779 resultados para Security Studies - Military
Resumo:
This thesis develops a critical realist explanatory critique of alternative schooling programs for youth at risk taking place at three case study sites. Throughout the thesis the author pursues the question, \Are alternative provisions of schooling working academically and socially for youth at risk?. The academic lens targets literacy learning and associated pedagogies. Social outcomes are posited as positive social behaviours and continued engagement in learning. A four phased analysis, drawing on critical realism, interpretive and subject specific theories is used to elicit explanations for the research question. An overall framework is a critical realist methodology as set out by Danermark, Ekstrom, Jakobsen and Karlsson (2002, p. 129). Consequently phase one describes the phenomena of alternative schooling programs taking place at three case study sites. This is reported first as staff narratives that are resolved into imaginable historical causal components of \generative events., \prior schooling structures., \models of alternative schooling., \purpose., \individual agency., and \relations with linked community organisations.. Then transcendental questions are posed about each component using retroduction to uncover structures, underlying mechanisms and powers, and individual agency. In the second phase the researcher uses modified grounded theory methodology to theoretically redescribe causal categories related to a \needed different teaching and administrative approach. that emerged from the previous critique. A transcendental question is then applied to this redescription. The research phenomena are again theoretically redescribed in the third phase, this time using three theoretically based constructs associated with literacy and literacy pedagogies; the NRS, the 4 Resources Model, and Productive Pedagogies. This redescription is again questioned in terms of its core or \necessary. components. The fourth phase makes an explanatory critique by comparing and critiquing all previous explanations, recontextualising them in a wider macro reality of alternative schooling. Through this critical realist explanatory critiquing process, a response emerges not only to whether alternative provisions of schooling are working, but also how they are working, and how they are not working, with realistically based implications for future improvement.
Resumo:
Critical skills such as identifying and appreciating issues that confront firms engaging in international business, and the ability to undertake creative decision-making, are considered fundamental to the study of International Business. It has been argued that using audio-visual case studies can help develop such skills. However, this is difficult due to a lack of Australian case studies. This paper reviews the literature outlining the advantages believed to result from the use of audio-visual case studies, describes a project implemented in a large cohort of students studying International Business, reports on a pilot evaluation of the project, and outlines the findings and conclusions of the survey.
Resumo:
Synchronous fluorescence spectroscopy (SFS) was applied for the investigation of interactions of the antibiotic, tetracycline (TC), with DNA in the presence of aluminium ions (Al3+). The study was facilitated by the use of the Methylene Blue (MB) dye probe, and the interpretation of the spectral data with the aid of the chemometrics method, parallel factor analysis (PARAFAC). Three-way synchronous fluorescence analysis extracted the important optimum constant wavelength differences, , and showed that for the TCAl3+DNA, TCAl3+ and MB dye systems, the associated values were different ( = 80, 75 and 30 nm, respectively). Subsequent PARAFAC analysis demonstrated the extraction of the equilibrium concentration profiles for the TCAl3+, TCAl3+DNA and MB probe systems. This information is unobtainable by conventional means of data interpretation. The results indicated that the MB dye interacted with the TCAl3+DNA surface complex, presumably via a reaction intermediate, TCAl3+DNAMB, leading to the displacement of the TCAl3+ by the incoming MB dye probe.
Resumo:
The interaction of quercetin, which is a bioflavonoid, with bovine serum albumin (BSA) was investigated under pseudo-physiological conditions by the application of UVvis spectrometry, spectrofluorimetry and cyclic voltammetry (CV). These studies indicated a cooperative interaction between the quercetinBSA complex and warfarin, which produced a ternary complex, quercetinBSAwarfarin. It was found that both quercetin and warfarin were located in site I. However, the spectra of these three components overlapped and the chemometrics method multivariate curve resolution-alternating least squares (MCR-ALS) was applied to resolve the spectra. The resolved spectra of quercetinBSA and warfarin agreed well with their measured spectra, and importantly, the spectrum of the quercetinBSAwarfarin complex was extracted. These results allowed the rationalization of the behaviour of the overlapping spectra. At lower concentrations ([warfarin] < 1 105 mol L1), most of the site marker reacted with the quercetinBSA, but free warfarin was present at higher concentrations. Interestingly, the ratio between quercetinBSA and warfarin was found to be 1:2, suggesting a quercetinBSA(warfarin)2 complex, and the estimated equilibrium constant was 1.4 1011 M2. The results suggest that at low concentrations, warfarin binds at the high-affinity sites (HAS), while low-affinity binding sites (LAS) are occupied at higher concentrations.
Resumo:
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.
Resumo:
Public key cryptography, and with it,the ability to compute digital signatures, have made it possible for electronic commerce to flourish. It is thus unsurprising that the proposed Australian NECS will also utilise digital signatures in its system so as to provide a fully automated process from the creation of electronic land title instrument to the digital signing, and electronic lodgment of these instruments. This necessitates an analysis of the fraud risks raised by the usage of digital signatures because a compromise of the integrity of digital signatures will lead to a compromise of the Torrens system itself. This article will show that digital signatures may in fact offer greater security against fraud than handwritten signatures; but to achieve this, digital signatures require an infrastructure whereby each component is properly implemented and managed.
Resumo:
Aims: Influenza is commonly spread by infectious aerosols; however, detection of viruses in aerosols is not sensitive enough to confirm the characteristics of virus aerosols. The aim of this study was to develop an assay for respiratory viruses sufficiently sensitive to be used in epidemiological studies. Method: A two-step, nested real-time PCR assay was developed for MS2 bacteriophage, and for influenza A and B, parainfluenza 1 and human respiratory syncytial virus. Outer primer pairs were designed to nest each existing real-time PCR assay. The sensitivities of the nested real-time PCR assays were compared to those of existing real-time PCR assays. Both assays were applied in an aerosol study to compare their detection limits in air samples. Conclusions: The nested real-time PCR assays were found to be several logs more sensitive than the real-time PCR assays, with lower levels of virus detected at lower Ct values. The nested real-time PCR assay successfully detected MS2 in air samples, whereas the real-time assay did not. Significance and Impact of the Study: The sensitive assays for respiratory viruses will permit further research using air samples from naturally generated virus aerosols. This will inform current knowledge regarding the risks associated with the spread of viruses through aerosol transmission.
Resumo:
This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security measures, the RSNs remain vulnerable to a number of attacks. Failure of preventative measures to address all RSN vulnerabilities dictates the need for a comprehensive monitoring capability to detect all attacks on RSNs and also to proactively address potential security vulnerabilities by detecting security policy violations in the WLAN. This research proposes novel wireless intrusion detection techniques to address these monitoring requirements and also studies correlation of the generated alarms across wireless intrusion detection system (WIDS) sensors and the detection techniques themselves for greater reliability and robustness. The specific outcomes of this research are: A comprehensive review of the outstanding vulnerabilities and attacks in IEEE 802.11i RSNs. A comprehensive review of the wireless intrusion detection techniques currently available for detecting attacks on RSNs. Identification of the drawbacks and limitations of the currently available wireless intrusion detection techniques in detecting attacks on RSNs. Development of three novel wireless intrusion detection techniques for detecting RSN attacks and security policy violations in RSNs. Development of algorithms for each novel intrusion detection technique to correlate alarms across distributed sensors of a WIDS. Development of an algorithm for automatic attack scenario detection using cross detection technique correlation. Development of an algorithm to automatically assign priority to the detected attack scenario using cross detection technique correlation.
Resumo:
EPR study of both blue and green sapphire samples confirms the presence of Cr(III) in four different octahedral sites. The g (1.98) value is the same but D values differ for the two the samples. The EPR spectra suggest that the blue sapphire contains more chromium than the green sapphire. No Fe(III) impurity was noted in the EPR spectrum.
Resumo:
This paper examines performances that defy established representations of disease, deformity and bodily difference. Historically, the deformed body has been cast onstage and in sideshows as flawed, an object of pity, or an example of the human capacity to overcome. Such representations define the boundaries of the normal body by displaying its Other. They bracket the abnormal body off as an example of deviance from the norm, thus, paradoxically, decreasing the social and symbolic visibility (and agency) of disabled people. Yet, in contemporary theory and culture, these representations are reappropriated by disabled artists, certainly, but also as what Carrie Sandahl has called a master trope for representing a range of bodily differences. In this paper, I investigate this phenomenon. I analyse French Canadian choreographer Marie Chouinards bODY rEMIX/gOLDBERG vARIATIONS, in which 10 able-bodied dancers are reborn as bizarre biotechnical mutants via the use of crutches, walkers, ballet shoes and barres as prosthetic pseudo-organs. These bodies defy boundaries, defy expectations, develop new modes of expression, and celebrate bodily difference. The self-inflicted pain dancers experience during training is cast as a disablement that is ultimately enabling. I ask what effect encountering able bodies celebrating dis or diff ability has on audiences. Do we see the emergence of a once-repressed Other, no longer silenced, censored or negated? Or does using disability to express the dancers difference and self-determination usurp a trope by which disabled people themselves might speak back to the dominant culture, creating further censorship?
Resumo:
A laboratory scale twin screw extruder has been interfaced with a near infrared (NIR) spectrometer via a fibre optic link so that NIR spectra can be collected continuously during the small scale experimental melt state processing of polymeric materials. This system can be used to investigate melt state processes such as reactive extrusion, in real time, in order to explore the kinetics and mechanism of the reaction. A further advantage of the system is that it has the capability to measure apparent viscosity simultaneously which gives important additional information about molecular weight changes and polymer degradation during processing. The system was used to study the melt processing of a nanocomposite consisting of a thermoplastic polyurethane and an organically modified layered silicate.
Resumo:
Optical absorption and EPR studies of the mineral tenorite, a cupric oxide, which originated from Mexico and contains 54.40 wt% of CuO. EPR spectral results indicate two Cu(II) closely interacting ions to give a d2 type structure. The calculated spin Hamiltonian at Rt and LNT are g = 2.160 and D = 125 G . The intensity of resonance line is not the same in low and high field regions. The optical absorption spectrum is due to Cu(II) which three sets of energies indicating Cu(II) in two independent tetragonal C4v symmetry, in addition to d2 structure of octahedral coordination. The octahedral and tetragonal field parameters are compared with those reported for several other copper containing minerals.
Resumo:
Objective: To provide a systematic review of papers comparing the effectiveness of different strategies to recruit older adults (aged 50 years and over) to participate in health research studies, to guide successful recruitment in future research. Methods: Four major databases were searched for papers published between 1995 and 2008 with: target group aged 50 years or over; participants allocated to receive one of two or more recruitment strategies; and an outcome measure of response rate or enrolment in study. Results: Twelve papers were included in the review. Conclusion: For postal questionnaires, recruitment strategies used with older adults had comparable outcomes to those used to recruit from the general population. For other types of studies, strategies involving face-to-face contact may be more effective than indirect methods, but this needs to be balanced against feasibility. Overall, little evidence on the topic exists and more rigorous investigation is necessary.
Resumo:
A collection of 60 case studies of the use of Creative Commons licensing in different sectors, including: music, social activism, film, visual arts, collecting, government, publishing and education.
Resumo:
This paper, first presented at a symposium on the 'past, present and future of cultural studies,' traces disciplinary changes in the study of culture from the perspective of 'cultural science', a term that was used by some of the earliest practitioners of cultural studies, including Raymond Williams. The paper goes on to describe some of the present moment, including work on the creative industries, show that a new version of cultural science is needed, based on evolutionary principles, in dialogue with the evolutionary approach in economics that was called for a century ago by Thorstein Veblen. This evolutionary turn, or 'cultural science 2.0,' it is argued, offers a radical and challenging future for cultural studies.