213 resultados para Clock and watch making
Resumo:
The use of public space by children and young people is a contentious issue in a number of developed and developing countries and a range of measures are frequently deployed to control the public space which usually deny the rights of children and young people to claim the space for their use. Child and youth curfews, oppressive camera surveillance and the unwarranted attentions of police and private security personnel as control measures in public space undermine attempts to secure greater participation by children and young people in constructing positive strategies to address concerns that impact on them and others in a local area. Evidence from research in Scotland undertaken by Article 12 (2000) suggests that young people felt strongly that they did not count in local community matters and decision making and the imposition on them of a curfew by the adult world of the local area created resentment both at the harshness of the measure and disappointment at an opportunity lost to be consulted and involved in dealing with perceived problems of the locality. This is an important cluster of linked issues as Brown (1998:116) argues that young people are ‘selectively constructed as “problem” and “other” with their concerns marginalised, their lifestyles problematised and their voices subdued’, and this flows into their use of public space as their claims to its use as an aspect of social citizenship are usually cast as inferior or rejected as they ‘stand outside the formal polity’ as ‘non persons’. This has major implications for the ways in which young people view their position in a community as many report a feeling of not being wanted, valued or tolerated. The ‘youth question’ according to Davis (1990) acts as a form of ‘screen’ on which observers and analysts project hopes and fears about the state of society, while in the view of Loader (1996:89) the ‘question of young people’ sits within a discourse comprising two elements, the one being youth, particularly young males, as the ‘harbinger of often unwelcome social change and threat’ and the other element ‘constructs young people as vulnerable’. This discourse of threat is further exemplified in the separation of children from teenagers as Valentine (1996) suggests, the treatment of younger children using public space is often dramatically different to that of older children and the most feared stage of all, 'youth'
Resumo:
As an artist my primary interest is in the abstract, that is in images of the imageless. I am curious about the emergence of pictorial significance and content from this unknowable space. To speak of the significance of an imageless image is also to speak of its affect. I aim to explore this both theoretically and practically. Theoretically I will explore affect through the late work of Lyotard and his notion of the affect-phrase. This is an under-examined aspect of Lyotard and demarcates a valuable way to look at the origins, impact and ramifications of affect for art. Practically I will apply these understandings to the development of my own creative work which includes both painting and digital work. My studio practice moves towards exploring the unfamiliar through the powerful and restless silence of affect.In this intense space each work or body of work 'leaks' into the next occasioning a sense of borderlessness, or of uncertainty. This interpenetration and co-mingling of conceptual and material terrains combines to present temporal and spatial slippages evident within the works themselves and their making, but it is also evident in bodies of work across the chronology of their making. Through a mapping of my own painting and digital arts practice and the utilisation of Lyotard’s notion of the affect -phrase I aim to describe the action of this ‘charged emptiness’ on creativity and explore and explain its significance on that we call image and its animation of what we call critical discourse.
Resumo:
Stories by children’s writer Dr. Seuss have often been utilised as non-traditional narrative reflections regarding the issues of ethics and morality (Greenwood, 2000). Such case studies are viewed as effective teaching and learning tools due to the associated analytical and decision-making frameworks that are represented within the texts, and focus upon the exploration of universally general virtues and approaches to ethics (Hankes, 2012). Whilst Dr. Seuss did not create a story directly related to the sport, exercise or performance domains, many of his narratives possess psychological implications that are applicable in any situation that requires ethical consideration of the thinking and choices people make. The following exploration of the ‘ethical places you’ll go’ draws upon references to his work as a guide to navigating this interesting and sometimes challenging landscape for sport, exercise, and performance psychologists (SEPP).
Resumo:
Many commentators have treated the internet as a site of democratic freedom and as a new kind of public sphere. While there are good reasons for optimism, like any social space digital space also has its dark side. Citizens and governments alike have expressed anxiety about cybercrime and cyber-security. In August 2011, the Australian government introduced legislation to give effect to Australia becoming a signatory to the European Convention on Cybercrime (2001). At the time of writing, that legislation is still before the Parliament. In this article, attention is given to how the legal and policy-making process enabling Australia to be compliant with the European Convention on Cybercrime came about. Among the motivations that informed both the development of the Convention in Europe and then the Australian exercise of legislating for compliance with it was a range of legitimate concerns about the impact that cybercrime can have on individuals and communities. This article makes the case that equal attention also needs to be given to ensuring that legislators and policy makers differentiate between legitimate security imperatives and any over-reach evident in the implementation of this legislation that affects rule of law principles, our capacity to engage in democratic practices, and our civic and human rights.
Resumo:
Teacher assessment literacy is a phrase that is often used but rarely defined. Yet understanding teacher assessment literacy is important in an international curriculum and assessment reform context that continues to challenge teachers’ assessment practices. In this article situated examples of classroom assessment literacies are analysed using Bernstein’s (Pedagogy, symbolic control and identity: Theory, research and critique, Taylor and Francis, London, 1996; Br J Sociol Educ 20(2):157–173, 1999) theoretical tools of vertical and horizontal discourses, classification and framing. Drawing on a sociocultural view of learning, the authors define teacher assessment literacies as dynamic social practices which are context dependent and which involve teachers in articulating and negotiating classroom and cultural knowledges with one another and with learners, in the initiation, development and practice of assessment to achieve the learning goals of students. This conceptualisation of assessment literacy aims to make explicit some underpinning theoretical constructs of assessment literacy to inform dialogue and decision making for policy and practice to benefit student learning and achievement.
Resumo:
Management of groundwater systems requires realistic conceptual hydrogeological models as a framework for numerical simulation modelling, but also for system understanding and communicating this to stakeholders and the broader community. To help overcome these challenges we developed GVS (Groundwater Visualisation System), a stand-alone desktop software package that uses interactive 3D visualisation and animation techniques. The goal was a user-friendly groundwater management tool that could support a range of existing real-world and pre-processed data, both surface and subsurface, including geology and various types of temporal hydrological information. GVS allows these data to be integrated into a single conceptual hydrogeological model. In addition, 3D geological models produced externally using other software packages, can readily be imported into GVS models, as can outputs of simulations (e.g. piezometric surfaces) produced by software such as MODFLOW or FEFLOW. Boreholes can be integrated, showing any down-hole data and properties, including screen information, intersected geology, water level data and water chemistry. Animation is used to display spatial and temporal changes, with time-series data such as rainfall, standing water levels and electrical conductivity, displaying dynamic processes. Time and space variations can be presented using a range of contouring and colour mapping techniques, in addition to interactive plots of time-series parameters. Other types of data, for example, demographics and cultural information, can also be readily incorporated. The GVS software can execute on a standard Windows or Linux-based PC with a minimum of 2 GB RAM, and the model output is easy and inexpensive to distribute, by download or via USB/DVD/CD. Example models are described here for three groundwater systems in Queensland, northeastern Australia: two unconfined alluvial groundwater systems with intensive irrigation, the Lockyer Valley and the upper Condamine Valley, and the Surat Basin, a large sedimentary basin of confined artesian aquifers. This latter example required more detail in the hydrostratigraphy, correlation of formations with drillholes and visualisation of simulation piezometric surfaces. Both alluvial system GVS models were developed during drought conditions to support government strategies to implement groundwater management. The Surat Basin model was industry sponsored research, for coal seam gas groundwater management and community information and consultation. The “virtual” groundwater systems in these 3D GVS models can be interactively interrogated by standard functions, plus production of 2D cross-sections, data selection from the 3D scene, rear end database and plot displays. A unique feature is that GVS allows investigation of time-series data across different display modes, both 2D and 3D. GVS has been used successfully as a tool to enhance community/stakeholder understanding and knowledge of groundwater systems and is of value for training and educational purposes. Projects completed confirm that GVS provides a powerful support to management and decision making, and as a tool for interpretation of groundwater system hydrological processes. A highly effective visualisation output is the production of short videos (e.g. 2–5 min) based on sequences of camera ‘fly-throughs’ and screen images. Further work involves developing support for multi-screen displays and touch-screen technologies, distributed rendering, gestural interaction systems. To highlight the visualisation and animation capability of the GVS software, links to related multimedia hosted online sites are included in the references.
Resumo:
Objective: To investigate the density of the primary epidermal lamellae (PEL) around the solar circumference of the forefeet of near-term fetal feral and nonferal (ie, domesticated) horses. Sample: Left forefeet from near-term Australian feral (n = 14) and domesticated (4) horse fetuses. Procedures: Near-term feral horse fetuses were obtained from culled mares within 10 minutes of death; fetuses that had died in utero 2 weeks prior to anticipated birth date and were delivered from live Thoroughbred mares were also obtained. Following disarticulation at the carpus, the left forefoot of each fetus was frozen during dissection and data collection. In a standard section of each hoof, the stratum internum PEL density was calculated at the midline center (12 o'clock) and the medial and lateral break-over points (11 and 1 o'clock), toe quarters (10 and 2 o'clock), and quarters (4 and 6 o'clock). Values for matching lateral and medial zones were averaged and expressed as 1 density. Density differences at the 4 locations between the feral and domesticated horse feet were assessed by use of imaging software analysis. Results: In fetal domesticated horse feet, PEL density did not differ among the 4 locations. In fetal feral horse feet, PEL density differed significantly among locations, with a pattern of gradual reduction from the dorsal to the palmar aspect of the foot. The PEL density distribution differed significantly between fetal domesticated and feral horse feet. Conclusions and Clinical Relevance: Results indicated that PEL density distribution differs between fetal feral and domesticated horse feet, suggestive of an adaptation of feral horses to environment challenges.
Resumo:
Partington notes that clothing produced by individual consumers through adaptation of patterns is contextualised as a watered down version of original couture. In its most reductive form, this notion characterises fashion as commercial and exploitative. Descriptors such as appropriation, imitation, copy and so forth have restricted the opportunity to understand fashion as a major global cultural form and institution. Therefore exploring and understanding the concept of adaptation will shift the attention from a superficial assessment of original versus imitation or copy to adaptation as a practice that provides a better framework for the understanding of designers’ and couturiers’ innovative practices and creativity, describing also the active engagement of consumers with fashion at the micro level. Adaptation can also provide a way to understand different historical shifts in the fashion system, from individual creative agency with home dressmaking and re-making to the explosion of the mass market and the consequent abandonment of such practices. Home dressmaking has been replaced by fashion remix of mass produced garments, a practice that thrives in our environment of globalised fast fashion. Thus this chapter suggests the need for a contextual requalification of concepts such as original, copy, imitation and copyright, and argues that these categories have been played against each other, but they are in fact interdependent. Today, big labels and conglomerates try to control knowledge and innovation through copyright, but, fashion escapes copyright because, in fashion, creativity is contextual. The institutionalisation of couture from 1868 served as a way to control knowledge about production processes in fashion; on the other hand, adaptation practices, often subversive, have been fundamental to the democratisation of fashion.
Resumo:
Reports of immoral marketing practices i n the construction industry attract political, media and public but not much academic interest. This paper adopts a behavioural perspective and proposes a model for applying marketing ethics concepts and methods in the study of collusion in the construction contract market. An extensive multidisciplinary review of existing literature identified a lack of adequate conceptualisation of the mechanisms and decision making factors of collusive tendering. The process of developing the model is detailed in this paper. The objectives and methodology of the research project that tested the model are also outlined. The paper concludes with a brief note on the contributions and application of the proposed model.
Resumo:
This paper is a work in progress that examines current consumer engagement with eHealth information through Smartphones or tablets. We focus on three activity types: seeking, posting and ‘other’ engagement activity and compare two age groups, 25-40s and over 40-55s. Findings show that around 30% of the younger age group is engaging with Government and other Health providers’ websites, receiving eHealth emails, and reading other people’s comments about health related issues in online discussion groups/websites/blog. Approximately 20% engage with Government and other Health providers’ social media and watch or listen to audio or video podcasts. For the older age group, their most active engagement with eHealth information is in the seeking category through Government or other health websites (approximately 15%), and less than 10% for social media sites. Their posting activity is less than 5%. Other activities show that less than 15% of the older age group engages through receiving emails and reading blogs, less than 10% watch or listen to podcasts, and their online consulting activity is less than 7%. We note that scores are low for both groups in terms of engaging with eHealth information through Twitter.
Resumo:
Situation awareness, ones understanding of ‘what is going on’, is a critical commodity for road users. Although the concept has received much attention in the driving context, situation awareness in vulnerable road users, such as cyclists, remains unexplored. This paper presents the findings from an exploratory on-road study of cyclist situation awareness, the aim of which was to explore how cyclists develop situation awareness, what their situation awareness comprises, and what the causes of degraded cyclist situation awareness may be. Twenty participants cycled a pre-defined urban on-road study route. A range of data were collected, including verbal protocols, forward scene video and rear video, and a network analysis procedure was used to describe and assess cyclist situation awareness. The analysis produced a number of key findings regarding cyclist situation awareness, including the potential for cyclists’ awareness of other road users to be degraded due to additional situation awareness and decision making requirements that are placed on them in certain road situations. Strategies for improving cyclists’ situation awareness are discussed.
Resumo:
Most urban agriculture literature focus on addressing access to healthy and affordable food and environmental issues via managing the urban farming chain which consists of production, processing, marketing, distribution and consumption. This paper focuses on a less acknowledged and documented aspect of individual urban farming: growing and sharing garden produce for recreation, well-being and friend making. This paper summarizes the experience of individual backyard farming and sharing as a way to interact with nature and people and explores ways to improve this experience, especially with the assistance of Information Communication Technology.
Resumo:
Do you need a practical guide to assessment, curriculum and policy? Are you also looking for a book that is firmly grounded in the theory of this subject? Assessment for Education combines both theory and practice, making it the perfect guide for students, researchers, academics and teachers. This book makes assessment processes transparent for practitioners, and shows how assessment should relate to education. It looks at evidence-informed decision-making and the interrelationships between standards, judgment and moderation practice for improved assessment, teacher quality, schools and systems. The book will provide you with: ' Knowledge about quality assessment and judgement practice ' Understanding of relationships across curriculum, assessment, teaching and learning ' Knowledge of the concept of front-ending assessment based on the learner's needs ' An analysis of practitioner judgement approaches ' Understanding of the conditions under which teacher assessment can be valid ' Principles derived from research of social moderation practices Whether you are studying and researching assessment or working in curriculum and assessment policy, this book will show you how practitioner use of achievement standards can improve learning, equity, social justice and accountability.
Resumo:
Financial literacy may not be as effective as previously thought in protecting against fraud victimisation. It does not inoculate investors from persuasion or social engineering tactics used by offenders to secure investment in fraudulent schemes. In fact, recent research indicates that overconfidence in investment knowledge may make individuals more susceptible to fraud. Using boiler room fraud as a case study, this article introduces the PREY (Profiled, Relational, Exploitable and Yielding) model to capture the psychological tactics used by fraud perpetrators to influence the thoughts and decision-making processes of individuals. The PREY model operationalizes the tenets of social engineering and demonstrates how such tactics could be re-engineered to increase the effectiveness of fraud prevention within the financial literacy context.