132 resultados para voices of others
Resumo:
Australia’s National Review of Visual Education (DEEWR, 2009) asserts the primacy of visual language ability, or ‘visuacy” in problem-solving. This paper reports on a recent university/schools research project with ‘at risk’ middle school students in which visuacy was promoted as a primary medium for obtaining data relating to issues of immediate concern to the students. Using a students-as-researchers approach, the project investigated middle school students’ perspectives on school engagement and disengagement. In this project, novice researchers used a variety of data gathering methods including photography, video interviews and drawn images as well as more traditional verbal methods, such as interviews, and quantitative methods, such as questionnaires. Engaging student imagination was a key focus of the approach taken by the project, acknowledging that student participants may be reluctant to enter dialogue with teachers and researchers on matters to which they have previously had little input. Students who have previously been marginalized and prevented from contributing their voices to educational forums often have difficulty in adjusting to the novelty of collaborative research with adults (Rudduck, 2003) and may be uncertain of their own place in the relationship that defines teacher/student interactions. It is argued that the project’s promotion of visuacy, alongside more traditional literacies and numeracy in education research, helped to overcome these concerns, engaged the imaginations of the student researchers, and provided a medium for the expression of the voices of marginalised young people.
Resumo:
The development of sexual identity is a complex, lifelong process involving the interplay of sex, gender and orientation, occurring within a social framework of heterosexual dominance (Murray 2001). Australia has a richly diverse culture and, at some point in our lives, we will all meet people, who look, think, live, or act differently to ourselves. Through understanding and celebrating the diversity of our culture, we enrich our lives and the lives of others. Schools influence how boys (and girls) see themselves and each other; those of us who work in schools cannot pretend to be outside the process of gender construction. In our daily business we send messages, set boundaries and respond with support, disinterest or censure to the acting out of various masculinities and femininities.
Resumo:
Social and psychological theories have provided a plethora of evidence showing that the physical difficulty to express appropriate social interactions between drivers expresses itself in aggression, selfish driving and anti-social behaviour. Therefore there is a need to improve interactions between drivers and allow clearer collective decision making between them. Personal characteristics and the driving situations play strong roles in driver’s aggression. Our approach is centered around the driving situation as opposed to focusing on personality characteristics. It examines aggression and manipulates contextual variables such as driver’s eye contact exchanges. This paper presents a new unobtrusive in-vehicle system that aims at communicating drivers’ intentions, elicit social responses and increasing mutual awareness. It uses eye gaze as a social cue to affect collective decision making with the view to contribute to safe driving. The authors used a driving simulator to design a case control experiment in which eye gaze movements are conveyed with an avatar. Participants were asked to drive through different types of intersections. An avatar representing the head of the other driver was displayed and driver behaviour was analysed. Significant eye gaze pattern difference where observed when an avatar was displayed. Drivers cautiously refer to the avatar when information is required on the intention of others (e.g. when they do not have the right of way). The majority of participants reported the perception of “being looked at”. The number of glances and time spent gazing at the avatar did not indicate an unsafe distraction by standards of in-vehicle device ergonomic design. Avatars were visually consulted primarily in less demanding driving situations, which underlines their non-distractive nature.
Resumo:
Prime Minister Kevin Rudd’s Apology to Australia’s Stolen Generations, delivered on 13 February 2008, is both personal and political to me just as the people who talk about it make it political and personal through their actions. This paper represents my attempt to turn the gaze through articulating some of my thoughts on the Apology, policy statements (Close the Gap) and the inconsistencies within the leadership of the present governments. I have endeavoured to do this through exploring the articulations of others and by sharing examples and personal experiences. In bringing forth some analysis to the literature, examples and experiences, I reveal the relationships between oppression, white race privilege and institutional privilege and the epistemology that maintains them. In moving from the position of being silent on the Apology, and my political experiences, to speaking about them, I am able to move from the position of object to subject and to gain a form of liberated voice (hooks 1989:9). Furthermore, I am hopeful that it will encourage others to examine their own practices within political parties and governments and to challenge the domination that continues to subjugate Indigenous peoples. It is only through people enacting their responsibilities and making changes in their daily lives and through the institutions and organisations to which they belong (the personal and political), can the Apology move beyond symbolic to action.
Resumo:
Trace concerns writing-walking and walking-writing. The multiple voices of both novel and exegesis assemble a rhizomic map of a walk and create a never-entirely-certain wandering look upon a woman walking, rather than a single cocksure gaze. Trace explores the aesthetics of Western walking literature and the various nostalgias inherent in that tradition. Trace wonders how lost a character can become on a walk and whether a walk is itself a kind of becoming. In the undefined liminal space where the urban bleeds into the rural, Trace challenges the singular perspective of the dominating gaze with a wandering look, which aims to make an original contribution to both the walk in literature and to exegetical form.
Resumo:
De Certeau (1984) constructs the notion of belonging as a sentiment which develops over time through the everyday activities. He explains that simple everyday activities are part of the process of appropriation and territorialisation and suggests that over time belonging and attachment are established and built on memory, knowledge and the experiences of everyday activities. Based on the work of de Certeau, non-Indigenous Australians have developed attachment and belonging to places based on the dispossession of Aboriginal people and on their everyday practices over the past two hundred years. During this time non-Indigenous people have marked their appropriation and territorialisation with signs, symbols, representations and images. In marking their attachment, they also define how they position Australia’s Indigenous people by both our presence and our absence. This paper will explore signs and symbols within spaces and places in health services and showcase how they reflect the historical, political, cultural, social and economic values, and power relations of broader society. It will draw on the voices of Aboriginal women to demonstrate their everyday experiences of such sites. It will conclude by highlighting how Aboriginal people assert their identities and un-ceded sovereignty within such health sites and actively resist on-going white epistemological notions of us and the logic of patriarchal white sovereignty.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.
Resumo:
In this paper we describe a low-cost flight control system for a small (60 class) helicopter which is part of a larger project to develop an autonomous flying vehicle. Our approach differs from that of others in not using an expensive inertial/GPS sensing system. The primary sensors for vehicle stabilization are a low-cost inertial sensor and a pair of CMOS cameras. We describe the architecture of our flight control system, the inertial and visual sensing subsystems and present some flight control results.
Resumo:
Objective. To provide a preliminary test of a Theory of Planned Behavior (TPB) belief-based intervention to increase adolescents’ sun protective behaviors in a high risk area, Queensland, Australia. Methods. In the period of October-November, 2007 and May-June, 2008, 80 adolescents (14.53 ± 0.69 years) were recruited from two secondary schools (one government and one private) in Queensland after obtaining student, parental, and school informed consent. Adolescents were allocated to either a control or intervention condition based on the class they attended. The intervention comprised three, one hour in-school sessions facilitated by Cancer Council Queensland employees with sessions covering the belief basis of the TPB (i.e., behavioral, normative, and control [barrier and motivator] sun-safe beliefs). Participants completed questionnaires assessing sun-safety beliefs, intentions, and behavior pre- and post-intervention. Repeated Measures Multivariate Analysis of Variance was used to test the effect of the intervention across time on these constructs. Results. Students completing the intervention reported stronger sun-safe normative and motivator beliefs and intentions and the performance of more sun-safe behaviors across time than those in the control condition. Conclusion. Strengthening beliefs about the approval of others and motivators for sun protection may encourage sun-safe cognitions and actions among adolescents.
Resumo:
Background/Rationale Guided by the need-driven dementia-compromised behavior (NDB) model, this study examined influences of the physical environment on wandering behavior. Methods Using a descriptive, cross-sectional design, 122 wanderers from 28 long-term care (LTC) facilities were videotaped 10 to 12 times; data on wandering, light, sound, temperature and humidity levels, location, ambiance, and crowding were obtained. Associations between environmental variables and wandering were evaluated with chi-square and t tests; the model was evaluated using logistic regression. Results In all, 80% of wandering occurred in the resident’s own room, dayrooms, hallways, or dining rooms. When observed in other residents’ rooms, hallways, shower/baths, or off-unit locations, wanderers were likely (60%-92% of observations) to wander. The data were a good fit to the model overall (LR [logistic regression] χ2 (5) = 50.38, P < .0001) and by wandering type. Conclusions Location, light, sound, proximity of others, and ambiance are associated with wandering and may serve to inform environmental designs and care practices.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.
Resumo:
One of the prominent topics in Business Service Management is business models for (new) services. Business models are useful for service management and engineering as they provide a broader and more holistic perspective on services. Business models are particularly relevant for service innovation as this requires paying attention to the business models that make new services viable and business model innovation can drive the innovation of new and established services. Before we can have a look at business models for services, we first need to understand what business models are. This is not straight-forward as business models are still not well comprehended and the knowledge about business models is fragmented over different disciplines, such as information systems, strategy, innovation, and entrepreneurship. This whitepaper, ‘Understanding business models,’ introduces readers to business models. This whitepaper contributes to enhancing the understanding of business models, in particular the conceptualisation of business models by discussing and integrating business model definitions, frameworks and archetypes from different disciplines. After reading this whitepaper, the reader will have a well-developed understanding about what business models are and how the concept is sometimes interpreted and used in different ways. It will help the reader in assessing their own understanding of business models and that and of others. This will contribute to a better and more beneficial use of business models, an increase in shared understanding, and making it easier to work with business model techniques and tools.
Resumo:
In asset intensive industries such as mining, oil & gas, utilities etc. most of the capital expenditure happens on acquiring engineering assets. Process of acquiring assets is called as “Procurement” or “Acquisition”. An asset procurement decision should be taken in consideration with the installation, commissioning, operational, maintenance and disposal needs of an asset or spare. However, such cross-functional collaboration and communication does not appear to happen between engineering, maintenance, warehousing and procurement functions in many asset intensive industries. Acquisition planning and execution are two distinct parts of asset acquisition process. Acquisition planning or procurement planning is responsible for determining exactly what is required to be purchased. It is important that an asset acquisition decision is the result of cross-functional decision making process. An acquisition decision leads to a formal purchase order. Most costly asset decisions occur even before they are acquired. Therefore, acquisition decision should be an outcome of an integrated planning & decision making process. Asset intensive organizations both, Government and non Government in Australia spent AUD 102.5 Billion on asset acquisition in year 2008-09. There is widespread evidence of many assets and spare not being used or utilized and in the end are written off. This clearly shows that many organizations end up buying assets or spares which were not required or non-conforming to the needs of user functions. It is due the fact that strategic and software driven procurement process do not consider all the requirements from various functions within the organization which contribute to the operation and maintenance of the asset over its life cycle. There is a lot of research done on how to implement an effective procurement process. There are numerous software solutions available for executing a procurement process. However, not much research is done on how to arrive at a cross functional procurement planning process. It is also important to link procurement planning process to procurement execution process. This research will discuss ““Acquisition Engineering Model” (AEM) framework, which aims at assisting acquisition decision making based on various criteria to satisfy cross-functional organizational requirements. Acquisition Engineering Model (AEM) will consider inputs from corporate asset management strategy, production management, maintenance management, warehousing, finance and HSE. Therefore, it is essential that the multi-criteria driven acquisition planning process is carried out and its output is fed to the asset acquisition (procurement execution) process. An effective procurement decision making framework to perform acquisition planning which considers various functional criteria will be discussed in this paper.
Resumo:
Bringing together the voices of leading and emerging scholars, this book provides critical approaches for reading children's literature and film. It argues for the significance of theory for reading texts written and produced for young people and integrates a wide range of critical perspectives, including schema theory, theories of space and place, cultural globalization, feminism, ecocriticism, adaptation theory, postcolonialism, and posthumanism.
Resumo:
International Film Festivals play a vital role in shaping filmmakers’ careers. This paper presents some initial findings from a current major research project, highlighting the significance of particular festival programming of emerging female directors from developing nations. Some filmmakers showcased at festivals actively privilege the voices of women in their films as a means of commenting on pressing cultural and political issues. Ironically, other filmmakers do not subscribe to the label of “feminist” or “woman filmmaker”, even if their respective films represent a strongly coded woman’s point of view. Tensions also arise inevitably when scrutinising women filmmakers from developing nations within a first world film festival context. The expectations of the researcher, the festival, film critics and audiences inevitably must negotiate with the original intentions of the filmmaker. This paper explores the significance of women filmmakers in attendance at the Brisbane International Film Festival (2009) and the International Film Festival Rotterdam (2010).