747 resultados para INTERNATIONAL SECURITY
Resumo:
Teaching to an international audience online can be significantly different as compared to a traditional classroom setting. In a traditional classroom setting, the students are usually removed from their own cultural context and required to operate in the lecturer’s context. International students coming to Malaysia to study are implicitly expected to, and often do, become familiar with the Malaysian culture and style of education. The use of educational technologies as a blended strategy in higher education programs offers challenges and opportunities for all students but this may be different for international students who come from varied backgrounds. With an increasingly competitive global demand for higher education, Malaysian institutions strive to be the hub of educational excellence and a preferred option for international students in coping with the challenges of studying abroad in a different culture. This research will evaluate how undergraduate students perceive their online learning experiences in a Malaysian institute. The OLES (Online Learning Environment Survey) will be used to explore the international and domestic students’ perception on e-learning and the findings of the last six OLES scales varying from (Equity, Enjoyment, Asychronocity, Evaluation & Assessments, Online Learning Tools, and Interface Design) will be reported in this research. An in-depth study will be conducted to compare and contrast the challenges of international students with domestic students. Major difficulties encountered and how these students actually cope with e-learning, as well as the strategies and tools used to overcome the challenges will be investigated.
Resumo:
An examination of Information Security (IS) and Information Security Management (ISM) research in Saudi Arabia has shown the need for more rigorous studies focusing on the implementation and adoption processes involved with IS culture and practices. Overall, there is a lack of academic and professional literature about ISM and more specifically IS culture in Saudi Arabia. Therefore, the overall aim of this paper is to identify issues and factors that assist the implementation and the adoption of IS culture and practices within the Saudi environment. The goal of this paper is to identify the important conditions for creating an information security culture in Saudi Arabian organizations. We plan to use this framework to investigate whether security culture has emerged into practices in Saudi Arabian organizations.
Resumo:
Understanding the complex dynamic and uncertain characteristics of organisational employees who perform authorised or unauthorised information security activities is deemed to be a very important and challenging task. This paper presents a conceptual framework for classifying and organising the characteristics of organisational subjects involved in these information security practices. Our framework expands the traditional Human Behaviour and the Social Environment perspectives used in social work by identifying how knowledge, skills and individual preferences work to influence individual and group practices with respect to information security management. The classification of concepts and characteristics in the framework arises from a review of recent literature and is underpinned by theoretical models that explain these concepts and characteristics. Further, based upon an exploratory study of three case organisations in Saudi Arabia involving extensive interviews with senior managers, department managers, IT managers, information security officers, and IT staff; this article describes observed information security practices and identifies several factors which appear to be particularly important in influencing information security behaviour. These factors include values associated with national and organisational culture and how they manifest in practice, and activities related to information security management.
Resumo:
This book addresses current debates about globalization and culture by tracing the emergence of Australia as a significant exporter of television to the world market. The authors investigate why Australian programs have found international popularity. The book describes the Australian industry and the international television marketplace. It also examines the impact of Australian programs on the television cultures of the importing countries. The authors outline policy implications and speculate on future directions of Australian television.
Resumo:
We consider one-round key exchange protocols secure in the standard model. The security analysis uses the powerful security model of Canetti and Krawczyk and a natural extension of it to the ID-based setting. It is shown how KEMs can be used in a generic way to obtain two different protocol designs with progressively stronger security guarantees. A detailed analysis of the performance of the protocols is included; surprisingly, when instantiated with specific KEM constructions, the resulting protocols are competitive with the best previous schemes that have proofs only in the random oracle model.
Resumo:
This qualitative study views international students as information-using learners, through an information literacy lens. Focusing on the experiences of 25 international students at two Australian universities, the study investigates how international students use online information resources to learn, and identifies associated information literacy learning needs. An expanded critical incident approach provided the methodological framework for the study. Building on critical incident technique, this approach integrated a variety of concepts and research strategies. The investigation centred on real-life critical incidents experienced by the international students whilst using online resources for assignment purposes. Data collection involved semi-structured interviews and an observed online resource-using task. Inductive data analysis and interpretation enabled the creation of a multifaceted word picture of international students using online resources and a set of critical findings about their information literacy learning needs. The study’s key findings reveal: • the complexity of the international students’ experience of using online information resources to learn, which involves an interplay of their interactions with online resources, their affective and reflective responses to using them, and the cultural and linguistic dimensions of their information use. • the array of strengths as well as challenges that the international students experience in their information use and learning. • an apparent information literacy imbalance between the international students’ more developed information skills and less developed critical and strategic approaches to using information • the need for enhanced information literacy education that responds to international students’ identified information literacy needs. Responding to the findings, the study proposes an inclusive informed learning approach to support reflective information use and inclusive information literacy learning in culturally diverse higher education environments.
Resumo:
This paper examines performances that defy established representations of disease, deformity and bodily difference. Historically, the ‘deformed’ body has been cast – onstage and in sideshows – as flawed, an object of pity, or an example of the human capacity to overcome. Such representations define the boundaries of the ‘normal’ body by displaying its Other. They bracket the ‘abnormal’ body off as an example of deviance from the ‘norm’, thus, paradoxically, decreasing the social and symbolic visibility (and agency) of disabled people. Yet, in contemporary theory and culture, these representations are reappropriated – by disabled artists, certainly, but also as what Carrie Sandahl has called a ‘master trope’ for representing a range of bodily differences. In this paper, I investigate this phenomenon. I analyse French Canadian choreographer Marie Chouinard’s bODY rEMIX/gOLDBERG vARIATIONS, in which 10 able-bodied dancers are reborn as bizarre biotechnical mutants via the use of crutches, walkers, ballet shoes and barres as prosthetic pseudo-organs. These bodies defy boundaries, defy expectations, develop new modes of expression, and celebrate bodily difference. The self-inflicted pain dancers experience during training is cast as a ‘disablement’ that is ultimately ‘enabling’. I ask what effect encountering able bodies celebrating ‘dis’ or ‘diff’ ability has on audiences. Do we see the emergence of a once-repressed Other, no longer silenced, censored or negated? Or does using ‘disability’ to express the dancers’ difference and self-determination usurp a ‘trope’ by which disabled people themselves might speak back to the dominant culture, creating further censorship?
Resumo:
The problem of impostor dataset selection for GMM-based speaker verification is addressed through the recently proposed data-driven background dataset refinement technique. The SVM-based refinement technique selects from a candidate impostor dataset those examples that are most frequently selected as support vectors when training a set of SVMs on a development corpus. This study demonstrates the versatility of dataset refinement in the task of selecting suitable impostor datasets for use in GMM-based speaker verification. The use of refined Z- and T-norm datasets provided performance gains of 15% in EER in the NIST 2006 SRE over the use of heuristically selected datasets. The refined datasets were shown to generalise well to the unseen data of the NIST 2008 SRE.
Resumo:
A data-driven background dataset refinement technique was recently proposed for SVM based speaker verification. This method selects a refined SVM background dataset from a set of candidate impostor examples after individually ranking examples by their relevance. This paper extends this technique to the refinement of the T-norm dataset for SVM-based speaker verification. The independent refinement of the background and T-norm datasets provides a means of investigating the sensitivity of SVM-based speaker verification performance to the selection of each of these datasets. Using refined datasets provided improvements of 13% in min. DCF and 9% in EER over the full set of impostor examples on the 2006 SRE corpus with the majority of these gains due to refinement of the T-norm dataset. Similar trends were observed for the unseen data of the NIST 2008 SRE.
Resumo:
This paper presents Scatter Difference Nuisance Attribute Projection (SD-NAP) as an enhancement to NAP for SVM-based speaker verification. While standard NAP may inadvertently remove desirable speaker variability, SD-NAP explicitly de-emphasises this variability by incorporating a weighted version of the between-class scatter into the NAP optimisation criterion. Experimental evaluation of SD-NAP with a variety of SVM systems on the 2006 and 2008 NIST SRE corpora demonstrate that SD-NAP provides improved verification performance over standard NAP in most cases, particularly at the EER operating point.
Resumo:
Rapidly changing economic, social, and environmental conditions have created a need for urban and regional planning practitioners who are resilient, innovative, and able to cope with the increasingly complex and cosmopolitan nature of major metropolitan areas. This need should be reflected in planning education that allows students to experience a diverse range of approaches to problems and challenges, and that exposes students to the diverse array of perspectives on planning issues. This paper investigates the outcomes of a collaborative regional planning exercise organised jointly by planning academics from both Queensland University of Technology and the International Islamic University of Malaysia, and involving planning students from both universities. The regional planning exercise consisted of a regional appraisal and report topics of the area under investigation, Klang Valley – Kuala Lumpur, Malaysia. It culminated with the presentation of regional development strategies for the area, with a field trip to Malaysia being the cornerstone of the project. The collaborative exercise involved a series of workshops and seminars organised locally, in which both Australian and Malaysian planning students participated, as well as meetings with local and federal planning officials, and also a forum for Young Planners of Australian and Malaysian Planning Institutes. The experience attempted to bridge the teaching of theoretical concepts of regional planning and development and the regional, more professional knowledge of planning practice, as it relates to specific political, institutional and cultural contexts. A survey of participating students, from both Queensland University of Technology and the International Islamic University of Malaysia, highlights the benefits of such project in terms of leaning experience and exposure to different cultural contexts.
Resumo:
This work presents an extended Joint Factor Analysis model including explicit modelling of unwanted within-session variability. The goals of the proposed extended JFA model are to improve verification performance with short utterances by compensating for the effects of limited or imbalanced phonetic coverage, and to produce a flexible JFA model that is effective over a wide range of utterance lengths without adjusting model parameters such as retraining session subspaces. Experimental results on the 2006 NIST SRE corpus demonstrate the flexibility of the proposed model by providing competitive results over a wide range of utterance lengths without retraining and also yielding modest improvements in a number of conditions over current state-of-the-art.
Resumo:
Australian universities have been phenomenally internationalised because of significant numbers of international students in their student cohorts. The international students make up 17.3 percent (OECD 2007) of all the university enrolment, and some universities have much more international student enrolments than the average. From a truly internationalisation perspective, however, there is far more demand of integration with Australian students and international students, the internationalising learning content and context. There have not been much discussion and effort of understanding and practicing of internationalising the learning context from international students’ cultural background and internationalised learning environment. There are many factors which interfere with internationalisation in the learning context such as English proficiency, culture difference and academic staff unawareness. This paper argues the concepts of cultural dimensions and the characteristics of CMC (Computer-Mediated Communication) in a multicultural learning context of Australian higher education. This paper aims to develop a framework of international students’ preparation program for their Western university study based on technology-driven learning models, especially targeting those students who have an Asian cultural background. The program is expected to help international students bridge the gap of cultural differences and better preparation for their active participation and engagement in a new learning environment in order to realise truly internationalisation in Australian higher education
Resumo:
This paper presents a novel approach of estimating the confidence interval of speaker verification scores. This approach is utilised to minimise the utterance lengths required in order to produce a confident verification decision. The confidence estimation method is also extended to address both the problem of high correlation in consecutive frame scores, and robustness with very limited training samples. The proposed technique achieves a drastic reduction in the typical data requirements for producing confident decisions in an automatic speaker verification system. When evaluated on the NIST 2005 SRE, the early verification decision method demonstrates that an average of 5–10 seconds of speech is sufficient to produce verification rates approaching those achieved previously using an average in excess of 100 seconds of speech.
Resumo:
This publication contains papers by leading international experts in creative industries theory, practice and methodology. The objective of this book is to provide a clear and detailed account of developments in the international creative economy, including specific media or cultural sectors, as well as commonalties among these sectors. The content and core themes are : The creative economy (definitions, issues, theory, and emerging perspectives); Methodology, including statistical analysis of selected cultural and media industry sectors globally; Innovation and creative industries policy, including cultural export strategy; and Regional and local perspectives (North America, Asia, Europe, Oceania)