4,203 research outputs found
Recommended from our members
Ensuring Access to Safe and Nutritious Food for All Through the Transformation of Food Systems
Annual SHOT Report 2018
SHOT is affiliated to the Royal College of PathologistsAll NHS organisations must move away from a blame culture towards a just and learning culture. All clinical and laboratory staff should be encouraged to become familiar with human factors and ergonomics concepts. All transfusion decisions must be made after carefully assessing the risks and benefits of transfusion therapy. Collaboration and co-ordination among staff is vital
The place where curses are manufactured : four poets of the Vietnam War
The Vietnam War was unique among American wars. To pinpoint its uniqueness, it was necessary to look for a non-American voice that would enable me to articulate its distinctiveness and explore the American character as observed by an Asian. Takeshi Kaiko proved to be most helpful. From his novel, Into a Black Sun, I was able to establish a working pair of 'bookends' from which to approach the poetry of Walter McDonald, Bruce Weigl, Basil T. Paquet and Steve Mason. Chapter One is devoted to those seemingly mismatched 'bookends,' Walt Whitman and General William C. Westmoreland, and their respective anthropocentric and technocentric visions of progress and the peculiarly American concept of the "open road" as they manifest themselves in Vietnam. In Chapter, Two, I analyze the war poems of Walter McDonald. As a pilot, writing primarily about flying, his poetry manifests General Westmoreland's technocentric vision of the 'road' as determined by and manifest through technology. Chapter Three focuses on the poems of Bruce Weigl. The poems analyzed portray the literal and metaphorical descent from the technocentric, 'numbed' distance of aerial warfare to the world of ground warfare, and the initiation of a 'fucking new guy,' who discovers the contours of the self's interior through a set of experiences that lead from from aerial insertion into the jungle to the degradation of burning human
feces. Chapter Four, devoted to the thirteen poems of Basil T. Paquet, focuses on the continuation of the descent begun in Chapter Two. In his capacity as a medic, Paquet's entire body of poems details his quotidian tasks which entail tending the maimed, the mortally wounded and the dead. The final chapter deals with Steve Mason's JohnnY's Song, and his depiction of the plight of Vietnam veterans back in "The World" who are still trapped inside the interior landscape of their individual "ghettoes" of the soul created by their war-time experiences
A systematic literature review on information systems for disaster management and proposals for its future research agenda
Emergency management information systems (EMIS) are fundamental for responding to disasters effectively since they provide and process emergency-related information. A literature stream has emerged that corresponds with the increased relevance of the wide array of different information systems that have been used in response to disasters. In addition, the discussion around systems used primarily within responder organizations broadened to systems such as social media that are open to the general public. However, a systematic review of the EMIS literature stream is still missing. This literature review presents a timeline of EMIS research from 1990 up to 2021. It shows the types of information system scholars focused on, and what disaster response functions they supported. It furthermore identifies challenges in EMIS research and proposes future research directions
The determinants of value addition: a crtitical analysis of global software engineering industry in Sri Lanka
It was evident through the literature that the perceived value delivery of the global software
engineering industry is low due to various facts. Therefore, this research concerns global
software product companies in Sri Lanka to explore the software engineering methods and
practices in increasing the value addition. The overall aim of the study is to identify the key
determinants for value addition in the global software engineering industry and critically
evaluate the impact of them for the software product companies to help maximise the value
addition to ultimately assure the sustainability of the industry.
An exploratory research approach was used initially since findings would emerge while the
study unfolds. Mixed method was employed as the literature itself was inadequate to
investigate the problem effectively to formulate the research framework. Twenty-three face-to-face online interviews were conducted with the subject matter experts covering all the
disciplines from the targeted organisations which was combined with the literature findings as
well as the outcomes of the market research outcomes conducted by both government and nongovernment institutes. Data from the interviews were analysed using NVivo 12. The findings
of the existing literature were verified through the exploratory study and the outcomes were
used to formulate the questionnaire for the public survey. 371 responses were considered after
cleansing the total responses received for the data analysis through SPSS 21 with alpha level
0.05. Internal consistency test was done before the descriptive analysis. After assuring the
reliability of the dataset, the correlation test, multiple regression test and analysis of variance
(ANOVA) test were carried out to fulfil the requirements of meeting the research objectives.
Five determinants for value addition were identified along with the key themes for each area.
They are staffing, delivery process, use of tools, governance, and technology infrastructure.
The cross-functional and self-organised teams built around the value streams, employing a
properly interconnected software delivery process with the right governance in the delivery
pipelines, selection of tools and providing the right infrastructure increases the value delivery.
Moreover, the constraints for value addition are poor interconnection in the internal processes,
rigid functional hierarchies, inaccurate selections and uses of tools, inflexible team
arrangements and inadequate focus for the technology infrastructure. The findings add to the
existing body of knowledge on increasing the value addition by employing effective processes,
practices and tools and the impacts of inaccurate applications the same in the global software
engineering industry
Recommended from our members
The Child in Games: From the Meek, to the Mighty, to the Monstrous
Drawing across game studies, childhood studies, and children’s literature studies, this thesis catalogues and critiques the representation of children in contemporary video games.
It poses two questions:
1) How are children represented in contemporary video games?
2) In what ways do the representations of children in video games affirm or
challenge dominant Western beliefs about the figure of the child?
To answer these questions, I combine a large-scale content analysis of over 500 games published between 2009 and 2019 with a series of autoethnographic close readings. My content analysis is designed to provide a quantitative snapshot of the representation of children in games. I use statistical analysis to assemble data points as meaningful constellations. I use the axes of race, gender, and age, as well as genre, age-rating, and publication year, to identify patterns in representation. I distil my findings as a set of seven archetypes: The Blithe Child, The Heroic Child, The Human Becoming, The Child Sacrifice, The Side Kid, The Waif, and The Little Monster. This typology is not intended to work against the granular detail of the information recorded in the dataset, but to draw attention to patterns of coherence and divergence that occur between particular examples, as well as to intersections with representational tropes about children identified in other media.
I select four of these seven archetypes to structure my autoethnographic close readings. While content analysis is a useful tool for documenting the presence, absence, and dominant function of child-characters in games, close reading allows for a more intersectional approach that can attend to the nuances of representation across identity markers, creating opportunities to examine internal contradictions, ironies, and the polysemy generated through interpretive gaps. I develop my own close reading method building on the autoethnographic approaches of Carr (2019), Vossen (2020), McArthur (2018), and Jennings (2021), which I call critical ekphrasis. Chapter one argues that the Blithe Child triangulates ‘children’, ‘toys’, and ‘paidia’. It suggests that both childhood and play can be conceptualised as a ‘magic circle’, and that the immateriality of the Blithe Child implies childhood can be a mode of being unconnected to anatomical markers or chronological age. Chapter two explores how the Heroic Child challenges the apparent affinity between video games and traditional hero
2
narratives. It argues that the dependence of the childly protagonist undermines dualistic thinking and instead celebrates cooperation, compromise, and connection. Chapter three compares the Child Sacrifice to the woman-in-the-refrigerator trope, arguing that it functions to justify aggressive, hypermasculine, militarised violence. The final chapter compares the Little Monster and the Waif to examine how the uncanny child raises metareferential questions about autonomy in interactive media and agency in intergenerational relationships.
My research project concludes by suggesting that virtual children in simulated worlds point to the active construction and delimitation of ‘the child’ in society and can reveal that much of what is assumed to be natural, obvious, and universal about the figure of ‘the child’ is in fact ideological. It hints at the possibility that just as virtual children are used as rhetorical figures to explain and justify the rules, mechanics, and moral systems of a digital game, so too is the figure of ‘the child’ used to routinise and vindicate the rules, workings, and moral systems of Euro-American culture.AHR
Investigating and mitigating the role of neutralisation techniques on information security policies violation in healthcare organisations
Healthcare organisations today rely heavily on Electronic Medical Records systems (EMRs), which have become highly crucial IT assets that require significant security efforts to safeguard patients’ information. Individuals who have legitimate access to an organisation’s assets to perform their day-to-day duties but intentionally or unintentionally violate information security policies can jeopardise their organisation’s information security efforts and cause significant legal and financial losses. In the information security (InfoSec) literature, several studies emphasised the necessity to understand why employees behave in ways that contradict information security requirements but have offered widely different solutions. In an effort to respond to this situation, this thesis addressed the gap in the information security academic research by providing a deep understanding of the problem of medical practitioners’ behavioural justifications to violate information security policies and then determining proper solutions to reduce this undesirable behaviour. Neutralisation theory was used as the theoretical basis for the research. This thesis adopted a mixed-method research approach that comprises four consecutive phases, and each phase represents a research study that was conducted in light of the results from the preceding phase. The first phase of the thesis started by investigating the relationship between medical practitioners’ neutralisation techniques and their intention to violate information security policies that protect a patient’s privacy. A quantitative study was conducted to extend the work of Siponen and Vance [1] through a study of the Saudi Arabia healthcare industry. The data was collected via an online questionnaire from 66 Medical Interns (MIs) working in four academic hospitals. The study found that six neutralisation techniques—(1) appeal to higher loyalties, (2) defence of necessity, (3) the metaphor of ledger, (4) denial of responsibility, (5) denial of injury, and (6) condemnation of condemners—significantly contribute to the justifications of the MIs in hypothetically violating information security policies. The second phase of this research used a series of semi-structured interviews with IT security professionals in one of the largest academic hospitals in Saudi Arabia to explore the environmental factors that motivated the medical practitioners to evoke various neutralisation techniques. The results revealed that social, organisational, and emotional factors all stimulated the behavioural justifications to breach information security policies. During these interviews, it became clear that the IT department needed to ensure that security policies fit the daily tasks of the medical practitioners by providing alternative solutions to ensure the effectiveness of those policies. Based on these interviews, the objective of the following two phases was to improve the effectiveness of InfoSec policies against the use of behavioural justification by engaging the end users in the modification of existing policies via a collaborative writing process. Those two phases were conducted in the UK and Saudi Arabia to determine whether the collaborative writing process could produce a more effective security policy that balanced the security requirements with daily business needs, thus leading to a reduction in the use of neutralisation techniques to violate security policies. The overall result confirmed that the involvement of the end users via a collaborative writing process positively improved the effectiveness of the security policy to mitigate the individual behavioural justifications, showing that the process is a promising one to enhance security compliance
Safe and seamless transfer of control authority - exploring haptic shared control during handovers
This research aimed at investigating the impact of lateral assistance systems on drivers' performance and behaviour during transitions from Highly Automated Driving (HAD). The thesis focused on non-critical transitions and analysed the differences between system and user-initiated transitions. Hence, two experiments were developed and conducted in driving simulators to address questions relating to how handover procedures, which provide varying levels of lateral assistance, affect drivers' performance and behaviour at different stages of the transition. In particular, it was investigated which type of assistance yields better results depending on who initiated the transition of control. Drivers were induced to be Out-Of-The-Loop (OOTL) during periods of HAD and then exposed to both system and user-initiated transitions. Results showed that after user-initiated transitions, drivers were generally more engaged with the steering task and the provided assistance was not helpful and, in some cases, caused steering conflicts and a comfort drop. On the contrary, after system-initiated transitions, drivers were not engaged with the steering control and were more prone to gaze wandering. Strong lateral assistance proved to be most beneficial within the first 5 seconds of the transition, when drivers were not committed to the steering control. The provision of assistance at an operational level, namely when drivers had to keep the lane centre, was not enough to ensure good performance at a tactical level. Drivers were able to cope with tactical tasks, presented as lane changes, only after around 10 seconds from the start of the transitions in both user and system initiated cases (Chapter 3 and Chapter 4). The introduction of non-continuous lateral assistance, used to trigger steering conflicts and, in turn, a faster steering engagement, did not yield particular benefits during user-initiated transitions but it might have triggered a faster re-engagement process in system-initiated ones (Chapter 5). The results suggest that assisting drivers after user-initiated transitions is not advisable as the assistance might induce steering conflicts. On the contrary, it is extremely beneficial to assist drivers during system-initiated transitions because of their low engagement with the driving task. The thesis concludes with a general overview of the conducted studies and a discussion on future studies to take this research forward
The Preservation of Malaysian Traditional Sport and Games through Design
Academic research is still overlooking the subject of Malaysian traditional sports and games (MTSG). The scarcity of academic publications addressing MTSG demonstrates the importance of this research. Globalisation and technological advancement have introduced ever-increasing attractions, such as digital gaming, which has lessened the general interest in MTSG. When the researcher observed the local community in Malaysia, he discovered that it was difficult to find children and young people playing MTSG compared to the researcher's childhood. Although a personal observation may not be pragmatic in rationalising the research, it did serve as the catalyst for researching MTSG. Despite the lack of academic references and preliminary findings, the Malaysian government, local organisations, and even individual Malaysians have highlighted the importance of keeping MTSG alive. It is envisaged that active participation in MTSG activities ensures the longevity of cultural assets, thereby preserving them. However, current attempts are limited, and MTSG remains unappealing to children, teenagers, and adults as a modern leisure activity. This realisation prompted the researcher to consider alternative solutions by using design as a creative method to help reintroduce MTSG into society. The research was conducted with a pragmatic approach, including literature reviews, interviews, field experiments, design workshops, and design evaluation. The framework presented in this research provides a strategy for the potential re-introduction of MTSG. The research concludes that the MTSG can be re-introduced through design intervention on the activities using the models developed from the research framework
- …