904 resultados para Collaborative practice
Resumo:
We investigated whether belief-based differences exist between students who have strong and weak intentions to integrate complementary and alternative therapy (CAT) into future psychology practice by recommending CAT or specific CAT practitioners to clients. A cross-sectional methodology was used. Psychology undergraduate students (N = 106) participated in a paper-based questionnaire design to explore their underlying beliefs related to CAT integration. The study was undertaken at a major university in Queensland, Australia. The theory of planned behaviour belief-based framework guided the study. Multivariate analyses of variance examined the influence of behavioural, normative, and control beliefs on the strong and weak intention groups. A multiple regression analysis investigated the relative importance of these belief sets for predicting intentions. We found that clear differences emerged between strong and weak intenders on behavioural and normative beliefs, but not control beliefs. Strong intenders perceived the positive outcomes of integrating CAT, such as being able to offer clients a more holistic practice and having confidence in the practitioners/practices, as more likely to occur than weak intenders, and perceived the negative outcome of compromising my professional practice as less likely. Strong in-tenders were more likely than weak intenders to perceive that a range of important referents (e.g., clients) would think they should integrate CAT. Results of the regression analysis revealed the same pattern of results in that behavioural and normative beliefs, but not control beliefs, significantly predicted intentions. The findings from this study can be used to inform policy and educational initiatives that aim to encourage CAT use in psychology practice.
Resumo:
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As smartphones become host for sensitive data and applications, extended malware detection mechanisms are necessary complying with the corresponding resource constraints. The contribution of this paper is twofold. First, we perform static analysis on the executables to extract their function calls in Android environment using the command readelf. Function call lists are compared with malware executables for classifying them with PART, Prism and Nearest Neighbor Algorithms. Second, we present a collaborative malware detection approach to extend these results. Corresponding simulation results are presented.
Resumo:
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.
Collaborative research into the affordances of place for primary school children’s literacy learning
Resumo:
In the context of culturally diverse high poverty areas of Australia, we have conducted collaborative research with teachers and students in a primary school for more than a decade. Teachers have been exploring the affordances of place‐based pedagogies (Gruenewald & Smith, 2008) for the development of students’ spatial literacies and their understandings of the politics of places and built environments (Comber, Nixon, Ashmore, Loo & Cook, 2006; Comber, Thomson and Wells, 2001). This paper reports on a project in which the affordances of placedbased pedagogy are being explored through teacher inquiries and classroom‐based design experiments (Cobb, Confrey, di Sessa, Lehrer & Schauble, 2003). Located within a large‐scale urban renewal project in which houses are being demolished and families relocated, the original school has been replaced by a larger school that serves a population from a wider area. In this paper we draw on the study to consider the challenges of working with teachers and primary school students to study innovative ideas and practices in educational research. Specifically we consider issues raised by collaborative studies of the affordances of cross curricular projects focusing on social and environmental change to engage students in academic learning and expand their literate repertoires in a changing policy climate.
Resumo:
Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation platform ( NeSSi 2 ). Built-in functionalities include dynamic group formation based on node preferences, group-internal communication, group management and an approach for handling the infection process for malware-based attacks. The CIDE simulation environment provides functionalities for easy implementation of collaborating nodes in large-scale setups. We evaluate the group communication mechanism on the one hand and provide a case study and evaluate our collaborative security evaluation platform in a signature exchange scenario on the other.
Resumo:
Aim The development of competent future allied health professionals through academic programmes, professional support and practical education is continually evolving. The aim of this study was to explore the feelings of newly graduated occupational therapists in Australia and Aotearoa/New Zealand regarding their education and work preparedness. Methods Newly graduated occupational therapists from Australia (n = 178) and Aotearoa/New Zealand (n = 53) who had completed their occupational therapy studies in 2007 were recruited. Participants completed an online survey which explored their preparedness for work; based on professional competencies. Results Most newly graduated occupational therapists felt somewhat prepared for practice. However, only 17.1% of Australian new graduates, and even fewer (8.5%) of Aotearoa/New Zealand new graduates felt very well prepared. Participants felt more prepared for the competencies required for ‘managing inwards’ (including interpersonal skills) and less prepared for those required for ‘managing outwards’ (including evidence-based practice). Conclusions This study provides the first international comparison into the feelings of competence and preparedness for practice of new graduates of occupational therapy from Australia and Aotearoa/New Zealand. Given the importance of competencies, such as evidence-based practice to the progress of the profession, there is a need to further explore methods to increase feelings of preparedness in these areas.
Resumo:
We propose CIMD (Collaborative Intrusion and Malware Detection), a scheme for the realization of collaborative intrusion detection approaches. We argue that teams, respectively detection groups with a common purpose for intrusion detection and response, improve the measures against malware. CIMD provides a collaboration model, a decentralized group formation and an anonymous communication scheme. Participating agents can convey intrusion detection related objectives and associated interests for collaboration partners. These interests are based on intrusion objectives and associated interests for collaboration partners. These interests are based on intrusion detection related ontology, incorporating network and hardware configurations and detection capabilities. Anonymous Communication provided by CIMD allows communication beyond suspicion, i.e. the adversary can not perform better than guessing an IDS to be the source of a message at random. The evaluation takes place with the help of NeSSi² (www.nessi2.de), the Network Security Simulator, a dedicated environment for analysis of attacks and countermeasures in mid-scale and large-scale networks. A CIMD prototype is being built based on the JIAC agent framework(www.jiac.de).
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
In July 2010, China announced the “National Plan for Medium and Long-term Education Reform and Development(2010-2020)” (PRC 2010). The Plan calls for an education system that: • promotes an integrated development which harnesses everyone’s talent; • combines learning and thinking; unifies knowledge and practice; • allows teachers to teach according to individuals’ needs; and • reforms education quality evaluation and personnel evaluation systems focusing on performance including character, knowledge, ability and other factors. This paper discusses the design and implementation of a Professional Learning Program (PLP) undertaken by 432 primary, middle and high school teachers in China. The aim of this initiative was to develop adaptive expertise in using technology that facilitated innovative science and technology teaching and learning as envisaged by the Chinese Ministry of Education’s (2010-2020) education reforms. Key principles derived from literature about professional learning and scaffolding of learning informed the design of the PLP. The analysis of data revealed that the participants had made substantial progress towards the development of adaptive expertise. This was manifested not only by advances in the participants’ repertoires of Subject Matter Knowledge and Pedagogical Content Knowledge but also in changes to their levels of confidence and identities as teachers. It was found that through time the participants had coalesced into a professional learning community that readily engaged in the sharing, peer review, reuse and adaption, and collaborative design of innovative science and technology learning and assessment activities.
Resumo:
Supervision in the creative arts is a topic of growing significance since the increase in creative practice PhDs across universities in Australasia. This presentation will provide context of existing discussions in creative practice and supervision. Creative practice – encompassing practice-based or practice-led research – has now a rich history of research surrounding it. Although it is a comparatively new area of knowledge, great advances have been made in terms of how practice can influence, generate, and become research. The practice of supervision is also a topic of interest, perhaps unsurprisingly considering its necessity within the university environment. Many scholars have written much about supervision practices and the importance of the supervisory role, both in academic and more informal forms. However, there is an obvious space in between: there is very little research on supervision practices within creative practice higher degrees, especially at PhD or doctorate level. Despite the existence of creative practice PhD programs, and thus the inherent necessity for successful supervisors, there remain minimal publications and limited resources available. Creative Intersections explores the existing publications and resources, and illustrates that a space for new published knowledge and tools exists.
Resumo:
Aim his study reports the use of exploratory factor analysis to determine construct validity of a modified advanced practice role delineation tool. Background Little research exists on specific activities and domains of practice within advanced practice nursing roles, making it difficult to define service parameters of this level of nursing practice. A valid and reliable tool would assist those responsible for employing or deploying advanced practice nurses by identifying and defining their service profile. This is the third paper from a multi-phase Australian study aimed at assigning advanced practice roles. Methods A postal survey was conducted of a random sample of state government employed Registered nurses and midwives, across various levels and grades of practice in the state of Queensland, Australia, using the modified Advanced Practice Role Delineation tool. Exploratory factor analysis, using principal axis factoring was undertaken to examine factors in the modified tool. Cronbach’s alpha coefficient determined reliability of the overall scale and identified factors. Results There were 658 responses (42% response rate). The five factors found with loadings of ≥.400 for 40 of the 41 APN activities were similar to the five domains in the Strong model. Cronbach’s alpha coefficient was .94 overall and for the factors ranged from 0.83 to 0.95. Conclusion Exploratory factor analysis of the modified tool supports validity of the five domains of the original tool. Further investigation will identify use of the tool in a broader healthcare environment.
Resumo:
Research Question: What relationships exist between general self efficacy, locus of control and the nursing practice environment and caring efficacy and job satisfaction? Background: Important characteristics of current nursing practice include nurses having the ability to develop and continue therapeutic relationships with patients, nurses having autonomy and control over the practice environment and nurses having more involvement in decision making. In addition, employee satisfaction is enhanced when organisations offer access to authority. Despite this, nurses continue to complain of feeling powerless in their ability to make decisions. Sample: The study population and criteria for selection included Registered Nurses in Australia who were at the time members of an Australian professional and industrial organisation. Methods: A cross-sectional survey was undertaken. Data analysis was conducted using descriptive and bivariate statistics, and structural equation modeling. Results: The model fit the data well (χ² = 2.3594, χ²/df = 2.3594 and CFI = 0.9987). Twenty four percent of variation in caring efficacy (CE) can be accounted for by general self-efficacy (GSE); work locus of control (WLC) and practice environment (PE) and 62% of the variation in job satisfaction (JS) can be accounted for by GSE, WLC and PE. All pathways were found to be significant except PE to CE. GSE positively explained CE (β = 0.38). WLC was negatively related to CE i.e., as CE scores increased WLC scores decreased (β = -0.23). Further testing of the model found CE was positively related to GSE (βZ = 0.38, p < 0.001) and negatively related to WLC (βZ = - 0.23, p = 0.001). PE was not significantly associated with CE (βZ = - 0.01, p = 0.85). JS was explained by PE, which was positively related (βZ = 0.69, p = < 0.001); GSE which was negatively related (βZ - 0 .09, p < 0.001) and WLC, which was also negatively related (βZ = - 0.20, p < 0.001). Implications for Practice Nursing and organisational leaders should ensure the development of strategies for professional development and orientation programmes which may enhance nurses’ ability to develop caring relationships and express caring behaviours to their patients and as a result improve organisational and patient outcomes. Nursing shortages and turnover rates are associated with job satisfaction and the nursing practice environment. Improving the nursing environment can produce benefits to the health system such as better job satisfaction, improved workforce retention and better patient outcomes.
Resumo:
In Energex Limited v Sablatura [2009] QSC 356 the difficulty facing the applicant related not to its substantive rights, but to its ability to vindicate those rights without an effective respondent to the application. The case highlights issues that may confront an applicant or plaintiff in vindicating rights it may have against a person who is or becomes under a legal incapacity, if there is no-one other than the Public Trustee able to act as litigation guardian.
Resumo:
In Jacobs v Woolworths Limited [2010] QSC 24 Jones J was required to determine whether a worker who had lodged an application for compensation for an injury outside the time prescribed under the Workers Compensation and Rehabilitation Act 2003 (Qld) (“the Act”) was precluded from seeking common law damages for that injury. This determination depended upon the proper construction of s 131 of the Act, and what was to be understood by the words “worker who has not lodged an application for compensation for the injury” for the purpose of s 237(1)(d).