491 resultados para digital heritage


Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the Internet becomes deeply embedded into consumers’ daily life, the digital virtual world brings significant influence to consumers’ self and narrative. Prior studies look at consumer self from either from a certain online space or comparing consumers’ physical and digital virtual selves but not the integration of the physical/digital world. This paper aims to explore the meanings of the digital virtual space on consumers’ narrative as a whole (their interests, dreams, or subjectivity). We utilise a postmodern concept of the cyborg to understand the cultural complexity, subjective meanings of, and the extent to which the digital virtual space plays a role in consumers’ self-narrative. We conducted in-depth interviews and gathered three consumer narratives. Our findings indicate that consumers’ narrative contains important fragments from both physical and digital virtual worlds and their physical and digital virtual selves form a feedback loop that strengthen their overall narrative.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the hash-then-sign digital signature schemes such as DSS and RSA in order to free their reliance on the collision resistance property of the hash functions. They have shown that to forge a RMX-hash-then-sign signature scheme, one has to solve a cryptanalytical task which is related to finding second preimages for the hash function. In this article, we will show how to use Dean’s method of finding expandable messages for finding a second preimage in the Merkle-Damgård hash function to existentially forge a signature scheme based on a t-bit RMX-hash function which uses the Davies-Meyer compression functions (e.g., MD4, MD5, SHA family) in 2 t/2 chosen messages plus 2 t/2 + 1 off-line operations of the compression function and similar amount of memory. This forgery attack also works on the signature schemes that use Davies-Meyer schemes and a variant of RMX published by NIST in its Draft Special Publication (SP) 800-106. We discuss some important applications of our attack.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Through its mandate to protect and preserve places of ‘outstanding universal value’, the World Heritage Convention provides an unlikely yet effective tool in global efforts to mitigate climate change. The practical efficacy of the Strategy to Assist States Parties to Implement Appropriate Management Responses (‘the Strategy’), which represents the World Heritage Committee’s primary response to the threats posed by climate change to World Heritage sites, is undermined by its weak stance on mitigation. This paper argues that the World Heritage Convention imposes stronger obligations on States Parties than those contained in the Strategy, including a duty on States Parties to commit to ‘deep cuts’ in greenhouse gas emissions. In order to ensure the continuing success of the World Heritage Convention States Parties must engage in extensive mitigation strategies without delay.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter we present data drawn from observations of kindergarten children using iPads and talk with the children, their parents/guardians and teachers. We identify a continuum of practices that extends from ‘educational apps’ teaching handwriting, sight words and so forth to uses of the iPad as a device for multimodal literacy development and substantive conversation around children’s creative work. At the current time high stakes testing and the implementation of the Australian Curriculum are prompting new public and professional conversations about literacy and digital technology. The iPad is construed as both cause of and solution to problems of traditional literacy education. In this context we describe the literacies enabled by educational software available on iPads. We higlight the time constraints which bore on teachers' capacity to enact their visions of literacy education through the iPad platform and suggest ways of reflecting on responses to this constraint.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper reports on the development of a playful digital experience, Anim-action, designed for young children with developmental disabilities. This experience was built using the Stomp platform, a technology designed specifically to meet the needs of people with intellectual disability through facilitating whole body interaction. We provide detail on how knowledge gained from key stakeholders informed the design of the application and describe the design guidelines used in the development process. A study involving 13 young children with developmental disabilities was conducted to evaluate the extent to which Anim-action facilitates cognitive, social and physical activity. Results demonstrated that Anim-action effectively supports cognitive and physical activity. In particular, it promoted autonomy and encouraged problem solving and motor planning. Conversely, there were limitations in the system’s ability to support social interaction, in particular, cooperation. Results have been analyzed to determine how design guidelines might be refined to address these limitations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The focus of this paper is on two World Heritage Areas: the Great Barrier Reef in Queensland, Australia and the Everglades in Florida. While both are World Heritage listed by the UNESCO, the Everglades is on the "World Heritage in Danger" list and the Great Barrier Reef could be on this list within the next year if present pressures continue. This paper examines the planning approaches and governance structures used in these two areas (Queensland and Florida) to manage the growth and development pressures. To make the analysis manageable, given the scale of these World Heritage areas, case studies at the local government level will be used: the Cairns Regional Council in Queensland and Monroe County in Florida. The case study analysis will involve three steps: (1) examination of the various plans at the federal, state, local levels that impact upon environmental quality in the Great Barrier Reef and Everglades; (2) assessing the degree to which these plans have been implemented; and (3) determine if (and how) the plans have improved environmental quality. In addition to the planning analysis we will also examine the governance structures (Lebel et al. 2006) within which planning operates. In any comparative analysis context is important (Hantrais 2009). Contextual differences between Queensland and Florida have previously been examined by Sipe, et al. (2007) and will be used as the starting point for this analysis. Our operating hypothesis and preliminary analysis suggests that the planning approaches and governance structures used in Florida and Queensland are considerably different, but the environmental outcomes may be similar. This is based, in part, on Vella (2004) who did a comparative analysis of environmental practices in the sugar industry in Florida and Queensland. This research re-examines this hypothesis and broadens the focus beyond the sugar industry to growth and development more broadly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mass media have transitioned in the past five years from being one-way communication mediums, from journalists to audiences, into an era of networked digital media in which individuals can easily publish text, photos and video to a world-wide audience.The power of the press is severely threatened and its business model is broken...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the society matures, there was an increasing pressure to preserve historic buildings. The economic cost in maintaining these important heritage legacies has become the prime consideration of every state. Dedicated intelligent monitoring systems supplementing the traditional building inspections will enable the stakeholder to carry out not only timely reactive response but also plan the maintenance in a more vigilant approach; thus, preventing further degradation which was very costly and difficult to address if neglected. The application of the intelligent structural health monitoring system in this case studies of ‘modern heritage’ buildings is on its infancy but it is an innovative approach in building maintenance. ‘Modern heritage’ buildings were the product of technological change and were made of synthetic materials such as reinforced concrete and steel. Architectural buildings that was very common in Oceania and The Pacific. Engineering problems that arose from this type of building calls for immediate engineering solution since the deterioration rate is exponential. The application of this newly emerging monitoring system will improve the traditional maintenance system on heritage conservation. Savings in time and resources can be achieved if only pathological results were on hand. This case study will validate that approach. This publication will serve as a position paper to the on-going research regarding application of (Structural Health Monitoring) SHM systems to heritage buildings in Brisbane, Australia. It will be investigated with the application of the SHM systems and devices to validate the integrity of the recent structural restoration of the newly re-strengthened heritage building, the Brisbane City Hall.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Investigative journalists who join what theorist Manuel Castells describes as the ‘network society’ can locate potential news sources using various social media platforms and interview them using Web-based communication technologies. The potential for journalistic investigations involving multi-directional conversations with news sources across the globe is beginning to be explored. Potential news sources who are part of the network society have unprecedented access to specialist investigative reporters irrespective of their location and can speak to them more cost effectively than in the past. This paper explores how new journalism technologies are allowing journalists to call powerful individuals and institutions to account, irrespective of national borders; and how previously silenced individuals are being given a voice. To read an example of international investigative journalism facilitated by a combination of social media, Web-based communications, reporter collaboration and news outlet collaborations see http://www.theaustralian.com.au/news/features/churchs-wall-of-silence-on-sexual-abuse/story-e6frg6z6-1226639077238.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Process improvement and innovation are risky endeavors, like swimming in unknown waters. In this chapter, I will discuss how process innovation through BPM can benefit from Research-as-a-Service, that is, from the application of research concepts in the processes of BPM projects. A further subject will be how innovations can be converted from confidence-based to evidence-based models due to affordances of digital infrastructures such as large-scale enterprise soft-ware or social media. I will introduce the relevant concepts, provide illustrations for digital capabilities that allow for innovation, and share a number of key takeaway lessons for how organizations can innovate on the basis of digital opportunities and principles of evidence-based BPM: the foundation of all process decisions in facts rather than fiction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Asking why is an important foundation of inquiry and fundamental to the development of reasoning skills and learning. Despite this, and despite the relentless and often disruptive nature of innovations in information and communications technology (ICT), sophisticated tools that directly support this basic act of learning appear to be undeveloped, not yet recognized, or in the very early stages of development. Why is this so? To this question, there is no single factual answer. In response, however, plausible explanations and further questions arise, and such responses are shown to be typical consequences of why-questioning. A range of contemporary scenarios are presented to highlight the problem. Consideration of the various inputs into the evolution of digital learning is introduced to provide historical context and this serves to situate further discussion regarding innovation that supports inquiry-based learning. This theme is further contextualized by narratives on openness in education, in which openness is also shown to be an evolving construct. Explanatory and descriptive contents are differentiated in order to scope out the kinds of digital tools that might support inquiry instigated by why-questioning and which move beyond the search paradigm. Probing why from a linguistic perspective reveals versatile and ambiguous semantics. The why dimension—asking, learning, knowing, understanding, and explaining why—is introduced as a construct that highlights challenges and opportunities for ICT innovation. By linking reflective practice and dialogue with cognitive engagement, this chapter points to specific frontiers for the design and development of digital learning tools, frontiers in which inquiry may find new openings for support.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper discusses documentary heritage collection enrichment programs run with community participation. Two library programs at the State Library of Queensland (SLQ) are explored as examples. The programs are the Flood and Cyclone Mosaic and Pitch in! The challenges for the implementation of such programs in Indonesia are also discussed in the last section of the paper. This paper provides better understanding of documentary heritage collection enrichment strategies conducted by a public library in Queensland, Australia. It is expected that this paper will inspire public libraries in Indonesia to maximise their documentary collection enrichment strategies with community participation. This paper can also help the National Library of Indonesia (PNRI) in designing their documentary heritage collections enrichment strategies in its role as the Web portal provider of the national documentary heritage repository. Tulisan ini membahas program pengayaan koleksi warisan dokumenter yang dilaksanakan dengan partisipasi masyarakat. Dua program perpustakaan di the State Library of Queensland (SLQ) dieksplorasi sebagai contoh. Program-program yang dibahas adalah Flood and Cyclone Mosaic dan Pitch In! Tantangan yang harus dihadapi untuk penerapan program semacam di Indonesia juga dibahas di bagian akhir tulisan. Tulisan ini memberikan pemahaman mengenai strategi pengayaan koleksi warisan dokumenter yang dilakukan oleh sebuah perpustakaan umum di Queensland, Australia. Diharapkan tulisan ini dapat menjadi inspirasi bagi perpustakaan umum di Indonesia untuk dapat memaksimalkan strategi pengayaan koleksi dokumenter mereka dengan melibatkan partisipasi masyarakat. Tulisan ini juga dapat membantu Perpustakaan Nasional Republik Indonesia (PNRI) dalam merancang strategi pengayaan koleksi warisan dokumenter mereka dalam perannya sebagai penyedia portal Web repositori warisan dokumenter bangsa.