920 resultados para Secret--Aspect psychologique--Enquêtes
Resumo:
Role play approaches have been used in online environments in an effort to create a mix of contested ideas and to promote participant engagement. While it is recognised that there is an aspect of ‘fun’ associated with role play there is a need to understand role assignment more rigorously than simply levels of reported participation and enjoyment. It is the contention of this paper that individuals are unlikely to be able to authentically play a role and, that in fact, there may be little purpose to contrived roles. Additionally, the literature has widely reported that personality factors, such as introversion and extroversion continue to be of significance in the way that individuals contribute in online contexts. The findings in the study reported in this paper confirm that introversion and extroversion do, indeed, play a role in the way individuals contribute in online environments. Thus, this paper argues that an active consideration needs to be given to individuals preferred (or natural) way of working even where use is made of online role play.
Resumo:
This paper identifies transport disadvantage using a 7 day activity-travel diary data from two rural case study areas. A composite participation index (PI) measure was developed for this study based on six indices measuring elements of travel and activity participation. Using the index the paper then goes on to compare these results, with the results obtained from other more traditional indicators used to identify transport disadvantage. These indicators are related to the size of activity space such as unique network distance travelled, number of unique locations visited, activity space area, activity duration, and fullness (shape) of activity spaces. The weaknesses of these indicator based measures are that: firstly, they do not take into account the relativity of the measure between different areas i.e. travel distance in terms of the wider context of available activities within an area; and secondly, these indicators are multi-dimensional and each represents a different qualitative aspect of travel and activity participation. As a result, six individual indices were developed to overcome these problems. These include: participation count index, participation length index, participation area index, participation duration index, participation type index, and participation frequency index. These are then aggregated to assess the relative performance in terms of these different indices and identify the nature of transport disadvantage. GIS was used to visualise individual travel patterns and to derive scores for both the indicator based measures and the index based measures. Factor analysis was conducted to derive weights of the individual indices to form the composite index measure. From this analysis, two intermediate indices were also derived using the underlying factors of the data related to these indices. Using the scores of all these measures, multiple regression analyses were conducted to identify patterns of transport disadvantage.
Resumo:
This thesis is concerned with the sloshing motion of water in a moonpool. It is a relatively new problem, that is particularly predominant in moonpools with relatively large dimensions. The problem is further complicated by the additional behaviour of vertical oscillation. It is inevitable that large moonpools will be needed as offshore technology advances, therefore making a problem an important one. The research involves two parts, the theoretical and experimental study. The theoretical study consists of idealising the moonpool to a two dimensional system, represented by two surface piercing parallel barriers at a distance 2a apart. The barriers are forced to undergo roll motion which in turn generates waves. These travelling waves are travelling in opposite directions to each other and have the same amplitude and period, and thus can be expressed in terms of a standing wave. This is mathematically achieved by applying the theory of wavemaking, and therefore the wave amplitude at the side wall can be evaluated at near resonant conditions. The experimental study comprises of comparing the results obtained from the tank and moonpool experiments. The rolling motion creates the sloshing waves in both cases, in addition the vertical oscillation in the moonpool is produced by generating waves at one end of the towing tank. Apart from highlighting influencing parameters, the resonant frequencies obtained from these experiments are then compared with the theoretical values. Experiments in demonstrating the effect of increasing damping with the aid of baffles are also conducted. This is an important aspect which is very necessary if operations in launching and retrieving are to be carried out efficiently and safely.
Resumo:
The contributions of this thesis fall into three areas of certificateless cryptography. The first area is encryption, where we propose new constructions for both identity-based and certificateless cryptography. We construct an n-out-of- n group encryption scheme for identity-based cryptography that does not require any special means to generate the keys of the trusted authorities that are participating. We also introduce a new security definition for chosen ciphertext secure multi-key encryption. We prove that our construction is secure as long as at least one authority is uncompromised, and show that the existing constructions for chosen ciphertext security from identity-based encryption also hold in the group encryption case. We then consider certificateless encryption as the special case of 2-out-of-2 group encryption and give constructions for highly efficient certificateless schemes in the standard model. Among these is the first construction of a lattice-based certificateless encryption scheme. Our next contribution is a highly efficient certificateless key encapsulation mechanism (KEM), that we prove secure in the standard model. We introduce a new way of proving the security of certificateless schemes based that are based on identity-based schemes. We leave the identity-based part of the proof intact, and just extend it to cover the part that is introduced by the certificateless scheme. We show that our construction is more efficient than any instanciation of generic constructions for certificateless key encapsulation in the standard model. The third area where the thesis contributes to the advancement of certificateless cryptography is key agreement. Swanson showed that many certificateless key agreement schemes are insecure if considered in a reasonable security model. We propose the first provably secure certificateless key agreement schemes in the strongest model for certificateless key agreement. We extend Swanson's definition for certificateless key agreement and give more power to the adversary. Our new schemes are secure as long as each party has at least one uncompromised secret. Our first construction is in the random oracle model and gives the adversary slightly more capabilities than our second construction in the standard model. Interestingly, our standard model construction is as efficient as the random oracle model construction.
Resumo:
Network-based Intrusion Detection Systems (NIDSs) monitor network traffic for signs of malicious activities that have the potential to disrupt entire network infrastructures and services. NIDS can only operate when the network traffic is available and can be extracted for analysis. However, with the growing use of encrypted networks such as Virtual Private Networks (VPNs) that encrypt and conceal network traffic, a traditional NIDS can no longer access network traffic for analysis. The goal of this research is to address this problem by proposing a detection framework that allows a commercial off-the-shelf NIDS to function normally in a VPN without any modification. One of the features of the proposed framework is that it does not compromise on the confidentiality afforded by the VPN. Our work uses a combination of Shamir’s secret-sharing scheme and randomised network proxies to securely route network traffic to the NIDS for analysis. The detection framework is effective against two general classes of attacks – attacks targeted at the network hosts or attacks targeted at framework itself. We implement the detection framework as a prototype program and evaluate it. Our evaluation shows that the framework does indeed detect these classes of attacks and does not introduce any additional false positives. Despite the increase in network overhead in doing so, the proposed detection framework is able to consistently detect intrusions through encrypted networks.
Resumo:
Website customization can help to better fulfill the needs and wants of individual customers. It is an important aspect of customer satisfaction of online banking, especially among the younger generation. This dimension, however, is poorly addressed particularly in the Australian context. The proposed research aims to fulfill this gap by exploring the use of a popular Web 2.0 technology known as tags or user assigned metadata to facilitate customization at the interaction level. A prototype is proposed to demonstrate the various interaction-based customization types, evaluated through a series of experiments to assess the impact on customer satisfaction. The expected research outcome is a set of guidelines akin to interaction design patterns for aiding the design and implementation of the proposed tag-based approach.
Resumo:
This thesis develops, applies and analyses a collaborative design methodology for branding a tourism destination. The area between the Northern Tablelands and the Mid-North Coast of New South Wales, Australia, was used as a case study for this research. The study applies theoretical concepts of systems thinking and complexity to the real world, and tests the use of design as a social tool to engage multiple stakeholders in planning. In this research I acknowledge that places (and destinations) are socially constructed through people's interactions with their physical and social environments. This study explores a methodology that is explicit about the uncertainties of the destination’s system, and that helps to elicit knowledge and system trends. The collective design process used the creation of brand concepts, elements and strategies as instruments to directly engage stakeholders in the process of reflecting about their places and the issues related to tourism activity in the region. The methods applied included individual conversations and collaborative design sessions to elicit knowledge from local stakeholders. Concept maps were used to register and interpret information released throughout the process. An important aspect of the methodology was to bring together different stakeholder groups and translate the information into a common language that was understandable by all participants. This work helped release significant information as to what kind of tourism activity local stakeholders are prepared to receive and support. It also helped the emergence of a more unified regional identity. The outcomes delivered by the project (brand, communication material and strategies) were of high quality and in line with the desires and expectation of the local hosts. The process also reinforced local sense of pride, belonging and conservation. Furthermore, interaction between participants from different parts of the region triggered some self organising activity around the brand they created together. A major contribution of the present work is the articulation of an inclusive methodology to facilitate the involvement of locals into the decision-making process related to tourism planning. Of particular significance is the focus on the social construction of meaning in and through design, showing that design exercises can have significant social impact – not only on the final product, but also on the realities of the people involved in the creative process.
Resumo:
Background: Mentoring is often proposed as a solution to the problem of successfully recruiting and retaining nursing staff. The aim of this constructivist grounded theory study was to explore Australian rural nurses' experiences of mentoring. Design: The research design used was reflexive in nature resulting in a substantive, constructivist grounded theory study. Participants: A national advertising campaign and snowball sampling were used to recruit nine participants from across Australia. Participants were rural nurses who had experience in mentoring others. Methods: Standard grounded theory methods of theoretical sampling, concurrent data collection and analysis using open, axial and theoretical coding and a story line technique to develop the core category and category saturation were used. To cultivate the reflexivity required of a constructivist study, we also incorporated reflective memoing, situational analysis mapping techniques and frame analysis. Data was generated through eleven interviews, email dialogue and shared situational mapping. Results: Cultivating and growing new or novice rural nurses using supportive relationships such as mentoring was found to be an existing, integral part of experienced rural nurses' practice, motivated by living and working in the same communities. Getting to know a stranger is the first part of the process of cultivating and growing another. New or novice rural nurses gain the attention of experienced rural nurses through showing potential or experiencing a critical incidence. Conclusions: The problem of retaining nurses is a global issue. Experienced nurses engaged in clinical practice have the potential to cultivate and grow new or novice nurses-many already do so. Recognising this role and providing opportunities for development will help grow a positive, supportive work environment that nurtures the experienced nurses of tomorrow.
Resumo:
Aim. This paper is a report of a study to explore rural nurses' experiences of mentoring. Background. Mentoring has recently been proposed by governments, advocates and academics as a solution to the problem for retaining rural nurses in the Australian workforce. Action in the form of mentor development workshops has changed the way that some rural nurses now construct supportive relationships as mentoring. Method. A grounded theory design was used with nine rural nurses. Eleven semi-structured interviews were conducted in various states of Australia during 2004-2005. Situational analysis mapping techniques and frame analysis were used in combination with concurrent data generation and analysis and theoretical sampling. Findings. Experienced rural nurses cultivate novices through supportive mentoring relationships. The impetus for such relationships comes from their own histories of living and working in the same community, and this was termed 'live my work'. Rural nurses use multiple perspectives of self in order to manage their interactions with others in their roles as community members, consumers of healthcare services and nurses. Personal strategies adapted to local context constitute the skills that experienced rural nurses pass-on to neophyte rural nurses through mentoring, while at the same time protecting them through troubleshooting and translating local cultural norms. Conclusion. Living and working in the same community creates a set of complex challenges for novice rural nurses that are better faced with a mentor in place. Thus, mentoring has become an integral part of experienced rural nurses' practice to promote staff retention. © 2007 The Authors.
Resumo:
Major curriculum and assessment reforms in Australia have generated research interest in issues related to standards, teacher judgement and moderation. This article is based on one related inquiry of a large-scale Australian Research Council Linkage project conducted in Queensland. This qualitative study analysed interview data to identify teachers’ views on standards and moderation as a means to achieving consistency of teacher judgement. A complementary aspect of the research involved a blind review that was conducted to determine the degree of teacher consistency without the experience of moderation. Empirical evidence was gained that most teachers, of the total interviewed, articulated a positive attitude towards the use of standards in moderation and perceived that this process produces consistency in teachers’ judgements. Context was identified as an important influential factor in teachers’ judgements and it was concluded that teachers’ assessment beliefs, attitudes and practices impact on their perceptions of the value of moderation practice and the extent to which consistency can be achieved.
Resumo:
In this paper, I show how new spaces are being prefigured for colonisation in the language of contemporary technology policy. Drawing on a corpus of 1.3 million words collected from technology policy centres throughout the world, I show the role of policy language in creating the foundations of an emergent form of political economy. The analysis is informed by principles from critical discourse analysis (CDA) and classical political economy. It foregrounds a functional aspect of language called process metaphor to show how aspects of human activity are prefigured for mass commodification by the manipulation of irrealis spaces. I also show how the fundamental element of any new political economy, the property element, is being largely ignored. The potential creation of a global space as concrete as landed property – electromagnetic spectrum – has significant ramifications for the future of social relations in any global “knowledge economy”.
Resumo:
Language is a unique aspect of human communication because it can be used to discuss itself in its own terms. For this reason, human societies potentially have superior capacities of co-ordination, reflexive self-correction, and innovation than other animal, physical or cybernetic systems. However, this analysis also reveals that language is interconnected with the economically and technologically mediated social sphere and hence is vulnerable to abstraction, objectification, reification, and therefore ideology – all of which are antithetical to its reflexive function, whilst paradoxically being a fundamental part of it. In particular, in capitalism, language is increasingly commodified within the social domains created and affected by ubiquitous communication technologies. The advent of the so-called ‘knowledge economy’ implicates exchangeable forms of thought (language) as the fundamental commodities of this emerging system. The historical point at which a ‘knowledge economy’ emerges, then, is the critical point at which thought itself becomes a commodified ‘thing’, and language becomes its “objective” means of exchange. However, the processes by which such commodification and objectification occurs obscures the unique social relations within which these language commodities are produced. The latest economic phase of capitalism – the knowledge economy – and the obfuscating trajectory which accompanies it, we argue, is destroying the reflexive capacity of language particularly through the process of commodification. This can be seen in that the language practices that have emerged in conjunction with digital technologies are increasingly non-reflexive and therefore less capable of self-critical, conscious change.
Resumo:
From their very outset, the disciplines of social science have claimed a need for interdisciplinarity. Proponents of new disciplines have also claimed the whole of human activity as their domain, whilst simultaneously emphasising the need for increased specialisation. Critical social analysis attempts to repair the flaws of specialisation. In this chapter, I argue that the trend towards academic specialisation in social science is most usefully viewed from the perspective of evaluative meaning, and that each new discipline, in emphasising one aspect of a broken conception of humanity, necessarily emphasises one aspect of an already broken conception of value. Critical discourse analysis, qua critical social analysis, may therefore benefit by firstly proceeding from the perspective of evaluative meaning to understand the dynamics of social change and overcome the challenges posed by centuries of intensive specialisation in social science.
Resumo:
Expertise in nursing has been widely studied although there have been no previous studies into what constitutes expertise in nephrology (renal) nursing. This paper, which is abstracted from a larger study into the acquisition and exercise of nephrology nursing expertise, provides evidence of the characteristics and practices of non-expert nephrology nurses. Using the grounded theory method, the study took place in one renal unit in New South Wales, Australia, and involved six non-expert and 11 expert nurses. Sampling was purposive then theoretical. Simultaneous data collection and analysis using participant observation, review of nursing documentation and semistructured interviews was undertaken. The study revealed a three-stage skills-acquisitive process that was identified as non-expert, experienced non-expert and expert stages. Non-expert nurses showed superficial nephrology nursing knowledge and limited experience; they were acquiring basic nephrology nursing skills and possessed a narrow focus of practice.
Resumo:
We suspect that the array of silly names used to refer to temporary staff worldwide may be indicative of the extent to which these nurses have been relegated to, and we would argue, remain in, a type of underclass – relatively unsupported by employers in terms of professional practice and ipso facto excluded from contributing professionally to team work, practice development, clinical governance and evidence based practice. This may be acceptable to some but in a climate of risk averseness and in the interests of strategic planning we would suggest it is an accident waiting to happen. The recent UK Royal College of Nursing (RCN) (Ball & Pike, 2006) survey of bank and agency nurses brings a welcome focus on a group of nurses that make a significant contribution to the smooth running of health services in many countries.