911 resultados para Artillery drill and tactics.
Resumo:
Mode of access: Internet.
Resumo:
This study investigated factors that influence managers’ conceptions and subordinates’ perceptions of effective feedback. A social rules perspective was used to operationalize male and female managers’ conceptions of effective negative feedback. In the first study, 68 male and female managers identified their optimal strategies for providing feedback to subordinates. Male and female managers endorsed different goals and tactics for giving negative feedback, particularly in terms of levels of participation and directness. In the second study, 116 male and female subordinates evaluated the comparative effectiveness and difficulty of these and other standard approaches to feedback. The female manager strategy was evaluated by both men and women as generally more task and relationship effective but not more difficult to enact.
Resumo:
Given the continued interest in defining the optimal management of individuals with type 2 diabetes, the Editor of Diabetes Care convened a working party of diabetes specialists to examine this topic in the context of insulin therapy. This was prompted by recent new evidence on the use of insulin in such people. The group was aware of evidence that the benefits of insulin therapy are still usually offered late, and thus the aim of the discussion was how to define the optimal timing and basis for decisions regarding insulin and to apply these concepts in practice. It was noted that recent evidence had built upon that of the previous decades, together confirming the benefits and safety of insulin therapy, albeit with concerns about the potential for hypoglycemia and gain in body weight. Insulin offers a unique ability to control hyperglycemia, being used from the time of diagnosis in some circumstances, when metabolic control is disturbed by medical illness, procedures, or therapy, as well as in the longer term in ambulatory care. For those previously starting insulin, various other forms of therapy can be added later, which offer complementary effects appropriate to individual needs. Here we review current evidence and circumstances in which insulin can be used, consider individualized choices of alternatives and combination regimens, and offer some guidance on personalized targets and tactics for glycemic control in type 2 diabetes. © 2014 by the American Diabetes Association.
Resumo:
O seguinte Trabalho de Investigação Aplicada tem como objetivo analisar e explicar a forma como evoluíram e se organizaram as unidades de artilharia e morteiros do Corpo Expedicionário Português, no período compreendido entre 1914 e 1918, assim como analisar, descrever e explicar a sua organização para o combate, emprego operacional e forma de atuar, no setor português em França, no período compreendido entre 1917 e março de 1918. O período analisado está inserido no conflito da Grande Guerra de 1914-1918, que se destacou pela desadequação do novo armamento com a forma antiquada de combater. O resultado foi um conflito de baixa mobilidade, com um elevado custo humano e pouco progresso, o que levou à criação de um sistema defensivo complexo que se estendeu, a Oeste, desde a fronteira Suíça até ao Mar do Norte, mais conhecido como trincheiras. A artilharia e morteiros surgem, em parte, como resposta às necessidades de um novo tipo de guerra, em que o sucesso depende não só nos números, mas também, de forma crescente, nos materiais. Para a realização deste trabalho de investigação aplicada, tendo como referência o método da investigação histórica, foi analisada, numa abordagem diacrónica, a evolução da organização e dos materiais utilizados pelas unidades de artilharia e morteiros do Corpo Expedicionário Português e, numa abordagem sincrónica, identificando as diferentes variáveis, como as inovações doutrinárias e orgânicas, as adaptações ao modelo britânico e as formas de atuação e emprego operacional das unidades de artilharia e morteiros do Corpo Expedicionário Português. Este trabalho baseia-se na análise de conteúdo de fontes primárias manuscritas e impressas, textuais e iconográficas, nacionais e internacionais, diretamente relacionadas com o tema abordado.
Resumo:
It’s never been easier for rights advocates to create and distribute their own media productions, using text, audio, video and the internet. Rights advocates can make media to raise awareness about an issue, to convey new information that is not in the public domain, or to mobilise people to take action. However, careful planning, in the form of a strategy document, is essential to ensure that the media you make genuinely contributes to reaching your advocacy goals. Whether you are an individual rights advocate, a group or an organisation, this chapter will take you through the steps involved in creating a strategic plan for making any kind of media as part of a campaign or project.
Resumo:
The Blair Witch Project was a low budget movie made by student filmmakers that become an international box office hit in 1999. Blair Witch was a landmark in movie marketing and distribution because it was the first time that any movie had successfully leveraged the Internet as a marketing platform to reach a wide audience. The marketing team employed a range of innovative strategies and tactics to stimulate audience demand. This case study describes and analyses the success of the marketing launch of The Blair Witch Project.It also provides an Instructors booklet comprising seven questions and answers related to the marketing success of the movie.
Resumo:
This paper explores how young children are constructed in educational policy for citizenship in Australia, investigating tensions between early childhood educational discourses that construct young children as active citizens and the broader discourses of citizenship in Australian educational policy. There is a widespread discourse within early childhood education that regards young children as citizens and democratic participants in their own lives. This view is a reflection of the oft cited Article 12 in the UN Convention on the Rights of the Child (UNCRC 1989). However, educational policy and curriculum for citizenship in Australia, by and large, adheres to age and stage understandings of children, implicitly deeming young children unable to conceptualise abstract ideas of what it means to ‘be a good citizen’. This paper is located in the borders and intersections between discourses of early childhood education, young children as active participants in their own lives and what it means to be an active citizen in Australia. We are concerned with the interweaving of these ideas and how they are played out in educational policy making. This is an important perspective to take for governing and policy making are exercises in harnessing existing ideas and discourses, thereby rendering strategies and tactics for managing populations thinkable and sayable (Rose 1999). The ‘views from the margins’ (Burman 2008, p. 7) can provide alternative perspectives on policymaking, illuminating discursive tactics and strategies.
Resumo:
This paper explores grassroots leadership, an under-researched and often side-lined approach to leadership that operates outside of formal bureaucratic structures. The paper’s central purpose is the claim that an understanding of grassroots leadership and tactics used by grassroots leaders provides valuable insights for the study of school leadership. In this paper, we present and discuss an original model of grassroots leadership based on the argument that this under-researched area can further our understanding of school leadership. Drawing upon the limited literature in the field, we present a model consisting of two approaches to change (i.e. conflict and consensus) and two categories of change (i.e. reform and refinement) and then provide illustrations of how the model works in practice. We make the argument that the model has much merit for conceptualizing school leadership, and this is illustrated by applying the model to formal bureaucratic leadership within school contexts. Given the current climate in education where business and management language is pervasive within leadership-preparation programs, we argue that it is timely for university academics, who are responsible for preparing school leaders to consider broadening their approach by exposing school leaders to a variety of change-based strategies and tactics used by grassroots leaders.
Resumo:
Real-world AI systems have been recently deployed which can automatically analyze the plan and tactics of tennis players. As the game-state is updated regularly at short intervals (i.e. point-level), a library of successful and unsuccessful plans of a player can be learnt over time. Given the relative strengths and weaknesses of a player’s plans, a set of proven plans or tactics from the library that characterize a player can be identified. For low-scoring, continuous team sports like soccer, such analysis for multi-agent teams does not exist as the game is not segmented into “discretized” plays (i.e. plans), making it difficult to obtain a library that characterizes a team’s behavior. Additionally, as player tracking data is costly and difficult to obtain, we only have partial team tracings in the form of ball actions which makes this problem even more difficult. In this paper, we propose a method to overcome these issues by representing team behavior via play-segments, which are spatio-temporal descriptions of ball movement over fixed windows of time. Using these representations we can characterize team behavior from entropy maps, which give a measure of predictability of team behaviors across the field. We show the efficacy and applicability of our method on the 2010-2011 English Premier League soccer data.
Resumo:
Knowledge management (KM) provides a structured process to establish the link between knowledgebased assets within an organisation and its desired business objectives. Although KM issues are becoming increasingly important to the construction industry, there is currently no measurement tool for assessing the implementation of KM programmes. This paper reports on the development of such a tool which can be used as both a means of self-assessment and also for benchmarking purposes. Important practices needed for successful KM implementation were identified from the literature and via a self-administered survey targeting large and medium construction organisations in Hong Kong. Survey findings demonstrate the potential of the proposed self-assessment tool to measure the individual’s perception of the relative importance of KM antecedents and practices, also providing early insight of KM implementation by highlighting the negative gaps between what “is” and “should be” happening, thus identifying areas that need re alignment of KM strategies and tactics. The paper also suggests this tool could be further developed to help organisations to formulate and modify their KM programmes according to their own specific internal business environment, and the nature of their projects.
Resumo:
There is no doubt that social engineering plays a vital role in compromising most security defenses, and in attacks on people, organizations, companies, or even governments. It is the art of deceiving and tricking people to reveal critical information or to perform an action that benefits the attacker in some way. Fraudulent and deceptive people have been using social engineering traps and tactics using information technology such as e-mails, social networks, web sites, and applications to trick victims into obeying them, accepting threats, and falling victim to various crimes and attacks such as phishing, sexual abuse, financial abuse, identity theft, impersonation, physical crime, and many other forms of attack. Although organizations, researchers, practitioners, and lawyers recognize the severe risk of social engineering-based threats, there is a severe lack of understanding and controlling of such threats. One side of the problem is perhaps the unclear concept of social engineering as well as the complexity of understand human behaviors in behaving toward, approaching, accepting, and failing to recognize threats or the deception behind them. The aim of this paper is to explain the definition of social engineering based on the related theories of the many related disciplines such as psychology, sociology, information technology, marketing, and behaviourism. We hope, by this work, to help researchers, practitioners, lawyers, and other decision makers to get a fuller picture of social engineering and, therefore, to open new directions of collaboration toward detecting and controlling it.
Resumo:
‘Engagement’ is one of the buzzwords of 21st century public relations theory and practice. Yet the concept of engagement remains frustratingly nebulous and intangible, lacking clear definition and consistent use. This paper suggests that the concept of dialogue can provide public relations practitioners and academics with a framework for defining engagement that allows deep insights into the range of ideas and contexts it covers. Specifically, this paper argues for the use of a pragmatic practitioner perspective on dialogue as a lens through which to study engagement. Current literature clearly articulates the normative and prescriptive perspectives on dialogue in public relations, but leaves the story of the reality of the practitioner experience of dialogue largely untold. New research tells this ‘missing’ story of the practitioner perspective on dialogue, which in turn offers some insights into the forms and functions of engagement in practice. Dialogue is seen as encompassing three different types of public relations practice: informing stakeholders of organisational decisions and receiving their feedback; consulting with stakeholders on the strategies and tactics used by organisations to achieve their chosen goals; and including stakeholder input in the making of decisions on what organisational goals should be. Adopting this pragmatic practitioner perspective on dialogue to view engagement provides scaffolding that is strong enough to encourage development of a consistent definition of its meaning; while still allowing the freedom and scope necessary to develop deep and rich understanding of the phenomenon.
Resumo:
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.
Resumo:
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.
Resumo:
The philosophical promise of community development to “resource and empower people so that they can collectively control their own destinies” (Kenny 1996:104) is no doubt alluring to Indigenous Australia. Given the historical and contemporary experiences of colonial control and surveillance of Aboriginal bodies, alongside the continuing experiences of socio-economic disadvantage, community development reaffirms the aspirational goal of Indigenous Australians for self-determination. Self-determination as a national policy agenda for Indigenous Australians emerged in the 1970s and saw the establishment of a wide range of Aboriginal community-controlled services (Tsey et al 2012). Sullivan (2010:4) argues that the Aboriginal community controlled service sector during this time has, and continues to be, instrumental to advancing the plight of Indigenous Australians both materially and politically. Yet community development and self-determination remain highly problematic and contested in how they manifest in Indigenous social policy agendas and in practice (Hollinsworth 1996; Martin 2003; McCausland 2005; Moreton-Robinson 2009). Moreton-Robinson (2009:68) argues that a central theme underpinning these tensions is a reading of Indigeneity in which Aboriginal and Torres Strait Islander people, behaviours, cultures, and communities are pathologised as “dysfunctional” thus enabling assertions that Indigenous people are incapable of managing their own affairs. This discourse distracts us from the “strategies and tactics of patriarchal white sovereignty” that inhibit the “state’s earlier policy of self-determination” (Moreton-Robinson 2009:68). We acknowledge the irony of community development espoused by Ramirez above (1990), that the least resourced are expected to be most resourceful.; however, we wish to interrogate the processes that inhibit Indigenous participation and control of our own affairs rather than further interrogate Aboriginal minds as uneducated, incapable and/or impaired...