961 resultados para Islam--Prayers and devotions--Early works to 1800


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Despite the best intentions of service providers and organisations, service delivery is rarely error-free. While numerous studies have investigated specific cognitive, emotional or behavioural responses to service failure and recovery, these studies do not fully capture the complexity of the services encounter. Consequently, this research develops a more holistic understanding of how specific service recovery strategies affect the responses of customers by combining two existing models—Smith & Bolton’s (2002) model of emotional responses to service performance and Fullerton and Punj’s (1993) structural model of aberrant consumer behaviour—into a conceptual framework. Specific service recovery strategies are proposed to influence consumer cognition, emotion and behaviour. This research was conducted using a 2x2 between-subjects quasi-experimental design that was administered via written survey. The experimental design manipulated two levels of two specific service recovery strategies: compensation and apology. The effect of the four recovery strategies were investigated by collecting data from 18-25 year olds and were analysed using multivariate analysis of covariance and multiple regression analysis. The results suggest that different service recovery strategies are associated with varying scores of satisfaction, perceived distributive justice, positive emotions, negative emotions and negative functional behaviour, but not dysfunctional behaviour. These finding have significant implications for the theory and practice of managing service recovery.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Designers need to develop good observational skills in order to conduct user studies that reveal the subtleties of human interactions and adequately inform design activity. In this paper we describe a game format that we have used in concert with wiki-web technology, to engage our IT and Information Environments students in developing much sharper observational skills. The Video Card Game is a method of video analysis that is suited to design practitioners as well as to researchers. It uses the familiar format of a card game similar to "Happy Families,, to help students develop themes of interactions from watching video clips. Students then post their interaction themes on wiki-web pages, which allows the teaching team and other students to edit and comment on them. We found that the tangible (cards), game, role playing and sharing aspects of this method led to a much larger amount of interaction and discussion between student groups and between students and the teaching team, than we have achieved using our traditional teaching methods, while taking no more time on the part of the teaching staff. The quality of the resulting interaction themes indicates that this method fosters development of observational skills.In the paper we describe the motivations, method and results in full. We also describe the research context in which we collected the videotape data, and how this method relates to state of the art research methods in interaction design for ubiquitous computing technology.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The research presented in this thesis addresses inherent problems in signaturebased intrusion detection systems (IDSs) operating in heterogeneous environments. The research proposes a solution to address the difficulties associated with multistep attack scenario specification and detection for such environments. The research has focused on two distinct problems: the representation of events derived from heterogeneous sources and multi-step attack specification and detection. The first part of the research investigates the application of an event abstraction model to event logs collected from a heterogeneous environment. The event abstraction model comprises a hierarchy of events derived from different log sources such as system audit data, application logs, captured network traffic, and intrusion detection system alerts. Unlike existing event abstraction models where low-level information may be discarded during the abstraction process, the event abstraction model presented in this work preserves all low-level information as well as providing high-level information in the form of abstract events. The event abstraction model presented in this work was designed independently of any particular IDS and thus may be used by any IDS, intrusion forensic tools, or monitoring tools. The second part of the research investigates the use of unification for multi-step attack scenario specification and detection. Multi-step attack scenarios are hard to specify and detect as they often involve the correlation of events from multiple sources which may be affected by time uncertainty. The unification algorithm provides a simple and straightforward scenario matching mechanism by using variable instantiation where variables represent events as defined in the event abstraction model. The third part of the research looks into the solution to address time uncertainty. Clock synchronisation is crucial for detecting multi-step attack scenarios which involve logs from multiple hosts. Issues involving time uncertainty have been largely neglected by intrusion detection research. The system presented in this research introduces two techniques for addressing time uncertainty issues: clock skew compensation and clock drift modelling using linear regression. An off-line IDS prototype for detecting multi-step attacks has been implemented. The prototype comprises two modules: implementation of the abstract event system architecture (AESA) and of the scenario detection module. The scenario detection module implements our signature language developed based on the Python programming language syntax and the unification-based scenario detection engine. The prototype has been evaluated using a publicly available dataset of real attack traffic and event logs and a synthetic dataset. The distinct features of the public dataset are the fact that it contains multi-step attacks which involve multiple hosts with clock skew and clock drift. These features allow us to demonstrate the application and the advantages of the contributions of this research. All instances of multi-step attacks in the dataset have been correctly identified even though there exists a significant clock skew and drift in the dataset. Future work identified by this research would be to develop a refined unification algorithm suitable for processing streams of events to enable an on-line detection. In terms of time uncertainty, identified future work would be to develop mechanisms which allows automatic clock skew and clock drift identification and correction. The immediate application of the research presented in this thesis is the framework of an off-line IDS which processes events from heterogeneous sources using abstraction and which can detect multi-step attack scenarios which may involve time uncertainty.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In my work with secondary school students who have disengaged from mainstream classrooms, I have often been surprised at the ways they enthusiastically engage with the projects on offer. They have demonstrated that, in apparent contradiction of their classroom behaviour, they still maintain hope in achieving a positive outcome from education. In a long-running schools-university project employing a “students-as-researchers” approach to investigating educational disadvantage, “at-risk” students have produced high quality results. Naturally, I wanted to know what it was about this sort of pedagogy that seemed to work for them. In this chapter, then, I outline the project and discuss some reasons for disengagement. I then address the features of the project that the participants themselves have identified as being instrumental in their re-engagement with formal education. Finally, I consider how these features may be transposed to maintaining the educational engagement of at-risk students in mainstream classrooms.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There is no specific self-efficacy measure that has been developed primarily for problem drinkers seeking a moderation drinking goal. In this article, we report the factor structure of a 20-item Controlled Drinking Self-Efficacy Scale (CDSES; Sitharthan et al., 1996; Sitharthan et al., 1997). The results indicate that the CDSES is highly reliable, and the factor analysis using the full sample identified four factors: negative affect, positive mood/social context, frequency of drinking, and consumption quantity. A similar factor structure was obtained for the subsample of men. In contrast, only three factors emerged in the analysis of data on female participants. Compared to women, men had low self-efficacy to control their drinking in situations relating to positive mood/social context, and subjects with high alcohol dependence had low self-efficacy for situations relating to negative affect, social situations, and drinking less frequently. The CDSES can be a useful measure in treatment programs providing a moderation drinking goal.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

To allocate and size capacitors in a distribution system, an optimization algorithm, called Discrete Particle Swarm Optimization (DPSO), is employed in this paper. The objective is to minimize the transmission line loss cost plus capacitors cost. During the optimization procedure, the bus voltage, the feeder current and the reactive power flowing back to the source side should be maintained within standard levels. To validate the proposed method, the semi-urban distribution system that is connected to bus 2 of the Roy Billinton Test System (RBTS) is used. This 37-bus distribution system has 22 loads being located in the secondary side of a distribution substation (33/11 kV). Reducing the transmission line loss in a standard system, in which the transmission line loss consists of only about 6.6 percent of total power, the capabilities of the proposed technique are seen to be validated.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Although anxiety disorders are documented in the literature for new mothers (but less so for fathers), rates of postpartum caseness tend to include only those with depression when diagnostic interviews or self-report measures validated on such interviews are used. This methodology therefore underestimates the true percentage of women and men who experience significant psychological difficulties postpartum. This has implications for assessment, treatment and screening for postnatal mood disorders. Two studies were conducted on a total of 408 women and 356 men expecting their first child. They were recruited antenatally, and interviewed at 6 weeks postpartum using the Diagnostic Interview Schedule. DSM-IV criteria were applied to determine the presence since birth of depression (major or minor), panic disorder, acute adjustment disorder with anxiety (meeting the criteria for generalised anxiety disorder except for the duration criterion), and phobia. The inclusion of diagnostic assessment for panic disorder and acute adjustment disorder with anxiety increased the rates of caseness by between 57 and 100% for mothers, and 31-130% for fathers, over the rates for major or minor depression. Inclusion of assessment for phobia further increased the rates of disorder in both samples.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper reports on a comparative study of students and non-students that investigates which psycho-social factors influence intended donation behaviour within a single organisation that offers multiple forms of donation activity. Additionally, the study examines which media channels are more important to encourage donation. A self-administered survey instrumentwas used and a sample of 776 respondents recruited. Logistic regressions and a Chow test were used to determine statistically significant differences between the groups. For donatingmoney, importance of charity and attitude towards charity influence students, whereas only importance of need significantly influences non-students. For donating time, no significant influences were found for non-students, however, importance of charity and attitude towards charity were significant for students. Importance of need was significant for both students and non-students for donating goods, with importance of charity also significant for students. Telephone and television channels were important for both groups. However, Internet, email and short messaging services were more important for students, providing opportunities to enhance this group’s perceptions of the importance of the charity, and the importance of the need, which ultimately impacts on their attitudes towards the charity. These differences highlight the importance of charities focussing on those motivations and attitudes that are important to a particular target segment and communicating through appropriate media channels for these segments.