440 resultados para gender identity
Resumo:
"Defrauding land titles systems impacts upon us all. Those who deal in land include ordinary citizens, big business, small business, governments, not-for-profit organisation, deceased estates...Fraud here touches almost everybody." the thesis presented in this paper is that the current and disparate steps taken by jurisdictions to alleviate land fraud associated with identity-based crimes are inadequate. The centrepiece of the analysis is the consideration of two scenarios that have recently occurred. One is the typical scenario where a spouse forges the partner's signature to obtain a mortgage from a financial institution. The second is atypical. It involves a sophisticated overseas fraud duping many stakeholders involved in the conveyancing process. After outlining these scenarios, we will examine how identity verification requirements of the United Kingdom, Ontario, the Australian states, and New Zealand would have been applied to these two frauds. Our conclusion is that even though some jurisdictions may have prevented the frauds from occurring, the current requirements are inadequate. We use the lessons learnt to propose what we consider core principles for identity verification in land transactions.
Resumo:
• The Queensland context • Rationale and aims • Method • Demographics and basic data • Avoidance of driving and walking situations • Success of intended avoidance • Further analyses (preliminary results) • Implications
Resumo:
The development of the Australian Curriculum has reignited a debate about the role of Australian literature in the contexts of curricula and classrooms. A review of the mechanisms for promoting Australian literature including literary prizes, databases, surveys and texts included for study in senior English classrooms in New South Wales and Victoria provides a background for considering the purpose of Australian texts and the role of literature teachers in shaping students’ engagement with literature.
Resumo:
The World Wide Web constitutes one of the most important inventions of the late 20th century: it has changed culture, society, business, communication, politics, and many other fields of human endeavour, not least also by providing a more user-friendly pathway of access to its major underlying technology, the Internet itself. Key phases in its development can be charted, especially by how it has been used to present and share information – and here, the personal or professional, private or official homepage stands in as a useful representation of wider Web trends overall. From hand-coded beginnings through several successive stages of experimentation and standardisation, to the shifting balance between personal sites and social networks, the homepage demonstrates how the Web itself, and its place in our lives, have changed.
Resumo:
Differing parental considerations for girls and boys in households are a primary cause of the gender gap in school enrolment and educational attainment in developing countries, particularly in Sub-Saharan Africa and South Asia. While a number of studies have focused on the inequality of educational opportunities in South Asia, little is known about Bhutan. This study uses recent household expenditure data from the Bhutan Living Standard Survey to evaluate the gender gap in the allocation of resources for schooling. The findings, based on cross-sectional as well as household fixed-effect approaches, suggest that girls are less likely to enrol in school but are not allocated fewer resources once they are enrolled.
Resumo:
This chapter provides an overview of the contribution of feminist criminologies to understandings of the complex intersections between sex, gender and crime. Dozens of scholars and activists have participated in these debates over the past four decades. For our contribution to this handbook, we interviewed ten distinguished scholars whose contributions are recognized internationally. Through the commentary provided by these scholars, this chapter examines some of the distinctive contributions of feminism to our knowledge about sex, gender, and crime, as well as some of the challenges it continues to face in the field of criminology. We conclude that feminist work within criminology continues to face a number of lingering challenges, most notably in relation to the struggle to maintain relevance in a world where concerns about gender inequality are marginalized and considered as historical relics not contemporary issues; where there are on-going tensions around the best strategies for change, as well as difficulties in challenging distorted representations of female crime and violence; and where a backlash, anti-feminist politics seeks to discredit explanations that draw a link between sex, gender, and crime. This chapter critically reviews these lingering challenges—locating feminist approaches (of which there are many) at the centre and not the periphery of advancing knowledge about gender, sex, and crime.
Resumo:
Australian queer (GLBTIQ) university student activist media is an important site of self-representation. Community media is a significant site for the development of queer identity, community and a key part of queer politics. This paper reviews my research into queer student media, which is grounded in a queer theoretical perspective. Rob Cover argues that queer theoretical approaches that study media products fail to consider the material contexts that contribute to their construction. I use an ethnographic approach to examine how editors construct queer identity and community in queer student media. My research contributes to queer media scholarship by addressing the gap that Cover identifies, and to the rich scholarship on negotiations of queer community.
Resumo:
Digital Stories are short autobiographical documentaries, often illustrated with personal photographs and narrated in the first person, and typically produced in group workshops. As a media form they offer ‘ordinary people’ the opportunity to represent themselves to audiences of their choosing; and this amplification of hitherto unheard voices has significant repercussions for their social participation. Many of the storytellers involved in the ‘Rainbow Family Tree’ case study that is the subject of this paper can be characterised as ‘everyday’ activists for their common desire to use their personal stories to increase social acceptance of marginalised identity categories. However, in conflict with their willingness to share their personal stories, many fear the risks and ramifications of distributing them in public spaces (especially online) to audiences both intimate and unknown. Additionally, while technologies for production and distribution of rich media products have become more accessible and user-friendly, many obstacles remain. For many people there are difficulties with technological access and aptitude, personal agency, cultural capital, and social isolation, not to mention availability of the time and energy requisite to Digital Storytelling. Additionally, workshop context, facilitation and distribution processes all influence the content of stories. This paper explores the many factors that make ‘authentic’ self-representation far from straight forward. I use qualitative data drawn from interviews, Digital Story texts and ethnographic observation of GLBTQIS participants in a Digital Storytelling initiative that combined face-to-face and online modes of participation. I consider mediating influences in practice and theory and draw on strategies put forth in cultural anthropology and narrative therapy to propose some practical tools for nuanced and sensitive facilitation of Digital Storytelling workshops and webspaces. Finally, I consider the implications of these facilitation strategies for voice, identity and social participation.
Resumo:
The impact of voters’ gender on leader evaluations in parliamentary systems has been largely unexplored, while the impact of female leaders on voter attitudes and preferences remains to be fully established. This paper uses Julia Gillard’s historic candidacy in the 2010 Australian federal election to explore how voters evaluated Australia’s first female prime minister, and to test the impact of their assessments on vote choice. The authors also examine whether Gillard’s high-profile candidacy affected women’s levels of political interest, awareness and engagement in what had been largely a ‘man’s game’. Their findings confirm that Gillard enjoyed a gender-affinity effect in 2010 in terms of both leader evaluations and vote choice, and women’s political engagement was significantly affected by the Gillard candidacy.
Resumo:
A review of the 6th APT focusing on the work and performance of Rohan Wealleans
Resumo:
We focus on understanding the role of productivity in determining wage structure differences between men and women in academia. The data arise from a pay-equity study carried out in a single Midwestern U.S. university over the 1996–7 academic year. Econometric results confirm that external market forces exert influence over both male and female salary. But peer review ratings play a significant role in male but not female earnings determination, with similar results for objective measures of research, teaching and service.
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.