447 resultados para identity beyond border
Resumo:
Identity orientation provides a means to understand the social motivations of organisational relationships and organisational policy and practices. This study uses identity orientation to understand the highly marketised context of independent ‘elite’ schools in Australia and how they relate to stakeholders to straddle their roles as social institutions that are increasingly required to operate in a corporate manner. Interviews with managers in quite new school roles such as marketing communication and business management were conducted in non-government schools to understand the schools' external orientations, coveted internal member traits, and frames of reference. The study shows that, in contrast to existing literature on the rhetoric of schools as focusing on ‘the child’, there was a strong emphasis on individualistic orientations in schools that saw stakeholders in instrumental terms of resources and connections, saw teachers as providing an innovative and leading edge, and used other prestigious schools as their frame of reference. To a lesser extent, schools would also be interested in the relationships with families, teachers, and the community for their own means. There were very few instances where the identity orientation was contributing to society, instead, focusing on university and network outcomes for pupils. Using identity orientation provides a theoretical lens to connect organisational governance to stakeholder engagement by providing insights into an organisation's identity including practices and behaviours, in relation to others.
Resumo:
In recent decades, the governance of food safety, food quality, on-farm environmental management and animal welfare has been shifting from the realm of 'the government' to that of the private sector. Corporate entities, especially the large supermarkets, have responded to neoliberal forms of governance and the resultant 'hollowed-out' state by instituting private standards for food, backed by processes of certification and policed through systems of third party auditing. Today's food regime is one in which supermarkets impose 'private standards' along the food supply chain to ensure compliance with a range of food safety goals-often above and beyond those prescribed by government. By examining regulatory governance in Australia, Norway and the United Kingdom we highlight emerging trajectories of food governance. We argue that the imposition of the new private forms of monitoring and compliance continue the project of agricultural restructuring that began with government support for structural adjustment schemes in agriculture and that these are most evident in the UK and Australia where neoliberalism is an entrenched philosophy. However, despite Norway's identity as a social democracy, we also identify neoliberal 'creep' into the system of food governance. Small-scale producers in all three nations are finding themselves increasingly subject to governance through private, market-based mechanisms that, to varying degrees, are dominated by major supermarket chains. The result is agricultural restructuring not through the traditional avenues of elected governments, but via non-elected market operatives.
Resumo:
Much of the existing empirical research on journalism focuses largely on hard-news journalism, at the expense of its less traditional forms, particularly the soft-news areas of lifestyle and entertainment journalism. In focussing on one particular area of lifestyle journalism – the reporting of travel stories – this paper argues for renewed scholarly efforts in this increasingly important field. Travel journalism’s location at the intersection between information and entertainment, journalism and advertising, as well as its increasingly significant role in the representation of foreign cultures makes it a significant site for scholarly research. By reviewing existing research about travel journalism and examining in detail the special exigencies that constrain it, the article proposes a number of dimensions for future research into the production practices of travel journalism. These dimensions include travel journalism’s role in mediating foreign cultures, its market orientation, motivational aspects and its ethical standards.
Resumo:
How well is the Better Access scheme for the provision of affordable, effective psychological services to the Australian public working? Robert King identifies important weaknesses in the system that have adverse impacts on clients, providers and public policy objectives. These weaknesses are explored and options to remedy the problems are outlined.
Resumo:
Addressing possibilities for authentic combinations of diverse media within an installation setting, this research tested hybrid blends of the physical, digital and temporal to explore liminal space and image. The practice led research reflected on creation of artworks from three perspectives – material, immaterial and hybrid – and in doing so, developed a new methodological structure that extends conventional forms of triangulation. This study explored how physical and digital elements each sought hierarchical presence, yet simultaneously coexisted, thereby extending the visual and conceptual potential of the work. Outcomes demonstrated how utilising and recording transitional processes of hybrid imagery achieved a convergence of diverse, experiential forms. "Hybrid authority" – an authentic convergence of disparate elements – was articulated in the creation and public sharing of processual works and the creation of an innovative framework for hybrid art practice.
Resumo:
THE Church of England banished serial pedophile priest Robert Waddington to Australia, where he abused children across a decade, after suspicions were raised about him molesting choirboys in his London parish. In an alleged church cover-up spanning almost 60 years, Waddington was suddenly and unexpectedly sent to a small school in regional Queensland in 1956 amid claims he was molesting the son of an English politician. Last month the Church of England ordered an independent inquiry into the handling of allegations against Waddington, after a joint investigation by The Australian and The Times of London. But it can now be revealed that Waddington - who died in 2007, facing allegations he abused students in Australia in the 1960s and English choirboys in the 80s and 90s - was molesting children as soon as he joined the church in 1953. The latest allegations have been made by Ray Munn, 70, who was recruited by Waddington, then a curate at St John's church in Bethnal Green, East London, to sing in the choir in 1953. He was almost immediately groomed by the Cambridge University-educated clergyman, who took him on holidays in the English countryside, before he began molesting the then 11-year-old.
Resumo:
We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellman Inversion assumption and provides another approach to building IBE systems. Our first system, BB1, is very versatile and well suited for practical applications: the basic hierarchical construction can be efficiently secured against chosen-ciphertext attacks, and further extended to support efficient non-interactive threshold decryption, among others, all without using random oracles. Both systems, BB1 and BB2, can be modified generically to provide “full” IBE security (i.e., against adaptive-identity attacks), either using random oracles, or in the standard model at the expense of a non-polynomial but easy-to-compensate security reduction.
Resumo:
This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the main design parameter. Finally, we catalogue the strengths and weaknesses of each construction according to a few theoretical and many applied comparison criteria.
Resumo:
Guitar technology underwent significant changes in the 20th century in the move from acoustic to electric instruments. In the first part of the 21st century, the guitar continues to develop through its interaction with digital technologies. Such changes in guitar technology are usually grounded in what we might call the "cultural identity" of the instrument: that is, the various ways that the guitar is used to enact, influence and challenge sociocultural and musical discourses. Often, these different uses of the guitar can be seen to reflect a conflict between the changing concepts of "noise" and "musical sound."
Resumo:
Review(s) of: Settling the Pop Score: Pop Texts and Identity Politics, Stan Hawkins, Aldershot, Hants. : Ashgate, 2002, ISBN 0 7546 0352 0; pb, 234pp, ill, music exx, bibl. , discog. , index. The scholarly study of popular music has its origins in sociology and cultural studies, disciplinary areas in which musical meaning is often attributed to aspects of economical and sociological function. Against this tradition, recent writers have offered what is now referred to as ‘popular musicology’: a method or approach that tends towards a specific engagement with ‘pop texts’ on aesthetic, and perhaps even ‘musical’ terms. Stan Hawkins uses the term popular musicology ‘at his own peril,’ clearly recognising the implicit scholarly danger in his approach, whereby ‘formalist questions of musical analysis’ are dealt with ‘alongside the more intertextual discursive theorisations of musical expression’ (p. xii). In other words, popular musicologists dare to tread that fine line between text and context. As editor of the journal Popular Musicology Online, Hawkins is a leading advocate of this practice, specifically in the application of music-analytical techniques to popular music. His methodology attests to the influence of other leading figures in the area, notably Richard Middleton, Allan F. Moore and Derek Scott (general editor of the Ashgate Popular and Folk Music Series in which this book is published).
Resumo:
Objective To understand how the formal curriculum experience of an Australian undergraduate pharmacy program supports students’ professional identity formation. Methods A qualitative ethnographic study was conducted over four weeks using participant observation and examined the ‘typical’ student experience from the perspective of a pharmacist. A one-week period of observation was undertaken with each of the four year groups (that is, for years one to four) comprising the undergraduate curriculum. Data were collected through observation of the formal curriculum experience using field notes, a reflective journal and informal interviews with 38 pharmacy students. Data were analyzed thematically using an a priori analytical framework. Results Our findings showed that the observed curriculum was a conventional curricular experience which focused on the provision of technical knowledge and provided some opportunities for practical engagement. There were some opportunities for students to imagine themselves as pharmacists, for example, when the lecture content related to practice or teaching staff described their approach to practice problems. However, there were limited opportunities for students to observe pharmacist role models, experiment with being a pharmacist or evaluate their professional identities. While curricular learning activities were available for students to develop as pharmacists e.g. patient counseling, there was no contact with patients and pharmacist academic staff tended to role model as educators with little evidence of their pharmacist selves. Conclusion These findings suggest that the current conventional approach to the curriculum design may not be fully enabling learning experiences which support students in successfully negotiating their professional identities. Instead it appeared to reinforce their identities as students with a naïve understanding of professional practice, making their future transition to professional practice challenging.
Resumo:
The notion of identity-based IB cryptography was proposed by Shamir [177] as a specialization of public key PK cryptography which dispensed with the need for cumbersome directories, certificates, and revocation lists.
Resumo:
Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.
Resumo:
An accumulator based on bilinear pairings was proposed at CT-RSA'05. Here, it is first demonstrated that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator that is not collision resistant. Secondly, it is shown that collision-resistance can be provided by updating the adversary model appropriately. Finally, an improvement on Nguyen's identity escrow scheme, with membership revocation based on the accumulator, by removing the trusted third party is proposed.