994 resultados para COMPUTER sex
Resumo:
Introduction and Aims. Alcohol expectancies are associated with drinking behaviour and post-drinking use thoughts, feelings and behaviours. The expectancies held by specific cultural or sub-cultural groups have rarely been investigated. This research maps expectancies specific to gay and other men who have sex with men (MSM) and their relationship with substance use. This study describes the specific development of a measure of such beliefs for alcohol, the Drinking Expectancy Questionnaire for Men who have Sex with Men (DEQ-MSM). Design and Methods. Items selected through a focus group and interviews were piloted on 220 self-identified gay or other MSM via an online questionnaire. Results. Factor analysis revealed three distinct substance reinforcement domains ('Cognitive impairment', 'Sexual activity' and 'Social and emotional facilitation'). These factors were associated with consumption patterns of alcohol, and in a crucial test of discriminant validity were not associated with the consumption of cannabis or stimulants. Similarities and differences with existing measures will also be discussed. Discussion and Conclusions. The DEQ-MSM represents a reliable and valid measure of outcome expectancies, related to alcohol use among MSM, and represents an important advance as no known existing alcohol expectancy measure, to date, has been developed and/or normed for use among this group. Future applications of the DEQ-MSM in health promotion, clinical settings and research may contribute to reducing harm associated with alcohol use among MSM, including the development of alcohol use among young gay men.
Resumo:
This workshop is a continuation and extension to the successful past workshops exploring the intersection of food, technology, place, and people, namely 2009 OZCHI workshop, Hungry 24/7? HCI Design for Sustainable Food Culture and Sustainable Interaction with Food, Technology, and the City [1] and 2010 CHI panel Making Food, Producing Sustainability [3]. The workshop aims to bring together experts from diverse backgrounds including academia, government, industry, and non-for-profit organisations. It specifically aims to create a space for discussion and design of innovative approaches to understanding and cultivating sustainable food practices via human-computer-interaction (HCI) as well as addressing the wider opportunities for the HCI community to engage with food as a key issue for sustainability The workshop addresses environmental, health, and social domains of sustainability in particular, by looking at various conceptual and design approaches in orchestrating sustainable interaction of people and food in and through dynamic techno-social networks.
Resumo:
-
Resumo:
It was reported that the manuscript of Crash was returned to the publisher with a note reading ‘The author is beyond psychiatric help’. Ballard took the lay diagnosis as proof of complete artistic success. Crash conflates the Freudian tropes of libido and thanatos, overlaying these onto the twentieth century erotic icon, the car. Beyond mere incompetent adolescent copulatory fumblings in the back seat of the parental sedan or the clichéd phallic locomotor of the mid-life Ferrari, Ballard engages the full potentialities of the automobile as the locus and sine qua non of a perverse, though functional erotic. ‘Autoeroticism’ is transformed into automotive, traumatic or surgical paraphilia, driving Helmut Newton’s insipid photo-essays of BDSM and orthopædics into an entirely new dimension, dancing precisely where (but more crucially, because) the ‘body is bruised to pleasure soul’. The serendipity of quotidian accidental collisions is supplanted, in pursuit of the fetishised object, by contrived (though not simulated) recreations of iconographic celebrity deaths. Penetration remains as a guiding trope of sexuality, but it is confounded by a perversity of focus. Such an obsessive pursuit of this autoerotic-as-reality necessitates the rejection of the law of human sexual regulation, requiring the re-interpretation of what constitutes sex itself by looking beyond or through conventional sexuality into Ballard’s paraphiliac and nightmarish consensual Other. This Other allows for (if not demands) the tangled wreckage of a sportscar to function as a transformative sexual agent, creating, of woman, a being of ‘free and perverse sexuality, releasing within its dying chromium and leaking engine-parts, all the deviant possibilities of her sex’.
Resumo:
Students struggle with learning to program. In recent years, not only has there been a dramatic drop in the number of students enrolling in IT and Computer Science courses, but attrition from these courses continues to be significant. Introductory programming subjects traditionally have high failure rates and as they tend to be core to IT and Computer Science courses can be a road block for many students to their university studies. Is programming really that difficult — or are there other barriers to learning that have a serious and detrimental effect on student progression? In-class experiments were conducted in introductory programming units to confirm our hypothesis that that pair-programming would benefit students' learning to program. We investigated the social and cultural barriers to learning programming by questioning students' perceptions of confidence, difficulty and enjoyment of programming. The results of paired and non-paired students were compared to determine the effect of pair-programming on learning outcomes. Both the empirical and anecdotal results of our experiments strongly supported our hypothesis.
Resumo:
Scientific visualisations such as computer-based animations and simulations are increasingly a feature of high school science instruction. Visualisations are adopted enthusiastically by teachers and embraced by students, and there is good evidence that they are popular and well received. There is limited evidence, however, of how effective they are in enabling students to learn key scientific concepts. This paper reports the results of a quantitative study conducted in Australian physics and chemistry classrooms. In general there was no statistically significant difference between teaching with and without visualisations, however there were intriguing differences around student sex and academic ability.
Resumo:
Visual modes of representation have always been very important in science and science education. Interactive computer-based animations and simulations offer new visual resources for chemistry education. Many studies have shown that students enjoy learning with visualisations but few have explored how learning outcomes compare when teaching with or without visualisations. This study employs a quasi-experimental crossover research design and quantitative methods to measure the educational effectiveness - defined as level of conceptual development on the part of students - of using computer-based scientific visualisations versus teaching without visualisations in teaching chemistry. In addition to finding that teaching with visualisations offered outcomes that were not significantly different from teaching without visualisations, the study also explored differences in outcomes for male and female students, students with different learning styles (visual, aural, kinesthetic) and students of differing levels of academic ability.
Resumo:
BACKGROUND:Chlamydia trachomatis is a major cause of sexually transmitted disease in humans. Previous studies in both humans and animal models of chlamydial genital tract infection have suggested that the hormonal status of the genital tract epithelium at the time of exposure can influence the outcome of the chlamydial infection. We performed a whole genome transcriptional profiling study of C. trachomatis infection in ECC-1 cells under progesterone or estradiol treatment.RESULTS:Both hormone treatments caused a significant shift in the sub-set of genes expressed (25% of the transcriptome altered by more than 2-fold). Overall, estradiol treatment resulted in the down-regulation of 151 genes, including those associated with lipid and nucleotide metabolism. Of particular interest was the up-regulation in estradiol-supplemented cultures of six genes (omcB, trpB, cydA, cydB, pyk and yggV), which suggest a stress response similar to that reported previously in other models of chlamydial persistence. We also observed morphological changes consistent with a persistence response. By comparison, progesterone supplementation resulted in a general up-regulation of an energy utilising response.CONCLUSION:Our data shows for the first time, that the treatment of chlamydial host cells with key reproductive hormones such as progesterone and estradiol, results in significantly altered chlamydial gene expression profiles. It is likely that these chlamydial expression patterns are survival responses, evolved by the pathogen to enable it to overcome the host's innate immune response. The induction of chlamydial persistence is probably a key component of this survival response.
Resumo:
Significant research has demonstrated direct and indirect associations between substance use and sexual behaviour. Substance use is related to sexual risk-taking and HIV seroconversion among some substance-using MSM. It remains unclear what factors mediate or underlie this relationship, and which substances are associated with greater harm. Substance-related expectancies are hypothesised as potential mechanisms. A conceptual model based on social-cognitive theory was tested, which explores the role of demographic factors, substance use, substance-related expectancies and novelty-seeking personality characteristics in predicting unprotected anal intercourse (UAI) while under the influence, across four commonly used substance types. Phase 1, a qualitative study (N = 20), explored how MSM perceive the effects of substance use on their thoughts, feelings and behaviours, including sexual behaviours. Information was attained through discussion and interviews, resulting in the establishment of key themes. Results indicated MSM experience a wide range of reinforcing aspects associated with substance use. General and specific effects were evident across substance types, and were associated with sexual behaviour and sexual risk-taking. Phase 2 consisted of developing a comprehensive profile of substance-related expectancies for MSM (SEP-MSM) regarding alcohol, cannabis, amyl nitrite and stimulants that possessed sound psychometric properties and was appropriate for use among this group. A cross-sectional questionnaire with 249 participants recruited through gay community networks was used to validate these measures, and involved online data collection, participants rating expectancy items and subsequent factor analysis. Results indicated expectancies can be reliably assessed, and predicted substance use patterns. Phase 3 examined demographic factors, substance use, substance-related expectancies, and novelty-seeking traits among another community sample of MSM (N = 277) throughout Australia, in predicting UAI while under the influence. Using a cross-sectional design, participants were recruited through gay community networks and completed online questionnaires. The SEP-MSM, and associated substance use, predicted UAI. This research extends social-cognitive theory regarding sexual behaviour, and advances understanding of the role of expectancies associated with substance use and sexual risk-taking. Future applications of the SEP-MSM in health promotion, prevention, clinical interventions and research are likely to contribute to reducing harm associated with substance-using MSM (e.g., HIV transmission).
Resumo:
In its earliest and simplest form queer theory proposes that sexual identity is not essential, but socially constructed, and understandings of identity, gender and sexuality are constructed differently at different times and in different places. Queer theory aims to challenge normative understandings of sex, sexuality and gender, and also normative concepts of knowledge and being. Since its inception, queer theory has been taken up by a number of disciplines as an analytical framework. These include cultural geography, education studies, film studies and sociology. In the last decade queer theory has been used to consider citizenship, diasporas and post colonial experiences. A queer theoretical perspective has also been used to analyse emotions, the Death Drive, phenomenology, and disability. As queer theory enters its third decade Janet Halley and Andrew Parker ask what is after sex? ‘What has queer theory become now that it has a past?’
Resumo:
Over the last few decades, there has been a marked increase in media and debate surrounding a specific group of offences in modern Democratic nations which bear the brunt of the label ‘crimes against morality’. Included within this group are offences related to prostitution and pornography, homosexuality and incest and child sexual abuse. This book examines the nexus between sex, crime and morality from a theoretical perspective. This is the first academic text to offer an examination and analysis of the philosophical underpinnings of sex-related crimes and social attitudes towards them and the historical, anthropological and moral reasons for differentiating these crimes in contemporary western culture. The book is divided into three sections corresponding to three theoretical frameworks: - Part 1 examines the moral temporality of sex and taboo as a foundation for legislation governing sex crimes - Part 2 focuses on the geography of sex and deviance, specifically notions of public morality and the public private divide - Part 3 examines the moral economy of sex and harm, including the social construction of harm. Sex, Crime and Morality will be key reading for students of criminology, criminal justice, gender studies and ethics, and will also be of interest to justice professionals.
Resumo:
Internet and computer addiction has been a popular research area since the 90s. Studies on Internet and computer addiction have usually been conducted in the US, and the investigation of computer and Internet addiction at different countries is an interesting area of research. This study investigates computer and Internet addiction among teenagers and Internet cafe visitors in Turkey. We applied a survey to 983 visitors in the Internet cafes. The results show that the Internet cafe visitors are usually teenagers, mostly middle and high-school students and usually are busy with computer and Internet applications like chat, e-mail, browsing and games. The teenagers come to the Internet cafe to spend time with friends and the computers. In addition, about 30% of cafe visitors admit to having an Internet addiction, and about 20% specifically mention the problems that they are having with the Internet. It is rather alarming to consider the types of activities that the teenagers are performing in an Internet cafe, their reasons for being there, the percentage of self-awareness about Internet addiction, and the lack of control of applications in the cafe.
Resumo:
Earlier research found evidence for electro-cortical race bias towards black target faces in white American participants irrespective of the task relevance of race. The present study investigated whether an implicit race bias generalizes across cultural contexts and racial in- and out-groups. An Australian sample of 56 Chinese and Caucasian males and females completed four oddball tasks that required sex judgements for pictures of male and female Chinese and Caucasian posers. The nature of the background (across task) and of the deviant stimuli (within task) was fully counterbalanced. Event-related potentials (ERPs) to deviant stimuli recorded from three midline sites were quantified in terms of mean amplitude for four components: N1, P2, N2 and a late positive complex (LPC; 350–700 ms). Deviants that differed from the backgrounds in sex or race elicited enhanced LPC activity. These differences were not modulated by participant race or sex. The current results replicate earlier reports of effects of poser race relative to background race on the LPC component of the ERP waveform. In addition, they indicate that an implicit race bias occurs regardless of participant's or poser's race and is not confined to a particular cultural context.
Resumo:
Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a program’s object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or program’s security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tool’s capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.
Resumo:
At St Thomas' Hospital, we have developed a computer program on a Titan graphics supercomputer to plan the stereotactic implantation of iodine-125 seeds for the palliative treatment of recurrent malignant gliomas. Use of the Gill-Thomas-Cosman relocatable frame allows planning and surgery to be carried out at different hospitals on different days. Stereotactic computed tomography (CT) and positron emission tomography (PET) scans are performed and the images transferred to the planning computer. The head, tumour and frame fiducials are outlined on the relevant images, and a three-dimensional model generated. Structures which could interfere with the surgery or radiotherapy, such as major vessels, shunt tubing etc., can also be outlined and included in the display. Catheter target and entry points are set using a three-dimensional cursor controlled by a set of dials attached to the computer. The program calculates and displays the radiation dose distribution within the target volume for various catheter and seed arrangements. The CT co-ordinates of the fiducial rods are used to convert catheter co-ordinates from CT space to frame space and to calculate the catheter insertion angles and depths. The surgically implanted catheters are after-loaded the next day and the seeds left in place for between 4 and 6 days, giving a nominal dose of 50 Gy to the edge of the target volume. 25 patients have been treated so far.