949 resultados para cleft constructions
Resumo:
Formal incentives systems aim to encourage improved performance by offering a reward for the achievement of project-specific goals. Despite argued benefits of incentive systems on project delivery outcomes, there remains debate over how incentive systems can be designed to encourage the formation of strong project relationships within a complex social system such as an infrastructure project. This challenge is compounded by the increasing emphasis in construction management research on the important mediating influence of technical and organisational context on project performance. In light of this challenge, the research presented in this paper focuses on the design of incentive systems in four infrastructure projects: two road reconstructions in the Netherlands and two building constructions in Australia. Based on a motivational theory frame, a cross case analysis is conducted to examine differences and similarities across social and cultural drivers impacting on the effectiveness of the incentive systems in light of infrastructure project context. Despite significant differences in case project characteristics, results indicate the projects’ experience similar social drivers impacting on incentive effectiveness. Significant value across the projects was placed on: varied performance goals and multiple opportunities to across the project team to pursue incentive rewards; fair risk allocation across contract parties; value-driven tender selection; improved design-build integration; and promotion of future work opportunities. However, differences across the contexts were identified. Results suggest future work opportunities were a more powerful social driver in upholding reputation and establishing strong project relationships in the Australian context. On the other hand, the relationship initiatives in the Dutch context seemed to be more broadly embraced resulting in a greater willingness to collaboratively manage project risk. Although there are limitations with this research in drawing generalizations across two sets of case projects, the results provide a strong base to explore the social and cultural influences on incentive effectiveness across different geographical and contextual boundaries in future research.
Resumo:
There growing recognition that a contributor to the repeat crises of child sexual abuse (CSA) by personnel in Christian institutions (PICIs), is the often gendered culture of Christian institutions themselves. This work explores theological discursive constructions of masculinity and sexuality and their implications for addressing CSA by PICIs. The perspectives discussed here are of PICIs who participated in a research project conducted in Australia. From these perspectives male gendered and sexual performance is constructed through discourse as both an explanation and solution to offending behaviour. Similarly, sexuality is viewed as God-given, heteronormative and legitimately expressed only within the bounds of marriage. This work draws on Foucault and feminist discourses as they relate to CSA by PICIs and institutional discourses. This work offers a perspective of PICIs that may not otherwise be heard in the common discourses of CSA in Christian Institutions.
Resumo:
Like many other cataclysmic events September 11, a day now popularly believed to have 'changed the world', has become a topic taken up by children's writers. This thesis, titled The Whole World Shook: Ethnic, National and Heroic Identities in Children's Fiction About 9/11, examines how cultural identities are constructed within fictional texts for young people written about the attacks on the Twin Towers. It identifies three significant identity categories encoded in 9/11 books for children: ethnic identities, national identities, and heroic identities. The thesis argues that the identities formed within the selected children's texts are in flux, privileging performances of identities that are contingent on post-9/11 politics. This study is located within the field of children's literature criticism, which supports the understanding that children's books, like all texts, play a role in the production of identities. Children's literature is highly significant both in its pedagogical intent (to instruct and induct children into cultural practices and beliefs) and in its obscurity (in making the complex simple enough for children, and from sometimes intentionally shying away from difficult things). This literary criticism informed the study that the texts, if they were to be written at all, would be complex, varied and most likely as ambiguous and contradictory as the responses to the attacks on New York themselves. The theoretical framework for this thesis draws on a range of critical theories including literary theory, cultural studies, studies of performativity and postmodernism. This critical framework informs the approach by providing ways for: (i) understanding how political and ideological work is performed in children's literature; (ii) interrogating the constructed nature of cultural identities; (iii) developing a nuanced methodology for carrying out a close textual analysis. The textual analysis examines a representative sample of children's texts about 9/11, including picture books, young adult fiction, and a selection of DC Comics. Each chapter focuses on a different though related identity category. Chapter Four examines the performance of ethnic identities and race politics within a sample of picture books and young adult fiction; Chapter Five analyses the construction of collective, national identities in another set of texts; and Chapter Six does analytic work on a third set of texts, demonstrating the strategic performance of particular kinds of heroic identities. I argue that performances of cultural identities constructed in these texts draw on familiar versions of identities as well as contribute to new ones. These textual constructions can be seen as offering some certainties in increasingly uncertain times. The study finds, in its sample of books a co-mingling of xenophobia and tolerance; a binaried competition between good and evil and global harmony and national insularity; and a lauding of both the commonplace hero and the super-human. Being a recent corpus of texts about 9/11, these texts provide information on the kinds of 'selves' that appear to be privileged in the West since 2001. The thesis concludes that the shifting identities evident in texts that are being produced for children about 9/11 offer implicit and explicit accounts of what constitute good citizenship, loyalty to nation and community, and desirable attributes in a Western post-9/11 context. This thesis makes an original contribution to the field of children's literature by providing a focussed and sustained analysis of how texts for children about 9/11 contribute to formations of identity in these complex times of cultural unease and global unrest.
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
Resumo:
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash function constructions proposed in the literature fit in the SFPF framework while others that do not fit in this framework are not indifferentiable from a RO. We also show that the SFPF hash function framework with the provision of MD strengthening generalizes any n -bit-iterated hash function based on an n -bit compression function and with an n -bit chaining value that is proven indifferentiable from a RO.
Resumo:
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).
Resumo:
In this paper we present concrete collision and preimage attacks on a large class of compression function constructions making two calls to the underlying ideal primitives. The complexity of the collision attack is above the theoretical lower bound for constructions of this type, but below the birthday complexity; the complexity of the preimage attack, however, is equal to the theoretical lower bound. We also present undesirable properties of some of Stam’s compression functions proposed at CRYPTO ’08. We show that when one of the n-bit to n-bit components of the proposed 2n-bit to n-bit compression function is replaced by a fixed-key cipher in the Davies-Meyer mode, the complexity of finding a preimage would be 2 n/3. We also show that the complexity of finding a collision in a variant of the 3n-bits to 2n-bits scheme with its output truncated to 3n/2 bits is 2 n/2. The complexity of our preimage attack on this hash function is about 2 n . Finally, we present a collision attack on a variant of the proposed m + s-bit to s-bit scheme, truncated to s − 1 bits, with a complexity of O(1). However, none of our results compromise Stam’s security claims.
Resumo:
The competition to select a new secure hash function standard SHA-3 was initiated in response to surprising progress in the cryptanalysis of existing hash function constructions that started in 2004. In this report we survey design and cryptanalytic results of those 14 candidates that remain in the competition, about 1.5 years after the competition started with the initial submission of the candidates in October 2008. Implementation considerations are not in the scope of this report. The diversity of designs is also reflected in the great variety of cryptanalytic techniques and results that were applied and found during this time. This report gives an account of those techniques and results.
Resumo:
We show the first deterministic construction of an unconditionally secure multiparty computation (MPC) protocol in the passive adversarial model over black-box non-Abelian groups which is both optimal (secure against an adversary who possesses any t
Resumo:
Strengths-based approaches draw upon frameworks and perspectives from social work and psychology but have not necessarily been consistently defined or well articulated across disciplines. Internationally, there are increasing calls for professionals in early years settings to work in strengths-based ways to support the access and participation of all children and families, especially those with complex needs. The purpose of this paper is to examine a potential promise of innovative uses of strengths-based approaches in early years practice and research in Australia, and to consider implications for application in other national contexts. In this paper, we present three cases (summarised from larger studies) depicting different applications of the Strengths Approach, under pinned by collaborative inquiry at the interface between practice and research. Analysis revealed three key themes across the cases: (i) enactment of strengths-based principles, (ii) the bi-directional and transformational influences of the Strengths Approach (research into practice/practice into research), and (iii) heightened practitioner and researcher awareness of, and responsiveness to, the operation of power. The findings highlight synergies and challenges to constructing and actualising strengths-based approaches in early years childhood research and practice. The case studies demonstrate that although constructions of what constitutes strengths-based research and practice requires ongoing critical engagement, redefining, and operationalising, using strengths-based approaches in early years settings can be generative and worthwhile.
Resumo:
The new Australian Curriculum and national standardised testing have placed the teaching of numeracy across the curriculum at the forefront of what Australian schools must do. However, it has been left to schools to determine how they do this. Although there is a growing body of literature giving examples of pedagogies that embed numeracy in various learning areas, there are few studies of cross-curricular numeracy from the management perspective. This paper responds to the research question: How do selected Queensland secondary schools interpret and apply the Australian Curriculum requirement to embed numeracy throughout the curriculum? A multiple case study design was used to investigate the actions of the senior managers and mathematics teachers in three large secondary schools located in outer Brisbane. The numeracy practices in the three schools were interpreted from asocial constructivist perspective. The study found that in each school key managers had differing constructions of numeracy that led to confusion in administrative practices, policy development and leadership. The lack of coordinated cross-curricular action in numeracy in all three schools points to the difficulty that arises when teachers do not share the cross-curricular vision of numeracy present in the Australian Curriculum. The managers identified teachers’ commitment, understanding, or skills in relation to numeracy as significant barriers to the successful implementation of numeracy in their school. Adoption of the Australian Curriculum expectation of embedding numeracy across the curriculum will require school managers to explicitly commit to initiatives that require persistence,time and, most importantly, money.
Resumo:
Without question a child’s death is a devastating event for parents and their families. Health professionals working with the dying child and family draw upon their expertise and experience to engage with children, parents, and families on this painful journey. A delicate and sensitive area of practice, it has strong and penetrating effects on health professionals. They employ physical, emotional, spiritual and problem solving strategies to continue to perform this role effectively and to protect their continued sense of well-being. Aim To explore health professionals’ perceptions of bereavement support surrounding the loss of a child. Methods The research was underpinned by social constructionism. Semi-structured interviews were held with 10 health professionals including doctors, nurses and social workers who were directly involved in the care of the dying child and family in 7 cases of paediatric death. Health professional narratives were analysed consistent with Charmarz’s (2006) approach. Results For health professionals, constructions around coping emerged as peer support, personal coping strategies, family support, physical impact of support and spiritual beliefs . Analysis of the narratives also revealed health professionals’ perceptions of their support provision. Conclusion Health professionals involved in caring for dying children and their families use a variety of strategies to cope with the emotional and physical toll of providing support. They also engage in self-assessment to evaluate their support provision and this highlights the need for self-evaluation tools in paediatric palliative care.
Resumo:
The increasing linguistic and cultural diversity of our contemporary world points to the salience of maintaining and developing Heritage Language of ethnic minority groups. The mutually constitutive effect between Heritage Language learning and ethnic identity construction has been well documented in the literature. Classical social psychological work often quantitatively structures this phenomenon in a predictable linear relationship. In contrast, poststructural scholarship draws on qualitative approaches to claim the malleable and multiple dynamics behind the phenomenon. The two schools oppose but complement each other. Nevertheless, both schools struggle to capture the detailed and nuanced construction of ethnic identity through Heritage Language learning. Different from the extant research, we make an attempt to ethno-methodologically unearth the nuisances and predicaments embedded in the reflexive, subtle, and multi-layered identity constructions through nuanced, inter-nested language practices. Drawing on data from the qualitative phase of a large project, we highlight some small but powerful moments abstracted from the interview accounts of five Chinese Australian young people. Firstly, we zoom in on the life politics behind the ‘seen but unnoticed’ stereotype that looking Chinese means being able to speak Chinese. Secondly, we speculate the power relations between the speaker and the listener through the momentary and inadvertent breaches of the taken-for-granted stereotype. Next, we unveil how learning Chinese has become an accountably rational priority for these young Chinese Australians. Finally, we argue that the normalised stereotype becomes visible and hence stable when it is breached – a practical accomplishment that we term ‘habitus realisation’.
Resumo:
This chapter discusses the fast emerging challenges for Malay and Muslim sexual minority storytellers in the face of an aggressive state-sponsored Islamisation of a constitutionally secular Malaysia. I examine the case of Azwan Ismail, a gay Malay and Muslim Malaysian who took part in the local ‘It Gets Better’ project, and who suffered an onslaught of hostile comments from fellow Malay Muslims. Azwan’s experience makes one question how a message of discouraging suicidal tendencies among sexual minority youths can be so vehemently misperceived. Azwan’s existential challenges – stemming from the tension between his own constructions of self and those of others – (re)present a unique challenge in the long struggle for human rights. In my examination of the arising contradictions, I highlight the challenges for Azwan’s existential self – one who is deemed morally bankrupt by hostile audiences. The purist Sunni Islam agenda in a constitutionally secular Malaysia not only rejects the human rights of the sexual minorities in Malaysia but has also influenced, and is often a leading hostile voice in both regional and international blocs. This self-righteous, supremacist and authoritarian Islam discourages discourse and attacks all differing opinions. This resulting disabling environment for vulnerable, minority communities and their human rights manifests in State-endorsed discrimination, compulsory counselling, forced rehabilitation and criminalisation. It places the rights of the sexual minorities to live within such a society in doubt. In discussing the arising issues, I draw upon literature that investigates the way in which personal stories have traditionally been used to advance human rights. Included too, is the significance and implications of the work by social psychologists in explaining the loss of credibility of personal stories. I then advance an analytical framework that will allow storytelling as a very individual form of witnessing to reclaim and regain its ‘truth to power’.
Resumo:
This paper uses discourse analysis techniques associated with Foucauldian archaeology to examine a teacher education accreditation document from Australia to reveal how graduating teachers are constructed through the discourses presented. The findings reveal a discursive site of contestation within the document itself and a mismatch between the identified policy discourses and those from the academic archive. The authors suggest that rather than contradictory representations of what constitutes graduating teacher quality and professionalism, what is needed is an accreditation process that agrees on constructions of graduate identity and professional practice that enact an intellectual and reflexive form of professionalism.
Resumo:
This article has attempted to investigate the patterns of traditional architecture in Iran's warm and dry climate and whether these patterns have been attended to in Iran's contemporary architecture or not. Since the two elements of culture and climate are much significant in Iran's traditional constructions, this article aimed at dealing with subjects such as the causes of the shapes of traditional buildings in Iran's warm and dry climate in constructions like houses, schools, mosques and bazaars, and why they were constructed in those shapes, and also considering their patterns in these places in the light of cultural and climatic aspects, and their cultural and climatic relationships and investigating cultural-climatic causes of the directions and situations designed for the spaces present in these buildings and finally it is intended to classify the conceptual patterns of the traditional architecture of Iran's warm and dry climate. The article is going to consider the amount of using these patterns in Iran's contemporary architecture. The study has been conducted using library and field method.