291 |
The Problem of Technology: Human Communication In The Age of AutomationLeontyeva, Alyona 01 January 2019 (has links)
With the introduction of technology, our existence became different. Today we use technology for every aspect of our lives. We can study, work, communicate, and entertain ourselves. We find it very convenient to communicate via e-mail, text messaging, WhatsApp, Facebook, Twitter, Instagram, Myspace, and Snapchat to connect with people in work, school, social and familial networks. Mark Zuckerberg proclaimed that Facebook's new mission is to "bring the world closer together" (Zuckerberg, 2017). The means of accomplishing that is through technological communication. According to research on close relationships and the use of technology as a way of communication, "mobile phone-based channels had stronger associations with friendship closeness" (Liu & Yang, 2016). However, it is also possible that something essential is lost in these electronic interactions. It is possible that both the value and meaning of the interaction changes when using technology rather than human communication. The primary purpose of this research was a) to examine whether technology use makes people feel more connected to others or lonelier, b) to discover how relationships are affected by online communication, particularly as it relates to satisfaction or closeness, and c) to see if people's personalities play a role in their technology use. It is essential to continue to expand and explore this research. Technology continues to develop and change at an increasingly fast rate. The impact of how we use and interact with this dynamic product can only be fully understood through continued examination and research.
|
292 |
RELATIONSHIPS BETWEEN MENTAL SKILLS AND COMPETITIVE ANXIETY INTERPRETATION IN OPEN SKILL AND CLOSE SKILL ATHLETESAufenanger, Sharyn J. 26 May 2005 (has links)
No description available.
|
293 |
Sjuksköterskors erfarenheter av det initiala samtalet med kvinnor som varit utsatt för våld i nära relation - en litteraturstudie. / Nurses' experiences of the initial conversation with women who have been subjected to domestic violence - a literature study.Renberg, Vilma, Rådström, Filippa January 2024 (has links)
Bakgrund: Våld i nära relation är ett globalt hälsoproblem som påverkar miljontals kvinnor. Våldet förekommer i flera olika former, exempelvis fysiskt, psykiskt och sexuellt, och kan ha dödliga konsekvenser. Sjukvården behöver utveckla och säkra kvaliteten i arbetet med att identifiera och hjälpa kvinnor som är utsatta för våld i nära relation. Sjuksköterskor har en viktig roll i detta arbete. Syfte: Syftet med studien var att beskriva sjuksköterskors erfarenheter av det initiala samtalet med kvinnor som utsatts för våld i nära relation. Metod: En litteraturstudie med kvalitativ ansats baserad på nio kvalitativa studier. Datasökningen gjordes på Cinahl och PubMed. Artiklarna kvalitetsgranskas med hjälp av Olsson & Sörensens granskningsmall. Analysen av artiklarna gjordes med inspiration av Fribergs analysmodell. Resultat: Analysen resulterade i två huvudteman och sju underteman. De två huvudteman är: Försvårande och underlättande faktorer för att initiera samtal om våld i nära relation och Försvårande och underlättande faktorer för att genomföra bra samtal om våld i nära relation. Konklusion: Ämnet våld i nära relation väcker känslor hos patienter likaväl som hos sjuksköterskor. Det finns osäkerheter hos sjuksköterskor om hur man ska hålla det initiala samtalet om våld i nära relation och vad man ska göra med svaret. Tidsbrist och underbemanning är faktorer som bidrar till att samtal om våld i nära relation utelämnas av sjuksköterskor i deras arbete. Rutinmässiga frågor till alla kvinnliga patienter kan hjälpa sjuksköterskor att uppmärksamma våld i nära relation. / Background: Domestic violence is a global health problem affecting millions of women. Violence takes many forms, including physical, psychological and sexual, and can have fatal consequences. The health care system needs safe procedures to develop and ensure the quality of work with women who are exposed to domestic violence. Nurses play an important role in this work. Aim: The aim of the study was to describe nurses' experiences of the initial conversation with women who have been subjected to domestic violence. Methods: A literature study based on nine qualitative studies. The data search was done on Cinahl and PubMed. With help from Olsson & Sörensen's review template, the articles were quality reviewed. The analysis of the articles was done with inspiration from Friberg's analysis model. Results: The analysis resulted in two main themes and seven sub-themes. The two main themes are: Difficulty and facilitating factors for initiating conversations about domestic violence and Difficulty and facilitating factors for conducting good conversations about domestic violence. Conclusion: The topic of domestic violence raises emotions in patients as well as in nurses. There are uncertainties among nurses about how to have the initial conversation about domestic violence and what to do with the response. Lack of time and understaffing are factors contributing to the omission of domestic violence conversations by nurses in their work. Routine questions to all female patients can help nurses to recognize intimate partner violence.
|
294 |
Context-aware and secure workflow systemsAlotaibi, Hind January 2012 (has links)
Businesses do evolve. Their evolution necessitates the re-engineering of their existing "business processes”, with the objectives of reducing costs, delivering services on time, and enhancing their profitability in a competitive market. This is generally true and particularly in domains such as manufacturing, pharmaceuticals and education). The central objective of workflow technologies is to separate business policies (which normally are encoded in business logics) from the underlying business applications. Such a separation is desirable as it improves the evolution of business processes and, more often than not, facilitates the re-engineering at the organisation level without the need to detail knowledge or analyses of the application themselves. Workflow systems are currently used by many organisations with a wide range of interests and specialisations in many domains. These include, but not limited to, office automation, finance and banking sector, health-care, art, telecommunications, manufacturing and education. We take the view that a workflow is a set of "activities”, each performs a piece of functionality within a given "context” and may be constrained by some security requirements. These activities are coordinated to collectively achieve a required business objective. The specification of such coordination is presented as a set of "execution constraints” which include parallelisation (concurrency/distribution), serialisation, restriction, alternation, compensation and so on. Activities within workflows could be carried out by humans, various software based application programs, or processing entities according to the organisational rules, such as meeting deadlines or performance improvement. Workflow execution can involve a large number of different participants, services and devices which may cross the boundaries of various organisations and accessing variety of data. This raises the importance of _ context variations and context-awareness and _ security (e.g. access control and privacy). The specification of precise rules, which prevent unauthorised participants from executing sensitive tasks and also to prevent tasks from accessing unauthorised services or (commercially) sensitive information, are crucially important. For example, medical scenarios will require that: _ only authorised doctors are permitted to perform certain tasks, _ a patient medical records are not allowed to be accessed by anyone without the patient consent and _ that only specific machines are used to perform given tasks at a given time. If a workflow execution cannot guarantee these requirements, then the flow will be rejected. Furthermore, features/characteristics of security requirement are both temporal- and/or event-related. However, most of the existing models are of a static nature – for example, it is hard, if not impossible, to express security requirements which are: _ time-dependent (e.g. A customer is allowed to be overdrawn by 100 pounds only up-to the first week of every month. _ event-dependent (e.g. A bank account can only be manipulated by its owner unless there is a change in the law or after six months of his/her death). Currently, there is no commonly accepted model for secure and context-aware workflows or even a common agreement on which features a workflow security model should support. We have developed a novel approach to design, analyse and validate workflows. The approach has the following components: = A modelling/design language (known as CS-Flow). The language has the following features: – support concurrency; – context and context awareness are first-class citizens; – supports mobility as activities can move from one context to another; – has the ability to express timing constrains: delay, deadlines, priority and schedulability; – allows the expressibility of security policies (e.g. access control and privacy) without the need for extra linguistic complexities; and – enjoy sound formal semantics that allows us to animate designs and compare various designs. = An approach known as communication-closed layer is developed, that allows us to serialise a highly distributed workflow to produce a semantically equivalent quasi-sequential flow which is easier to understand and analyse. Such re-structuring, gives us a mechanism to design fault-tolerant workflows as layers are atomic activities and various existing forward and backward error recovery techniques can be deployed. = Provide a reduction semantics to CS-Flow that allows us to build a tool support to animate a specifications and designs. This has been evaluated on a Health care scenario, namely the Context Aware Ward (CAW) system. Health care provides huge amounts of business workflows, which will benefit from workflow adaptation and support through pervasive computing systems. The evaluation takes two complementary strands: – provide CS-Flow’s models and specifications and – formal verification of time-critical component of a workflow.
|
295 |
Barn och unga med en nära anhörig som avlidit : Barn och ungas erfarenheter av att delta i stödgruppPersson, Carolina, Norström, Josefine January 2016 (has links)
I denna kvalitativa studie har enkäter insamlats från barn och unga som deltagit i stödgruppsverksamhet för barn och unga med en avliden nära anhörig i Dalarnas län. Syftet med studien har varit att beskriva deltagarnas erfarenheter av stödgrupperna. Genom kvalitativ innehållsanalys har tre kategorier identifierats; bearbetning, gemenskap och strukturens betydelse. Studien visar främst på betydelsen av att få träffa andra barn och unga i liknande situation samt indikerar till att deltagarnas KASAM (känsla av sammanhang) förhöjts genom deltagandet i stödgruppen. / In this qualitative study, questionnaires were collected from children and adolescents who had participated in a support group in Dalarnas län for children and adolescents with a deceased close relative. The purpose of this study was to enhance knowledge of children and adolescents’ experiences of participating in support groups through their descriptions in qualitative questionnaires. Qualitative content analysis was conducted and three categories were identified; kinship, processing and the significance of structure. The result highlights the importance of having the opportunity to meet other children and adolescents in similar situations, and indicates that the participants Sense of coherence enhanced through the participation in the support group.
|
296 |
Evaluating the contribution made by works order close-out meetings at Nampak Flexible NdabeniMaritz, S. I. 12 1900 (has links)
Thesis (MBA (Business Management))--Stellenbosch University, 2008. / ENGLISH ABSTRACT: The aim of this paper was to prove the contribution of the Works Order Close-Out Meeting process at Nampak Flexible Ndabeni, through the development of a Close-Out Meeting contribution evaluation model. Although the value of the Close-Out Meeting process is intuitively understood, a formal measurement would underscore the importance of the process. Using a funnel-based analysis, a total of 63 Close-Out Meeting findings was identified for formal benefit review and were categorised into five finding groups. For each of these five groups a contribution measurement methodology was developed. The methodology was rooted in sound management and ERP theory and then applied to the findings in each group. The following key groups were identified and discussed: Incorrect standards. The importance of correct standards was shown, and the potential misstatement due to incorrect standards was quantified. The analysis showed that effective, ongoing variance review can identify errors in standards and that changes can be initiated and authorised in a short timeframe. ERP process review. Findings that specifically addressed lack of proper process were reviewed and real benefit was calculated for three categories, namely information misstatement, risk mitigation and productivity gains. Formulas were developed and applied for the benefit calculation. The analysis showed it is dangerous to assume that processes are cast in stone or fundamentally sound, and that the Close-Out review process not only identifies deficiency of these processes, but initiates corrective action. Shop floor process review. The investigation into findings that addressed process conformance showed that in most cases the process breakdowns related to the accuracy of information captured into the ERP. The impact of poor information, process non-conformance and corrective action was clearly shown. Actions to improve performance. Targeted actions to improve production performance were subdivided into actions that improved productivity and actions that reduced the risk of recurrence of a negative event. Benefits were calculated using established methods, and in both cases the benefit was substantial. Business decision confirmation. The Close-Out Meeting sometimes forced analysis that did not lead to action but to a better understanding of the business reality. What was shown is that the ability to identify, list and analyse findings of this nature added value. By expanding the benefit analysis beyond a simplistic implementation of corrective action, the scope of benefits was increased. The study achieved several objectives. The analysis showed that corrective actions taken by management have a scientific base and that the implementation of corrective actions delivered real business value. This allowed the business to place the Close-Out Meetings in the correct context, as the business could conclude that Close-Out Meetings were fundamental to its continued success. From a theoretical point of view the body of knowledge around Close-Out Meetings was expanded, while the results also supported the Nampak ERP value case. Close-Out Meetings at Nampak Flexible delivered clear, measurable benefits when discussion points were converted to actions that were acted upon by the business. The value was of such a nature to confirm the importance of Close-Out Meetings as a component of good ERP-manufacturing practice. / AFRIKAANSE OPSOMMING: Die doel van hierdie werkstuk was om die bydrae van die "Works Order Close-Out Meeting" proses by Nampak Flexible Ndabeni te bewys met behulp van 'n "Close-Out Meeting" evaluasiemodel. Alhoewel die waarde van die "Close-Out Meeting"-proses intuitief aanvaar word, aksentueer die ontwikkeling van 'n formele maatstaf die belangrikheid van die proses. 'n Evaluasieproses het 'n totaa1 van 63 bevindinge opgelewer vir analise. Die bevindinge is ingedeel in vyf groeperings en vir elke groepering is 'n ste1 maatstawwe ontwikkel ten einde die bydrae van die bevindinge te meet. Hierdie maatstawwe was gebaseer op bestaande, aanvaarde ERP- en bestuursteorie. Die volgende vyf groepe was geidentifiseer en bespreek. Foutiewe standaarde. Die belangrikheid van akkurate standaarde in die stelsel is bewys, en die skaal van informasiefoute as gevolg van verkeerde standaarde is gekwantifiseer. Daar is bewys dat effektiewe, voortdurende variasie-analise foute kan identifiseer en dat die nodige korrektiewe aksie vinnig implementeerbaar is. ERP-proses. Bevindinge wat voortspruit uit swak prosesse is geidentifiseer en die waarde van die korrektiewe aksie is op drie vlakke geanaliseer, naamlik informasiefoute, risikobeheer en produktiwiteitsverbetering. Formules is ontwikkel en toegepas om die waarde van die korrektiewe aksie te bepaal. Daar is bewys dat dit gevaarlik is om aan te neem dat besigheidsprosesse fundamenteel korrek is, en dat die "Close-Out Review"-proses nie net foutiewe prosesse uitgewys het nie, maar ook die nodige korrektiewe aksie gedryf het. Fabrieksvloerproses. Die ondersoek na bevindinge wat prosesafwykings uitgewys het, het aangedui dat afwykings meestal voorgekom het as gevolg van foutiewe informasie in die ERP-stelsel. Die impak van foutiewe informasie, prosesafwykings en inisiatiewe om die akkuraatheid van informasie te verbeter is duidelik gewys. Produksieverbetering. Bevindinge wat gelei het tot inisiatiewe om produksie te verbeter is verdeel tussen produktiwiteitsverbetering en risikobeheer. Die waarde van die inisiatiewe is bereken met die gebruik van ontwikkelde metodes en in beide gevalle was die resultate baie positief. Ondersteuning by besluitneming. Die "Close-Out Meeting"-proses het somtyds gely tot analise wat nie aanieiding gegee het tot korrektiewe aksie nie, maar wel daartoe gelei het dat bestuur se begrip van besigheidsrealiteit verbeter het. Daar is bewys dat 'n proses wat besigheidsinformasie aan bestuur kan weergee ter ondersteuning van bestuursbesluite, waardevol is. Die mate van voordeel wat uit die proses stem is vergroot deur die waarde-analise uit te brei sodat dit meer is as die blote analise van korrektiewe aksie. Die berekende voordeel uit die "Close-Out Meeting"-proses is groter wanneer die hestek van die voordeel vergroot word om meer as net die direkte waarde van korrektiewe aksie in te sluit. Die studie het voldoen aan verskeie doelwitte. Daar is bewys dat bestuursaksie 'n wetenskaplike basis het en die uitvoer van hierdie aksies besigheidswaarde toevoeg. As gevolg hiervan kon die besigheid "Close-Out Meetings" in die regte konteks plaas en tot die slotsom kom dat hierdie proses 'n fundamentele drywer van besigheidsukses is. Ten slotte is die teorie oor "Close-Out Meetings" uitgebrei en die resultate het ook die waarde onderskryf wat Nampak uit sy ERP-implementasie gekry het. "Close-Out Meetings" by Nampak Flexible het duidelike meetbare voordele opgelewer wanneer die probleme wat geidentifiseer is gelei het tot korrektiewe aksie. Die waarde was van so 'n aard dat die belangrikheid van "Close-Out Meetings" as 'n komponent van goeie vervaardigingsbestuur in 'n ERP-konteks duidelik bewys is.
|
297 |
En kvalitativ undersökning av professionella socialarbetares konstruktioner av kvinnomisshandel / A qualitative study of professional social workers constructions of domestic violenceDahlström, Charlotte, Hammar Nyblom, Anna January 2014 (has links)
Syftet med undersökningen var att utifrån beskrivningar från professionella socialarbetare, som arbetat med kvinnor som varit utsatta för mäns partnervåld, analysera vilka konstruktioner dessa professionella socialarbetare hade av den här klientgruppens situation. Frågeställningen var vilka konstruktioner ett urval av professionella socialarbetare, som arbetat med kvinnor som varit utsatta för mäns partnervåld, hade. Frågeställningen var fokuserad på följande teman: kvinnans livsvärld, förhållandet till mannen, våldet i relationen och faktorer för att stanna kvar i- respektive faktorer för att lämna förhållandet. Metoden var semistrukturerade kvalitativa intervjuer. Fem professionella socialarbetare från olika kvinnojourer och socialtjänster intervjuades. Resultaten analyserades utifrån ett socialkonstruktionistiskt perspektiv samt med stöd från tidigare forskning. Undersökningens viktigaste resultat och slutsats var att de professionella socialarbetarnas konstruktion av den misshandlade kvinnans situation var att hela kvinnans livsvärld påverkades negativt av mannens misshandel. Kvinnan var ambivalent i sitt förhållningssätt till mannen och hon levde hela tiden på hoppet om att mannen skulle förändra sig. Kvinnan upplevde inte våldet som något normalt och hon gjorde alltid på något sätt motstånd mot våldet. / The aim of this study was to analyze the social constructions social workers formed as result of working with women who had been victims of male partner violence. The social constructions analyzed came from the social workers descriptions of the client group’s situation. The question addressed was what social constructions a selection of social workers had that had worked with women who experienced violent abuse from men that they lived in a relationship with. The question was focused on the following themes: the women´s life conditions, the relationship to the man, the violence in the relationship, and what the factors affected whether the woman stayed or left the abusive relationship. The method used was semi-structured qualitative interviews. Five professional social workers from different shelters and social services institutions were interviewed. The interviews were analyzed from a social constructionist perspective with support from earlier research in the area. The most important finding from the study, and conclusion, was that the social constructions the professional social workers made from working with the abused woman was that the entire life situation of the abused women was negatively affected by the abuse from the man. The abused women were ambivalent in their approach to the abusive man, and they lived on the hope that the abusive man would change his abusive ways. The women did not experience the violence as something normal and they always resisted the violence in some way.
|
298 |
open / close: assimilating immersive spaces in visual communicationSarin, Anika 01 January 2017 (has links)
I am interested in two spaces obverse to each other: open and closed. An open space develops organically based on how people inhabit it. Interacting with an open space is a dynamic, sporadic, multisensory, immersive, and subjective experience. In such spaces, we are confronted with an alternative aesthetic, one that is in conflict with the seamlessness of a closed space. A closed space is anchored on definite variables like structure, use and boundaries. While interaction between people and space is important, the space is tightly controlled and interaction is designed. Through this thesis project, I present a method that metaphorically transforms the experience of a walk through a closed space into an open-ended and immersive experience.
When space develops as a response to our actions, it affords intimacy and a sense of belonging. It facilitates deeper expressiveness through engagement. By applying a method that uses fragmentation, recurrence and motion, I am metaphorically transforming an urban closed space to open. Through this transformation I am creating a fresh person-space dialogue that temporarily destabilizes perception and encourages physical sensation which allows for an intimate experience of the space. An immersive interaction with an open space transgresses the urban sterility of a closed space and is capable of creating a diversity of distinct experiences.
|
299 |
Razvoj modela internih kontrolnih mehanizama u funkciji upravljanja preduzećem / Development of the Models of Internal Control Mechanisms for the Purpose of Company ManagementŽivkov Emil 16 July 2015 (has links)
<p>Kvalitetna postavka kombinacije internih kontrolnih mehanizama, u značajnoj meri oredeljuje i kvalitet samog kontrolnog okruženja preduzeća. Ovim istraživanjem je potvrđena činjenica da kvalitetno kontrolno okruženje značajno doprinosi dobrom upravljanju ciljevima i rizicima. Centralno mesto u procesu korporativnog upravljanja zauzimaju interni kontrolni mehanizmi koncentrisani u procesu upravljanja rizicima. Interni kontrolni mehanizmi upotrebom svojih kontrolnih „alata“, olakšavaju procenu rizika, njegovo prepoznavanje i merenje. Svako iz svog ugla: računovodstvo, kontroling, Fast Close, ERP (Enterprise Resource Planning ), IMS (Integrisani sistemi menadžmenta) , finansijsko upravljanje i kontrola, ERM (Enterprise Risk Management) i interna revizija, su značajni elementi internih kontrolnih mehanizama, u procesu</p> / <p>Creating a right combination of internal control mechanisms, to a large extent, also determines the quality of a company’s control environment. This research has confirmedthe fact that an efficient control environment significantly contributes to proper management of goals and risks. The central place in the process of corporate governance belongs to internal control mechanisms centered in the process of risk management. Internal control mechanisms, by using their control "tools", facilitate the risk assessment, its identification and measurement. Everyone from their own perspective: accounting, controlling, Fast Close, ERP (Enterprise Resource Planning), IMS (Integrated Management Systems), financial management and control, ERM (Enterprise Risk Management) and internal audit, are important elements of internal control mechanisms in the process of managing the key financial and operational risks.</p>
|
300 |
Topologically close-packed phase prediction in Ni-based superalloys : phenomenological structure maps and bond-order potential theorySeiser, Bernhard Josef January 2011 (has links)
Single crystal nickel-based superalloys are used in modern gas turbines because of their remarkable resistance to creep deformation at elevated temperatures, which is ensured by the addition of significant amounts of refractory elements. Too high concentrations of refractory elements can lead to the formation of topologically-close packed (TCP) phases during exposure to conditions of high temperature and stress which result in the degradation of the creep properties. The traditional methods for predicting the occurrence of TCP phases in Ni-based superalloys have been based on the PHACOMP and newPHACOMP methodologies which are well-known to fail with respect to new generations of alloys. In this work a novel two-dimensional structure map (Nbar, deltaV/V) for TCP phases where Nbar is the valence-electron count and deltaV/V is a compositional dependent size factor. This map is found to separate the experimental data on the TCP phases of binary, ternary and multi-component TCP phases into well-defined regions corresponding to different structure types such as A15, sigma, chi, delta, P, R, mu, and Laves. In particular, increasing size factor separates the A15, sigma and chi phases from the delta, P, R, mu phases. The structure map is then also used in conjunction with CALPHAD computations of sigma phase stability to show that the predictive power of newPHACOMP for the seven component Ni–Co–Cr–Ta–W–Re–Al system is indeed poor. In order to gain a microscopic understanding of the observed structural trends, namely the differences between the two groups of TCP structures with increasing deltaV/V and the trend from A15 to sigma to chi with increasing Nbar, the electronic structure is coarse-grained from density functional theory (DFT) to tight-binding to bond-order potentials (BOPs). First, DFT is used to calculate the structural energy differences across the elemental 4d and 5d transition metal series and the heats of formation of the binary alloys Mo-Re, Mo-Ru, Nb-Re, and Nb-Ru. These calculations show that the valence electron concentration stabilizes A15, sigma and chi but destablizes mu and Laves phases. The latter are shown to be stabilized instead by relative size difference. Second, a simple canonical TB model and in combination with the structural energy difference theorem is found to qualitatively reproduce the energy differences predicted by the elemental DFT calculations. The structural energy difference theorem rationalizes the importance of the size factor for the stability of the mu and Laves binary phases as observed in the structure map and DFT heats of formation. Finally, analytic BOP theory, is employed to identify the structural origins of the energetic differences between TCP structure-types that lead to the trends found within the two-dimensional structure map.
|
Page generated in 0.0569 seconds