313 resultados para identity-narrative
Resumo:
The World Wide Web constitutes one of the most important inventions of the late 20th century: it has changed culture, society, business, communication, politics, and many other fields of human endeavour, not least also by providing a more user-friendly pathway of access to its major underlying technology, the Internet itself. Key phases in its development can be charted, especially by how it has been used to present and share information – and here, the personal or professional, private or official homepage stands in as a useful representation of wider Web trends overall. From hand-coded beginnings through several successive stages of experimentation and standardisation, to the shifting balance between personal sites and social networks, the homepage demonstrates how the Web itself, and its place in our lives, have changed.
Resumo:
Schizophrenia is often characterised by diminished self-experience. This article describes the development and principles of a manual for a psychotherapeutic treatment model that aims to enhance self-experience in people diagnosed with schizophrenia. Metacognitive Narrative Psychotherapy draws upon dialogical theory of self and the work of Lysaker and colleagues, in conjunction with narrative principles of therapy as operationalised by Vromans. To date, no manual for a metacognitive narrative approach to the treatment of schizophrenia exists. After a brief description of narrative understandings of schizophrenia, the development of the manual is described. Five general phases of treatment are outlined: (1) developing a therapeutic relationship; (2) eliciting narratives; (3) enhancing metacognitive capacity; (4) enriching narratives, and; (5) living enriched narratives. Proscribed practices are also described. Examples of therapeutic interventions and dialogue are provided to further explain the application of interventions in-session. The manual has been piloted in a study investigating the effectiveness of Metacognitive Narrative Psychotherapy in the treatment of people diagnosed with schizophrenia spectrum disorders.
Resumo:
This paper examines the practice of handover in a large metropolitan hospital. It shows that the handover is a significant site at which to examine how tensions and imperatives derived from the traditional institutional position and role of the nurse are played out in contradiction with emergent professionalism. It identifies handover dimensions and focuses discussion on how the collective narrative of the handover serves to construct patient identities as well as ensure solidarity and cohesion among nurses.
Resumo:
This paper presents the main findings of a narrative examination of higher court sentencing remarks to explore the relationship between Indigeneity and sentencing for female defendants in Western Australia. Using the theoretical framework of focal concerns, we found that key differences in the construction of blameworthiness and risk between the sentencing stories of Indigenous and non-Indigenous female offenders, through the identification of issues such as mental health, substance abuse, familial trauma and community ties. Further, in the sentencing narratives, Indigenous women were viewed differently in terms of social costs of imprisonment.
Resumo:
A review of the 6th APT focusing on the work and performance of Rohan Wealleans
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
On 3 February 2011, Cyclone Yasi struck the coast of North Queensland, causing widespread damage. The cyclone destroyed the small coastal town of Cardwell, about 165 kilometres north of Townsville, Queensland. This chapter serves as a case study of a collaborative outreach project mobilised in response to this disaster in North Queensland. A public history research team, consisting of practitioners from the Queensland University of Technology’s Creative Industries Faculty, with the support of the Oral History Association of Australia, Queensland branch, partnered with the Cardwell and District Historical Society to support the society to collect community narratives in the wake of Cyclone Yasi.
Resumo:
Cyclone Yasi struck the Cassowary Coast of Queensland in the early hours of Feb 3, 2011, destroying many homes sand property, including the destruction of the Cardwell and district historical society’s premises. With their own homes flattened, many were forced to live in mobile accommodation, with extended family, or leave altogether. The historical society members however were more devastated by their flattened foreshore museum and loss of their collection material. A call for assistance was made through the OHAA Qld branch, who along with QUT sponsored a trip to somehow plan how they could start to pick up the pieces to start again. This presentation highlights the need for communities to gather, preserve and present their own stories, in a way that is sustainable and meaningful to them, but that good advice and support along the way is important. Two 2 day workshops were held in March and then September, augmented by plenty of email correspondence and phone calls in between. Participants learnt that if they could conduct quality oral history interviews, they could later use these in many exhibitable ways including: documentary pieces; digital stories; photographic collections; creative short stories; audio segments –while also drawing closely together a suffering community. This story is not only about the people who were interviewed about the night Yasi struck, but the amazing women (all over 50) of the historical society who were willing to try and leap the digital divide that faces older Australians, especially those in rural Australia, so that their older local stories would not be lost and so that new stories could also be remembered.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
Previous studies have enabled exact prediction of probabilities of identity-by-descent (IBD) in randommating populations for a few loci (up to four or so), with extension to more using approximate regression methods. Here we present a precise predictor of multiple-locus IBD using simple formulas based on exact results for two loci. In particular, the probability of non-IBD X ABC at each of ordered loci A, B, and C can be well approximated by XABC = XABXBC/XB and generalizes to X123. . .k = X12X23. . .Xk-1,k/ Xk-2, where X is the probability of non-IBD at each locus. Predictions from this chain rule are very precise with population bottlenecks and migration, but are rather poorer in the presence of mutation. From these coefficients, the probabilities of multilocus IBD and non-IBD can also be computed for genomic regions as functions of population size, time, and map distances. An approximate but simple recurrence formula is also developed, which generally is less accurate than the chain rule but is more robust with mutation. Used together with the chain rule it leads to explicit equations for non-IBD in a region. The results can be applied to detection of quantitative trait loci (QTL) by computing the probability of IBD at candidate loci in terms of identity-by-state at neighboring markers.
Resumo:
Academically gifted students are recognised as possessing considerable achievement potential. Yet many fail to perform at a level commensurate with their ability. Often gifted students in early adolescence are faced with a forced choice between fulfilment of potential and achieving stable positive relationships with peers. This choice can affect their achievement and may have far-reaching personal and social costs. This case study explored the viability of self-presentation theory to explain students' ways of negotiating their sense of self whilst developing public identity and the concomitant affects on achievement and the fulfilment of potential. It examined how gifted students moderate their images in their learning and extra-curricular environments. Further, the study identifies those self-presentation strategies adopted that either facilitate or hinder achievement. This study may assist parents, educators and school counsellors to provide greater support for gifted adolescents.
Resumo:
Introduction to the topic or context and/or mapping of the literature Increasing degree-seeking, self-funded, international students from affluent Asian countries, who use English as an additional language (EAL), have contributed to cultural and linguistic diversities in Australian universities. Such diversities further posed challenges in pedagogy and assessment. In particular, these students' English proficiency and cultural attributes were highlighted as factors in productive group discussions, and equitable group assessment. The focus in the research literature thus far is on how EAL international students can better English proficiency and adaptability to group participation. However, little is known from sociological perspectives about the power relations involved in EAL students' choice of group members in group discussions.
Resumo:
This research examines the effects of expectation (perceived attractiveness) on satisfaction, place identity, and place dependence. Place identity and place dependence are viewed as relational components of choice and relate to deeper needs. This study proposes that these two relational components depend on transactional expectations, which are emergent and determined by past experiences and visitor goals. In a theoretically elaborated and tested Structural Equation Model (SEM) this study assumes that these relationships vary according to intentions to return. The study addresses the conditions under which loyalty intentions influence the deeper place attachments (place identity and place dependence) that visitors associate with attractive cultural and natural destinations. The model is tested on a sample of 504 international tourists visiting Tanzania during fall 2010, and explains 59% of variance in the predicted dependent variables. The results are linked to a discussion on loyalty programs.