484 resultados para Authenticity
Resumo:
Devising assessment tasks for large units that embrace academic goals of authenticity and assessment variety can be a challenge. We developed an online Role-Play Assessment Initiative for first year nursing students in bioscience. Students responded to a case study by preparing two role-play dialogues: as a nurse with the patient, and between two nurses. The aims were to assess whether the students could: 1) understand the underlying disease process (pathophysiology) and relate it to clinical practice; 2) use language appropriate for lay and medical conversation; and 3) apply information using active learning. We conducted a student survey using quantitative questions (Likert scale: 1=strongly disagree to 5=strongly agree), and qualitative questions. 65 completed surveys were received. 80% of respondents agreed (includes agree or strongly agree) that it was a useful way to learn and understand pathophysiology of the case study. 86% agreed that it was useful to apply pathophysiology from lectures to a clinical setting. Overall, students found it enjoyable, which is beneficial for enhanced student engagement, and agreed that it allowed them to work well in a group (74% and 85%, respectively). Most qualitative suggestions for improvement related to group work, despite the encouraging response to group work in quantitative questions. Most positive comments surrounded different communication with a nurse compared with a patient. These results demonstrate that students developed deeper understanding of pathophysiology through active learning and were able to expand their nursing career skills during the role-play. Learning using role-play to simulate the workforce has fostered active learning.
Resumo:
BIM as a suite of technologies has been enabled by the significant improvements in IT infrastructure, the capabilities of computer hardware and software, the increasing adoption of BIM, and the development of Industry Foundation Classes (IFC) which facilitate the sharing of information between firms. The report highlights the advantages of BIM, particularly the increased utility and speed, better data quality and enhanced fault finding in all construction phases. Additionally BIM promotes enhanced collaborations and visualisation of data mainly in the design and construction phase. There are a number of barriers to the effective implementation of BIM. These include, somewhat paradoxically, a single detailed model (which precludes scenarios and development of detailed alternative designs); the need for three different interoperability standards for effective implementation; added work for the designer which needs to be recognised and remunerated; the size and complexity of BIM, which requires significant investment in human capital to enable the realisation of its full potential. There are also a number of challenges to implementing BIM. The report has identified these as a range of issues concerning: IP, liability, risks and contracts, and the authenticity of users. Additionally, implementing BIM requires investment in new technology, skills training and development of news ways of collaboration. Finally, there are likely to be Trade Practices concerns as requiring certain technology owned by relatively few firms may limit
Resumo:
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in efficient and secure information processing. A hash function processes an arbitrary finite length input message to a fixed length output referred to as the hash value. As a security requirement, a hash value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle–Damgård construction are followed in almost all widely used standard hash functions such as MD5 and SHA-1.
Resumo:
In the modern era of information and communication technology, cryptographic hash functions play an important role in ensuring the authenticity, integrity, and nonrepudiation goals of information security as well as efficient information processing. This entry provides an overview of the role of hash functions in information security, popular hash function designs, some important analytical results, and recent advances in this field.
Resumo:
The theoretical contribution of this study lies with its focus on subjective experiencing, that is, the emotional convergence between feeling states, and perceptions of servicescapes and holiday activities. An empirical study models the impact of recreational needs on the perceived importance of destination attributes and intentions to participate in activities. A sample of prospective tourists was asked to indicate how important they considered servicescape elements to be in their general holiday planning. They were also asked to report on their emotional state (orientation) as a proxy for their needs for recreation, and to state their intention and likely involvement with holiday activities. Results suggest that those with high recreational needs (self-reflexive and inward-looking) regard elements of tourism servicescapes as significantly more important than those without (who are outward-looking and energetic), as well as show significant variations in their inclinations to be active and explorative at destinations. Rather, those with higher recreational needs as measured by combinations of lack of energy, self-confidence, and physiological well-being look for creature comfort, coziness, and familiarity, in other words, for things they already know and have experienced before. Subjective experiencing and service performance evaluations are thereby suggested to be influenced by emotional states. These states may also impact tourists' recognition of destination uniqueness as a major component of a destination's competitive advantage that cannot easily be copied. As a consequence, it may be worth reconsidering the role of recreation in tourism service design. Turning an inwardlooking focus bent on recreation to an outward-looking one interested in discovery would enable more tourists to more fully experience the destination before they leave.
Resumo:
Tourism Australia’s launch of the ‘Restaurant Australia’ marketing campaign in 2014 is aimed at changing perceptions of the ‘prawn on the barbeque’ image of Australian culinary culture. The campaign is the government's response to global research that reveals that tourists want ‘good’ food and wine experiences (in Australia?). In effect, ‘Restaurant Australia’, and the AUS$10 million supporting it, is promoting? the notion that Australian tourism should provide epicurean food experiences associated with high quality and ‘authentic cultural’ tourism, rather than contrived versions of national identity articulated via stereotypical notions of national cuisine. This paper adopts a cultural tourism approach, especially in relation to theories of authenticity and the relationship of post-tourists, cultural tourists, and tactical tourists to examine two very different areas of wine and food production in Australia in the context of the Restaurant Australia campaign. In particular, it considers issues associated with defining Australian cuisine and the development of a narrative about Australia as a epicurean destination.
Resumo:
In this article, cosmopatriotism is seen to describe an effect of transnational capitalism’s need to “settle down” in particular localities. The self-imaging of female singer Krisdayanti and punk band Superman is Dead serve as agentive forces in the working out of novel, post-New Order modernities. The body, in particular, is an important site to inscribe a sense of authenticity and social mobility, as well as to work out a sense of post-Suharto Indonesian-ness.
Resumo:
A wide range of decision-making models have been offered to assist in making ethical decisions in the workplace. Those that are based on normative moral frameworks typically include elements of traditional moral philosophy such as consequentialist and/or deontological␣ethics. This paper suggests an alternative model drawing on Jean-Paul Sartre’s existentialism. Accordingly, the model focuses on making decisions in full awareness of one’s freedom and responsibility. The steps of the model are intended to encourage reflection of one’s projects and one’s situation and the possibility of refusing the expectations of others. A case study involving affirmative action in South Africa is used to demonstrate the workings of the model and a number of strengths and weaknesses are identified. Despite several weaknesses that can be raised regarding existential ethics, the model’s success lies in the way that it reframes ethical dilemmas in terms of individual freedom and responsibility, and in its acceptance and analysis of subjective experiences and personal situations
Resumo:
Husserl reminded us of the imperative to return to the Lebensweldt, or life-world. He was preoccupied with the crisis of Western science which alienated the experiencing self from the world of immediate experience. Immediate experience provides a foundation for what it means to be human. Heidegger, building upon these ideas, foresaw a threat to human nature in the face of ‘technicity’. He argued for a return to a relationship between ‘authentic self’ and nature predicated upon the notion of ‘letting be’ in which humans are open to the mystery of being. Self and nature are not conceived as alienated entities but as aspects of a single entity. In modern times, separation between self and the world is further evidenced by scientific rational modes of being exemplified through consumerism and the incessant use of screen-based technology which dominate human experience. In contrast, extreme sports provide an opportunity for people to return to the life-world by living in relation to the natural world. Engagement in extreme sports enables a return to authenticity as we rediscover self as part of nature.
Resumo:
Over the past decade there has been a surge of interest in behind-the-scenes events from mainstream dance companies and audiences alike. Online videos, open classes, open rehearsals, and backstage tours all provide insights for audiences about daily life in a dance company and how dance work is made. This article focuses on the use of open rehearsals in studio sites and investigates audience experience and relationship with dancers during these events. Applying Clare Dyson’s (2010) scales of audience engagement, I analyse two open rehearsal models that I observed as an audience participant in 2013: Friends Open Days with English National Ballet (London), and Inner Workings with Chunky Move (Melbourne). Through this analysis, open rehearsals emerge as an experience with elements reminiscent of both the traditional presentation paradigm and non-traditional presentation models. Elements such as close audience-dancer proximity, authenticity, and experiences in liminal sites, such as staircases and green rooms, present the possibility of new audience-dancer relationship within the mainstream dance company context.
Resumo:
This chapter discusses the fast emerging challenges for Malay and Muslim sexual minority storytellers in the face of an aggressive state-sponsored Islamisation of a constitutionally secular Malaysia. I examine the case of Azwan Ismail, a gay Malay and Muslim Malaysian who took part in the local ‘It Gets Better’ project, and who suffered an onslaught of hostile comments from fellow Malay Muslims. Azwan’s experience makes one question how a message of discouraging suicidal tendencies among sexual minority youths can be so vehemently misperceived. Azwan’s existential challenges – stemming from the tension between his own constructions of self and those of others – (re)present a unique challenge in the long struggle for human rights. In my examination of the arising contradictions, I highlight the challenges for Azwan’s existential self – one who is deemed morally bankrupt by hostile audiences. The purist Sunni Islam agenda in a constitutionally secular Malaysia not only rejects the human rights of the sexual minorities in Malaysia but has also influenced, and is often a leading hostile voice in both regional and international blocs. This self-righteous, supremacist and authoritarian Islam discourages discourse and attacks all differing opinions. This resulting disabling environment for vulnerable, minority communities and their human rights manifests in State-endorsed discrimination, compulsory counselling, forced rehabilitation and criminalisation. It places the rights of the sexual minorities to live within such a society in doubt. In discussing the arising issues, I draw upon literature that investigates the way in which personal stories have traditionally been used to advance human rights. Included too, is the significance and implications of the work by social psychologists in explaining the loss of credibility of personal stories. I then advance an analytical framework that will allow storytelling as a very individual form of witnessing to reclaim and regain its ‘truth to power’.
Resumo:
Stephen Gray is a writer and law lecturer who has been living in Darwin since 1989. He started out writing formal legal pieces about how copyright law had unsuccessfully sought to accommodate Aboriginal art. Such work led him to further investigate the philosophical questions underlying the legal issues affecting both traditional and urban Indigenous people. Gray has also explored matters of bioprospecting in relation to Indigenous biological resources. He has investigated the introduction of a label of authenticity into Australia. Gray has also published a number of articles about other legal issues affecting Indigenous people. He has explored such topics as native title, customary law, alternative dispute resolution, and criminal law. Gray has recently been awarded The Australian/ Vogel Literary Award for his novel The Artist is a Thief. He was inspired to write a book after being sent out to a community on a possible copyright claim as part of his job in the law faculty of Northern Territory University: "I wrote an academic article and then a more philosophical piece talking about the copyright act and the way it doesn't really protect traditional artists who have a very different view of the place of their art. The pieces were interesting, but I felt there was something more there that needed a fictional expression as well." It is ironic that such a self-conscious and sophisticated meditation upon appropriation and authenticity should win The Australian/ Vogel Literary Award. The inaugural award in 1980 was won by Paul Radley, who later revealed his books were mostly written by his uncle, and in 1993 it was won by Helen Demidenko, aka Darville, who had lied about her Ukrainian background and family history.
Resumo:
Testing the strategies of discourse and materiality, this practice-based and practice-led research experiments with how anonymous storytelling by vulnerable communities, like that of the sexual minorities and their allies in Malaysia, can better speak to their human rights issues without further subjecting them to personal attacks and targetted persecution. The research identifies the critical role of the voice in lending authenticity and credibility to first person narratives; and contextual credibility as a form of credibility which personal stories naturally aspire to achieve with audiences. Adopting a discursive view of persuasion and recognising too that the power of persuasion may in effect lie with those who receive these stories rather than with those who tell them, the insights and knowledge gained from the research informed the development of the field output, Persuasive Storytelling by Vulnerable Communities in Aggressive Contexts: A Human Rights Communication Framework.
Resumo:
This paper considers recent discussion of the possible use of ‘love drugs’ and ‘anti-love drugs’ as a way of enhancing or diminishing romantic relationships. The primary focus is on the question of whether the idea of using such products commits its proponents to an excessively reductionist conception of love, and on whether the resulting ‘love’ in the use of ‘love drugs’ would be authentic, to the extent that it would be brought about artificially.
Resumo:
Background The problem of developing and sustaining mutual trust is one of the main barriers to knowledge sharing on social media platforms such as blogs, wikis, micro-blogs and social networking websites. While many studies argue that mutual trust is necessary for online communication and knowledge sharing, few have actually explored and demonstrated how physicians can establish and sustain trusted relationships on social media. Objectives To identify approaches through which physicians establish interpersonal trust on social media. Methods Twenty-four physicians, who were active users of social media, were interviewed using a semi-structured approach between 2013 and 2014. Snowball sampling was employed for participant recruitment. The data were analysed using a thematic analysis approach. Results Physicians trust their peers on social media in a slightly different way than in face-to-face communication. The study found that the majority of participants established trust on social media mainly through previous personal interaction, authenticity and relevancy of voice, professional standing, consistency of communication, peer recommendation, and non-anonymous and moderated sites. Conclusions Healthcare professionals need to approach social media carefully when using it for knowledge sharing, networking and developing trusted relations with like-minded peers.