of policy/planning integration. These findings are in accord with the concepts of Joined-up Government and Network Governance. Five key reforms are proposed: developing a shared policy vision; adopting multi-level planning; integrating legislation; networking organisations; and establishing cooperative funding. These reforms are examined with reference to the related research literature in order to identify potential problems associated with their implementation. The findings are relevant for public policy generally but are particularly useful for CCA and DRM.
Resumo:
In the context of modern western psychologised, techno-social hybrid realities, where individuals are incited constantly to work on themselves and perform their self-development in public, the use of online social networking sites (SNSs) can be conceptualised as what Foucault has described as a ‘technique of self’. This article explores examples of status updates on Facebook to reveal that writing on Facebook is a tool for self-formation with historical roots. Exploring examples of self-writing from the past, and considering some of the continuities and discontinuities between these age-old practices and their modern translations, provides a non-technologically deterministic and historically aware way of thinking about the use of new media technologies in modern societies that understands them to be more than mere tools for communication.
Resumo:
Tacit knowledge sharing amongst physicians is known to have a significant impact on the quality of medical decisions. This thesis posits that social media can provide new opportunities for tacit knowledge sharing amongst physicians, and demonstrates this by presenting findings from a review of relevant literature and a qualitative survey conducted with physicians. Using thematic analysis, the study revealed five major themes and over twenty sub-themes as potential contributions of social media to tacit knowledge flow amongst physicians.
Resumo:
This study investigates grade eight girls’ use of status updates on Facebook in order to create identities online. Using sociologist Erving Goffman’s theory of self-presentation as a framework, Jones and Pittman’s subsequent strategies of self-presentation are used to discover the ways in which teenage girls use status updates in order to create identities online and manage audience impressions. Using a mixed methods design, the results showed that, while existing self-presentation strategies persist, social networking has created new means of self-presentation. This study adds to a growing pool of research regarding teens’ engagement with social networking websites to form identities.
Resumo:
Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.
Resumo:
User-generated content plays a pivotal role in the current social media. The main focus, however, has been on the explicitly generated user content such as photos, videos and status updates on different social networking sites. In this paper, we explore the potential of implicitly generated user content, based on users’ online consumption behaviors. It is technically feasible to record users’ consumption behaviors on mobile devices and share that with relevant people. Mobile devices with such capabilities could enrich social interactions around the consumed content, but it may also threaten users’ privacy. To understand the potentials of this design direction we created and evaluated a low-fidelity prototype intended for photo sharing within private groups. Our prototype incorporates two design concepts, namely, FingerPrint and MoodPhotos that leverage users’ consumption history and emotional responses. In this paper, we report user values and user acceptance of this prototype from three participatory design workshops.