807 research outputs found

    Occupational Therapy and Accessibility in the Outdoors and Summer Camps

    Get PDF
    Opportunities for positive youth development (PYD) are promoted through both outdoor and camp experiences. The experiences provided by the outdoors and camps are ideal for developing physically, cognitively, socially, emotionally, and spiritually. These areas of PYD are further generalizable to several aspects of occupational performance and participation, while continuing to have benefits throughout the lifespan. While the outdoors and camps provide these valuable opportunities for development, the environments and contexts of these opportunities are often limiting factors for individuals with disabilities. Utilizing an occupational therapy approach allows for further understanding of how to promote inclusion and accessibility practices in these settings and further support occupational performance and participation for individuals of all abilities. The application of an occupational therapy perspective combined with research, review, and collaboration within these communities determined appropriate project objectives to address these areas of need. Further development based on project objectives led to the creation of Access Outdoors Occupational Therapy and the associated website www.accessoutdoorsot.com. Access Outdoors Occupational Therapy is a cumulative result of fulfilling project objectives and aims to promote and advocate for inclusion and accessibility in the outdoors and camp programs while also expanding available knowledge. Areas of growth for Access Outdoors Occupational Therapy include expanding occupational therapy roles, community partnerships, on the ground advocacy and outreach, and individualized consulting for outdoors and camp programs.https://soar.usa.edu/otdcapstonessummer2020/1001/thumbnail.jp

    Evaluation of College and Career Readiness Class Efficacy for Students with Learning Differences

    Get PDF
    A significant percentage of first year students in post-secondary education (PSE) do not persist through their first year and high schools continue to seek new ways of supporting students’ college and career readiness (CCR). Studies show lack of persistence derives not only from academic deficits but in non-academic skill deficits such as self-determination and executive function skills. Public school CCR programs have had limited resources to address these non-academic challenges to their students’ success whereas private high schools have significantly lower student to counselor ratio and many provide enhanced CCR programming. One small private school has provided a new semester class to prepare high school seniors, developed by OTs, that teaches non-academic skills experientially for greater impact. This project evaluates the efficacy of this CCR class using a quantitative and qualitative student survey developed to measure outcomes for self-determination, self-advocacy, and goal-setting skills. Survey questions were divided into the career exploration, PSE and employment readiness, financial literacy, and life skills units plus an overall evaluation section. Results of this survey indicate the class curriculum is meeting objectives and the students are being prepared for PSE, employment, and adult living skills. The implication for OT is that non-academic skills can be effectively taught and that OTs can support enhanced CCR programming that supports student persistence in post-secondary endeavors.https://soar.usa.edu/otdcapstonesfall2021/1026/thumbnail.jp

    Hearing voices: A narrative analysis of the senate inquiry into the social and economic impacts of rural wind farms

    Get PDF
    This is a preliminary examination of the public debate initiated as a result of the rapid expansion of wind farms in rural spaces. The study is based on a sample of submissions to the Senate Inquiry, The Social and Economic Impact of Rural Wind Farms (2011). Using a narrative analysis (Riessman 2008), the study identifies the issues raised in support of, or opposition to, wind farm developments in south-west Victoria. Narratives of personal loss or personal gain and by extension, community gain, were used to frame the stories. The narratives of loss struggled to connect to a contemporary public discourse and were as a result marginalised. The narratives of gain were found to link more successfully to themes with national and international currency that allowed the narratives to assume a 'just' stance. This study may be useful for others who engage, communicate and negotiate in the context of further wind farm developments

    Vowel Sounds in Poetry: Their Music and Tone-Colour

    Get PDF
    Abstract Not Provided

    Hosting critical infrastructure services in the cloud environment considerations

    Get PDF
    Critical infrastructure technology vendors will inevitability take advantage of the benefits offered by the cloud computing paradigm. While this may offer improved performance and scalability, the associated security threats impede this progression. Hosting critical infrastructure services in the cloud environment may seem inane to some, but currently remote access to the control system over the internet is commonplace. This shares the same characteristics as cloud computing, i.e., on-demand access and resource pooling. There is a wealth of data used within critical infrastructure. There needs to be an assurance that the confidentiality, integrity and availability of this data remains. Authenticity and non-repudiation are also important security requirements for critical infrastructure systems. This paper provides an overview of critical infrastructure and the cloud computing relationship, whilst detailing security concerns and existing protection methods. Discussion on the direction of the area is presented, as is a survey of current protection methods and their weaknesses. Finally, we present our observation and our current research into hosting critical infrastructure services in the cloud environment, and the considerations for detecting cloud attacks. © 2015 Inderscience Enterprises Ltd

    A systematic literature review of blockchain-based Internet of Things (IoT) forensic investigation process models

    Get PDF
    Digital forensic examiners and stakeholders face increasing challenges during the investigation of Internet of Things (IoT) environments due to the heterogeneous nature of the IoT infrastructure. These challenges include guaranteeing the integrity of forensic evidence collected and stored during the investigation process. Similarly, they also encounter challenges in ensuring the transparency of the investigation process which includes the chain-of-custody and evidence chain. In recent years, some blockchain-based secure evidence models have been proposed especially for IoT forensic investigations. These proof-of-concept models apply the inherent properties of blockchain to secure the evidence chain of custody, maintain privacy, integrity, provenance, traceability, and verification of evidence collected and stored during the investigation process. Although there have been few prototypes to demonstrate the practical implementation of some of these proposed models, there is a lack of descriptive review of these blockchain-based IoT forensic models. In this paper, we report a comprehensive Systematic Literature Review (SLR) of the latest blockchain-based IoT forensic investigation process models. Particularly, we systematically review how blockchain is being used to securely improve the forensic investigation process and discuss the efficiency of these proposed models. Finally, the paper highlights challenges, open issues, and future research directions of blockchain technology in the field of IoT forensic investigations

    COVID-19 Pandemic Preparedness in a UK Tertiary and Quaternary Children's Hospital: Tales of the Unexpected

    Get PDF
    We describe the adaptive coping strategies required in the management of a heterogeneous group of SARS-CoV-2 paediatric patients. The diverse range of presentations, presenting in distinct phenotypic waves, exemplified the importance of preparedness for the unknown. Lessons learned will be essential in planning for a likely second wave of SARS-CoV-2

    A secure fog-based platform for SCADA-based IoT critical infrastructure

    Get PDF
    © 2019 John Wiley & Sons, Ltd. The rapid proliferation of Internet of things (IoT) devices, such as smart meters and water valves, into industrial critical infrastructures and control systems has put stringent performance and scalability requirements on modern Supervisory Control and Data Acquisition (SCADA) systems. While cloud computing has enabled modern SCADA systems to cope with the increasing amount of data generated by sensors, actuators, and control devices, there has been a growing interest recently to deploy edge data centers in fog architectures to secure low-latency and enhanced security for mission-critical data. However, fog security and privacy for SCADA-based IoT critical infrastructures remains an under-researched area. To address this challenge, this contribution proposes a novel security “toolbox” to reinforce the integrity, security, and privacy of SCADA-based IoT critical infrastructure at the fog layer. The toolbox incorporates a key feature: a cryptographic-based access approach to the cloud services using identity-based cryptography and signature schemes at the fog layer. We present the implementation details of a prototype for our proposed secure fog-based platform and provide performance evaluation results to demonstrate the appropriateness of the proposed platform in a real-world scenario. These results can pave the way toward the development of a more secure and trusted SCADA-based IoT critical infrastructure, which is essential to counter cyber threats against next-generation critical infrastructure and industrial control systems. The results from the experiments demonstrate a superior performance of the secure fog-based platform, which is around 2.8 seconds when adding five virtual machines (VMs), 3.2 seconds when adding 10 VMs, and 112 seconds when adding 1000 VMs, compared to the multilevel user access control platform

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    The coexistence of peace and conflict in South America: toward a new conceptualization of types of peace

    Get PDF
    South America's predominant democratic regimes and its increasing interdependence on regional trade have not precluded the emergence of militarized crises between Colombia and Venezuela or the revival of boundary claims between Chile and Peru. This way, how can we characterize a zone that, in spite of its flourishing democracy and dense economic ties, remain involved in territorial disputes for whose resolution the use of force has not yet been discarded? This article contends that existing classifications of zones of peace are not adequate to explain this unusual coexistence. Thus, its main purpose is to develop a new analytical category of regional peace for assessing this phenomenon: the hybrid peace. It aims to research the evolution of security systems in South America during the previous century and build a new, threefold classification of peace zones: negative peace zones, hybrid peace zones, and positive peace zones
    • 

    corecore