100 resultados para tactical voting
Resumo:
Falling prices have led to an ongoing spread of public displays in urban areas. Still, they mostly show passive content such as commercials and digital signage. At the same time, technological advances have enabled the creation of interactive displays potentially increasing their attractiveness for the audience, e.g. through providing a platform for civic discourse. This poses considerable challenges, since displays need to communicate the opportunity to engage, motivate the audience to do so, and be easy to use. In this paper we present Vote With Your Feet, a hyperlocal public polling tool for urban screens allowing users to express their opinions. Similar to vox populi interviews on TV or polls on news websites, the tool is meant to reflect the mindset of the community on topics such as current affairs, cultural identity and local matters. It is novel in that it focuses on a situated civic discourse and provides a tangible user interface, tackling the mentioned challenges. It shows one Yes/No question at a time and enables users to vote by stepping on one of two tangible buttons on the ground. This user interface was introduced to attract people’s attention and to lower participation barriers. Our field study showed that Vote With Your Feet is perceived as inviting and that it can spark discussions among co-located people.
Resumo:
The Internet Corporation for Assigned Names and Numbers (ICANN) is an institution besieged. It has endeavored to be democratic but its attempts to do so have been disastrous. The typical explanation for this is that the problem is with ICANN: it fails to meet its democratic obligations. My view is that the problem is with our understanding of "democracy." Democracy is an empty concept that fails to describe few, if any, of our genuine political commitments. In the real world, the failings inherent in "democracy" have been papered over by some unusual characteristics of the physical political process. However, in online trans-national institutions like ICANN, democracy is exposed as a poor substitute for a number of other conceptions of our political commitments. This Article seeks to articulate these political commitments and to explain why democracy and ICANN are such a poor mix. It begins by charting the rise of ICANN and its attempts to be democratic. It then explains why democracy is an empty shell of a concept. It then explores some features of democracy and ICANN, explaining why the online world exposes limitations in implications of democracy such as the nature of the demos, the idea of constituencies, direct democracy, voting, and the like. It concludes that ICANN's example demonstrates that democracy is in fact anything but a coherent general theory of political action. We need to consider, then, whether we should continue to berate ICANN for its undemocratic actions.
Resumo:
The question can no longer just be whether “art and social practice” or creative forms of activism are part of larger neo liberal agenda nor if they are potentially radical in their conception, delivery or consumption. The question also becomes: what are the effects of social practice art and design for the artists, institutions, and the publics they elicit in public and private spaces; that is, how can we consider such artworks differently? I argue the dilution of social practices’ potentially radical interventions into cultural processes and their absorption into larger neo liberal agendas limits how, as Jacques Rancière might argue, they can intervene in the “distribution of the sensible.” I will use a case study example from The Center for Tactical Magic, an artist group from the San Francisco Bay Area.
Resumo:
We present a text watermarking scheme that embeds a bitstream watermark Wi in a text document P preserving the meaning, context, and flow of the document. The document is viewed as a set of paragraphs, each paragraph being a set of sentences. The sequence of paragraphs and sentences used to embed watermark bits is permuted using a secret key. Then, English language sentence transformations are used to modify sentence lengths, thus embedding watermarking bits in the Least Significant Bits (LSB) of the sentences’ cardinalities. The embedding and extracting algorithms are public, while the secrecy and security of the watermark depends on a secret key K. The probability of False Positives is extremely small, hence avoiding incidental occurrences of our watermark in random text documents. Majority voting provides security against text addition, deletion, and swapping attacks, further reducing the probability of False Positives. The scheme is secure against the general attacks on text watermarks such as reproduction (photocopying, FAX), reformatting, synonym substitution, text addition, text deletion, text swapping, paragraph shuffling and collusion attacks.
Resumo:
Describes the development and testing of a robotic system for charging blast holes in underground mining. The automation system supports four main tactical functions: detection of blast holes; teleoperated arm pose control; automatic arm pose control; and human-in-the-loop visual servoing. We present the system architecture, and analyse the major components, Hole detection is crucial for automating the process, and we discuss theoretical and practical aspects in detail. The sensors used are laser range finders and cameras installed in the end effector. For automatic insertion, we consider image processing techniques to support visual servoing the tool to the hole. We also discuss issues surrounding the control of heavy-duty mining manipulators, in particular, friction, stiction, and actuator saturation.
Resumo:
This paper is presented in workshop format in order to meet the style and themes of the conference, and seeks to explore as fully as possible with participants issues, concerns and proposals around the discourse of young people and citizenship. This paper takes the position that the relationship between young people and citizenship is complex and in places contradictory, and while Ruth Lister (1998), argues for an 'inclusionary potential', a central concern is that the citizenship that young people get is as Hartley Dean (1997), suggests, at best 'ambiguous', and at its worst, 'diminished'. Under not so new Labour, the term has according to Gail Lewis (1998) re-emerged as a 'category of political articulation', imbued with the pronouncements of Charles Murray (1995) on the underclass, and Amitai Etzioni (1996), on the virtues of Communitarianism and the central assertion that in relation to young people and certain communities, 'rights have exceeded responsibilities'. This body of opinion has proved to be seductive to a government dedicated to joined up solutions in the battle against social exclusion and to the reconfiguration of the welfare state to place the onus for welfare and social provision on to individuals and communities. Those who work with young people and young people themselves may wish to be proactive in asserting the kind of citizenship they require, rights-based, expansive and supportive, rather than accept an imposed version devoid of rights but full to the brim of authoritarian measures, vindictive proposals and narrow horizons. This paper will engender debate and reflection and offer a context of the erosion of young people's rights over the last 20 years, Hartley Dean (1996), and will consider the work of T.H. Marshall (1950) in dividing citizenship into three elements: the civil element, the political element, and the social element. The paper will explore in workshop tradition, strategies and proposals for action relevant to practitioners and academics, such as the reduction in the voting age to 16.
Resumo:
The regulatory framework for corporate governance, both in Australia and internationally, shifts between rules based regimes and principles based approach. The rules based regimes are typified by legislation that imposes mandated compliance based rules, such as the Sarbanes Oxley Act. Other regimes, such as Australia’s CLERP 9 and the ASX Corporate Governance Council’s principles, have opted for a disclosure approach. This paper examines these approaches in the context of the non-binding vote rule, which arguably combines aspects of both. The study’s methodology empirically considers evidence relating to actual voting patterns as well as case study examples of the non-binding vote’s effectiveness. Significantly, our analyses show that from its inception, the non-binding vote was effective in motivating management to change the remuneration package to one they perceived as more acceptable to shareholders and that the non-binding vote is an effective regime to manage CEO remuneration (and by extension) executive remuneration.
Resumo:
Tourism Australia’s launch of the ‘Restaurant Australia’ marketing campaign in 2014 is aimed at changing perceptions of the ‘prawn on the barbeque’ image of Australian culinary culture. The campaign is the government's response to global research that reveals that tourists want ‘good’ food and wine experiences (in Australia?). In effect, ‘Restaurant Australia’, and the AUS$10 million supporting it, is promoting? the notion that Australian tourism should provide epicurean food experiences associated with high quality and ‘authentic cultural’ tourism, rather than contrived versions of national identity articulated via stereotypical notions of national cuisine. This paper adopts a cultural tourism approach, especially in relation to theories of authenticity and the relationship of post-tourists, cultural tourists, and tactical tourists to examine two very different areas of wine and food production in Australia in the context of the Restaurant Australia campaign. In particular, it considers issues associated with defining Australian cuisine and the development of a narrative about Australia as a epicurean destination.
Resumo:
Producers, technicians, performers, audiences and critics are all critical components of the performing arts ecology – critical components of an ecosystem that have to come together into some sort of productive relationship if the performing arts are to be vital, viable and successful. Different performance practices developed in different times, spaces and places do, of course, connect these players in different ways as part of their attempt to achieve their own definition of success, be it based on entertainment, educational, expression, empowerment, or something else. In some contemporary performance practices, social media platforms, applications and processes are seen to have significant potential to restore balance to the relationship between performer and audience, providing audiences with more power to participate in a performance event. In this paper, I investigate prevailing assumptions about social media’s power to democratise performance practice, or, at least, develop more co-creative performance practices in which producers, performers and audiences participate actively before, during and after the event. I focus, in particular, on the use of social media as a means of developing a participatory aesthetic in which an audience member is asked to contribute to the cast of characters, plot or progression of a performance. Although diverse – from performances streamed online, to performances that offer transmedia components the audience can use to learn more about character, context and plot online, to performances that incorporate online voting, liking or linking, to performances that unfold fully online on websites, blogs, microblogs or other social media platforms – what a lot of uses of social media in contemporary performance today share is a desire to encourage audiences to reflect on their role in making, and making meaning, of the event. In this paper I interrogate if, and if so how, this democratises or develops deeper levels of co-creativity in the relationship between producers, performers and audiences.
Resumo:
The DC9 workshop takes place on June 27, 2015 in Limerick, Ireland and is titled “Hackable Cities: From Subversive City Making to Systemic Change”. The notion of “hacking” originates from the world of media technologies but is increasingly often being used for creative ideals and practices of city making. “City hacking” evokes more participatory, inclusive, decentralized, playful and subversive alternatives to often top-down ICT implementations in smart city making. However, these discourses about “hacking the city” are used ambiguously and are loaded with various ideological presumptions, which makes the term also problematic. For some “urban hacking” is about empowering citizens to organize around communal issues and perform aesthetic urban interventions. For others it raises questions about governance: what kind of “city hacks” should be encouraged or not, and who decides? Can city hacking be curated? For yet others, trendy participatory buzzwords like these are masquerades for deeply libertarian neoliberal values. Furthermore, a question is how “city hacking” may mature from the tactical level of smart and often playful interventions to the strategic level of enduring impact. The Digital Cities 9 workshop welcomes papers that explore the idea of “hackable city making” in constructive and critical ways.
Resumo:
Objectives The objective of this study was to develop process quality indicators (PQIs) to support the improvement of care services for older people with cognitive impairment in emergency departments (ED). Methods A structured research approach was taken for the development of PQIs for the care of older people with cognitive impairment in EDs, including combining available evidence with expert opinion (phase 1), a field study (phase 2), and formal voting (phase 3). A systematic review of the literature identified ED processes targeting the specific care needs of older people with cognitive impairment. Existing relevant PQIs were also included. By integrating the scientific evidence and clinical expertise, new PQIs were drafted and, along with the existing PQIs, extensively discussed by an advisory panel. These indicators were field tested in eight hospitals using a cohort of older persons aged 70 years and older. After analysis of the field study data (indicator prevalence, variability across sites), in a second meeting, the advisory panel further defined the PQIs. The advisory panel formally voted for selection of those PQIs that were most appropriate for care evaluation. Results In addition to seven previously published PQIs relevant to the care of older persons, 15 new indicators were created. These 22 PQIs were then field tested. PQIs designed specifically for the older ED population with cognitive impairment were only scored for patients with identified cognitive impairment. Following formal voting, a total of 11 PQIs were included in the set. These PQIs targeted cognitive screening, delirium screening, delirium risk assessment, evaluation of acute change in mental status, delirium etiology, proxy notification, collateral history, involvement of a nominated support person, pain assessment, postdischarge follow-up, and ED length of stay. Conclusions This article presents a set of PQIs for the evaluation of the care for older people with cognitive impairment in EDs. The variation in indicator triggering across different ED sites suggests that there are opportunities for quality improvement in care for this vulnerable group. Applied PQIs will identify an emergency services' implementation of care strategies for cognitively impaired older ED patients. Awareness of the PQI triggers at an ED level enables implementation of targeted interventions to improve any suboptimal processes of care. Further validation and utility of the indicators in a wider population is now indicated.
Resumo:
Objectives The purpose of this study was to identify the structural quality of care domains and to establish a set of structural quality indicators (SQIs) for the assessment of care of older people with cognitive impairment in emergency departments (EDs). Methods A structured approach to SQI development was undertaken including: 1) a comprehensive search of peer-reviewed and gray literature focusing on identification of evidence-based interventions targeting structure of care of older patients with cognitive impairment and existing SQIs; 2) a consultative process engaging experts in the care of older people and epidemiologic methods (i.e., advisory panel) leading to development of a draft set of SQIs; 3) field testing of drafted SQIs in eight EDs, leading to refinement of the SQI set, and; 4) an independent voting process among the panelists for SQI inclusion in a final set, using preestablished inclusion and exclusion criteria. Results At the conclusion of the process, five SQIs targeting the management of older ED patients with cognitive impairment were developed: 1) the ED has a policy outlining the management of older people with cognitive impairment during the ED episode of care; 2) the ED has a policy outlining issues relevant to carers of older people with cognitive impairment, encompassing the need to include the (family) carer in the ED episode of care; 3) the ED has a policy outlining the assessment and management of behavioral symptoms, with specific reference to older people with cognitive impairment; 4) the ED has a policy outlining delirium prevention strategies, including the assessment of patients' delirium risk factors, and; 5) the ED has a policy outlining pain assessment and management for older people with cognitive impairment. Conclusions This article presents a set of SQIs for the evaluation of performance in caring for older people with cognitive impairment in EDs.
Resumo:
This paper offers one explanation for the institutional basis of food insecurity in Australia, and argues that while alternative food networks and the food sovereignty movement perform a valuable function in building forms of social solidarity between urban consumers and rural producers, they currently make only a minor contribution to Australia’s food and nutrition security. The paper begins by identifying two key drivers of food security: household incomes (on the demand side) and nutrition-sensitive, ‘fair food’ agriculture (on the supply side). We focus on this second driver and argue that healthy populations require an agricultural sector that delivers dietary diversity via a fair and sustainable food system. In order to understand why nutrition-sensitive, fair food agriculture is not flourishing in Australia we introduce the development economics theory of urban bias. According to this theory, governments support capital intensive rather than labour intensive agriculture in order to deliver cheap food alongside the transfer of public revenues gained from rural agriculture to urban infrastructure, where the majority of the voting public resides. We chart the unfolding of the Urban Bias across the twentieth century and its consolidation through neo-liberal orthodoxy, and argue that agricultural policies do little to sustain, let alone revitalize, rural and regional Australia. We conclude that by observing food system dynamics through a re-spatialized lens, Urban Bias Theory is valuable in highlighting rural–urban socio-economic and political economy tensions, particularly regarding food system sustainability. It also sheds light on the cultural economy tensions for alternative food networks as they move beyond niche markets to simultaneously support urban food security and sustainable rural livelihoods.
Resumo:
Techniques to align spatio-temporal data for large-scale analysis of human group behaviour have been developed. Application of the techniques to sports databases enable sport team's characteristic styles of play to be discovered and compared for tactical analysis. Applications in surveillance to recognise group activities in real-time for person re-identification from low-resolution video footage have also been developed.
Resumo:
In the mining optimisation literature, most researchers focused on two strategic-level and tactical-level open-pit mine optimisation problems, which are respectively termed ultimate pit limit (UPIT) or constrained pit limit (CPIT). However, many researchers indicate that the substantial numbers of variables and constraints in real-world instances (e.g., with 50-1000 thousand blocks) make the CPIT’s mixed integer programming (MIP) model intractable for use. Thus, it becomes a considerable challenge to solve the large scale CPIT instances without relying on exact MIP optimiser as well as the complicated MIP relaxation/decomposition methods. To take this challenge, two new graph-based algorithms based on network flow graph and conjunctive graph theory are developed by taking advantage of problem properties. The performance of our proposed algorithms is validated by testing recent large scale benchmark UPIT and CPIT instances’ datasets of MineLib in 2013. In comparison to best known results from MineLib, it is shown that the proposed algorithms outperform other CPIT solution approaches existing in the literature. The proposed graph-based algorithms leads to a more competent mine scheduling optimisation expert system because the third-party MIP optimiser is no longer indispensable and random neighbourhood search is not necessary.