3 resultados para Mass communication

em CentAUR: Central Archive University of Reading - UK


Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article begins by identifying a close relationship between the image of children generated by several sociologists working within the new sociology of childhood perspective and the claims and ambitions of the proponents of children's autonomy rights. The image of the child as a competent, self-controlled human agent are then subjected to observation from the perspective of Niklas Luhmann's social systems theory. The new sociology of childhood's constructivist approach is compared and contrasted with Niklas Luhmann's theory of 'operational constructivism'. The article applies tenets of Luhmann's theory, to the emergence of the new childhood sociologist's image of the child as a competent, self-controlled social agent, to the epistemological status of this image and, in particular, to claims that it derives from scientific endeavour. The article proceeds to identify two theoretical developments within sociology - sociology of identity and social agency - which have brought about fundamental changes in what may be considered 'sociological' and so 'scientific' and paved the way for sociological communications about what children,really are'. In conclusion, it argues that the merging of sociology with polemics, ideology, opinion and personal beliefs and, at the level of social systems, between science and politics represents in Luhmann's terms 'dedifferentiation'- a tendency he claims may have serious adverse consequences for modern society. This warning is applied to the scientific status of sociology - its claim to be able to produce 'facts' for society, upon which social systems, such as politics and law, may rely. Like the mass media, sociology may now be capable of producing only information, and not facts, about children.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A Theatre to Address explores the work of contemporary artists who use text as both a visual and sonic form. In this programme, text appears not primarily as a means of communication, but as something which has shape and structure of its own. The Reading Room will also be displaying work that looks at text as concrete or visual poetry, and the script in artists' practice. Clare Gasson presents a new work The traveller - walking walking walking through ... that explores the connection between the text, the rhythm and the action. Maryam Jafri presents a performance-lecture Death With Friends, a body of visual and textual material that forms the basis for her new film of the same name. Pil and Galia Kollectiv present a radical worship for the apocalypse, featuring a sermon for the Church of the Atom with live music by Gelbart.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A Universal Serial Bus (USB) Mass Storage Device (MSD), often termed a USB flash drive, is ubiquitously used to store important information in unencrypted binary format. This low cost consumer device is incredibly popular due to its size, large storage capacity and relatively high transfer speed. However, if the device is lost or stolen an unauthorized person can easily retrieve all the information. Therefore, it is advantageous in many applications to provide security protection so that only authorized users can access the stored information. In order to provide security protection for a USB MSD, this paper proposes a session key agreement protocol after secure user authentication. The main aim of this protocol is to establish session key negotiation through which all the information retrieved, stored and transferred to the USB MSD is encrypted. This paper not only contributes an efficient protocol, but also does not suffer from the forgery attack and the password guessing attack as compared to other protocols in the literature. This paper analyses the security of the proposed protocol through a formal analysis which proves that the information is stored confidentially and is protected offering strong resilience to relevant security attacks. The computational cost and communication cost of the proposed scheme is analyzed and compared to related work to show that the proposed scheme has an improved tradeoff for computational cost, communication cost and security.