141 resultados para second language identity
Resumo:
Hypercapitalism, with its "knowledge economy", is the form of capitalism under which thought itself is produced, commodified, and exchanged within the globally integrated system of communication technologies. As such, hypercapitalism may be seen as not so much a revolution, but rather an evolution: the progressively thorough, inexorable totalisation of social relations by Capital. The study on which this paper is based synthesises the sociological perspectives of Marx (1970, 1844/1975, 1846/1972, 1976, 1978, 1981) and Adorno (1951/1974, 1991; Horkheimer & Adorno, 1944/1998), and the Critical Discourse perspectives of Fairclough (1989, 1992) and Lemke (1995) to argue that alienated thought and language are the fundamental, irreducible commodity-forms of Cybersociety’s knowledge economy.
Resumo:
It has often been argued that young woman’s magazine’s, like Cosmopolitan, Cleo Dolly and Seventeen, constitute a significant instrument in the patriarchal repression of young women - their hegemonic success lying in the fact that they appear to be sites wherein young women are ‘free’ from the elements of coercion so obviously in evidence within other terrains, such as the school and the family. This paper will suggest an alternative approach to these magazines. Rather than locating such texts within an overall model of repression and patriarchal domination, it will be argued here that they can be regarded as practical manuals which enrol young women to do specific kinds of work on themselves. In doing so, they form an effective link between the governmental imperatives aimed at constructing particular personas (such as, for example, ‘the sexually responsible young woman’), and the actual practices whereby these imperatives are operationalised. These manuals do not prevent young women from learning to ‘project a unique self’, they constitute a significant source of practices and techniques through which particular types of self are shaped.
Resumo:
Intuitively, any `bag of words' approach in IR should benefit from taking term dependencies into account. Unfortunately, for years the results of exploiting such dependencies have been mixed or inconclusive. To improve the situation, this paper shows how the natural language properties of the target documents can be used to transform and enrich the term dependencies to more useful statistics. This is done in three steps. The term co-occurrence statistics of queries and documents are each represented by a Markov chain. The paper proves that such a chain is ergodic, and therefore its asymptotic behavior is unique, stationary, and independent of the initial state. Next, the stationary distribution is taken to model queries and documents, rather than their initial distri- butions. Finally, ranking is achieved following the customary language modeling paradigm. The main contribution of this paper is to argue why the asymptotic behavior of the document model is a better representation then just the document's initial distribution. A secondary contribution is to investigate the practical application of this representation in case the queries become increasingly verbose. In the experiments (based on Lemur's search engine substrate) the default query model was replaced by the stable distribution of the query. Just modeling the query this way already resulted in significant improvements over a standard language model baseline. The results were on a par or better than more sophisticated algorithms that use fine-tuned parameters or extensive training. Moreover, the more verbose the query, the more effective the approach seems to become.
Resumo:
How social class factors into linguistic practices and use, language change and loss has been a major theme in postwar sociolinguistics and ethnography of communication, language planning and sociology of language. Key foci of linguistic and sociological research include the study of social class in everyday language use, media and institutional texts. A further concern is to understand the relationship between social class stratification, intergenerational social reproduction, and language variation. Bourdieu’s model of linguistic habitus and cultural capital offers a broad theoretical template for examining these relations, even as they are complicated by forces of economic and cultural globalization, new media and identity formations.
Resumo:
Overall, this thesis purports to make two significant contributions to knowledge. The first is a foundational critique of political economy in the context of an emergent global knowledge economy. The second is a method for analysing evaluations in language. The relationships that give coherence to those two contributions are as follows. The widely-heralded emergence of a knowledge economy indicates that more intimate aspects of human activity have become exposed to commodification on a massive scale, specifically, activities associated with thought and language. Correspondingly, more abstract forms of value have developed as the products of thought and language have become dominant commodity forms. Historical investigation shows that value has moved from an objective category in political economy, pertaining to such substances as precious metals and land, to become situated today predominantly in “expert” expressions of language, or more precisely, their institutional contexts of production. These are now propagated and circulated on a global scale. Legal, political, and technological developments are key in the development of new, more abstract forms of labour and value, although the relationships connecting these are neither simple nor direct. They are, however, inseparably related in the trajectories that this thesis describes. Consequently they are dealt with inseparably throughout.
Resumo:
In recent years, increasing numbers of Chinese migrants have come to Australia to study or to live. In doing so, they have entered a new cultural space. They are faced with many challenges, not only to do with study experience, workplace experience and life-style practices, but also to do with language, communication, culture and identity. Such new challenges can feel dangerous, unstable and uncomfortable as they require moves out of the safety zone of primary cultural experience. This qualitative research study investigates the perceptions and narratives of three Taiwanese-Australian migrants in terms of their experience of this process of acculturation and social identity construction as migrant tertiary students in the new Australian context and of their subsequent experience professionally. Their accounts of where they see themselves to have 'landed' in terms of their acculturation process and identity construction might provide relevant insights to the experience of hybridity which is intercultural Australia.
Resumo:
Globalisation and societal change suggest the language and literacy skills needed to make meaning in our lives are increasing and changing radically. Multiliteracies are influencing the future of literacy teaching. One aspect of the pedagogy of multiliteracies is recruiting learners’ previous and current experiences as an integral part of the learning experience. This paper examines the implications of results from a project that examined student responses to a postmodern picture book, in particular, ways teachers might develop students’ self-knowledge about reading. It draws on Freebody and Luke’s Four Resources Model of Reading and recently developed models for teaching multiliteracies.
Resumo:
This study sought to establish and develop innovative instructional procedures, in which scaffolding can be expanded and applied, in order to enhance learning of English as a Foreign Language (EFL) writing skills in an effective hybrid learning community (a combination of face-to-face and online modes of learning) at the university where the researcher is working. Many educational experts still believe that technology has not been harnessed to its potential to meet the new online characteristics and trends. There is also an urgency to reconsider the pedagogical perspectives involved in the utilisation of online learning systems in general and the social interactions within online courses in particular that have been neglected to date. An action research design, conducted in two cycles within a duration of four months, was utilised throughout this study. It was intended not only to achieve a paradigm shift from transmission-absorption to socio-constructivist teaching/learning methodologies but also to inform practice in these technology-rich environments. Five major findings emerged from the study. First, the scaffolding theory has been extended. Two new scaffolding types (i.e., quasi-transcendental scaffolding and transcendental scafolding), two scaffolding aspects (i.e., receptive and productive) and some scaffolding actions (e.g., providing a stimulus, awareness, reminder, or remedy) for EFL writing skills in an effective hybrid learning community have been identified and elaborated on. Second, the EFL ‘Effective Writing’ students used the scaffolds implemented in a hybrid environment to enhance and enrich their learning of writing of English essays. The online activities, conducted after the F2F sessions most of the time, gave students greater opportunities to both reinforce and expand the knowledge they had acquired in the F2F mode. Third, a variety of teaching techniques, different online tasks and discussion topics utilised in the two modes bolstered the students’ interests and engagement in their knowledge construction of how to compose English-language essays. Fourth, through the scaffolded activities, the students learned how to scaffold themselves and thus became independent learners in their future endeavours of constructing knowledge. Fifth, the scaffolding-to-scaffold activities provided the students with knowledge on how to effectively engage in transcendental scaffolding actions and facilitate the learning of English writing skills by less able peers within the learning community. Thus, the findings of this current study extended earlier understandings of scaffolding in an EFL hybrid learning environment and will contribute to the advancement of future ICT-mediated courses in terms of their scaffolding pedagogical aspects.
Resumo:
This book explores the interrelation of literacy and religion as practiced by Western Christians in, first, historical contexts and, second, in one contemporary church setting. Using both a case study and a Foucauldian theoretical framework, the book provides a sustained analysis of the reciprocal discursive construction of literacy, religiosity and identity in one Seventh-day Adventist Church community of Northern Australia. Critical linguistic and discourse analytic theory is used to disclose processes of theological (church), familial (home) and educational (school) normalisation of community members into regulated ways of hearing and speaking, reading and writing, being and believing. Detailed analyses of spoken and written texts taken from institutional and local community settings show how textual religion is an exemplary technology of the self, a politics constituted by canonical texts, interpretive norms, textual practices, ritualised events and sociopolitical protocols that, ultimately, are turned in upon the self. The purpose of these analyses is to show how, across denominational difference in belief (tradition) and practice, particular versions of self and society are constructed through economies of truth from text, enabling and constraining what can and cannot be spoken and enacted by believers.
Resumo:
The topic of the present work is to study the relationship between the power of the learning algorithms on the one hand, and the expressive power of the logical language which is used to represent the problems to be learned on the other hand. The central question is whether enriching the language results in more learning power. In order to make the question relevant and nontrivial, it is required that both texts (sequences of data) and hypotheses (guesses) be translatable from the “rich” language into the “poor” one. The issue is considered for several logical languages suitable to describe structures whose domain is the set of natural numbers. It is shown that enriching the language does not give any advantage for those languages which define a monadic second-order language being decidable in the following sense: there is a fixed interpretation in the structure of natural numbers such that the set of sentences of this extended language true in that structure is decidable. But enriching the original language even by only one constant gives an advantage if this language contains a binary function symbol (which will be interpreted as addition). Furthermore, it is shown that behaviourally correct learning has exactly the same power as learning in the limit for those languages which define a monadic second-order language with the property given above, but has more power in case of languages containing a binary function symbol. Adding the natural requirement that the set of all structures to be learned is recursively enumerable, it is shown that it pays o6 to enrich the language of arithmetics for both finite learning and learning in the limit, but it does not pay off to enrich the language for behaviourally correct learning.
Resumo:
Automatic spoken Language Identi¯cation (LID) is the process of identifying the language spoken within an utterance. The challenge that this task presents is that no prior information is available indicating the content of the utterance or the identity of the speaker. The trend of globalization and the pervasive popularity of the Internet will amplify the need for the capabilities spoken language identi¯ca- tion systems provide. A prominent application arises in call centers dealing with speakers speaking di®erent languages. Another important application is to index or search huge speech data archives and corpora that contain multiple languages. The aim of this research is to develop techniques targeted at producing a fast and more accurate automatic spoken LID system compared to the previous National Institute of Standards and Technology (NIST) Language Recognition Evaluation. Acoustic and phonetic speech information are targeted as the most suitable fea- tures for representing the characteristics of a language. To model the acoustic speech features a Gaussian Mixture Model based approach is employed. Pho- netic speech information is extracted using existing speech recognition technol- ogy. Various techniques to improve LID accuracy are also studied. One approach examined is the employment of Vocal Tract Length Normalization to reduce the speech variation caused by di®erent speakers. A linear data fusion technique is adopted to combine the various aspects of information extracted from speech. As a result of this research, a LID system was implemented and presented for evaluation in the 2003 Language Recognition Evaluation conducted by the NIST.
Resumo:
Details of a project which fictionalises the oral history of the life of the author's polio-afflicted grandmother Beth Bevan and her experiences at a home for children with disabilities are presented. The speech and language patterns recognised in the first person narration are described, as also the sense of voice and identity communicated through the oral history.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.