995 resultados para Engineering ethics


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The anatomy and microstructure of the spine and in particular the intervertebral disc are intimately linked to how they operate in vivo and how they distribute loads to the adjacent musculature and bony anatomy. The degeneration of the intervertebral discs may be characterised by a loss of hydration, loss of disc height, a granular texture and the presence of annular lesions. As such, degeneration of the intervertebral discs compromises the mechanical integrity of their components and results in adaption and modification in the mechanical means by which loads are distributed between adjacent spinal motion segments.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study investigates variation in IT professionals' experience of ethics with a view to enhancing their formation and support. This is explored through an examination of the experience of IT, IT professional ethics and IT professional ethics education. The study's principal contribution is the empirical study and description of IT professionals' experience of ethics. The empirical phase is preceded by a review of conceptions of IT and followed by an application of the findings to IT education. The study's empirical findings are based on 30 semi-structured interviews with IT professionals who represent a wide demographic, experience and IT sub-discipline range. Their experience of ethics is depicted as five citizenships: Citizenship of my world, Citizenship of the corporate world, Citizenship of a shared world, Citizenship of the client's world and Citizenship of the wider world. These signify an expanding awareness, which progressively accords rights to others and defines responsibility in terms of others. The empirical findings inform a Model of Ethical IT. This maps an IT professional space increasingly oriented towards others. Such a model provides a conceptual tool, available to prompt discussion and reflection, and which may be employed in pursuing formation aimed at experiential change. Its usefulness for the education of IT professionals with respect to ethics is explored. The research approach employed in this study is phenomenography. This method seeks to elicit and represent variation of experience. It understands experience as a relationship between a subject (IT professionals) and an object (ethics), and describes this relationship in terms of its foci and boundaries. The study's findings culminate in three observations, that change is indicated in the formation and support of IT professionals in: 1. IT professionals' experience of their discipline, moving towards a focus on information users; 2. IT professionals' experience of professional ethics, moving towards the adoption of other-centred attitudes; and 3. IT professionals' experience of professional development, moving towards an emphasis on a change in lived experience. Based on these results, employers, educators and professional bodies may want to evaluate how they approach professional formation and support, if they aim to promote a comprehensive awareness of ethics in IT professionals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Providing support for reversible transformations as a basis for round-trip engineering is a significant challenge in model transformation research. While there are a number of current approaches, they require the underlying transformation to exhibit an injective behaviour when reversing changes. This however, does not serve all practical transformations well. In this paper, we present a novel approach to round-trip engineering that does not place restrictions on the nature of the underlying transformation. Based on abductive logic programming, it allows us to compute a set of legitimate source changes that equate to a given change to the target model. Encouraging results are derived from an initial prototype that supports most concepts of the Tefkat transformation language

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This exegesis examines how a writer can effectively negotiate the relationship between author, character, fact and truth, in a work of Creative Nonfiction. It was found that individual truths, in a work of Creative Nonfiction, are not necessarily universal truths due to individual, cultural, historical and religious circumstances. What was also identified, through the examination of published Creative Nonfiction, is a necessity to ensure there are clear demarcation lines between authorial truth and fiction. The Creative Nonfiction works examined, which established this framework for the reader, ensured an ethical relationship between author and audience. These strategies and frameworks were then applied to my own Creative Nonfiction.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Encouraging Ethics and Preventing Corruption brings theory and practice together in addressing the question: How are we to be ethical in public life and through public institutions? It is a major contribution to public sector ethics within Australia and internationally because it provides an exhaustive analysis of reform across a decade in one jurisdiction, Queensland, and then proceeds to itemise a best practice integrity system or ethics regime. Drawing on the extensive research of two of Australia's leading practical ethicists, this text is essential reading for all students and practitioners of applied and professional ethics in the public sphere. Part A of the text provides a preferred theoretical and conceptual framework which both justifies and guides the development of a public sector ethics regime. Part B examines the place of the individual within a world of institutional ethics. Part C outlines the Queensland governance reforms introduced since 1989 following the Fitzgerald Inquiry which exposed corruption in the police and ministry. The final chapter, the 'Epilogue', gathers the insights of earlier chapters and suggests a more explicitly ethics-centred approach to governance reform that may take us 'beyond best practice'. Clearly, while it is the Australian context we have in mind, we are confident that this is a text which addresses the quest for integrity and ethics in government wherever society is committed to social and liberal democratic ideals.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The service-orientation paradigm has not only become prevalent in the software systems domain in recent years, but is also increasingly applied on the business level to restructure organisational capabilities. In this paper, we present the results of an extensive literature review of 30 approaches related to service identification and analysis for both domains. Based on the consolidation of a superset of comparison criteria for service-oriented methodologies found in related literature, we compare and evaluate the different characteristics of service engineering methods with a focus on service analysis. Although a close business and IT alignment is regarded as one of the core beneficial promises of service-orientation, our analysis suggests that there is a lack of unified, comprehensive methodology for service identification and analysis integrating and addressing both domains. Thus, we discuss how our results can inform directions for future research in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since the 1980s, in Australia and other developed nations, public sector management philosophies and how the public sector is organized have changed dramatically. At the same time, there have been many demands, and several attempts, to preserve and promote ethical behaviour within the public sector - though few go much beyond the publication of a code. Both developments require an understanding of how public organizations operate in this new environment. Organizational and management theory are seen as providing important potential insights into the opportunities and pitfalls for building ethics into the practices, culture and norms of public organizations. This book brings together the experience and research of a range of "reflective practitioners" and "engaged academics" in public sector management, organizational theory, management theory, public sector ethics and law. It addresses what management and organization theory might suggest about the nature of public organizations and the institutionalization of ethics.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The institution the police force has been established to protect citizens and their property from harm and predatory opportunism. However, there have been occasions when the very people assigned to protect become part of the predatory force against society. Predatory policing occurs when the police use their powers to extort money in the form of bribes. While, the concept is receiving attention in Europe but there have not been any direct studies in Australia. To overcome this research deficit and determine the extent, if any, of predatory policing in Australia data is interrogated from four police corruption inquiries in the Australian states of Queensland, New South Wales, Victoria and Western Australia. In addition, it examines the role of the type of networks used by corrupt police officers. The synthesis and application of public corruption and network literatures to the predatory policing domain provides new and relevant insights to assist those responsible for the administration of our institutions of justice. The paper concludes with a framework, drawn from the first stage of the project, to assist in the conceptualisation and monitoring of this public problem.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

INTRODUCTION Inflammation is a protective attempt to facilitate the removal of damaged tissue and to initiate the healing response in other tissues. However, after spinal cord injury (SCI), this response is prolonged leading to secondary degeneration and glial scarring. Here, we investigate the potential of sustained delivery of pro-inflammatory factors vascular endothelial growth factor (VEGF) and platelet derived growth factor (PDGF) to increase early inflammatory events and promote inflammatory resolution. Method Animal ethics approval was obtained from the Queensland University of Technology. Adult Wistar-Kyoto rats (12-16 weeks old) were subjected to laminectomies and T10 hemisections. Animals were then randomised to treatment (implantation of osmotic pump (Alzet) loaded with 5ug VEGF & 5 ug PDGF) or control groups (lesion control or lesion plus pump delivering PBS). Rats were sacrificed at one month and the spinal cords were harvested and examined by immunohistology, using anti-neurofilament-200(NF200) and anti- ionized calcium binding adapter molecule 1 (Iba1). One way ANOVA was used for statistic analysis. Results At 1 month, active pump-treated cords showed a high level of axonal filament throughout the defects as compared to the control groups. The mean lesion size, as measured by NF200, was 0.47mm2 for the lesion control, 0.39mm2 for the vehicle control and 0.078mm2 for the active pump group. Significant differences were detected between the active pump group and the two control groups (AP vs LC p= 0.017 AG vs VC p= 0.004). Iba-1 staining also showed significant differences in the post-injury inflammatory response. Discussion We have shown that axons and activated microglia are co-located in the lesion of the treated cord. We hypothesise the delivery of VEGF/PDGF increases the local vessel permeability to inflammatory cells and activates these along with the resident microglia to threshold population, which ultimately resolved the prolonged inflammation. Here, we have shown that maintaining the inflammatory signals for at least 7 days improved the morphology of the injured cord. Conclusion This study has shown that boosting inflammation, by delivery VEGF/PDGF, in the early phase of SCI helps to reduce secondary degeneration and may promote inflammation resolution. This treatment may provide a platform for other neuro-regenrative therapies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Engineering education is underrepresented in Australia at the primary, middle school and high school levels. Understanding preservice teachers’ preparedness to be involved in engineering will be important for developing an engineering curriculum. This study administered a literature-based survey to 36 preservice teachers, which gathered data about their perceptions of engineering and their predispositions for teaching engineering. Findings indicated that the four constructs associated with the survey had acceptable Cronbach alpha scores (i.e., personal professional attributes .88, student motivation .91, pedagogical knowledge .91, and fused curricula .89). However, there was no “disagree” or “strongly disagree” response greater than 22% for any of the 25 survey items. Generally, these preservice teachers indicated predispositions for teaching engineering in the middle school. Extensive scaffolding and support with education programs will assist preservice teachers to develop confidence in this field. Governments and education departments need to recognise the importance of engineering education, and universities must take a stronger role in developing engineering education curricula.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

IT professionals work in an environment which is under continual innovation, exerts a global influence and yet is relatively young. In such a context, how can professionals be effectively supported in their ethical practice? IT professional ethics has predominantly focussed on external standards or internal reasoning. However, attention also has to be paid to professionals’ experience of ethics, which influences how they interpret standards and construct reasoning. A comprehensive experience of ethics will embrace the professional’s inner circle, their employer, their client and humanity. In order to promote such a comprehensive view, we need to re-conceptualise a) the IT discipline, focussing on information users; b) professional ethics, adopting other-centred attitudes; and c) professional development, pursuing a change in lived experience. This book is written for those interested in professional ethics (practitioners, educators, professional bodies and employers), especially in the computing field.