252 resultados para Notions of security
Resumo:
The word “queer” is a slippery one; its etymology is uncertain, and academic and popular usage attributes conflicting meanings to the word. By the mid-nineteenth century, “queer” was used as a pejorative term for a (male) homosexual. This negative connotation continues when it becomes a term for homophobic abuse. In recent years, “queer” has taken on additional uses: as an all encompassing term for culturally marginalised sexualities – gay, lesbian, trans, bi, and intersex (“GLBTI”) – and as a theoretical strategy which deconstructs binary oppositions that govern identity formation. Tracing its history, the Oxford English Dictionary notes that the earliest references to “queer” may have appeared in the sixteenth century. These early examples of queer carried negative connotations such as “vulgar,” “bad,” “worthless,” “strange,” or “odd” and such associations continued until the mid-twentieth century. The early nineteenth century, and perhaps earlier, employed “queer” as a verb, meaning to “to put out of order,” “to spoil”, “to interfere with”. The adjectival form also began to emerge during this time to refer to a person’s condition as being “not normal,” “out of sorts” or to cause a person “to feel queer” meaning “to disconcert, perturb, unsettle.” According to Eve Sedgwick (1993), “the word ‘queer’ itself means across – it comes from the Indo-European root – twerkw, which also yields the German quer (traverse), Latin torquere (to twist), English athwart . . . it is relational and strange.” Despite the gaps in the lineage and changes in usage, meaning and grammatical form, “queer” as a political and theoretical strategy has benefited from its diverse origins. It refuses to settle comfortably into a single classification, preferring instead to traverse several categories that would otherwise attempt to stabilise notions of chromosomal sex, gender and sexuality.
Resumo:
The call to innovate is ubiquitous across the Australian educational policy context. The claims of innovative practices and environments that occur frequently in university mission statements, strategic plans and marketing literature suggest that this exhortation to innovate appears to have been taken up enthusiastically by the university sector. Throughout the history of universities, a range of reported deficiencies of higher education have worked to produce a notion of crisis. At present, it would seem that innovation is positioned as the solution to the notion of crisis. This thesis is an inquiry into how the insistence on innovation works to both enable and constrain teaching and learning practices in Australian universities. Alongside the interplay between innovation and crisis is the link between resistance and innovation, a link which remains largely unproblematized in the scholarly literature. This thesis works to locate and unsettle understandings of a relationship between innovation and Australian higher education. The aim of this inquiry is to generate new understandings of what counts as innovation within this context and how innovation is enacted. The thesis draws on a number of postmodernist theorists, whose works have informed firstly the research method, and then the analysis and findings. Firstly, there is an assumption that power is capillary and works through discourse to enact power relations which shape certain truths (Foucault, 1990). Secondly, this research scrutinised language practices which frame the capacity for individuals to act, alongside the language practices which encourage an individual to adopt certain attitudes and actions as one’s own (Foucault, 1988). Thirdly, innovation talk is read in this thesis as an example of needs talk, that is, as a medium through which what is considered domestic, political or economic is made and contested (Fraser, 1989). Fourthly, relationships between and within discourses were identified and analysed beyond cause and effect descriptions, and more productively considered to be in a constant state of becoming (Deleuze, 1987). Finally, the use of ironic research methods assisted in producing alternate configurations of innovation talk which are useful and new (Rorty, 1989). The theoretical assumptions which underpin this thesis inform a document analysis methodology, used to examine how certain texts work to shape the ways in which innovation is constructed. The data consisted of three Federal higher education funding policies selected on the rationale that these documents, as opposed to state or locally based policy and legislation, represent the only shared policy context for all Australian universities. The analysis first provided a modernist reading of the three documents, and this was followed by postmodernist readings of these same policy documents. The modernist reading worked to locate and describe the current truths about innovation. The historical context in which the policy was produced as well as the textual features of the document itself were important to this reading. In the first modernist reading, the binaries involved in producing proper and improper notions of innovation were described and analysed. In the process of the modernist analysis and the subsequent location of binary organisation, a number of conceptual collisions were identified, and these sites of struggle were revisited, through the application of a postmodernist reading. By applying the theories of Rorty (1989) and Fraser (1989) it became possible to not treat these sites as contradictory and requiring resolution, but rather as spaces in which binary tensions are necessary and productive. This postmodernist reading constructed new spaces for refusing and resisting dominant discourses of innovation which value only certain kinds of teaching and learning practices. By exploring a number of ironic language practices found within the policies, this thesis proposes an alternative way of thinking about what counts as innovation and how it happens. The new readings of innovation made possible through the work of this thesis were in response to a suite of enduring, inter-related questions – what counts as innovation?, who or what supports innovation?, how does innovation occur?, and who are the innovators?. The truths presented in response to these questions were treated as the language practices which constitute a dominant discourse of innovation talk. The collisions that occur within these truths were the contested sites which were of most interest for the analysis. The thesis concludes by presenting a theoretical blueprint which works to shift the boundaries of what counts as innovation and how it happens in a manner which is productive, inclusive and powerful. This blueprint forms the foundation upon which a number of recommendations are made for both my own professional practice and broader contexts. In keeping with the conceptual tone of this study, these recommendations are a suite of new questions which focus attention on the boundaries of innovation talk as an attempt to re-configure what is valued about teaching and learning at university.
Resumo:
Principal Topic: Resource decisions are critical to the venture creation process, which has important subsequent impacts on venture creation and performance (Boeker, 1989). Most entrepreneurs however, suffer substantial resource constraints in venture creation and during venture growth (Shepherd et al., 2000). Little is known about how high potential, sustainability ventures (the ventures of interest in this research), despite resource constraints, achieve continued venture persistence and venture success. One promising theory that explicitly links to resource constraints is a concept developed by Levi Strauss (1967) termed bricolage. Bricolage aligns with notions of resourcefulness: using what's on hand, through making do, and recombining resources for new or novel purposes (Baker & Nelson 2005). To the best of our knowledge, previous studies have not systematically investigated internal and external constraints, their combinations, and subsequent bricolage patterns. The majority of bricolage literature focuses on external environmental constraints (e.g. Wieck 1989; Baker & Nelson 2005), thereby paying less attention to in evaluating internal constraints (e.g. skills and capabilities) or constraint combinations. In this paper we focus on ventures that typically face resource-poor environments. High potential, nascent and young sustainability ventures are often created and developed with resource constraints and in some cases, have greater resource requirements owing to higher levels of technical sophistication of their products (Rothaermel & Deeds 2006). These ventures usually have high aspirations and potential for growth who ''seeks to meet the needs and aspirations without compromising the ability to meet those of the future'' (Brundtland Commission 1983). High potential ventures are increasingly attributed with a central role in the development of innovation, and employment in developed economies (Acs 2008). Further, increasing awareness of environmental and sustainability issues has fostered demand for business processes that reduce detrimental environmental impacts of global development (Dean & McMullen 2007) and more environmentally sensitive products and services: representing an opportunity for the development of ventures that seek to satisfy this demand through entrepreneurial action. These ventures may choose to ''make do'' with existing resources in developing resource combinations that produce the least impact on the environment. The continuous conflict between the greater requirements for resources and limited resource availability in high potential sustainable ventures, with the added complexity of balancing this with an uncompromising focus on using ''what's on hand'' to lessen environment impacts may make bricolage behaviours critical for these ventures. Research into bricolage behaviour is however, the exception rather than the rule (Cunha 2005). More research is therefore needed to further develop and extend this emerging concept, especially in the context of sustainability ventures who are committed to personal and social goals of resourcefulness. To date, however, bricolage has not been studied specifically among high potential sustainable ventures. This research seeks to develop an in depth understanding of the impact of internal and external constraints and their combinations on the mechanisms employed in bricolage behaviours in differing dynamic environments. The following research question was developed to investigate this: How do internal, external resource constraints (or their combinations) impact bricolage resource decisions in high potential sustainability ventures? ---------- Methodology/Key Propositions: 6 case studies will be developed utilizing survey data from the Comprehensive Australian Study of Entrepreneurial Emergence (CAUSEE) large-scale longitudinal study of new venture start-ups in Australia. Prior to commencing case studies, 6 scoping interviews were conducted with key stakeholders including industry members, established businesses and government to ensure practical relevance in case development. The venture is considered the unit of analysis with the key informant being the entrepreneur and other management team members where appropriate. Triangulation techniques are used in this research including semi-structured interviews, survey data, onsite visits and secondary documentation website analysis, resumes, and business plans. These 6 sustainability ventures have been selected based on different environmental dynamism conditions including a traditionally mature market (building industry) and a more dynamic, evolving industry (renewable energy/solar ventures). In evaluating multidisciplinary literature, we expect the following external constraints are critical including: technology constraints (seen through lock-in of incumbents existing technology), institutional regulation and standards, access to markets, knowledge and training to nascent and young venture bricolage processes. The case studies will investigate internal constraints including resource fungability, resource combination capabilities, translating complex science/engineering knowledge into salient, valuable market propositions, i.e. appropriate market outcomes, and leveraging relationships may further influence bricolage decisions. ---------- Results and Implications: Intended ventures have been identified within the CAUSEE sample and have agreed to participate and secondary data collection for triangulation purposes has already commenced. Data collection of the case studies commenced 27th of May 2009. Analysis is expected to be completed finalised by 25th September 2009. This paper will report on the pattern of resource constraints and its impact on bricolage behaviours: its subsequent impact on resource deployment within venture creation and venture growth. As such, this research extends the theory of bricolage through the systematic analysis of constraints on resource management processes in sustainability ventures. For practice, this research may assist in providing a better understanding of the resource requirements and processes needed for continued venture persistence and growth in sustainability ventures. In these times of economic uncertainty, a better understanding of the influence on constraints and bricolage: the interplay of behaviours, processes and outcomes may enable greater venture continuance and success.
Resumo:
Protrusion I is a self-portrait bust, rendered with a high degree of naturalism. The work depicts a male subject with a bulbous white form projecting from it nasal and oral orifices. The work forms part of the artist’s ongoing self-portraiture project, in which the tensions between objectivity and subjectivity that pervade the self-portrait as a genre are cross referenced with the notions of materiality and interiority integral to the language of sculpture. The iconography of the work parodies the connection between amorphous form and artistic subjectivity in the history of sculpture. The dough-like forms that emerge from the figure thus refer to a sense of ‘inner life’ while also operating as more analytical projections of the cavities of the bust – areas of the where the mimetic program are necessarily suspended. The result is a figure that appears to be in a state of resigned suffocation. The work was selected for the 2005 National Sculpture Prize and Exhibition at the National Gallery of Australia in Canberra. The work was later included in the group show Crash (and other earthy pleasures) at the Lawrence Wilson Art Gallery at the University of Western Australia in Perth.
Resumo:
The advancement of online teaching environments during the past several years presents an exciting opportunity to extend existing teaching methodologies. The software package known as Elluminate is one example of a virtual classroom, facilitating the provision of real time interaction, collaboration and group meetings. This paper will examine the use of Elluminate in the teaching of large classes. The use of such technology for large classes is of particular interest, as large classes are often, unfairly, associated with a reputation for being impersonal as well as notions of conveyor belt learning. In this paper the potential to extend teaching and learning opportunities using Elluminate, in the context of large classes, will be explored. It will be shown that the use of technology such as Elluminate can assist in providing students with a more flexible means of accessing academic support, as well as allowing for a customised delivery of course content so as to focus learning outcomes.
Resumo:
Shakespeare’s Ophelia has been circulated in recent times as a figure of the adolescent woman at risk. Mary Pipher’s best-selling and influential Reviving Ophelia (1994) argued that the “story of Ophelia […] shows the destructive forces that affect young women” (20). Without undermining Pipher’s project, this paper reads two contemporary YA romance novels—Lisa Fiedler’s Dating Hamlet (2002) and Lisa Klein’s Ophelia (2006)—in order to demonstrate that not only can Ophelia be appropriated as a figure of empowerment for young women today, but that such appropriations are, seemingly ironically, most powerfully rendered within the genre of romance; a genre long-maligned by feminists as recuperative of patriarchy.--------- These two novels stage interventions both into narratives of female adolescence as a time of being ‘at risk’ or ‘under threat’, and also into narratives of canonical literary patriarchy. Rather than a suicidal Ophelia, subject to the whims of men, these authors imagine Ophelias who take charge of their own destiny; who dictate their own romance and agency; who refuse to be subject to or subjected by, those scripts of cultural authority and heteronormative romance so often perceived as antithetical to female agency. In doing so, they force us to revise our own notions of the romance genre and the functions of canonical literary tradition in contemporary YA culture.
Resumo:
De Certeau (1984) constructs the notion of belonging as a sentiment which develops over time through the everyday activities. He explains that simple everyday activities are part of the process of appropriation and territorialisation and suggests that over time belonging and attachment are established and built on memory, knowledge and the experiences of everyday activities. Based on the work of de Certeau, non-Indigenous Australians have developed attachment and belonging to places based on the dispossession of Aboriginal people and on their everyday practices over the past two hundred years. During this time non-Indigenous people have marked their appropriation and territorialisation with signs, symbols, representations and images. In marking their attachment, they also define how they position Australia’s Indigenous people by both our presence and our absence. This paper will explore signs and symbols within spaces and places in health services and showcase how they reflect the historical, political, cultural, social and economic values, and power relations of broader society. It will draw on the voices of Aboriginal women to demonstrate their everyday experiences of such sites. It will conclude by highlighting how Aboriginal people assert their identities and un-ceded sovereignty within such health sites and actively resist on-going white epistemological notions of us and the logic of patriarchal white sovereignty.
Towards a culturally appropriate mental health system: Sudanese-Australians' experiences with trauma
Resumo:
Australia is fortunate to welcome approximately 13,000 humanitarian entrants per year, most of whom have experienced protracted violence, hardship and life in refugee camps. The majority of humanitarian migrants were raised in cultural contexts very different to that of Australia, contributing to the increasing diversity of this region. With this diversity comes a responsibility to ensure every Australian receives culturally appropriate mental healthcare. Those who are forced into migration have experienced trauma and the stress of acculturation often compounds this trauma. This study investigated the experience of trauma from the perspectives of Sudanese-Australians. Grounded theory methodology was employed to extract themes from interviews with 15 Sudanese-Australians aged between 19 and 49 years. Results demonstrated four overarching themes: support, religion, strength and new possibilities. The data within these themes are compared and contrasted with previous literature that has examined notions of trauma, distress and growth in western populations. Conclusions drawn from these results highlight the need to build inclusive practices that support diversity into existing trauma services in Australia.
Resumo:
The Pedestrian Interaction Patch Project (PIPP) seeks to exert influence over and encourage abnormal pedestrian behavior. By placing an unadvertised (and non recording) interactive video manipulation system and projection source in a high traffic public area, the PIPP allows pedestrians to privately (and publically) re-engage with a previously inactive physical environment, like a commonly used walkway or corridor. This system, the results of which are projected in real time on the architectural surface, inadvertently provides pedestrians with questions around preconceived notions of self and space. In an attempt to re-activate our relationship with the physical surrounds we occupy each day the PIPP creates a new set of memories to be recalled as we re-enter known environments once PIPP has moved on and as such re-enlivens our relationship with the everyday architecture we stroll past everyday. The PIPP environment is controlled using the software program Isadora, devised by Mark Coniglio at Troika Ranch, and contains a series of video manipulation patches that are designed to not only grab the pedestrians attention but to also encourage a sense of play and interaction between the architecture, the digital environment, the initially unsuspecting participant(s) and the pedestrian audience. The PIPP was included as part of the planned walking tour for the “Playing in Urban Spaces” seminar day, and was an installation that ran for the length of the symposium in a reclaimed pedestrian space that was encountered by both the participants and general public during the course of the day long event. Ideally once discovered PIPP encouraged pedestrians to return through the course of the seminar day to see if the environmental patches had changed or altered, and changed their standard route to include the PIPP installation or to avoid it, either way, encouraging an active response to the pathways normally traveled or newly discovered each day.
Resumo:
The most costly operations encountered in pairing computations are those that take place in the full extension field Fpk . At high levels of security, the complexity of operations in Fpk dominates the complexity of the operations that occur in the lower degree subfields. Consequently, full extension field operations have the greatest effect on the runtime of Miller’s algorithm. Many recent optimizations in the literature have focussed on improving the overall operation count by presenting new explicit formulas that reduce the number of subfield operations encountered throughout an iteration of Miller’s algorithm. Unfortunately, almost all of these improvements tend to suffer for larger embedding degrees where the expensive extension field operations far outweigh the operations in the smaller subfields. In this paper, we propose a new way of carrying out Miller’s algorithm that involves new explicit formulas which reduce the number of full extension field operations that occur in an iteration of the Miller loop, resulting in significant speed ups in most practical situations of between 5 and 30 percent.
Resumo:
There is a growing body of literature within social and cultural geography that explores notions of place, space, culture, race and identity. When health services in rural communities are explored using these notions, it can lead to multiple ways of understanding the cultural meanings inscribed within health services and how they can be embedded with an array of politics. For example, health services can often reflect the symbolic place that each individual holds within that rural community. Through the use of a rural health service case study, this paper will demonstrate how the physical sites and appearances of health services can act as social texts that convey messages of belonging and welcome, or exclusion and domination. They can also produce and reproduce power and control relations. In this way, they can influence the ways that Aboriginal people engage in health service environments – either as places where Aboriginal people feel welcome, comfortable, secure and culturally safe and happy to use the health service, or as places where they utilise the service provided with a great deal of effort, angst and energy. It is important to understand how these complex notions play out in rural communities if the health and wellbeing of Aboriginal people is going to be addressed.
Resumo:
Authorised users (insiders) are behind the majority of security incidents with high financial impacts. Because authorisation is the process of controlling users’ access to resources, improving authorisation techniques may mitigate the insider threat. Current approaches to authorisation suffer from the assumption that users will (can) not depart from the expected behaviour implicit in the authorisation policy. In reality however, users can and do depart from the canonical behaviour. This paper argues that the conflict of interest between insiders and authorisation mechanisms is analogous to the subset of problems formally studied in the field of game theory. It proposes a game theoretic authorisation model that can ensure users’ potential misuse of a resource is explicitly considered while making an authorisation decision. The resulting authorisation model is dynamic in the sense that its access decisions vary according to the changes in explicit factors that influence the cost of misuse for both the authorisation mechanism and the insider.
Resumo:
RFID has been widely used in today's commercial and supply chain industry, due to the significant advantages it offers and the relatively low production cost. However, this ubiquitous technology has inherent problems in security and privacy. This calls for the development of simple, efficient and cost effective mechanisms against a variety of security threats. This paper proposes a two-step authentication protocol based on the randomized hash-lock scheme proposed by S. Weis in 2003. By introducing additional measures during the authentication process, this new protocol proves to enhance the security of RFID significantly, and protects the passive tags from almost all major attacks, including tag cloning, replay, full-disclosure, tracking, and eavesdropping. Furthermore, no significant changes to the tags is required to implement this protocol, and the low complexity level of the randomized hash-lock algorithm is retained.
Resumo:
Tracking/remote monitoring systems using GNSS are a proven method to enhance the safety and security of personnel and vehicles carrying precious or hazardous cargo. While GNSS tracking appears to mitigate some of these threats, if not adequately secured, it can be a double-edged sword allowing adversaries to obtain sensitive shipment and vehicle position data to better coordinate their attacks, and to provide a false sense of security to monitoring centers. Tracking systems must be designed with the ability to perform route-compliance and thwart attacks ranging from low-level attacks such as the cutting of antenna cables to medium and high-level attacks involving radio jamming and signal / data-level simulation, especially where the goods transported have a potentially high value to terrorists. This paper discusses the use of GNSS in critical tracking applications, addressing the mitigation of GNSS security issues, augmentation systems and communication systems in order to provide highly robust and survivable tracking systems.
Resumo:
Emotions play a central role in mediation as they help to define the scope and direction of a conflict. When a party to mediation expresses (and hence entrusts) their emotions to those present in a mediation, a mediator must do more than simply listen - they must attend to these emotions. Mediator empathy is an essential skill for communicating to a party that their feelings have been heard and understood, but it can lead mediators into trouble. Whilst there might exist a theoretical divide between the notions of empathy and sympathy, the very best characteristics of mediators (caring and compassionate nature) may see empathy and sympathy merge - resulting in challenges to mediator neutrality. This article first outlines the semantic difference between empathy and sympathy and the role that intrapsychic conflict can play in the convergence of these behavioural phenomena. It then defines emotional intelligence in the context of a mediation, suggesting that only the most emotionally intelligent mediators are able to emotionally connect with the parties, but maintain an impression of impartiality – the quality of remaining ‘attached yet detached’ to the process. It is argued that these emotionally intelligent mediators have the common qualities of strong self-awareness and emotional self-regulation.