862 resultados para MLearning, Technology Adoption
Resumo:
Technology has advanced in such a manner that the world can now communicate in means previously never thought possible. These new technologies have not been overlooked by transnational organized crime groups and networks of corruption, and have been exploited for criminal success. This text explores the use of communication interception technology (CIT), such as phone taps or email interception, and its potential to cause serious disruption to these criminal enterprises. Exploring the placement of communication interception technology within differing policing frameworks, and how they integrate in a practical manner, the authors demonstrate that CIT is best placed within a proactive, intelligence-led policing framework. They also indicate that if law enforcement agencies in Western countries are serious about fighting transnational organized crime and combating corruption, there is a need to re-evaluate the constraints of interception technology, and the sceptical culture that surrounds intelligence in policing. Policing Transnational Organized Crime and Corruption will appeal to scholars of Law, Criminal Justice and Police Science as well as intelligence analysts and police and security intelligence professionals.
Resumo:
Objective To estimate the burden of diseases in Shandong province by the means of DALY (Disability- adjusted life year) thus to investigate the key public health problems referencing for health policy making. Methods DALYs were calculated following the procedures developed for the Global Burden of Disease (GBD) study to ensure comparability. We measured YLLs using the mortality data of 19 Disease Surveillance Points (DSPs) in Shandong Province during 2000 and 2005. YLDs were estimated based on data for WPRO in the 2002 GBD study published by WHO. Results During this period, the average DALYs loss by all causes for the residents of DSPs in Shandong was 149.74 per thousand persons each year. Noncommunicable diseases accounted for 76.63% of the disability adjusted life years, communicable diseases and other disorders represented 14.13%, and injuries 9.24%. Nearly half of the DALYs (45%) happened among the elderly (60+). Malignant neoplasm was the number one cause of DALYs loss in the male, followed by neuropsychiatric disorder, injury, cerebrovascular disease, heart disease,etc. However, neuropsychiatric disorder possessed the largest single contributor to DALY in the female and followed by heart disease, malignant neoplasm, cerebrovascular disease and respiratory disease. Conclusion Non-communicable diseases such as circulatory diseases, neuropsychiatric disorders and malignant neoplasms were the main causes of disease burden in Shandong province. The importance of neuropsychiatric disorders was more striking and should be recognized properly. The lack of morbidity data is the main limitation of this study. Abstract in Chinese 目的 应用伤残调整寿命年测量山东省居民疾病负担,提出该地区主要卫生问题,为卫生决策提供科学依据. 方法 以山东省2000-2005年19个疾病监测点的死因监测资料为基础,利用世界卫生组织(WHO)提供的方法计算不同疾病在不同性别年龄人群所造成的伤残调整寿命年(DALYs),其中,YIJDs根据WHO公布的亚太区2002年疾病负担数据进行估算. 结果 2000-2005年山东省疾病监测系统居民因为早死和残疾年平均损失149.74个DALYs/千人,其中,76.6%的DALYs损失因慢性非传染性疾病所致,14.1%由传染性疾病等引起,9.2%因为意外伤害造成;接近1/2(45%)的DALYs损失发生在60岁以上人群;恶性肿瘤为造成男性居民DALYs损失的首位原因,其次为精神行为疾患、意外伤害、脑血管病和心脏病等,女性居民则以精神行为疾患为DALYs首位原因,其次为心脏病、恶性肿瘤、脑血管病和呼吸系统疾病. 结论 以循环系统疾病、精神行为疾惠和恶性肿瘤为首的慢性非传染性疾病为造成山东省疾病负担DALYs损失的主要原因.对于精神行为疾患的重要性的认识有待于进一步提高,研究的主要局限性在于发病率资料的缺乏.
Resumo:
A large proportion (over 12 per cent) of international and non-English speaking background (NESB) postgraduate research students enrol in engineering and information technology (IT) programs in Australian universities. They find themselves in an advanced research culture, and are technically and scientifically challenged early in their programs. This is in addition to cultural, social and religious isolation and linguistic barriers they have to contend with. The project team surveyed this cohort at QUT and UWA, on the hypothesis that they face challenges that are more discipline-specific. The results of the survey indicate that existing supervisory frameworks which are limited to linguistic contexts are not fully assisting these students and supervisors to achieve high quality research. The goal of this project is to extend these supervisory frameworks to a holistic model that will address the unique needs and supervisory issues these students face in engineering and IT disciplines. The model will be useable by all other Australian universities.
Resumo:
In recent times, technology has advanced in such a manner that the world can now communicate in means previously never thought possible. Transnational organised crime groups, who have exploited these new technologies as basis for their criminal success, however, have not overlooked this development, growth and globalisation. Law enforcement agencies have been confronted with an unremitting challenge as they endeavour to intercept, monitor and analyse these communications as a means of disrupting the activities of criminal enterprises. The challenge lies in the ability to recognise and change tactics to match an increasingly sophisticated adversary. The use of communication interception technology, such as phone taps or email interception, is a tactic that when used appropriately has the potential to cause serious disruption to criminal enterprises. Despite the research that exists on CIT and TOC, these two bodies of knowledge rarely intersect. This paper builds on current literature, drawing them together to provide a clearer picture of the use of CIT in an enforcement and intelligence capacity. It provides a review of the literature pertaining to TOC, the structure of criminal enterprises and the vulnerability of communication used by these crime groups. Identifying the current contemporary models of policing it reviews intelligence-led policing as the emerging framework for modern policing. Finally, it assesses the literature concerning CIT, its uses within Australia and the limitations and arguments that exist. In doing so, this paper provides practitioners with a clearer picture of the use, barriers and benefits of using CIT in the fight against TOC. It helps to bridge the current gaps in modern policing theory and offers a perspective that can help drive future research.
Resumo:
Mesothelioma is a rare malignancy arising from mesothelial cells lining the pleura and peritoneum. Advances in modern technology have allowed the development of array based approaches to the study of disease allowing researchers the opportunity to study many genes or proteins in a high-throughput fashion. This review describes the current knowledge surrounding array based approaches with respect to mesothelioma research. © 2009 by the International Association for the Study of Lung Cancer.
Resumo:
Enterprise Social Networks continue to be adopted by organisations looking to increase collaboration between employees, customers and industry partners. Offering a varied range of features and functionality, this technology can be distinguished by the underlying business models that providers of this software deploy. This study identifies and describes the different business models through an analysis of leading Enterprise Social Networks: Yammer, Chatter, SharePoint, Connections, Jive, Facebook and Twitter. A key contribution of this research is the identification of consumer and corporate models as extreme approaches. These findings align well with research on the adoption of Enterprise Social Networks that has discussed bottom-up and top-down approaches. Of specific interest are hybrid models that wrap a corporate model within a consumer model and may, therefore, provide synergies on both models. From a broader perspective, this can be seen as the merging of the corporate and consumer markets for IT products and services.
Resumo:
This study uses the well-known social networking site, Facebook (FB), for a study of differences in perceptions on the use of technologies in the classroom around the world. This study is part of a larger project exploring telecollaboration and the use of online discussions between graduate students in an online masters program based in Australia and students in the graduate education program at a regional university in Greece. Postings reveal more similarities between the situations and perceptions of the participants from the different countries than differences. Most participants indicated that while they and their students had access in general to computers and the internet, they did not necessarily have this access in the classroom. Even when technologies were available in schools, participants identified a critical need for professional development to increase teachers’ use of ICT. These findings are relevant to educators and policy development in terms of implementation of ICT or social networking in the language classroom.
Resumo:
The Pink Women's Wellness Program Journal is a Queensland University of Technology (School of Nursing and Midwifery) initiative supported by IHBI, The Kim Walters Choices Program, Cancer Council Queensland and HOCA. The 12-week program provides participants recovering from acute breast cancer treatment a comprehensive set of information and tools designed to help get their lives back on track. Through the adoption of positive lifestyle habits, the focus of the program is the management of key side effects such as menopausal symptoms, increased risk of osteoporosis, heart disease and type 2 diabetes. This website brings a successful pilot program to an online medium, offering participants many advantages over the existing print journal. Some of the key services offered by the website version are: - Easy to use data capture tools to track exercise, BMI, nutrition and menopausal symptoms. - Real-time graphs illustrating participants' progress day by day and week by week. - The opportunity for participants to interact through simple social media tools. - Program related reminders, notifications and motivational messages.
Resumo:
This thesis examined the influence of mobile digital technology on the brand identity of luxury brands. Specifically it focused on the use of mobile applications by automobile, hotel and beauty brands and compared the perceptions of marketing managers with consumers on how mobile applications influenced luxury brand identity and image. Outcomes of this research included a model to depict the ongoing process between mobile-mediated luxury brand identity and image, and a typology of luxury brand mobile applications listing key features of mobile-mediated luxemosphere. Overall findings suggest that the influence of mobile applications on luxury brand identity has been negative, as their brand image appeared to be degraded, resulting in diminishing the brand identity.
Resumo:
In plants, double-stranded RNA (dsRNA) is an effective trigger of RNA silencing, and several classes of endogenous small RNA (sRNA), processed from dsRNA substrates by DICER-like (DCL) endonucleases, are essential in controlling gene expression. One such sRNA class, the microRNAs (miRNAs) control the expression of closely related genes to regulate all aspects of plant development, including the determination of leaf shape, leaf polarity, flowering time, and floral identity. A single miRNA sRNA silencing signal is processed from a long precursor transcript of nonprotein-coding RNA, termed the primary miRNA (pri-miRNA). A region of the pri-miRNA is partially self-complementary allowing the transcript to fold back onto itself to form a stem-loop structure of imperfectly dsRNA. Artificial miRNA (amiRNA) technology uses endogenous pri-miRNAs, in which the miRNA and miRNA*(passenger strand of the miRNA duplex) sequences have been replaced with corresponding amiRNA/ amiRNA*sequences that direct highly efficient RNA silencing of the targeted gene. Here, we describe the rules for amiRNA design, as well as outline the PCR and bacterial cloning procedures involved in the construction of an amiRNA plant expression vector to control target gene expression in Arabidopsis thaliana. © 2014 Springer Science+Business Media New York.
Australian Research to Encourage School Students’ Positive Use of Technology to Reduce Cyberbullying
Resumo:
Information and Communications Technology (ICT) has spread rapidly in Australia. Mobile phones, which increasingly have advanced capabilities including Internet access, mobile television and multimedia storage, are owned by 22% of Australian children aged 9-11 years and 73% of those aged 12-14 years (Australian Bureau of Statistics, 2012b), as well as by over 90% of Australians aged 15 years and over(Australian Communications and Media Authority (ACMA), 2010). Nearly 80% of Australian households have access to the Internet and 73% have a broadband Internet connection, ensuring that Internet access is typically reliable and high-speed (Australian Bureau of Statistics, 2012a). Ninety percent of Australian children aged 5-14 years (comprising 79% of 5-8 year olds; 96% of 9-11 year olds; and 98% of 12-14 year olds) reported having accessed the Internet during 2011-2012, a significant increase from 79% in 2008-2009 (Australian Bureau of Statistics, 2012b). Approximately 90% of 5-14 year olds have accessed the Internet both from home and from school, with close to 49% accessing the Internet from other places (Australian Bureau of Statistics, 2012b). Young people often make use of borrowed Internet access (e.g. in friends’ homes), commercial access (e.g. cybercafés), public access (e.g. libraries), and mobile device access in areas offering free Wi-Fi (Lim, 2009).
Resumo:
Increasingly, organizations are looking to employ Social Technology (ST) to enhance their capability with Business Process Improvement (BPI). However, little is known about how the characteristics or qualities of ST actually influence an organizations' capability at Business Process Improvement (BPI). This paper discusses the potential role of ST in process improvement by presenting an a-priory model derived by an investigation of extant research. First, the qualities of social technology that potentially support high level action possibilities related to BPI are presented (we refer to these as affordances), next these affordances are mapped to the De Bruin (2009) BPM Maturity model as a first step to understanding how ST influences BPI. This work is expected to contribute to our knowledge and understanding of the relationship between ST and BPI, and will extend existing theory on Business Process Management capability and maturity.
Resumo:
According to a study conducted by the International Maritime organisation (IMO) shipping sector is responsible for 3.3% of the global Greenhouse Gas (GHG) emissions. The 1997 Kyoto Protocol calls upon states to pursue limitation or reduction of emissions of GHG from marine bunker fuels working through the IMO. In 2011, 14 years after the adoption of the Kyoto Protocol, the Marine Environment Protection Committee (MEPC) of the IMO has adopted mandatory energy efficiency measures for international shipping which can be treated as the first ever mandatory global GHG reduction instrument for an international industry. The MEPC approved an amendment of Annex VI of the 1973 International Convention for the Prevention of Pollution from Ships (MARPOL 73/78) to introduce a mandatory Energy Efficiency Design Index (EEDI) for new ships and the Ship Energy Efficiency Management Plan (SEEMP) for all ships. Considering the growth projections of human population and world trade the technical and operational measures may not be able to reduce the amount of GHG emissions from international shipping in a satisfactory level. Therefore, the IMO is considering to introduce market-based mechanisms that may serve two purposes including providing a fiscal incentive for the maritime industry to invest in more energy efficient manner and off-setting of growing ship emissions. Some leading developing countries already voiced their serious reservations on the newly adopted IMO regulations stating that by imposing the same obligation on all countries, irrespective of their economic status, this amendment has rejected the Principle of Common but Differentiated Responsibility (the CBDR Principle), which has always been the cornerstone of international climate change law discourses. They also claimed that negotiation for a market based mechanism should not be continued without a clear commitment from the developed counters for promotion of technical co-operation and transfer of technology relating to the improvement of energy efficiency of ships. Against this backdrop, this article explores the challenges for the developing counters in the implementation of already adopted technical and operational measures.
Resumo:
Over the past decade, social media have gone through a process of legitimation and official adoption, and they are now becoming embedded as part of the official communications apparatus of many commercial and public-sector organisations— in turn, providing platforms like Twitter with their own sources of legitimacy. Arguably, the demonstrated utility of social media platforms and tools in times of crisis—from civil unrest and violent crime through to natural disasters like bushfires, earthquakes, and floods—has been a crucial driver of this newfound legitimacy. In the mid-2000s, user-created content and ‘Web 2.0’ platforms were known to play a role in crisis communication; back then, the involvement of extra-institutional actors in providing and sharing information around such events involved distributed, ad hoc, or niche platforms (like Flickr), and was more likely to be framed as ‘citizen journalism’ or ‘crowdsourcing’ (see, for example, Liu, Palen, Sutton, Hughes, & Vieweg, 2008, on the then-emerging role of photo-sharing in disasters). Since then, the dramatically increased take-up of mainstream social media platforms like Facebook and Twitter means that the pool of potential participants in online crisis communication has broadened to include a much larger proportion of the general population, as well as traditional media and official emergency response organisations.