951 resultados para Symbolic tokens
Resumo:
On 9 January 1927 Le Corbusier materialised on the front cover of the Faisceau journal edited by Georges Valois Le Nouveau Siècle which printed the single-point perspective of Le Corbusier’s Plan Voisin and an extract from the architect’s discourse in Urbanisme. In May Le Corbusier presented slides of his urban designs at a fascist rally. These facts have been known ever since the late 1980s when studies emerged in art history that situated Le Corbusier’s philosophy in relation to the birth of twentieth-century fascism in France—an elision in the dominant reading of Le Corbusier’s philosophy, as a project of social utopianism, whose received genealogy is Saint-Simon and Charles Fourier. Le Corbusier participated with the first group in France to call itself fascist, Valois’s militant Faisceau des Combattants et Producteurs, the “Blue Shirts,” inspired by the Italian “Fasci” of Mussolini. Thanks to Mark Antliff, we know the Faisceau did not misappropriate Le Corbusier’s plans, in some remote quasi-symbolic sense, rather Valois’s organisation was premised on the redesign of Paris based on Le Corbusier’s schematic designs. Le Corbusier’s Urbanisme was considered the “prodigious” model for the fascist state Valois called La Cité Française – after his mentor the anarcho-syndicalist Georges Sorel. Valois stated that Le Corbusier’s architectural concepts were “an expression of our profoundest thoughts,” the Faisceau, who “saw their own thought materialized” on the pages of Le Corbusier’s plans. The question I pose is, In what sense is Le Corbusier’s plan a complete representation of La Cité? For Valois, the fascist city “represents the collective will of La Cité” invoking Enlightenment philosophy, operative in Sorel, namely Rousseau, for whom the notion of “collective will” is linked to the idea of political representation: to ‘stand in’ for someone or a group of subjects i.e. the majority vote. The figures in Voisin are not empty abstractions but the result of “the will” of the “combatant-producers” who build the town. Yet, the paradox in anarcho-syndicalist anti-enlightenment thought – and one that became a problem for Le Corbusier – is precisely that of authority and representation. In Le Corbusier’s plan, the “morality of the producers” and “the master” (the transcendent authority that hovers above La Cité) is lattened into a single picture plane, thereby abolishing representation. I argue that La Cité pushed to the limits of formal abstraction by Le Corbusier thereby reverts to the Enlightenment myth it first opposed, what Theodor Adorno would call the dialectic of enlightenment.
Resumo:
Introduction: Clinical education is considered a significant part of the learning process for nursing students. There is, however, no research that has explored this area of learning in Saudi Arabia. Theoretical Framework: Informed by a symbolic interactionist framework, this research explored the role of nurse educators in student clinical education in Saudi Arabia. Method: Using Glaserian grounded theory methods the data were derived from 14 face-to-face interviews with nurse educators from both hospital and faculty settings in King Abdu-Aziz University (KAU) and King Abdu-Aziz University Hospital (KAUH). Findings: The findings of the research are represented in the core category Redefining Identity Work and its two constituent categories Questioning the Situation and Creating Role Identity. The core and sub- categories were generated through a theoretical exploration of the identity work of nurse educators in Saudi Arabia. Conclusion: The social identity of the nurse educators was mediated culturally and socially within the hospital and university contexts and Saudi Arabian culture. In light of an increased understanding of the identity and role of nurse educators in clinical education in Saudi Arabia, the research presents implications and recommendations that may contribute to the development of nursing education as a coherent health care profession that is perceived as a desirable career option for Saudi women and men.
Resumo:
Purpose The purpose of this paper is to review the growing emphasis on quantifiable performance measures such as social return on investment (SROI) in third sector organisations – specifically, social enterprise – through a legitimacy theory lens. It then examines what social enterprises value (i.e. consider important) in terms of performance evaluation, using a case study approach. Design/methodology/approach Case studies involving interviews, documentary analysis, and observation, of three social enterprises at different life-cycle stages with different funding structures, were constructed to consider “what measures matter” from a practitioner's perspective. Findings Findings highlight a priority on quality outcomes and impacts in primarily qualitative terms to evaluate performance. Further, there is a noticeable lack of emphasis on financial measures other than basic access to financial resources to continue pursuing social goals. Social implications The practical challenges faced by social enterprises – many of which are small to medium sized – in evaluating performance and by implication organisational legitimacy are contrasted with measures such as SROI which are resource intensive and have inherent methodological limitations. Hence, findings suggest the limited and valuable resources of social enterprises would be better allocated towards documenting the actual outcomes and impacts as a first step, in order to evaluate social and financial performance in terms appropriate to each objective, in order to demonstrate organisational legitimacy. Originality/value Findings distinguish between processes which may hold symbolic legitimacy for select stakeholder groups, and processes which hold substantive, cognitive legitimacy for stakeholders more broadly, in the under-researched context of social enterprise.
Resumo:
This study was conducted within the context of a flexible education institution where conventional educational assessment practices and tests fail to recognise and assess the creativity and cultural capital of a cohort of marginalised young people. A new assessment model which included an electronic-portfolio-social-networking system (EPS) was developed and trialled to identify and exhibit evidence of students' learning. The study aimed to discern unique forms of cultural capital (Bourdieu, 1986) possessed by students who attend the Edmund Rice Education Australia Flexible Learning Centre Network (EREAFLCN). The EPS was trialled at the case study schools in an intervention and developed a space where students could make evident culturally specific forms of capital and funds of knowledge (Gonzalez, Moll, & Amanti, 2005). These resources were evaluated, modified and developed through dialogic processes utilising assessment for learning approaches (Qualifications and Curriculum Development Agency, 2009) in online and classroom settings. Students, peers and staff engaged in the recognition, judgement, revision and evaluation of students' cultural capital in a subfield of exchange (Bourdieu, 1990). The study developed the theory of assessment for learning as a field of exchange incorporating an online system as a teaching and assessment model. The term efield has been coined to describe this particular capital exchange model. A quasi-ethnographic approach was used to develop a collective case study (Stake, 1995). This case study involved an in-depth exploration of five students' forms of cultural capital and the ways in which this capital could be assessed and exchanged using the efield model. A comparative analysis of the five cases was conducted to identify the emergent issues of students' recognisable cultural capital resources and the processes of exchange that can be facilitated to acquire legitimate credentials for these students in the Australian field of education. The participants in the study were young people at two EREAFLC schools aged between 12 and 18 years. Data was collected through interviews, observations and examination of documents made available by the EREAFLCN. The data was coded and analysed using a theoretical framework based on Bourdieu's analytical tools and a sociocultural psychology theoretical perspective. Findings suggest that processes based on dialogic relationships can identify and recognise students' forms of cultural capital that are frequently misrecognised in mainstream school environments. The theory of assessment for learning as a field of exchange was developed into praxis and integrated in an intervention. The efield model was found to be an effective sociocultural tool in converting and exchanging students' capital resources for legitimated cultural and symbolic capital in the field of education.
Resumo:
Background Clinical education is considered a significant part of the learning process for nursing students. There is, however, no research that has explored this area of learning in Saudi Arabia. Theoretical Framework Informed by a symbolic interactionist framework, this research explored the role of nurse educators in student clinical education in Saudi Arabia. Method Using Glaserian grounded theory methods the data were derived from 14 face-to-face interviews with nurse educators from both hospital and faculty settings in King Abdu-Aziz University (KAU) and King Abdu-Aziz University Hospital (KAUH). Findings The findings of the research are represented in the core category Redefining Identity Work and its two constituent categories Questioning the Situation and Creating Role Identity. The core and sub- categories were generated through a theoretical exploration of the identity work of nurse educators in Saudi Arabia. Conclusion The social identity of the nurse educators was mediated culturally and socially within the hospital and university contexts and Saudi Arabian culture. In light of an increased understanding of the identity and role of nurse educators in clinical education in Saudi Arabia, the research presents implications and recommendations that may contribute to the development of nursing education as a coherent health care profession that is perceived as a desirable career option for Saudi women and men.
Resumo:
This thesis applied a grounded theory methodology to generate a theoretical understanding of the challenging and ambiguous dimensions of the contemporary role of the public-sector nurse educator within Australia. New knowledge provides a useful structure to examine nurse educator support and mechanisms to foster constructive workplace learning, collaborative relationships and effective contributions to better health care.
Resumo:
This paper uses innovative content analysis techniques to map how the death of Oscar Pistorius' girlfriend, Reeva Steenkamp, was framed on Twitter conversations. Around 1.5 million posts from a two-week timeframe are analyzed with a combination of syntactic and semantic methods. This analysis is grounded in the frame analysis perspective and is different than sentiment analysis. Instead of looking for explicit evaluations, such as “he is guilty” or “he is innocent”, we showcase through the results how opinions can be identified by complex articulations of more implicit symbolic devices such as examples and metaphors repeatedly mentioned. Different frames are adopted by users as more information about the case is revealed: from a more episodic one, highly used in the very beginning, to more systemic approaches, highlighting the association of the event with urban violence, gun control issues, and violence against women. A detailed timeline of the discussions is provided.
Resumo:
This paper will give a ‘criminological perspective’ on mandatory sentencing. It will however largely avoid the issues of the effect of mandatory sentencing provisions on the judicial process and judicial independence, as this has already been covered by Sir Anthony Mason. It will also avoid the legal issues concerning the constitutional, human rights and international law aspects of mandatory sentencing which will be covered by later speakers. The aim will be to give a brief overview of research which evaluates the effects of mandatory sentencing provisions in terms of the available evidence of whether they meet their stated aims of deterrence, selective incapacitation and the reduction of crime rates. This will be done in two parts, first in relation to the more extensive experiment in mandatory sentencing in the USA which has provided some of the impetus and metaphors ("three strikes") for recent Australian developments; and second the recent mandatory sentencing provisions in Western Australia (WA) and the Northern Territory (NT). Evidence from both the US and WA (NT is hard to assess because of the lack of proper monitoring and criminal statistics) indicates that mandatory sentencing does not produce the effects of deterrence, selective incapacitation and crime reduction which are its stated justifications and does produce a range of damaging side effects in terms of distortion of the judicial process, wildly disproportionate sentencing, additional financial and social cost and deepening social exclusion of individuals and particular communities. So what is left are the less acknowledged underpinnings of mandatory sentencing in the form of the symbolic politics of law and order, the politics of social exclusion and a displacement of racial anxieties and hostilities onto the terrain of the legal. In fashioning this necessarily brief overview a number of sources have been heavily drawn upon, in particular the excellent work by Neil Morgan from UWA (Morgan, 1995;1999; 2000); Dianne Johnson and George Zdenkowski in their detailed report to the Senate Inquiry (2000); and a number of articles appearing in 1999 in an excellent special issue of the UNSW Law Journal, all of which are highly recommended for further reading.
Resumo:
There is increasing evidence of a weakened platform of consumer trust in mass produced food products. The resistance shown by consumers to the agro-industrial paradigm is evident in an emergent phase of reflexive consumerism, public reactions to an overly-concentrated retail sector and the rise of alternative food networks such as farmers' markets and organic box schemes. Supermarkets are responding strategically by aiming to manufacture new trust relations with consumers. This paper identifies three key strategies of trust manufacturing: (i) reputational enhancement though the institution of “behind the scenes,” business-to-business private standards; (ii) direct quality claims via private standard certification badges on food products, and ; (iii) discursive claimsmaking through symbolic representations of “authenticity” and “tradition.” Drawing upon the food governance literature and a “visual sociology” of supermarkets and supermarket produce, we highlight how trust is both commoditized and increasingly embedded into the marketing of mass-produced foods.
Resumo:
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access keys and tokens in a connected world. Although many existing solutions can be employed to protect a long secret using a short password, those solutions typically require certain assumptions on the distribution of the secret and/or the password, and are helpful against only a subset of the possible attackers. After briefly reviewing a variety of approaches, we propose a user-centric comprehensive model to capture the possible threats posed by online and offline attackers, from the outside and the inside, against the security of both the plaintext and the password. We then propose a few very simple protocols, adapted from the Ford-Kaliski server-assisted password generator and the Boldyreva unique blind signature in particular, that provide the best protection against all kinds of threats, for all distributions of secrets. We also quantify the concrete security of our approach in terms of online and offline password guesses made by outsiders and insiders, in the random-oracle model. The main contribution of this paper lies not in the technical novelty of the proposed solution, but in the identification of the problem and its model. Our results have an immediate and practical application for the real world: they show how to implement single-sign-on stateless roaming authentication for the internet, in a ad-hoc user-driven fashion that requires no change to protocols or infrastructure.
Resumo:
We offer an exposition of Boneh, Boyen, and Goh’s “uber-assumption” family for analyzing the validity and strength of pairing assumptions in the generic-group model, and augment the original BBG framework with a few simple but useful extensions.
Resumo:
Objective: To develop a system for the automatic classification of pathology reports for Cancer Registry notifications. Method: A two pass approach is proposed to classify whether pathology reports are cancer notifiable or not. The first pass queries pathology HL7 messages for known report types that are received by the Queensland Cancer Registry (QCR), while the second pass aims to analyse the free text reports and identify those that are cancer notifiable. Cancer Registry business rules, natural language processing and symbolic reasoning using the SNOMED CT ontology were adopted in the system. Results: The system was developed on a corpus of 500 histology and cytology reports (with 47% notifiable reports) and evaluated on an independent set of 479 reports (with 52% notifiable reports). Results show that the system can reliably classify cancer notifiable reports with a sensitivity, specificity, and positive predicted value (PPV) of 0.99, 0.95, and 0.95, respectively for the development set, and 0.98, 0.96, and 0.96 for the evaluation set. High sensitivity can be achieved at a slight expense in specificity and PPV. Conclusion: The system demonstrates how medical free-text processing enables the classification of cancer notifiable pathology reports with high reliability for potential use by Cancer Registries and pathology laboratories.
Resumo:
The significance of naming Indigenous Support Centres (ISCs) with Indigenous language terminology — given that such reconciliatory acts may serve as symbolic means to improve the cultural efficacy of an Australian university’s Welcome to Country on offer to Indigenous Australian students — is explored and discussed in this paper. A survey of all 39 Australian universities was conducted, and the results regarding the Indigenous naming of their ISCs were tabulated and compared.
Resumo:
Background Cancer monitoring and prevention relies on the critical aspect of timely notification of cancer cases. However, the abstraction and classification of cancer from the free-text of pathology reports and other relevant documents, such as death certificates, exist as complex and time-consuming activities. Aims In this paper, approaches for the automatic detection of notifiable cancer cases as the cause of death from free-text death certificates supplied to Cancer Registries are investigated. Method A number of machine learning classifiers were studied. Features were extracted using natural language techniques and the Medtex toolkit. The numerous features encompassed stemmed words, bi-grams, and concepts from the SNOMED CT medical terminology. The baseline consisted of a keyword spotter using keywords extracted from the long description of ICD-10 cancer related codes. Results Death certificates with notifiable cancer listed as the cause of death can be effectively identified with the methods studied in this paper. A Support Vector Machine (SVM) classifier achieved best performance with an overall F-measure of 0.9866 when evaluated on a set of 5,000 free-text death certificates using the token stem feature set. The SNOMED CT concept plus token stem feature set reached the lowest variance (0.0032) and false negative rate (0.0297) while achieving an F-measure of 0.9864. The SVM classifier accounts for the first 18 of the top 40 evaluated runs, and entails the most robust classifier with a variance of 0.001141, half the variance of the other classifiers. Conclusion The selection of features significantly produced the most influences on the performance of the classifiers, although the type of classifier employed also affects performance. In contrast, the feature weighting schema created a negligible effect on performance. Specifically, it is found that stemmed tokens with or without SNOMED CT concepts create the most effective feature when combined with an SVM classifier.
Resumo:
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitives of LAKE, we show three different collision and near-collision attacks on the compression function. The first attack uses differences in the chaining values and the block counter and finds collisions with complexity 233. The second attack utilizes differences in the chaining values and salt and yields collisions with complexity 242. The final attack uses differences only in the chaining values to yield near-collisions with complexity 299. All our attacks are independent of the number of rounds in the compression function. We illustrate the first two attacks by showing examples of collisions and near-collisions.