148 resultados para Cyber-bullying sensibility
Resumo:
Script for non-verbal performance. Research Component: Silent Treatment: Creating Non-verbal Performance Works for Children The research field of theatre for young people draws on theories of child development and popular culture. SHOW explored personal and social development, friendship and creative play through the lens of the experience of girls aged 8-12. This project consolidated and refined innovative approaches to creating non-verbal theatre performance, and addressed challenges inherent in the creation of a performance by adults for young audiences. A significant finding of the project was the unanticipated convergence of creative practice and research into child behaviour and development: the congruence of content (Female bullying) and theatrical form (non-verbal performance: “Within the hidden culture of aggression, girls fight with body language and relationships instead of fists and knives. In this world, friendship is a weapon, and the sting of a shout pales in comparison to a day of someone’s silence. There is no gesture more devastating than the back turning away Simmons, Rachel (2002:3) Odd Girl Out: The Hidden Culture Of Aggression In Girls Schwartz Books The creative development and drafting process focussed on negotiating the conceptual design and practical constraints of incorporating diegetic music and video sources into the narrative. The authorial (and production) challenges of creating a script that could facilitate the re-mount a non-verbal work for a company specialising in text-based theatre . Show was commissioned by the Queensland Theatre Company in 2003, toured into Queensland Schools by the Queensland Arts Council and in 2004 was performed at the Sydney Opera House.
Resumo:
There is a mismatch between the kinds of movements used in gesture interfaces and our existing theoretical understandings of gesture. We need to re-examine the assumptions of gesture research and develop theory more suited to gesture interface design. In addition to improved theory, we need to develop ways for participants in the process of design to adapt, extend and develop theory for their own design contexts. Gesture interface designers should approach theory as a contingent resource for design actions that is responsive to the needs of the design process.
Resumo:
Information and communication technologies (ICTs) had occupied their position on knowledge management and are now evolving towards the era of self-intelligence (Klosterman, 2001). In the 21st century ICTs for urban development and planning are imperative to improve the quality of life and place. This includes the management of traffic, waste, electricity, sewerage and water quality, monitoring fire and crime, conserving renewable resources, and coordinating urban policies and programs for urban planners, civil engineers, and government officers and administrators. The handling of tasks in the field of urban management often requires complex, interdisciplinary knowledge as well as profound technical information. Most of the information has been compiled during the last few years in the form of manuals, reports, databases, and programs. However frequently, the existence of these information and services are either not known or they are not readily available to the people who need them. To provide urban administrators and the public with comprehensive information and services, various ICTs are being developed. In early 1990s Mark Weiser (1993) proposed Ubiquitous Computing project at the Xerox Palo Alto Research Centre in the US. He provides a vision of a built environment which digital networks link individual residents not only to other people but also to goods and services whenever and wherever they need (Mitchell, 1999). Since then the Republic of Korea (ROK) has been continuously developed national strategies for knowledge based urban development (KBUD) through the agenda of Cyber Korea, E-Korea and U-Korea. Among abovementioned agendas particularly the U-Korea agenda aims the convergence of ICTs and urban space for a prosperous urban and economic development. U-Korea strategies create a series of U-cities based on ubiquitous computing and ICTs by a means of providing ubiquitous city (U-city) infrastructure and services in urban space. The goals of U-city development is not only boosting the national economy but also creating value in knowledge based communities. It provides opportunity for both the central and local governments collaborate to U-city project, optimize information utilization, and minimize regional disparities. This chapter introduces the Korean-led U-city concept, planning, design schemes and management policies and discusses the implications of U-city concept in planning for KBUD.
Resumo:
In this chapter we discuss some significant theories and models of social development. In doing so we will contemplate the nature and force of peer group influences as well as the influences of families, cultural heritage and lived experience. The chapter will consider birth order issues, family structures, responsibilities, pressures and family relationships and their impact on teaching and learning through adolescence. We will also discuss common issues that emerge in schools such as bullying, truancy, and academic performance problems from a social perspective.
Resumo:
The analysis and value of digital evidence in an investigation has been the domain of discourse in the digital forensic community for several years. While many works have considered different approaches to model digital evidence, a comprehensive understanding of the process of merging different evidence items recovered during a forensic analysis is still a distant dream. With the advent of modern technologies, pro-active measures are integral to keeping abreast of all forms of cyber crimes and attacks. This paper motivates the need to formalize the process of analyzing digital evidence from multiple sources simultaneously. In this paper, we present the forensic integration architecture (FIA) which provides a framework for abstracting the evidence source and storage format information from digital evidence and explores the concept of integrating evidence information from multiple sources. The FIA architecture identifies evidence information from multiple sources that enables an investigator to build theories to reconstruct the past. FIA is hierarchically composed of multiple layers and adopts a technology independent approach. FIA is also open and extensible making it simple to adapt to technological changes. We present a case study using a hypothetical car theft case to demonstrate the concepts and illustrate the value it brings into the field.
Resumo:
Children and adolescents now communicate online to form and/or maintain relationships with friends, family, and strangers. Relationships in “real life” are important for children’s and adolescents’ psychosocial development; however, they can be difficult for those who experience feelings of loneliness and/or social anxiety. The aim of this study was to investigate differences in usage of online communication patterns between children and adolescents with and without self-reported loneliness and social anxiety. Six hundred and twenty-six students aged between 10-16 years completed a survey on the amount of time they spent communicating online, the topics they discussed, the partners they engaged with, and their purposes for communicating over the Internet. Participants were administered a shortened version of the UCLA Loneliness Scale and an abbreviated sub-scale of the Social Anxiety Scale for Adolescents (SAS-A). Additionally, age and gender differences in usage of the aforementioned online communication patterns were examined across the entire sample. Findings revealed that children and adolescents who self-reported being lonely communicated online significantly more frequently about personal things and intimate topics than did those who did not self-report being lonely. The former were motivated to use online communication significantly more frequently to compensate for their weaker social skills to meet new people. Results suggest that Internet usage allows them to fulfill critical needs of social interactions, self-disclosure, and identity exploration. Future research, however, should explore whether or not the benefits derived from online communication may also facilitate lonely children’s and adolescents’ offline social relationships.
Resumo:
This thesis examines the new theatrical form of cyberformance (live performance by remote players using internet technologies) and contextualises it within the broader fields of networked performance, digital performance and theatre. Poststructuralist theories that contest the binary distinction between reality and representation provide the analytical foundation for the thesis. A critical reflexive methodological approach is undertaken in order to highlight three themes. First, the essential qualities and criteria of cyberformance are identified, and illustrated with examples from the early 1990s to the present day. Second, two cyberformance groups – the Plaintext Players and Avatar Body Collision – and UpStage, a purpose-built application for cyberformance, are examined in more detailed case studies. Third, the specifics of the cyberformance audience are explored and commonalities are identified between theatre and online culture. In conclusion, this thesis suggests that theatre and the internet have much to offer each other in this current global state of transition, and that cyberformance offers one means by which to facilitate the incorporation of new technologies into our lives.
Resumo:
Hypercapitalism, with its "knowledge economy", is the form of capitalism under which thought itself is produced, commodified, and exchanged within the globally integrated system of communication technologies. As such, hypercapitalism may be seen as not so much a revolution, but rather an evolution: the progressively thorough, inexorable totalisation of social relations by Capital. The study on which this paper is based synthesises the sociological perspectives of Marx (1970, 1844/1975, 1846/1972, 1976, 1978, 1981) and Adorno (1951/1974, 1991; Horkheimer & Adorno, 1944/1998), and the Critical Discourse perspectives of Fairclough (1989, 1992) and Lemke (1995) to argue that alienated thought and language are the fundamental, irreducible commodity-forms of Cybersociety’s knowledge economy.
Resumo:
It can be argued that technological advances and increasing familiarity with technology in the general population has created a huge potential for expansion of online learning (OL) across the educational spectrum. The growth of OL at the university level over the last few years has brought with it an increasing need to understand the learning processes and social processes involved in the ‘cyber’ or ‘virtual’ lecture hall and seminar room by asking questions such as: What are ‘virtual universities’? How – or more critically whether – virtual learning environments are different from face-to-face (F2F) ones? In other words, there is a critical need to explore how students relate to each other and their lecturer(s) in a literal ‘school without walls’? This paper explores the development of a virtual community within a wholly online MA in Applied Linguistics program within the framework of online community development proposed by Haythornthwaite et al (2000).
Resumo:
This report focuses on our examination of extant data which have been sourced with respect to intentional violence perpetrated or experienced by males in regional and remote Australia. The nature of intentional violent acts can be physical, sexual or psychological or involve deprivation or neglect. We have presented under the headings of: self-harm including suicide; homicide; assault, sexual assault and the threat of assault; child abuse; other family and intimate partner violence; harassment, stalking and bullying; alcohol related social violence; and animal abuse. State variations in interpersonal violence are also presented. Additional commentary resulting from exploration, examination and analyses of secondary data is published online in complementary reports in this series.
Resumo:
The development of sexual identity is a complex, lifelong process involving the interplay of sex, gender and orientation, occurring within a social framework of heterosexual dominance (Murray 2001). Australia has a richly diverse culture and, at some point in our lives, we will all meet people, who look, think, live, or act differently to ourselves. Through understanding and celebrating the diversity of our culture, we enrich our lives and the lives of others. Schools influence how boys (and girls) see themselves and each other; those of us who work in schools cannot pretend to be outside the process of gender construction. In our daily business we send messages, set boundaries and respond with support, disinterest or censure to the acting out of various masculinities and femininities.
Resumo:
Young people are increasingly using social networking sites (SNSs), like Myspace and Facebook, to engage with others. The use of SNSs can have both positive and negative effects on the individual; however, few research studies identify the types of people who frequent these Internet sites. This study sought to predict young adults’ use of SNSs and addictive tendency towards the use of SNSs from their personality characteristics and levels of self-esteem. University students (N = 201), aged 17 to 24 years, reported their use of SNSs and addictive tendencies for SNSs use, and completed the NEO Five-Factor Personality Inventory 1 and the Coopersmith Self-Esteem Inventory.2 Multiple regression analyses revealed that, as a group, the personality and self-esteem factors significantly predicted both level of SNS use and addictive tendency but did not explain a large amount of variance in either outcome measure. The findings indicated that extraverted and unconscientious individuals reported higher levels of both SNS use and addictive tendencies. Future research should attempt to identify which other psychosocial characteristics explain young people’s level of use and propensity for addictive tendencies for these popular Internet sites.
Resumo:
Intimate partner abuse and control is one of the most common forms of violence against women, and is considered an international problem of social, political, legal and human rights significance. Yet few studies have attempted to understand this problem from the perspective of male perpetrators. This gap is addressed by conducting in-depth interviews with 16 able-bodied men of white European ancestry born and educated in New Zealand or Australia, who have been physically violent and/or emotionally, intellectually, sexually or financially controlling of a live-in female partner. This thesis extends and deepens the dominant ways of thinking about men’s intimate partner abuse by utilising a new theoretical framework compatible with contemporary feminist scholarship. A synthesis of Connell’s theory of masculinities and Bourdieu’s field theory is utilised for the purpose of exploring more nuanced, complex understandings of manliness and men’s relationships with men, women and social structures. Through such an analysis, this thesis finds that men’s perpetration of power and control over women is driven by a need to avoid the stigma of appearing weak. As a consequence, their desire and ability to show love, care and empathy is suppressed in favour of a presumed honourable manliness, and their female partners are used as weapons in the pursuit of symbolic capital in the form of recognition, prestige and acceptance from real and/or imagined men. This research also uncovers the complex interplay between masculine practices and particular social contexts. For example, the norms of practice encountered from those in authority, such as teachers, sports coaches, police, court judges and workplace management, influences the decision making of the men in this study, to use, or not to use, physical violence, psychological abuse and structural control. The principal conclusion is that there is a repertoire of paradoxical masculinities and contradictory social messages available to the men in this study. But gender policing by other men, complicit women and those in authority provides little room for legitimate complexity in masculine practices. Perpetrators in this study reconcile these conflicts of interest by generally avoiding subordinated masculinity and possible ostracism, and instead practicing more heroic hegemonic masculinities by abusing and controlling women and particular other men. This thesis concludes that for intimate partner abuse and control to cease, changes in power structures have to occur at all levels of society.
Resumo:
Queensland University of Technology (QUT) is a large multidisciplinary university located in Brisbane, Queensland, Australia. QUT is increasing its research focus and is developing its research support services. It has adopted a model of collaboration between the Library, High Performance Computing and Research Support (HPC) and more broadly with Information Technology Services (ITS). Research support services provided by the Library include the provision of information resources and discovery services, bibliographic management software, assistance with publishing (publishing strategies, identifying high impact journals, dealing with publishers and the peer review process), citation analysis and calculating authors’ H Index. Research data management services are being developed by the Library and HPC working in collaboration. The HPC group within ITS supports research computing infrastructure, research development and engagement activities, researcher consultation, high speed computation and data storage systems , 2D/ 3D (immersive) visualisation tools, parallelisation and optimization of research codes, statistics/ data modeling training and support (both qualitative and quantitative) and support for the university’s central Access Grid collaboration facility. Development and engagement activities include participation in research grants and papers, student supervision and internships and the sponsorship, incubation and adoption of new computing technologies for research. ITS also provides other services that support research including ICT training, research infrastructure (networking, data storage, federated access and authorization, virtualization) and corporate systems for research administration. Seminars and workshops are offered to increase awareness and uptake of new and existing services. A series of online surveys on eResearch practices and skills and a number of focus groups was conducted to better inform the development of research support services. Progress towards the provision of research support is described within the context organizational frameworks; resourcing; infrastructure; integration; collaboration; change management; engagement; awareness and skills; new services; and leadership. Challenges to be addressed include the need to redeploy existing operational resources toward new research support services, supporting a rapidly growing research profile across the university, the growing need for the use and support of IT in research programs, finding capacity to address the diverse research support needs across the disciplines, operationalising new research support services following their implementation in project mode, embedding new specialist staff roles, cross-skilling Liaison Librarians, and ensuring continued collaboration between stakeholders.
Resumo:
As network capacity has increased over the past decade, individuals and organisations have found it increasingly appealing to make use of remote services in the form of service-oriented architectures and cloud computing services. Data processed by remote services, however, is no longer under the direct control of the individual or organisation that provided the data, leaving data owners at risk of data theft or misuse. This paper describes a model by which data owners can control the distribution and use of their data throughout a dynamic coalition of service providers using digital rights management technology. Our model allows a data owner to establish the trustworthiness of every member of a coalition employed to process data, and to communicate a machine-enforceable usage policy to every such member.