909 resultados para Bush, George W, 1946-
Resumo:
In daily activities people are using a number of available means for the achievement of balance, such as the use of hands and the co-ordination of balance. One of the approaches that explains this relationship between perception and action is the ecological theory that is based on the work of a) Bernstein (1967), who imposed the problem of ‘the degrees of freedom’, b) Gibson (1979), who referred to the theory of perception and the way which the information is received from the environment in order for a certain movement to be achieved, c) Newell (1986), who proposed that movement can derive from the interaction of the constraints that imposed from the environment and the organism and d) Kugler, Kelso and Turvey (1982), who showed the way which “the degrees of freedom” are connected and interact. According to the above mentioned theories, the development of movement co-ordination can result from the different constraints that imposed into the organism-environment system. The close relation between the environmental and organismic constraints, as well as their interaction is responsible for the movement system that will be activated. These constraints apart from shaping the co-ordination of specific movements can be a rate limiting factor, to a certain degree, in the acquisition and mastering of a new skill. This frame of work can be an essential tool for the study of catching an object (e.g., a ball). The importance of this study becomes obvious due to the fact that movements that involved in catching an object are representative of every day actions and characteristic of the interaction between perception and action.
Resumo:
One previously unrecognised feature of the history of the political relationship between Australia and Korea is the role played by Australia as a member of the United Nations Organization in respect to the so-called Korea Question. Drawing on source documents from UN Resolutions and Australian Archives this article examines the changing positions of Australia as the Korea Question developed in the UN General Assembly. This spanned a period from the beginnings of the UN Organization until the time when both Koreas were admitted as members in 1991. The article proposes the Australian positions as responses to changing domestic and international political contexts.
Resumo:
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the most predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Resumo:
This paper employs empirical evidence from a survey of Queensland secondary school students to examine their knowledge about their wages and working conditions. It does so within the theoretical lens of the Gagne (or Gagne-Briggs) theory of instruction, which centres on the content of learning and how learning is acquired (Gagne, Briggs & Wager, 1988). While Gagne articulates five categories of learning, our focus here is on two; verbal information or declarative knowledge (facts that people can declare), and procedural knowledge (the rules and procedures for achieving outcomes). We show that student workers know little about the instruments governing their employment, or their workplace entitlements. Of the total sample of year 9 and year 11 students surveyed (n=892), those students who worked, or who had worked in the past year (n=438), were asked to identify whether they were employed under an award, collective agreement or AWA. Eighty three per cent of students did not know which industrial instrument set their wages. We argue that if young workers do not have declarative knowledge of their entitlements, nor basic procedural knowledge about redress, then they are not in a position to deploy Gagne’s ‘cognitive strategies’ that would enable them to take action to ensure their working conditions meet legal minima. We advocate that young workers should be given summary information on their wages and other entitlements on appointment and that such summary information should be readily available on employers’ noticeboards and electronically on company websites, and that the information should include a brief summary of avenues for redressing issues of underpayment or sub-standard conditions.
Resumo:
Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.
Resumo:
ERP systems generally implement controls to prevent certain common kinds of fraud. In addition however, there is an imperative need for detection of more sophisticated patterns of fraudulent activity as evidenced by the legal requirement for company audits and the common incidence of fraud. This paper describes the design and implementation of a framework for detecting patterns of fraudulent activity in ERP systems. We include the description of six fraud scenarios and the process of specifying and detecting the occurrence of those scenarios in ERP user log data using the prototype software which we have developed. The test results for detecting these scenarios in log data have been verified and confirm the success of our approach which can be generalized to ERP systems in general.
Resumo:
Drawn from a larger mixed methods study, this case study provides an account of aspects of the music education programme that occurred with one teacher and a kindergarten class of children aged three and four years. Contrary to transmission approaches that are often used in Hong Kong, the case depicts how musical creativity was encouraged by the teacher in response to children’s participation during the time for musical free play. It shows how the teacher scaffolded the attempts of George, a child aged 3.6 years to use musical notation. The findings are instructive for kindergarten teachers in Hong Kong and suggest ways in which teachers might begin to incorporate more creative approaches to musical education. They are also applicable to other kindergarten settings where transmission approaches tend to dominate and teachers want to encourage children’s musical creativity.
Resumo:
Shelton, Edward Mason; p.548 Sherwood Arboretum; p.550 Soutter, William; pp.563-564 Styles or gardens and designed landscapes; pp.575-576 Summer-house; pp.579-580 Trapnell, Walter George; p.602 Tropical Gardens; pp.604-605 Wickham Park; p.642 Wijaya, Made; p.642 Williams, George; p.644 Williams, Keith A.W.; p.644 Verandah Garadening; p.614
Resumo:
We describe research into the identification of anomalous events and event patterns as manifested in computer system logs. Prototype software has been developed with a capability that identifies anomalous events based on usage patterns or user profiles, and alerts administrators when such events are identified. To reduce the number of false positive alerts we have investigated the use of different user profile training techniques and introduce the use of abstractions to group together applications which are related. Our results suggest that the number of false alerts that are generated is significantly reduced when a growing time window is used for user profile training and when abstraction into groups of applications is used.
Resumo:
In today's technological age, fraud has become more complicated, and increasingly more difficult to detect, especially when it is collusive in nature. Different fraud surveys showed that the median loss from collusive fraud is much greater than fraud perpetrated by a single person. Despite its prevalence and potentially devastating effects, collusion is commonly overlooked as an organizational risk. Internal auditors often fail to proactively consider collusion in their fraud assessment and detection efforts. In this paper, we consider fraud scenarios with collusion. We present six potentially collusive fraudulent behaviors and show their detection process in an ERP system. We have enhanced our fraud detection framework to utilize aggregation of different sources of logs in order to detect communication and have further enhanced it to render it system-agnostic thus achieving portability and making it generally applicable to all ERP systems.
Resumo:
Shelton, E.M. (p.548); Sherwood Arboretum (p.550); Soutter, William (pp.563-4); Styles (pp.575-6); Summer-House (579-580); Trapnell, W.G. (p.602); Tropical Gardens (pp.604-5);Verandah Gardening (p.614); Wickham Park (p.642); Wijaya, Made (p.642); Williams, George (p.644); Williams Keith A (p.644).
Resumo:
Thermogravimetry combined with evolved gas mass spectrometry has been used to ascertain the stability of the soil minerals destinezite and diadochite. These two minerals are identical except for their morphology. Diadochite is amorphous whereas destinezite is crystalline. Both minerals are found in soils. It is important to understand the stability of these minerals because soils are subject to bush fires especially in Australia. The thermal analysis patterns of the two minerals are similar but not identical. Subtle differences are observed in the DTG patterns. For destinezite, two DTG peaks are observed at 129 and 182°C attributed to the loss of hydration water, whereas only a broad peak with maximum at 84°C is observed for diadochite. Higher temperature mass losses at 685°C for destinezite and 655°C for diadochite, based upon the ion current curves, are due to sulphate decomposition. This research has shown that at low temperatures the minerals are stable but at high temperatures, as might be experienced in a bush fire, the minerals decompose.
Resumo:
Aussie Post, the flagship of ocker Australiana, folded in January 2002. Post began life as the Australasian, a middlebrow magazine steeped in a nineteenth century civics of stable citizenship with a modicum of diversionary leisure. The transformation began when the Australasian became Australasian Post in 1946 under George Johnston's brief 15-week editorship. Johnston's idealistic vision of Post as a voice of post-war Australian modernity was soon overtaken by commercial imperatives as Post's identity wavered between its civic antecedents and a new low-brow populism, a niche it had finally settled into by the mid-1950s. This tension between staid civics and risqué populism shaped the magazine's long evolution into its final realisation of the pictorial general interest genre. This paper, based on a close examination of the magazines themselves, tracks Post's generic evolution and focuses on the struggle to redefine the magazine’s identity during the post-war period when the axis of Australian identity was reluctantly shifting from the staid traditions of Rule Britannia to the flashy modernity of Pax Americana.
Resumo:
For applied sport scientists charged with developing talented performers an essential requirement is to identify components contributing to the development and maintenance of expertise. Previous qualitative analysis has revealed several psychological (e.g., mental focus, goal-setting and selfevaluation), socio-cultural (e.g. community and family support, cultural influence), physical (e.g., strength, height) and environmental (e.g., access to facilities and climate) constraints on successful Olympian development (Abbott et al., 2005). Open-ended interviews with expert athletes and/or expert coaches have been used to reveal competencies of elite performers to derive factors associated with success (Durand-Bush et al., 2002). However, the influence of these factors is likely to be sport-specific due to different task constraints and the changing nature of the performer-environment relationship through practice, coaching and competing (Vaeyens et al., 2008). So far, only one study on expertise acquisition in cricket has been undertaken. Weissensteiner, et al. (2009) found that development of expertise in cricket batting in Australia may be facilitated by early unstructured play (i.e. ‘backyard cricket’), a wide range of sport experience during development, and early exposure to playing with seniors.