465 resultados para Power gathering, Nuclear Strengthening, Alliance, Juche Ideology, Offensive Realism.

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper explores the genealogies of bio-power that cut across punitive state interventions aimed at regulating or normalising several distinctive ‘problem’ or ‘suspect’ deviant populations, such as state wards, non-lawful citizens and Indigenous youth. It begins by making some general comments about the theoretical approach to bio-power taken in this paper. It then outlines the distinctive features of bio-power in Australia and how these intersected with the emergence of penal welfarism to govern the unruly, unchaste, unlawful, and the primitive. The paper draws on three examples to illustrate the argument – the gargantuan criminalisation rates of Aboriginal youth, the history of incarcerating state wards in state institutions, and the mandatory detention of unlawful non-citizens and their children. The construction of Indigenous people as a dangerous presence, alongside the construction of the unruly neglected children of the colony — the larrikin descendants of convicts as necessitating special regimes of internal controls and institutions, found a counterpart in the racial and other exclusionary criteria operating through immigration controls for much of the twentieth century. In each case the problem child or population was expelled from the social body through forms of bio-power, rationalised as strengthening, protecting or purifying the Australian population.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The ubiquity of multimodality in hypermedia environments is undeniable. Bezemer and Kress (2008) have argued that writing has been displaced by image as the central mode for representation. Given the current technical affordances of digital technology and user-friendly interfaces that enable the ease of multimodal design, the conspicuous absence of images in certain domains of cyberspace is deserving of critical analysis. In this presentation, I examine the politics of discourses implicit within hypertextual spaces, drawing textual examples from a higher education website. I critically examine the role of writing and other modes of production used in what Fairclough (1993) refers to as discourses of marketisation in higher education, tracing four pervasive discourses of teaching and learning in the current economy: i) materialization, ii) personalization, iii) technologisation, and iv) commodification (Fairclough, 1999). Each of these arguments is supported by the critical analysis of multimodal texts. The first is a podcast highlighting the new architectonic features of a university learning space. The second is a podcast and transcript of a university Open Day interview with prospective students. The third is a time-lapse video showing the construction of a new science and engineering precinct. These three multimodal texts contrast a final web-based text that exhibits a predominance of writing and the powerful absence or silencing of the image. I connect the weightiness of words and the function of monomodality in the commodification of discourses, and its resistance to the multimodal affordances of web-based technologies, and how this is used to establish particular sets of subject positions and ideologies through which readers are constrained to occupy. Applying principles of critical language study by theorists that include Fairclough, Kress, Lemke, and others whose semiotic analysis of texts focuses on the connections between language, power, and ideology, I demonstrate how the denial of image and the privileging of written words in the multimodality of cyberspace is an ideological effect to accentuate the dominance of the institution.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This case study was conducted to explore the perceptions of health risk messages sent by the Japanese Government following the Fukushima nuclear power plant disaster. The content of health risk messages from the Japanese Government and the Japanese national broadcaster (NHK) were analysed and semi-structured interviews were conducted with a sample of Tokyo residents. Initially, participants trusted these messages but as the crisis unfolded they became sceptical about the messages. Participants felt the messages did not communicate health risk information effectively because the messages were; not supported by evidence, inconsistent, delayed and changed over time. Despite widespread access to the internet, social media and mobile telephones, most participants relied on television news for information about the health risks. The Japanese Government urgently needs to re-build trust by engaging the community in the planning and development phases of health risk communication strategies.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Despite ongoing controversies regarding possible directions for the nuclear plants program throughout Japan since the Fukushima disaster, little has been researched about people's belief structure about future society and what may affect their attitudes toward different policy options. Beyond policy debates, the present study focused on how people see a future society according to the assumptions of different policy options. A total of 125 students at Japanese universities were asked to compare a future society with society today in which one of alternative policies was adopted (i.e., shutdown or expansion of nuclear reactors) in terms of characteristics of individuals and society in general. While perceived dangerousness of nuclear power predicted attitudes and behavioural intentions to make personal sacrifices for nuclear power policies, beliefs about the social consequences of the policies, especially on economic development and dysfunction, appeared to play stronger roles in predicting those measures. The importance of sociological dimensions in understanding how people perceive the future of society regarding alternative nuclear power policies, and the subtle discrepancies between attitudes and behavioural intentions, are discussed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The marsupial genus Macropus includes three subgenera, the familiar large grazing kangaroos and wallaroos of M. (Macropus) and M. (Osphranter), as well as the smaller mixed grazing/browsing wallabies of M. (Notamacropus). A recent study of five concatenated nuclear genes recommended subsuming the predominantly browsing Wallabia bicolor (swamp wallaby) into Macropus. To further examine this proposal we sequenced partial mitochondrial genomes for kangaroos and wallabies. These sequences strongly favour the morphological placement of W. bicolor as sister to Macropus, although place M. irma (black-gloved wallaby) within M. (Osphranter) rather than as expected, with M. (Notamacropus). Species tree estimation from separately analysed mitochondrial and nuclear genes favours retaining Macropus and Wallabia as separate genera. A simulation study finds that incomplete lineage sorting among nuclear genes is a plausible explanation for incongruence with the mitochondrial placement of W. bicolor, while mitochondrial introgression from a wallaroo into M. irma is the deepest such event identified in marsupials. Similar such coalescent simulations for interpreting gene tree conflicts will increase in both relevance and statistical power as species-level phylogenetics enters the genomic age. Ecological considerations in turn, hint at a role for selection in accelerating the fixation of introgressed or incompletely sorted loci. More generally the inclusion of the mitochondrial sequences substantially enhanced phylogenetic resolution. However, we caution that the evolutionary dynamics that enhance mitochondria as speciation indicators in the presence of incomplete lineage sorting may also render them especially susceptible to introgression.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This book examines different aspects of Asian popular culture, including films, TV, music, comedy, folklore, cultural icons, the Internet and theme parks. It raises important questions such as – What are the implications of popularity of Asian popular culture for globalization? Do regional forces impede the globalizing of cultures? Or does the Asian popular culture flow act as a catalyst or conveying channel for cultural globalization? Does the globalization of culture pose a threat to local culture? It addresses two seemingly contradictory and yet parallel processes in the circulation of Asian popular culture: the interconnectedness between Asian popular culture and western culture in an era of cultural globalization that turns subjects such as Pokémon, Hip Hop or Cosmopolitan into truly global phenomena, and the local derivatives and versions of global culture that are necessarily disconnected from their origins in order to cater for the local market. It thereby presents a collective argument that, whilst local social formations, and patterns of consumption and participation in Asia are still very much dependent on global cultural developments and the phenomena of modernity, yet such dependence is often concretized, reshaped and distorted by the local media to cater for the local market. Contents: Introduction: Asian Popular Culture: The Global (Dis)continuity Anthony Y.H. Fung Part 1: The Dominance of Global Continuity: Cultural Localization and Adaptation 1. One Region, Two Modernities: Disneyland in Tokyo and Hong Kong Micky Lee and Anthony Y.H. Fung 2. Comic Travels: Disney Publishing in the People’s Republic of China Jennifer Altehenger 3. When Chinese Youth Meet Harry Potter: Translating Consumption and Middle Class Identification John Nguyet Erni 4.New Forms of Transborder Visuality in Urban China: Saving Face for Magazine Covers Eric Kit-Wai Ma 5. Cultural Consumption and Masculinity: A Case Study of GQ Magazine Covers in Taiwan Hong-Chi Shiau Part 2: Global Discontinuity: The Local Absorption of Global Culture 6. An Unlocalized and Unglobalized Subculture: English Language Independent Music in Singapore Kai Khiun Liew and Shzr Ee Tan 7. The Localized Production of Jamaican Music in Thailand Viriya Sawangchot 8. Consuming Online Games in Taiwan: Global Games and Local Market Lai-Chi Chen 9. The Rise of the Korean Cinema in Inbound and Outbound Globalization Shin Dong Kim Part 3: Cultural Domestication: A New Form of Global Continuity 10. Pocket Capitalism and Virtual Intimacy: Pokémon as a Symptom of Post-Industrial Youth Culture Anne Allison 11. Playing the Global Game: Japan Brand and Globalization Kukhee Choo Part 4: China as a Rising Market: Cultural Antagonism and Globalization 12. China’s New Creative Strategy: The Utilization of Cultural Soft Power and New Markets Michael Keane and Bonnie Liu 13. Renationalizing Hong Kong Cinema: The Gathering Force of the Mainland Market Michael Curtin

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Balancing the competing interests of autonomy and protection of individuals is an escalating challenge confronting an ageing Australian population. Legal and medical professionals are increasingly being asked to determine whether individuals are legally capable to make their own testamentary, financial and/or personal/health care decisions. Diseases such as dementia impact upon cognition which necessitates collaboration between the legal and medical professions to satisfactorily assess the effect of such mentally disabling conditions upon legal competency. Terminological and methodological differences exist between the two professions when assessing capacity in this context which subsequently create miscommunication and misunderstanding. Consequently, it is not necessarily a simple solution for a legal professional to seek the opinion of a medical practitioner. Exacerbating the situation is the fact that no consistent and transparent capacity assessment paradigm currently exists in Australia. Assessments are instead being undertaken on an ad hoc basis dependent upon the skill set of the legal and/or medical professionals involved. A qualitative study seeking the views of legal and medical professionals who practise in this area has been conducted. This incorporated a review of the relevant literature and surveys which informed the semi-structured interviews conducted with 10 legal and 20 medical practitioners. Practitioners were asked whether there is a standard approach to assessment and whether national guidelines would assist. The general consensus was that uniform guidelines would be advantageous. The research also canvassed practitioner views as to the state of the relationship between the professions when assessing capacity. Three promising practices have emerged from this research: first, is the need for the development of national guidelines and supporting principles to satisfactorily assess capacity; second, is the possibility of strengthening the relationship between legal and medical professionals to assist in the satisfactory assessment of legal capacity; and third, the need for increased community education.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Retail employees are the prototypical vulnerable, low-paid employees, and for that reason unionism and its benefits, such as collective bargaining, provide important social protection. However, the reasons that make employees vulnerable also reduce union power though that is not to say that retail unions lack agency. This article analyses the power resources and their deployment in the respective retail unions in Australia and New Zealand. The two unions’ strategies are quite different, and provide interesting contrasts in approaches and ideology. The implications for theory are that ideology matters with respect to union strategy (and should be attended to more thoroughly in studies of union renewal) and – as others have also argued – the wider institutional context has a very significant influence on outcomes for unions and their members. The implication for practice, therefore, is that both workplace and extra-workplace strategies in the political and other arenas remain central for the low-paid.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The concept of ‘power’ can refer to the institutionalised and embodied capacity and right to dominate through a variety of means including ideology, politics, science, religion, class, race, gender and sexuality. Early feminist theorising within the West, for example, conceptualised the structure and nature of power as being connected to male domination and authority within society. Marxists, alternately, argue it is the ruling class that holds power and exercises it as owners of the means of production. In a general sense, we can say that as feminists have tied power to patriarchy and Marxists’ definitions of power have been connected to capitalism. The essays in this section, though, are less concerned with such totalising conceptualisations of power than they are with processes of interpellation or subject creation within dominant or dominating discursive spaces.1 Not power as such, but its many workings and apparatuses.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This report provides an overview of the tornado impact on the safe operation and shutdown of nuclear power plants in the United States. The motivation for this review stems from the damage and failure of the Fukushima nuclear power plant on March 11, 2011. That disaster warrants comparison of the safety measures in place within the global nuclear power industry.