899 resultados para INTERSECTION
Resumo:
Community-based arts and media movements have been intsrumental in building population-wide creative capacity for cultural development, social participation and social transformation in many parts of the world. Digital storytelling is a form of media practice that was pioneered in the United States at the intersection of these movements. It is described here as a ‘co-creative’ media production method. This description aims to differentiate the approaches to collaborative content creation that are used in community cultural development (CCD) and community media movements from those valued in professional and consumer modes of media production. Yet, the products of co-creative practices, such as digital stories, do not circulate widely through existing media networks or through the newer social media networks that Australian CCD and community media movements anticipated by at least twenty years. The complex politics of story ownership are one of a number of factors that often render ‘publication’ a secondary consideration in the making of digital stories. The possibility of ‘downstream’ use and re-use of stories in other networks is not usually considered in initial planning and development processes. As landmark projects such as Capture Wales indicate, even where stories are made for broadcast outcomes, television can be a problematic window for exhibiting digital stories. Scepticism about the brave new world of reality television and user generated content also circulates in digital storytelling networks, especially when it comes to ethical concerns for managing the risks of harm associated with widespread distribution of digital stories to indiscriminate publics. This publication reports on a collaborative action research project that took a closer look at some of the constraints relating to the problems of re-purposing digital stories for television. It focussed on ‘best practice’ for managing the risks of harm to storytellers in the process of re-purposing digital stories for broadcast on community television.
Resumo:
This study investigated the impact of digital networked social interactions on the design of public urban spaces. Urban informatics, social media, ubiquitous computing, and mobile technology offer great potential to urban planning, as tools of communication, community engagement, and placemaking. The study considers the function of public spaces as 'third places,' that is, social places that are familiar, comfortable, social and meaningful for everyday life outside the home and work. Libraries were chosen as the study's focus. The study produced findings and insights at the intersection of urban planning (place), cultural geography and urban sociology (people), and information communication technology (technology) – the triad of urban informatics.
Resumo:
In policy circles, transit oriented development (TOD) is believed to enhance social capital, however empirical evidence of this relationship is lacking. This research compares levels of social capital between TOD vs. non-TOD areas in Brisbane, Australia. Using a Two Step cluster analysis technique, three types of neighbourhood groupings were identified based on net employment density, net residential density, land use diversity, intersection density, and public transport accessibility: TODs, transit adjacent development (TADs) and traditional suburbs. Two dimensions of social capital were measured (trust and reciprocity, connections with neighbours) based on factor analysis of eight items representing elements of social capital. Multivariate regression analyses were conducted to identify links between the distributions of the dimensions of social capital on areas defined as TODs, TADs, and traditional suburbs controlling for socio-demographics and environmental factors. Results show that individuals living in TODs had a significantly higher level of trust and reciprocity and connections with neighbours compared with residents of TADs. It appears that TODs may foster the development of social sustainability.
Resumo:
This chapter is concerned with innovation that involves creative cultural occupations, but not within the creative industries. Rather, we examine the operation of cultural creative occupations that exist outside the creative industries - so-called 'embedded creatives' who work across all industry sectors (Cunningham and Higgs 2009). In doing so, we concur with Bilton (2007) that the separation of creative industries from other industries is a 'false step'. All industries must be innovative; however, they also must be able to combine both scientific and artistic creativity, and that creativity comes from the intersection of different thinking styles (Kurtzberg 2005). Moreover, we suggest that there are now detailed empirical studies, as well as a nascent theoretical base, to suggest that the transdisciplinarity which results from embedded cultural creativity is an engine of growth in the broader economy. Thus, it is relevant to both policymakers and managers. This chapter addresses the following questions: What is the role and significance of the embedded creative? Given a paucity of detailed empirical work in the area to date, what can be deduced from what extant literature there is about the nature of employment and management of these workers? And what are the practical implications of these consideration?
Resumo:
These wordless songs were composed as music first, and soundtrack second. There is a difference. A soundtrack will always be connected with whatever it is accompanying. Music doesn’t neccessarily need to reference anything else. The Empty City transformed a picture book into a non-verbal performance combining the live and animated. Without spoken words the show would dance on the dangerous intersection of music, image and action. In both theatre and film (and this production drew on both traditions) soundtrack and music are often added on at the end when everything’s been pre-determined, a passive, responsive mode for such a powerful artform. It’s literally added in ‘post’. In The Empty City, music was present from its inception and grew with the show. It was active in process and product. It frequently led rehearsals and shaped other key decisions in virtual and live performance. Rather than tailor-make music towards pre-determined moments, independent compositions created without specific reference to narrative experimented with the creation of a flock of small musical pieces. I was interested in seeing how they flew and where they roosted, rather than having them born and raised in (narrative) captivity. The sonic palette is largely acoustic, incorporating ukulele, prepared piano and supported by a range of other elements tending towards electronica. Eventually more than seventy pieces of music were made for this show, twice the number used. These pieces were then placed in relation to the emerging scenes, then adapted in duration, texture and progression to develop a relationship with the scene. In this way, music (even when it’s synced) has a conversation with a performance, an exchange that may result in surprise rather than fulfillment of expectation. Leitmotif emerged from loops and layers, as the pieces of music ‘conversed’ with each other, rather than being premeditated and imposed. Nineteen of these tracks are compiled for this release, which finds the compositions (which progressed through many versions) poised at the moment between their fullest iteration as ‘music’ and their editing and full incorporation into a sychronised soundtrack. They are released as the began: as 'music-alone' (Kivy) In picture-book writing, the mutual interplay of text and image is sometimes referred to as interanimation , and this is the kind of symbiosis this project sought in the creation of the soundtrack. Reviewers of the noted the important role of the soundtrack in two separate productions of The Empty City: “The original score…takes centre stage” (Borhani, 2013) “…swept up in its repetition of sounds and images, like a Bach fugue” (Zampatti, 2013)
Resumo:
Located at the intersection of two vulnerable groups in the contemporary labour market, young people who migrate as refugees during adolescence face a unique constellation of opportunities and challenges that shape their employment trajectories. Yet the tendency for research to focus on the early years of refugee settlement means that we have an inadequate understanding the factors that mediate their employment decisions, experiences and outcomes. Based on interviews with 51 young people, this article explores how aspirations, responsibilities, family, education and networks are understood to influence the employment trajectories of adolescent refugee migrants. While this article draws attention to the complex and dynamic range of challenges and constraints that these young people negotiate in the pursuit of satisfying and sustainable employment, what also emerges is an optimistic and determined cohort who, even as they at times unsuccessfully prepare for and navigate the labour market, maintain high hopes for a better life.
Resumo:
Much of the existing empirical research on journalism focuses largely on hard-news journalism, at the expense of its less traditional forms, particularly the soft-news areas of lifestyle and entertainment journalism. In focussing on one particular area of lifestyle journalism – the reporting of travel stories – this paper argues for renewed scholarly efforts in this increasingly important field. Travel journalism’s location at the intersection between information and entertainment, journalism and advertising, as well as its increasingly significant role in the representation of foreign cultures makes it a significant site for scholarly research. By reviewing existing research about travel journalism and examining in detail the special exigencies that constrain it, the article proposes a number of dimensions for future research into the production practices of travel journalism. These dimensions include travel journalism’s role in mediating foreign cultures, its market orientation, motivational aspects and its ethical standards.
Resumo:
Introduction In a connected world youth are participating in digital content creating communities. This paper introduces a description of teens' information practices in digital content creating and sharing communities. Method The research design was a constructivist grounded theory methodology. Seventeen interviews with eleven teens were collected and observation of their digital communities occurred over a two-year period. Analysis The data were analysed iteratively to describe teens' interactions with information through open and then focused coding. Emergent categories were shared with participants to confirm conceptual categories. Focused coding provided connections between conceptual categories resulting in the theory, which was also shared with participants for feedback. Results The paper posits a substantive theory of teens' information practices as they create and share content. It highlights that teens engage in the information actions of accessing, evaluating, and using information. They experienced information in five ways: participation, information, collaboration, process, and artefact. The intersection of enacting information actions and experiences of information resulted in five information practices: learning community, negotiating aesthetic, negotiating control, negotiating capacity, and representing knowledge. Conclusion This study contributes to our understanding of youth information actions, experiences, and practices. Further research into these communities might indicate what information practices are foundational to digital communities.
Resumo:
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.
Resumo:
Creative Development: The Body and Light. Within the current cultural climate, the independent choreographer struggles to pursue and establish their artistic career outside the infrastructure of mainstream dance companies. The independent choreographer is challenged to articulate alternative choreographic models without the support of that infrastructure. My research examines that challenge by exploring my own independent choreographic practice through a number of performance-based dance projects. This exploration will be underpinned by theoretical research to enable clarification of the tacit understandings of an embodied practice and the point of intersection between practice and theory so as to articulate alternative choreographic models. As a starting point for that enquiry, an example is provided of how questions that emerge from within the choreographic practice can be discussed in terms of research through an initial investigation exploring light in relation to the moving body and the implications of atmospheres.
Resumo:
This study unveils causes of accidents in repair, maintenance, alteration and addition (RMAA) work. RMAA work is playing an increasingly important role in developed societies, including Hong Kong. Safety problems associated with RMAA work in Hong Kong has reached an alarming level. In view of rapid expansion of the RMAA sector and rising proportion of accidents in the construction industry, there is a pressing need to investigate causes of RMAA accidents. Structured interviews were conducted with RMAA contractors to explore causes of accidents in the RMAA sector. A two-round Delphi method with 13 safety experts was subsequently employed to verify the interview findings and rank the relative degree of importance for various causes of accidents. Accidents happen in RMAA work due to intersection of reasons. One of the root causes of accidents in RMAA works is low safety awareness of RMAA workers; however, wider organizational and industrial factors are not negligible. This study sheds light on why accidents happen in the RMAA sector. Only when the factors leading to accidents are identified can effective measures be made.
Resumo:
This paper explores the slippery nature of illness and diagnosis in Lauren Slater’s memoir, Lying: a Metaphorical Memoir (2000). Speaking from the shadowy intersection of childhood and adolescence, Slater’s narrator, Lauren, uses the metaphor of epilepsy to describe her own predilection for exaggeration. In exploiting the fallibility of the first-person narrator, Slater insists on the legitimacy of metaphor in accounts of childhood illness that are more concerned with narrative truth than historical accuracy. The result of this playfulness and general misrule is that Slater writes herself into a double bind: on one side, she is the child narrator who inadvertently misrepresents events and misdirects readers, and on the other side, she is the untrustworthy author who employs metaphor as a licence to lie.
Resumo:
Indigenous Australian visual art is an outstanding case of the dynamics of globalization and its intersection with the hyper-local wellsprings of cultural expression, and of the strengths and weaknesses of state, philanthropic and commercial backing for cultural production and dissemination. The chapter traces the development of the international profile of Indigenous ‘dot’ art – a traditional symbolic art form from the Western Desert – as ‘high-end’ visual art, and its positioning within elite markets and finance supported by key international brokers, collectors and philanthropists.
Resumo:
We present efficient protocols for private set disjointness tests. We start from an intuition of our protocols that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the cardinality of the intersection. More specifically, it discloses its lower bound. By using the Lagrange interpolation we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. The protocol applies a verification test to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are first ones that have been designed without a generic secure function evaluation. More importantly, they are the most efficient protocols for private disjointness tests for the malicious adversary case.
Resumo:
Motivated by the need of private set operations in a distributed environment, we extend the two-party private matching problem proposed by Freedman, Nissim and Pinkas (FNP) at Eurocrypt’04 to the distributed setting. By using a secret sharing scheme, we provide a distributed solution of the FNP private matching called the distributed private matching. In our distributed private matching scheme, we use a polynomial to represent one party’s dataset as in FNP and then distribute the polynomial to multiple servers. We extend our solution to the distributed set intersection and the cardinality of the intersection, and further we show how to apply the distributed private matching in order to compute distributed subset relation. Our work extends the primitives of private matching and set intersection by Freedman et al. Our distributed construction might be of great value when the dataset is outsourced and its privacy is the main concern. In such cases, our distributed solutions keep the utility of those set operations while the dataset privacy is not compromised. Comparing with previous works, we achieve a more efficient solution in terms of computation. All protocols constructed in this paper are provably secure against a semi-honest adversary under the Decisional Diffie-Hellman assumption.