925 research outputs found

    Hearing voices: A narrative analysis of the senate inquiry into the social and economic impacts of rural wind farms

    Get PDF
    This is a preliminary examination of the public debate initiated as a result of the rapid expansion of wind farms in rural spaces. The study is based on a sample of submissions to the Senate Inquiry, The Social and Economic Impact of Rural Wind Farms (2011). Using a narrative analysis (Riessman 2008), the study identifies the issues raised in support of, or opposition to, wind farm developments in south-west Victoria. Narratives of personal loss or personal gain and by extension, community gain, were used to frame the stories. The narratives of loss struggled to connect to a contemporary public discourse and were as a result marginalised. The narratives of gain were found to link more successfully to themes with national and international currency that allowed the narratives to assume a 'just' stance. This study may be useful for others who engage, communicate and negotiate in the context of further wind farm developments

    Hosting critical infrastructure services in the cloud environment considerations

    Get PDF
    Critical infrastructure technology vendors will inevitability take advantage of the benefits offered by the cloud computing paradigm. While this may offer improved performance and scalability, the associated security threats impede this progression. Hosting critical infrastructure services in the cloud environment may seem inane to some, but currently remote access to the control system over the internet is commonplace. This shares the same characteristics as cloud computing, i.e., on-demand access and resource pooling. There is a wealth of data used within critical infrastructure. There needs to be an assurance that the confidentiality, integrity and availability of this data remains. Authenticity and non-repudiation are also important security requirements for critical infrastructure systems. This paper provides an overview of critical infrastructure and the cloud computing relationship, whilst detailing security concerns and existing protection methods. Discussion on the direction of the area is presented, as is a survey of current protection methods and their weaknesses. Finally, we present our observation and our current research into hosting critical infrastructure services in the cloud environment, and the considerations for detecting cloud attacks. © 2015 Inderscience Enterprises Ltd

    Occupational Therapy and Accessibility in the Outdoors and Summer Camps

    Get PDF
    Opportunities for positive youth development (PYD) are promoted through both outdoor and camp experiences. The experiences provided by the outdoors and camps are ideal for developing physically, cognitively, socially, emotionally, and spiritually. These areas of PYD are further generalizable to several aspects of occupational performance and participation, while continuing to have benefits throughout the lifespan. While the outdoors and camps provide these valuable opportunities for development, the environments and contexts of these opportunities are often limiting factors for individuals with disabilities. Utilizing an occupational therapy approach allows for further understanding of how to promote inclusion and accessibility practices in these settings and further support occupational performance and participation for individuals of all abilities. The application of an occupational therapy perspective combined with research, review, and collaboration within these communities determined appropriate project objectives to address these areas of need. Further development based on project objectives led to the creation of Access Outdoors Occupational Therapy and the associated website www.accessoutdoorsot.com. Access Outdoors Occupational Therapy is a cumulative result of fulfilling project objectives and aims to promote and advocate for inclusion and accessibility in the outdoors and camp programs while also expanding available knowledge. Areas of growth for Access Outdoors Occupational Therapy include expanding occupational therapy roles, community partnerships, on the ground advocacy and outreach, and individualized consulting for outdoors and camp programs.https://soar.usa.edu/otdcapstonessummer2020/1001/thumbnail.jp

    Evaluation of College and Career Readiness Class Efficacy for Students with Learning Differences

    Get PDF
    A significant percentage of first year students in post-secondary education (PSE) do not persist through their first year and high schools continue to seek new ways of supporting students’ college and career readiness (CCR). Studies show lack of persistence derives not only from academic deficits but in non-academic skill deficits such as self-determination and executive function skills. Public school CCR programs have had limited resources to address these non-academic challenges to their students’ success whereas private high schools have significantly lower student to counselor ratio and many provide enhanced CCR programming. One small private school has provided a new semester class to prepare high school seniors, developed by OTs, that teaches non-academic skills experientially for greater impact. This project evaluates the efficacy of this CCR class using a quantitative and qualitative student survey developed to measure outcomes for self-determination, self-advocacy, and goal-setting skills. Survey questions were divided into the career exploration, PSE and employment readiness, financial literacy, and life skills units plus an overall evaluation section. Results of this survey indicate the class curriculum is meeting objectives and the students are being prepared for PSE, employment, and adult living skills. The implication for OT is that non-academic skills can be effectively taught and that OTs can support enhanced CCR programming that supports student persistence in post-secondary endeavors.https://soar.usa.edu/otdcapstonesfall2021/1026/thumbnail.jp

    Vowel Sounds in Poetry: Their Music and Tone-Colour

    Get PDF
    Abstract Not Provided

    Mergers and Acquisitions in Latin America: Industrial Productivity and Corporate Governance

    Get PDF
    This paper examines the impact of industrial productivity on transnationals M&As from OECD countries towards Latin American countries in the period 1996 to 2010. It also analyzes the relationship between external mechanism of corporate governance and transnational M&As. For this purpose we use a gravitational model at the industry level. We find that industry productivity and higher standards of corporate governance in the country of origin promote transnational M&As activity. However, it is also found that higher levels of capital and technological productivity decreases transnational M&As activity

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    Regulation of human intestinal T-cell responses by type 1 interferon-STAT1 signaling is disrupted in inflammatory bowel disease

    Get PDF
    This work was supported by a research fellowship grant from the Crohn’s and Colitis in Childhood Research Association (CICRA) and a small project grant from Crohn’s and Colitis UK (CCUK). We would like to acknowledge Professor Ian Sanderson, who helped with the initial design of this work, and provided important support throughout. We would also like to thank Dr Gary Warne for his advice and assistance in the use of the sorting by flow cytometry. We would also like to thank Dr Raj Lahiri and Professor Graham Foster for the kind gift of the primers for the ISGs (2’5’ OAS and MxA)

    B^{*} production in Z decays at LEP

    Get PDF

    A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models

    Get PDF
    Digital forensic examiners and stakeholders face increasing challenges during the investigation of Internet of Things (IoT) environments due to the heterogeneous nature of the IoT infrastructure. These challenges include guaranteeing the integrity of forensic evidence collected and stored during the investigation process. Similarly, they also encounter challenges in ensuring the transparency of the investigation process which includes the chain-of-custody and evidence chain. In recent years, some blockchain-based secure evidence models have been proposed especially for IoT forensic investigations. These proof-of-concept models apply the inherent properties of blockchain to secure the evidence chain of custody, maintain privacy, integrity, provenance, traceability, and verification of evidence collected and stored during the investigation process. Although there have been few prototypes to demonstrate the practical implementation of some of these proposed models, there is a lack of descriptive review of these blockchain-based IoT forensic models. In this paper, we report a comprehensive Systematic Literature Review (SLR) of the latest blockchain-based IoT forensic investigation process models. Particularly, we systematically review how blockchain is being used to securely improve the forensic investigation process and discuss the efficiency of these proposed models. Finally, the paper highlights challenges, open issues, and future research directions of blockchain technology in the field of IoT forensic investigations
    corecore