248 resultados para critical security studies
Resumo:
Critical literacy (CL) has been the subject of much debate in the Australian public and education arenas since 2002. Recently, this debate has dissipated as literacy education agendas and attendant policies shift to embrace more hybrid models and approaches to the teaching of senior English. This paper/presentation reports on the views expressed by four teachers of senior English about critical literacy and it’s relevance to students who are from culturally and linguistically diverse backgrounds who are learning English while undertaking senior studies in high school. Teachers’ understandings of critical literacy are important, esp. given the emphasis on Critical and Creative Thinking and Literacy as two of the General Capabilities underpinning the Australian national curriculum. Using critical discourse analysis, data from four specialist ESL teachers in two different schools were analysed for the ways in which these teachers construct critical literacy. While all four teachers indicated significant commitment to critical literacy as an approach to English language teaching, the understandings they articulated varied from providing forms of access to powerful genres, to rationalist approaches to interrogating text, to a type of ‘critical-aesthetic’ analysis of text construction. Implications are also discussed.
Resumo:
Literacy studies have begun to examine the spatial dimension of literacy practices in a way that foregrounds space, and that considers space as constitutive to human relations and practices. This chapter provides an introduction to spatial literacy research, providing a guide to key theorists, themes, and studies that have shaped historical and new developments in spatial approaches to literacy practice and pedagogy. It begins by reconceptualising socio-spatial approaches to literacy research and defines terms. Intersections with related social theories are examined, with an emphasis on critical approaches and the politics of space. It clarifies the relationship between socio-spatial and socio-cultural paradigms, revisiting the spatial in seminal socio-cultural research. It covers new ground,including networks, flows, and deterritorialisation of literacy practice. The chapter concludes with challenges and recommendations for future language research and educational practice.
Resumo:
An effective IT infrastructure can support a business vision and strategy; a poor, decentralized one can break a company. More and more companies are turning to off-the-shelf ERP (enterprise resource planning) solutions for IT planning and legacy systems management. The authors have developed a framework to help managers successfully plan and implement an ERP project
Resumo:
Maritime security has emerged as a critical legal and political issue in the contemporary world. Terrorism in the maritime domain is a major maritime security issue. Ten out of the 44 major terrorist groups of the world, as identified in the US Department of State’s Country Reports on Terrorism, have maritime terrorism capabilities. Prosecution of maritime terrorists is a politically and legally difficult issue, which may create conflicts of jurisdiction. Prosecution of alleged maritime terrorists is carried out by national courts. There is no international judicial institution for the prosecution of maritime terrorists. International law has therefore anticipated a vital role for national courts in this respect. The international legal framework for combating maritime terrorism has been elaborately examined in existing literature therefore this paper will only highlight the issues regarding the prosecution of maritime terrorists. This paper argues that despite having comprehensive intentional legal framework for the prosecution of maritime terrorists there is still some scopes for conflicts of jurisdiction particularly where two or more States are interested to prosecute the same offender. This existing legal problem has been further aggravated in the post September 11 era. Due to the political and security implications, States may show reluctance in ensuring the international law safeguards of alleged perpetrators in the arrest, detention and prosecution process. Nevertheless, international law has established a comprehensive system for the prosecution of maritime terrorists where national courts is the main forum of ensuring the international law safeguards of alleged perpetrators as well as ensuring the effective prosecution of maritime terrorists thereby playing an instrumental role in establishing a rule based system for combating maritime terrorism. Using two case studies, this paper shows that the role of national courts has become more important in the present era because there may be some situations where no State is interested to initiate proceedings in international forums for vindicating rights of an alleged offender even if there is a clear evidence of violation of international human rights law in the arrest, detention and prosecution process. This paper presents that despite some bottlenecks national courts are actively playing this critical role. Overall, this paper highlights the instrumental role of national courts in the international legal order.
Resumo:
The combined techniques of in situ Raman microscopy and scanning electron microscopy (SEM) have been used to study the selective oxidation of methanol to formaldehyde and the ethene epoxidation reaction over polycrystalline silver catalysts. The nature of the oxygen species formed on silver was found to depend critically upon the exact morphology of the catalyst studied. Bands at 640, 780 and 960 cm-1 were identified only on silver catalysts containing a significant proportion of defects. These peaks were assigned to subsurface oxygen species situated in the vicinity of surface dislocations, AgIII=O sites formed on silver atoms modified by the presence of subsurface oxygen and O2 - species stabilized on subsurface oxygen-modified silver sites, respectively. The selective oxidation of methanol to formaldehyde was determined to occur at defect sites, where reaction of methanol with subsurface oxygen initially produced subsurface OH species (451 cm-1) and adsorbed methoxy species. Two distinct forms of adsorbed ethene were identified on oxidised silver sites. One of these was created on silver sites modified by the interaction of subsurface oxygen species, and the other on silver crystal planes containing a surface coverage of atomic oxygen species. The selective oxidation of ethene to ethylene oxide was achieved by the reaction between ethene adsorbed on modified silver sites and electrophilic AgIII=O species, whereas the combustion reaction was perceived to take place by the reaction of adsorbed ethene with nucleophilic surface atomic oxygen species. Defects were determined to play a critical role in the epoxidation reaction, as these sites allowed the rapid diffusion of oxygen into subsurface positions, and consequently facilitated the formation of the catalytically active AgIII=O sites.
Resumo:
Dáwat, Pamahándí, Tawíd, Ságda, Lampísa, Ibabások, Lapát, Panedlák: for most of us gathered here, these are words that we don’t usually use in our daily lives. Others may consider them as exotic, alien, funny and even backward. However, for indigenous kindred among us, these words denote an intimate identity and deep understanding of the world around them. It constitutes a broader knowledge system, be written or otherwise, which guides them in the management of resources within their ancestral land. This paper will provide a brief theoretical framework of the concepts of indigenous knowledge systems—hereinafter called IKS, and indigenous peoples food security, and hopefully a deeper or continued appreciation in the study of both concepts in general.
Resumo:
Advances in Information and Communication Technologies have the potential to improve many facets of modern healthcare service delivery. The implementation of electronic health records systems is a critical part of an eHealth system. Despite the potential gains, there are several obstacles that limit the wider development of electronic health record systems. Among these are the perceived threats to the security and privacy of patients’ health data, and a widely held belief that these cannot be adequately addressed. We hypothesise that the major concerns regarding eHealth security and privacy cannot be overcome through the implementation of technology alone. Human dimensions must be considered when analysing the provision of the three fundamental information security goals: confidentiality, integrity and availability. A sociotechnical analysis to establish the information security and privacy requirements when designing and developing a given eHealth system is important and timely. A framework that accommodates consideration of the legislative requirements and human perspectives in addition to the technological measures is useful in developing a measurable and accountable eHealth system. Successful implementation of this approach would enable the possibilities, practicalities and sustainabilities of proposed eHealth systems to be realised.
Resumo:
Attention Deficit Hyperactivity Disorder (ADHD) has achieved celebrity status in many Western countries, yet despite considerable effort to prove its existence as a “real” disorder, ADHD still suffers from a crisis of legitimacy. Nonetheless, diagnosis and prescription of medication has grown at a phenomenal rate since the late 1980s, particularly in Western culture. Numerous accounts exist explaining how the ADHD diagnosis functions as a convenient administrative loophole, providing schools with a medical explanation for school failure, medication to sedate the “problem” into submission, or the means to eject children from mainstream classrooms. This book provides a more holistic interpretation of how to respond to children who might otherwise be diagnosed with and medicated for “ADHD”—a diagnosis which, whether scientifically valid or not, is unhelpful within the confine of the school. Training teachers to recognise and identify “ADHD symptoms” or to understand the functions of restricted pharmaceuticals will only serve to increase the number of children diagnosed and the sale of psychoactive medications. Research has shown that such activities will not help those children learn, nor will it empower their classroom teachers to take responsibility for teaching such children well. This book seeks to provide school practitioners with knowledge that is useful within the educational context to improve the educational experiences and outcomes for children who might otherwise receive a diagnosis of ADHD.
Resumo:
Literacy Theories for the Digital Age insightfully brings together six essential approaches to literacy research and educational practice. The book provides powerful and accessible theories for readers, including Socio-cultural, Critical, Multimodal, Socio-spatial, Socio-material and Sensory Literacies. The brand new Sensory Literacies approach is an original and visionary contribution to the field, coupled with a provocative foreword from leading sensory anthropologist David Howes. This dynamic collection explores a legacy of literacy research while showing the relationships between each paradigm, highlighting their complementarity and distinctions. This highly relevant compendium will inspire readers to explore new frontiers of thought and practice in times of diversity and technological change.
Resumo:
The purpose of the current study was to develop a measurement of information security culture in developing countries such as Saudi Arabia. In order to achieve this goal, the study commenced with a comprehensive review of the literature, the outcome being the development of a conceptual model as a reference base. The literature review revealed a lack of academic and professional research into information security culture in developing countries and more specifically in Saudi Arabia. Given the increasing importance and significant investment developing countries are making in information technology, there is a clear need to investigate information security culture from developing countries perspective such as Saudi Arabia. Furthermore, our analysis indicated a lack of clear conceptualization and distinction between factors that constitute information security culture and factors that influence information security culture. Our research aims to fill this gap by developing and validating a measurement model of information security culture, as well as developing initial understanding of factors that influence security culture. A sequential mixed method consisting of a qualitative phase to explore the conceptualisation of information security culture, and a quantitative phase to validate the model is adopted for this research. In the qualitative phase, eight interviews with information security experts in eight different Saudi organisations were conducted, revealing that security culture can be constituted as reflection of security awareness, security compliance and security ownership. Additionally, the qualitative interviews have revealed that factors that influence security culture are top management involvement, policy enforcement, policy maintenance, training and ethical conduct policies. These factors were confirmed by the literature review as being critical and important for the creation of security culture and formed the basis for our initial information security culture model, which was operationalised and tested in different Saudi Arabian organisations. Using data from two hundred and fifty-four valid responses, we demonstrated the validity and reliability of the information security culture model through Exploratory Factor Analysis (EFA), followed by Confirmatory Factor Analysis (CFA.) In addition, using Structural Equation Modelling (SEM) we were further able to demonstrate the validity of the model in a nomological net, as well as provide some preliminary findings on the factors that influence information security culture. The current study contributes to the existing body of knowledge in two major ways: firstly, it develops an information security culture measurement model; secondly, it presents empirical evidence for the nomological validity for the security culture measurement model and discovery of factors that influence information security culture. The current study also indicates possible future related research needs.
Resumo:
In Australia, the proportion of the population aged 65 years and over reached 13.5% in 2010 and is expected to increase steadily to around 20% by the year 2056 [Australia Bureau of Statistics (ABS), 2010], creating what has been regarded as a looming crisis in how to house and care for older people. As a viable accommodation option, the retirement village is widely accepted as a means of promoting and enhancing independence, choice and quality of life for older people. Recent research by Barker (2010) indicates that the current and potential residents of retirement villages are generally very conscious of resource consumption and would like their residences and community to be more sustainable. The aim of this study was to understand the perception of older people toward sustainability ideas and identify the sustainable practices involved in retirement villages to improve the wellbeing of residents. Multiple research methods, including content analysis, questionnaire survey, interviews and case studies were conducted for the research purpose. The results indicate that most retirement village residents understand and recognize the importance of sustainability in their lifestyle. However, their sustainability requirements need to be supported and enhanced by the provision of affordable sustainability features. Additionally, many retirement village developers and operators realize the importance of providing a sustainable retirement community for their residents, and that a sustainable retirement village (that is environmental-friendly, affordable, and improves social engagement) can be achieved through the consideration of project planning, design, construction, and operations throughout the project life cycle. The clear shift from healthcare to lifestyle-focused services in the recent development of retirement villages together with the increasing number of aged people moving into retirement villages (Simpson and Cheney, 2007) has raised awareness of the need for the retirement village industry to provide a sustainable community for older people to improve their life quality after retirement. This is the first critical study of sustainable development in the retirement village industry and its potential in addressing the housing needs of older people, providing a contribution towards improving the life quality of older people and with direct and immediate significance to the community as a whole.
Resumo:
In this paper we will examine passenger actions and activities at the security screening points of Australian domestic and international airports. Our findings and analysis provide a more complete understanding of the current airport passenger security screening experience. Data in this paper is comprised of field studies conducted at two Australian airports, one domestic and one international. Video data was collected by cameras situated either side of the security screening point. A total of one hundred and ninety-six passengers were observed. Two methods of analysis are used. First, the activities of passengers are coded and analysed to reveal the common activities at domestic and international security regimes and between quiet and busy periods. Second, observation of passenger activities is used to reveal uncommon aspects. The results show that passengers do more at security screening that being passively scanned. Passengers queue, unpack the required items from their bags and from their pockets, walk through the metal-detector, re-pack and occasionally return to be re-screened. For each of these activities, passengers must understand the procedures at the security screening point and must co-ordinate various actions and objects in time and space. Through this coordination passengers are active participants in making the security checkpoint function – they are co-producers of the security screening process.
Resumo:
Business Process Management (BPM) is accepted globally as an organizational approach to enhance productivity and drive cost efficiencies. Studies confirm a shortage of BPM skilled professionals with limited opportunities to develop the required BPM expertise. This study investigates this gap starting from a critical analysis of BPM courses offered by Australian universities and training institutions. These courses were analyzed and mapped against a leading BPM capability framework to determine how well current BPM education and training offerings in Australia address the core capabilities required by BPM professionals globally. To determine the BPM skill-sets sought by industry, online recruitment advertisements were collated, analyzed, and mapped against this BPM capability framework. The outcomes provide a detailed overview on the alignment of available BPM education/training and industry demand. These insights are useful for BPM professionals and their employers to build awareness of the BPM capabilities required for a BPM mature organization. Universities and other training institutions will benefit from these results by understanding where demand is, where the gaps are, and what other BPM education providers are supplying. This structured comparison method could continue to provide a common ground for future discussion across university-industry boundaries and continuous alignment of their respective practices.
Resumo:
For decades Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS) have used computers to monitor and control physical processes in many critical industries, including electricity generation, gas pipelines, water distribution, waste treatment, communications and transportation. Increasingly these systems are interconnected with corporate networks via the Internet, making them vulnerable and exposed to the same risks as those experiencing cyber-attacks on a conventional network. Very often SCADA networks services are viewed as a specialty subject, more relevant to engineers than standard IT personnel. Educators from two Australian universities have recognised these cultural issues and highlighted the gap between specialists with SCADA systems engineering skills and the specialists in network security with IT background. This paper describes a learning approach designed to help students to bridge this gap, gain theoretical knowledge of SCADA systems' vulnerabilities to cyber-attacks via experiential learning and acquire practical skills through actively participating in hands-on exercises.