761 resultados para Critical legal geography


Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Geography education is indispensable to the development of responsible and active citizens in the present and future world" is one of the main statements in the International Charter on Geographical Education. This charter was edited in 1992 by Haubrich, chair of the Commission on Geographical Education of the International Geographical Union (IGU). Twenty years later this statement is still true. Geography educators all over the world are looking for ways to talk with young people about their image of their world and to help them to develop their knowledge, skills and ideas about the complex world we live in. However, different ideas exist about what geography we should learn and teach and how. The Commission on Geographical Education of the International Geographical Union tries to help to improve the quality and position of geography education worldwide promoting the dissemination of good practices and research results in the field of geography education.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The last fifty years have witnessed the growing pervasiveness of the figure of the map in critical, theoretical, and fictional discourse. References to mapping and cartography are endemic in poststructuralist theory, and, similarly, geographically and culturally diverse authors of twentieth-century fiction seem fixated upon mapping. While the map metaphor has been employed for centuries to highlight issues of textual representation and epistemology, the map metaphor itself has undergone a transformation in the postmodern era. This metamorphosis draws together poststructuralist conceptualizations of epistemology, textuality, cartography, and metaphor, and signals a shift away from modernist preoccupations with temporality and objectivity to a postmodern pragmatics of spatiality and subjectivity. Cartographic Strategies of Postmodernity charts this metamorphosis of cartographic metaphor, and argues that the ongoing reworking of the map metaphor renders it a formative and performative metaphor of postmodernity.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In the first Modern Language Association newsletter for 2006, renowned poetry critic and MLA President, Marjorie Perloff, remarked on the growing ascendency of Creative Writing within English Studies in North America. In her column, Perloff notes that "[i]n studying the English Job Information List (JIL) so as to advise my own students and others I know currently on the market, I noticed what struck me as a curious trend: there are, in 2005, almost three times as many positions in creative writing as in the study of twentieth-century literature" (3). The dominance of Creative Writing in the English Studies job list in turn reflects the growing student demand for undergraduate and postgraduate degrees in the field—over the past 20 years, BA and MA degrees in Creative Writing in North American tertiary institutions have quadrupled (3)...

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new era of cyber warfare has appeared on the horizon with the discovery and detection of Stuxnet. Allegedly planned, designed, and created by the United States and Israel, Stuxnet is considered the first known cyber weapon to attack an adversary state. Stuxnet's discovery put a lot of attention on the outdated and obsolete security of critical infrastructure. It became very apparent that electronic devices that are used to control and operate critical infrastructure like programmable logic controllers (PLCs) or supervisory control and data acquisition (SCADA) systems lack very basic security and protection measures. Part of that is due to the fact that when these devices were designed, the idea of exposing them to the Internet was not in mind. However, now with this exposure, these devices and systems are considered easy prey to adversaries.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Using Media-Access-Control (MAC) address for data collection and tracking is a capable and cost effective approach as the traditional ways such as surveys and video surveillance have numerous drawbacks and limitations. Positioning cell-phones by Global System for Mobile communication was considered an attack on people's privacy. MAC addresses just keep a unique log of a WiFi or Bluetooth enabled device for connecting to another device that has not potential privacy infringements. This paper presents the use of MAC address data collection approach for analysis of spatio-temporal dynamics of human in terms of shared space utilization. This paper firstly discuses the critical challenges and key benefits of MAC address data as a tracking technology for monitoring human movement. Here, proximity-based MAC address tracking is postulated as an effective methodology for analysing the complex spatio-temporal dynamics of human movements at shared zones such as lounge and office areas. A case study of university staff lounge area is described in detail and results indicates a significant added value of the methodology for human movement tracking. By analysis of MAC address data in the study area, clear statistics such as staff’s utilisation frequency, utilisation peak periods, and staff time spent is obtained. The analyses also reveal staff’s socialising profiles in terms of group and solo gathering. The paper is concluded with a discussion on why MAC address tracking offers significant advantages for tracking human behaviour in terms of shared space utilisation with respect to other and more prominent technologies, and outlines some of its remaining deficiencies.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

INTRODUCTION CASES For a number of years, Professor Myles McGregor-Lowndes, Frances Hannah and Anne Overell have compiled one to two page summaries of cases involving nonprofit organisations and published them on The Australian Centre for Philanthropy and Nonprofit Studies, Developing Your Organisation (DYO) website.1 You can be alerted of new case summaries as they are posted to the DYO website by subscribing to the ACPNS RSS feed or the ACPNS twitter service.2 There were some very significant cases during 2013, such as Commissioner of Taxation v Cancer & Bowel Research Association (see case notes 2.8.2 and 2.8.11), The Hunger Project case which is under appeal, but could change the face of PBI jurisprudence (see case note 2.8.7) while Home Health Pty Ltd retained the PBI status quo but might have been different if appealed (see case note 2.8.8). For sheer interest there is nothing better in my 30 odd years of reading tax and charity judgements than case involving The Study and Prevention of Psychological Diseases Foundation Incorporated (see case note 2.1.1). It even rivals some of the more bizarre cases from the US jurisdiction of which St Joseph Abbey v Castille (case note 2.10.9) is certainly ‘dead centre’. A set of cases which stand out for attention are those involving New Zealand’s Christchurch Cathedral which anyone with responsibility for heritage-listed buildings should study carefully, for implications in relation to their own circumstances. A number of cases summarised in this Almanac are working their way through the appeals process and care should be taken with their application. In addition, some of the cases are from jurisdictions outside Australia, and readers should exercise caution when considering the implications of these cases for Australian law. LEGISLATION The Almanac includes a review of major statutory amendments during 2013, which are relevant to the nonprofit sector in all Australian jurisdictions. Special thanks must go to Nathan MacDonald and the JusticeConnect team for providing legislative updates for Victoria. SPECIAL ISSUES DURING 2013 A number of legal practitioners have contributed articles on significant legal issues facing nonprofit organisations: charitable trusts giving to government entities (Alice Macdougall); workplace bullying (Tim Longwill); and privacy (James Tan and Nina Brewer). WORLD ROUND-UP Major developments from the UK and Ireland (Kerry O’Halloran), Canada (Peter Broder), New Zealand (Michael Gousmett and Susan Barker) and Jamaica (Frances Hannah) are all summarised in a review of a significant part of the common law charity jurisdictions. WHAT DOES 2014 HOLD The final section moves from looking in the rear view mirror to peering out the front windscreen to discern the reform agenda. The view from the windscreen in 2013 was of considerable reform traffic at the Commonwealth level jostling for a place in the parliamentary agenda. This year is quite different with a smaller number of vehicles ahead, but the potential for significant impact.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been a greater focus on strengthening evaluation capacity building (ECB) within development organisations in recent years. This can be attributed in part to the growing appreciation of the value of participatory and collaborative forms of evaluation. Evaluation is increasingly seen as an ongoing learning process and an important means of strengthening capacity and improving organisational performance (Horton et al., 2003:7). While there are many benefits of using participatory methodologies in ECB projects, our experiences and a review of the literature in this area highlight the many challenges, issues and contradictions that can affect the success of such ECB efforts. We discuss these issues, drawing on our learnings from the ongoing participatory action research (PAR) project 'Assessing Communication for Social Change’ (AC4SC). This four year project, which began in 2007, is a collaboration between communication and development academics and evaluation specialists from two Australian universities and communication for development practitioners and monitoring and evaluation (M&E) staff in the NGO Equal Access Nepal (EAN). The aim is to develop, implement, and evaluate a participatory methodology for assessing the social change impacts of community radio programs produced by EAN. It builds on previous projects that used ethnographic action research (EAR) methodology (Tacchi et al., 2007).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"In this chapter the authors present a critique of Participatory Evaluation as worked in development projects, in this case, in Nepal. The article works between established claims that Participatory Evaluation builds capacity at programmatic and organisational levels, and the specific experiences of these claims in the authors’ current work. They highlight the need to address key difficulties such as high turn-over of staff and resulting loss of capacity to engage in Participatory Evaluation, and the difficulty of communication between academic as compared with local practical wisdoms. A key issue is the challenge of addressing the inevitable issues of power inequities that such approaches encounter. While Participatory Evaluation has been around for some time, it has only enjoyed more widespread recognition of its value in comparatively recent times, with its uptake in international development environments. To this extent, the practice is still in its early stages of development, and Jo, June and Michael’s work contributes to strengthening and more comprehensively understanding it. With regard to the meta-theme of this publication, this chapter is an example of how context not only influences the methodology to be used and the praxis of how it is to be used, but contributes to early explication of the core nature of an emerging methodology."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this chapter, we discuss four related areas of cryptology, namely, authentication, hashing, message authentication codes (MACs), and digital signatures. These topics represent active and growing research topics in cryptology. Space limitations allow us to concentrate only on the essential aspects of each topic. The bibliography is intended to supplement our survey. We have selected those items which providean overview of the current state of knowledge in the above areas. Authentication deals with the problem of providing assurance to a receiver that a communicated message originates from a particular transmitter, and that the received message has the same content as the transmitted message. A typical authentication scenario occurs in computer networks, where the identity of two communicating entities is established by means of authentication. Hashing is concerned with the problem of providing a relatively short digest–fingerprint of a much longer message or electronic document. A hashing function must satisfy (at least) the critical requirement that the fingerprints of two distinct messages are distinct. Hashing functions have numerous applications in cryptology. They are often used as primitives to construct other cryptographic functions. MACs are symmetric key primitives that provide message integrity against active spoofing by appending a cryptographic checksum to a message that is verifiable only by the intended recipient of the message. Message authentication is one of the most important ways of ensuring the integrity of information that is transferred by electronic means. Digital signatures provide electronic equivalents of handwritten signatures. They preserve the essential features of handwritten signatures and can be used to sign electronic documents. Digital signatures can potentially be used in legal contexts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Background Many studies have found associations between climatic conditions and dengue transmission. However, there is a debate about the future impacts of climate change on dengue transmission. This paper reviewed epidemiological evidence on the relationship between climate and dengue with a focus on quantitative methods for assessing the potential impacts of climate change on global dengue transmission. Methods A literature search was conducted in October 2012, using the electronic databases PubMed, Scopus, ScienceDirect, ProQuest, and Web of Science. The search focused on peer-reviewed journal articles published in English from January 1991 through October 2012. Results Sixteen studies met the inclusion criteria and most studies showed that the transmission of dengue is highly sensitive to climatic conditions, especially temperature, rainfall and relative humidity. Studies on the potential impacts of climate change on dengue indicate increased climatic suitability for transmission and an expansion of the geographic regions at risk during this century. A variety of quantitative modelling approaches were used in the studies. Several key methodological issues and current knowledge gaps were identified through this review. Conclusions It is important to assemble spatio-temporal patterns of dengue transmission compatible with long-term data on climate and other socio-ecological changes and this would advance projections of dengue risks associated with climate change. Keywords: Climate; Dengue; Models; Projection; Scenarios

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A survey of nurses working in critical care units in 89 Queensland hospitals was conducted to investigate their perceptions of critical care nurses' educational needs. Two thirds of the 62 respondents were from rural units and one third were from metropolitan units. Most respondents, irrespective of geographic location, wanted critical care education to be located in hospitals and to be accredited as a graduate diploma course. Rural and metropolitan nurses had similar educational needs and many worked for hospitals that were not offering adequate orientation or inservice critical care education. The findings that nursing staff turnover was a problem in metropolitan units and that the rural workforce was more stable have implications for the development of educational programs.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The cryptographic hash function literature has numerous hash function definitions and hash function requirements, and many of them disagree. This survey talks about the various definitions, and takes steps towards cleaning up the literature by explaining how the field has evolved and accurately depicting the research aims people have today.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Time- and position-resolved synchrotron small angle X-ray scattering data were acquired from samples of two Australian coal seams: Bulli seam (Bulli 4, Ro=1.42%, Sydney Basin), which naturally contains CO2 and Baralaba seam (Ro=0.67%, Bowen Basin), a potential candidate for sequestering CO2. This experimental approach has provided unique, pore-size-specific insights into the kinetics of CO2 sorption in the micro- and small mesopores (diameter 5 to 175 Å) and the density of the sorbed CO2 at reservoir-like conditions of temperature and hydrostatic pressure. For both samples, at pressures above 5 bar, the density of CO2 confined in pores was found to be uniform, with no densification in near-wall regions. In the Bulli 4 sample, CO2 first flooded the slit pores between polyaromatic sheets. In the pore-size range analysed, the confined CO2 density was close to that of the free CO2. The kinetics data are too noisy for reliable quantitative analysis, but qualitatively indicate faster kinetics in mineral-matter-rich regions. In the Baralaba sample, CO2 preferentially invaded the smallest micropores and the confined CO2 density was up to five times that of the free CO2. Faster CO2 sorption kinetics was found to be correlated with higher mineral matter content but, the mineral-matter-rich regions had lower-density CO2 confined in their pores. Remarkably, the kinetics was pore-size dependent, being faster for smaller pores. These results suggest that injection into the permeable section of an interbedded coal-clastic sequence could provide a viable combination of reasonable injectivity and high sorption capacity.