252 resultados para Notions of security
Resumo:
This is the first of two papers that map (dis)continuities in notions of power from Aristotle to Newton to Foucault. They trace the ways in which bio-physical conceptions of power became paraphrased in social science and deployed in educational discourse on the child and curriculum from post-Newtonian times to the present. The analyses suggest that, amid ruptures in the definition, role, location and meaning given 'power' historically in various 'physical' and 'social' cosmologies, the naming of 'power' has been dependent on 'physics', on the theorization of motion across 'Western' sciences. This first paper examines some (dis)continuities in regard to histories of motion and power from Aristotelian 'natural science' to Newtonian mechanics.
Resumo:
This paper argues that Michel Foucault’s lectures that form The Birth of Biopolitics owe a considerable debt to the thought of Max Weber, particularly in their analysis of how different socio-legal regimes shape distinctive national forms of capitalist economies, and the role that is played by social and economic institutions in the shaping of individual identities. This is in contrast to a common interpretation of Foucault’s account of neoliberalism, which synthesizes his work into neo-Marxist notions of hegemony and capitalist domination. It also identifies Foucault’s approach to neoliberalism as an exploratory one, which considers insights into how a particular relationship between ideas and institutional practices may help in imagining socialist forms of government practice.
Resumo:
Secure communication channels are typically constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties and establishes shared secret keys, and a secure data transmission layer, which uses the secret keys to encrypt data. We address the partial leakage of communicating parties' long-term secret keys due to various side-channel attacks, and the partial leakage of plaintext due to data compression. Both issues can negatively affect the security of channel establishment and data transmission. In this work, we advance the modelling of security for AKE protocols by considering more granular partial leakage of parties' long-term secrets. We present generic and concrete constructions of two-pass leakage-resilient key exchange protocols that are secure in the proposed security models. We also examine two techniques--heuristic separation of secrets and fixed-dictionary compression--for enabling compression while protecting high-value secrets.
Resumo:
This 'project' investigates Janet Cardiff's Whispering Room. It examines how Cardiff deconstructs the privileging of the visual over all other corporeal senses in her work, the Whispering Room. Using sound as a fulcrum, Cardiff explores the links between subjects, collective narratives, memories, experiences and performances. Janet Cardiff destabilizes time and space and fractures the continuum through the use of sound. My 'project' celebrates sound as a transgressive medium — sound not as a gendered medium but as a vehicle in which to speak (to) gender. It explores how sound can destabilize notions of perception and reception and question art and museal practices. In the process this 'project' reveals the complexity of interpreting and representing art as an object. My aim is to reflect the very intertextual and expressionist collage that Cardiff has created in Whispering Room in my own text. Cardiff solicits the viewer's intimacy and participation. Whispering Room is a physical yet metonymic space in which Cardiff creates a place for performatvity, experience, memory, desire and speech, thus she opens up a space for the utterance and performance of the viewer. Viewers construct and create meaning/s for themselves within this mnemonic space by digging up their own memories, desires and reveries. The strength of Cardiff's work is that it relies on a viewer to perform, a body to trigger the pseudo-spectacle and a voice to interrupt the whispers. One might ask of Whispering Room where the illusionistic space begins and where the physical space ends. This 'project' investigates how in Whispering Room there is no one experience but many experiences.
Resumo:
Cannabis is the most prolifically used illicit drug in Australia, however, there is a gap in our understanding concerning the social interactions and friendships formed around its supply and use. The authors recruited cannabis users aged between 18 and 30 years throughout Australia, to explore the impact of supply routes on young users and their perceived notions of drug dealing in order to provide valuable insight into the influence that reciprocal relationships have on young people’s access to cannabis. Findings reveal that the supply of cannabis revolves around pre-existing connections and relationships formed through associates known to be able to readily source cannabis. It was found that motivations for proffering cannabis in a shared environment were related more to developing social capital than to generating financial gain. Given this, often those involved in supply do not perceive that they are breaking the law or that they are ‘dealers’. This social supply market appears to be built on trust and social interactions and, as such, presents several challenges to law enforcement. It is suggested that there would be benefit in providing targeted education campaigns to combat social supply dealing among young adults.
Resumo:
While cannabis is the most prolifically used illicit drug in Australia, there is a gap in our understanding concerning the social interactions and friendships formed around its supply and use. The authors recruited cannabis users aged between 18 and 30 years throughout Australia, to explore the impact of supply routes on young users and their perceived notions of drug dealing in order to provide valuable insight into the influence that reciprocal relationships have on young people’s access to cannabis. Findings reveal that the supply of cannabis revolves around pre-existing connections and relationships formed through associates known to be able to readily source cannabis. It was found that motivations for proffering cannabis in a shared environment were related more to developing social capital than to generating financial gain. Given this, often those involved in supply do not perceive that they are breaking the law or that they are ‘dealers’. This social supply market appears to be built on trust and social interactions and, as such, presents several challenges to law enforcement. It is suggested that there would be benefit in providing targeted education campaigns to combat social supply dealing among young adults.
Resumo:
This paper argues that the Panopticon is an accurate model for and illustration of policing and security methods in the modern society. Initially, I overview the theoretical concept of the Panopticon as a structure of perceived universal surveillance which facilitates automatic obedience in its subjects as identified by the theorists Jeremy Bentham and Michel Foucault. The paper subsequently moves to identify how the Panopticon, despite being a theoretical construct, is nevertheless instantiated to an extent through the prevalence of security cameras as a means of sovereignly regulating human conduct; speeding is an ordinary example. It could even be contended that increasing surveillance according to the model of the Panopticon would reduce the frequency of offences. However, in the final analysis the paper considers that even if adopting an approach based on the Panopticon is a more effective method of policing, it is not necessarily a more desirable one.
Resumo:
In this paper we draw on current research to explore notions of a socially just Health and Physical Education (HPE), in light of claims that a neoliberal globalisation promotes markets over the states, and a new individualism that privileges self-interest over the collective good. We also invite readers to consider United Nations Educational, Scientific and Cultural Organization’s ambition for PE in light of preliminary findings from an Australian led research project exploring national and international patterns of outsourcing HPE curricula. Data were sourced from this international research project through a mixed method approach. Each external provider engaged in four phases of research activity: (a) Web-audits, (b) Interviews with external providers, (c) Network diagrams, and (d) School partner interviews and observations. Results We use these data to pose what we believe to be three emerging lines of inquiry and challenge for a socially just school HPE within neoliberal times. In particular our data indicates that the marketization of school HPE is strengthening an emphasis on individual responsibility for personal health, elevating expectations that schools and teachers will “fill the welfare gap” and finally, influencing the nature and purchase of educative HPE programs in schools. The apparent proliferation of external providers of health work, HPE resources and services reflects the rise and pervasiveness of neoliberalism in education. We conclude that this global HPE landscape warrants attention to investigate the extent to which external providers’ resources are compatible with schooling’s educative and inclusive mandates.
Resumo:
At any given time in the field of early childhood, there are discourses at play, producing images of children, and these ways of seeing children might be competing, colliding and/or complementing each other. It is fairly widely accepted that in many countries there are versions of dominant discourses that shape and are shaped by current practices in the field of early childhood. These include (1) romantic notions of children running free and connecting with nature and (2) the ‘Bart Simpson’ version of the naughty, cute or savage child, untamed and in need of civilising. These are far from being the only two discursive constructions of children present in current policies and practices. If early childhood professionals are to be active in shaping and implementing policies that affect their work and workforce, it is important that they are aware of the forces at play. In this article, we point to another powerful discourse at play in the Australian context of early childhood education, the image of children as economic units: investments in the future. We show how a ‘moment of arising’ in contemporary policy contexts, dominated by neoliberal principles of reform and competition, has charged early childhood educators in Australia with the duties of a ‘broker’, ensuring that young children are worth the investment. In this article, we begin with (1) a key policy document in early childhood education in Australia and examine the discursive affordances which shape the document. Next, (2) we pinpoint the shifts in how the work of child care is perceived by interrogating this key policy document through a methodology of discursive analysis. We then turn attention (3) to the work of this policy document along with other discourses which directly affect images of children and the shaping role these have on the work of educators. We conclude with (4) a consideration of how the work of early childhood professionals has come to be shaped by this economic discourse, and how they are being required to both work within the policy imperatives and likely to resist this new demand of them.
Resumo:
A Delay Tolerant Network (DTN) is a dynamic, fragmented, and ephemeral network formed by a large number of highly mobile nodes. DTNs are ephemeral networks with highly mobile autonomous nodes. This requires distributed and self-organised approaches to trust management. Revocation and replacement of security credentials under adversarial influence by preserving the trust on the entity is still an open problem. Existing methods are mostly limited to detection and removal of malicious nodes. This paper makes use of the mobility property to provide a distributed, self-organising, and scalable revocation and replacement scheme. The proposed scheme effectively utilises the Leverage of Common Friends (LCF) trust system concepts to revoke compromised security credentials, replace them with new ones, whilst preserving the trust on them. The level of achieved entity confidence is thereby preserved. Security and performance of the proposed scheme is evaluated using an experimental data set in comparison with other schemes based around the LCF concept. Our extensive experimental results show that the proposed scheme distributes replacement credentials up to 35% faster and spreads spoofed credentials of strong collaborating adversaries up to 50% slower without causing any significant increase on the communication and storage overheads, when compared to other LCF based schemes.
Resumo:
We propose two public-key schemes to achieve “deniable authentication” for the Internet Key Exchange (IKE). Our protocols can be implemented using different concrete mechanisms and we discuss different options; in particular we suggest solutions based on elliptic curve pairings. The protocol designs use the modular construction method of Canetti and Krawczyk which provides the basis for a proof of security. Our schemes can, in some situations, be more efficient than existing IKE protocols as well as having stronger deniability properties.
Resumo:
This paper describes a design game that we called 'Meaning in Movement'. The purpose was to explore notions of professional dental practice with dental practioners in terms of gestures, actions and movements. The game represents a first step towards involving gestures, actions and movements in a design dialog with practioners for the purpose of designing future interactive systems which are more appropriate to the type of skilful actions and richly structured environments of dentists and dental assistants.
Resumo:
Solo exhibition of sculptural works that use the portrait bust as a vehicle for problematising notions of subjectivity, authority and representation. The exhibition comprised three life-sized figurative busts, each portraits of the artist, sparsely positioned throughout the gallery space to convey a sense of isolation and abandonment. By emphasising the fragmented nature of the bust format by removal of all supports (ie. Socle, plinth or alcove) the works sought to address the vulnerability that frmes this apparently authoritative Enlightenment portrait format. In so doing the exhibition aimed to offer, by example, a new way of seeing and interpreting the portrait bust in history. The exhibition was exhibited at the Institute of Modern Art (Brisbane) and the Perth Institute of Contemporary Arts. Works fro the exhibition were included in group shows at Linden Centre for Contemporary Arts, Ballarat Fine Art Gallery. Work from the exhibition was purchased for the collection of MONA, Hobart.The exhibition received favourable reviews in Eyeline, Art and Australia and Machine magazines.
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
Medeleven was a practice-based research work that challenged conventional notions of how audiences ‘experience’ contemporary dance. It resulted in a 40 minute ‘experiential’ performance that inverted the traditional ‘passive’ presentation paradigm by situating the audience centrally within the creative process. The ‘traditional presentation paradigm’ was inverted in numerous ways including: asking the audience onstage with the performers, placing swings onstage for the audience to play on during the performance and guiding the audience through backstage corridors before entering onstage – all of which added elements of physicality, agency and liminality to the performance not usually available to audience members of contemporary dance. Five dancers moved throughout the space allowing the audience to choose where and how they engaged with this work and the swings were utilised both as a performance space and for audience seating. In addition to these spatial variations, the quadraphonic soundscore created distinct ‘environments’ throughout the stage space that varied individual experience possibilities. By positing performance as an experiential phenomenon, the pivotal objective of this work was to create a live-art experience that extended its performativity to include audience members as active meaning-makers, challenging both their role within this paradigm and their expectations of contemporary dance. The work produced strong responses from the audience with surveys indicating the presentation format, as well as the construction of the work, changed audience experience and ability to connect with the dance work. The research suggested that, in addition to existing research on dance audiences, barriers to engagement with contemporary dance may include how the art is constructed and where the audience is positioned within that creative framework. The research builds upon artistic practices being undertaken throughout the world that challenge the notion of existing ‘passive’ performance paradigms via creative ‘engagement’ with audience.