217 resultados para Identity, superstructural articulations, collapsed capitalism.
Resumo:
It is now widely accepted that first year students benefit from pedagogies which mediate and support their transitions to university, and assist them to develop an adaptive student identity. We present an initiative which takes an alternative and additional approach to this way of viewing the first year experience. Based on research into creative industries career trajectories, this initiative focuses on the establishment of nascent career identity and professional self-concept amongst 600 first semester Bachelor of Creative Industries (BCI) students at QUT. The BCI is offered as a three year undergraduate program involving self-selection of majors, minors and electives, and also as a four year double degree with Business and Law faculties. Students engage in a scaffolded process of initial career visioning and reflective course planning, based on their own industry and careers research, guided by industry-active academic and careers staff, and drawing upon the experiences of final year students.
Resumo:
The presence of air and bone interfaces makes the dose distribution for head and neck cancer treatments difficult to accurately predict. This study compared planning system dose calculations using the collapsed-cone convolution algorithm with EGSnrcMonte Carlo simulation results obtained using the Monte Carlo DICOMToolKit software, for one oropharynx, two paranasal sinus and three nodal treatment plans. The difference between median doses obtained from the treatment planning and Monte Carlo calculations was found to be greatest in two bilateral treatments: 4.8%for a retropharyngeal node irradiation and 6.7% for an ethmoid paranasal sinus treatment. These deviations in median dose were smaller for two unilateral treatments: 0.8% for an infraclavicular node irradiation and 2.8% for a cervical node treatment. Examination of isodose distributions indicated that the largest deviations between Monte Carlo simulation and collapsed-cone convolution calculations were seen in the bilateral treatments, where the increase in calculated dose beyond air cavities was most significant.
Resumo:
The structure of the travel, meant as cultural activity, is proposed as a key to read and design the urban or rural landscape.
Resumo:
The Italian Colonial Experience in the design of the built environment is analysed as a case study of State image promotion.
Resumo:
Teachers’ professional conversations regarding the qualities evidenced in student work provide opportunities to develop a shared understanding of achievement standards. This research investigates social moderation conducted in a synchronous online mode as a specific form of professional conversation. The discussion considers the different factors that influenced these conversations which included the technologic medium of the meeting. The focus of the discussion is how participation in online moderation can support teachers to develop an assessment identity as one who works within a standards-based assessment system. Qualitative data were gathered from middle school teachers from different year levels, in different curriculum areas, in diverse geographic locations, and in a range of sociocultural contexts within Queensland, Australia. Analysis of the data through a sociocultural lens of becoming suggests that participation in online moderation, while challenging for teachers, can also provide opportunities to construct and to negotiate an identity as an assessor of student work.
Resumo:
"Defrauding land titles systems impacts upon us all. Those who deal in land include ordinary citizens, big business, small business, governments, not-for-profit organisation, deceased estates...Fraud here touches almost everybody." the thesis presented in this paper is that the current and disparate steps taken by jurisdictions to alleviate land fraud associated with identity-based crimes are inadequate. The centrepiece of the analysis is the consideration of two scenarios that have recently occurred. One is the typical scenario where a spouse forges the partner's signature to obtain a mortgage from a financial institution. The second is atypical. It involves a sophisticated overseas fraud duping many stakeholders involved in the conveyancing process. After outlining these scenarios, we will examine how identity verification requirements of the United Kingdom, Ontario, the Australian states, and New Zealand would have been applied to these two frauds. Our conclusion is that even though some jurisdictions may have prevented the frauds from occurring, the current requirements are inadequate. We use the lessons learnt to propose what we consider core principles for identity verification in land transactions.
Resumo:
The development of the Australian Curriculum has reignited a debate about the role of Australian literature in the contexts of curricula and classrooms. A review of the mechanisms for promoting Australian literature including literary prizes, databases, surveys and texts included for study in senior English classrooms in New South Wales and Victoria provides a background for considering the purpose of Australian texts and the role of literature teachers in shaping students’ engagement with literature.
Resumo:
The World Wide Web constitutes one of the most important inventions of the late 20th century: it has changed culture, society, business, communication, politics, and many other fields of human endeavour, not least also by providing a more user-friendly pathway of access to its major underlying technology, the Internet itself. Key phases in its development can be charted, especially by how it has been used to present and share information – and here, the personal or professional, private or official homepage stands in as a useful representation of wider Web trends overall. From hand-coded beginnings through several successive stages of experimentation and standardisation, to the shifting balance between personal sites and social networks, the homepage demonstrates how the Web itself, and its place in our lives, have changed.
Resumo:
Digital Stories are short autobiographical documentaries, often illustrated with personal photographs and narrated in the first person, and typically produced in group workshops. As a media form they offer ‘ordinary people’ the opportunity to represent themselves to audiences of their choosing; and this amplification of hitherto unheard voices has significant repercussions for their social participation. Many of the storytellers involved in the ‘Rainbow Family Tree’ case study that is the subject of this paper can be characterised as ‘everyday’ activists for their common desire to use their personal stories to increase social acceptance of marginalised identity categories. However, in conflict with their willingness to share their personal stories, many fear the risks and ramifications of distributing them in public spaces (especially online) to audiences both intimate and unknown. Additionally, while technologies for production and distribution of rich media products have become more accessible and user-friendly, many obstacles remain. For many people there are difficulties with technological access and aptitude, personal agency, cultural capital, and social isolation, not to mention availability of the time and energy requisite to Digital Storytelling. Additionally, workshop context, facilitation and distribution processes all influence the content of stories. This paper explores the many factors that make ‘authentic’ self-representation far from straight forward. I use qualitative data drawn from interviews, Digital Story texts and ethnographic observation of GLBTQIS participants in a Digital Storytelling initiative that combined face-to-face and online modes of participation. I consider mediating influences in practice and theory and draw on strategies put forth in cultural anthropology and narrative therapy to propose some practical tools for nuanced and sensitive facilitation of Digital Storytelling workshops and webspaces. Finally, I consider the implications of these facilitation strategies for voice, identity and social participation.
Resumo:
A review of the 6th APT focusing on the work and performance of Rohan Wealleans
Resumo:
The increase of online services, such as eBanks, WebMails, in which users are verified by a username and password, is increasingly exploited by Identity Theft procedures. Identity Theft is a fraud, in which someone pretends to be someone else is order to steal money or get other benefits. To overcome the problem of Identity Theft an additional security layer is required. Within the last decades the option of verifying users based on their keystroke dynamics was proposed during login verification. Thus, the imposter has to be able to type in a similar way to the real user in addition to having the username and password. However, verifying users upon login is not enough, since a logged station/mobile is vulnerable for imposters when the user leaves her machine. Thus, verifying users continuously based on their activities is required. Within the last decade there is a growing interest and use of biometrics tools, however, these are often costly and require additional hardware. Behavioral biometrics, in which users are verified, based on their keyboard and mouse activities, present potentially a good solution. In this paper we discuss the problem of Identity Theft and propose behavioral biometrics as a solution. We survey existing studies and list the challenges and propose solutions.
Resumo:
Internet services are important part of daily activities for most of us. These services come with sophisticated authentication requirements which may not be handled by average Internet users. The management of secure passwords for example creates an extra overhead which is often neglected due to usability reasons. Furthermore, password-based approaches are applicable only for initial logins and do not protect against unlocked workstation attacks. In this paper, we provide a non-intrusive identity verification scheme based on behavior biometrics where keystroke dynamics based-on free-text is used continuously for verifying the identity of a user in real-time. We improved existing keystroke dynamics based verification schemes in four aspects. First, we improve the scalability where we use a constant number of users instead of whole user space to verify the identity of target user. Second, we provide an adaptive user model which enables our solution to take the change of user behavior into consideration in verification decision. Next, we identify a new distance measure which enables us to verify identity of a user with shorter text. Fourth, we decrease the number of false results. Our solution is evaluated on a data set which we have collected from users while they were interacting with their mail-boxes during their daily activities.