958 resultados para sexual identity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The majority of academic research has attempted to explain the effectiveness of sponsorship activities by focusing on individual outcomes (Cornwell, Weeks, & Roy, 2005). The current research builds upon the limited empirical studies that examine sponsorship outcomes using group behaviour theories (Cornwell & Coote, 2005; Gwinner & Swanson, 2003; Madrigal, 2000, 2001). Specifically, this study closely examines tenets of social identity theory (Brewer, 1991; Tajfel & Turner, 1979) within the context of sports sponsorship to test effects of team identification on attitudes toward associated sponsor brands. 1,840 unique surveys were collected from fans of the Queensland Maroons and New South Wales Blues rugby clubs over four timepoints during the 2012 State of Origin series. The results suggest that social identity effects were present regarding ingroup bias toward sponsor brands. Local sponsors were rated higher than non-local sponsors, suggesting that local brands may benefit more from sponsorship.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter contributes to the existing body of knowledge on fan fiction by reporting the findings from a quantitative and qualitative study on fan fiction in a Swedish context. The authors contextualize the fan fiction phenomenon as a part of a larger transformation of the media sphere and the society in general where media consumers’ role as collaborative cultural producers grows ever stronger. They explore what kind of stories inspire the writers and conclude that as in many other parts of the entertainment industry, fan fiction is dominated by a small number of international media brands. The authors show how fan fiction can play an important role in the development of adolescents’ literacies and identities and how their pastime works as a vehicle for personal growth.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Identity orientation provides a means to understand the social motivations of organisational relationships and organisational policy and practices. This study uses identity orientation to understand the highly marketised context of independent ‘elite’ schools in Australia and how they relate to stakeholders to straddle their roles as social institutions that are increasingly required to operate in a corporate manner. Interviews with managers in quite new school roles such as marketing communication and business management were conducted in non-government schools to understand the schools' external orientations, coveted internal member traits, and frames of reference. The study shows that, in contrast to existing literature on the rhetoric of schools as focusing on ‘the child’, there was a strong emphasis on individualistic orientations in schools that saw stakeholders in instrumental terms of resources and connections, saw teachers as providing an innovative and leading edge, and used other prestigious schools as their frame of reference. To a lesser extent, schools would also be interested in the relationships with families, teachers, and the community for their own means. There were very few instances where the identity orientation was contributing to society, instead, focusing on university and network outcomes for pupils. Using identity orientation provides a theoretical lens to connect organisational governance to stakeholder engagement by providing insights into an organisation's identity including practices and behaviours, in relation to others.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A SINGLE document was all it took to illuminate a dark secret in the Church of England. The two-page child protection report, unearthed by police in the archives of the diocese of Manchester, was proof, at last, that a former cathedral choirboy -- alleging years of sexual abuse by one of Britain's most senior clergyman -- was not alone. There was another boy. Also a solo soprano, on the other side of the world, who was singing from the same hymn sheet about The Very Reverend Robert Waddington. "There had been a previous referral about sexual impropriety some time ago from Australia, where RW had been the headmaster at a school. An ex-pupil had made a complaint to the Bishop of (north) Queensland who had relayed it to the Archbishop (of York)," the 2003 report says. Eli Ward's family had prompted the secret report when they told church officials, without Ward's knowledge, of the alleged abuse he suffered in the mid-1980s.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

THE little Anglican boarding school of St Barnabas, in the misty mountain town of Ravenshoe, north Queensland, was allegedly a hotbed of physical and sexual abuse in the 1960s. North Queensland Bishop Bill Ray has confirmed the diocese has few files about the school -- which was closed mid-term in 1990 -- with suspicions they were dumped "down a well or an old mine shaft" in the district A history of brutal physical punishment and sexual abuse at the school dating from the 1960s is now emerging. Headmaster Robert Waddington, who arrived at the school from England to be headmaster in 1961, dished out daily canings to many of his young students and then allegedly raped some behind closed doors in his room or the sick bay, which were next to each other. Former St Barnabas student Bim Atkinson, now 58, and two other former students have levelled allegations against the man they called "the Wadd".

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper outlines some of the issues faced by School-Based Youth Health Nurses working in Queensland, in relation to the legal principles surrounding the provision of reproductive and sexual health advice. The paper outlines a number of specific issues faced by nurses working within this setting and considers the legal principles underpinning the issues concerning consent and confidentiality. The discussion in this paper demonstrates how the legal principles – which are often viewed as complex and uncertain by nurses working within this field – may be used as a guide to underpin good practice and compliance with the law. Although this paper is considered in the context of nurses working within Queensland, the principles and factors outlined are relevant to healthcare practitioners working within all Australian jurisdictions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research contributes new understandings about the development of the professional identity of child care practitioners and how professional identity changes during the transition from student to practitioner. Self-authorship theory was used as the framework to investigate the development of professional identity through exploration of beliefs about practice, sense of self, and capabilities for collaborative engagement. Students recruited for this research were completing their qualifications to work with young children in child care settings. Data from initial and follow-up interviews were analysed to understand change over time in professional identity. Findings indicated a need for training institutions and workplaces to move beyond competency-based training approaches to include more critically reflective learning opportunities. Such a focus on critical reflection has implications for improving the skills, status, and recognition of child care practitioners as educators.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped with a bilinear map. Selective-identity secure IBE is a slightly weaker security model than the standard security model for IBE. In this model the adversary must commit ahead of time to the identity that it intends to attack, whereas in an adaptive-identity attack the adversary is allowed to choose this identity adaptively. Our first system—BB1—is based on the well studied decisional bilinear Diffie–Hellman assumption, and extends naturally to systems with hierarchical identities, or HIBE. Our second system—BB2—is based on a stronger assumption which we call the Bilinear Diffie–Hellman Inversion assumption and provides another approach to building IBE systems. Our first system, BB1, is very versatile and well suited for practical applications: the basic hierarchical construction can be efficiently secured against chosen-ciphertext attacks, and further extended to support efficient non-interactive threshold decryption, among others, all without using random oracles. Both systems, BB1 and BB2, can be modified generically to provide “full” IBE security (i.e., against adaptive-identity attacks), either using random oracles, or in the standard model at the expense of a non-polynomial but easy-to-compensate security reduction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper surveys the practical benefits and drawbacks of several identity-based encryption schemes based on bilinear pairings. After providing some background on identity-based cryptography, we classify the known constructions into a handful of general approaches. We then describe efficient and fully secure IBE and IBKEM instantiations of each approach, with reducibility to practice as the main design parameter. Finally, we catalogue the strengths and weaknesses of each construction according to a few theoretical and many applied comparison criteria.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Guitar technology underwent significant changes in the 20th century in the move from acoustic to electric instruments. In the first part of the 21st century, the guitar continues to develop through its interaction with digital technologies. Such changes in guitar technology are usually grounded in what we might call the "cultural identity" of the instrument: that is, the various ways that the guitar is used to enact, influence and challenge sociocultural and musical discourses. Often, these different uses of the guitar can be seen to reflect a conflict between the changing concepts of "noise" and "musical sound."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Review(s) of: Settling the Pop Score: Pop Texts and Identity Politics, Stan Hawkins, Aldershot, Hants. : Ashgate, 2002, ISBN 0 7546 0352 0; pb, 234pp, ill, music exx, bibl. , discog. , index. The scholarly study of popular music has its origins in sociology and cultural studies, disciplinary areas in which musical meaning is often attributed to aspects of economical and sociological function. Against this tradition, recent writers have offered what is now referred to as ‘popular musicology’: a method or approach that tends towards a specific engagement with ‘pop texts’ on aesthetic, and perhaps even ‘musical’ terms. Stan Hawkins uses the term popular musicology ‘at his own peril,’ clearly recognising the implicit scholarly danger in his approach, whereby ‘formalist questions of musical analysis’ are dealt with ‘alongside the more intertextual discursive theorisations of musical expression’ (p. xii). In other words, popular musicologists dare to tread that fine line between text and context. As editor of the journal Popular Musicology Online, Hawkins is a leading advocate of this practice, specifically in the application of music-analytical techniques to popular music. His methodology attests to the influence of other leading figures in the area, notably Richard Middleton, Allan F. Moore and Derek Scott (general editor of the Ashgate Popular and Folk Music Series in which this book is published).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Objective To understand how the formal curriculum experience of an Australian undergraduate pharmacy program supports students’ professional identity formation. Methods A qualitative ethnographic study was conducted over four weeks using participant observation and examined the ‘typical’ student experience from the perspective of a pharmacist. A one-week period of observation was undertaken with each of the four year groups (that is, for years one to four) comprising the undergraduate curriculum. Data were collected through observation of the formal curriculum experience using field notes, a reflective journal and informal interviews with 38 pharmacy students. Data were analyzed thematically using an a priori analytical framework. Results Our findings showed that the observed curriculum was a conventional curricular experience which focused on the provision of technical knowledge and provided some opportunities for practical engagement. There were some opportunities for students to imagine themselves as pharmacists, for example, when the lecture content related to practice or teaching staff described their approach to practice problems. However, there were limited opportunities for students to observe pharmacist role models, experiment with being a pharmacist or evaluate their professional identities. While curricular learning activities were available for students to develop as pharmacists e.g. patient counseling, there was no contact with patients and pharmacist academic staff tended to role model as educators with little evidence of their pharmacist selves. Conclusion These findings suggest that the current conventional approach to the curriculum design may not be fully enabling learning experiences which support students in successfully negotiating their professional identities. Instead it appeared to reinforce their identities as students with a naïve understanding of professional practice, making their future transition to professional practice challenging.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The notion of identity-based IB cryptography was proposed by Shamir [177] as a specialization of public key PK cryptography which dispensed with the need for cumbersome directories, certificates, and revocation lists.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Enterprises, both public and private, have rapidly commenced using the benefits of enterprise resource planning (ERP) combined with business analytics and “open data sets” which are often outside the control of the enterprise to gain further efficiencies, build new service operations and increase business activity. In many cases, these business activities are based around relevant software systems hosted in a “cloud computing” environment. “Garbage in, garbage out”, or “GIGO”, is a term long used to describe problems in unqualified dependency on information systems, dating from the 1960s. However, a more pertinent variation arose sometime later, namely “garbage in, gospel out” signifying that with large scale information systems, such as ERP and usage of open datasets in a cloud environment, the ability to verify the authenticity of those data sets used may be almost impossible, resulting in dependence upon questionable results. Illicit data set “impersonation” becomes a reality. At the same time the ability to audit such results may be an important requirement, particularly in the public sector. This paper discusses the need for enhancement of identity, reliability, authenticity and audit services, including naming and addressing services, in this emerging environment and analyses some current technologies that are offered and which may be appropriate. However, severe limitations to addressing these requirements have been identified and the paper proposes further research work in the area.