751 resultados para Hewett, J. F. Napier.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The 'Dark Triad' of socially aversive personality traits (Machiavellianism, Narcissism, and Psychopathy) is typically associated with grandiosity, callousness, and exploitation. Despite this, people with such traits can be very successful in life, especially in the occupational context. This study investigated the characteristics of individuals who enable and abet people high on Dark Triad traits (e.g. through tolerating unpleasant behaviours, not challenging unethical conduct, etc.). High Dark Triad individuals may be able to identify individuals who are susceptible to social manipulation and who are therefore less likely to challenge their behaviours. This study used a 20-item Vulnerability Scale to capture the characteristics of individuals who fall victim to people high on the Dark Triad traits. Cronbach's alpha for the Vulnerability Scale was .80. Pearson's correlation between total vulnerability scores and each of the Big Five personality traits revealed that predictors of vulnerability to social manipulation include low extraversion, low conscientiousness, high neuroticism, and high agreeableness. The vignette method was used to elicit perceptions of Dark Triad behaviours from those who are found to demonstrate signs of social vulnerability. Differences in response styles on Likert-type statements and open-ended questions were found between the high and low vulnerability groups.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The present research, undertaken in a mangrove swamp in northeastern Brazil (Mamanguape River Estuary), examined the factors that led to the overwhelming acceptance of the tangle-netting technique by crab harvesters in detriment to the now illegal tamping technique. Both techniques are the only ones currently used at our study site and in many other areas in Brazil, despite being prohibited by law. Data were collected through direct observations to determine capture efficiency, productivity, daily production, selectivity, and harvesting effort, and through interviews with crab harvesters, focusing on their perceptions of the capture techniques, the conditions of crab stocks and the sales price of a dozen crabs. Our results indicated that the two capture techniques did not significantly differ in terms of their efficiency or productivity, but daily production rates differed significantly, being greater using tangle-netting. The tangle-netting permits a greater harvesting effort (6 hours and 34 min) compared to tamping (4 hours and 19 min). Tangle-netting is also less selective than tamping indicated by the larger number of captured smaller specimens, including females. This results in a lower average sales price for a dozen crabs caught by tangle-netting (US$ 0.95) compared to tamping (US$ 1.02). The greater daily production of crab harvesters using the tangle-netting technique nevertheless increased their net gain, explaining their preference for this method, Given that tangle-netting results in greater harvesting pressure but lower selectivity compared to tamping, it may potentially be less sustainable. All of the crab harvesters interviewed having more than 20 years of experience (n = 34) stated they perceived that stocks of U. cordatus had become reduced over the last 20 years, together with average crab sizes. It is now important to examine the structure of the local U. cordatus population and to assess its fishery to allow evaluating whether the illegal, but prominent tangle-netting and tamping mangrove crab capture techniques are sustainable or not. We further suggest improving the dialogue between decision makers and fishermen, which barely exists to date, to initiate a discussion about possible ways of resolving the current situation of illegality of the fishermen. This will be key to achieving effective sustainable co-management of this important natural mangrove forest resource.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Discussion paper commissioned by the RSE for its official working group on BBC Charter Renewal. The paper sought to investigate evolving mobile digital platforms and audience habits. Beyond this the research was intended to highlight areas where the BBC might develop a more commercial strategy in the new charter period. The paper fed into the discussions around the RSE response to the government consultation on BBC Charter renewal. The paper is significant to measure the impact of research around interactive Second Screen activity in the media landscape.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This book examines an emerging and fast evolving phenomena: that a growing number of people engage with two screens whilst watching television. It seems a simple concept – until we discover the important implications. In doing this, this book will move way beyond the study of online and multimedia content. It will go past the impact of mobile and multi-platform technology on the media. Instead it will examine how this new concept of second screen interactivity changes the way we watch, produce, commission and monetise television programmes in the UK.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article will examine how media organisations are increasingly experimenting and innovating with interactive transmedia forms to explore issues around displacement and the ongoing migration crisis. I plan to interview a number of key industry figures with a view to understand how and why journalists and producers are expanding the scope of factual storytelling beyond traditional media platforms. It will include a number of industry case studies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Studying the impact of Armando Iannucci's McTaggart Lecture on the debate over the future of public service broadcasting in the UK.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A commissioned article for the Conversation website on the innovative publishing platform Medium and a comparison with other established social media sites.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

TV Advertising is evolving quickly. This article examines how the popularity of viewing content on mobile platforms is changing the way we advertise. VOD and OTT media services have meant that advertisers can now automate and personalise their TV advertising. It's having a significant impact on the UK TV business model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper explores hybrid forms of contemporary political opinion-making online, which we name ePunditry. The ePundit utilizes Web 2.0 technologies and networks to distribute their work: changing and challenging the boundaries and hierarchies of the existing opinion space, across multiple platforms. Drawing on the language of media ecology we define and give examples of ePunditry. We also consider the impact of the ePundit upon the wider media landscape, alongside the empowered role of the readership.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Securing e-health applications in the context of Internet of Things (IoT) is challenging. Indeed, resources scarcity in such environment hinders the implementation of existing standard based protocols. Among these protocols, MIKEY (Multimedia Internet KEYing) aims at establishing security credentials between two communicating entities. However, the existing MIKEY modes fail to meet IoT specificities. In particular, the pre-shared key mode is energy efficient, but suffers from severe scalability issues. On the other hand, asymmetric modes such as the public key mode are scalable, but are highly resource consuming. To address this issue, we combine two previously proposed approaches to introduce a new hybrid MIKEY mode. Indeed, relying on a cooperative approach, a set of third parties is used to discharge the constrained nodes from heavy computational operations. Doing so, the pre-shared mode is used in the constrained part of the network, while the public key mode is used in the unconstrained part of the network. Preliminary results show that our proposed mode is energy preserving whereas its security properties are kept safe.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents the evaluation of morpheme a sketching interface for the control of sound synthesis. We explain the task that was designed in order to assess the effectiveness of the interface, detect usability issues and gather participants’ responses regarding cognitive, experiential and expressive aspects of the interaction. The evaluation comprises a design task, where partici-pants were asked to design two soundscapes using the morpheme interface for two video footages. Responses were gathered using a series of likert type and open-ended questions. The analysis of the data gathered revealed a number of usability issues, however the performance of morpheme was satisfactory and participants recognised the creative potential of the interface and the synthesis methods for sound design applications.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sound is potentially an effective way of analysing data and it is possible to simultaneously interpret layers of sounds and identify changes. Multiple attempts to use sound with scientific data have been made, with varying levels of success. On many occasions this was done without including the end user during the development. In this study a sonified model of the 8 planets of our solar system was built and tested using an end user approach. The sonification was created for the Esplora Planetarium, which is currently being constructed in Malta. The data requirements were gathered from a member of the planetarium staff, and 12 end users, as well as the planetarium representative tested the sonification. The results suggest that listeners were able to discern various planetary characteristics without requiring any additional information. Three out of eight sound design parameters did not represent characteristics successfully. These issues have been identified and further development will be conducted in order to improve the model.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

SQL Injection Attack (SQLIA) remains a technique used by a computer network intruder to pilfer an organisation’s confidential data. This is done by an intruder re-crafting web form’s input and query strings used in web requests with malicious intent to compromise the security of an organisation’s confidential data stored at the back-end database. The database is the most valuable data source, and thus, intruders are unrelenting in constantly evolving new techniques to bypass the signature’s solutions currently provided in Web Application Firewalls (WAF) to mitigate SQLIA. There is therefore a need for an automated scalable methodology in the pre-processing of SQLIA features fit for a supervised learning model. However, obtaining a ready-made scalable dataset that is feature engineered with numerical attributes dataset items to train Artificial Neural Network (ANN) and Machine Leaning (ML) models is a known issue in applying artificial intelligence to effectively address ever evolving novel SQLIA signatures. This proposed approach applies numerical attributes encoding ontology to encode features (both legitimate web requests and SQLIA) to numerical data items as to extract scalable dataset for input to a supervised learning model in moving towards a ML SQLIA detection and prevention model. In numerical attributes encoding of features, the proposed model explores a hybrid of static and dynamic pattern matching by implementing a Non-Deterministic Finite Automaton (NFA). This combined with proxy and SQL parser Application Programming Interface (API) to intercept and parse web requests in transition to the back-end database. In developing a solution to address SQLIA, this model allows processed web requests at the proxy deemed to contain injected query string to be excluded from reaching the target back-end database. This paper is intended for evaluating the performance metrics of a dataset obtained by numerical encoding of features ontology in Microsoft Azure Machine Learning (MAML) studio using Two-Class Support Vector Machines (TCSVM) binary classifier. This methodology then forms the subject of the empirical evaluation.