620 resultados para ”we” identity


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Previous studies have enabled exact prediction of probabilities of identity-by-descent (IBD) in randommating populations for a few loci (up to four or so), with extension to more using approximate regression methods. Here we present a precise predictor of multiple-locus IBD using simple formulas based on exact results for two loci. In particular, the probability of non-IBD X ABC at each of ordered loci A, B, and C can be well approximated by XABC = XABXBC/XB and generalizes to X123. . .k = X12X23. . .Xk-1,k/ Xk-2, where X is the probability of non-IBD at each locus. Predictions from this chain rule are very precise with population bottlenecks and migration, but are rather poorer in the presence of mutation. From these coefficients, the probabilities of multilocus IBD and non-IBD can also be computed for genomic regions as functions of population size, time, and map distances. An approximate but simple recurrence formula is also developed, which generally is less accurate than the chain rule but is more robust with mutation. Used together with the chain rule it leads to explicit equations for non-IBD in a region. The results can be applied to detection of quantitative trait loci (QTL) by computing the probability of IBD at candidate loci in terms of identity-by-state at neighboring markers.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this presentation, renowned arts practitioner, Sean Mee, and Nigel Lavender, Executive Director of the Queensland Music Festival, talk about how community arts practice can be used to build cultural captial in communities, using examples such large-scale musicals such as The Road We're ON (Charleville) and Behind the Cand (Bowen), Mee and Lavender highlight the importance of community-driven narrative and particiaption.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Countless studies have stressed the importance of social identity, particularly its role in various organizational outcomes, yet questions remain as to how identities initially develop, shift and change based on the configuration of multiple, pluralistic relationships grounded in an organizational setting. The interactive model of social identity formation has been proposed recently to explain the internalization of shared norms and values – critical in identity formation – has not received empirical examination. We analyzed multiple sources of data from nine nuclear professionals over three years to understand the construction of social identity in new entrants entering an organization. Informed by our data analyses, we found support for the interactive model and that age and level of experience influenced whether they undertook an inductive or deductive route of the group norm and value internalization. This study represents an important contribution to the study of social identity and the process by which identities are formed, particularly under conditions of duress or significant organizational disruption.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The notion of plaintext awareness ( PA ) has many applications in public key cryptography: it offers unique, stand-alone security guarantees for public key encryption schemes, has been used as a sufficient condition for proving indistinguishability against adaptive chosen-ciphertext attacks ( IND-CCA ), and can be used to construct privacy-preserving protocols such as deniable authentication. Unlike many other security notions, plaintext awareness is very fragile when it comes to differences between the random oracle and standard models; for example, many implications involving PA in the random oracle model are not valid in the standard model and vice versa. Similarly, strategies for proving PA of schemes in one model cannot be adapted to the other model. Existing research addresses PA in detail only in the public key setting. This paper gives the first formal exploration of plaintext awareness in the identity-based setting and, as initial work, proceeds in the random oracle model. The focus is laid mainly on identity-based key encapsulation mechanisms (IB-KEMs), for which the paper presents the first definitions of plaintext awareness, highlights the role of PA in proof strategies of IND-CCA security, and explores relationships between PA and other security properties. On the practical side, our work offers the first, highly efficient, general approach for building IB-KEMs that are simultaneously plaintext-aware and IND-CCA -secure. Our construction is inspired by the Fujisaki-Okamoto (FO) transform, but demands weaker and more natural properties of its building blocks. This result comes from a new look at the notion of γ -uniformity that was inherent in the original FO transform. We show that for IB-KEMs (and PK-KEMs), this assumption can be replaced with a weaker computational notion, which is in fact implied by one-wayness. Finally, we give the first concrete IB-KEM scheme that is PA and IND-CCA -secure by applying our construction to a popular IB-KEM and optimizing it for better performance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Aboriginal Australians have a long history of eating native animals and plants. Food preparation techniques were handed down through the generations, without any need for cookbooks. But colonisation changed the diets of Aboriginal Australians, introducing us to a processed diet high in salt, sugar and fat, and causing a wide range of diet-related health problems. Over the years, many Aboriginal Australians lost their connections to traditional food preparation practices. In this paper, the authors provide a brief overview of Aboriginal food history and describe a newly-emerging focus on reintroducing native foods. They describe the work of an Aboriginal chef, Dale Chapman, who is actively promoting native foods and creating a native-Western food fusion. Chapman has developed native food recipes and a cookbook, in an effort to make native foods accessible to all Australians. She promotes a future when native foods are part of the identity of all Australians – both Aboriginal and non-Aboriginal.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Australia's economic growth and national identity have been widely celebrated as being founded on the nation's natural resources. With the golden era of pastoralism fading into the distance, a renewed love affair with primary industries has been much lauded, particularly by purveyors of neoliberal ideology. The considerable wealth generated by resource extraction has, despite its environmental and social record, proved seductive to the university sector. The mining industry is one of a number of industries and sectors (alongside pharmaceutical, chemical and biotechnological) that is increasingly courting Australian universities. These new public-private alliances are often viewed as the much-needed cash cow to bridge the public funding shortfall in the tertiary sector. However, this trend also raises profound questions about the capacity of public good institutions, as universities were once assumed to be, to maintain institutional independence and academic freedoms.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article examines the news coverage the death of Steve Irwin, widely known as the Crocodile Hunter, generated in Australia. In line with past research on commemorative journalism, the study demonstrates the dominant discourses employed in the reporting of Irwin's death. It is argued that Australia's newspapers invoked a number of national myths, such as mateship, larrikinism and anti-elitism, in order to re-assert notions of Australian identity and social values and to deal with the grief over his loss. Most importantly, the study sheds new light on how news media deal with challenges to the dominant memorialising discourse. Past studies had not been able to investigate in much detail alternative discourses, but in examining Irwin's death, we are able to see how the media deal with such an unwanted interruption. It is argued that newspapers appropriated the alternative perspective within the mythical terms of their memorialising discourse, thereby not allowing it to disrupt the memorialisation itself and in fact further strengthening the process of mythologising the Crocodile Hunter.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellman Inversion assumption and provides another approach to building IBE systems. Our first system, BB1, is very versatile and well suited for practical applications: the basic hierarchical construction can be efficiently secured against chosen-ciphertext attacks, and further extended to support efficient non-interactive threshold decryption, among others, all without using random oracles. Both systems, BB1 and BB2, can be modified generically to provide “full” IBE security (i.e., against adaptive-identity attacks), either using random oracles, or in the standard model at the expense of a non-polynomial but easy-to-compensate security reduction.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the main design parameter. Finally, we catalogue the strengths and weaknesses of each construction according to a few theoretical and many applied comparison criteria.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Guitar technology underwent significant changes in the 20th century in the move from acoustic to electric instruments. In the first part of the 21st century, the guitar continues to develop through its interaction with digital technologies. Such changes in guitar technology are usually grounded in what we might call the "cultural identity" of the instrument: that is, the various ways that the guitar is used to enact, influence and challenge sociocultural and musical discourses. Often, these different uses of the guitar can be seen to reflect a conflict between the changing concepts of "noise" and "musical sound."

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Transactive memory system (TMS) theory explains how expertise is recognized and coordinated in teams. Extending current TMS research from a group information-processing perspective, our article presents a theoretical model that considers TMS development from a social identity perspective. We discuss how two features of communication (quantity and quality) important to TMS development are linked to TMS through the group identification mechanism of a shared common team identity. Informed by social identity theory, we also differentiate between intragroup and intergroup contexts and outline how, in multidisciplinary teams, professional identification and perceived equality of status among professional subgroups have a role to play in TMS development. We provide a theoretical discussion of future research directions aimed at testing and extending our model.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study examines the process by which newly recruited nuclear engineering and technical staff came to understand, define, think, feel and behave within a distinct group that has a direct contribution to the organization's overall emphasis on a culture of reliability and system safety. In the field of organizational behavior the interactive model of social identity formation has been recently proposed to explain the process by which the internalization of shared norms and values occurs, an element critical in identity formation. Using this rich model of organizational behavior we analyzed multiple sources of data from nine new hires over a period of three years. This was done from the time they were employed to investigate the construction of social identity by new entrants entering into a complex organizational setting reflected in the context of a nuclear facility. Informed by our data analyses, we found support for the interactive model of social identity development and report the unexpected finding that a newly appointed member's age and level of experience appears to influence the manner in which they adapt, and assimilate into their surroundings. This study represents an important contribution to the safety and reliability literature as it provides a rich insight into the way newly recruited employees enact the process by which their identities are formed and hence act, particularly under conditions of duress or significant organizational disruption in complex organizational settings.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This study reports the construction and reconstruction of identities of new and existing employees during a significant transition phase of a nuclear engineering organization. We followed a group of new and existing employees over the period of three years, during which the organization constructed a greenfield nuclear facility with new generational technologies whilst in parallel, decommissioned the older reactor. This change led to the transfer and integration of existing trade-based employees with the newly recruited, primarily university educated graduates in the new site. Three waves of interview data were collected, in conjunction with the cognitive mapping of social grouping and photo elicitation portrayed the stories of different group of employees who either succeeded or failed at embracing their new professional identity. In contrast with the new recruits who constructed new identities as they join this organization, we identify and report on the number of enabling and disabling factors that influence the process of professional identity construction and reconstruction during gamma change.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Introduction Student professional identity formation is important for enabling the successful transition between academic education and professional practice. Recognition of this has resulted in significant changes in professional education (e.g., the inclusion of experiential placements and authentic learning experiences). There is limited research that examines how the curricular experience influences pharmacy studentsʼ professional identity formation. Methods Using focus groups, comprising 82 students from all levels of a four-year Australian undergraduate pharmacy course, this study examined studentsʼ perceptions of their overall curricular experience and examined how these experiences influenced the construction of their professional identities. Results Our analysis found that the pharmacy students struggled with their professional identity formation. Many were entering the degree with little understanding of what being a pharmacist entailed. Once in the educational context, the nature of the role became both apparent and idealistic but not enacted. Students experienced dissonance between the idealistic notion of pharmacy practice and the realities of placements, and this may have been enhanced by a lack of patient-centered care role models. This struggle left them concluding that the role of the pharmacist was constrained and limited. Conclusions We argue that professional identity formation needs to be in the foreground from commencement of the degree and throughout the curriculum.