720 resultados para Notions of security
Resumo:
This paper explores notions of harm in sex work discourse, highlighting the extent to which essentialist ideas of ‘good’ versus ‘bad’ sex have pervaded trafficking policy. In a comparative examination of Australian Parliamentary Inquiries and United States Congressional Hearings leading to the establishment of anti-trafficking policy, we identify the stories that have influenced legislators, and established a narrative of trafficking heavily dependent upon assumptions of the inherent harm of sex work. This narrative constructs a hierarchy of victimisation, which denies alternative discourses of why women migrate for sex work. We argue that it is not sexual commerce that is harmful, but pathological, systemic inequalities and entrenched disadvantage that are harmful. A narrow narrative of trafficking fails to adequately depict this complexity of the trafficked experience.
Resumo:
Student engagement is a key contributor to student achievement and retention. Increasingly, international and Australasian universities are introducing a range of specific initiatives aimed at monitoring and intervening with students who are at risk of disengaging, particularly in their first year of study. A multi-site case study formed the focus of a national learning and teaching project to develop a suite of resources to guide good practice for safeguarding student learning engagement that were consistent with the notions of equity and social justice. Pivotal to the suite of resources is the Social Justice Framework and a set of social justice principles that emerged through a synthesis of existing literature and were further refined through the examination of qualitative data collected across the participating institutions. These social justice principles reflect general notions of equity and social justice, embrace the philosophical position of recognitive social justice, and are presented in an interconnected and co-dependent way within the framework. Participants will be provided with the opportunity to identify and discuss the practical applications of the principles to student engagement activities in their own institutions.
Resumo:
In this paper we focus on one facet of Asia literacy and examine the potential of intercultural understanding through two films about Asians in Australia, as the basis for exploring Asia and Australia’s engagement with Asia 'inside' and not through the more accepted mode of 'outside' the nation. In doing so we foreground how teachers’ critical and imaginative curriculum work can realise some of the promises of the framing document for the current national curriculum project, the Melbourne Declaration (MCEECDYA, 2008). In particular, we focus on opportunities for young people to develop an Asia-related cultural literacy that goes beyond instrumental notions of engagement with Asia and explore the evolving nature of contemporary Australian society; a society that continues to develop in response to regional flows and interactions with people and cultures. To this end we engage with the notion of “diasporic hybridity” as a dynamic cultural space through selected films and literature, about Asia in Australia, in particular, Bondi Tsunami (Lucas, 2004) and Footy Legends (Do, 2006) and selected prose works. Our paper introduces the policy background of the Australian Curriculum and suggests multimodal, English classroom applications for the films and literature under study.
Resumo:
The late eighteenth century witnessed the emergence of new technologies of subjectivity and of the literary. Most obviously, “the novel as a literary form appeared to embody and turn into an object the experience of life itself” (Park), and the novel genre came to both reflect and shape notions of interiority and subjectivity. In this same period, “A shift was taking place in the way people felt and thought about children and the accoutrements of childhood, including books and toys, were implicated in this change” (Lewis). In seeking to understand the relationships between media (e.g. books and toys), genres (e.g. novels and picture books), and modes of subjectivity, Marx’s influential theory of commodity fetishism, whereby “a definite social relation between men, that assumes, in their eyes, the fantastic form of a relation between things”, has served as a productive tool of analysis. The extent to which Marx’s account of commodity fetishism continues to be of use becomes clear when the corollaries between the late eighteenth-century emergence of novels and pictures books as technologies of subjectivity and the early twenty-first century emergence of e-readers and digital texts as technologies of subjectivity are considered. This paper considers the literary technology of Apple’s iPad (first launched in 2010) as a commodity fetish, and the circulation of “apps” as texts made available by and offered as justifications for, this fetish object. The iPad is both book and toy, but is never “only” either; it is arguably a new technology of subjectivity which incorporates but also destabilises categories of reading and playing such as those made familiar by earlier technologies of literature and the self. The particular focus of this paper is on the multimodal versions (app, film, and picture book) of The Fantastic Flying Books of Mr. Morris Lessmore, which are understood here as a narrativisation of commodity fetishism, subjectivity, and the act of reading itself.
Resumo:
Adaptation of novels and other source texts into theatre has proven to be a recurring and popular form of writing through the ages. This study argues that as the theoretical discourse has moved on from outmoded notions of fidelity to original sources, the practice of adaptation is a method of re-invigorating theatre forms and inventing new ones. This practice-led research employed a tripartite methodology comprised of the writing of two play adaptations, participation by the author/researcher in their productions, and exegetical components focused on the development and deployment of analytical tools. These tools were derived from theoretical literature and a creative practice based on acquired professional artistry "learnt by doing" over a longstanding professional career as actor, director and writer. A suite of analytical tools was developed through the three phases of the first project, the adaptation of Nick Earls’ novel Perfect Skin. The tools draw on Cardwell’s "comparative analysis", which encompasses close consideration of generic context, authorial context and medium-specific context; and on Stam’s "mechanics of narrative": order, duration, frequency, the narrator and point of view. A third analytical lens was developed from an awareness of the significance of the commissioning brief and ethical considerations and obligations to the source text and its author and audience. The tripartite methodology provided an adaptation template that was applied to the writing and production of the second play Red Cap, which used factual and anecdotal sources. The second play’s exegesis (Chapter 10) analyses the effectiveness of the suite of analytical tools and the reception of the production in order to conclude the study with a workable model for use in the practice of adapting existing texts, both factual and fictional, for the theatre.
Resumo:
The novel manuscript Fragrance of Night is a crime novel set in Indonesia. Raymond Chan, struggling to deal with the death of his Australian wife, returns to his country of birth, Indonesia. Ostensibly he returns to attend his cousin Lee’s wedding but he is also in search of some meaning in his life. He is drawn into a local murder mystery, and with the help of a young, Javanese policeman, he is soon investigating suspects and motives. Raymond finds himself becoming increasingly enamoured with the main suspect, Lani, but ultimately, once the murder mystery is solved, Raymond loses her. The exegesis examines crime fiction as a genre, in particular Indonesian crime fiction and notions of postcolonialism and hybridisation. Within this broader context, it analyses works by Indonesian crime fiction writer S Mara Gd, postcolonial crime fiction and novels written in English but set in ‘exotic’ locale. The formulation of my novel Fragrance of Night was informed by the examination of the machinations of hybridised crime fiction and the more general rules of the crime fiction genre.
Resumo:
How and why football referees made decisions was investigated. A constructivist grounded theory methodology was undertaken to tap into the experiential knowledge of referees. The participant cohort comprised 7 A-League referees (aged 23 to 35) and 8 local Brisbane league referees (aged 20 to 50), spanning the lowest to highest levels of competition in men’s football in Australia. Results found that referees used ‘four pillars’ to underpin their judgments, these were conceptual notions of: safety, fairness, accuracy and entertainment. A fifth pillar ‘consistency’ referred to the referee’s ‘contextual sensitivity’. Results were explained using an ecological dynamics framework that emphasises the individual-environment scale of analysis. It was concluded that interacting constraints shape emergent decision-making in referees which are nested in task goals.
Resumo:
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there are several well-known and realistic attacks on AKE protocols which exploit various forms of malicious key registration and which therefore lie outside the scope of these models. We provide the first systematic analysis of AKE security incorporating certification systems (ASICS). We define a family of security models that, in addition to allowing different sets of standard AKE adversary queries, also permit the adversary to register arbitrary bitstrings as keys. For this model family we prove generic results that enable the design and verification of protocols that achieve security even if some keys have been produced maliciously. Our approach is applicable to a wide range of models and protocols; as a concrete illustration of its power, we apply it to the CMQV protocol in the natural strengthening of the eCK model to the ASICS setting.
Resumo:
This paper reports on an adaptation of Callon and Law’s (1995) hybrid collectif derived from research conducted on the usage of mobile phones and internet technologies among the iTadian indigenous people of the Cordillera region, northern Philippines. Results brings to light an indigenous digital collectif—an emergent effect from the translation of both human and non-human heterogeneous actors as well as pre-existent networks, such as: traditional knowledge and practices, kinship relations, the traditional exchange of goods, modern academic requisites, and advocacies for indigenous rights. This is evinced by the iTadian’s enrolment of internet and mobile phone technologies. Examples include: treating these technologies as an efficient communicative tool, an indicator of well-being, and a portable extension of affective human relationships. Alternatively, counter-enrolment strategies are also at play, which include: establishing rules of acceptable use on SMS texting and internet access based on traditional notions of discretion, privacy, and the customary treatment of the dead. Within the boundaries of this digital collectif reveal imbrications of pre-existing networks like traditional customs, the kinship system across geophysical boundaries, the traditional exchange of mail and other goods, and the advocacy of indigenous rights. These imbrications show that the iTadian digital collectif fluently configures itself to a variety of networked ontologies without losing its character.
Resumo:
In late 2007, newly elected Prime Minister Kevin Rudd placed education reform on centre stage as a key policy in the Labor Party's agenda for social reform in Australia. A major policy strategy within this 'Education Revolution' was the development of a national curriculum, the Australian Curriculum Within this political context, this study is an investigation into how social justice and equity have been used in political speeches to justify the need for, and the nature of, Australia's first official national curriculum. The aim is to provide understandings into what is said or not said; who is included or excluded, represented or misrepresented; for what purpose; and for whose benefit. The study investigates political speeches made by Education Ministers between 2008 and 201 0; that is, from the inception of the Australian Curriculum to the release of the Phase 1 F - 10 draft curriculum documents in English, mathematics, science and history. Curriculum development is defined here as an ongoing process of complex conversations. To contextualise the process of curriculum development within Australia, the thesis commences with an initial review of curriculum development in this nation over the past three decades. It then frames this review within contemporary curriculum theory; in particular it calls upon the work of William Pinar and the key notions of currere and reconceptualised curriculum. This contextualisation work is then used as a foundation to examine how social justice and equity have been represented in political speeches delivered by the respective Education Ministers Julia Gillard and Peter Garrett at key junctures of Australian Curriculum document releases. A critical thematic policy analysis is the approach used to examine selected official speech transcripts released by the ministerial media centre through the DEEWR website. This approach provides a way to enable insights and understandings of representations of social justice and equity issues in the policy agenda. Broader social implications are also discussed. The project develops an analytic framework that enables an investigation into the framing of social justice and equity issues such as inclusion, equality, quality education, sharing of resources and access to learning opportunities in political speeches aligned with the development of the Australian Curriculum Through this analysis, the study adopts a focus on constructions of educationally disadvantaged students and how the solutions of 'fixing' teachers and providing the 'right' curriculum are presented as resolutions to the perceived problem. In this way, it aims to work towards offering insights into political justifications for a national curriculum in Australia from a social justice perspective.
Resumo:
In recent events, notions of political protest, civil disobedience, extremism, and criminal action have become increasingly blurred. The London Riots, the Occupy movement, and the actions of hacking group Anonymous have all sparked heated debate about the limits of legitimate protest, and the distinction between an acceptable action and a criminal offence. Long before these events, environmental activists were challenging convention in protest actions, with several groups engaging in politically motivated law-breaking. The emergence of the term ‘eco-tage’ (the sabotage of equipment in order to protect the environment) signifies the important place environmental activists hold in challenging the traditional boundaries between illegal action and legitimate protest. Many of these groups establish their own boundaries of legitimacy, with some justifying their actions on the basis of civil disobedience or extensional self-defence. This paper examines the statements of environmental activist organisations that have engaged in politically motivated law breaking. It identifies the parameters that these groups set on their illegal actions, as well as the justifications that they provide, with a view to determining where these actions fit in the vast grey area between legal protest and violent extremism.
Resumo:
This book offers a unique insight into the moral politics behind the making of human trafficking policy in Australia and the United States of America. As governments around the world rush to meet their international obligations to combat human trafficking, a heated debate has emerged over the rights, wrongs, and harms of prostitution, and its relationship to sex trafficking. The Politics of Sex Trafficking identifies and challenges intrinsic notions of moral harm that have pervaded trafficking discourse and resulted in a distinctly anti-prostitution agenda in trafficking policy in recent decades. Including rare interviews with key political actors, this book charts the competing perspectives of feminist, faith-based, and sex-worker activists, and their efforts to influence policy-makers. This critical account of the creation of anti-trafficking policy challenges the sex trafficking narrative dominant in US Congressional and Australian Parliamentary hearings, and demonstrates the power of a moral politics in shaping policy. This book will appeal to academics across the fields of criminology, criminal justice, law, human rights and gender studies, as well as policy-makers.
Resumo:
This practice-led research project explores how humour can be employed to develop a methodology for examining the socio-political dimensions of contemporary art practice. This research aims to identify and elaborate on how using the evasive strategies and elliptical frameworks associated with ideas of the absurd and nonsense can lead to new ways of understanding the nexus between social, political and cultural practices. This is achieved primarily through an examination of the art practices of Marcel Duchamp, Bruce Nauman, and Martin Kippenberger. These artists contextualise this research because in different ways they all engage with humour as a device to critique conventional notions of how art can be read or understood. Using these strategies the project aims to demonstrate new ways for considering how visual art can use humour to creatively and critically investigate the relationships between art and the social.
Resumo:
Whilst there is a growing body of research considering corporate social responsibility (CSR) communication, calls have been made to consider the ‘how’ of CSR communication (Maon, Lindgreen, & Swaen, 2010). The challenge with exploring this however, is that communication research has largely been criticised for failing to consider the macro-phenomena impacting communication (Jones, Watson, Gardner, & Gallois, 2004; Lammers & Barbour, 2006). As such, limited attention has been given to who organisations need to indicate their responsiveness to in relation to CSR, and in turn, why they communicate about certain activities in their CSR reports. Without exploring these ideas, and hence, gaining an understanding of the macro-phenomena impacting CSR communication, we limit our understanding of the ‘how’ of CSR communication. As such, this study sought to explore both the why of CSR communication, and in turn, the implications this may have for the how of CSR communication. To do this, this study drew on the notions of institutional theory, legitimacy, and rhetoric, and explored propositions drawn from these concepts to consider the why and how of CSR communication. Extended abstract attached
Resumo:
Even though web security protocols are designed to make computer communication secure, it is widely known that there is potential for security breakdowns at the human-machine interface. This paper examines findings from a qualitative study investigating the identification of security decisions used on the web. The study was designed to uncover how security is perceived in an individual user's context. Study participants were tertiary qualified individuals, with a focus on HCI designers, security professionals and the general population. The study identifies that security frameworks for the web are inadequate from an interaction perspective, with even tertiary qualified users having a poor or partial understanding of security, of which they themselves are acutely aware. The result is that individuals feel they must protect themselves on the web. The findings contribute a significant mapping of the ways in which individuals reason and act to protect themselves on the web. We use these findings to highlight the need to design for trust at three levels, and the need to ensure that HCI design does not impact on the users' main identified protection mechanism: separation.