216 resultados para Civic identity
Resumo:
The World Wide Web constitutes one of the most important inventions of the late 20th century: it has changed culture, society, business, communication, politics, and many other fields of human endeavour, not least also by providing a more user-friendly pathway of access to its major underlying technology, the Internet itself. Key phases in its development can be charted, especially by how it has been used to present and share information – and here, the personal or professional, private or official homepage stands in as a useful representation of wider Web trends overall. From hand-coded beginnings through several successive stages of experimentation and standardisation, to the shifting balance between personal sites and social networks, the homepage demonstrates how the Web itself, and its place in our lives, have changed.
Resumo:
Digital Stories are short autobiographical documentaries, often illustrated with personal photographs and narrated in the first person, and typically produced in group workshops. As a media form they offer ‘ordinary people’ the opportunity to represent themselves to audiences of their choosing; and this amplification of hitherto unheard voices has significant repercussions for their social participation. Many of the storytellers involved in the ‘Rainbow Family Tree’ case study that is the subject of this paper can be characterised as ‘everyday’ activists for their common desire to use their personal stories to increase social acceptance of marginalised identity categories. However, in conflict with their willingness to share their personal stories, many fear the risks and ramifications of distributing them in public spaces (especially online) to audiences both intimate and unknown. Additionally, while technologies for production and distribution of rich media products have become more accessible and user-friendly, many obstacles remain. For many people there are difficulties with technological access and aptitude, personal agency, cultural capital, and social isolation, not to mention availability of the time and energy requisite to Digital Storytelling. Additionally, workshop context, facilitation and distribution processes all influence the content of stories. This paper explores the many factors that make ‘authentic’ self-representation far from straight forward. I use qualitative data drawn from interviews, Digital Story texts and ethnographic observation of GLBTQIS participants in a Digital Storytelling initiative that combined face-to-face and online modes of participation. I consider mediating influences in practice and theory and draw on strategies put forth in cultural anthropology and narrative therapy to propose some practical tools for nuanced and sensitive facilitation of Digital Storytelling workshops and webspaces. Finally, I consider the implications of these facilitation strategies for voice, identity and social participation.
Resumo:
A review of the 6th APT focusing on the work and performance of Rohan Wealleans
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.
Resumo:
Previous studies have enabled exact prediction of probabilities of identity-by-descent (IBD) in randommating populations for a few loci (up to four or so), with extension to more using approximate regression methods. Here we present a precise predictor of multiple-locus IBD using simple formulas based on exact results for two loci. In particular, the probability of non-IBD X ABC at each of ordered loci A, B, and C can be well approximated by XABC = XABXBC/XB and generalizes to X123. . .k = X12X23. . .Xk-1,k/ Xk-2, where X is the probability of non-IBD at each locus. Predictions from this chain rule are very precise with population bottlenecks and migration, but are rather poorer in the presence of mutation. From these coefficients, the probabilities of multilocus IBD and non-IBD can also be computed for genomic regions as functions of population size, time, and map distances. An approximate but simple recurrence formula is also developed, which generally is less accurate than the chain rule but is more robust with mutation. Used together with the chain rule it leads to explicit equations for non-IBD in a region. The results can be applied to detection of quantitative trait loci (QTL) by computing the probability of IBD at candidate loci in terms of identity-by-state at neighboring markers.
Resumo:
Academically gifted students are recognised as possessing considerable achievement potential. Yet many fail to perform at a level commensurate with their ability. Often gifted students in early adolescence are faced with a forced choice between fulfilment of potential and achieving stable positive relationships with peers. This choice can affect their achievement and may have far-reaching personal and social costs. This case study explored the viability of self-presentation theory to explain students' ways of negotiating their sense of self whilst developing public identity and the concomitant affects on achievement and the fulfilment of potential. It examined how gifted students moderate their images in their learning and extra-curricular environments. Further, the study identifies those self-presentation strategies adopted that either facilitate or hinder achievement. This study may assist parents, educators and school counsellors to provide greater support for gifted adolescents.
Resumo:
This research examines the effects of expectation (perceived attractiveness) on satisfaction, place identity, and place dependence. Place identity and place dependence are viewed as relational components of choice and relate to deeper needs. This study proposes that these two relational components depend on transactional expectations, which are emergent and determined by past experiences and visitor goals. In a theoretically elaborated and tested Structural Equation Model (SEM) this study assumes that these relationships vary according to intentions to return. The study addresses the conditions under which loyalty intentions influence the deeper place attachments (place identity and place dependence) that visitors associate with attractive cultural and natural destinations. The model is tested on a sample of 504 international tourists visiting Tanzania during fall 2010, and explains 59% of variance in the predicted dependent variables. The results are linked to a discussion on loyalty programs.
Resumo:
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography that does not require principals to pre-compute key pairs and obtain certificates for their public keys— instead, public keys can be arbitrary identifiers such as email addresses, while private keys are derived at any time by a trusted private key generator upon request by the designated principals. Despite the flurry of recent results on IB encryption and signature, some questions regarding the security and efficiency of practicing IB encryption (IBE) and signature (IBS) as a joint IB signature/encryption (IBSE) scheme with a common set of parameters and keys, remain unanswered. We first propose a stringent security model for IBSE schemes. We require the usual strong security properties of: (for confidentiality) indistinguishability against adaptive chosen-ciphertext attacks, and (for nonrepudiation) existential unforgeability against chosen-message insider attacks. In addition, to ensure as strong as possible ciphertext armoring, we also ask (for anonymity) that authorship not be transmitted in the clear, and (for unlinkability) that it remain unverifiable by anyone except (for authentication) by the legitimate recipient alone. We then present an efficient IBSE construction, based on bilinear pairings, that satisfies all these security requirements, and yet is as compact as pairing-based IBE and IBS in isolation. Our scheme is secure, compact, fast and practical, offers detachable signatures, and supports multirecipient encryption with signature sharing for maximum scalability.
Resumo:
The ongoing crises of child sexual abuse by Christian institutions leaders across the Anglophone world continue to attract public attention and public inquiries. The pervasiveness of this issue lends credence to the argument that the prevailing ethos functioning within some Christian Institutions is one which exercises influence to repeatedly mismanage allegations of child sexual abuse by Church leaders. This work draws on semistructured interviews conducted with 15 Personnel in Christian Institutions (PICIs) in Australia who were identified as being pro-active in their approach to addressing child sexual abuse by PICIs. From these data, themes of power and forgiveness are explored through a Foucaultian conceptualising of pastoral power and ‘truth’ construction. Forgiveness is viewed as a discourse which can have the power effect of either silencing or empowering victim/survivors. The study concludes that individual PICIs’ understandings of the role ofpower in their praxis influences outcomes from the deployment of forgiveness.
Resumo:
In this presentation, renowned arts practitioner, Sean Mee, and Nigel Lavender, Executive Director of the Queensland Music Festival, talk about how community arts practice can be used to build cultural captial in communities, using examples such large-scale musicals such as The Road We're ON (Charleville) and Behind the Cand (Bowen), Mee and Lavender highlight the importance of community-driven narrative and particiaption.
Resumo:
In this study, I investigate the model of English language teacher education developed in Cuba. It includes features that would be considered innovative, contemporary, good practice anywhere in the Western world, as well as having distinctly Cuban elements. English is widely taught in Cuba in the education system and on television by Cuban teachers who are prepared in five-year courses at pedagogical universities by bilingual Cuban teacher educators. This case study explores the identity and pedagogy of six English language teacher educators at Cuba’s largest university of pedagogical sciences. Postcolonial theory provides a framework for examining how the Cuban pedagogy of English language teacher education resists the negative representation of Cuba in hegemonic Western discourse; and challenges neoliberal Western dogma. Postcolonial concepts of representation, resistance and hybridity are used in this examination. Cuban teacher education features a distinctive ‘pedagogy of tenderness’. Teacher educators build on caring relationships and institutionalised values of solidarity, collectivism and collaboration. Communicative English language teaching strategies are contextualised to enhance the pedagogical and communicative competence of student teachers, and intercultural intelligibility is emphasised. The collaborative pedagogy of Cuban English language teacher education features peer observation, mentoring and continuing professional development; as well as extensive pre-service classroom teaching and research skill development for student teachers. Being Cuban and bilingual are significant aspects of the professional identity of case members, who regard their profession as a vocation and who are committed to preparing good English language teachers.
Resumo:
In this article, I argue for an acknowledgement of the significance of the dancer’s role in the creation of independent contemporary dance. I propose the term ‘moving identity’ to outline the independent contemporary dancer’s ‘way of moving’ which could be perceived as the accumulation of various factors including training approaches, choreographic movement traces and anatomical structures. The concept of the moving identity allows us to appreciate the dancer’s unique signature movement style as the collation of embodied experiences into a unique way of moving. However, the moving identity is also open to change when the dancer encounters new choreography and the choreographer. Professional dance training produces particular types of dancers, depending on the techniques with which they engage. I demonstrate how the independent contemporary dancer troubles this distinctiveness by engaging with a multitude of movement styles and approaches throughout a career. This leads me to a fresh description of the dancer’s activity through the lens of Deleuzean concepts of multiplicity and de-stratification. Finally, I propose a definition of the dancer as a fluid and mutable body-in-flux with the creative potential to significantly influence the outcome of the choreographic process.