447 resultados para identity beyond border
Resumo:
This project is a passionate and sometimes enraged thrust toward a biodiverse future. Weaving stories with deep thinking beyond the limits of the anthropocene, I am trying to recall myself in a more-than-human world. Our planet is suffering human induced ecocide which is a global crisis threatening the existence of multiple life forms. The alchemical mix of storytelling and ecological thinking could be part remedy for humanity's adaptation: a transformational mix to re-pattern the crisis into an opportunity and shift anthropocentric structures toward networks of dynamic relationships. The purpose of this project is to explore this cultural remedy. This is a quest, a search for tools that can germinate the hypothesis: storytelling in relation to ecological thinking manifests human potential in a more-than-human world. The practice-led research is guided by the philosophy and practice of Mythology, Deep ecology and Transdisciplinarity. Further navigation is sourced from Systems Thinking, Indigenous Methodologies, Biomimicry, and Quantum Physics. The journey unfolds by reawakening the Artist's function as caretaker of Mythology and pattern inciter for the collective. The resounding discovery of this adventure is Quantum Narratives: a storytelling tool for today's world, a method to connect multiple ways of knowing and diverse languages with the purpose of engaging, relating and working with living knowledge. Quantum Narratives are used to test the field study research into the Future of Water in context of Coal Seam Gas Mining in the Murray-Darling Basin and to materialise the collaborative results as the Water Stories. This thesis is a Living Script, full of imagination and complexity. Within its folds are strategies for systemic change ready to be adapted by policy and planning brokers and those who hold power for widespread remedial action.
Resumo:
Online storytelling spaces provide young people who live in rural and remote parts of Australia with an opportunity to develop their personal identities and connect and communicate with other young people. The Australian Broadcasting Corporation’s (ABC’s) rural and regional youth network, Heywire, is such a space (http://www.abc.net.au/heywire/). Heywire invites 16-22 year old Australians who identify as ‘rural’ or ‘regional’ to create an online profile and upload stories about their lives in the form of text, audio, video or photographs. Emerging from my PhD project, this paper describes how rural and regional youth perform their identities through creating stories for the Heywire website, addressing notions of individual and social identities as a sub-theme. Compared with their city counterparts, the youth who live in regional towns or isolated properties have fewer opportunities to socialise with other people their own age. Subsequently computer mediated technologies, particularly the internet, can enable this group of people to connect with each other and develop a sense of community. In this paper I outline how these possibilities exist within an online storytelling space. I describe a number of reasons for young people’s story-sharing on the Heywire website in order to demonstrate the potential for spaces such as this to enable isolated youth to experience a sense of connection and belonging, despite geographical dispersion and physical isolation.
Resumo:
Capstone units are generally seen to have three main aims: integrating the program, reflecting on prior learning, and transitioning into the workplace. However, research indicates that most programs do not achieve outcomes in all three areas with Henscheid (2000) revealing that integration is the major goal of many capstone programs. As well, in the accounting education literature there has been little empirical evidence relating to the effectiveness of student learning as a result of implementing a capstone unit. This study reports on the development and implementation of an accountancy capstone unit at the Queensland University of Technology (QUT), which began in 2006. The main features of this capstone unit are: the use of problem-based learning (PBL); integration of the program; the development of a professional identity whereby classes are broken up into groups of a maximum of five students who take on the persona of a professional accounting firm for an entire semester; and the students, acting as professional advisors within that firm, are required to solve a series of unstructured, multi-dimensional accounting problems based on limited given facts. This process is similar to a professional advisor asking a client about the facts relating to the particular problem of the client and then solving the problem. The research was conducted over nine semesters and involved the collection of both quantitative and qualitative data from a student questionnaire. The results indicate that in terms of student perceptions, the capstone unit was very effective in enhancing integration of the program and enhancing professional identity thereby assisting student transition into the professional accounting workplace. Our approach therefore meets two of the three generally accepted aims of a capstone unit. With accounting educators striving to maximise student learning from a finite set of resources, this approach using PBL has resulted in improved learning outcomes for accounting students about to enter the workplace as professionals.
Resumo:
The Beyond Compliance project, which began in July 2011 with funding from the Standards and Trade Development Facility for 2 years, aims to enhance competency and confidence in the South East Asian sub-region by applying a Systems Approach for pest risk management. The Systems Approach involves the use of integrated measures, at least two of which are independent, that cumulatively reduce the risk of introducing exotic pests through trade. Although useful in circumstances where single measures are inappropriate or unavailable, the Systems Approach is inherently more complicated than single-measure approaches, which may inhibit its uptake. The project methodology is to take prototype decision-support tools, such as Control Point-Bayesian Networks (CP-BN), developed in recent plant health initiatives in other regions, including the European PRATIQUE project, and to refine them within this sub-regional context. Case studies of high-priority potential agricultural trade will be conducted by National Plant Protection Organizations of participating South East Asian countries in trials of the tools, before further modifications. Longer term outcomes may include: more robust pest risk management in the region (for exports and imports); greater inclusion of stakeholders in development of pest risk management plans; increased confidence in trade negotiations; and new opportunities for trade.
Resumo:
In this chapter we will describe the contemporary variety of practice-oriented training institutions in Australia. We will examine the different ways in which public and private providers are managing the challenges of digitization and convergence. We will consider the logics governing film education this mix of providers pulls into focus, and we will outline some of the challenges providers face in educating, (re)training, and preparing their graduates for life and work beyond the film school. These challenges highlight questions about the accountabilities and responsibilities of practice-oriented film education institutions. This chapter begins with an introductory section that outlines these logics and questions. It explores some of the tensions and dynamics within the spectrum of issues through which we can understand film schools. The chapter then goes on briefly to describe the multifaceted training landscape in Australia, before profiling the leading public provider, the Australian Film, Television and Radio School (AFTRS), as well as the other leading public providers the Victorian College of the Arts, and the Griffith Film School. It concludes with a short section on film education in primary and secondary schools as the education sector prepares for the implementation of a national curriculum in which ‘media arts’ has a new centrality.
Resumo:
Countless studies have stressed the importance of social identity, particularly its role in various organizational outcomes, yet questions remain as to how identities initially develop, shift and change based on the configuration of multiple, pluralistic relationships grounded in an organizational setting. The interactive model of social identity formation has been proposed recently to explain the internalization of shared norms and values – critical in identity formation – has not received empirical examination. We analyzed multiple sources of data from nine nuclear professionals over three years to understand the construction of social identity in new entrants entering an organization. Informed by our data analyses, we found support for the interactive model and that age and level of experience influenced whether they undertook an inductive or deductive route of the group norm and value internalization. This study represents an important contribution to the study of social identity and the process by which identities are formed, particularly under conditions of duress or significant organizational disruption.
Resumo:
The term fashion system describes inter-relationships between production and consumption, illustrating how the production of fashion is a collective activity. For instance, Yuniya Kawamura (2011) notes systems for the production of fashion differ around the globe and are subject to constant change, and Jennifer Craik (1994, 6) draws attention to an ‘array of competing and intermeshing systems cutting across western and non-western cultures. In China, Shanghai’s nascent fashion system seeks to emulate the Eurocentric system of Fashion Weeks and industry support groups. It promises designers a platform for global competition, yet there are tensions from within. Interaction with a fashion system inevitably means becoming validated or legitimised. Legitimisation in turn depends upon gatekeepers who make aesthetic judgments about the status, quality, and cultural value of a designers work (Becker 2008). My paper offers a new perspective on legitimisation that is drawn mainly from my PhD research. I argue that some Chinese fashion designers are on the path to becoming global fashion designers because they have embraced a global aesthetic that resonates with the human condition, rather than the manufactured authenticity of a Eurocentric fashion system that perpetuates endless consumption. In this way, they are able to ‘self-legitimise’. I contend these designers are ‘designers for humans’, because they are able to look beyond the mythology of fashion brands, and the Eurocentric fashion system, where they explore the tensions of man and culture in their practice. Furthermore, their design ethos pursues beauty, truth and harmony in the Chinese philosophical sense, as well as incorporating financial return in a process that is still enacted through a fashion system. Accordingly, cultural tradition, heritage and modernity, while still valuable, have less impact on their practice.
Resumo:
Poets have a licence to couch great truths in succinct, emotionally powerful, and perhaps slightly mysterious and ambiguous ways. On the other hand, it is the task of academics to explore such truths intellectually, in depth and detail, identifying the key constructs and their underlying relations and structures, hopefully without impairing the essential truth. So it could be said that in January 2013, around 60 academics gathered at the University of Texas, Austin under the benign and encouraging eye of their own muse, Professor Rod Hart, to play their role in exploring and explaining the underlying truth of Yan Zhen’s words. The goals of this chapter are quite broad. Rod was explicit and yet also somewhat Delphic in his expectations and aspirations for the chapter. Even though DICTION was a key analytic tool in most chapters, this chapter was not to be about DICTION per se, or simply a critique of the individual chapters forming this section of the book. Rather DICTION and these studies, as well as some others that got our attention, were to be more a launching pad for observations on what they revealed about the current state of understanding and research into the language of institutions, as well as some ‘adventurous’, but not too outlandish reflections on future challenges and opportunities.
Resumo:
The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( IND-CCA ), and can be used to construct privacy-preserving protocols such as deniable authentication. Unlike many other security notions, plaintext awareness is very fragile when it comes to differences between the random oracle and standard models; for example, many implications involving PA in the random oracle model are not valid in the standard model and vice versa. Similarly, strategies for proving PA of schemes in one model cannot be adapted to the other model. Existing research addresses PA in detail only in the public key setting. This paper gives the first formal exploration of plaintext awareness in the identity-based setting and, as initial work, proceeds in the random oracle model. The focus is laid mainly on identity-based key encapsulation mechanisms (IB-KEMs), for which the paper presents the first definitions of plaintext awareness, highlights the role of PA in proof strategies of IND-CCA security, and explores relationships between PA and other security properties. On the practical side, our work offers the first, highly efficient, general approach for building IB-KEMs that are simultaneously plaintext-aware and IND-CCA -secure. Our construction is inspired by the Fujisaki-Okamoto (FO) transform, but demands weaker and more natural properties of its building blocks. This result comes from a new look at the notion of γ -uniformity that was inherent in the original FO transform. We show that for IB-KEMs (and PK-KEMs), this assumption can be replaced with a weaker computational notion, which is in fact implied by one-wayness. Finally, we give the first concrete IB-KEM scheme that is PA and IND-CCA -secure by applying our construction to a popular IB-KEM and optimizing it for better performance.
Resumo:
In 'Three Dogmas of Juvenile Justice', Weatherburn, McGrath and Bartels identify three 'assumptions' or 'dogmas' about youth justice, on which they claim 'juvenile justice policy in Australia currently rests'.
Resumo:
Creative workers are employed in sectors outside the Creative Industries often in greater numbers than within. This is the first book to explore the phenomena of the embedded creative and creative services through a range of sectors, disciplines, and perspectives. Despite the emergence of these creative workers, very little is known about their work life, and why companies seek to employ them. This book asks: how does creative work actually ‘embed’ into a service or product supply chain? What are creative services? What work are embedded creatives doing? Which industries are they working in? This collection explores these questions in relation to innovation, employment and education, using various methods and theoretical approaches, in order to examine the value of the embedded creative and creative services and to discover the implications of education and training for these creative workers. This book will be of interest to practitioners, policy makers and industry leaders in the Creative Industries, in particular digital media, application development, design, journalism, media and communication. It will also appeal to academics and scholars of innovation, Cultural Studies, business management and Labour Studies.
Resumo:
This thesis examined the influence of mobile digital technology on the brand identity of luxury brands. Specifically it focused on the use of mobile applications by automobile, hotel and beauty brands and compared the perceptions of marketing managers with consumers on how mobile applications influenced luxury brand identity and image. Outcomes of this research included a model to depict the ongoing process between mobile-mediated luxury brand identity and image, and a typology of luxury brand mobile applications listing key features of mobile-mediated luxemosphere. Overall findings suggest that the influence of mobile applications on luxury brand identity has been negative, as their brand image appeared to be degraded, resulting in diminishing the brand identity.