620 resultados para ”we” identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many activities, from disaster response to project management, require cooperation among people from multiple organizations who initially lack interpersonal relationships and trust. Upon entering inter-organizational settings, pre-existing identities and expectations, along with emergent social roles and structures, may all influence trust between colleagues. To sort out these effects, we collected time-lagged data from three cohorts of military MBA students, representing 2,224 directed dyads, shortly after they entered graduate school. Dyads that shared organizational identity, boundary-spanning roles, and similar network positions (structural equivalence) were likely to have stronger professional ties and greater trust.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To understand how the formal curriculum experience of an Australian undergraduate pharmacy program supports students’ professional identity formation. Methods A qualitative ethnographic study was conducted over four weeks using participant observation and examined the ‘typical’ student experience from the perspective of a pharmacist. A one-week period of observation was undertaken with each of the four year groups (that is, for years one to four) comprising the undergraduate curriculum. Data were collected through observation of the formal curriculum experience using field notes, a reflective journal and informal interviews with 38 pharmacy students. Data were analyzed thematically using an a priori analytical framework. Results Our findings showed that the observed curriculum was a conventional curricular experience which focused on the provision of technical knowledge and provided some opportunities for practical engagement. There were some opportunities for students to imagine themselves as pharmacists, for example, when the lecture content related to practice or teaching staff described their approach to practice problems. However, there were limited opportunities for students to observe pharmacist role models, experiment with being a pharmacist or evaluate their professional identities. While curricular learning activities were available for students to develop as pharmacists e.g. patient counseling, there was no contact with patients and pharmacist academic staff tended to role model as educators with little evidence of their pharmacist selves. Conclusion These findings suggest that the current conventional approach to the curriculum design may not be fully enabling learning experiences which support students in successfully negotiating their professional identities. Instead it appeared to reinforce their identities as students with a naïve understanding of professional practice, making their future transition to professional practice challenging.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Health promotion progresses a social justice and empowerment agenda and thus emphasises working with people to increase their control over their health. Certainly, Australia has experienced much success in this endeavour and is internationally recognised as a leader. However, health promotion has failed Indigenous Australians; a fact that is echoed in the health outcomes that ironically provide us with the “moral imperative” to act. Further investigation has also revealed health promotion’s foundation in colonial imaginings. Thus, this paper calls for the culture of health promotion to be examined as a risk factor for poor Indigenous health. To complement this call, this paper presents findings of an ethnographic study of Indigenous health promotion practice, undertaken from a postcolonial and critical whiteness framework. These findings provide a narrative of strength and innovative approaches, highlighting the value of Indigenous knowledge. These findings also contradict the biomedical tendency to construct culture as illness-producing. More broadly, this study’s findings entail important lessons for health promotion to consider, if it is to move beyond the rhetoric, to truly increase people’s control over their health.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This editorial depicts the current challenges in palliative care provision for patients with a haematological malignancy and the contribution of cancer nurses. There have been significant advancements in the care of patients with a hematological malignancy over the past three or more decades1. Despite this, there still exists a significant mortality risk in curative treatment and many patients with a hematological malignancy will die from their disease1. A growing body of research indicates patients with a hematological malignancy do not receive best practice palliative and end-of-life care2. Shortfalls in care include poor referral patterns to specialist palliative care services, lack of honest discussions regarding death and dying, inadequate spiritual care for patients and families, patients frequently dying in the acute care setting and high levels of patient and family distress2. There have been a number of efforts in the United Kingdom, United States of America, Sweden, and Australia demonstrating palliative and hematology care can co-exist, exemplified through clinical case studies and innovative models of care2. However, deficits in the provision of palliative care for patients with a hematological malignancy persist as evident in the international literature2. Addressing this issue requires research exploring new aspects of a complex scenario; here we suggest priority areas of research...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The notion of identity-based IB cryptography was proposed by Shamir [177] as a specialization of public key PK cryptography which dispensed with the need for cumbersome directories, certificates, and revocation lists.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The article by Kretzschmar et al 1 in this issue of Menopause details a study investigating the effect of a mild-intensity aerobic exercise training program on markers of mortality risk in both pre- and post-menopausal African American women. The findings of this study showed that aerobic exercise training was successful in improving some markers of cardiovascular disease (CVD) and mortality in post-menopausal women. The premise of this study, however, does suggest that increased exercise intensity may be required in post-menopausal women as opposed to pre-menopausal women to achieve the same decreased changes in CVD markers. The outcome of the study is thus of interest to the readers of Menopause and to all those who provide health care to postmenopausal women, as it suggests that higher levels of exercise intensity or perhaps additional interventions may need to be considered in this population to further decrease mortality risk. The study therefore, has greater implications than simply the suggestion of tailoring exercise interventions generally; rather, the publication highlights the importance of prescribing exercise as medicine in a tailored fashion for women depending on their menopausal status.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An accumulator based on bilinear pairings was proposed at CT-RSA'05. Here, it is first demonstrated that the security model proposed by Lan Nguyen does lead to a cryptographic accumulator that is not collision resistant. Secondly, it is shown that collision-resistance can be provided by updating the adversary model appropriately. Finally, an improvement on Nguyen's identity escrow scheme, with membership revocation based on the accumulator, by removing the trusted third party is proposed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Through an account of prevailing experiences of art and mental illness, this paper aims to raise awareness, open dialogue and create agency about art created by people with experience of mental illness. Methods This paper draws on personal narrative and inquiry by an artist with mental illness and data collected as part of a larger participatory action research project that investigated understandings of identity, art and mental illness. Result An inquiry through art raised awareness and attentiveness to the importance of choice in identity construction and exposed frequent dichotomies in art and mental illness that were negotiated to eschew prescribed social stratification. As an artist, the first author challenged values present in one idea and absent in the other, and the options and concessions available to authorise her own dialogue and agency of being an artist. Conclusion Constructing an identity is an important part of being human, the labels that we choose or are chosen for us attribute to our identity. Reflections and recommendations are offered to consider expanded ways of thinking about art and mental illness and the functions that art play in identity construction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudonym can interact with an unknown entity and be confident that his/her identity is secret even if the other entity is dishonest. In this work, we present a system that allows users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Our proposal is different from previously published pseudonym systems, as in addition to standard notion of protecting privacy of an user, our system offers colligation between seemingly independent pseudonyms. This new property when combined with a trusted platform that stores a master secret key is extremely beneficial to an user as it offers a convenient way to generate a large number of pseudonyms using relatively small storage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Studies of place construction in the rural studies literature have largely privileged the role of professionals over that of local lay actors. This paper contributes to redressing this imbalance through a critical case-study of lay postcard production in a rural shire. Drawing on original, qualitative research conducted in the Shire of Ravensthorpe, Western Australia, including in-depth interviews with key participants, the analysis focuses on this lay production—undertaken in the main by women—as cultural work. By emphasising the work of making the postcards along with the cultural work these postcards achieve, this examination foregrounds intersections of material and imagined ruralities. In the process, this study highlights the complexity and importance of this lay contribution to place identity, particularly as positioned within what may be considered rural cultural work.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Despite ongoing ‘boom’ conditions in the Australian mining industry, women remain substantially and unevenly under-represented in the sector, as is the case in other resource-dependent countries. Building on the literature critiquing business-case rationales and strategies as a means to achieve women’s equality in the workplace, we examine the business case for employing more women as advanced by the Australian mining industry. Specifically, we apply a discourse analysis to seven substantial, publically-available documents produced by the industry’s national and state peak organizations between 2005 and 2013. Our study makes two contributions. First, we map the features of the business case at the sectoral rather than firm or workplace level and examine its public mobilization. Second, we identify the construction and deployment of a normative identity – ‘the ideal mining woman’ – as a key outcome of this business-case discourse. Crucially, women are therein positioned as individually responsible for gender equality in the workplace.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Local representations of the significance of Albany, Western Australia, in the first world war and of the city's part in the birth of Anzac register substantial points of departure from national histories. While both the Anzac mythos and official renderings of Australia's wars are vigorously contested, Albany's reformulation offers a clear example of the ways in which communities actively inflect national narratives to create expressions of differentiated local identity. This article explores the relationship between the national and the local by focusing on the local narrative of the massing and departure of'The Great Anzac Convoy' in King George Sound in 1914. Particular attention is given to the way Albany has been able to appropriate and localise this event and the origins of Anzac, consequently promoting itself as an important element of the national identity, from which it nevertheless remains distinct. This localisation of an important element of national identity confers cultural standing and a potentially empowered position in relation to this national identity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is no doubt that place branding is a powerful and ubiquitous practice deployed around the globe. Parallel to its acceptance and development as a distinct discipline is an understanding that place branding as responsible practice offers the means to achieve widespread economic, social and cultural benefits. Drawing on work around place and identity in cultural geography and cultural studies, this paper engages critically with this vision. Specifically, it challenges the widely-held assumption that the relationship between place branding and place identity is fundamentally reflective, arguing instead that this relationship is inherently generative. This shift in perspective, explored in relation to current responsible place branding practice, is central to the realisation of place branding as a force for good.