114 resultados para Peronist Feminine Party


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Statutory licensing schemes are proliferating as a means of regulating commercial activity, resource exploitation and activities harmful to the environment. Statutes often declare that entitlements are non-transferable or are transferable only with approval or subject to conditions. Some entitlements, such as resource consents issued under the Resource Management Act 1991 (NZ), are declared not to be property. Despite these statutory declarations, entitlements are often held to be transferable in equity or to be property for the purposes of resolving private disputes. Recently, in Greenshell New Zealand Ltd v Tikapa Moana Enterprises Ltd, the High Court of New Zealand indicated that a resource consent was property that could support a claim for relief against forfeiture, continuing the trend in earlier cases that appear to depart from the statute. In this article we examine the juridical treatment of entitlements in private law. We identify factors influencing the courts’ enforcement of private arrangements which may circumvent the statutory intent. Our analysis will guide legislators in the design of provisions to implement new schemes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In a range test, one party holds a ciphertext and needs to test whether the message encrypted in the ciphertext is within a certain interval range. In this paper, a range test protocol is proposed, where the party holding the ciphertext asks another party holding the private key of the encryption algorithm to help him. These two parties run the protocol to implement the test. The test returns TRUE if and only if the encrypted message is within the certain interval range. If the two parties do not conspire, no information about the encrypted message is revealed from the test except what can be deduced from the test result. Advantages of the new protocol over the existing related techniques are that it achieves correctness, soundness, °exibility, high e±ciency and privacy simultaneously.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient than the recent protocol of Abdalla and Pointcheval (FC 2005), proven in the random oracle model. We also observe some limitations in the model due to Abdalla, Fouque and Pointcheval (PKC 2005) for proving security of such protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Abstract - Mobile devices in the near future will need to collaborate to fulfill their function. Collaboration will be done by communication. We use a real world example of robotic soccer to come up with the necessary structures required for robotic communication. A review of related work is done and it is found no examples come close to providing a RANET. The robotic ad hoc network (RANET) we suggest uses existing structures pulled from the areas of wireless networks, peer to peer and software life-cycle management. Gaps are found in the existing structures so we describe how to extend some structures to satisfy the design. The RANET design supports robot cooperation by exchanging messages, discovering needed skills that other robots on the network may possess and the transfer of these skills. The network is built on top of a Bluetooth wireless network and uses JXTA to communicate and transfer skills. OSGi bundles form the skills that can be transferred. To test the nal design a reference implementation is done. Deficiencies in some third party software is found, specifically JXTA and JamVM and GNU Classpath. Lastly we look at how to fix the deciencies by porting the JXTA C implementation to the target robotic platform and potentially eliminating the TCP/IP layer, using UDP instead of TCP or using an adaptive TCP/IP stack. We also propose a future areas of investigation; how to seed the configuration for the Personal area network (PAN) Bluetooth protocol extension so a Bluetooth TCP/IP link is more quickly formed and using the STP to allow multi-hop messaging and transfer of skills.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation by publication which focuses on gender and the Australian federal parliament has resulted in the submission of three refereed journal articles. Data for the study were obtained from 30 semi-structured interviews undertaken in 2006 with fifteen (15) male and fifteen (15) female members of the Australian parliament. The first of the articles is methodological and has been accepted for publication in the Australian Journal of Political Science. The paper argues that feminist political science is guided by five important principles. These are placing gender at the centre of the research, giving emphasis to women’s voice, challenging the public/private divide, using research to transform society and taking a reflexive approach to positionality. It is the latter principle, that of the importance of taking a reflexive approach to research which I explore in the paper. Through drawing on my own experiences as a member of the House of Representatives (Forde 1987-1996) I reflexively investigate the intersections between my background and my identity as a researcher. The second of the articles views the data through the lens of Acker’s (1990) notion of the ‘gendered organization’ which posits that there are four dimensions by which organizations are gendered. These are via the division of labour, through symbols, images and ideologies, by workplace interactions and through the gendered components of individual identity. In this paper which has been submitted to the British Journal of Political Science, each of Acker’s (1990) dimensions is examined in terms of the data from interviews with male and female politicians. The central question investigated is thus to what extent does the Australian parliament conform to Acker’s (1990) concept of the ‘gendered organization’? The third of the papers focuses specifically on data from interviews with the 15 male politicians and investigates how they view gender equality and the Australian parliament. The article, which has been submitted to the European Journal of Political Science asks to what extent contemporary male politicians view the Australian parliament as gendered? Discourse analysis that is ‘ways of viewing’ (Bacchi, 1999, p. 40) is used as an approach to analyse the data. Three discursive frameworks by which male politicians view gender in the Australian parliament are identified. These are: that the parliament is gendered as masculine but this is unavoidable; that the parliament is gendered as feminine and women are actually advantaged; and that the parliament is gender neutral and gender is irrelevant. It is argued that collectively these framing devices operate to mask the many constraints which exist to marginalise women from political participation and undermine attempts to address women’s political disadvantage as political participants. The article concludes by highlighting the significance of the paper beyond the Australian context and calling for further research which names and critiques political men and their discourses on gender and parliamentary practices and processes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

For Bakhtin, it is always important to know from where one speaks. The place from which I speak is that of a person who grew up in Italy during the economic miracle (pre-1968) in a working class family, watching film matinees on television during school holidays. All sort of films and genres were shown: from film noir to westerns, to Jean Renoir's films, German expressionism, Italian neorealism and Italian comedy. Cinema has come to represent over time a sort of memory extension that supplements lived memory of events, and one which, especially, mediates the intersection of many cultural discourses. When later in life I moved to Australia and started teaching in film studies, my choice of a film that was emblematic of neorealism went naturally to Roma città aperta (Open city hereafter) by Roberto Rossellini (1945), and not to Paisan or Sciuscà or Bicycle Thieves. My choice was certainly grounded in my personal memory - especially those aspects transmitted to me by my parents, who lived through the war and maintained that Open City had truly made them cry. With a mother who voted for the Christian Democratic Party and a father who was a unionist, I thought that this was normal in Italian families and society. In the early 1960s, the Resistance still offered a narrative of suffering and redemption, shared by Catholics or Communists. This construction of psychological realism is what I believe Open City continues to offer in time.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: To examine the impact on dental utilisation following the introduction of a participating provider scheme (Regional and Rural Oral Health Program {RROHP)). In this model dentists receive higher third party payments from a private health insurance fund for delivering an agreed range of preventive and diagnostic benefits at no out-ofpocket cost to insured patients. Data source/Study setting: Hospitals Contribution Fund of Australia (HCF) dental claims for all members resident in New South Wales over the six financial years from l99811999 to 200312004. Study design: This cohort study involves before and after analyses of dental claims experience over a six year period for approximately 81,000 individuals in the intervention group (HCF members resident in regional and rural New South Wales, Australia) and 267,000 in the control group (HCF members resident in the Sydney area). Only claims for individuals who were members of HCF at 31 December 1997 were included. The analysis groups claims into the three years prior to the establishment of the RROHP and the three years subsequent to implementation. Data collection/Extraction methods: The analysis is based on all claims submitted by users of services for visits between 1 July 1988 and 30 June 2004. In these data approximately 1,000,000 services were provided to the intervention group and approximately 4,900,000 in the control group. Principal findings: Using Statistical Process Control (SPC) charts, special cause variation was identified in total utilisation rate of private dental services in the intervention group post implementation. No such variation was present in the control group. On average in the three years after implementation of the program the utilisation rate of dental services by regional and rural residents of New South Wales who where members of HCF grew by 12.6%, over eight times the growth rate of 1.5% observed in the control group (HCF members who were Sydney residents). The differences were even more pronounced in the areas of service that were the focus of the program: diagnostic and preventive services. Conclusion: The implementation of a benefit design change, a participating provider scheme, that involved the removal of CO-payments on a defined range of preventive and diagnostic dental services combined with the establishment and promotion of a network of dentists, appears to have had a marked impact on HCF members' utilisation of dental services in regional and rural New South Wales, Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Various reasons have been proffered for female under-representation in tertiary information technology (IT) courses and the IT industry with most relating to cultural moirés. The 2006 Geek Goddess calendar was designed to alter IT’s “geeky image” and the term is used here to represent young women enrolled in pre-service IT teaching courses. Their special mix of IT and teaching draws on conflicting stereotypes and represents a micro-climate which is typically lost in studies of IT occupations because of the aggregation of all IT roles. This paper will report on a small-scale investigation of female students (N=25) at a university in Queensland (Australia) studying to become teachers of secondary IT subjects. They are entering the IT industry, gendered as a “male” occupation, through the safe space of teaching a discipline allied to feminine qualities of nurturing. They are “geek goddesses” who – perhaps to balance the masculine and feminine of these occupations - have decided to go to school rather than into corporations or government.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

“SOH see significant benefit in digitising its drawings and operation and maintenance manuals. Since SOH do not currently have digital models of the Opera House structure or other components, there is an opportunity for this national case study to promote the application of Digital Facility Modelling using standardized Building Information Models (BIM)”. The digital modelling element of this project examined the potential of building information models for Facility Management focusing on the following areas: • The re-usability of building information for FM purposes • BIM as an Integrated information model for facility management • Extendibility of the BIM to cope with business specific requirements • Commercial facility management software using standardised building information models • The ability to add (organisation specific) intelligence to the model • A roadmap for SOH to adopt BIM for FM The project has established that BIM – building information modelling - is an appropriate and potentially beneficial technology for the storage of integrated building, maintenance and management data for SOH. Based on the attributes of a BIM, several advantages can be envisioned: consistency in the data, intelligence in the model, multiple representations, source of information for intelligent programs and intelligent queries. The IFC – open building exchange standard – specification provides comprehensive support for asset and facility management functions, and offers new management, collaboration and procurement relationships based on sharing of intelligent building data. The major advantages of using an open standard are: information can be read and manipulated by any compliant software, reduced user “lock in” to proprietary solutions, third party software can be the “best of breed” to suit the process and scope at hand, standardised BIM solutions consider the wider implications of information exchange outside the scope of any particular vendor, information can be archived as ASCII files for archival purposes, and data quality can be enhanced as the now single source of users’ information has improved accuracy, correctness, currency, completeness and relevance. SOH current building standards have been successfully drafted for a BIM environment and are confidently expected to be fully developed when BIM is adopted operationally by SOH. There have been remarkably few technical difficulties in converting the House’s existing conventions and standards to the new model based environment. This demonstrates that the IFC model represents world practice for building data representation and management (see Sydney Opera House – FM Exemplar Project Report Number 2005-001-C-3, Open Specification for BIM: Sydney Opera House Case Study). Availability of FM applications based on BIM is in its infancy but focussed systems are already in operation internationally and show excellent prospects for implementation systems at SOH. In addition to the generic benefits of standardised BIM described above, the following FM specific advantages can be expected from this new integrated facilities management environment: faster and more effective processes, controlled whole life costs and environmental data, better customer service, common operational picture for current and strategic planning, visual decision-making and a total ownership cost model. Tests with partial BIM data – provided by several of SOH’s current consultants – show that the creation of a SOH complete model is realistic, but subject to resolution of compliance and detailed functional support by participating software applications. The showcase has demonstrated successfully that IFC based exchange is possible with several common BIM based applications through the creation of a new partial model of the building. Data exchanged has been geometrically accurate (the SOH building structure represents some of the most complex building elements) and supports rich information describing the types of objects, with their properties and relationships.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contrary to what might be expected, we show that the natural combination of an ID-based AKE protocol with a public key based AKE protocol cannot provide strong security. We provide the first one-round CL-AKE scheme proven secure in the random oracle model. We introduce two variants of the Diffie-Hellman trapdoor the introduced by \cite{DBLP:conf/eurocrypt/CashKS08}. The proposed key agreement scheme is secure as long as each party has at least one uncompromised secret. Thus, our scheme is secure even if the key generation centre learns the ephemeral secrets of both parties.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent times, complaining about the Y Generation and its perceived lack of work ethic has become standard dinner-party conversation amongst Baby Boomers. Discussions in the popular press (Salt, 2008) and amongst some social commentators (Levy, Carroll, Francoeur, & Logue, 2003) indicate that the group labelled Gen Y have distinct and different generational characteristics. Whether or not the differences are clearly delineated on age is still open to discussion but in the introduction to "The Generational Mirage? a pilot study into the perceptions of leadership by Generation X and Y", Levy et al. argue that "the calibre of leadership in competing organisations and the way they value new and existing employees will play a substantial role in attracting or discouraging these workers regardless of generational labels". Kunreuther's (2002) suggests that the difference between younger workers and their older counterparts may have more to do with situational phenomena and their position in the life cycle than deeper generational difference. However this is still an issue for leadership in schools.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research examines how men react to male models in print advertisements. In two experiments, we show that the gender identity of men influences their responses to advertisements featuring a masculine, feminine, or androgynous male model. In addition, we explore the extent to which men feel they will be classified by others as similar to the model as a mechanism for these effects. Specifically, masculine men respond most favorably to masculine models and are negative toward feminine models. In contrast, feminine men prefer feminine models when their private self is salient. Yet in a collective context, they prefer masculine models.These experiments shed light on how gender identity and self-construal influence male evaluations and illustrate the social pressure on men to endorse traditional masculine portrayals. We also present implications for advertising practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Communities of practice (CoPs) may be defined as groups of people who are mutually bound by what they do together (Wenger, 1998, p. 2), that is, they “form to share what they know, to learn from one another regarding some aspects of their work and to provide a social context for that work” (Nickols, 2000, para. 1). They are “emergent” in that the shape and membership emerges in the process of activity (Lees, 2005, p. 7). People in CoPs share their knowledge and experiences freely with the purpose of finding inventive ways to approach new problems (Wenger & Snyder, 2000, p. 2). They can be seen as “shared histories of learning” (Wenger, 1998, p. 86). For some time, QUT staff have been involved in a number of initiatives aimed at sharing ideas and resources for teaching first year students such as the Coordinators of Large First Year Units Working Party. To harness these initiatives and maximise their influence, the leaders of the Transitions In Project (TIP)1 decided to form a CoP around the design, assessment and management of large first year units.