963 resultados para Cultural control


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Online travel reviews are emerging as a powerful source of information affecting tourists' pre-purchase evaluation of a hotel organization. This trend has highlighted the need for a greater understanding of the impact of online reviews on consumer attitudes and behaviors. In view of this need, we investigate the influence of online hotel reviews on consumers' attributions of service quality and firms' ability to control service delivery. An experimental design was used to examine the effects of four independent variables: framing; valence; ratings; and target. The results suggest that in reviews evaluating a hotel, remarks related to core services are more likely to induce positive service quality attributions. Recent reviews affect customers' attributions of controllability for service delivery, with negative reviews exerting an unfavorable influence on consumers' perceptions. The findings highlight the importance of managing the core service and the need for managers to act promptly in addressing customer service problems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A long-running issue in appetite research concerns the influence of energy expenditure on energy intake. More than 50 years ago, Otto G. Edholm proposed that "the differences between the intakes of food [of individuals] must originate in differences in the expenditure of energy". However, a relationship between energy expenditure and energy intake within any one day could not be found, although there was a correlation over 2 weeks. This issue was never resolved before interest in integrative biology was replaced by molecular biochemistry. Using a psychobiological approach, we have studied appetite control in an energy balance framework using a multi-level experimental system on a single cohort of overweight and obese human subjects. This has disclosed relationships between variables in the domains of body composition [fat-free mass (FFM), fat mass (FM)], metabolism, gastrointestinal hormones, hunger and energy intake. In this Commentary, we review our own and other data, and discuss a new formulation whereby appetite control and energy intake are regulated by energy expenditure. Specifically, we propose that FFM (the largest contributor to resting metabolic rate), but not body mass index or FM, is closely associated with self-determined meal size and daily energy intake. This formulation has implications for understanding weight regulation and the management of obesity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: The effect of exercise on body mass is likely to be partially mediated through changes in appetite control. However, no studies have examined the effect of chronic exercise on obestatin and cholecystokinin (CCK) plasma concentrations or the sensitivity to detect differences in preload energy in obese individuals. The objective of this study was to investigate the effects of chronic exercise on 1) fasting and postprandial plasma concentrations of obestatin, CCK, leptin, and glucose insulinotropic peptide (GIP) and 2) the accuracy of energy compensation in response to covert preload manipulation. Methods: This study used a 12-wk supervised exercise program in 22 sedentary overweight/obese individuals. Fasting/postprandial plasma concentrations of obestatin, CCK, leptin, and GIP were assessed before and after the intervention. Energy compensation at a 30-min test meal after a high-energy (607 kcal) or a low-energy (246 kcal) preload and for the rest of the day (cumulative energy intake [EI]) was also measured. Results: There was a significant reduction in the plasma concentration of fasting plasma GIP and both fasting and postprandial leptin concentrations after the exercise intervention (P < 0.05 for all). No significant changes were observed for CCK or obestatin. A significant preload–exercise interaction (P = 0.011) was observed on cumulative EI and energy compensation for the same period (−87% ± 196% vs 68% ± 165%, P = 0.011). Weight loss (3.5 ± 1.4 kg, P < 0.0001) was not correlated with changes in energy compensation. Conclusions: This study suggests that exercise improves the accuracy of compensation for previous EI, independent of weight loss. Unexpectedly, and in contrast to GIP and leptin, exercise-induced weight loss had no effect on obestatin or CCK concentrations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Living with substance users negatively impacts upon family members in many ways, and distress is common. Despite these deep and wide-ranging impacts, supportive interventions for family members in their own right are rarely available. Thailand has substantial and growing problems with substance use, and there is very little support or family members of drug users, especially in community setting. The Thai Family Support (TFS) program was designed for implementation in primary health care units (PCUs) in Thailand. TFS was based on two approaches with existing empirical support in Western contexts—the 5-step method and CRAFT—with adaptations to a Thai setting that included integration with Buddhist practices. Its aims were to increase well-being of family members, reduce mental distress, improve family relationships between family members, and engage substance users in behaviour change. A small-scale randomised controlled trial on TFS with a Delayed Treatment control was conducted, with assessments at 8 weeks (Post 1) and 20-24 weeks (Post 2). Structured interviews with participants and PCU staff and an examination of five case studies augmented the quantitative results. Mixed Model Analyses were applied to quantitative outcomes, and thematic analysis was used for qualitative data. Thirty-six participants (18 in each of Immediate and Delayed Conditions) were recruited. A significant difference at Baseline between the two conditions was observed on the Thai GHQ-28 and Gender, but it was not possible to statistically control for these effects. There was a significant Time by Condition interaction on the Thai GHQ-28, WHOQOL-BREF-THAI and FAS, reflecting greater improvements in the Immediate condition by Post 1, but with the Delayed condition meeting or exceeding that effect by Post 2. On FES Cohesion and Conflict, there were falls across conditions at Post 2, but only Cohesion also showed a Time by Condition interaction, and that effect was consistent with a delayed impact of treatment. Overall, TFS by PCU staff in the Delayed Condition gave similar results to TFS conducted by the researcher, supporting the viability of its dissemination to standard health services. Qualitative data also confirmed the quantitative results. Most participants reported physiological and psychological improvements even though their substance-using relative did not change their drug use behaviour. After completing TFS, participants reported increased knowledge, group support and sharing feeling, having positive patient-professional relationship, having greater knowledge of substance abuse and social support. In particular, they changed their behaviour towards the substance user, resulting in improvements to family relationships. PCU staff gave similar responses on the efficacy of TFS, and saw it as feasible for routine use, although some implementation challenges were identified. The cultural adaptation and in particular the religious activities, were recognised by participants and PCU staff as an important component of TFS to support psychological health and well-being. Findings from this study showed the impact of substance use on family members and difficulties that they experienced when living with the substance users, resulting distresses and burden that may develop severe mental health disease. Drug use policies should be modified to support family members and response to their needs effectively for early prevention. This study also gave preliminary support for application of the TFS program in rural primary care settings and identified some policies that will be required for it to be disseminated more broadly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis examines online spoof videos in China. It shows the relationship between user-created content and change and how such videos are impacting on social memory. In the West, we are witnessing two outstanding trends in media. On the one hand, media are turning more "demotic" (Turner, 2006) and "participatory" (Jenkins, 2006), whereby lay audiences use popular media for identity formation, representation and association, reconfiguring the media and cultural landscape, and rendering invalid the old paradigm based on the dichotomy of audience and author, creator and consumer, expert and amateur. On the other hand, in both mainstream media and user-creation online there is a trend towards "silly citizenship", with comedy, send-ups and spoofs that used to reside in the margin propelled to the central stage in both pleasure and politics (Hartley, 2010), as is shown in the rising popularity of the Daily Show, Colbert Report, and spoof videos in elections ,e.g. the 2008 presidential election in US (Gray, Jones, & Thompson, 2009; Tryon, 2008). User generated content—and spoof subcultures—is now much a debated phenomenon in China. However, with different political (one party rule and censorship) and cultural (media regarded mainly as instrument for education and social stabilization instead of a critical fourth estate) configurations, will the social and cultural impacts of the two trends in the West be as the same in China? If not, what will be the specificities in the China context? The project starts with a historical review of popular culture and user-created content in China, before turning to spoof videos and looking at how they are produced and shared, travel and diffused on the Internet, and how the communities and sub-cultures forming and emerging around spoof videos are changing the overall cultural landscape in China. By acting as a participant observer in online video sharing sites and conducting face-to face as well as online interviews, I identify lead users and creators of spoof videos and the social networks emerging around them. I call these lead users "skill hubs" and their networks "liquid communities", foregrounding the fact that their appeal doesn’t come from their amicable personality, but rather from their creative skills; and that the networks surrounding them are in a permanent flux, with members coming and going as they see fit. I argue that the "liquidness" (Bauman, 2000) of these communities is what makes them constantly creative and appealing. Textual analysis of online videos, their comments and derivatives are conducted to tease out the uses that that can be made of spoof videos, namely as phatic communication, as alternative memory and as political engagement. Through these analyses I show that spoof videos constitute not only a space where young generations can engage with each other, communicate their anger and dissatisfaction, fun and hope, and where they participate in socio-cultural and political debates, but also create a space where they can experiment with their new skills, new ideas, and new citizenship. The rise of spoof videos heralds the beginning of a trend in popular culture in contemporary China towards the "canonization of the jester" and the dethroning of the establishment. I also argue that a historical perspective is needed to understand the current surge of use creativity and user activism in China, and that many forms of popular media we experience today have their antecedents in various stages of Chinese history. The entrenched "control-resistance" binary is inadequate in interpreting the rich, flux and multilayered Internet space in China.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

New Australian curriculum documents and government initiatives advocate the inclusion of Asian perspectives, which is highly relevant to the STEM fields. For Australia and other countries, STEM education is an opportunity to develop competencies towards employment in high-demand areas, yet the world’s knowledge of STEM is changing rapidly, requiring continuous analysis to meet market demands. This paper presents the need for “collaborations between nations” through research to advance each country’s STEM agenda towards further globalisation of education with the sharing of knowledge. Research is needed on views of what constitutes cultural capital for STEM, which also involves understanding past and current STEM endeavours occurring within various countries. Most importantly for STEM education is uncovering instructional innovations aligned with countries’ cultures and STEM endeavours. Research questions are provided in this paper to stimulate ideas for investigating in these fields. Economically, and as demonstrated recently by Greece and Spain, countries throughout the world can no longer operate independently for advancing standards of living. The world needs to recognise interdependence not only in trade and resources but also through the knowledge base that exists within countries. Learning together globally means transitioning from independence to interdependence in STEM education that will help each country meet global demands.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an "ecosystem-in-an-ecosystem" which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Teacher assessment literacy is a phrase that is often used but rarely defined. Yet understanding teacher assessment literacy is important in an international curriculum and assessment reform context that continues to challenge teachers’ assessment practices. In this article situated examples of classroom assessment literacies are analysed using Bernstein’s (Pedagogy, symbolic control and identity: Theory, research and critique, Taylor and Francis, London, 1996; Br J Sociol Educ 20(2):157–173, 1999) theoretical tools of vertical and horizontal discourses, classification and framing. Drawing on a sociocultural view of learning, the authors define teacher assessment literacies as dynamic social practices which are context dependent and which involve teachers in articulating and negotiating classroom and cultural knowledges with one another and with learners, in the initiation, development and practice of assessment to achieve the learning goals of students. This conceptualisation of assessment literacy aims to make explicit some underpinning theoretical constructs of assessment literacy to inform dialogue and decision making for policy and practice to benefit student learning and achievement.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ultimate goal of an access control system is to allocate each user the precise level of access they need to complete their job - no more and no less. This proves to be challenging in an organisational setting. On one hand employees need enough access to the organisation’s resources in order to perform their jobs and on the other hand more access will bring about an increasing risk of misuse - either intentionally, where an employee uses the access for personal benefit, or unintentionally, through carelessness or being socially engineered to give access to an adversary. This thesis investigates issues of existing approaches to access control in allocating optimal level of access to users and proposes solutions in the form of new access control models. These issues are most evident when uncertainty surrounding users’ access needs, incentive to misuse and accountability are considered, hence the title of the thesis. We first analyse access control in environments where the administrator is unable to identify the users who may need access to resources. To resolve this uncertainty an administrative model with delegation support is proposed. Further, a detailed technical enforcement mechanism is introduced to ensure delegated resources cannot be misused. Then we explicitly consider that users are self-interested and capable of misusing resources if they choose to. We propose a novel game theoretic access control model to reason about and influence the factors that may affect users’ incentive to misuse. Next we study access control in environments where neither users’ access needs can be predicted nor they can be held accountable for misuse. It is shown that by allocating budget to users, a virtual currency through which they can pay for the resources they deem necessary, the need for a precise pre-allocation of permissions can be relaxed. The budget also imposes an upper-bound on users’ ability to misuse. A generalised budget allocation function is proposed and it is shown that given the context information the optimal level of budget for users can always be numerically determined. Finally, Role Based Access Control (RBAC) model is analysed under the explicit assumption of administrators’ uncertainty about self-interested users’ access needs and their incentives to misuse. A novel Budget-oriented Role Based Access Control (B-RBAC) model is proposed. The new model introduces the notion of users’ behaviour into RBAC and provides means to influence users’ incentives. It is shown how RBAC policy can be used to individualise the cost of access to resources and also to determine users’ budget. The implementation overheads of B-RBAC is examined and several low-cost sub-models are proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A review of Graeme Turner, What’s Become of Cultural Studies (Sage, London, 2012) and Lawrence Grossberg, Cultural Studies in the Future Tense (Duke University Press, Durham, 2010).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper conducts an historical and conceptual review of the idea of ‘cultural intermediaries’ and sets up a contrast between the cultural and creative industries. It draws on theorizations of ‘economic imaginaries’ and reconstructs the respective imaginaries of cultural and creative industries. It suggests that the former was organized around the culturalization of the economy and the second around the economization of culture. Nevertheless, there are complicities between them, not least in the contention that a new set of economic developments would redeem the traditional promises of culture.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Several approaches have been introduced in the literature for active noise control (ANC) systems. Since the filtered-x least-mean-square (FxLMS) algorithm appears to be the best choice as a controller filter, researchers tend to improve performance of ANC systems by enhancing and modifying this algorithm. This paper proposes a new version of the FxLMS algorithm, as a first novelty. In many ANC applications, an on-line secondary path modeling method using white noise as a training signal is required to ensure convergence of the system. As a second novelty, this paper proposes a new approach for on-line secondary path modeling on the basis of a new variable-step-size (VSS) LMS algorithm in feed forward ANC systems. The proposed algorithm is designed so that the noise injection is stopped at the optimum point when the modeling accuracy is sufficient. In this approach, a sudden change in the secondary path during operation makes the algorithm reactivate injection of the white noise to re-adjust the secondary path estimate. Comparative simulation results shown in this paper indicate the effectiveness of the proposed approach in reducing both narrow-band and broad-band noise. In addition, the proposed ANC system is robust against sudden changes of the secondary path model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes a self-tuning feedforward active noise control (ANC) system with online secondary path modeling. The step-size parameters of the controller and modeling filters have crucial rule on the system performance. In literature, these parameters are adjusted by trial-and-error. In other words, they are manually initialized before system starting, which require performing extensive experiments to ensure the convergence of the system. Hence there is no guarantee that the system could perform well under different situations. In the proposed method, the appropriate values for the step-sizes are obtained automatically. Computer simulation results indicate the effectiveness of the proposed method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In practical cases for active noise control (ANC), the secondary path has usually a time varying behavior. For these cases, an online secondary path modeling method that uses a white noise as a training signal is required to ensure convergence of the system. The modeling accuracy and the convergence rate are increased when a white noise with a larger variance is used. However, the larger variance increases the residual noise, which decreases performance of the system and additionally causes instability problem to feedback structures. A sudden change in the secondary path leads to divergence of the online secondary path modeling filter. To overcome these problems, this paper proposes a new approach for online secondary path modeling in feedback ANC systems. The proposed algorithm uses the advantages of white noise with larger variance to model the secondary path, but the injection is stopped at the optimum point to increase performance of the algorithm and to prevent the instability effect of the white noise. In this approach, instead of continuous injection of the white noise, a sudden change in secondary path during the operation makes the algorithm to reactivate injection of the white noise to correct the secondary path estimation. In addition, the proposed method models the secondary path without the need of using off-line estimation of the secondary path. Considering the above features increases the convergence rate and modeling accuracy, which results in a high system performance. Computer simulation results shown in this paper indicate effectiveness of the proposed method.