369 resultados para positive identity
Resumo:
Digital Stories are short autobiographical documentaries, often illustrated with personal photographs and narrated in the first person, and typically produced in group workshops. As a media form they offer ‘ordinary people’ the opportunity to represent themselves to audiences of their choosing; and this amplification of hitherto unheard voices has significant repercussions for their social participation. Many of the storytellers involved in the ‘Rainbow Family Tree’ case study that is the subject of this paper can be characterised as ‘everyday’ activists for their common desire to use their personal stories to increase social acceptance of marginalised identity categories. However, in conflict with their willingness to share their personal stories, many fear the risks and ramifications of distributing them in public spaces (especially online) to audiences both intimate and unknown. Additionally, while technologies for production and distribution of rich media products have become more accessible and user-friendly, many obstacles remain. For many people there are difficulties with technological access and aptitude, personal agency, cultural capital, and social isolation, not to mention availability of the time and energy requisite to Digital Storytelling. Additionally, workshop context, facilitation and distribution processes all influence the content of stories. This paper explores the many factors that make ‘authentic’ self-representation far from straight forward. I use qualitative data drawn from interviews, Digital Story texts and ethnographic observation of GLBTQIS participants in a Digital Storytelling initiative that combined face-to-face and online modes of participation. I consider mediating influences in practice and theory and draw on strategies put forth in cultural anthropology and narrative therapy to propose some practical tools for nuanced and sensitive facilitation of Digital Storytelling workshops and webspaces. Finally, I consider the implications of these facilitation strategies for voice, identity and social participation.
Resumo:
A review of the 6th APT focusing on the work and performance of Rohan Wealleans
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
Decades of research has now produced a rich description of the destruction child sexual assault (CSA) can cause in an individual’s life. Post-Traumatic Stress Disorder (PTSD), Dissociative Identity Disorder, Borderline Personality Disorder, depression, anxiety, Panic Disorder, intimacy issues, substance abuse, self-harm, and suicidal ideation and attempts, are some of the negative outcomes that have been attributed to this type of traumatic experience. Psychology's tendency to dwell within a pathological paradigm, along with popular media who espouse a similar rhetoric, would lead to the belief that once exposed to CSA, an individual is forever at the mercy of dealing with a massive array of accompanying negative effects. While the possibility of these outcomes in those who have experienced CSA is not at all denied, it is also timely to consider an alternative paradigm that up until now has received a paucity of attention in the sexual assault literature. That is to say, not only do people have the ability to work through the painful and personal impacts of CSA, but for some people the process of recovery may provide a catalyst for positive life changes that have been termed post-traumatic growth (Tedeschi & Calhoun, 1995). To begin with in this chapter, the negative sequale’ of childhood sexual assault it discussed initially. Inherent to this discussion are questions of measurement and definitions of sexual assault. The chapter highlights ways in which the term CSA has been defined and hence operationalised in research, and the myriad problems, confusions, and inconclusive findings that have plagued the sexual assault literature. Following this is a review of the sparse literature that has conceptualised CSA from a more salutogenic (Antonovsky, 1979) theoretical orientation. It is argued that a salutogenic approach to intervention and to research in this area, provides a more useful way of promoting healing and the gaining of wisdom, but importantly does not negate the very real distress that may accompany growth. This chapter will then present a case study to elucidate the theoretical and empirical literature discussed using the words of a survivor. Finally, the chapter concludes with implications for therapeutic practice, which includes some practical ways in which to promote adaptation to life within the context of having survived this insidious crime.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
Previous studies have enabled exact prediction of probabilities of identity-by-descent (IBD) in randommating populations for a few loci (up to four or so), with extension to more using approximate regression methods. Here we present a precise predictor of multiple-locus IBD using simple formulas based on exact results for two loci. In particular, the probability of non-IBD X ABC at each of ordered loci A, B, and C can be well approximated by XABC = XABXBC/XB and generalizes to X123. . .k = X12X23. . .Xk-1,k/ Xk-2, where X is the probability of non-IBD at each locus. Predictions from this chain rule are very precise with population bottlenecks and migration, but are rather poorer in the presence of mutation. From these coefficients, the probabilities of multilocus IBD and non-IBD can also be computed for genomic regions as functions of population size, time, and map distances. An approximate but simple recurrence formula is also developed, which generally is less accurate than the chain rule but is more robust with mutation. Used together with the chain rule it leads to explicit equations for non-IBD in a region. The results can be applied to detection of quantitative trait loci (QTL) by computing the probability of IBD at candidate loci in terms of identity-by-state at neighboring markers.
Resumo:
This research examines the effects of expectation (perceived attractiveness) on satisfaction, place identity, and place dependence. Place identity and place dependence are viewed as relational components of choice and relate to deeper needs. This study proposes that these two relational components depend on transactional expectations, which are emergent and determined by past experiences and visitor goals. In a theoretically elaborated and tested Structural Equation Model (SEM) this study assumes that these relationships vary according to intentions to return. The study addresses the conditions under which loyalty intentions influence the deeper place attachments (place identity and place dependence) that visitors associate with attractive cultural and natural destinations. The model is tested on a sample of 504 international tourists visiting Tanzania during fall 2010, and explains 59% of variance in the predicted dependent variables. The results are linked to a discussion on loyalty programs.
Resumo:
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.
Resumo:
The ongoing crises of child sexual abuse by Christian institutions leaders across the Anglophone world continue to attract public attention and public inquiries. The pervasiveness of this issue lends credence to the argument that the prevailing ethos functioning within some Christian Institutions is one which exercises influence to repeatedly mismanage allegations of child sexual abuse by Church leaders. This work draws on semistructured interviews conducted with 15 Personnel in Christian Institutions (PICIs) in Australia who were identified as being pro-active in their approach to addressing child sexual abuse by PICIs. From these data, themes of power and forgiveness are explored through a Foucaultian conceptualising of pastoral power and ‘truth’ construction. Forgiveness is viewed as a discourse which can have the power effect of either silencing or empowering victim/survivors. The study concludes that individual PICIs’ understandings of the role ofpower in their praxis influences outcomes from the deployment of forgiveness.
Resumo:
In this presentation, renowned arts practitioner, Sean Mee, and Nigel Lavender, Executive Director of the Queensland Music Festival, talk about how community arts practice can be used to build cultural captial in communities, using examples such large-scale musicals such as The Road We're ON (Charleville) and Behind the Cand (Bowen), Mee and Lavender highlight the importance of community-driven narrative and particiaption.
Resumo:
In this study, I investigate the model of English language teacher education developed in Cuba. It includes features that would be considered innovative, contemporary, good practice anywhere in the Western world, as well as having distinctly Cuban elements. English is widely taught in Cuba in the education system and on television by Cuban teachers who are prepared in five-year courses at pedagogical universities by bilingual Cuban teacher educators. This case study explores the identity and pedagogy of six English language teacher educators at Cuba’s largest university of pedagogical sciences. Postcolonial theory provides a framework for examining how the Cuban pedagogy of English language teacher education resists the negative representation of Cuba in hegemonic Western discourse; and challenges neoliberal Western dogma. Postcolonial concepts of representation, resistance and hybridity are used in this examination. Cuban teacher education features a distinctive ‘pedagogy of tenderness’. Teacher educators build on caring relationships and institutionalised values of solidarity, collectivism and collaboration. Communicative English language teaching strategies are contextualised to enhance the pedagogical and communicative competence of student teachers, and intercultural intelligibility is emphasised. The collaborative pedagogy of Cuban English language teacher education features peer observation, mentoring and continuing professional development; as well as extensive pre-service classroom teaching and research skill development for student teachers. Being Cuban and bilingual are significant aspects of the professional identity of case members, who regard their profession as a vocation and who are committed to preparing good English language teachers.
Resumo:
Since the emergence of diagnostic medical tests in Australia in 1990, hepatitis C (HCV) has been shown to account for over 90 percent of all non-A non-B hepatitis, revealing it to be a widespread and major public health problem. The diagnosis of HCV involves a diverse range of issues for affected persons, introducing identity and lifestyle changes, which are commonly articulated through psychological concepts. In this article we argue that it is important to examine the broader social and cultural contexts that contribute to the experiences of persons affected by HCV. The thematic analysis of qualitative data from six individuals diagnosed with HCV is included to exemplify some of the processes that are involved in the changing identity of a person following a positive diagnosis. The theoretical framework for the interpretation of these processes is interpretive interactionism. In this research, we are attempting to extend the understanding of the effects of HCV diagnoses beyond internal, psychological processes by examining how these diagnoses transform some of the processes of self-formation and expression. The participants’ experiences indicate that there are at least four dimensions of self that were significant to their changing sense of self: relationship of self to others; the emotional self; self-stories and identity; and self-scrutiny and relationships. We conclude that a socio-cultural perspective contributes to the explanation of the transition period following a HCV-positive diagnosis and the redefinition of self towards a HCV status.
Resumo:
Stigmergy is a biological term originally used when discussing insect or swarm behaviour, and describes a model supporting environment-based communication separating artefacts from agents. This phenomenon is demonstrated in the behavior of ants and their food foraging supported by pheromone trails, or similarly termites and their termite nest building process. What is interesting with this mechanism is that highly organized societies are formed without an apparent central management function. We see design features in Web sites that mimic stigmergic mechanisms as part of the User Interface and we have created generalizations of these patterns. Software development and Web site development techniques have evolved significantly over the past 20 years. Recent progress in this area proposes languages to model web applications to facilitate the nuances specific to these developments. These modeling languages provide a suitable framework for building reusable components encapsulating our design patterns of stigmergy. We hypothesize that incorporating stigmergy as a separate feature of a site’s primary function will ultimately lead to enhanced user coordination.