146 resultados para Hymn writers
Resumo:
This chapter provides an overview of how school communities can work together in processes or review and development to strive towards a more inclusive approach to education. The writers of this chapter have been using a resource called the Index for Inclusion (Booth & Ainscow, 2005, 2011) for a number of years in Australia and in a pilot trail in New Zealand to support education staff in processes of review, with the aim to increase the participation and learning of all students. The resource supports the development of collaborative community processes and defines inclusion as ‘putting values into action’ (Booth & Ainscow, 2011, p.18). The process of review and development for more inclusive and socially just schools supports the development of a school culture, policy and practice where people are valued and treated with respect for their varied knowledge and experiences. In our experience, this resource has been useful to challenge our thinking about education in school communities and in region/districts about inclusive school development. We suggest the Index framework is broad enough to be used in a range of settings and countries. The resource is also useful for pre-service and in-service teacher development to provoke reflection and discussion about inclusion. This chapter provides an overview of the dimensions and framework that inform the Index of Inclusion. We discuss how the Index can be used in school contexts and draw on our own experience to give real examples of how teachers, paraprofessionals, students, principals and parents have experienced the Index when used in their local school communities in Australia and New Zealand. The chapter concludes with some points for discussion to challenge the status quo in schools and to inspire teachers to work towards a more socially just society through making changes at a school level.
Resumo:
The legend of Hunter S. Thompson*the great gonzo*has grown deeper and more layered since his death in February 2005 than it was even in his exotic and controversyfilled life. The most recent addition to the mythology*The Rum Diary(Bruce Robinson, 2011)*stars Johnny Depp, possibly Thompson’s greatest fan, and certainly a man dedicated to keeping the man’s memory alive. Not for the first time, Depp brings his A-list status and good looks to playing the Thompson character on the big screen. In Terry Gilliam’s adaptation of Fear and Loathing in Las Vegas (1998) he played the writer’s alter ego, Raoul Duke. Duke was Thompson, and Fear and Loathing in Las Vegas a fictionalized account of what is generally accepted to have been a real-life episode. In The Rum Diary he plays Paul Kemp, the young journalist who lands a job as a crime reporter on a struggling Puerto Rican newspaper. Again, the protagonist is a version of Thompson himself, who did indeed spend time in 1960 working for the Puerto Rican press. Both films join Gonzo (Alex Gibney, 2008) to form a trilogy of Depp-infused movies about a journalist some regard as one of the greatest of the twentieth century, and others view as an overrated charlatan who leveraged his one big idea into a four decades-long career brought low by drugs, booze, dysfunctional sex and, finally, Hemingwayesque despair...
Resumo:
Children’s Literature Digital Resources incorporates primary texts published from white settlement to 1945, including children’s and young adult fiction, poetry, short stories, and picture books. This collection is supported by selected secondary material. The objective is to provide a centralised access point for information about Australian children's literature and writers and a growing body of full-text primary resources. Four key aims are: * To establish an important digital facility for research, teaching, and information provision around Australian children’s literature; * To provide access to a wide range of high-quality full-text data, both primary and secondary resources; * To provide access to essential library and research information infrastructure and facilities for established and emerging researchers in the fields of Humanities and Education; To enable research while preserving important heritage material. The collection contains texts digitised for AustLit through cooperation with various Australian libraries. The collection includes children’s and young adult fiction, poetry, picture books, short stories, and critical articles relating to relevant primary texts. Authors of primary sources include Irene Cheyne, E. W. Cole, Richard Rowe, Lillian M. Pyke, and Dorothy Wall. Secondary sources include critical works by Clare Bradford, Heather Scutter, Kerry White, Sharyn Pearce, and Marcie Muir. These full-text materials are keyword searchable (both within individual texts and across the CLDR corpus) and can be downloaded for research purposes. As well as digitising primary and secondary material, the project locates and provides pathways to existing online resources or internet publications to enhance AustLit's Children's Literature subset. These resources include both primary and secondary texts.
Resumo:
This article explores the role a writing group played in influencing the scholarly identities of a group of doctoral students by fostering their writing expertise. While the interest in writing groups usually centres on their potential to support doctoral students to publish, few studies have been conducted and written by the students themselves. Using a situated learning perspective on identity, we explore the connection that emerged between our perceptions of ourselves as developing expertise as scholarly writers and the function of the writing group as a dynamic space for transforming our identities. Findings show that our writing group served as a flexible and interactive Community of Practice (CoP) that shaped critical and durable shifts in identity amongst members.
Resumo:
Internationally there has been a move towards standards-referenced assessment with countries such as Australia developing a National Curriculum and Achievement Standards, New Zealand adopting National Standards for literacy and numeracy that involve schools making and reporting judgements about the reading, writing and mathematics achievement of children up to Year 8 (the end of primary school) and in Canada, classroom assessment standards aimed at the improvement of assessment practice of K-12 education are being formulated. Standards-driven reform has major implications for teachers’ work. The consequences of adopting a standards-driven approach to educational change by systems are often under-estimated with the unintended effects not fully understood by either the policy writers, and the public, including parents. It is for these reasons that the contention developed in this article relates to the teacher’s role, which it is argued remains central to policy focused on the improvement of the quality of education and educational standards.
Resumo:
There is evidence that creative writing forms an important part of the recovery experience of people affected by severe mental illness. In this paper, we consider theoretical models that explain how creative writing might contribute to recovery, and we discuss the potential for creative writing in psychosocial rehabilitation. We argue that the rehabilitation benefits of creative writing might be optimized through focus on process and technique in writing, rather than content, and that consequently, the involvement of professional writers might be important. We describe a pilot workshop that deployed these principles and was well-received by participants. Finally, we make recommendations regarding the role of creative writing in psychosocial rehabilitation for people recovering from severe mental illness and suggest that the development of an evidence base regarding the effectiveness of creative writing is a priority.
Resumo:
Creative writing has become a highly professionalised academic discipline, with popular courses and prestigious degree programmes worldwide. This book is a must for all students and teachers of creative writing, indeed for anyone who aspires to be a published writer. It engages with a complex art in an accessible manner, addressing concepts important to the rapidly growing field of creative writing, while maintaining a strong craft emphasis, analysing exemplary models of writing and providing related writing exercises. Written by professional writers and teachers of writing, the chapters deal with specific genres or forms – ranging from the novel to new media – or with significant topics that explore the cutting edge state of creative writing internationally (including creative writing and science, contemporary publishing and new workshop approaches).
Resumo:
This case-study exemplifies a ‘writing movement’, which is currently occurring in various parts of Australia through the support of social media. A concept emerging from the café scene in San Francisco, ‘Shut Up and Write!’ is a meetup group that brings writers together at a specific time and place to write side by side, thus making writing practice, social. This concept has been applied to the academic environment and our case-study explores the positive outcomes in two locations: RMIT University and QUT. We believe that this informal learning practice can be implemented to assist research students in developing academic skills. DESCRIPTION: Please describe your practice as a case study, including its context; challenge addressed; its aims; what it is; and how it supports creative practice PhD students or supervisors. Additional information may include: the outcomes; key factors or principles that contribute to its effectiveness; anticipated impact/evidence of impact. Research students spend the majority of their time outside of formal learning environments. Doctoral candidates enter their degree with a range of experience, knowledge and needs, making it difficult to provide writing assistance in a structured manner. Using a less structured approach to provide writing assistance has been trialled with promising results (Boud, Cohen, & Sampson, 2001; Stracke, 2010; Devenish et al, 2009). Although, semi structured approaches have been developed and examined, informal learning opportunities have received minimal attention. The primary difference of Shut Up and Write! to other writing practices, is that individuals do not engage in any structured activity and they do not share the outcomes of the writing. The purpose of Shut Up and Write! is to transform writing practice from a solitary experience, to a social one. Shut Up and Write! typically takes place outside of formal learning environments, in public spaces such as a café. The structure of Shut Up and Write! sessions is simple: participants meet at a specific time and place, chat for a few minutes, then they Shut Up and Write for a predetermined amount of time. Critical to the success of the sessions, is that there is no critiquing of the writing, and there is no competition or formal exercises. Our case-study examines the experience of two meetup groups at RMIT University and QUT through narrative accounts from participants. These accounts reveal that participants have learned: • Writing/productivity techniques; • Social/cloud software; • Aspects of the PhD; and • ‘Mundane’ dimensions of academic practice. In addition to this, activities such as Shut Up and Write! promote peer to peer bonding, knowledge exchange, and informal learning within the higher degree research experience. This case-study extends the initial work presented by the authors in collaboration with Dr. Inger Mewburn at QPR2012 – Quality in Postgraduate Research Conference, 2012.
Resumo:
Providing help for research degree writing within a formal structure is difficult because research students come into their degree with widely varying needs and levels of experience. Providing writing assistance within a less structured learning context is an approach which has been trialled in higher education with promising results (Boud, Cohen & Sampson, 2001; Stracke, 2010; Devendish et al., 2009). While semi structured approaches have been the subject of study, little attention has been paid to the processes of informal learning which exist within doctoral education. In this paper we explore a 'writing movement' which has started to be taken up at various locations in Australia through the auspices of social media (Twitter and Facebook). 'Shut up and Write' is a concept first used in the cafe scene in San Francisco, where writers converge at a specific time and place and write together, without showing each other the outcomes, temporarily transforming writing from a solitary practice to a social one. In this paper we compare the experience of facilitating shut up and write sessions in two locations: RMIT University and Queensland University of Technology. The authors describe the set up and functioning of the different groups and report on feedback from regular participants, both physical and virtual. We suggest that informal learning practices can be exploited to assist research students to orientate themselves to the university environment and share vital technical skills, with very minimal input from academic staff. This experience suggests there is untapped potential within these kinds of activities to promote learning within the research degree experience which is sustainable and builds a stronger sense of community.
Resumo:
This chapter discusses a ‘writing movement’, which is currently occurring in various parts of Australia through the support of social media. A concept emerging from the café scene in San Francisco, ‘Shut Up and Write!’ is a meetup group that brings writers together at a specific time and place to write side by side, thus making writing practice, social. This concept has been applied to the academic environment and our case-study explores the positive outcomes in two locations: RMIT University and Queensland University of Technology. This informal learning practice can be implemented to assist research students in developing academic skills.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.
Resumo:
Smartphones started being targets for malware in June 2004 while malware count increased steadily until the introduction of a mandatory application signing mechanism for Symbian OS in 2006. From this point on, only few news could be read on this topic. Even despite of new emerging smartphone platforms, e.g. android and iPhone, malware writers seemed to lose interest in writing malware for smartphones giving users an unappropriate feeling of safety. In this paper, we revisit smartphone malware evolution for completing the appearance list until end of 2008. For contributing to smartphone malware research, we continue this list by adding descriptions on possible techniques for creating the first malware(s) for Android platform. Our approach involves usage of undocumented Android functions enabling us to execute native Linux application even on retail Android devices. This can be exploited to create malicious Linux applications and daemons using various methods to attack a device. In this manner, we also show that it is possible to bypass the Android permission system by using native Linux applications.
Resumo:
Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.
Resumo:
This symposium focuses on an innovative Patches program that addresses imperatives with respect to the development of intercultural competence. The term, Patches, in this project refers to writing tasks and intercultural activities wherein each task becomes a ‘patch’ that eventually creates a quilt of learning as experienced by 58 second year BEd students from Malaysia and 14 fourth year domestic (Australian) BEd students. We take intercultural competence to mean students “ability to communicate effectively and appropriately in intercultural situations based on [their] intercultural knowledge, skills and attitudes” (Deardorff, 2006). The papers in this symposium provide detailed information about the design of the program, its impact on students’ perceptions of themselves as students, writers, and emerging professionals, and students’ development of intercultural competence.
Resumo:
"Rogue Flows brings together some of the best and most knowledgeable writers on consumption and cultural theory to chart the under-explored field of cultural flows and consumption across different regions in Asia, and the importance of these flows in creating contemporary Asian national identities. It offers innovative possibilities for envisioning how the transfer of popular and consumer culture (such as TV, music, film, advertising and commodities) across Asian countries has produced a new form of cross-cultural fertilisation within Asian societies, which does not merely copy Western counterparts." "Rogue Flows is unique in its investigation of how "Asianness" is being exploited by Asian transnational cultural industries and how it is involved in the new power relations of the region. It is an important contribution to the literature of Asian cultural studies."--BOOK JACKET.