209 resultados para Anonymity


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background: Whilst negative responses to traumatic injury have been well documented in the literature, there is a small but growing body of work that identifies posttraumatic growth as a salient feature of this experience. We contribute to this discourse by reporting on the experiences of 13 individuals who were traumatically injured, had undergone extensive rehabilitation and were discharged from formal care. All participants were injured through involvement in a motor vehicle accident, with the exception of one, who was injured through falling off the roof of a house.
Methods: In this qualitative study, we used an audio-taped in-depth interview with each participant as the means of data collection. Interviews were transcribed verbatim and analysed thematically to determine the participants' unique perspectives on the experience of recovery from traumatic injury. In reporting the findings, all participants' were given a pseudonym to assure their anonymity.
Results: Most participants indicated that their involvement in a traumatic occurrence was a springboard for growth that enabled them to develop new perspectives on life and living.
Conclusion: There are a number of contributions that health providers may make to the recovery of individuals who have been traumatically injured to assist them to develop new views of vulnerability and strength, make changes in relationships, and facilitate philosophical, physical and
spiritual growth.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper addresses the role of security in the collaborative e-learning environment, and in particular, the social aspects of security and the importance of identity. It represents a case study, completed in Nov 2004, which was conducted to test the sense of security that students experienced whilst using the wiki platform as a means of online collaboration in the tertiary education environment. Wikis, fully editable Web sites, are easily accessible, require no software and allow its contributors (in this case students) to feel a sense of responsibility and ownership. A comparison between two wiki studies will be made whereby one group employed user login and the other maintained anonymity throughout the course of the study. The results consider the democratic participation and evolution of the work requirements over time, which in fact ascertains the nonvalidity of administrative identification.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aims and objectives. The aim of the current study was to explore and describe the strategies young women with Type 1 diabetes used to manage transitions in their lives. This paper will describe one aspect of the findings of how women with Type 1 diabetes used the Internet to interact with other people with diabetes and create stability in their lives.

Background. Individuals living with diabetes develop a range of different strategies to create stability in their lives and enhance their well-being. Changing social and emotional conditions during life transitions have a major impact on diabetes management. Although the literature indicates that strategies enabling the individuals to cope with transitions are important, they remain under-researched.

Design. Using grounded theory, interviews were conducted with 20 women with Type 1 diabetes. Constant comparative data analysis was used to analyse the data and develop an understanding of how young women with Type 1 diabetes used the Internet to create stability in their lives.

Findings. The findings revealed that the women valued their autonomy and being in control of when and to whom they reveal their diabetic status, especially during life transitions and at times of uncertainty. However, during these times they also required health and social information and interacting with other people. One of the women's main strategies in managing transitions was to use Internet chat lines as a way of obtaining information and communicating with others. This strategy gave women a sense of autonomy, enabled them to maintain their anonymity and interact with other people on their own terms.

Conclusions. Having meaningful personal interactions, social support and being able to connect with others were fundamental to the women's well being. Most importantly, preserving autonomy and anonymity during such interactions were integral to the way the women with Type 1 diabetes managed life transitions.

Relevance to clinical practice. Health professionals need to explore and incorporate Internet communication process or anonymous help lines into their practice as a way to assist people manage their diabetes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Electronic negotiation (e-negotiation) is a major activity in e-Commerce applications. Agent-based e-negotiation has recently received increasing attention. However, agent-based electronic negotiation suffers from a number of security attacks. In this paper, we present a mobile agent-based e-commerce framework. We also propose a security protocol that protects the information exchanged between the mobile agents during e- negotiations. We reason the correctness of the proposed security protocol in the presence of various security threats. The reasoning shows that the protocol maintains privacy, non- repudiation, authenticity, anonymity, and strong integrity of exchanged information.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Capstone courses are used extensively in teaching information technology to expose students to realistic, work-like situations, though in a controlled environment. The value of the experiences the student engages in, and the skills and knowledge they develop are not questioned, as they are accepted as a beneficial precursor to professional work. The pedagogical methods used to deliver capstone courses vary across academic programme, institution, country and culture. The research explores information technology students’ preferences for the delivery of capstone projects from three different pedagogical delivery approaches and suggests that students want a certain level of anonymity, but at the same time they want direction and assistance when they determine they require it. Emerging from the findings are several recommendations that developers of capstone
 projects and courses may wish to address.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article identifies the fragility of relationships and ethical practices in the context of global commercial relationships and reflects upon the centrality of human relationships in commerce. The connections between people in global business are underpinned by ethical actions and outcomes and influenced by the degree that information and communication technology are part of the commercial relationship. Issues of trust, privacy, sharing, communication, security, anonymity, and learning emerge as relevant. This analysis positions relational ethics into the field of commerce, exposes the critical issues, and makes recommendations for ways to work with and further develop the link between commerce and relational ethics at the global level, especially in the light of developing technologies and the growth of e-commerce.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This portfolio addresses the moral, ethical and legal issues that impact upon decisions to maintain or disclose confidential communications. The tensions and moral dilemmas that are created when a conflict between these aspects arises are considered. Risk assessment procedures that inform decisions to maintain or disclose confidential information are discussed, as are issues related to the practical implementation of planned interventions. The topic is addressed by firstly reviewing professional codes of conduct and legal requirements to maintain confidentiality. The limits of confidentiality and privileged communication are then reviewed together with legal requirements of “duty to warn” or “duty of care”. These requirements are then related to risk assessment procedures and relevant interventions. Four case studies that illustrate the practical application of assessment techniques in the decision process and planned interventions are presented. They cover such diverse topics as disclosure and suicidal intent, threat of harm to a third party, risk of transmission of the AIDS virus and “duty to warn” and maintenance of a minor’s confidential communications. The ways in which these issues were addressed and the outcome is presented. NOTE: All names and details that have the potential to identify the people whose cases are presented here have been changed to protect their anonymity.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is an ethnographic investigation aimed at describing the lived experiences of Thai cancer patients residing in Cancer Hostel, a shelter provided for the needy whilst undergoing radiation treatment at Siam Hospital. All names, including the hospital, the shelter, and all respondents have been altered to preserve anonymity. The practice of withholding the true diagnosis from Thai patients meant that very little was known about their own feelings on cancer and its treatment. That, coupled with entrenched medical practice beliefs, presented an unusual challenge, for which an ethnographic research method was advocated as being most appropriate in helping toward a better understanding of the problem and resolving the existing dilemma. To understand the real experiences of Thai cancer patients, it was extremely important that the researcher get as near as possible to becoming one of them. Therefore, by physically 'being with’, establishing rapport, and gaining patients trust, the researcher was assured of acceptance as an insider, and was thus allowed to share the experiences of their life encounters. Research findings graphically illustrated the flaws in the practice of protecting patients from their diagnosis, who almost universally, wanted to know more about their diagnosis in order to seek help from the medical care system. Towards this, patients created meaning by linking folk beliefs, culturally inherited knowledge and a common sense, albeit naive approach in trying to make sense of their illness and treatment. Although patients saw cancer illness and its treatment, especially radiotherapy, as life threatening, it was the fear of radiation treatment, not cancer illness which turned patients away from medical treatment. As well, uncertainty, fear and frustration through the lack of information and involvement in their treatment saw patients employ strategies of both reciprocal and fatalistic acceptance; stoic resistance; and thinking positively in their efforts at coping with those life threatening situations.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This thesis is an ethnographic investigation of a Catholic Brothers school, Christian Brothers College (C.B.C.), in the provincial city of Newburyport, Australia* The study explores the traditions and historical purposes of education at the independent, religious school, and examines the manner in which these have changed or are changing. All names, including the name of the school and the city, have been altered to preserve anonymity. The opening section discusses the emergence of the theoretical problem of the dialectic of change and continuity in the ongoing activity of C.B.C. actors. This is followed by an argument that an understanding of such activity requires an ethnographic perspective. Such a perspective, however, must not overlook the organisational and structural constraints within which participants operate. Hence, a critical ethnography, which takes account of both the agency of human actors and the structures which influence their activity, is advocated as the most suitable approach for understanding continuity and change within a complex organisation in its social context. This argument is followed by an ethnographic account of Christian Brothers College, which focuses on the perceptions and activities of teachers and administrators, Individual chapters deal with the Christian Brothers Order and its educational mission at C.B.C.; the nature of religious education at the school; the administration of the school; approaches to control and discipline; the curriculum and evaluation of pupils; and the relationship between C.B.C. and the wider Newburyport community. The concluding section integrates an analysis of continuity and change at C.B.C. with a discussion of theoretical perspectives on reproduction and transformation. The thesis concludes that, although change has occurred in many ways, an institutionalised image of C.B.C. as 'Brothers’ school'persists and impedes the formation of more democratic authority relations, curriculum, and evaluation. The potential for such change, however, is seen most strongly in the ongoing reform of religious education.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Nearly eighteen years ago when I first became interested in the history and sociology of Australian immigration, I was particularly attracted by the fact and opportunity to incorporate immigration settlement, experience and accomplishments in my history teaching in secondary school. In particular it was the area of the settlement of Australia that needed a fuller understanding in the teaching of Australian history. By that I mean it was needed to show that there were many other ethnic groups besides the Anglo-Saxon group which had participated in the development of Australia since 1788. Since the end of World War II, the Australian population has doubled, the population structure and characteristics have changed and knowledge about the diverse groups forming the Australian nation is now sought. Sane ethnic groups, mainly the numerically large, have been studied and numerous reports are available. But many of the smaller groups have attracted little interest among Australian scholars. This was one of the reasons that I decided to research the behaviour of one of the smaller groups - the Czechs - to find out about their immigration history to Australia; their immigration processes such as re-settlement and re-establishment; and their community life since World War II. Because of the scarcity of written materials on Czechs in Australia, I had to rely on interviews, personal reminiscenses, letters and documents translated from the Czech language. I should like to express my gratitude to all people and officials of Czech ethnic organisations and clubs in Australia, who agreed to be interviewed and who provided me with documentary material so important for my work. Respecting the wishes of my interviewees their anonymity had to be preserved. In the course of my research, I have received substantial help and the encouragement from the Editor of the now extinct Czech language paper Newspaper Hlas domova, Mr. F.V., whose co-operation is gratefully recognised. I am also grateful to Associate Professor William D. Rubinstein for his help and encouragement in all stages of my work. The introductory part of the study is covered in Chapter One. She reasons for the need to increase Australia's population after World War II and an analysis of the development of settlement in Australia between 1947 and 1984 are discussed. The emigration of Czechs into Australia and their place in the post-war immigration scheme is introduced. To obtain an overview of how Czechs have emigrated around the world, the literature describing their settlement is compared. Also discussed in the literature on Czech settlement in Australia from an historical point of view. The studies on the concept of ethnicity and settlement in Australia are used to document the theoretical issues for an understanding of Australian society. This chapter also contains aspects of sources and research, shewing the processes of documentary research, interviews and related matters. In Chapter Two the history of Czech emigration is discussed, covering the period from the seventeenth to the twentieth century. The first contacts with Australia are highlighted, continuing into the inter-war period and finally the re-settlement of Czechs after World War II. To understand why Czechs left their ancestral country after World War II, the political situation in Czechoslovakia is analysed. The third chapter concentrates mainly in the 1948 wave of settlers, who left Czechoslovakia after the communist take-over in 1948. Their means of departure from their homeland, selection of Australia as a new homeland and their re-settlement and re-establishment are discussed. Their attitudes after their arrival and their later stages of their settlement are analysed. The formation of numerous Czech ethnic organisations which mushroomed between 1950 and 1954 led to an active community life which began to change about five years after their arrival. These charges led to disorganisation of Czech community's life. The causes of these changes which were influential for the failure of the 1948 group to establish a viable community in Australia are analysed. In Chapter Four the wave of 1968 is viewed, their arrival and settling is covered. The study of their group attitudes and formation of group institutions is the main part of this section. A comparison of my data of the two waves, 1948 and 1968, reveals the information that these two groups did not develop the harmonious relationship expected of them as members of the one ethnic group. Chapter Five discusses immigration typologies and concentrates on the differences between legal and illegal emigrants from the Czechoslovak point of view. The integration processes of Czechs and their incorporation into Australian society are discussed. The sixth chapter sums up the findings of this disertation and states the influences which were responsible for the divisions in Czech ethnic life in Australia in the 1980s.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The professional component of this thesis focuses on how deinstitutionalisation and the current public mental health system have affected individuals with schizophrenia. Chapter one discusses the process of deinstitutionalisation and the research that has examined the impact of this initiative. Chapter two concentrates on schizophrenia, specifically the symptoms, course, etiological theories and treatments of this illness. Four case studies are then provided in order to explore how deinstitutionalisation and the current mental health system have affected individuals with schizophrenia. The names and identifying characteristics of these clients and their families have been modified to ensure anonymity. Chapter three describes a 47 year old woman, AA, who was referred for a neuro-psychological assessment. Chapter four outlines the second case study, a 23 year old male, BB, who was referred for a psychological assessment regarding diagnosis and treatment recommendations. Chapter five describes the third case study, a 54 year old woman, CC, who was referred for therapy and consultation regarding future treatment recommendations. Chapter six discusses the fourth case study, a 21 year old male, DD, who was seen for crisis intervention and treated in the community. Each of these case studies outlines the background history, formulation and treatment approaches. These case reports are used to illustrate how deinstitutionalisation and the present public mental health system affect individuals with schizophrenia. Chapter seven provides an overall discussion and conclusion to these case studies.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Electronic networking ('computer-mediated communication1), considered to be ‘unique domain for educational activity’ (Harasim, 1989:50) and ‘new educational paradigm’ (Mason & Kaye, 1989:23), has been widely used and researched in K-12 schooling, place-based undergraduate subjects and distance education courses. However, only a limited number of reports of usage with experienced teachers (professional development), beginning teachers (induction support) and trainee teachers (initial training) have been published. Hence, little is known about the ways in which this new medium might contribute to the acquisition and maintenance of professional knowledge in the field of teacher education. The purpose of this study was to document an application of electronic networking in an initial 'school-based1 teacher education course. Three factors which were considered to be important in the adoption of electronic networking were specifically addressed: (a) the potential of the medium to attract and maintain a representative and comprehensive audience', (b) the willingness of participants to use the medium for the notation of ideas about teaching; and, (c) the extent to which reflection on practice was evident in network messages. This study also identified and investigated other effects which emerged as participants attempted to negotiate personal relationships with new technology. A case study was selected to investigate audience, notation, reflection, and other effects, in a particular application. Data were collected using participant observation, software-generated statistics, printed documentation, university records, questionnaires, interviews and content analysis of messages. These data were used to describe and analyse network participation by trainee teachers, classroom teachers and university staff. The data revealed that an audience did exist on the electronic network but that this was not comprehensive. Teachers had difficulty accessing the network because of other school commitments, access to equipment and personal competence with microcomputers. These difficulties indicated that developing and maintaining the teacher audience may be a major problem with electronic networking in initial teacher education. This case study revealed that deeply held concerns about notation of ideas by trainee teachers and classroom teachers can be powerful reasons for limited network participation. For trainee teachers, recording ideas publicly presented special difficulties associated with written communication. They were concerned about writing for an audience; about what to write about and how to write it. The loss of visual and verbal cues which form part of face-to-face communication was also a problem leading to concerns about how messages would be received by others. However, the overwhelming concern of almost all trainee teachers about presenting their own ideas was Tear of criticism' from peers (in particular), and other participants on the network. Trainee teachers expressed concerns about the 'dangers' of putting their thoughts in writing, the scrutiny their messages might have received from others, and the public 'criticism' about what they wrote which might have appeared on the network. Knowing that messages were stored on the network, and could be retrieved at some later date, heightened anxiety about the vulnerability of written communication; what was written on one occasion may have to be defended at some later date when the views expressed initially were no longer held. Classroom teachers were also unsure about recording their own ideas in an electronic form. Like trainee teachers, they were concerned about the scrutiny their contributions might receive from other users, and the lack of visual and verbal cues which they had learnt to use in face-to-face communication. Notating ideas in text-based messages which were archived (by the software), and retrievable by others later, was also daunting to many teachers. Another major 'danger' for teachers was the possible repercussions of 'public comment' about curriculum policy and initiatives which they thought might get them into 'trouble' with their employer. Since very few messages were contributed to conferences, there was little evidence of reflection in network communication. In the main, the network was not used to share information and ideas about curriculum and teaching. Public examples of collaboration between participants were not evident, and the 'special knowledge' held by members in each distinct group of users was not elaborated and discussed. Messages were not used to request information or clarification about issues, to outline the processes by which decisions about teaching were reached, or to synthesis ideas from different sources. The potential of the medium to operationalise reflective practice was not realised. Among the effects observed, the use of an anonymous account to access the network, and the impact this had on participation (in one conference) was considered to be a particularly significant finding. While the opportunity to systematically investigate the effects of anonymity on network participation and message contributions was not realised (by the author) while the research was in progress, the effects observed and discussed are considered to be important and worthy of further investigation. In this case study, the anonymous account helped trainee teachers mask concerns about personal writing skills and fear of criticism from others, indicating that anonymity may alter communication patterns, particularly in the early stages of network use. Given the data collected in this case study, and the interpretations placed on it by the author, a pessimistic assessment of the place of electronic networking in initial teacher education courses was presented. For this situation to change - that is, for electronic discussions to become more fully integrated into course activities - four issues which need to be addressed were identified and discussed. These included clarification of the role of collaboration amongst participants in initial teacher education, the ways in which collaboration can be facilitated using electronic networking, the problems of notation - such as the difficulty of expressing ideas about teaching in written form, and the concerns about permanently archived messages - for teachers and trainee teachers, and the lack of skills which many trainee teachers bring to electronic discussions. In the context of initial teacher education, it was suggested that these four aspects require clarification and development before the potential advantages of electronic networking can be realised. Some specific suggestions about how these issues might be resolved were presented.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Early Childhood Educators have an important role to fulfil in aiding children's development and understandings in the science curriculum. There are many different views and opinions on how science can be taught in an Early Childhood environment, it is therefore our aim to investigate how teachers feel about teaching science concepts and promoting science in the early childhood centre. We aim to discover how everyday activities relate to the nature of science within our everyday lives. The science curriculum is important in Early Childhood settings as it provides children with various opportunities to explore the natural world. We are hoping to gain a deeper understanding of how teachers are guiding and encouraging children to make sense of their experiences. It is also important that we explore how Early Childhood Educators understand their own practice in teaching science concepts in their curriculum.

Description of project: We will be completing a small inquiry based task which will require us to compile data collected from interviews, recordings from teachers in long day and kindergarten settings around the Geelong region.

Methodology: ln order to undertake this research we will be using a socio cultural framework, focusing on language in the social environment and play (basing our ideas on the theories of Vygotsky). We will be undertaking narrative accounts to obtain data which will be collated from three different sources.

Ethical implications of projects: We do not foresee any significant risks to any participant in this study. The topic of the research is uncontroversial, and we will be taking measures to ensure anonymity or confidentiality where appropriate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Anonymous web browsing is an emerging hot topic with many potential applications for privacy and security. However, research on low latency anonymous communication, such as web browsing, is quite limited; one reason is the intolerable delay caused by the current dominant dummy packet padding strategy, as a result, it is hard to satisfy perfect anonymity and limited delay at the same time for web browsing. In this paper, we extend our previous proposal on using prefetched web pages as cover traffic to obtain perfect anonymity for anonymous web browsing, we further explore different aspects in this direction. Based on Shannon’s perfect secrecy theory, we formally established a mathematical model for the problem, and defined a metric to measure the cost of achieving perfect anonymity. The experiments on a real world data set demonstrated that the proposed strategy can reduce delay more than ten times compared to the dummy packet padding methods, which confirmed the vast potentials of the proposed strategy.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The majority of current anonymous systems focus on improving anonymity at the network and website level in order to defend against traffic analysis attacks. However, the vulnerability of the connections between end users and the anonymous network do not attract any attention yet. For the first time, we reveal an end user browsing dynamics based attack on anonymous browsing systems at the LAN where the victim locates. This new attack method is fundamentally different from existing attack methodologies. In general, web surfers browse the web following certain patterns, such as requesting a web page, viewing it and requesting another page. The browsing pattern of a victim can be clearly observed by a local adversary when the victim is viewing the web without protection. Unfortunately, browsing dynamics releases rich information for attacking even though the web page content is encrypted. In order to show how a local eavesdropper can decipher which pages have been viewed with the knowledge of user browsing dynamics and the public information of a given website, we established a specific hidden Markov model to represent browsing dynamics for the website. By using this model, we can then identify the optimal of the accessed pages using the Viterbi algorithm. In order to confirm the effectiveness of the revealed attack method, we have conducted extensive experiments on a real data set. The results demonstrated that the attack accuracy can be more than 80%. A few possible counter-attack strategies are discussed at the end of the paper.