Mobile E-Health Record, is it a “Frankenstein IT system” ?

This paper is a personal reflection as a part of portfolio assignment http://mahara.uowplatform.edu.au/view/view.php?id=60393 on SNPG950- Reflection for practice, UOW School of Nursing

This paper is a personal reflection on Information Technology (IT) in the documentation of nursing care in Indonesia and uses a framework proposed by Rolfe (2001).

Continue reading “Mobile E-Health Record, is it a “Frankenstein IT system” ?”

Mobile E-Health Record, is it a “Frankenstein IT system” ?

GENDER CONSTRUCTION IN VISUAL IMAGES IN TEXTBOOKS FOR PRIMARY SCHOOL STUDENTS

If you are interested in researching visual grammar analysis, please have a look at the one that I did with primary school textbook for teaching English in Indonesia.

Abstract

In the Indonesian context, little has been done to raise awareness of political correctness in gender matters in school textbooks. As an attempt to fill this gap, I conducted a textual analysis on four English language textbooks used in Indonesian primary schools. The focus of the study was on the pictorial texts accompanying the linguistic ones. The ‗Visual Grammar‘, developed by Kress and van Leeuwen, was used as the framework of analysis. The results showed that the illustrations accompanying linguistic texts fortified the representations of gender asymmetry. Females were depicted more dependent than males and were also construed to be admirers of an action carried out by the males. The study recommended conscious efforts to value both genders equally in visualization as meaning construction is multimodal.

Keywords: gender construction, visual grammar, pictorial texts, EFL textbooks Continue reading “GENDER CONSTRUCTION IN VISUAL IMAGES IN TEXTBOOKS FOR PRIMARY SCHOOL STUDENTS”

GENDER CONSTRUCTION IN VISUAL IMAGES IN TEXTBOOKS FOR PRIMARY SCHOOL STUDENTS

Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy

members-only

This paper was accepted in the 27th Australasian Conference on Information Systems, Wollongong (December 2016).

Cite it as:

Azmi, R., Tibben, W., and Win, K. T. 2016. “Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy,” in Australasian Conference on Information Systems, Wollongong.

Abstract

Defining the factors that give rise to National Cyber Security Strategy (NCSS) has the potential to better understand information security in a global context. Considering the large number of countries that have developed NCSS, the paper seeks to define common motives that enable NCSS development to be understood as public policy phenomenon.  In order to achieve this, the paper employs qualitative coding to review the NCSS of 54 countries.  Descriptive coding is used to distill common motives, and then pattern coding is employed to develop themes as a way to explain the development and adoption of cyber security strategies by governments. The themes are National Security, Jurisprudence, and Politics. Enabling greater clarity in the motives that lead to cyber security strategies provides policymakers and scholars with additional insights into the development of initiatives that aim to take advantage of the opportunities presented by cyberspace while mitigating its security threats.

Keywords Cyber Space, Cyber Security, Cyber Security Strategy, Cyber Security Strategy Motives, National Cyber Security Strategy, Information Security.

Continue reading “Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy”

Motives behind Cyber Security Strategy Development: A Literature Review of National Cyber Security Strategy