361 resultados para sexual identity
Resumo:
Digital Stories are short autobiographical documentaries, often illustrated with personal photographs and narrated in the first person, and typically produced in group workshops. As a media form they offer ‘ordinary people’ the opportunity to represent themselves to audiences of their choosing; and this amplification of hitherto unheard voices has significant repercussions for their social participation. Many of the storytellers involved in the ‘Rainbow Family Tree’ case study that is the subject of this paper can be characterised as ‘everyday’ activists for their common desire to use their personal stories to increase social acceptance of marginalised identity categories. However, in conflict with their willingness to share their personal stories, many fear the risks and ramifications of distributing them in public spaces (especially online) to audiences both intimate and unknown. Additionally, while technologies for production and distribution of rich media products have become more accessible and user-friendly, many obstacles remain. For many people there are difficulties with technological access and aptitude, personal agency, cultural capital, and social isolation, not to mention availability of the time and energy requisite to Digital Storytelling. Additionally, workshop context, facilitation and distribution processes all influence the content of stories. This paper explores the many factors that make ‘authentic’ self-representation far from straight forward. I use qualitative data drawn from interviews, Digital Story texts and ethnographic observation of GLBTQIS participants in a Digital Storytelling initiative that combined face-to-face and online modes of participation. I consider mediating influences in practice and theory and draw on strategies put forth in cultural anthropology and narrative therapy to propose some practical tools for nuanced and sensitive facilitation of Digital Storytelling workshops and webspaces. Finally, I consider the implications of these facilitation strategies for voice, identity and social participation.
Resumo:
A review of the 6th APT focusing on the work and performance of Rohan Wealleans
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
Childhood sexual assault (CSA) is one of the most devastating of all traumatic experiences with population studies documenting survivors experiencing higher levels of pathology than general trends in survivors of other traumatic experiences. Yet recent research has demonstrated that far from being permanently crippled by their experiences, many adult survivors of CSA manage to heal and move forward in their lives to experience a rich and fulfilling existence. In this paper two case studies are presented to provide a detailed account of how a person who has experienced CSA may find a pathway to healing. Moreover, data demonstrates that meaning making, spiritual or otherwise, is a pivotal part of acceptance of CSA and ensuing growth. The case studies highlight the unique journeys of two women and the underlying similarities in their pathway to healing. Clinical implications of the research are discussed and specific strategies for encouraging healing and growth are outlined.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
Previous studies have enabled exact prediction of probabilities of identity-by-descent (IBD) in randommating populations for a few loci (up to four or so), with extension to more using approximate regression methods. Here we present a precise predictor of multiple-locus IBD using simple formulas based on exact results for two loci. In particular, the probability of non-IBD X ABC at each of ordered loci A, B, and C can be well approximated by XABC = XABXBC/XB and generalizes to X123. . .k = X12X23. . .Xk-1,k/ Xk-2, where X is the probability of non-IBD at each locus. Predictions from this chain rule are very precise with population bottlenecks and migration, but are rather poorer in the presence of mutation. From these coefficients, the probabilities of multilocus IBD and non-IBD can also be computed for genomic regions as functions of population size, time, and map distances. An approximate but simple recurrence formula is also developed, which generally is less accurate than the chain rule but is more robust with mutation. Used together with the chain rule it leads to explicit equations for non-IBD in a region. The results can be applied to detection of quantitative trait loci (QTL) by computing the probability of IBD at candidate loci in terms of identity-by-state at neighboring markers.
Resumo:
Academically gifted students are recognised as possessing considerable achievement potential. Yet many fail to perform at a level commensurate with their ability. Often gifted students in early adolescence are faced with a forced choice between fulfilment of potential and achieving stable positive relationships with peers. This choice can affect their achievement and may have far-reaching personal and social costs. This case study explored the viability of self-presentation theory to explain students' ways of negotiating their sense of self whilst developing public identity and the concomitant affects on achievement and the fulfilment of potential. It examined how gifted students moderate their images in their learning and extra-curricular environments. Further, the study identifies those self-presentation strategies adopted that either facilitate or hinder achievement. This study may assist parents, educators and school counsellors to provide greater support for gifted adolescents.
Resumo:
This research examines the effects of expectation (perceived attractiveness) on satisfaction, place identity, and place dependence. Place identity and place dependence are viewed as relational components of choice and relate to deeper needs. This study proposes that these two relational components depend on transactional expectations, which are emergent and determined by past experiences and visitor goals. In a theoretically elaborated and tested Structural Equation Model (SEM) this study assumes that these relationships vary according to intentions to return. The study addresses the conditions under which loyalty intentions influence the deeper place attachments (place identity and place dependence) that visitors associate with attractive cultural and natural destinations. The model is tested on a sample of 504 international tourists visiting Tanzania during fall 2010, and explains 59% of variance in the predicted dependent variables. The results are linked to a discussion on loyalty programs.
Resumo:
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.
An evaluation of the Australian Capital Territory Sexual Assault Reform Program (SARP): Final Report
Resumo:
In 2005 the Australian Capital Territory (ACT) Office of the Director of Public Prosecutions (DPP) and the Australian Federal Police (AFP) produced a report, Responding to sexual assault: The challenge of change (DPP & AFP 2005), which made 105 recommendations for reforming the way sexual offence cases are handled by the ACT’s criminal justice system. The Sexual Assault Reform Program (SARP) is one key initiative developed in response to these recommendations. Managed by the ACT Justice and Community Safety Directorate (JACS), SARP’s main objective is to improve aspects of the criminal justice system relating to: processes and support for victims of sexual offences as they progress through the system; attrition in sexual offence matters in the criminal justice system; and coordination and collaboration among the agencies involved. In November 2007 the ACT Attorney-General announced $4 million of funding for several SARP reforms. This funding provided for additional victim support staff; a dedicated additional police officer, prosecutor and legal policy officer; and an upgrade of equipment for the Supreme Court and Magistrates Court, including improvements in technology to assist witnesses in giving evidence, and the establishment of an off-site facility to allow witnesses to give evidence from a location outside of the court. In addition, the reform agenda included a number of legislative amendments that changed how evidence can be given by victims of sexual and family violence offences, children and other vulnerable witnesses. The primary objectives of these legislative changes are to provide an unintimidating, safe environment for vulnerable witnesses (including sexual offence complainants) to give evidence and to obtain prompt statements from witnesses to improve the quality of evidence captured (DPP 2009: 13). The current evaluation The funding for SARP reforms also provided for a preliminary evaluation of the reforms; this report outlines findings from the evaluation. The evaluation sought to address whether the program has met its key objectives: better support for victims, lower attrition rates and improved coordination and collaboration among agencies involved in administering SARP. The evaluation was conducted in two stages and involved a mixed-methods approach. During stage 1 key indicators for the evaluation were developed with stakeholders. During stage 2 quantitative data were collected by stakeholders and provided to the AIC for analysis. Qualitative interviews were also conducted with service delivery providers, and with a small number (n=5) of victim/survivors of sexual offences whose cases had recently been resolved in the ACT criminal justice system. The current evaluation is preliminary in nature. As the SARP reforms will take time to become entrenched within the ACT’s criminal justice system, some of the impacts of the reforms may not yet be evident. Nonetheless, this evaluation provides an insight into how well the SARP reforms have been implemented to date, as well as key areas that could be addressed in the future. Key findings from the preliminary evaluation are outlined briefly below.
Resumo:
Executive Summary Child sexual abuse (CSA) in Christian Institutions continues to be of serious concern in public, criminal justice and institutional discourse. This study was conducted in conjunction with Project Kidsafe Foundation and sought the perspectives of Australian survivors of CSA by Personnel in Christian Institutions (PICIs). In total, 81 individual survivors responded to an online survey which asked them a range of questions about their current and childhood life circumstance; the nature, extent and location of abuse; grooming strategies utilised by perpetrators; their experiences of disclosure; and outcomes of official reporting to both criminal justice agencies and also official processes Christian institutions. Survey participants were given the option to further participate in a qualitative interview with the principal researcher. These interviews are not considered within this report. In summary, survey data examined here indicate that: • Instances of abuse included a range of offences from touching outside of clothing to serious penetrative offences. • The onset of abuse occurred at a young age: between 6 and 10 years for most female participants, and 11 and 13 years for male participants. • In the majority of cases the abuse ceased because of actions by survivors, not by adults within families or the Christian institution. • Participants waited significant time before disclosing their abuse, with many waiting 20 years or more. • Where survivors disclosed to family members or PICIs, they were often met with disbelief and unhelpful responses aimed at minimising the harm. • Where an official report was made, it was most often made to police. In these cases 53% resulted in an official investigations. • The primary reasons for reporting were to protect others from the perpetrator and make the Christian institution accountable to an external agency. • Where reports to Christian institutions were made, most survivors were dissatisfied with outcomes, and a smaller majority was extremely dissatisfied. This report reflects the long-held understanding that responding to CSA is a complex and difficult task. If effective and meaningful responses are not made, however, trauma to the survivor is most often compounded and recovery delayed. This report demonstrates the need for further independent analysis and oversight of responses made to CSA by both criminal justice, religious and social institutions. Meaningful change will only be accessible, however, if family, community and institutional environments are safe places for survivors to disclose their experiences of abuse and begin to seek ways of healing. There is much to be learnt from survivors that have already made this journey.
Resumo:
In this presentation, renowned arts practitioner, Sean Mee, and Nigel Lavender, Executive Director of the Queensland Music Festival, talk about how community arts practice can be used to build cultural captial in communities, using examples such large-scale musicals such as The Road We're ON (Charleville) and Behind the Cand (Bowen), Mee and Lavender highlight the importance of community-driven narrative and particiaption.
Resumo:
In this study, I investigate the model of English language teacher education developed in Cuba. It includes features that would be considered innovative, contemporary, good practice anywhere in the Western world, as well as having distinctly Cuban elements. English is widely taught in Cuba in the education system and on television by Cuban teachers who are prepared in five-year courses at pedagogical universities by bilingual Cuban teacher educators. This case study explores the identity and pedagogy of six English language teacher educators at Cuba’s largest university of pedagogical sciences. Postcolonial theory provides a framework for examining how the Cuban pedagogy of English language teacher education resists the negative representation of Cuba in hegemonic Western discourse; and challenges neoliberal Western dogma. Postcolonial concepts of representation, resistance and hybridity are used in this examination. Cuban teacher education features a distinctive ‘pedagogy of tenderness’. Teacher educators build on caring relationships and institutionalised values of solidarity, collectivism and collaboration. Communicative English language teaching strategies are contextualised to enhance the pedagogical and communicative competence of student teachers, and intercultural intelligibility is emphasised. The collaborative pedagogy of Cuban English language teacher education features peer observation, mentoring and continuing professional development; as well as extensive pre-service classroom teaching and research skill development for student teachers. Being Cuban and bilingual are significant aspects of the professional identity of case members, who regard their profession as a vocation and who are committed to preparing good English language teachers.