863 resultados para Foundational myth
Resumo:
O que caracteriza uma pesquisa acadêmica num curso de doutorado é a apresentação de dois quesitos fundamentais. O primeiro é o elemento de inovação, capaz de enriquecer a pesquisa sobre o tema proposto. O segundo é o dos apontamentos como possibilidades de promoverem novos caminhos de releituras. Nesse sentido, nos convencemos de que a presente tese atende a expectativa, pois, o elemento inovador desta pesquisa é a desconstrução do conceito de saga da criação proposto por Karl Barth. É novo porque não encontramos, como suspeitávamos, nenhum autor, ou mesmo obra ou pesquisa que tenha proposto esta mesma tarefa. Ao contrário, há até alguns autores que enaltecem a pesquisa realizada por Karl Barth, como é o caso de Coats e Brueggemann. Apesar de reagirem a alguns pontos da teologia de Barth, porém, não o fizeram, especificamente, ao conceito de saga. O segundo quesito, estruturalmente ligado ao primeiro, é o que promove as possibilidades de releituras. A partir do pensamento de Paul Ricoeur propomos uma nova hermenêutica bíblica, fundamentada a partir daquilo que Ricoeur chamou de via longa, que utiliza-se de vários métodos, inclusive o histórico crítico, para se buscar uma interpretação do mundo do texto que gere sentido ao mundo frente ao texto. Acreditamos que esta proposta é capaz de superar a leitura puramente dogmática do mundo do texto. De acordo com Ricoeur, acreditamos que os elementos fundantes que pautaram a hermenêutica em torno do Dasein, ou mesmo, em torno da relação sujeito/objeto podem contribuir para uma nova hermenêutica, desde que não façam as mesmas concessões ao sujeito conhecente. Assim, a possibilidade de uma nova releitura se revela a partir daquilo que Ricoeur definiu, na relação dialética entre mundo do texto e mundo frente ao texto, como representância (réprésentance) revelante e transformante. E é nesse ponto que as Sagradas Escrituras ocupam o posto de fonte de revelação e inspiração.
Resumo:
Police records of 38 rape allegations, evenly split into maintained-as-true and withdrawn-as-false categories were compared with 19 generated-false statements from recruited participants. The Illinois Rape Myth Acceptance Scale (IRMAS) was used to assess the attitudes of the participants and a content analysis derived from IRMAS was used to compare the three categories of allegation. Rape myths were present in all three allegation types. The two categories of false allegation both contained more rape myths than the true allegations but no differences were found between the generated and withdrawn false allegations. High scorers in IRMAS also produced more violent false accounts. In addition to these findings, this study provides support for the further examination of rape myths in both false and true statements and use of generated allegations as proxies for real false statements.
Resumo:
Previous research has identified healthcare professionals' belief in myths about children's experience of pain as a cause of inadequate pain treatment. In this study, 47 doctors and 36 nurses involved in paediatric care completed a detailed questionnaire on 'pain myths'. The findings indicate a more informed awareness among healthcare professionals regarding childhood pain than previously suggested and that unconditional belief in 'pain myths' is not widespread.
Resumo:
This paper explores the nature of private social and environmental reporting (SER). From interviews with UK institutional investors, we show that both investors and investees employ Goffmanesque, staged impression management as a means of creating and disseminating a dual myth of social and environmental accountability. The interviewees' utterances unveil private meetings imbued with theatrical verbal and physical impression management. Most of the time, the investors' shared awareness of reality belongs to a Goffmanesque frame whereby they accept no intentionality, misrepresentation or fabrication, believing instead that the 'performers' (investees) are not intending to deceive them. A shared perception that social and environmental considerations are subordinated to financial issues renders private SER an empty encounter characterised as a relationship-building exercise with seldom any impact on investment decision-making. Investors spoke of occasional instances of fabrication but these were insufficient to break the frame of dual myth creation. They only identified a handful of instances where intentional misrepresentation had been significant enough to alter their reality and behaviour. Only in the most extreme cases of fabrication and lying did the staged meeting break frame and become a genuine occasion of accountability, where investors demanded greater transparency, further meetings and at the extreme, divested shares. We conclude that the frontstage, ritualistic impression management in private SER is inconsistent with backstage activities within financial institutions where private financial reporting is prioritised. The investors appeared to be in a double bind whereby they devoted resources to private SER but were simultaneously aware that these efforts may be at best subordinated, at worst ignored, rendering private SER a predominantly cosmetic, theatrical and empty exercise. © 2013 Elsevier Ltd.
Resumo:
The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.
Resumo:
This quasi-experimental study (N = 139) measured the effect of a reader response based instructional unit of the novel Speak on adolescents' rape myth acceptance. Participants were eighth grade language arts students at a Title I middle school in a major metropolitan school district. Seven classes were randomly assigned to treatment ( n = 4) or control (n = 3) condition. Two teachers participated in the study and both taught both treatment and control classes. The study lasted a period of five weeks. Participants were pretested using the Rape Myth Acceptance Scale (Burt, 1980) and a researcher created scale, the Adolescent Date Rape Scale (ADRMS). Analysis of pretests showed the ADRMS to be a reliable and valid measure of rape myth acceptance in adolescents. Factor analysis revealed it to have two major components: "She Wanted It" and "She Lied." Pretests supported previous studies which found girls to have significantly lower initial levels of rape myth acceptance than boys (p < .001). A 2 (group) x 2 (instructor) x 2 (sex) ANCOVA using ADRMS pretest as a covariate and ADRMS posttest as a dependent variable found that treatment was effective in reducing rape myth acceptance (p < .001, η2 = .15). Boys with high rape myth acceptance as demonstrated by pretest scores of 1 standard deviation above the mean on ADRMS did not have a backlash to treatment. Extended analysis revealed that participants had significantly lower scores posttest on Factor 1, "She Wanted It" (p < .001, η2 = .27), while scores on Factor 2, "She Lied" were not significantly lower (p = .07). This may be because the content of the novel primarily deals with issues questioning whether the main characters assault was a rape rather than a false accusation. Attrition rates were low (N = 15) and attrition analysis showed that drop outs did not significantly alter the treatment or control groups. Implications for reader response instruction of young adult literature, for research on rape myth acceptance in secondary schools, and for statistical analysis of effect size using pretests as filters are discussed.
Resumo:
Adolescents are at the greatest risk for victimization and perpetration of sexual assault. This paper examines the current trends in literacy education which marginalize aesthetic reading experiences and using reader response theory, and argues that young adult literature may provide an opportunity to reduce rape myth acceptance in adolescents.
Resumo:
The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.
Resumo:
Thèse numérisée par la Direction des bibliothèques de l'Université de Montréal.
Resumo:
Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.