899 resultados para SECRET SOCIETIES
Resumo:
This article examines the representation of Indigenous sexuality on Australian television drama since the 1970s, suggesting the political importance of such representations. In 1976 Justine Saunders became the first regular Indigenous character on an Australian television drama series, as the hairdresser Rhonda Jackson in Number 96. She was presented as sexually attractive, but this was expressed through a rape scene after a party. Twenty five years later, Deborah Mailman starred in The Secret Life of Us, as Kelly, who is also presented as sexually attractive. But her character can be seen in many romantic relationships. The article explores changing representations that moved us from Number 96 to The Secret Life of Us, via The Flying Doctors and Heartland. It suggests that in representations of intimate and loving relationships on screen it has only recently become possible to see hopeful models for interaction between Indigenous and non-Indigenous Australians.
Resumo:
For most of the 20th Century a ‘closed’ system of adoption was practised throughout Australia and other modern Western societies. This ‘closed’ system was characterised by sealed records; amended birth certificates to conceal the adoption, and prohibited contact with all biological family. Despite claims that these measures protected these children from the taint of illegitimacy the central motivations were far more complex, involving a desire to protect couples from the stigma of infertility and to provide a socially acceptable family structure (Triseliotis, Feast, & Kyle, 2005; Marshall & McDonald, 2001). From the 1960s significant evidence began to emerge that many adopted children and adults were experiencing higher incidences of psychological difficulties, characterised by problems with psychological adjustment, building self-esteem and forming a secure personal identity. These difficulties became grouped under the term ‘genealogical bewilderment’. As a result, new policies and practices were introduced to try to place the best interests of the child at the forefront. These changes reflected new understandings of adoption; as not only an individual process but also as a social and relational process that continues throughout life. Secrecy and the withholding of birth information are now prohibited in the overwhelming majority of all domestic adoptions processed in Australia (Marshall & McDonald, 2001). One little known consequence of this ‘closed’ system of adoption was the significant number of children who were never told of their adoptive status. As a consequence, some have discovered or had this information disclosed to them, as adults. The first study that looked at the late discovery of genetic origins experiences was conducted by the Post Adoption Resource Centre in New South Wales in 1999. This report found that the participants in their study expressed feelings of disbelief, confusion, anger, sorrow and loss. Further, the majority of participants continued to struggle with issues arising from this intentional concealment of their genetic origins (Perl & Markham, 1999). A second and more recent study (Passmore, Feeney & Foulstone, 2007) looked at the issue of secrecy in adoptive families as part of a broader study of 144 adult adoptees. This study found that secrecy and/or lies or misinformation on the part of adoptive parents had negative effects on both personal identity and relationships with others. The authors noted that those adoptees who found out about their adoption as adults were ‘especially likely to feel a sense of betrayal’ (p.4). Over recent years, stories of secrecy and late discovery have also started to emerge from sperm donor conceived adults (Spencer, 2007; Turner & Coyle, 2000). Current research evidence shows that although a majority of couples during the donor assisted conception process indicate that they intend to tell the offspring about their origins, as many as two-thirds or more of couples continue to withhold this information from their children (Akker, 2006; Gottlieb, A. McWhinnie, 2001; Salter-Ling, Hunter, & Glover, 2001). Why do they keep this secret? Infertility involves a range of complex factors that are often left unresolved or poorly understood by those choosing insemination by donor as a form of family building (Schaffer, J. A., & Diamond, R., 1993). These factors may only impact after the child is born, when resemblance talk becomes most pronounced. Resemblance talk is an accepted form of public discourse and a social convention that legitimises the child as part of the family and is part of the process of constructing the child’s identity within the family. Couples tend to become focused on resemblance as this is where they feel most vulnerable, and the lack of resemblance to the parenting father may trigger his sense of loss (Becker, Butler, & Nachtigall, 2005).
Resumo:
This review article proposes that theories and research of intergroup contact, prejudice, and acculturation, enhance understanding of the current intercultural relations between Muslims and non-Muslims in Western societies, such as in Australia. The actual and perceived prejudice that many Muslims studying, working, and living in the West have been experiencing following the 2001 terrorist attacks, adds an additional layer of stress to the psychosocial adjustment of Muslim immigrants and sojourners, affecting their cross-cultural adaptation and mental health. Stephan and colleagues’ Integrated Threat Theory argues that the perceived threat experienced by all parties, explains the acts of prejudice. Berry’s acculturation framework highlights that adaptive acculturation is determined by congruent host nation policies and practices and immigrant acculturation strategies. Implications for multicultural policy, intercultural training, and mental health practice, and suggestions for future research, are discussed.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides the obvious feature which is to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor encrypted traffic. Our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment. In this paper, we introduce a novel protocol that utilises a secret-sharing scheme to detect attacks in encrypted networks.
Resumo:
Secret-sharing schemes describe methods to securely share a secret among a group of participants. A properly constructed secret-sharing scheme guarantees that the share belonging to one participant does not reveal anything about the shares of others or even the secret itself. Besides being used to distribute a secret, secret-sharing schemes have also been used in secure multi-party computations and redundant residue number systems for error correction codes. In this paper, we propose that the secret-sharing scheme be used as a primitive in a Network-based Intrusion Detection System (NIDS) to detect attacks in encrypted Networks. Encrypted networks such as Virtual Private Networks (VPNs) fully encrypt network traffic which can include both malicious and non-malicious traffic. Traditional NIDS cannot monitor such encrypted traffic. We therefore describe how our work uses a combination of Shamir's secret-sharing scheme and randomised network proxies to enable a traditional NIDS to function normally in a VPN environment.
Resumo:
Over the past twenty years, the conventional knowledge management approach has evolved into a strategic management approach that has found applications and opportunities outside of business, in society at large, through education, urban development, governance, and healthcare, amongst others. Knowledge-Based Development for Cities and Socieities: Integrated Multi-Level Approaches enlightens the concepts and challenges of knowledge management for both urban environments and entire regions, enhancing the expertise and knowledge of scholars, resdearchers, practitioners, managers and urban developers in the development of successful knowledge-based development policies, creation of knowledte cities and prosperous knowledge societies. This reference creates large knowledge base for scholars, managers and urban developers and increases the awareness of the role of knowledge cities and knowledge socieiteis in the knowledge era, as well as of the challenges and opportunities for future research.
Resumo:
Confucius was and still is one of the most eminent Chinese philosophers. Such is the importance of Confucius’s teachings; it had influenced all aspects of social life in Chinese societies. In the post-Enron, post-Worldcom, and post-Global Financial Crisis era there are raising doubts in the mantra of the so-called conventional wisdom about law and economic order. Whilst many recent publications offered solutions to those problems like advocating for more laws, rules or reforms in regulatory institutions to enhance the regulation of corporate governance. What Confucius advocated was a non-legal, social mode of regulation based on moral ideals that should be embedded into the minds of every person. Whilst this is an ancient concept from primitive societies, its relevance and merits could be seen in modern Chinese societies like Hong Kong. In essence, Confucian principles of governance build on relational and paternalistic order based on moral ideals.
Resumo:
Although the siphon has been in use since ancient times, the exact mechanism of operation is still under discussion. For example, most dictionaries assert that atmospheric pressure is essential to the operation of a siphon rather than gravity. Although there is general agreement that gravity is the motivating force in a siphon, there is disagreement on how liquid enters a siphon – is it atmospheric push or tensile pull? This paper describes a classroom experiment that can serve as the basis for discussing how a siphon works. The experiment involves the construction of a siphon in which the water level in the upper reservoir is held constant during the operation of the siphon. Since the atmosphere is not doing any work on the water in the upper reservoir only gravity is at work. The special situation of a bubble-in-a-siphon is also discussed in which both atmospheric pressure and gravity are at work.
Resumo:
This catalogue essay was written to accompany the launch exhibition of LEVELari in Brisbane. It discusses the history of women-only exhibition spaces in Australia and contextualises LEVELari's place within that tradition.
Resumo:
We utilise the well-developed quantum decision models known to the QI community to create a higher order social decision making model. A simple Agent Based Model (ABM) of a society of agents with changing attitudes towards a social issue is presented, where the private attitudes of individuals in the system are represented using a geometric structure inspired by quantum theory. We track the changing attitudes of the members of that society, and their resulting propensities to act, or not, in a given social context. A number of new issues surrounding this "scaling up" of quantum decision theories are discussed, as well as new directions and opportunities.