538 resultados para group identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

People increasingly communicate over multiple channels, such as SMS, email and IM. Choosing the channel for interaction is typically a considered action and shapes the message itself. In order to explore how people make sense of communication mediums and more generally, social group behaviour, we developed a multichannel communication prototype. Preliminary results indicate that multichannel communication was considered very useful in the group context even considering the increased quantity of messages while it was little used for person-to-person interaction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper outlines results from the long-term deployment of a system for mobile group socialization which utilizes a variety of mundane technologies to support cross-media notifications and messaging. We focus here on the results as they pertain to usage of mundane technologies, particularly the use of such technologies within the context of a cross-media system. We introduce “Rhub”, our prototype, which was designed to support coordination, communication and sharing amongst informal social groups. We also describe and discuss the usage of the “console,” a text-based syntax to enable consistent use across text messaging, instant messaging, email and the web. The prototype has been in active use for over 18 months by over 170 participants, who have used it on an everyday basis for their own socializing requirements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We treat the security of group key exchange (GKE) in the universal composability (UC) framework. Analyzing GKE protocols in the UC framework naturally addresses attacks by malicious insiders. We define an ideal functionality for GKE that captures contributiveness in addition to other desired security goals. We show that an efficient two-round protocol securely realizes the proposed functionality in the random oracle model. As a result, we obtain the most efficient UC-secure contributory GKE protocol known.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper summarizes the papers presented in the thematic stream Models for the Analysis of Individual and Group Needs, at the 2007 IAEVG-SVP-NCDA Symposium: Vocational Psychology and Career Guidance Practice: An International Partnership. The predominant theme which emerged from the papers was that theory and practice need to be positioned within their contexts. For this paper, context has been formulated as a dimension ranging from the individual’s experience of himself or herself in conversations, including interpersonal transactions and body culture, through to broad higher levels of education, work, nation, and economy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This essay explores the political significance of Balinese death/thrash fandom. In the early 1990s, the emergence of a death/thrash scene in Bali paralleled growing criticism of accelerated tourism development on the island. Specifically, locals protested the increasing ubiquity of Jakarta, 'the centre', cast as threatening to an authentically 'low', peripheral Balinese culture. Similarly, death/thrash enthusiasts also gravitated toward certain fringes, although they rejected dominant notions of Balinese-ness by gesturing elsewhere, toward a global scene. The essay explores the ways in which death/thrash enthusiasts engaged with local discourses by coveting their marginality, and aims to demonstrate how their articulations of 'alien-ness' contributed in important ways to a broader regionalism.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Heteronormative discourses provide the most common lens through which sexuality is understood within university curricula. This means that sexuality is discussed in terms of categories of identity, with heterosexuality accorded primacy while all 'others' are indeed 'othered'. This article draws on research carried out by the authors in a core first year university ethics class, in which a fictional text was introduced with the intention of unpacking these discourses. An ethnographic study was undertaken where both students and teachers engaged in discussions over, and personal written reflections on, the textual content. In reporting the results of that study this article uses a post-structural framework to identify how classroom and textual discourses might be used to break down socially constructed categories of sexuality and students' conceptualisations of non-heterosexual behaviour. It was found that engaging in discussion in the context of the fictional text allowed some students to begin to recognise their own heteronormative views and engage in an informed critique of them.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this review, the authors interrogate the recent identity turn in literacy studies by asking the following: How do particular views of identity shape how researchers think about literacy and, conversely, how does the view of literacy taken by a researcher shape meanings made about identity? To address this question, the authors review various ways of conceptualizing identity by using five metaphors for identity documented in the identity literature: identity as (1) difference, (2) sense of self/subjectivity, (3) mind or consciousness, (4) narrative, and (5) position. Few literacy studies have acknowledged this range of perspectives on and views for conceptualizing identity and yet, subtle differences in identity theories have widely different implications for how one thinks about both how literacy matters to identity and how identity matters to literacy. The authors offer this review to encourage more theorizing of both literacy and identity as social practices and, most important, of how the two breathe life into each other.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper offers an analysis of cultural politics that emerged around naming practices in an ethnographic study of the interactions within an online MBA unit, offered by an Australian university to both ‘local’ Australian students and international students enrolled through a Malaysian partner institution. It became evident that names were doing important identity, textual and pedagogical work in these interactions and considerable interactive trouble arose over the social practices surrounding names. The analysis uses sociolinguistic concepts to analyse selected slices of the online texts and participants' interview accounts. The analysis shows how ethnocentric default settings in the courseware served to heighten and exacerbate cultural difference as a pedagogical problem. These events are related to the larger problematic of theorising the context of culture in times of globalisation and increasingly entangled educational routes, with implications for the enterprise of online internationalised education.