941 resultados para Outstanding housewives
Resumo:
Mode of access: Internet.
Resumo:
The article published in the Times Educational Supplement (TES) features research by Professor Dhillon from the University of Worcester.
Resumo:
The workshop will invite participants to engage in a discussion of the characteristics of outstanding leadership by taking part in an interactive activity which we have developed and used in different types of schools and colleges in England. The activity uses Q-methodology to develop and refine characteristics of outstanding leaders and outstanding leadership in education from a range of stakeholder perspectives. Q-methodology is a research method which originates from psychology and is used to study people's subjective viewpoints. We are applying the methodology to the study of enacted leadership practice in different educational contexts. Our sample of stakeholders consists of school and college leaders, governors, middle leaders, teachers, teacher educators, researchers and scholars in educational leadership and management research and practice. The range of contexts in which they work represents different age phases of education; primary, secondary and further education colleges, urban and rural schools and colleges and selective and non-selective schools. In the workshop participants will be invited to take part in the Q-sort activity we have used with in our research, using statements from leadership theory and practice. The Q-sort will be followed by discussion and reflection on the statements in relation to participants’ own experiences of leadership, management and governance in different contexts.
Resumo:
The Queensland Department of Public Works (QDPW) and the Queensland Department of Main Roads (QDMR) have identified a need for industry e-contracting guidelines in the short to medium term. Each of these organisations conducts tenders and contracts for over $600 million annually. This report considers the security and legal issues relating to the shift from a paper-based tendering system to an electronic tendering system. The research objectives derived from the industry partners include: • a review of current standards and e-tendering systems; • a summary of legal requirements impacting upon e-tendering; • an analysis of the threats and requirements for any e-tendering system; • the identification of outstanding issues; • an evaluation of possible e-tendering architectures; • recommendations for e-tendering systems.
Resumo:
Increasingly, leadership is argued as a way forward to improve performance and practice in a variety of contexts. School leadership is no different. There is little doubt that in the current globalised world characterized by change and complexity, effective school leadership is a key requirement. The contribution of this chapter is framed around a synthesis of current research, writing and theoretical insights regarding leadership. It draws upon three bodies of writing, Firstly, it begins by distilling several key themes and trends regarding educational leadership from the current research and writing. Secondly, it reports on the findings of a current research project carried out by the authors that explored the leadership stories of ten outstanding leaders from non-educational settings in Australia. Finally, it concludes by referring to some of the paradoxes and tensions inherent in the work of school leaders. It is argued that understanding and endeavouring to reconcile these dilemmas is a pre-requisite for school leaders as they continue to operate in an environment fraught with change and complexity.
Resumo:
This research investigates wireless intrusion detection techniques for detecting attacks on IEEE 802.11i Robust Secure Networks (RSNs). Despite using a variety of comprehensive preventative security measures, the RSNs remain vulnerable to a number of attacks. Failure of preventative measures to address all RSN vulnerabilities dictates the need for a comprehensive monitoring capability to detect all attacks on RSNs and also to proactively address potential security vulnerabilities by detecting security policy violations in the WLAN. This research proposes novel wireless intrusion detection techniques to address these monitoring requirements and also studies correlation of the generated alarms across wireless intrusion detection system (WIDS) sensors and the detection techniques themselves for greater reliability and robustness. The specific outcomes of this research are: A comprehensive review of the outstanding vulnerabilities and attacks in IEEE 802.11i RSNs. A comprehensive review of the wireless intrusion detection techniques currently available for detecting attacks on RSNs. Identification of the drawbacks and limitations of the currently available wireless intrusion detection techniques in detecting attacks on RSNs. Development of three novel wireless intrusion detection techniques for detecting RSN attacks and security policy violations in RSNs. Development of algorithms for each novel intrusion detection technique to correlate alarms across distributed sensors of a WIDS. Development of an algorithm for automatic attack scenario detection using cross detection technique correlation. Development of an algorithm to automatically assign priority to the detected attack scenario using cross detection technique correlation.
Resumo:
A commonly held belief in the IS discipline is that rigour and relevance are contrary to each other and that addressing both is virtually impossible. It is also believed widely that the editorial practices of our premier conferences and journals over-emphasise rigour on the cost of relevance. However, while these two topics have been filled with numerous subjective discussions, more solid evidence into the true relationship between rigour and relevance and the impact of conference editors on this relationship is still outstanding. This paper contributes to this debate by deriving empirical evidence from a comprehensive and detailed analysis of the characteristics of the submissions and the reviewing practices of three recent IS conferences. It provides first insights into the actual relationship between rigour and relevance and into the role conference chairs play in balancing rigour and relevance. Besides the outcomes that the current set of evaluation criteria does not provide a straight forward proxy for relevance to practitioners, the paper offers two main contributions. First, empirical insights are provided that rigour and relevance do in fact not have to be mutually exclusive. Second, the editorial practices at conferences are skewed towards rigorous papers rather than relevant papers.
Resumo:
Abstract: Purpose – Several major infrastructure projects in the Hong Kong Special Administrative Region (HKSAR) have been delivered by the build-operate-transfer (BOT) model since the 1960s. Although the benefits of using BOT have been reported abundantly in the contemporary literature, some BOT projects were less successful than the others. This paper aims to find out why this is so and to explore whether BOT is the best financing model to procure major infrastructure projects. Design/methodology/approach – The benefits of BOT will first be reviewed. Some completed BOT projects in Hong Kong will be examined to ascertain how far the perceived benefits of BOT have been materialized in these projects. A highly profiled project, the Hong Kong-Zhuhai-Macau Bridge, which has long been promoted by the governments of the People's Republic of China, Macau Special Administrative Region and the HKSAR that BOT is the preferred financing model, but suddenly reverted back to the traditional financing model to be funded primarily by the three governments with public money instead, will be studied to explore the true value of the BOT financial model. Findings – Six main reasons for this radical change are derived from the analysis: shorter take-off time for the project; difference in legal systems causing difficulties in drafting BOT agreements; more government control on tolls; private sector uninterested due to unattractive economic package; avoid allegation of collusion between business and the governments; and a comfortable financial reserve possessed by the host governments. Originality/value – The findings from this paper are believed to provide a better understanding to the real benefits of BOT and the governments' main decision criteria in delivering major infrastructure projects.
Resumo:
A considerable proportion of convicted sex offenders maintain a stance of innocence and thus do not engage in recommended treatment programs. As a result, such offenders are often deemed to have outstanding criminogenic needs which may negatively impact upon risk assessment procedures and parole eligibility. This paper reports on a study that aimed to investigate a group of forensic psychologists’ attitudes regarding the impact of denial on risk assessment ratings as well as parole eligibility. Participants completed a confidential open-ended questionnaire. Analysis indicated that considerable variability exists among forensic psychologists in regards to their beliefs about the origins of denial and what impact such denial should have on post-prison release eligibility. In contrast, there was less disparity regarding beliefs about the percentage of innocent yet incarcerated sex offenders. This paper also reviews current understanding regarding the impact of denial on recidivism as well as upon general forensic assessments.
Resumo:
The Series Elasic Actuator has been proposed as a method for providing safe force or torque based acutation for robots that interact with humans. In this paper we look at some outstanding issues in the implementation and control of Series Elastic Actuators. The study addresses issues in making the Series Elastic Actuator respond effectively in the presence of physical difficulties such as restriction, using a computation efficient controller. The improvement over previous implementations is achieved by treating the motor as a velocity source to the elastic element, rather than as a torque source.