986 resultados para Threats


Relevância:

20.00% 20.00%

Publicador:

Resumo:

We consider the problem of designing a surveillance system to detect a broad range of invasive species across a heterogeneous sampling frame. We present a model to detect a range of invertebrate invasives whilst addressing the challenges of multiple data sources, stratifying for differential risk, managing labour costs and providing sufficient power of detection.We determine the number of detection devices required and their allocation across the landscape within limiting resource constraints. The resulting plan will lead to reduced financial and ecological costs and an optimal surveillance system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While it is generally accepted in the learning and teaching literature that assessment is the single biggest influence on how students approach their learning, assessment methods within higher education are generally conservative and inflexible. Constrained by policy and accreditation requirements and the need for the explicit articulation of assessment standards for public accountability purposes, assessment tasks can fail to engage students or reflect the tasks students will face in the world of practice. Innovative assessment design can simultaneously deliver program objectives and active learning through a knowledge transfer process which increases student participation. This social constructivist view highlights that acquiring an understanding of assessment processes, criteria and standards needs active student participation. Within this context, a peer-assessed, weekly, assessment task was introduced in the first “serious” accounting subject offered as part of an undergraduate degree. The positive outcomes of this assessment innovation was that student failure rates declined 15%, tutorial participation increased fourfold, tutorial engagement increased six-fold and there was a 100% approval rating for the retention of the assessment task. In contributing to the core conference theme of “seismic” shifts within higher education, in stark contrast to the positive student response, staff-related issues of assessment conservatism and the necessity of meeting increasing research commitments, threatened the assessment task’s survival. These opposing forces to change have the potential to weaken the ability of higher education assessment arrangements to adequately serve either a new generation of students or the sector's community stakeholders.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While it is generally accepted in the learning and teaching literature that assessment is the single biggest influence on how students approach their learning, assessment methods within higher education are generally conservative and inflexible. Constrained by policy and accreditation requirements and the need for the explicit articulation of assessment standards for public accountability purposes, assessment tasks can fail to engage students or reflect the tasks students will face in the world of practice. Innovative assessment design can simultaneously deliver program objectives and active learning through a knowledge transfer process which increases student participation. This social constructivist view highlights that acquiring an understanding of assessment processes, criteria and standards needs active student participation. Within this context, a peer-assessed, weekly, assessment task was introduced in the first “serious” accounting subject offered as part of an undergraduate degree. The positive outcomes of this assessment innovation was that student failure rates declined 15%, tutorial participation increased fourfold, tutorial engagement increased six-fold and there was a 100% approval rating for the retention of the assessment task. In contributing to the core conference theme of “seismic” shifts within higher education, in stark contrast to the positive student response, staff-related issues of assessment conservatism and the necessity of meeting increasing research commitments, threatened the assessment task’s survival. These opposing forces to change have the potential to weaken the ability of higher education assessment arrangements to adequately serve either a new generation of students or the sector's community stakeholders.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Facial cues of racial outgroup or anger mediate fear learning that is resistant to extinction. Whether this resistance is potentiated if fear is conditioned to angry, other race faces has not been established. Two groups of Caucasian participants were conditioned with two happy and two angry face conditional stimuli (CSs). During acquisition, one happy and one angry face were paired with an aversive unconditional stimulus whereas the second happy and angry faces were presented alone. CS face race (Caucasian, African American) was varied between groups. During habituation, electrodermal responses were larger to angry faces regardless of race and declined less to other race faces. Extinction was immediate for Caucasian happy faces, delayed for angry faces regardless of race, and slowest for happy racial outgroup faces. Combining the facial cues of other race and anger does not enhance resistance to extinction of fear.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines the fast moving debate on the law and policy surrounding shareholder voting on their companies’ remuneration report, at the AGM. Recently, Australia has moved from the ‘non-binding’ vote provided to shareholders, to the more prescriptive ‘two strikes rule’; that is, two negative shareholder resolutions after 1 July 2011 may result in a board re-election. While much commentary has focused on the potential threats— impacts on remuneration reports and the potential costs to the company — we discuss another potential consequence: an opportunity for board recruitment. At a time when companies are also expected to comment on their diversity policies, planning for a threatened ‘spill’ creates an opportunity for board composition planning and succession. The arguments presented are also placed in the context of the UK debate, where recent proposals advocate for wider stakeholder engagement and diversity in remuneration planning.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper proposes new techniques for aircraft shape estimation, passive ranging, and shape-adaptive hidden Markov model filtering which are suitable for a monocular vision-based non-cooperative collision avoidance system. Vision-based passive ranging is an important missing technology that could play a significant role in resolving the sense-and-avoid problem in un-manned aerial vehicles (UAVs); a barrier hindering the wider adoption of UAVs for civilian applications. The feasibility of the pro- posed shape estimation, passive ranging and shape-adaptive filtering techniques is evaluated on flight test data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article is based on Final Report: The Effects of Plant Closing or Threat of Plant Closing on the Right of Workers to Organize. The report was commissioned by the tri-national Labor Secretariat of the Commission for Labor Cooperation (the NAFTA labor commission) "on the effects of the sudden closing of the plant on the principle of freedom of association and the right of workers to organize in the three countries."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article examines the development of a specific gendered discourse in the United States in the first half of the twentieth century that united key beliefs about feminine beauty, identity, and the domestic interior with particular electric lighting technologies and effects. Largely driven by the electrical industry’s marketing rhetoric, American women were encouraged to adopt electric lighting as a beauty aid and ally in a host of domestic tasks. Drawing evidence from a number of primary texts, including women’s magazines, lighting and electrical industry trade journals, manufacturer-generated marketing materials, and popular home decoration and beauty advice literature, this study shifts the focus away from lighting as a basic utility, demonstrating the ways in which modern electric illumination was culturally constructed as a desirable personal and environmental beautifier as well as a means of harmonizing the domestic interior.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective: We aimed to assess the impact of task demands and individual characteristics on threat detection in baggage screeners. Background: Airport security staff work under time constraints to ensure optimal threat detection. Understanding the impact of individual characteristics and task demands on performance is vital to ensure accurate threat detection. Method: We examined threat detection in baggage screeners as a function of event rate (i.e., number of bags per minute) and time on task across 4 months. We measured performance in terms of the accuracy of detection of Fictitious Threat Items (FTIs) randomly superimposed on X-ray images of real passenger bags. Results: Analyses of the percentage of correct FTI identifications (hits) show that longer shifts with high baggage throughput result in worse threat detection. Importantly, these significant performance decrements emerge within the first 10 min of these busy screening shifts only. Conclusion: Longer shift lengths, especially when combined with high baggage throughput, increase the likelihood that threats go undetected. Application: Shorter shift rotations, although perhaps difficult to implement during busy screening periods, would ensure more consistently high vigilance in baggage screeners and, therefore, optimal threat detection and passenger safety.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While the majority of violent threats – defined as an expression of intent to do harm or act out violently against someone or something – do not progress to actual violence, a small proportion of threateners do go on to enact violence. Most researchers argue that violence risk assessments are inadequate for assessing threats of violence, which raises the question: how should a threat assessment (TA) be conducted? To begin to understand available frameworks for assessing threats, a systematic review of TA research literature was conducted. Most TA literature pertains to a specific domain (schools, public figure threats, workplaces) and target audience (clinicians, school personnel, law enforcement). TA guidelines are typically based on literature reviews with some based on empirical measures and others having no strong evidential basis. The most common concepts in TA are exploration of the threatener's mental health, the motivation for the threat and the presence of any plans. Rather than advocating for the development of a protocol for conducting TA, this article outlines the common areas of inquiry in assessing threats and highlights the limitations of current TA guidelines.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The shooting of a social worker by a client on the Gold Coast in 1991 graphically illustrated the issue of physical assaults and violence by service users against social workers. In this article we look at the incidence of physical assault, threats of violence, abuse of agency property and verbal abuse to social and other welfare workers by clients, using data from a survey in Melbourne. We then look at probable causes of menacing behaviour, such as issues involved in work with involuntary clients' and we discuss options for preventing and coping with violence and abuse in the welfare work place.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Inter-enterprise collaboration has become essential for the success of enterprises. As competition increasingly takes place between supply chains and networks of enterprises, there is a strategic business need to participate in multiple collaborations simultaneously. Collaborations based on an open market of autonomous actors set special requirements for computing facilities supporting the setup and management of these business networks of enterprises. Currently, the safeguards against privacy threats in collaborations crossing organizational borders are both insufficient and incompatible to the open market. A broader understanding is needed of the architecture of defense structures, and privacy threats must be detected not only on the level of a private person or enterprise, but on the community and ecosystem levels as well. Control measures must be automated wherever possible in order to keep the cost and effort of collaboration management reasonable. This article contributes to the understanding of the modern inter-enterprise collaboration environment and privacy threats in it, and presents the automated control measures required to ensure that actors in inter-enterprise collaborations behave correctly to preserve privacy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this master´s thesis is to analyze how NATO Secretary General Anders Fogh Rasmussen is trying to justify the existence of the military alliance through the use of security arguments. I am puzzled by the question: why does NATO still exist – what is NATO’s raison d'être. The New Strategic Concept (2010) forms the base for his argumentation. This thesis focuses on the security argumentation of NATO which is examined by analyzing the speeches the Secretary General. The theoretical framework of this study is based on constructivist approach to international security examining the linguistic process of securitization. Issues become securitized after Anders Fogh Rasmussen names them as threats. This thesis focuses on the securitization process relating to NATO and analyses what issues Rasmussen raises to the security agenda. Research data consists of the speeches by Anders Fogh Rasmussen. They are analyzed through J.L. Austin’s speech act taxonomy and Chaïm Perelman’s argumentation theories. The thesis will concentrate on the formulation and articulation of these threats which are considered and coined as “new threats” in contemporary international relations. I am conducting this research through the use of securitization theory. This study illustrates that the threats are constructed by NATO’s member-states in unison, but the resolutions are sounded through Rasmussen’s official speeches and transcripts. . Based on the analysis it can be concluded that Rasmussen is giving reasons for the existence of NATO. This takes place by making use of speech acts and different rhetorical techniques. The results of the analysis indicate that NATO remains an essential organization for the West and the rest of the world according to the Secretary General.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent times, crowdsourcing over social networks has emerged as an active tool for complex task execution. In this paper, we address the problem faced by a planner to incen-tivize agents in the network to execute a task and also help in recruiting other agents for this purpose. We study this mecha-nism design problem under two natural resource optimization settings: (1) cost critical tasks, where the planner’s goal is to minimize the total cost, and (2) time critical tasks, where the goal is to minimize the total time elapsed before the task is executed. We define a set of fairness properties that should beideally satisfied by a crowdsourcing mechanism. We prove that no mechanism can satisfy all these properties simultane-ously. We relax some of these properties and define their ap-proximate counterparts. Under appropriate approximate fair-ness criteria, we obtain a non-trivial family of payment mech-anisms. Moreover, we provide precise characterizations of cost critical and time critical mechanisms.