198 resultados para Belonging
Resumo:
Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.
Resumo:
AfL practices observed in case studies in a North Queensland school were analysed from a sociocultural theoretical perspective. AfL practices of feedback, dialogue and peer assessment were viewed as an opportunity for students to learn the social expectations about being an autonomous learner, or central participant within the classroom community of practice. This process of becoming more expert and belonging within the community of practice involved students negotiating identities of participation that included knowing both academic skills and social expectations within the classroom. This paper argues that when AfL practices are viewed as ways of enhancing participation, there is potential for learners to negotiate identities as autonomous learners. AfL practices within the daily classroom interactions and pedagogy that enabled students to develop a shared repertoire, joint enterprise and mutual engagement in the classroom communities of practice are described. The challenges for teachers in shifting their gaze to patterns of participation are also briefly discussed.
Resumo:
Belonging to and identifying with a nation has, since the latter half of the 18th century, been a distinctly human quality. To be human is to be part of a nation. Yet, contemporary theorists such as Appadurai and Fukuyama argue this universal human trait is undergoing vast change, threatened, it seems, by irrelevance and obsolescence, a return to tribalism and widened conceptual horizons represented by the likes of transnationalism and cosmopolitanism. These same threats are often attributed to the changing ideas and experience of spatiality and temporality enabled by information and communication technologies such as the Internet, spurred on by the rising intensity of flow amongst and within the human population. This paper argues that in the analysis of changes to the nation—which I suggest is best considered as the nexus of the body politic, the social body and human bodies—it is the notion of lived time and lived space that is most appropriate. The notion of the lived is borrowed and extended from Henri Lefebvre, who theorises that between mentally conceived and physically perceived space, lies its socially lived counterpart, which he defines as “the materialisation of social being”. As such, lived space (and time) draws on both its material and mental aspects. It is the thesis of this paper that against such a background as lived time and lived space the nation becomes much more than a political concept and/or project and is revealed as lived phenomenon, experienced in and through the dynamics of everyday praxis. Inherent to this argument is the understanding that it is the interplay between the possibilities imagined of the nation and; its eventual realisation through social acts and practices that marks it as a profoundly human institution.
Resumo:
Civic participation of young people around the world is routinely described in deficit terms, as they are labelled apathetic, devoid of political knowledge, disengaged from the community and self-absorbed (Andolina, 2002; Weller, 2006). This paper argues that the connectivity of time, space and social values (Lefebvre, 1991; Soja, 1996) are integral to understanding the performances of young people as civic subjects. Today’s youth negotiate unstable social, economic and environmental conditions, new technologies and new forms of community. Loyalty, citizenship and notions of belonging take on new meanings in these changing global conditions. Using the socio-spatial theories of Lefebvre and Foucault, and the tools of critical discourse analysis, this paper argues that the chronotope, or time/space relationship of universities, produces student citizens who, in resistance to a complex global society, create a cocooned space which focuses on moral and spiritual values that can be enacted on a personal level.
Resumo:
This article focuses on how teachers worked to build a meaningful curriculum around changes to a neighborhood and school grounds in a precinct listed for urban renewal. Drawing on a long-term relationship with the principal and one teacher, the researchers planned and designed a collaborative project to involve children as active participants in the redevelopment process, negotiating and redesigning an area between the preschool and the school. The research investigated spatial literacies, that is, ways of thinking about and representing the production of spaces, and critical literacies, in this instance how young people might have a say in remaking part of their school grounds. Data included videotapes of key events, interviews, and an archive of the elementary students' artifacts experimenting with spatial literacies. The project builds on the insights of community members and researchers working for social justice in high-poverty areas internationally that indicate the importance of education, local action, family, and youth involvement in building sustainable and equitable communities.
Resumo:
Music making affects relationships with self and others by generating a sense of belonging to a culture or ideology (Bamford, 2006; Barovick, 2001; Dillon & Stewart, 2006; Fiske, 2000; Hallam, 2001). Whilst studies from arts education research present compelling examples of these relationships, others argue that they do not present sufficiently validated evidence of a causal link between music making experiences and cognitive or social change (Winner & Cooper, 2000; Winner & Hetland, 2000a, 2000b, 2001). I have suggested elsewhere that this disconnection between compelling evidence and observations of the effects of music making are in part due to the lack of rigor in research and the incapacity of many methods to capture these experiences in meaningful ways (Dillon, 2006). Part of the answer to these questions about rigor and causality lay in the creative use of new media technologies that capture the results of relationships in music artefacts. Crucially, it is the effective management of these artefacts within computer systems that allows researchers and practitioners to collect, organize, analyse and then theorise such music making experiences.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.
Resumo:
Research investigating the transactional approach to the work stressor-employee adjustment relationship has described many negative main effects between perceived stressors in the workplace and employee outcomes. A considerable amount of literature, theoretical and empirical, also describes potential moderators of this relationship. Organizational identification has been established as a significant predictor of employee job-related attitudes. To date, research has neglected investigation of the potential moderating effect of organizational identification in the work stressor-employee adjustment relationship. On the basis of identity, subjective fit and sense of belonging literature it was predicted that higher perceptions of identification at multiple levels of the organization would mitigate the negative effect of work stressors on employee adjustment. It was expected, further, that more proximal, lower order identifications would be more prevalent and potent as buffers of stressors on strain. Predictions were tested with an employee sample from five organizations (N = 267). Hierarchical moderated multiple regression analyses revealed some support for the stress-buffering effects of identification in the prediction of job satisfaction and organizational commitment, particularly for more proximal (i.e., work unit) identification. These positive stress-buffering effects, however, were present for low identifiers in some situations. The present study represents an extension of the application of organizational identity theory by identifying the effects of organizational and workgroup identification on employee outcomes in the nonprofit context. Our findings will contribute to a better understanding of the dynamics in nonprofit organizations and therefore contribute to the development of strategy and interventions to deal with identity-based issues in nonprofits.
Resumo:
This study investigated preservice teachers’ perceptions for teaching and sustaining gifted and talented students while developing, modifying and implementing activities to cater for the diverse learner. Participants were surveyed at the end of a gifted and talented education program on their perceptions to differentiate the curriculum for meeting the needs of the student (n=22). SPSS data analysis with the five-part Likert scale indicated these preservice teachers agreed or strongly agreed they had developed skills in curriculum planning (91%) with well-designed activities (96%), and lesson preparation skills (96%). They also claimed they were enthusiastic for teaching (91%) and understanding of school practices and policies (96%). However, 46% agreed they had knowledge of syllabus documents with 50% claiming an ability to provide written feedback on student’s learning. Furthermore, nearly two-thirds suggested they had educational language from the syllabus and effective student management strategies. Preservice teachers require more direction on how to cater for diversity and begin creating sustainable societies by building knowledge from direct GAT experiences. Designing diagnostic surveys associated with university coursework can be used to determine further development for specific preservice teacher development in GAT education. Preservice teachers need to create opportunities for students to realise their potential by involving cognitive challenges through a differentiated curriculum. Differentiation requires modification of four primary areas of curriculum development (Maker, 1975) content (what we teach), process (how we teach), product (what we expect the students to do or show) and learning environment (where we teach/our class culture). Ashman and Elkins (2009) and Glasson (2008) emphasise the need for preservice teachers, teachers and other professionals to be able to identify what gifted and talented (GAT) students know and how they learn in relation to effective teaching. Glasson (2008) recommends that educators keep up to date with practices in pedagogy, support, monitoring and profiling of GAT students to create an environment conducive to achieving. Oral feedback is one method to communicate to learners about their progress but has advantages and disadvantages for some students. Oral feedback provides immediate information to the student on progress and performance (Ashman & Elkins, 2009). However, preservice teachers must have clear understandings of key concepts to assist the GAT student. Implementing teaching strategies to engage innovate and extend students is valuable to the preservice teacher in focusing on GAT student learning in the classroom (Killen, 2007). Practical teaching strategies (Harris & Hemming, 2008; Tomlinson et al., 1994) facilitate diverse ways for assisting GAT students to achieve learning outcomes. Such strategies include activities to enhance creativity, co-operative learning and problem-solving activities (Chessman, 2005; NSW Department of Education and Training, 2004; Taylor & Milton, 2006) for GAT students to develop a sense of identity, belonging and self esteem towards becoming an autonomous learner. Preservice teachers need to understand that GAT students learn in a different way and therefore should be assessed differently. Assessment can be through diverse options to demonstrate the student’s competence, demonstrate their understanding of the material in a way that highlights their natural abilities (Glasson, 2008; Mack, 2008). Preservice teachers often are unprepared to assess students understanding but this may be overcome with teacher education training promoting effective communication and collaboration in the classroom, including the provision of a variety of assessment strategies to improve teaching and learning (Callahan et al., 2003; Tomlinson et al., 1994). It is also critical that preservice teachers have enthusiasm for teaching to demonstrate inclusion, involvement and the excitement to communicate to GAT students in the learning process (Baum, 2002). Evaluating and reflecting on teaching practices must be part of a preservice teacher’s repertoire for GAT education. Evaluating teaching practices can assist to further enhance student learning (Mayer, 2008). Evaluation gauges the success or otherwise of specific activities and teaching in general (Mayer, 2008), and ensures that preservice teachers and teachers are well prepared and maintain their commitment to their students and the community. Long and Harris (1999) advocate that reflective practices assist teachers in creating improvements in educational practices. Reflective practices help preservice teachers and teachers to improve their ability to pursue improved learning outcomes and professional growth (Long & Harris, 1999). Context This study is set at a small regional campus of a large university in Queensland. As a way to address departmental policies and the need to prepare preservice teachers for engaging a diverse range of learners (see Queensland College of Teachers, Professional Standards for Teachers, 2006), preservice teachers at this campus completed four elective units within their Bachelor of Education (primary) degree. The electives include: 1. Middle years students and schools 2. Teaching strategies for engaging learners 3. Teaching students with learning difficulties, and 4. Middle-years curriculum, pedagogy and assessment. In the university-based component of this unit, preservice teachers engaged in learning about middle years students and schools, and gained knowledge of government policies pertaining to GAT students. Further explored within in this unit was the importance of: collaboration between teachers, parents/carers and school personnel in supporting middle years GAT students; incorporating challenging learning experiences that promoted higher order thinking and problem solving skills; real world learning experiences for students and; the alignment and design of curriculum, pedagogy and assessment that is relevant to the students development, interests and needs. The participants were third-year Bachelor of Education (primary) preservice teachers who were completing an elective unit as part of the middle years of schooling learning with a focus on GAT students. They were assigned one student from a local school. In the six subsequent ninety minute weekly lessons, the preservice teachers were responsible for designing learning activities that would engage and extend the GAT students. Furthermore, preservice teachers made decisions about suitable pedagogical approaches and designed the assessment task to align with the curriculum and the developmental needs of their middle years GAT student. This research aims to describe preservice teachers’ perceptions of their education for teaching gifted and talented students.
Resumo:
This book (256 pages, written in Korean) is a critical essay that reviews, questions, and criticises Korean and Eastern immigrants’ thinking and behaviour styles in Australia from their cultural perspectives, and discuss and proposes a creative cultural dimension for their better life in a multicultural context. Multiculturalism is not supportive of Eastern cultures because of individualistic collection of cultures, while transculturalism facilitates nurture of their culture in a community-oriented way within multicultural circumstances. Korean and Eastern immigrants, sharing oriental cultural systems and values, should approach to the Australian multicultural context with transculturalism which allows creating new cultural values in collaboration with and by participation into local communities. ------------------------------------------------------------ Many Eastern immigrants live in their own ethnic communities without or less interacting with Australian (communities). The author defines this phenomenon as “reverse immigration”. Reverse immigration refers to re-immigrating to their ethnic community in Australia or to their birth country despite they did not anticipate that this would happen to them before immigration to Australia. The author argues that Easterners’ collectivistic culture often devalues individuality and vice versa. Cultural clash between West and East often forces the immigrants to choose reverse immigration because of their lack of understanding of Western culture and their cultural characteristics such as low individuality, high power distance, and high uncertainty avoidance. For example, a vague boundary between individualist and collectivist in a collectivistic context (within their ethnic group) often leads to maladjustment to local communities and enhancement of cultural conservatism. The author proposes that the cultural clash can be overcome by cross-cultural activities named “transculturalism”. To Eastern immigrants, transculturalism can be achieved by acculturation of their two predominant cultures, the third-person perspective and generalised others. In a multicultural context, the former refers to the ability to share another person's feelings and emotions as if they were your own, and the latter does the ability to manage community and public expectations. When both cultural values are used for quality interactions between East and West, they allow Eastern immigrants to be more creative and critical and Australian to be more socially inclusive and culturally tolerant. With these discussions, the author discusses cultural differences throughout the book with four topics (chapters) and proposes transculturalism as a solution to the reverse immigration. ------------------------------------------------------------ Chapter 1 criticises Koreans’ attitudes and methods towards learning English that is less pragmatic and practical, but more likely to be a scholarly study. The author explains that Koreans’ non-pragmatic towards learning English has been firmly built based on their traditional systems and values that Koreans view English as a discipline and an aim of academic achievements rather than a means of communication. Within their cultural context, English can be perceived as more than a language, but something like vastly superior to their language and culture. Their collectivistic culture regards English as an unreachable and heterogeneous one that may threaten their cultural identity, so that “scholarly studying” is only the way to achieve (not learn) it. This discourages the immigrants to engage and involve in daily dialogues by “using” English as a second language. The author further advises the readers to be aware of Eastern collectivistic culture in communication and interaction that sometimes completely reverses private and public topics in a Western context. This leads them to feel that they have no content to talk to natives. ------------------------------------------------------------ Chapter 2 compares between Korea and Australia in terms of their educational systems and values, and proposes how Eastern overseas students can achieve critical and creative thinking within a Western educational setting. Interestingly, this chapter includes an explanation of why Eastern overseas students easily fail assessments including essay writing, oral presentations and discussions. One of the reasons the author explains is that Eastern students are not familiar to criticise others and think creatively, especially when they recognise that their words and ideas may harm the collectivistic harmony. Western educational systems focuses on enhancement of individuality such as self-confidence, self-esteem, and self-expression, while Eastern educational systems foster group-oriented values such as interpersonal relationship, and strong moral and spiritual values. Yet, the author argues that the collectivistic approach to criticism and creativity is often more critical and creative than Western individuals when they know what they are supposed to do for a group (or a community). Therefore, Eastern students need to think their cultural merits and demerits by using an individual perspective rather than generalised others’ perspective. The latter often discourages individual participation in a community, and the generalised others in a Western culture is weaker than Eastern. Furthermore, Western educational systems do not educate students to transform (loose) their individuality to fit into a group or a community. Rather they cultivate individuality for community prosperity. ------------------------------------------------------------ Chapter 3 introduces various cases of reverse immigration in workplaces that many immigrants return to their country or their ethnic community after many trials for acculturation. Reverse immigration is unexpected and not planned before immigration, so that its emotional embarrassment increases such severe social loneliness. Most Eastern immigrant workers have tried to adjust themselves in this new cultural environment at the early stages of immigration. However, their cultural features of collectivism, high power distance, high uncertainty avoidance, and long-term oriented cultures suppress individual initiative and eliminate the space for experiments in ways of acculturation. The author argues that returning to their ethnic community (physically and psychologically) leads to two significant problems: their distorted parenting and becoming more conservatives. The former leads the first generation of immigrants to pressure their children to pursue extrinsic or materialist values, such as financial success, fame and physical appearance, rather than on intrinsic values, while the latter refers to their isolated conservative characters because of their remoteness from the changes of their own country. The author also warns that their ethnic and religious groups actively strengthens immigrants’ social loneliness and systematically discourages immigrants’ interests and desire to be involving into local communities. The ethnic communities and leaders have not been interacting with Australian local communities and, as a result, are eager to conserve outdated cultural systems values. Even they have a tendency to weed out those people who wish to settle down within Australian local communities. They believe that those people can threaten their community’s survival and continuity. ------------------------------------------------------------ Chapter 4 titled multiculturalism argues that Korean and Eastern immigrants should more precisely understand Australia as a multicultural society in a way of collaboratively creating new cultural values. The author introduces multiculturalism with its definitions and history in Australia and argues the limitations of multiculturalism from an Easterner’s perspective. With well known tragedies of the second generations of U.S. immigrants, Cho Seung-Hui, a university student, massacred 32 people on the Virginia Tech before committing suicide and Hidal Hassan, an Army psychiatrist, killed 13 people at Fort Hood and the responses of ethnic community, the author explains that their mental illness may be derived from their parents’ (or ethnic group) culturally isolated attitude and socially static viewpoint of U.S. (Western system and values). The author insists that multiculturalism may restrict Eastern immigrants’ engagement and involvement in local communities. Multiculturalism has been systematically and historically developed based on Western systems and cultural values. In other words, multiculturalism requires high self-confidence and self-esteem that Eastern immigrants less prioritise them. It has been generally known that Easterners put more weight on human relationship than Westerners, but the author claims that this is not true. Within an individualistic culture, Westerners are more interested in building person-to-person connections and relationships. While Easterners are more interested in how individuals can achieve a sense of belonging within a group and a community. Therefore, multiculturalism is an ideology which forces Eastern immigrants to discard their strong desire to be part of a group and does not give a sense of belonging. In a consequence, the author advises that Eastern immigrants should aim towards “transculturalism” which allows them to actively participate in and contribute to their multicultural community. Transculturalism does not ask Easterners to discard their cultural values, but enables them to be a collectivistic individualist (a community leader) who is capable of developing new cultural values in a more creative and productive way. Furthermore, transculturalism encourages Western Australians in a multicultural context to collaborate with ethnic minorities to build a better community.
Resumo:
The changes of economic status in Malaysia have lead to many psychosocial problems especially among the young people. Counselling and psychotherapy have been seen as one of the solutions that are practiced in Western Culture. Most counselling theorists believe that their theory is universal however there is limited research to prove it. This paper will describe an ongoing study conducted in Malaysia about the applicability of one Western counselling Theory, Bowen’s family theory the Differentiation of self levels in the family allow a person to both leave the family’s boundaries in search of uniqueness and continually return to the family in order to further establish a sense of belonging. In addition Bowen believed that this comprised of four measures: Differentiation of Self (DSI), Family Inventory of Live Event (ILE), Depression Anxiety and Stress Scale (DASS) and Connor-Davidson Resilience Scale (CD-RISC). Preliminary findings are discussed and the implication in enhancing the quality of teaching family counselling in universities explored.
Resumo:
This booklet is the third in the Research in Practice Series, designed to complement Belonging, being & becoming: The Early Years Learning Framework for Australia (DEEWR, 2009). It focuses on Learning Outcome 5 of the Early Years Learning Framework (EYLF): Children are effective communicators (DEEWR, 2009).
Resumo:
This thesis proposes =friendworks‘ as an important sub-group of social networks, comprised of networks of friends. It investigates friendworks of a particular group of adult Australian women as a way of understanding neglected aspects of social networking practices. Friendworks are contextualised to highlight two main themes of interest: population mobility and communication practices. The impact of relocation on individuals, local communities and the wider society is explored through a case study of female friendworks in a seachange community. Research findings point to the importance of friendworks in building and cohering social and emotional support, well-being, belonging and senses of place and community. Different types of communication methods were used by research participants for mediating different kinds of social ties within the friendworks considered here. Communication patterns were influenced by geographical proximity to friends, and the type of social support required of them (emotional, instrumental or companionship). Most findings were consistent with broader social patterns of communication. For example, face-to-face interactions were the dominant and most favoured communication method between local friends, regardless of whether they were weak or strong ties. The fixed-telephone and the internet were commonly in use to maintain old and geographically distant social ties, while mobile phones were used the least among friends in comparison with other communication methods. The key finding of this thesis is that friendworks are an extremely important solid network in contemporary society, providing mooring relations in a mobile world. Paradoxically, however, for women in this study, the mobile phone, which is popularly perceived as a flexible, multi-purpose communication technology for people on the move, was the least versatile of all technologies for maintaining friendworks. The cost of services was the main inhibitor here. The internet was found to be the most versatile communication technology and was used to support various types of social ties: strong, weak, local and distant. This thesis also highlights the value of the concept of friendworks as well as networks for communication research and policy investigating individuals‘ motivations and practices.
Resumo:
Many luxury heritage brands operate on the misconception that heritage is interchangeable with history rather than representative of the emotional response they originally developed in their customer. This idea of heritage as static history inhibits innovation, prevents dynamic renewal and impedes their ability to redefine, strengthen and position their brand in current and emerging marketplaces. This paper examines a number of heritage luxury brands that have successfully identified the original emotional responses they developed in their customers and, through innovative approaches in design, marketing, branding and distribution evoke these responses in contemporary consumers. Using heritage and innovation hand-in-hand, these brands have continued to grow and develop a vision of heritage that incorporates both historical and contemporary ideas to meet emerging customer needs. While what constitutes a ‘luxury’ item is constantly challenged in this era of accessible luxury products, up-scaling and aspirational spending, this paper sees consumers’ emotional needs as the key element in defining the concept of luxury. These emotional qualities consistently remain relevant due to their ability to enhance a positive sense of identity for the brand user. Luxury is about the ‘experience’ not just the product providing the consumer with a sense of enhanced status or identity through invoked feelings of exclusivity, authenticity, quality, uniqueness and culture. This paper will analyse luxury heritage brands that have successfully combined these emotional values with those of their ‘heritage’ to create an aura of authenticity and nostalgia that appeals to contemporary consumers. Like luxury, the line where clothing becomes fashion is blurred in the contemporary fashion industry; however, consumer emotion again plays an important role. For example, clothing becomes ‘fashion’ for consumers when it affects their self perception rather than fulfilling basic functions of shelter and protection. Successful luxury heritage brands can enhance consumers’ sense of self by involving them in the ‘experience’ and ‘personality’ of the brand so they see it as a reflection of their own exclusiveness, authentic uniqueness, belonging and cultural value. Innovation is a valuable tool for heritage luxury brands to successfully generate these desired emotional responses and meet the evolving needs of contemporary consumers. While traditionally fashion has been a monologue from brand to consumer, new technology has given consumers a voice to engage brands in a conversation to express their evolving needs, ideas and feedback. As a result, in this consumer-empowered era of information sharing, this paper defines innovation as the ability of heritage luxury brands to develop new design and branding strategies in response to this consumer feedback while retaining the emotional core values of their heritage. This paper analyses how luxury heritage brands can effectively position themselves in the contemporary marketplace by separating heritage from history to incorporate innovative strategies that will appeal to consumer needs of today and tomorrow.
Resumo:
In Shadbolt v Wise [2002] QSC 348 the applicants were seeking relief under s184 of the Property Law Act 1974 (Qld) in respect of an encroachment that they constructed on land belonging to the adjacent owner. The encroachment in question consisted of slightly less than one half of an elaborate pool and pool enclosure (the area of the encroachment being approximately 108 square metres). The land upon which the encroachment was situated was elevated with distant ocean views.