32,839 research outputs found

    Focal Spot, Summer 1986

    Get PDF
    https://digitalcommons.wustl.edu/focal_spot_archives/1043/thumbnail.jp

    "Looking is not as bad as touching - or is it?" Considering risk in offenders who use child sexual exploitation material

    Get PDF
    There has been much debate about the availability of child sexual exploitation material (CSEM) on the internet, highlighted by the tragic deaths of April Jones (5 years) and Tia Sharp (12 years), whose killers viewed and collected CSEM. Discussion surrounding such cases has focused on a potentially causal link between CSEM and sexually motivated crimes against children. Since the advent of the internet, convictions for the possession, exchange and/or production of CSEM have risen dramatically. A substantial body of research on internet sex offenders has emerged and professionals are developing a knowledge base regarding assessment and treatment needs of CSEM users. However, the question of risk remains a central concern: How likely is a CSEM user to commit a contact sex offence against a child in the future? Is there a causal link between “looking” and “touching”? The Lucy Faithfull Foundation, together with Prof Derek Perkins (West London Mental Health Trust) & Dr Hannah Merdian (University of Lincoln) would like to invite you to a one-day conference addressing the issue of risk assessment and risk management in working with CSEM users. The Lucy Faithfull Foundation (LFF) is a child protection charity, committed to reducing the risk of children being sexually abused. Proceeds from the conference and any donations will go to the Lucy Faithfull Foundation with sincere thanks to support its work

    What happens when agent T gets a computer?

    Get PDF
    During the last decade a great many authors have shown that computers have a large impact on skill demand, production processes, and the organization and intensity of work. Analyses have indicated that the rates of change of these variables have been the largest in the more computer-intensive sectors. Empirical findings, however, suggest that the effects of computers on the labor market are complicated and difficult to trace. This paper offers a simple model to explain how computers have changed the labor market. The model demonstrates that wage differentials between computer users and other workers are consistent with the observation that computers are first introduced in high-wage jobs because of cost efficiency. It also shows that neither computer skills nor complementary skills are needed to explain skill upgrading, changes in product characteristics, and the organization and intensity of work. Finally, it is shown that these findings shed a different light on the way computers have changed the labor market and on the changes to be expected following the further diffusion of computers.education, training and the labour market;

    What happens when agent T gets a computer?

    Get PDF
    During the last decade a great many authors have shown that computers have a large impact on skill demand, production processes, and the organization and intensity of work. Analyses have indicated that the rates of change of these variables have been the largest in the more computer-intensive sectors. Empirical findings, however, suggest that the effects of computers on the labor market are complicated and difficult to trace. This paper offers a simple model to explain how computers have changed the labor market. The model demonstrates that wage differentials between computer users and other workers are consistent with the observation that computers are first introduced in high-wage jobs because of cost efficiency. It also shows that neither computer skills nor complementary skills are needed to explain skill upgrading, changes in product characteristics, and the organization and intensity of work. Finally, it is shown that these findings shed a different light on the way computers have changed the labor market and on the changes to be expected following the further diffusion of computers.economics of technology ;

    Distributed simulation with COTS simulation packages: A case study in health care supply chain simulation

    Get PDF
    The UK National Blood Service (NBS) is a public funded body that is responsible for distributing blood and asso-ciated products. A discrete-event simulation of the NBS supply chain in the Southampton area has been built using the commercial off-the-shelf simulation package (CSP) Simul8. This models the relationship in the health care supply chain between the NBS Processing, Testing and Is-suing (PTI) facility and its associated hospitals. However, as the number of hospitals increase simulation run time be-comes inconveniently large. Using distributed simulation to try to solve this problem, researchers have used techniques informed by SISO’s CSPI PDG to create a version of Simul8 compatible with the High Level Architecture (HLA). The NBS supply chain model was subsequently divided into several sub-models, each running in its own copy of Simul8. Experimentation shows that this distri-buted version performs better than its standalone, conven-tional counterpart as the number of hospitals increases

    Structuring information work: Ferranti and Martins Bank, 1952-1968

    Get PDF
    The adoption of large-scale computers by the British retail banks in the 1960s required a first-time dislocation of customer accounting from its confines in the branches, where it had been dealt with by paper-based and mechanized information systems, to a new collective space: the bank computer center. While historians have rightly stressed the continuities between centralized office work, punched-card tabulation and computerization, the shift from decentralized to centralized information work by means of a computer has received little attention. In this article, I examine the case of Ferranti and Martins Bank and employ elements of Anthony Giddens’s structuration theory to highlight the difficulties of transposing old information practices directly onto new computerized information work

    Centerscope

    Full text link
    Centerscope, formerly Scope, was published by the Boston University Medical Center "to communicate the concern of the Medical Center for the development and maintenance of improved health care in contemporary society.

    Is a Technological Singularity near also for bots in MMOGs?

    Get PDF
    Using the idea of the Technological Singularity this essay offers some reflections on the possible future of bots in Massively Multiplayer Online Games (MMOGs). The paper starts by briefly introducing the notion of Technological Singularity as the advent of a super-intelligent Artificial Intelligence that could threaten human existence. Bots are computer programs that automate repetitive and time consuming activities for the Internet user. In MMOGs, bots are often used to cheat and could have nefarious effects on the gameplay. Assuming that bots are rudimentary forms of Artificial Intelligence that also pose a threat to MMOGs and their players, the paper presents some evidence-based trends of the future evolution of bots and the implications of these for Virtual Worlds research

    Key Skills; Rhetoric, Reality and Reflection

    Get PDF
    • …
    corecore