868 resultados para Didactic-pedagogic requirements
Resumo:
A browser is a convenient way to access resources located remotely on computer networks. Security in browsers has become a crucial issue for users who use them for sensitive applications without knowledge ofthe hazards. This research utilises a structure approach to analyse and propose enhancements to browser security. Standard evaluation for computer products is important as it helps users to ensure that the product they use is appropriate for their needs. Security in browsers, therefore, has been evaluated using the Common Criteria. The outcome of this was a security requirements profile which attempts to formalise the security needs of browsers. The information collected during the research was used to produce a prototype model for a secure browser program. Modifications to the Lynx browser were made to demonstrate the proposed enhancements.
Resumo:
Professional discourse in education has been the focus of research conducted mostly with teachers and professional practitioners but the work of students in the built environment has largely been ignored. This article presents an analysis of students’ visual discourse in the final professional year of a landscape architecture course in Brisbane, Australia. The study has a multi-method design and includes drawings, interviews and documentary materials, but focuses on the drawings in this paper. Using the theory of Bernstein, the analysis considers student representations as interrelations between professional identity and discretionary space for legitimate knowledge formation in landscape planning. It shows a shift in how students persuade the teacher of their expanding views of this field. The discussion of this shift centres on the professional knowledge that students choose rather than need to learn. It points to the differences within a class that a teacher must address in curriculum design in a contemporary professional course.
Resumo:
Increasingly, software is no longer developed as a single system, but rather as a smart combination of so-called software services. Each of these provides an independent, specific and relatively small piece of functionality, which is typically accessible through the Internet from internal or external service providers. To the best of our knowledge, there are no standards or models that describe the sourcing process of these software based services (SBS). We identify the sourcing requirements for SBS and associate the key characteristics of SBS (with the sourcing requirements introduced). Furthermore, we investigate the sourcing of SBS with the related works in the field of classical procurement, business process outsourcing, and information systems sourcing. Based on the analysis, we conclude that the direct adoption of these approaches for SBS is not feasible and new approaches are required for sourcing SBS.
Resumo:
Increasingly, software is no longer developed as a single system, but rather as a smart combination of so-called software services. Each of these provides an independent, specific and relatively small piece of functionality, which is typically accessible through the Internet from internal or external service providers. There are no standards or models that describe the sourcing process of these software based services (SBS). The authors identify the sourcing requirements for SBS and associate the key characteristics of SBS (with the sourcing requirements introduced). Furthermore, this paper investigates the sourcing of SBS with the related works in the field of classical procurement, business process outsourcing, and information systems sourcing. Based on the analysis, the authors conclude that the direct adoption of these approaches for SBS is not feasible and new approaches are required for sourcing SBS.
Resumo:
The paper describes a number of requirements for enhancing the trust of location acquisition from Satellite Navigation Systems, particularly for those applications where the location is monitored through a remote GNSS receiver. We discuss how the trust of a location acquisition could be propagated to an application through the use of a proposed tamper-resistant GNSS receiver which quantifies the trust of a location solution from the signaling used (ie. P(Y) code, Galileo SOL, PRS, CS) and provides a cryptographic proof of this to a remote application. The tamper-resistance state of the receiver is also included in this cryptographic proof.
Resumo:
Real-world business processes are resource-intensive. In work environments human resources usually multitask, both human and non-human resources are typically shared between tasks, and multiple resources are sometimes necessary to undertake a single task. However, current Business Process Management Systems focus on task-resource allocation in terms of individual human resources only and lack support for a full spectrum of resource classes (e.g., human or non-human, application or non-application, individual or teamwork, schedulable or unschedulable) that could contribute to tasks within a business process. In this paper we develop a conceptual data model of resources that takes into account the various resource classes and their interactions. The resulting conceptual resource model is validated using a real-life healthcare scenario.
Resumo:
Globally, teaching has become more complex and more challenging over recent years, with new and increased demands being placed on teachers by students, their families, governments and wider society. Teachers work with more diverse communities in times characterised by volatility, uncertainty and moral ambiguity. Societal, political, economic and cultural shifts have transformed the contexts in which teachers work and have redefined the ways in which teachers interact with students. This qualitative study uses phenomenographic methods to explore the nature of pedagogic teacherstudent interactions. The data analysis reveals five qualitatively different ways in which teachers experience pedagogic engagements with students. The resultant categories of description ranged from information providing, with teachers viewed as transmitters of a body of knowledge through to mentoring in which teachers were perceived as significant others in the lives of students with their influence extending beyond the walls of the classroom and beyond the years of schooling. The paper concludes by arguing that if teachers are to prepare students for the challenges and opportunities in changing times, teacher education programs need to consider ways to facilitate the development of mentoring capacities in new teachers.
Resumo:
When an organisation becomes aware that one of its products may pose a safety risk to customers, it must take appropriate action as soon as possible or it can be held liable. The ability to automatically trace potentially dangerous goods through the supply chain would thus help organisations fulfill their legal obligations in a timely and effective manner. Furthermore, product recall legislation requires manufacturers to separately notify various government agencies, the health department and the public about recall incidents. This duplication of effort and paperwork can introduce errors and data inconsistencies. In this paper, we examine traceability and notification requirements in the product recall domain from two perspectives: the activities carried out during the manufacturing and recall processes and the data collected during the enactment of these processes. We then propose a workflow-based coordination framework to support these data and process requirements.
Resumo:
This chapter discusses the experiences of doctoral students who work across traditional disciplinary and university-industry boundaries. These new contexts for doctoral education are shaping how students are experiencing and responding to requirements for changing knowledge relationships. Drawing on Bernstein's discussion of pedagogic practice as being socially constructed, and his conceptual framework outlining the social implications of the weaker boundaries required for these knowledge relationships, we discuss students' descriptions of their topics, processes and challenges and show their strategies for performing scholarly research across these boundaries as key elements in the nature and achievement of “industry readiness”. In particular, we identify two key elements in the pedagogy of industry partnership: students’ understandings and management of the knowledge relationships involved in this work, and the dispositions they bring to bear in negotiating research and careers across disciplinary and sectoral boundaries.
Resumo:
In Moneywood Pty Ltd v Salamon Nominees Pty Ltd 1 the High Court of Australia considered an appeal from the Queensland Court of Appeal in relation to the correct interpretation of s76 (1)(c) Auctioneers and Agents Act 1971 (Qld). In paraphrase, s76(1)(c) provides that a real estate agent shall not be entitled to sue for or recover any commission unless “the engagement or appointment to act as …..real estate agent ….. in respect of such transaction is in writing signed by the person to be charged with such…..commission…..or the person’s agent or representative” (“the statutory requirement”).
Resumo:
One of the many difficulties associated with the drafting of the Property Agents and Motor Dealers Act 2000 (Qld) (‘the Act’) is the operation of s 365. If the requirements imposed by this section concerning the return of the executed contract are not complied with, the buyer and the seller will not be bound by the relevant contract and the cooling-off period will not commence. In these circumstances, it is clear that a buyer’s offer may be withdrawn. However, the drafting of the Act creates a difficulty in that the ability of the seller to withdraw from the transaction prior to the parties being bound by the contract is not expressly provided by s 365. On one view, if the buyer is able to withdraw an offer at any time before receiving the prescribed contract documentation the seller also should not be bound by the contract until this time, notwithstanding that the seller may have been bound at common law. However, an alternative analysis is that the legislative omission to provide the seller with a right of withdrawal may be deliberate given the statutory focus on buyer protection. If this analysis were correct the seller would be denied the right to withdraw from the transaction after the contract was formed at common law (that is, after the seller had signed and the fact of signing had been communicated to the buyer).
Prediction of resting energy requirements in people taking weight-inducing antipsychotic medications
Resumo:
Increasingly, national and international governments have a strong mandate to develop national e-health systems to enable delivery of much-needed healthcare services. Research is, therefore, needed into appropriate security and reliance structures for the development of health information systems which must be compliant with governmental and alike obligations. The protection of e-health information security is critical to the successful implementation of any e-health initiative. To address this, this paper proposes a security architecture for index-based e-health environments, according to the broad outline of Australia’s National E-health Strategy and National E-health Transition Authority (NEHTA)’s Connectivity Architecture. This proposal, however, could be equally applied to any distributed, index-based health information system involving referencing to disparate health information systems. The practicality of the proposed security architecture is supported through an experimental demonstration. This successful prototype completion demonstrates the comprehensibility of the proposed architecture, and the clarity and feasibility of system specifications, in enabling ready development of such a system. This test vehicle has also indicated a number of parameters that need to be considered in any national indexed-based e-health system design with reasonable levels of system security. This paper has identified the need for evaluation of the levels of education, training, and expertise required to create such a system.