351 resultados para ADVERTISEMENT CALL
Resumo:
Qualitative Criminology: Stories from the Field brings to life the stories behind the research of both emerging and established scholars in Australian criminology. The book’s contributors provided honest, reflective, and decidedly unsanitised accounts of their qualitative research journeys - the lively tales of what really happens when conducting research of this nature, the stories that often make for parenthetical asides in conference papers but tend to be excised from journal articles. This book considers the gap between research methods and the realities of qualitative research. As such, it aims to help researchers and students who conduct qualitative criminological research reflect upon their role as researchers, and the practical, ideological and ethical issues which may arise in the course of their research. It is also a call to criminologists to make public the ‘failures’ and missteps of their research endeavours so that we can learn from one another and become better informed and more reflexive qualitative criminologists.
Resumo:
Acknowledging the recent call to review design creativity and consideration of the body's affective states in education, this paper explores how desire, conceptualized as an immanent force (Deleuze & Guattari, 1987) and an irresistible force (Burke, 1753) can be a means of deeper engagement within the design studio. Positing 'disruption or blockage' as a key agent which propels subjects from fields of normalcy to fields of otherness, and subsequently mobilises distinct modes of desire, this paper takes Edmund Burke's Romantic sublime and Patricia Yaeger's feminine sublime as critical lenses through which to review a first year interior program posited around the body. The paper highlights how the embodiment of 'desirous processes' within the design program and relational encounters within the studio represent an overarching pedagogical 'hinge' (Ellsworth, 2005). Rather than being a point of beginning, the start of first year is seen and experienced as a threshold opening to a new rhythm in a proces of becoming that is already underway.
The backfilled GEI : a cross-capture modality gait feature for frontal and side-view gait recognition
Resumo:
In this paper, we propose a novel direction for gait recognition research by proposing a new capture-modality independent, appearance-based feature which we call the Back-filled Gait Energy Image (BGEI). It can can be constructed from both frontal depth images, as well as the more commonly used side-view silhouettes, allowing the feature to be applied across these two differing capturing systems using the same enrolled database. To evaluate this new feature, a frontally captured depth-based gait dataset was created containing 37 unique subjects, a subset of which also contained sequences captured from the side. The results demonstrate that the BGEI can effectively be used to identify subjects through their gait across these two differing input devices, achieving rank-1 match rate of 100%, in our experiments. We also compare the BGEI against the GEI and GEV in their respective domains, using the CASIA dataset and our depth dataset, showing that it compares favourably against them. The experiments conducted were performed using a sparse representation based classifier with a locally discriminating input feature space, which show significant improvement in performance over other classifiers used in gait recognition literature, achieving state of the art results with the GEI on the CASIA dataset.
Resumo:
The professional project of social work assumes a particular orientation to human agency on the part of social workers. Specifically, the social work educational literature focusing on the nature of the profession suggests that social workers exert considerable control over the means and ends of their practice. In this paper we ask whether this assumption is warranted. While we conceptualise this issue as relevant to the entire spectrum of professional social work practice, here we discuss our claim in relation to social workers adopting policy activist roles. We suggest that the actual engagement of social workers in policy practice and political change in liberal democracies is muted and we canvas a number of reasons that help explain why this is the case. We canvas the impact of naive conceptualisations of what we call the ‘heroic agency’ of social work identity as employed in texts used in pre-service social work education. Specifically we pose the thesis that new social work graduates, when immersed into the organisational rationalities of reconfigured ‘welfare states’, may experience a considerable mismatch between the promise of being a social change agent and their experience as a beginning practitioner, making it difficult for them to confidently articulate their political identity and purpose.
Resumo:
Many studies have focused on why deliberative institutions should be established in order to develop Chinese people’s citizenry skills; however few focus on the social conditions and public sentiments that shape the development of deliberative mechanisms. Skills and awareness of citizenry is not only brought into being by deliberative institutions that are set up by the government, but evolve through interplays between technologies and social changes. As a test-bed for economic reform Guangdong is increasingly identified by translocality and hybrid culture. This is framed by identity conflict and unrests, much of which is due to soaring wealth polarisation, high volumes of population movement, cultural collisions and ongoing linguistic contestations. These unrests show the region’s transformation goes beyond the economic front. Profound changes are occurring at what anthropologists and philosophers call the changing social conciseness or moral landscape (Ci, 1994; Yan, 2010). The changing social moralities are a reflection of the awareness of individuals’ rights and responsibilities, and their interdependencies from dominant ideologies. This paper discusses Guangdong’s social and cultural characteristics, and questions how existing social conditions allow the staging of political deliberation by facilitating political engagement and the formation of public opinion. The paper will investigate the tragedy of Xiao Yueyue in Foshan, Guangdong, where ‘right’ and ‘responsibility’, ‘self’ and ‘other’ define the public sentiments of deliberation and participation.
Resumo:
As an artist my primary interest is in the abstract, that is in images of the imageless. I am curious about the emergence of pictorial significance and content from this unknowable space. To speak of the significance of an imageless image is also to speak of its affect. I aim to explore this both theoretically and practically. Theoretically I will explore affect through the late work of Lyotard and his notion of the affect-phrase. This is an under-examined aspect of Lyotard and demarcates a valuable way to look at the origins, impact and ramifications of affect for art. Practically I will apply these understandings to the development of my own creative work which includes both painting and digital work. My studio practice moves towards exploring the unfamiliar through the powerful and restless silence of affect.In this intense space each work or body of work 'leaks' into the next occasioning a sense of borderlessness, or of uncertainty. This interpenetration and co-mingling of conceptual and material terrains combines to present temporal and spatial slippages evident within the works themselves and their making, but it is also evident in bodies of work across the chronology of their making. Through a mapping of my own painting and digital arts practice and the utilisation of Lyotard’s notion of the affect -phrase I aim to describe the action of this ‘charged emptiness’ on creativity and explore and explain its significance on that we call image and its animation of what we call critical discourse.
Resumo:
Recently in Australia, another media skirmish has erupted over the problem we currently call “Attention Deficit Hyperactivity Disorder”. This particular event was precipitated by the comments of a respected District Court judge. His claim that doctors are creating a generation of violent juvenile offenders by prescribing Ritalin to young children created a great deal of excitement, attracting the attention of election-conscious politicians who appear blissfully unaware of the role played by educational policy in creating and maintaining the problem. Given the short (election-driven) attention span of government policymakers, I bypass government to question what those at the front line can do to circumvent the questionable practice of diagnosing and medicating young children for difficulties they experience in schools and with learning.
Resumo:
In offering a critical review of the problem we call “ADHD” this paper progresses in three stages. The first two parts juxtapose the dominant voices emanating from the literature in medicine and psychology, highlighting some interdependency between these otherwise competing interest groups. In part three, the nature of the relationship between these groups and the institution of the school is considered, as is the role that the school may play in the psycho-pathologisation of fidgety, distractible, active children who prove hard to teach. In so doing, the author provides an insight as to why the problem we call “ADHD” has achieved celebrity status in Australia and what the effects of that may be for children who come to be described in these ways.
Resumo:
The project examined the responsiveness of the telenursing service provided by the Child Health Line (hereinafter referred to as CHL). It aimed to provide an account of population usage of the service, the call request types and the response of the service to the calls. In so doing, the project extends the current body of knowledge pertaining to the provision of parenting support through telenursing. Approximately 900 calls to the CHL were audio-recorded over the December 2005-2006 Christmas-New Year period. A protocol was developed to code characteristics of the call, the interactional features between the caller and nurse call-taker, and the extent to which there was (a) agreement on problem definition and the plan of action and (b) interactional alignment between nurse and caller. A quantitative analysis examined the frequencies of the main topics covered in calls to the CHL and any statistical associations between types of calls, length of calls and nurse-caller alignment. In addition, a detailed qualitative analysis was conducted on a subset of calls dealing with the nurse management of calls seeking medical advice and information. Key findings include: • Overall, 74% of the calls discussed parenting and child development issues, 48% discussed health/medical issues, and 16% were information-seeking calls. • More specifically: o 21% discussed health/medical and parenting and child development issues. o 3% discussed parenting and information-seeking issues. o 5% discussed health/medical, parenting/development and information issues. o 18% exclusively focussed on health and medical issues and therefore were outside the remit of the intended scope of the CHL. These calls caused interactional dilemmas for the nurse call-takers as they simultaneously dealt with parental expectations for help and the CHL guidelines indicating that offering medical advice was outside the remit of the service. • Most frequent reasons for calling were to discuss sleep, feeding, normative infant physical functions and parenting advice. • The average length of calls to the CHL was 7 minutes. • Longer calls were more likely to involve nurse call-takers giving advice on more than one topic, the caller displaying strong emotions, the caller not specifically providing the reason for the call, and the caller discussing parenting and developmental issues. • Shorter calls were characterised by the nurse suggesting that the child receive immediate medical attention, the nurse emphasising the importance or urgency of the plan of action, the caller referring to or requesting confirmation of a diagnosis, and caller and nurse call-taker discussion of health and medical issues. • The majority of calls, 92%, achieved parent-nurse alignment by the conclusion of the call. However, 8% did not. • The 8% of calls that were not aligned require further quantitative and qualitative investigation of the interactional features. The findings are pertinent in the current context where Child Health Line now resides within 13HEALTH. These findings indicate: 1. A high demand for parenting advice. 2. Nurse call-takers have a high level of competency in dealing with calls about parenting and normal child development, which is the remit of the CHL. 3. Nurse call-takers and callers achieve a high degree of alignment when both parties agree on a course of action. 4. There is scope for developing professional practice in calls that present difficulties in terms of call content, interactional behaviour and call closure. Recommendations of the project: 1. There are numerous opportunities for further research on interactional aspects of calls to the CHL, such as further investigations of the interactional features and the association of the features to alignment and nonalignment. The rich and detailed insights into the patterns of nurse-parent interactions were afforded by the audio-recording and analysis of calls to the CHL. 2. The regular recording of calls would serve as a way of increasing understanding of the type and nature of calls received, and provide a valuable training resource. Recording and analysing calls to CHL provides insight into the operation of the service, including evidence about the effectiveness of triaging calls. 3. Training in both recognising and dealing with problem calls may be beneficial. For example, calls where the caller showed strong emotion, appeared stressed, frustrated or troubled were less likely to be rated as aligned calls. In calls where the callers described being ‘at their wits end’, or responded to each proposed suggestion with ‘I’ve tried that’, the callers were fairly resistant to advice-giving. 4. Training could focus on strategies for managing calls relating to parenting support and advice, and parental well-being. The project found that these calls were more likely to be rated as being nonaligned. 5. With the implementation of 13HEALTH, future research could compare nurse-parent interaction following the implementation of triaging. Of the calls, 21% had both medical and parenting topics discussed and 5.3% discussed medical, parenting and information topics. Added to this, in 12% of calls, there was ambiguity between the caller and nurse call-taker as to whether the problem was medical or behavioural.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
This thesis examines online spoof videos in China. It shows the relationship between user-created content and change and how such videos are impacting on social memory. In the West, we are witnessing two outstanding trends in media. On the one hand, media are turning more "demotic" (Turner, 2006) and "participatory" (Jenkins, 2006), whereby lay audiences use popular media for identity formation, representation and association, reconfiguring the media and cultural landscape, and rendering invalid the old paradigm based on the dichotomy of audience and author, creator and consumer, expert and amateur. On the other hand, in both mainstream media and user-creation online there is a trend towards "silly citizenship", with comedy, send-ups and spoofs that used to reside in the margin propelled to the central stage in both pleasure and politics (Hartley, 2010), as is shown in the rising popularity of the Daily Show, Colbert Report, and spoof videos in elections ,e.g. the 2008 presidential election in US (Gray, Jones, & Thompson, 2009; Tryon, 2008). User generated content—and spoof subcultures—is now much a debated phenomenon in China. However, with different political (one party rule and censorship) and cultural (media regarded mainly as instrument for education and social stabilization instead of a critical fourth estate) configurations, will the social and cultural impacts of the two trends in the West be as the same in China? If not, what will be the specificities in the China context? The project starts with a historical review of popular culture and user-created content in China, before turning to spoof videos and looking at how they are produced and shared, travel and diffused on the Internet, and how the communities and sub-cultures forming and emerging around spoof videos are changing the overall cultural landscape in China. By acting as a participant observer in online video sharing sites and conducting face-to face as well as online interviews, I identify lead users and creators of spoof videos and the social networks emerging around them. I call these lead users "skill hubs" and their networks "liquid communities", foregrounding the fact that their appeal doesn’t come from their amicable personality, but rather from their creative skills; and that the networks surrounding them are in a permanent flux, with members coming and going as they see fit. I argue that the "liquidness" (Bauman, 2000) of these communities is what makes them constantly creative and appealing. Textual analysis of online videos, their comments and derivatives are conducted to tease out the uses that that can be made of spoof videos, namely as phatic communication, as alternative memory and as political engagement. Through these analyses I show that spoof videos constitute not only a space where young generations can engage with each other, communicate their anger and dissatisfaction, fun and hope, and where they participate in socio-cultural and political debates, but also create a space where they can experiment with their new skills, new ideas, and new citizenship. The rise of spoof videos heralds the beginning of a trend in popular culture in contemporary China towards the "canonization of the jester" and the dethroning of the establishment. I also argue that a historical perspective is needed to understand the current surge of use creativity and user activism in China, and that many forms of popular media we experience today have their antecedents in various stages of Chinese history. The entrenched "control-resistance" binary is inadequate in interpreting the rich, flux and multilayered Internet space in China.
Resumo:
Smartphones are getting increasingly popular and several malwares appeared targeting these devices. General countermeasures to smartphone malwares are currently limited to signature-based antivirus scanners which efficiently detect known malwares, but they have serious shortcomings with new and unknown malwares creating a window of opportunity for attackers. As smartphones become host for sensitive data and applications, extended malware detection mechanisms are necessary complying with the corresponding resource constraints. The contribution of this paper is twofold. First, we perform static analysis on the executables to extract their function calls in Android environment using the command readelf. Function call lists are compared with malware executables for classifying them with PART, Prism and Nearest Neighbor Algorithms. Second, we present a collaborative malware detection approach to extend these results. Corresponding simulation results are presented.
Resumo:
Cyclone Yasi struck the Cassowary Coast of Queensland in the early hours of Feb 3, 2011, destroying many homes sand property, including the destruction of the Cardwell and district historical society’s premises. With their own homes flattened, many were forced to live in mobile accommodation, with extended family, or leave altogether. The historical society members however were more devastated by their flattened foreshore museum and loss of their collection material. A call for assistance was made through the OHAA Qld branch, who along with QUT sponsored a trip to somehow plan how they could start to pick up the pieces to start again. This presentation highlights the need for communities to gather, preserve and present their own stories, in a way that is sustainable and meaningful to them, but that good advice and support along the way is important. Two 2 day workshops were held in March and then September, augmented by plenty of email correspondence and phone calls in between. Participants learnt that if they could conduct quality oral history interviews, they could later use these in many exhibitable ways including: documentary pieces; digital stories; photographic collections; creative short stories; audio segments –while also drawing closely together a suffering community. This story is not only about the people who were interviewed about the night Yasi struck, but the amazing women (all over 50) of the historical society who were willing to try and leap the digital divide that faces older Australians, especially those in rural Australia, so that their older local stories would not be lost and so that new stories could also be remembered.
Resumo:
Qualitative Criminology: Stories from the Field brings to life the stories behind the research of both emerging and established scholars in Australian criminology. The book’s contributors provided honest, reflective, and decidedly unsanitised accounts of their qualitative research journeys - the lively tales of what really happens when conducting research of this nature, the stories that often make for parenthetical asides in conference papers but tend to be excised from journal articles. This book considers the gap between research methods and the realities of qualitative research. As such, it aims to help researchers and students who conduct qualitative criminological research reflect upon their role as researchers, and the practical, ideological and ethical issues which may arise in the course of their research. It is also a call to criminologists to make public the ‘failures’ and missteps of their research endeavours so that we can learn from one another and become better informed and more reflexive qualitative criminologists.
Resumo:
ICT integration has been advocated to provide opportunities to improve students’ achievement and engagement through transforming the educational setting. A valuable tool that contributes in enhancing and developing students’ cognitive skills for lifelong learning, ICT integration has introduced a new educational philosophy, shifting the role of students into a more central position in the pedagogical processes. Kuwait, as with many other countries, has recently planned ICT integration to develop its citizen’s capacities. This study sought to capture the principals’, teachers’, and students’ perceptions of ICT integration in pedagogical activities, as well as how ICT is being used for learning and teaching activities in three ICT leading Kuwaiti secondary schools. Interviews with principals, teachers, and students were conducted, along with an open-ended questionnaire for the teachers, researcher observations, and document analysis. The findings revealed that ICT integration in Kuwait needed to be reinforced to accomplish the ICT integration objectives. A call for further support for teachers, and a reconsideration of the ICT integration strategies were also recommended.