943 resultados para Teaching identity
Resumo:
This chapter explores the perceptions of middle years specialist teachers in the contemporary Australian schools context. Written narratives were obtained from 4 Australian teachers. Each has followed distinctly different paths to teaching in the middle years. However, each has a high leadership profile in the general schooling sector assumed relatively early in their professional careers. These teachers were asked about their entry into teaching, the pathways they pursued to teaching at the middle level, opportunities and limitations experienced for them in schools, and their conceptions of the future of middle years reforms in Australia.
Resumo:
Reports on the work of a group of primary educators who participated in the collaborative practitioner inquiry stage of River Literacies, and explores what happened when a group of teachers made a serious commitment to rethink and extend the repertoires ofmulti- modal literacy for use with their students.
Resumo:
This paper reports on a project that was designed to support teachers to introduce reciprocal teaching and student-generated questioning in the middle years. It began as a solution to teachers expressing a concern that there was a lack of professional development related to the teaching of reading in the middle years.
Resumo:
Parallel computing is currently used in many engineering problems. However, because of limitations in curriculum design, it is not always possible to offer students specific formal teaching in this topic. Furthermore, parallel machines are still too expensive for many institutions. The latest microprocessors, such as Intel’s Pentium III and IV, embody single instruction multiple-data (SIMD) type parallel features, which makes them a viable solution for introducing parallel computing concepts to students. Final year projects have been initiated utilizing SSE (streaming SIMD extensions) features and it has been observed that students can easily learn parallel programming concepts after going through some programming exercises. They can now experiment with parallel algorithms on their own PCs at home. Keywords
Resumo:
Purpose: Although there is increasing evidence that the creative industries are essential to national economic growth as well as social and cultural well-being, creative graduates often find it difficult to become established professionally. This study investigates the value of career management competence and intrinsic career motivations (as elements of ‘protean career orientation’) in predicting positive graduate outcomes. ----- ----- Design/methodology: Self-report surveys were administered to 208 creative industries graduates from two Australian universities at two points in time: at course completion, and one year later. ----- ----- Findings: Individual career management competence and intrinsic work motivations, measured at course completion, were significant predictors of early career success, using both subjective and objective measures, measured one year later. ----- ----- Practical implications: This study suggests that an emphasis on student development beyond the traditional ‘key’ employability skills may well be worthwhile. The article also suggests a broad learning and teaching approach by which universities can encourage the development of student career identity, and thus engender student intrinsic career motivations and career self management skills and behaviours. ----- ----- Originality/value: This is one of the first studies to demonstrate empirically a link between a particular set of skills and graduate outcomes. In addition, it provides insights into the role of student career motivations in positive transitions to the world of work in the creative industries.
Resumo:
Malaysia’s Vision 2020 for enhancing its education system includes the development of scientific literacy commencing at the primary school level. This Vision focuses on using English as the Medium of Instruction (EMI) for teaching primary science, as Malaysia has English as a Foreign Language (EFL) in its curriculum. What changes need to occur in preservice teacher education programs for learning about primary science using EMI? This paper investigates the education of Malaysian preservice teachers for learning how to teach one strand in science education (i.e., space, primary astronomy) in an English-language context. Ninety-six second-year preservice teachers from two Malaysian institutes were involved in a 16-week “Earth and Space” course, half the course involved education about primary astronomy. Seventy-five of these preservice teachers provided written responses about the course and their development as potential teachers of primary astronomy using EMI. Preservice teacher assessments and multimedia presentations provided further evidence on learning how to teach primary astronomy. Many of these preservice teachers claimed that learning to teach primary astronomy needs to focus on teaching strategies, content knowledge with easy-to-understand concepts, computer simulations (e.g., Earth Centered Universe, Stellarium, Celestia), other ICT media, and field experiences that use naked-eye observations and telescopes to investigate celestial bodies. Although generally proficient in using ICT, they claimed there were EFL barriers for learning some new terminology. Nevertheless, powerpoints, animations, videos, and simulations were identified as effective ICT tools for providing clear visual representations of abstract concepts and ways to enhance the learning process.
Resumo:
Immediate indefeasibility is the cornerstone of the Torrens system of land registration. However, when combined with the apparent ease in which forged mortgages become registered, the operation of this doctrine can come into question. This article seeks to argue that, rather than question indefeasibility, the focus should be on the verification of identity of parties to land transactions. Whilst no system can ever be infallible, it is suggested that by correctly imposing the responsibility for identity verification on the appropriate individual, the Torrens system can retain immediate indefeasibility as its paramount principle, yet achieve the optimum level of fairness in terms of allocation of responsibility and loss. With the dawn of a new era of electronic conveyancing about to begin, the framework suggested here provides a model for minimising the risks of forged mortgages and appropriately allocating the loss.
Resumo:
Details of a project which fictionalises the oral history of the life of the author's polio-afflicted grandmother Beth Bevan and her experiences at a home for children with disabilities are presented. The speech and language patterns recognised in the first person narration are described, as also the sense of voice and identity communicated through the oral history.
Resumo:
The purpose of this study is to contribute to the cross-disciplinary body of literature of identity and organisational culture. This study empirically investigated the Hatch and Schultz (2002) Organisational Identity Dynamics (OID) model to look at linkages between identity, image, and organisational culture. This study used processes defined in the OID model as a theoretical frame by which to understand the relationships between actual and espoused identity manifestations across visual identity, corporate identity, and organisational identity. The linking processes of impressing, mirroring, reflecting, and expressing were discussed at three unique levels in the organisation. The overarching research question of How does the organisational identity dynamics process manifest itself in practice at different levels within an organisation? was used as a means of providing empirical understanding to the previously theoretical OID model. Case study analysis was utilised to provide exploratory data across the organisational groups of: Level A - Senior Marketing and Corporate Communications Management, Level B - Marketing and Corporate Communications Staff, and Level C - Non-Marketing Managers and Employees. Data was collected via 15 in-depth interviews with documentary analysis used as a supporting mechanism to provide triangulation in analysis. Data was analysed against the impressing, mirroring, reflecting, and expressing constructs with specific criteria developed from literature to provide a detailed analysis of each process. Conclusions revealed marked differences in the ways in which OID processes occurred across different levels with implications for the ways in which VI, CI, and OI interact to develop holistic identity across organisational levels. Implications for theory detail the need to understand and utilise cultural understanding in identity programs as well as the value in developing identity communications which represent an actual rather than an espoused position.
Resumo:
An academic literacies approach frames students as active participants in their own learning as they develop their voice and identity. This paper describes teachers’ perceptions of developing and delivering an academic literacies program to TESOL pre-service teachers in a B.Ed twinning program. Data indicates that an academic literacies program is a dynamic process that is ever evolving in order to meet students’ needs. A cornerstone of the program was the continual and open communication between teachers to ensure that students’ needs were met. Additionally, a collaborative approach between twinning partners needs to occur in order for the benefits of the academic literacies program to continue for students.
Resumo:
Teaching The Global Dimension (2007) is intended for primary and secondary teachers, pre-service teachers and educators interested in fostering global concerns in the education system. It aims at linking theory and practice and is structured as follows. Part 1, the global dimension, proposes an educational framework for understanding global concerns. Individual chapters in this section deal with some educational responses to global issues and the ways in which young people might become, in Hick’s terms, more “world-minded”. In the first two chapters, Hicks presents first, some educational responses to global issues that have emerged in recent decades, and second, an outline of the evolution of global education as a specific field. As with all the chapters in this book, most of the examples are drawn from the United Kingdom. Young people’s concerns, student teachers’ views and the teaching of controversial issues, comprise the other chapters in this section. Taken collectively, the chapters in Part 2 articulate the conceptual framework for developing, teaching and evaluating a global dimension across the curriculum. Individual chapters in this section, written by a range of authors, explore eight key concepts considered necessary to underpin appropriate learning experiences in the classroom. These are conflict, social justice, values and perceptions, sustainability, interdependence, human rights, diversity and citizenship. These chapters are engaging and well structured. Their common format consists of a succinct introduction, reference to positive action for change, and examples of recent effective classroom practice. Two chapters comprise the final section of this book and suggest different ways in which the global dimension can be achieved in the primary and the secondary classroom.
Resumo:
This paper reports on a mathematics education research project centred on teachers’ pedagogical practices and capacity to assess Indigenous Australian students in a culture-fair manner. The project has been funded by the Australian Research Council Linkage program and is being conducted in seven Catholic and Independent primary schools in north Queensland. Our Industry Partners are Catholic Education and the Association of Independent Schools, Queensland. The study aims to provide greater understanding about how to build more equitable assessment practices to address the issue of underperforming Aboriginal and Torres Strait Islander (ATSI) students in regional and remote Australia. The goal is to identify ways forward by attending to culture-fair assessment practice. The research is exploring the attitudes, beliefs and responses of Indigenous students to assessment in the context of mathematics learning with particular focus on teacher knowledge in these educational settings in relation to the design of assessment tasks that are authentic and engaging for these students in an accountability context. This approach highlights how teachers need to distinguish the ‘funds of knowledge’ (González, Moll, Floyd Tenery, Rivera, Rendón, Gonzales & Amanti, 2008) that Indigenous students draw on and how teachers need to be culturally responsive in their pedagogy to open up curriculum and assessment practice to allow for different ways of knowing and being
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.