975 resultados para Scanning Electronic Mirror
Resumo:
The ability of new information and communication technologies to pierce previously impenetrable physical, personal, and social boundaries has particular relevance to contemporary society and young people as there is now more information that can be collected, accessed, and distributed about individuals and groups. The ability to know about each other has become a central feature of many young people’s lives. The need to know is further complicated by other questions – Who knows? What do they know? What are the implications of this knowledge?. These questions are a consequence of society having become more mobile and networked enabling increased surveillance, tracking, and spreading of dis/information. With the acceleration of new pervasive and immersive technologies, these questions have taken on a new urgency and significance that go beyond an Orwellian Big Brother scenario. This chapter extends Foucault’s notion of the panopticon to take account of the challenges of an AmI environment of smart networked devices. By drawing on examples of recent young adult fiction, I examine some of the ways in which these texts invite their readers to reflect and speculate on the uneasy relationship between surveillance and democracy and what this means for individual rights and freedom, and a sense of place and belonging.
Resumo:
Devising authentic assessments for subjects with large enrolments is a challenge. This study describes an electronic role-play assessment for approximately 600 first-year nursing students to learn and apply pathophysiology (bioscience) concepts to nursing practice. Students used Microsoft Office PowerPoint® to prepare electronic role-plays both between a nurse and patient, and between two nurses, thus simulating workplace scenarios. Student feedback demonstrated that respondents found this assessment useful for learning pathophysiology, and for applying pathophysiology to a nursing clinical setting. This electronic presentation circumvented issues associated with a traditional oral presentation such as embarrassment and logistics of scheduling groups, and rated well with students of non-English speaking background. The electronic role-play assessment initiative encouraged students to apply their bioscience knowledge to a clinical setting, and allowed students to conceptualise the importance of bioscience within both the nursing degree and the profession.
Resumo:
This conceptual paper is a preliminary part of an ongoing study into take-up of electronic personal health records (ePHRs). The purpose of this work is to contextually ‘operationalise' Grönroos’ (2012) model of value co-creation in service for ePHRs. Using findings in the extant literature we enhance theoretical and practical understanding of the potential for co-creation of value with ePHRs for relevant stakeholders. The research design focused on the selection and evaluation of relevant literature to include in the discussion. The objective was to demonstrate which articles can be used to 'contextualise' the concepts in relation to relevant healthcare providers and patient engagement in the co-creation of value from having shared ePHRs. Starting at the service concept, that is, what the service provider wants to achieve and for whom, there is little doubt that there are recognised benefits that co-create value for both healthcare providers and healthcare consumers (i.e. patients) through shared ePHRs. We further highlight both alignments and misalignments in the resources and activities concepts between stakeholder groups. Examples include the types of functionalities as well as the interactive and peer communication needs perceived as useful for healthcare providers compared to healthcare consumers. The paper has implications for theory and practice and is an original and innovative approach to studying the co-creation of value in eHealth delivery.
Resumo:
Theoretical accounts suggest that mirror neurons play a crucial role in social cognition. The current study used transcranial-magnetic stimulation (TMS) to investigate the association between mirror neuron activation and facialemotion processing, a fundamental aspect of social cognition, among healthy adults (n = 20). Facial emotion processing of static (but not dynamic) images correlated significantly with an enhanced motor response, proposed to reflect mirror neuron activation. These correlations did not appear to reflect general facial processing or pattern recognition, and provide support to current theoretical accounts linking the mirror neuron system to aspects of social cognition. We discuss the mechanism by which mirror neurons might facilitate facial emotion recognition.
Resumo:
Impairments in social cognitive functioning are well documented in schizophrenia, however the neural basis of these deficits is unclear. A recent explanatory model of social cognition centers upon the activity of mirror neurons, which are cortical brain cells that become active during both the performance and observation of behavior. Here, we test for the first time whether mirror neuron functioning is reduced in schizophrenia. Fifteen individuals with schizophrenia or schizoaffective disorder and fifteen healthy controls completed a transcranial magnetic stimulation (TMS) experiment designed to assess mirror neuron activation. While patients demonstrated no abnormalities in cortical excitability, motor facilitation during action observation, putatively reflecting mirror neuron activity, was reduced in schizophrenia. Dysfunction within the mirror neuron system may contribute to the pathophysiology of schizophrenia.
Resumo:
Industrial control systems (ICS) have been moving from dedicated communications to switched and routed corporate networks, making it probable that these devices are being exposed to the Internet. Many ICS have been designed with poor or little security features, making them vulnerable to potential attack. Recently, several tools have been developed that can scan the internet, including ZMap, Masscan and Shodan. However, little in-depth analysis has been done to compare these Internet-wide scanning techniques, and few Internet-wide scans have been conducted targeting ICS and protocols. In this paper we present a Taxonomy of Internet-wide scanning with a comparison of three popular network scanning tools, and a framework for conducting Internet-wide scans.