355 resultados para Identity, insurrection, opposition, Panama, XIXth century.
Resumo:
Immediate indefeasibility is the cornerstone of the Torrens system of land registration. However, when combined with the apparent ease in which forged mortgages become registered, the operation of this doctrine can come into question. This article seeks to argue that, rather than question indefeasibility, the focus should be on the verification of identity of parties to land transactions. Whilst no system can ever be infallible, it is suggested that by correctly imposing the responsibility for identity verification on the appropriate individual, the Torrens system can retain immediate indefeasibility as its paramount principle, yet achieve the optimum level of fairness in terms of allocation of responsibility and loss. With the dawn of a new era of electronic conveyancing about to begin, the framework suggested here provides a model for minimising the risks of forged mortgages and appropriately allocating the loss.
Resumo:
Details of a project which fictionalises the oral history of the life of the author's polio-afflicted grandmother Beth Bevan and her experiences at a home for children with disabilities are presented. The speech and language patterns recognised in the first person narration are described, as also the sense of voice and identity communicated through the oral history.
Resumo:
The purpose of this study is to contribute to the cross-disciplinary body of literature of identity and organisational culture. This study empirically investigated the Hatch and Schultz (2002) Organisational Identity Dynamics (OID) model to look at linkages between identity, image, and organisational culture. This study used processes defined in the OID model as a theoretical frame by which to understand the relationships between actual and espoused identity manifestations across visual identity, corporate identity, and organisational identity. The linking processes of impressing, mirroring, reflecting, and expressing were discussed at three unique levels in the organisation. The overarching research question of How does the organisational identity dynamics process manifest itself in practice at different levels within an organisation? was used as a means of providing empirical understanding to the previously theoretical OID model. Case study analysis was utilised to provide exploratory data across the organisational groups of: Level A - Senior Marketing and Corporate Communications Management, Level B - Marketing and Corporate Communications Staff, and Level C - Non-Marketing Managers and Employees. Data was collected via 15 in-depth interviews with documentary analysis used as a supporting mechanism to provide triangulation in analysis. Data was analysed against the impressing, mirroring, reflecting, and expressing constructs with specific criteria developed from literature to provide a detailed analysis of each process. Conclusions revealed marked differences in the ways in which OID processes occurred across different levels with implications for the ways in which VI, CI, and OI interact to develop holistic identity across organisational levels. Implications for theory detail the need to understand and utilise cultural understanding in identity programs as well as the value in developing identity communications which represent an actual rather than an espoused position.
Resumo:
While the Queensland and Australian Governments have recognised the importance of new spaces for teaching and learning, particularly with the Rudd Government's Building the Education Revolution, the practical implementation of new spaces is largely left to schools and even individual teachers. This article proposes a theory for the consideration of 21st century learning spaces in relation to the learner, desired knowledge and understanding, digital technology and digital pedagogy. New and emerging learning spaces at Bounty Boulevard State School are analysed and critiqued through an analysis of the guiding principles offered by the 'Learning in an Online World: Learning Spaces Framework' (MCEETYA, 2008) publication, including flexibility, inclusivity, collaboration, creativity and efficiency. The argument put forward in this article is that 21st century learning spaces can be enabled while acknowledging barriers of resourcing and current ICT infrastructure.
Resumo:
In the Knowledge Society, new demands are placed on teachers as they strive to empower young people to be global citizens, ready for the 21st century. Systemic shifts need to be made, however, to build capacity across the workforce to practise new ways of teaching and learning, including the personalisation of teacher professional development. This article argues new strategies and approaches for effective adult learning, including an individualised focus, context-based learning and an empowerment of teachers to develop their own personal learning networks. This article concludes with an analysis of the challenges facing professional development leaders in moving towards personalised teacher learning.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
‘MBA fever’ in China needs to be understood in the wider context of forces driving structural change in China’s relation to the global knowledge economy. The rise of a ‘new middle class’ in China is connected to the new claims for cultural leadership of an emergent ‘creative class’, which generates new issues about the relevance of the MBA in China, in terms of its relevance to Chinese economic circumstances, and its flexibility and capacity to respond to accumulation strategies that emphasise innovation, creativity and entrepreneurship.
Resumo:
In the 21st century's global economy, the new challenges facing the engineering profession have arrived, confirming the need to restructure engineering curricula, teaching and learning practices, and processes, including assessment. Possessing merely technical knowledge no longer guarantees an engineering graduate a successful career. And while all countries are facing this dilemma, India is struggling the most. It has been argued that most Indian engineering educational institutions struggle with the systemic problem of centralisation coupled with an archaic examination system that is detrimental to student learning. This article examines some internationally renowned educational institutions that are embracing the growing importance of non-technical subjects and soft skills in 21st century engineering curricula. It will then examine the problems that India faces in doing the same.
Resumo:
The use of parliamentary questions is the most popular and visible tool in the hands of the Opposition as a means to make government accountable. Their main purpose is to seek information or press for action. Contemporary parliamentary literature from the UK, Canada, and Australia, however, suggests that parliamentary questions have lost their effectiveness. The literature points out that Question Time in parliaments has become a battle ground between Ruling and Opposition parties in their fight to gain maximum political advantage. In this context, the effectiveness of parliamentary questions in the Indian state legislatures has not been investigated. The aim of this study, therefore, is to analyse the use, purpose and effectiveness of parliamentary questions in the State Legislative Assembly of Uttar Pradesh (India) to explore differences, if any, between Ruling and Opposition parties. In this study, 4023 parliamentary questions asked in the Uttar Pradesh State Legislative Assembly were analysed. The effectiveness of answers was also analysed qualitatively. The results show that half of the total members of the Assembly used this device, out of which 60% of the questions were asked by the Opposition party members. 31% of the questions from the Opposition were seeking information and 69% were pressing for action. The government provided the required information in 96% of the questions in the former category and took action in only 35% of the latter category. Furthermore, 60% of the questions raised by the Opposition were related to constituency matters and the remaining 40% were related to policy issues or public welfare. Comparing the data with the ruling party, the results indicate that the use,purpose and effectiveness of parliamentary questions were similar to that of the Opposition except some minor differences. Surprisingly, there was no evidence of any ‘Dorothy Dix’ questions. The study concludes parliamentary question is an effective device in the Indian state of Uttar Pradesh.
Resumo:
In the 21st century's global economy, the new challenges facing the engineering profession have arrived, confirming the need to restructure engineering curricula, teaching and learning practices, and processes, including assessment. Possessing merely technical knowledge no longer guarantees an engineering graduate a successful career. And while all countries are facing this dilemma, India is struggling the most. It has been argued that most Indian engineering educational institutions struggle with the systemic problem of centralisation coupled with an archaic examination system that is detrimental to student learning. This article examines some internationally renowned educational institutions that are embracing the growingimportance of non-technical subjects and soft skills in 21st century engineering curricula. It will then examine the problems that India faces in doing the same.
Resumo:
This document outlines the system submitted by the Speech and Audio Research Laboratory at the Queensland University of Technology (QUT) for the Speaker Identity Verification: Application task of EVALITA 2009. This competitive submission consisted of a score-level fusion of three component systems; a joint-factor analysis GMM system and two SVM systems using GLDS and GMM supervector kernels. Development evaluation and post-submission results are presented in this study, demonstrating the effectiveness of this fused system approach. This study highlights the challenges associated with system calibration from limited development data and that mismatch between training and testing conditions continues to be a major source of error in speaker verification technology.
Resumo:
Currently the final year curriculum in most, if not all, Australian law schools is delivered in a disjointed way which is not engaging final year students in a genuine capstone experience that supports the development of their professional identity and their transition out of university. The possible benefits of a capstone experience include preparing law students for the practice of law by assisting them to synthesise and extend their knowledge and skills, develop a professional identity that incorporates moral, ethical and social values, and become skilled problem solvers and life-long learners who can meet the rigours of the dynamic, competitive, and challenging world of twenty-first century legal practice. In 2009 the ALTC funded the “Curriculum renewal in legal education” project which seeks to achieve curriculum renewal for legal education through the articulation of a set of curriculum design principles for the final year and the design of a transferable model for an effective final year program. The three cornerstone capstone curriculum objectives identified by the project are closure of the tertiary experience, reflection on that experience, and transitioning from university student to legal professional. These cornerstone curriculum objectives will inform the development of the final year principles and model program. This paper will report on the progress that has been made on the project including a meeting of the project reference group held in February 2010 and the draft curriculum design principles.
Resumo:
This book Relationship-based Procurement Strategies for the 21st Century, is an important foundation document to better understand social and industry drivers from traditional adversarial contracting techniques to a more relationship-based approach building on the strengths of individual partners. This publication has evolved from the Commonwealth Government’s sponsorship of the case study of The National Museum of Australia Project—the first building construction project (as distinct from a resource development or engineering project) undertaken by a project alliance anywhere in the world.