771 resultados para informality of e-mail communication


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The ability of new information and communication technologies to pierce previously impenetrable physical, personal, and social boundaries has particular relevance to contemporary society and young people as there is now more information that can be collected, accessed, and distributed about individuals and groups. The ability to know about each other has become a central feature of many young people’s lives. The need to know is further complicated by other questions – Who knows? What do they know? What are the implications of this knowledge?. These questions are a consequence of society having become more mobile and networked enabling increased surveillance, tracking, and spreading of dis/information. With the acceleration of new pervasive and immersive technologies, these questions have taken on a new urgency and significance that go beyond an Orwellian Big Brother scenario. This chapter extends Foucault’s notion of the panopticon to take account of the challenges of an AmI environment of smart networked devices. By drawing on examples of recent young adult fiction, I examine some of the ways in which these texts invite their readers to reflect and speculate on the uneasy relationship between surveillance and democracy and what this means for individual rights and freedom, and a sense of place and belonging.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Creative entrepreneurs, the business executives who operate in the creative industries sector of economy, possess distinctive characteristics that influence people around them due to the nature of creative industries, their position in the society and their relations with people within their business operation. While there is a large amount of research focusing on industry development; the research on creative entrepreneurs as a group is much less, let alone their influence on people associated with them. Through exploring literatures on entrepreneurship in creative industries, leadership with particular focus on charismatic and shared leadership, cognitive psychology and the psychology of entrepreneurship, this study integrates seemingly remote notions from different disciplines and concludes that creative entrepreneurs as a special group of entrepreneurs influence other people in their operational settings. These settings are culturally stimulating and provocative. Creative entrepreneurs change people’s way of thinking through their intrinsic attributes and nature of the creative industries.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Many educators are currently interested in using computer-mediated communications (CMCs) to support learning and creative practice. In my work I have been looking at how we might create drama through using cyberspaces, working with teachers and students in secondary school contexts. In trying to understand issues that have arisen and ways of working with the data I have found a number of frameworks helpful for analysing the online interactions. These frameworks draw from O'Toole's work on contexts negotiated in the creation of drama and other frameworks drawn from Wertsch, Bakhtin and Vygotsky's work on speech utterances, dialogic processes and internalisation of learning. The contexts and factors which must be negotiated in online communications within learning contexts are quite complex and educators may need to provide parameters and protocols to ensure appropriate languages, genres and utterances are utilised. The paper explores some of the types of languages, genres and utterances that emerged from a co-curricula drama project and issues that arose, including the importance of establishing processes for giving and receiving critical feedback This paper is of relevance to those whose research strategies may involve the use of computer-mediated communications as well as those utilising cyberspaces in educational contexts.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Paediatric Nursing in Australia equips students with the essential skills and knowledge to become paediatric, child and youth health nurses across a variety of clinical and community settings. It prepares students for critical thinking and problem solving within this field by emphasising contemporary issues impacting on the health of children, young people and their families. Written by a team of experienced paediatric nurses, the content is based on themes that align with Australian standards of competence and expectations of paediatric nursing: communication, family involvement and evidence-based practice. Comprehensive yet concise, the text examines the integration of theoretical and clinical components of nursing knowledge. To enhance learning, chapters feature case studies, reflection points and learning activities. An essential resource for nursing students, this text is grounded in current care delivery and professional issues for care of the child to prepare future nurses for evidence-based practice in paediatric settings throughout Australia. • Prepares students for critical thinking and problem solving within paediatric, child and youth health nursing by emphasising contemporary issues that impact on the health of children and young people and their families • Written by a team of experienced paediatric nurses • Enhances learning by providing illustrative case studies, reflection points and learning activities in each chapter

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: Within Australia and internationally (Health Workforce Australia, 2012) an increasing and on-going nursing workforce shortage is documented. Recent international estimates indicate that there will be ongoing and significant gaps in the supply of a nursing workforce; the United Kingdom is predicted to have a reduction of 12.12% nurses over the coming eight years if a current 'steady state' is maintained (Buchan and Seacombe, 2011); Canada is predicted to have a shortage of 60,000 nurses by 2022 (Tomblin et al., 2012) with Australia's anticipated nursing shortage reported as over 90,000 by the year 2025 (Health Workforce Australia, 2012). Queensland Health in response to their tracked emerging nursing and midwifery workforce shortages developed a nursing and midwifery refresher programme to return registered staff back to the workforce. A study was undertaken between 2008 and 2010 to provide an understanding of how non-practising nurses and midwives maybe supported back into the workforce. METHODS: Programme applicants (444) were invited to respond to an on-line survey designed to understand what aspects of the programme supported their learning and ability to return to the workforce. This number represents those who applied but not all completed or commenced the programme. Descriptive statistics (Polit and Beck, 2008) were used to collate quantifiable survey responses and free text and unsolicited responses were themed. RESULTS: The survey received a 35.5% response rate (n=158) with a return of 20% of unsolicited comments in the form of e-mail responses which were included in the themed results. Key themes supporting participants' learning and ability to return to the workforce were: Respondents were 94% female and 6% male, with 37.7% >51 years of age. Child rearing was the foremost reason for female staff relinquishing workforce roles (36.6%). The primary reason for returning to the workforce was maintenance of registration (40.5%). Both theory and clinical placement components were seen by participants as contributing to their confidence to return to the health workforce. CONCLUSION: The Queensland Nursing and Midwifery Refresher Programs provided a structured programme for registered, non-practising nurses and midwives to return to the Queensland Health workforce. Responses indicated that clinical supervision and contract learning should be central to a return to workforce induction programme for registered but non-practising nurses and midwives. The majority of nurses and midwives returning to the workforce were approaching retirement age in 10-15 years.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Missoni is a luxury Italian knitwear brand that partnered with Target in September 2011 releasing a large, one off, mass-market collection that ranged from apparel to home wares. The collaboration received extensive media coverage and was consequently extremely sought after. The online sales site crashed within hours of opening while shelves were cleared in stores minutes after trading began. Within hours more than 40000 items from the collection were posted for sale online at greatly inflated prices. Evaluation of the case study revealed that sales of the Missoni collection increased following the collaboration and the value of the publicity generated at estimated US$100 million. The lack of available stock, despite the enormous hype created, reinforced Missoni’s luxury image. Missoni was able to gain massive awareness of the brand despite not employing any of its own communication channels in the promotion of the collaboration. However the co-branded collaboration was distinctively Missoni, potentially inciting comparison and confusion with the signature line. Nevertheless, this study shows that co-branding strategies can offer a viable opportunity for luxury brands to increase their market share, while they maintain their market position.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The integration of Information and Communication Technologies (ICT) into healthcare processes “eHealth” is driving enormous change in healthcare delivery and productivity. The transformations empower patients and present opportunities for new synergies between healthcare professionals, clinical decision makers, policy makers and educators. Technologies that are directly driving changes include Tele-medicine, Electronic health records (EHR), Standards to ensure computer systems inter-operate, Decision support systems, Data mining and easy access to medical information. This workshop provides an introduction to key informatics initiatives in eHealth using real examples and suggests how applications can be applied to modern society.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, the recent results of the space project IMPERA are presented. The goal of IMPERA is the development of a multirobot planning and plan execution architecture with a focus on a lunar sample collection scenario in an unknown environment. We describe the implementation and verification of different modules that are integrated into a distributed system architecture. The modules include a mission planning approach for a multirobot system and modules for task and skill execution within a lunar use-case scenario. The skills needed for the test scenario include cooperative exploration and mapping strategies for an unknown environment, the localization and classification of sample containers using a novel approach of semantic perception, and the skill of transporting sample containers to a collection point using a mobile manipulation robot. Additionally, we present our approach of a reliable communication framework that can deal with communication loss during the mission. Several modules are tested within several experiments in the domain of planning and plan execution, communication, coordinated exploration, perception, and object transportation. An overall system integration is tested on a mission scenario experiment using three robots.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Objective The main aim of this study was to identify young drivers' underlying beliefs (i.e., behavioral, normative, and control) regarding initiating, monitoring/reading, and responding to social interactive technology (i.e., functions on a Smartphone that allow the user to communicate with other people). Method This qualitative study was a beliefs elicitation study in accordance with the Theory of Planned Behavior and sought to elicit young drivers' behavioral (i.e., advantages, disadvantages), normative (i.e., who approves, who disapproves), and control beliefs (i.e., barriers, facilitators) which underpin social interactive technology use while driving. Young drivers (N = 26) aged 17 to 25 years took part in an interview or focus group discussion. Results While differences emerged between the three behaviors of initiating, monitoring/reading, and responding for each of the behavioral, normative, and control belief categories, the strongest distinction was within the behavioral beliefs category (e.g., communicating with the person that they were on the way to meet was an advantage of initiating; being able to determine whether to respond was an advantage of monitoring/reading; and communicating with important people was an advantage of responding). Normative beliefs were similar for initiating and responding behaviors (e.g., friends and peers more likely to approve than other groups) and differences emerged for monitoring/reading (e.g., parents were more likely to approve of this behavior than initiating and responding). For control beliefs, there were differences between the beliefs regarding facilitators of these behaviors (e.g., familiar roads and conditions facilitated initiating; having audible notifications of an incoming communication facilitated monitoring/reading; and receiving a communication of immediate importance facilitated responding); however, the control beliefs that presented barriers were consistent across the three behaviors (e.g., difficult traffic/road conditions). Conclusion The current study provides an important addition to the extant literature and supports emerging research which suggests initiating, monitoring/reading, and responding may indeed be distinct behaviors with different underlying motivations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mike Budd and Max H. Kirsch, eds. Rethinking Disney: Private Control, Public Dimensions. Middletown, CT: Wesleyan University Press, 2005. ix + 341pp. $27.95

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The access to mobile technologies is growing at an exponential rate in developed and developing countries, with some developing countries surpassing developed countries in terms of device ownership. It is both the demand for, and high usage of mobile technologies that have driven new and emerging pedagogical practices in higher education. These technologies have also exponentially increased access to information in a knowledge economy. While differences are often drawn between developing and developed countries in terms of the access and use of information and communication technologies (ICT), this paper will report on a study detailing how higher education students use mobile technologies and social media in their studies and in their personal lives. It will contrast the similarities in how students from an Australian and Vietnamese university access and use mobile and social media technologies while also highlighting ways in which these technologies can be embraced by academics to connect and engage with students.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Undergraduate medical imaging students at an urban Australian university attend their first clinical placement towards the end of Semester two in their first year. While they often have a great deal of contextual knowledge and targeted theoretical learning prior to their first clinical placement, many of them are unfamiliar with the dynamics of a hospital environment. With the increase in online communication platforms, there was a concern that face-to-face clinical communication skills were becoming a source of anxiety for students, especially prior to their first clinical placements. Given the impact of anxiety on communication, reducing communication-related apprehension was considered a programme priority. A pilot series of scenario-based tutorials was implemented in the general radiography unit for the first year students.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Dialogue is a spontaneous, free-flowing, and untrammeled form of two-way communication between participants who respect, trust, and empathize with each other. Its ethical superiority and effectiveness in bringing participants together mean it is an important aspect of organizational responses to increasingly-empowered stakeholders. But what happens when dialogue is legally mandated between participants who view each other as a problem, if not actually the enemy? When dialogue is perceived as a contest with the winner securing the prize of dictating organizational behavior? Is this – can this ever be – dialogue? Sometimes what happens in the name of dialogue is far from dialogic, and ‘dialogue’ is reduced to ticking a box on a form, or closing a communication loop. This challenges those very characteristics that are the basis of dialogue’s claim to superiority. This conclusion demonstrates the need for a radical reconsideration of both the theory and practice of dialogue in public relations.