69 resultados para outsider-insider


Relevância:

60.00% 60.00%

Publicador:

Resumo:

This chapter discusses research undertaken for a PhD in dance, highlighting the oscillating and ambivalent nature of practice-led research methods. Holding an unusual position within the field of practice-led research in dance, the researcher adopted the role of dancer within four creative processes led by four choreographers. Although instigating and leading this research, the author produced new knowledge of dancing practices whilst being directed creatively by the choreographers in the research environment. In line with many definitions of practice-led research, the methods used were emergent from the research arena and responsive to the requirements of the project. Deeply imbricated in the research environment, the researcher used her embodied self as a research tool, as the one who participated, discovered and recorded. This outsider/insider role of researcher/participant produced a series of meta-positions, leading to a mixed-modal outcome that encompassed live performance, a movement treatise and a written thesis.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

An electricity demand reduction project based on comprehensive residential consumer engagement was established within an Australian community in 2008. By 2011, both the peak demand and grid supplied electricity consumption had decreased to below pre-intervention levels. This case study research explored the relationship developed between the utility, community and individual consumer from the residential customer perspective through qualitative research of 22 residential households. It is proposed that an energy utility can be highly successful at peak demand reduction by becoming a community member and a peer to residential consumers and developing the necessary trust, access, influence and partnership required to create the responsive environment to change. A peer-community approach could provide policymakers with a pathway for implementing pro-environmental behaviour for low carbon communities, as well as peak demand reduction, thereby addressing government emission targets while limiting the cost of living increases from infrastructure expenditure.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Through an account of prevailing experiences of art and mental illness, this paper aims to raise awareness, open dialogue and create agency about art created by people with experience of mental illness. Methods This paper draws on personal narrative and inquiry by an artist with mental illness and data collected as part of a larger participatory action research project that investigated understandings of identity, art and mental illness. Result An inquiry through art raised awareness and attentiveness to the importance of choice in identity construction and exposed frequent dichotomies in art and mental illness that were negotiated to eschew prescribed social stratification. As an artist, the first author challenged values present in one idea and absent in the other, and the options and concessions available to authorise her own dialogue and agency of being an artist. Conclusion Constructing an identity is an important part of being human, the labels that we choose or are chosen for us attribute to our identity. Reflections and recommendations are offered to consider expanded ways of thinking about art and mental illness and the functions that art play in identity construction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In australia, 'Aboriginality' is often defined by people in constrictive ways that are heavily influenced by the coloniser's epistemological frameworks. An essential component of this is a 'racial' categorisation of peoples that marks sameness and difference, thereby influencing insider and outsider status. In one sense, this categorisation of people acts to exclude non-aboriginal 'others' from participation in preinvasion indigenous ontologies, ways of living that may not have contained such restrictive identity categories and were thereby highly inclusive of outsiders. One of the effects of this is that aboriginal peoples' efforts for 'advancement' - either out of 'disadvantage' and/or towards political independence (ie, sovereignty) - become confined and restricted by what is deemed possible within the coloniser's epistemological frameworks. This is so much so that aboriginal people are at risk of only reinforcing and upholding the very systems that resulted in their original and continuing dispossession.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce multiple-control fuzzy vaults allowing generalised threshold, compartmented and multilevel access structure. The presented schemes enable many useful applications employing multiple users and/or multiple locking sets. Introducing the original single control fuzzy vault of Juels and Sudan we identify several similarities and differences between their vault and secret sharing schemes which influence how best to obtain working generalisations. We design multiple-control fuzzy vaults suggesting applications using biometric credentials as locking and unlocking values. Furthermore we assess the security of our obtained generalisations for insider/ outsider attacks and examine the access-complexity for legitimate vault owners.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: This paper aims to show that identification of expectations and software functional requirements via consultation with potential users is an integral component of the development of an emergency department patient admissions prediction tool. ---------- Design/methodology/approach: Thematic analysis of semi-structured interviews with 14 key health staff delivered rich data regarding existing practice and future needs. Participants included emergency department staff, bed managers, nurse unit managers, directors of nursing, and personnel from health administration. ---------- Findings: Participants contributed contextual insights on the current system of admissions, revealing a culture of crisis, imbued with misplayed communication. Their expectations and requirements of a potential predictive tool provided strategic data that moderated the development of the Emergency Department Patient Admissions Prediction Tool, based on their insistence that it feature availability, reliability and relevance. In order to deliver these stipulations, participants stressed that it should be incorporated, validated, defined and timely. ---------- Research limitations/implications: Participants were envisaging a concept and use of a tool that was somewhat hypothetical. However, further research will evaluate the tool in practice. ---------- Practical implications: Participants' unsolicited recommendations regarding implementation will not only inform a subsequent phase of the tool evaluation, but are eminently applicable to any process of implementation in a healthcare setting. ---------- Originality/value: The consultative process engaged clinicians and the paper delivers an insider view of an overburdened system, rather than an outsider's observations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the claims made for valuing the voices of marginalised students is that an insider perspective can be revealed on student issues and the ways in which education policies and systems impact on them. This chapter examines the ways in which participants in an Australian ‘students-as-researchers’ (SaR) project were able to raise knowledge of and address, to some extent, long-standing issues of racism in their schools. The SaR project has operated in more than thirty schools for periods of one to five years. Based on a participatory action research model, groups of secondary school students from schools serving socio-economically disadvantaged communities have worked with nominated teachers and university researchers to identify and research local issues relating to low academic outcomes and to develop and enact responses to the identified concerns. The voices of marginalised students quoted in this chapter illustrate that important insider knowledge can be revealed through the SaR process. Where student views have been acknowledged and acted on by the schools, significant change to student-teacher relationships and school culture has been achieved; the participants have been personally empowered and academic improvements across the schools have been noted. For such change to occur, however, a culture of mutual respect must be created in which teachers and school administrators value students’ views and are open to the possibility of unfavourable criticism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long-term secret key of a protocol participant A does not allow the adversary to impersonate an honest participant B to A. In this paper, we argue that KCI resilience for GKE protocols is at least as important as it is for 2PKE protocols. Our first contribution is revised definitions of security for GKE protocols considering KCI attacks by both outsider and insider adversaries. We also give a new proof of security for an existing two-round GKE protocol under the revised security definitions assuming random oracles. We then show how to achieve insider KCIR in a generic way using a known compiler in the literature. As one may expect, this additional security assurance comes at the cost of an extra round of communication. Finally, we show that a few existing protocols are not secure against outsider KCI attacks. The attacks on these protocols illustrate the necessity of considering KCI resilience for GKE protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using Elias and Scotson's (1994) account of established-outsider relations, this article examines how the organisational capacity of specific social groups is significant in determining the quality of crime-talk in isolated and rural settings. In particular, social 'oldness' and notions of what constitutes 'community' are significant in determining what activities and individuals are salient within crime-talk. Individual and gorup interviews, conducted in a West Australian mining town, revealed how crime-talk is an artefact of specific social figurations and the relative ability of groups to act as cohesive and integrated networks. We argue that anxieties regarding crime are a product of specific social figurations and the shifting power ratios of groups within such figurations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A considerable body of knowledge has been constructed perpetuating the notion single parenthood is a significant problem for society, and while this is supported by specific research designs and sampling practices, it is also maintained by two key discourses. The first constitutes single parenthood as a deficit, while the second identifies it as a risk. In both cases, these discourses are operationalised by the philosophy of neo-liberalism, which envisions good citizenship as economic autonomy. Historically, it has been the convergence of the risk and deficit discourses that has constituted single parenthood as a social problem. More recently, however, risk discourses have come to dominate thinking about single parenthood. As a result, this thesis terms risk discourses as dominant discourses. As dominant discourses, risk sidelines or discounts other ways of thinking about single parenthood. While a few exceptions are notable, including some feminist, poststructural and family resilience scholars, most researchers appear unable to see past the positioning of these discourses and envision another way of being for parents who are single. This means that alternative subjectivities are obscured and have limited influence in this field of research. Because this thesis aimed to problematise dominant subjectivities of single parenthood, a poststructural Foucauldian framework has been utilized in order to document the discursive constructions of single parenthood through literature, insider discourses, and outsider discourses. For the purposes of this thesis, outsider discourses are constituted as those outside the subjectivities of single parenthood, such as media and research discourses. An examination of the Australian media has been undertaken over a one year period, the results of which form the basis for the analysis of media discourses of single parenthood. Parents who are single were also targeted for self selection into this project to provide insider discourses about single parenthood. This analysis explored how respondents negotiated the discourses of single parenthood and how they themselves used or rejected the subjectivities constructed for them via these discourses to constitute their own subjectivities. This thesis aimed to explore the role of discourses in the construction of individuals' subjectivities. Specifically, it draws attention to the way in which knowledge and power work through discourses to emphasize what is allowable, both publicly and privately, in relation to single parenthood. Most importantly, this thesis offers alternative subjectivities for single parenthood to facilitate new ways of thinking about parents who are single.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

J.W.Lindt’s Colonial man and Aborigine image from the GRAFTON ALBUM: “On chemistry and optics all does not depend, art must with these in triple union blend” (text from J.W. Lindt’s photographic backing card) In this paper, I follow an argument that Lindt held a position in his particular colonial environment where he was simultaneously both an insider and an outsider and that such a position may be considered prerequisite in stimulating exchange. A study of the transition of J.W. Lindt in Grafton, N.S.W. in the 1860s from a traveller to a migrant and subsequently to a professional photographer, as well as Lindt’s photographic career, which evolved through strategic action and technical approaches to photography, bears witness to his cultural relativity. One untitled photograph from this period of work constructs a unique commentary of Australian colonial life that illustrates a non-hegemonic position, particularly as it was included in one of the first albums of photographs of Aborigines that Lindt gifted to an illustrious person (in this case the Mayor of Grafton). As in his other studio constructions, props and backdrops were arranged and sitters were positioned with care, but this photograph is the only one in the album that includes a non-Aborigine in a relationship to an Aborigine. An analysis of the props, technical details of the album and the image suggests a reconciliatory aspect that thwarts the predominant attitudes towards Aborigines in the area at that time.