782 resultados para public trust


Relevância:

20.00% 20.00%

Publicador:

Resumo:

As planners work to create more sustainable and liveable urban environments, a priority is to transition away from prioritising the automobile and towards enhancing the pedestrian experience. Thus, this research explores the experience of pedestrian accessibility in inner-urban higher-density Brisbane in Australia, drawing on findings from semi-structured in-depth interviews with 24 residents and over 100 hours of public place observations in three case-study neighbourhoods. The interviews took place in residents homes and explored their experience of higher density living and their neighbourhood, whilst observations were recorded through a combination of methods including photographs, sketch maps, recordings and field journals. Observation locations included retail and commercial space, roads, parkland and open space, with multiple observations at each location. A thematic analysis identified common themes in both interviews and the observations, with this paper focusing on residents’ lived experience in urban built environments. This analysis revealed that pedestrian accessibility is linked to access to local amenities and direct routes, aesthetics, sense of community, ownership of space and safety. In particular, observations revealed how pedestrian accessibility and route-taking works with, against or in spite of the design features of urban environments, as well as the importance of the social use of the built environment. Residents spoke about although walking quick and preferred for local amenities, the decision to walk was moderated by factors such as time of day and perceived safety. Measures to ensure and improve the pedestrian accessibility of urban areas needs to take into account the propensity for people to prefer and improvise direct routes (often to the detriment of traffic safety considerations), the importance of ongoing maintenance and upgrading of walking infrastructure and the importance of aesthetically pleasing and safe walking environments. By combining interviews and observations, this research highlights the current dominance of the automobile culture in Brisbane and the layers of meaning, experiences and complexity hidden within the pedestrian experience.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Public relations (PR) practitioners’ and journalists’ professional views and attitudes toward each other have been a subject of academic inquiry during the past decades; however, much of this research has focused on Europe and North America. In other regions of the world, for example in Latin America, historical developments and social understandings have led to slightly different conceptualizations of PR and journalism. Using Chile as a case study, this paper reports the results of an examination of Chilean journalists’ and PR practitioners’ professional conceptions. While both groups tend to have somewhat similar views of media relations and see themselves as part of the same profession, there are also important differences which are most likely based on professional socialization processes rather than educational backgrounds or sociodemographic and work related variables. Implications for contextually grounded approaches to the study of PR and journalism are highlighted.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The impact of public relations on emerging fields such as travel journalism has not gained much attention, despite the broader growth of lifestyle journalism, and its particular dependence on PR. This study reports the findings of a representative survey of Australian travel journalists, focusing on their views of PR. Results show that travel journalists are wary of PR, although they believe they can be relatively immune from its influence and see some PR activities as quite useful. Cluster analysis identifies three distinct groups based on their views of PR, which range from a positive attitude to strong criticism. Their backgrounds and differences are explored, pointing to gender, job status, and background in mainstream journalism as main determinants for differences.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Many emerging economies are dangling the patent system to stimulate bio-technological innovations with the ultimate premise that these will improve their economic and social growth. The patent system mandates full disclosure of the patented invention in exchange of a temporary exclusive patent right. Recently, however, patent offices have fallen short of complying with such a mandate, especially for genetic inventions. Most patent offices provide only static information about disclosed patent sequences and even some do not keep track of the sequence listing data in their own database. The successful partnership of QUT Library and Cambia exemplifies advocacy in Open Access, Open Innovation and User Participation. The library extends its services to various departments within the university, builds and encourages research networks to complement skills needed to make a contribution in the real world.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article reports on the outcomes of small group deliberations on levels of punitiveness and public confidence in the sentencing functions of Australian criminal courts, conducted as part of a larger project investigating public attitudes to sentencing. One hypothesis of the project as a whole was that a more informed and involved public is likely to be less punitive in their views on the sentencing of offenders, and to express less cynical views about the role of sentencing courts. The aim of the small group deliberations as part of the broader project was to engender a more thoughtful and considered approach by participants to issues around sentencing. It was hypothesised that the opportunity to discuss, deliberate and consider would lead to a measurable reduction in punitiveness and an increase in people’s confidence in the courts. While the results do indeed indicate such changes in attitudes, the current study also shed light on some of the conceptual, methodological and practical challenges inherent in this type of research.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

2012 saw the publication of competing and complementary lines of Australian “classics”: “A&R Australian Classics” (HarperCollins) and “Text Classics” (Text Publishing). While Angus and Robertson were key in establishing a canon of Australian children’s classics in the twentieth century, it was the Text Classics line which included a selection of young people’s titles in their 2013. In turn, Penguin Australia launched a selection of “Australian Children’s Classics”. In so doing, these publishers were drawing on particular literary and visual cultural traditions in Australian children’s literature. Public assertions of a particular selection of children’s books reveals not only contemporary assumptions about desirable childhood experiences but about the operation of nostalgia therein. In encouraging Australian adults to judge books by their covers, such gestures imply that Australian children may be similarly understood. Importantly, the illusion of unity, sameness, and legibility which is promised by circumscribed canons of “classic” children’s literature may well imply a desire for similarly illusory, unified, legible, “classic” childhood. This paper attends to public attempts to materialise (and legitimise) a canon of classic Australian children’s literature. In particular, it considers the ways in which publishing, postage stamps, and book awards make visible a range of children’s books, but do so in order to either fix or efface the content or meaning of the books themselves. Moving between assertions of the best books for children from the 1980s to today, and of the social values circulated within those books, this paper considers the possibilities and problematics of an Australian children’s canon.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this environmental scan of research and policy literature, the authors consider various definitions of trust as they seek to address and inform the hypothesis that ‘a culture of trust enhances performance’ in schools. The discussion draws on the work of the Australian Institute for Teaching and School Leadership in school leadership and research by Caldwell and Harris (2008) to consider ways in which trust is linked to performance in schools and organisations. It explores the concept of trust as a form of capital available to schools, and highlights how successful school leaders work to align trust, strategy and passion in implementing effective change. At the heart of the review is the relationship between trust and school improvement. An adapted model of the elements of a culture of trust developed by Bryk and Schneider in their influential study of trust in school reform in Chicago is used to frame this aspect of the review. The authors identify four essential categories of relationships that enable schools to be described as having a culture of trust. The review concludes with a discussion of the relationship between trust and school governance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We introduce the notion of distributed password-based public-key cryptography, where a virtual high-entropy private key is implicitly defined as a concatenation of low-entropy passwords held in separate locations. The users can jointly perform private-key operations by exchanging messages over an arbitrary channel, based on their respective passwords, without ever sharing their passwords or reconstituting the key. Focusing on the case of ElGamal encryption as an example, we start by formally defining ideal functionalities for distributed public-key generation and virtual private-key computation in the UC model. We then construct efficient protocols that securely realize them in either the RO model (for efficiency) or the CRS model (for elegance). We conclude by showing that our distributed protocols generalize to a broad class of “discrete-log”-based public-key cryptosystems, which notably includes identity-based encryption. This opens the door to a powerful extension of IBE with a virtual PKG made of a group of people, each one memorizing a small portion of the master key.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Construction delay has been a protracted problem for the Malaysian construction industry. Recent report showed that 80% of public sector projects are behind schedule. This underachieving time performance has led to many problems including public complaints, loss of reputation and revenue for the government and a slump in the industry’s GDP contribution. Research in the area of project delay has mushroomed worldwide with attempts to place mitigation plans, but delay remains a global phenomenon. There is now an urgent need for revolutionizing construction practices and past research, backed up with few successful cases suggests that Supply Chain Management (SCM) could prove beneficial to reduce or eliminate delays in construction. SCM which originated from the automotive manufacturing industry promotes a more collaborative approach to construction management and has recently gained attention of the construction industry. However every country, including Malaysia, would certainly have disparities of their own compared to others being it from the cultural point of view, nature of problems, locality or improvements needed. Therefore, this paper will present part of a Ph.D. research which aims at illustrating the Malaysian construction industry experts’ perception of the Malaysian public sector project delay, provide insight into these dilemmas, highlights the problems with current practices, its effects and the improvements needed. Subsequently, this paper would propose ratification to the problems using SCM. A semi-structured interview has been conducted to practitioners with at least 20 years’ experience in the industry. The findings showed that Malaysia may be unique compared to other countries and that by considering a number of additional factors, SCM could prove beneficial to increase efficiency of the Malaysian public sector projects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this essay, we outline an emerging form of public intellectualism in the humanities sector of Australian higher education. We argue that debates over public intellectualism and its relation to the academy in Australia have largely been focused on the tension between polemics and politics. These debates have also tended to ignore or overlook policy drivers within the sector and alternative or new media sites of public intellectualism. Shifting the focus towards policy drivers in the knowledge economy—such as knowledge transfer and third-stream funding—and understanding the nature of the university as a public sphere in itself reveals a new economy of the public intellectual as a professional knowledge worker. This new economy, we argue, may well render obsolete many of the previous debates over public intellectualism in the humanities. However, we anticipate that it will generate new debates over the relationship between the individual and the institutional, and between the concepts of public profile and public role—debates that will affect, in particular, early career academics who are the inheritors of this new economy of the public intellectual.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article investigates the discourses of academic legitimacy that surround the production, consumption, and accreditation of online scholarship. Using the web-based media and cultural studies journal (http://journal.media-culture.org.au) as a case study, it examines how online scholarly journals often position themselves as occupying a space between the academic and the popular and as having a functional advantage over print-based media in promoting a spirit of public intellectualism. The current research agenda of both government and academe prioritises academic research that is efficient, self-promoting, and relevant to the public. Yet, although the cost-effectiveness and public-intellectual focus of online scholarship speak to these research priorities, online journals such as M/C Journal have occupied, and continue to occupy, an unstable position in relation to the perceived academic legitimacy of their content. Although some online scholarly journals have achieved a limited form of recognition within a system of accreditation that still privileges print-based scholarship, I argue that this, nevertheless, points to the fact that traditional textual notions of legitimate academic work continue to pervade the research agenda of an academe that increasingly promotes flexible delivery of teaching and online research initiatives.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The notion of certificateless public-key encryption (CL-PKE) was introduced by Al-Riyami and Paterson in 2003 that avoids the drawbacks of both traditional PKI-based public-key encryption (i.e., establishing public-key infrastructure) and identity-based encryption (i.e., key escrow). So CL-PKE like identity-based encryption is certificate-free, and unlike identity-based encryption is key escrow-free. In this paper, we introduce simple and efficient CCA-secure CL-PKE based on (hierarchical) identity-based encryption. Our construction has both theoretical and practical interests. First, our generic transformation gives a new way of constructing CCA-secure CL-PKE. Second, instantiating our transformation using lattice-based primitives results in a more efficient CCA-secure CL-PKE than its counterpart introduced by Dent in 2008.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Since their introduction, the notions of indistinguishability and non-malleability have been changed and extended by different authors to support different goals. In this paper, we propose new flavors of these notions, investigate their relative strengths with respect to previous notions, and provide the full picture of relationships (i.e., implications and separations) among the security notions for public-key encryption schemes. We take into account the two general security goals of indistinguishability and non-malleability, each in the message space, key space, and hybrid message-key space to find six specific goals, a couple of them, namely complete indistinguishability and key non-malleability, are new. Then for each pair of goals, coming from the indistinguishability or non-malleability classes, we prove either an implication or a separation, completing the full picture of relationships among all these security notions. The implications and separations are respectively supported by formal proofs (i.e., reductions) in the concrete-security framework and by counterexamples.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption of a related message (under a given public key). Fischlin introduced a stronger notion, known as complete non-malleability, which requires attackers to have negligible advantage, even if they are allowed to transform the public key under which the related message is encrypted. Ventre and Visconti later proposed a comparison-based definition of this security notion, which is more in line with the well-studied definitions proposed by Bellare et al. The authors also provide additional feasibility results by proposing two constructions of completely non-malleable schemes, one in the common reference string model using non-interactive zero-knowledge proofs, and another using interactive encryption schemes. Therefore, the only previously known completely non-malleable (and non-interactive) scheme in the standard model, is quite inefficient as it relies on generic NIZK approach. They left the existence of efficient schemes in the common reference string model as an open problem. Recently, two efficient public-key encryption schemes have been proposed by Libert and Yung, and Barbosa and Farshim, both of them are based on pairing identity-based encryption. At ACISP 2011, Sepahi et al. proposed a method to achieve completely non-malleable encryption in the public-key setting using lattices but there is no security proof for the proposed scheme. In this paper we review the mentioned scheme and provide its security proof in the standard model. Our study shows that Sepahi’s scheme will remain secure even for post-quantum world since there are currently no known quantum algorithms for solving lattice problems that perform significantly better than the best known classical (i.e., non-quantum) algorithms.