878 resultados para Murder--Turkey


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In recent years there has been a noticeable move by various public institutions, such as public service broadcasters and community media organisations, to capture and disseminate the voices and viewpoints of ‘ordinary people’ through inviting them to share stories about their lives. One of the foremost objectives of many such projects is to provide under-represented individuals and groups with an opportunity to express and represent themselves; as such, the capture and broadcast of ‘authentic voices’ is a central value. This paper discusses the notion of ‘authentic voice’, and questions the framing role of public media organisations in storytelling projects that aim to provide individuals with space for self-expression and self-representation. It considers the ways in which tensions arise on multiple levels when individuals are asked to express and represent themselves within projects and spaces that are managed by institutions. This paper begins by discussing the challenges and opportunities that arise within storytelling projects that are facilitated by public institutions and community media arts organisations, and that aim to amplify the voices of “ordinary people” (Thumim, 2009). It examines ways in which ‘voice’ is facilitated, curated, broadcast and distributed within such projects, particularly questioning the ways in which project facilitation and the curation of stories for public broadcast can both help and hinder the amplification of ‘authentic voice’. Furthermore, we seek to discuss how ‘authentic voice’ is defined, and what is involved in the process of amplification. The paper moves on to discuss a case study in order to demonstrate some of the tensions that are evident within a storytelling project that is managed by a public institution – Australia’s national broadcaster – and the ways these tensions impact upon the capture and broadcast of an ‘authentic voice’ for project participants. The Australian Broadcasting Corporation’s (ABC) ‘Heywire’ project is a storytelling competition and website that aims to ‘give voice’ to 16-22 year olds who live in rural, regional and remote parts of Australia. Looking at tensions that exist on organisational, political and philosophical levels within the Heywire project reveals a number of conflicts of interest and objectives between the institution and project participants. This leads us to question whether institutionally-managed storytelling projects can effectively support individuals to have an ‘authentic voice’, and whether struggles of aims and objectives diminish the personal benefits that people may derive from expressing and representing themselves within such projects.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We have used scanning electron microscopy with energy dispersive X-ray analysis to determine the precise formula of plumbotsumite, a rare lead silicate mineral of formula Pb5(OH)10Si4O8. This study forms the first systematic study of plumbotsumite from the Bigadic deposits, Turkey. Vibrational spectroscopy was used to assess the molecular structure of plumbotsumite as the structure is not known. The mineral is characterized by sharp Raman bands at 1047, 1055 and 1060 cm−1 assigned to SiO stretching vibrational modes and sharp Raman bands at 673, 683 and 697 cm−1 assigned to OSiO bending modes. The observation of multiple bands offers support for a layered structure with variable SiO3 structural units. Little information may be obtained from the infrared spectra because of broad spectral profiles. Intense Raman bands at 3510, 3546 and 3620 cm−1 are ascribed to OH stretching modes. Evidence for the presence of water in the plumbotsumite structure was inferred from the infrared spectra.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 2012, Queensland University of Technology (QUT) committed to the massive project of revitalizing its Bachelor of Science (ST01) degree. Like most universities in Australia, QUT has begun work to align all courses by 2015 to the requirements of the updated Australian Qualifications Framework (AQF) which is regulated by the Tertiary Education Quality and Standards Agency (TEQSA). From the very start of the redesigned degree program, students approach scientific study with an exciting mix of theory and highly topical real world examples through their chosen “grand challenge.” These challenges, Fukushima and nuclear energy for example, are the lenses used to explore science and lead to 21st century learning outcomes for students. For the teaching and learning support staff, our grand challenge is to expose all science students to multidisciplinary content with a strong emphasis on embedding information literacies into the curriculum. With ST01, QUT is taking the initiative to rethink not only content but how units are delivered and even how we work together between the faculty, the library and learning and teaching support. This was the desired outcome but as we move from design to implementation, has this goal been achieved? A main component of the new degree is to ensure scaffolding of information literacy skills throughout the entirety of the three year course. However, with the strong focus on problem-based learning and group work skills, many issues arise both for students and lecturers. A move away from a traditional lecture style is necessary but impacts on academics’ workload and comfort levels. Therefore, academics in collaboration with librarians and other learning support staff must draw on each others’ expertise to work together to ensure pedagogy, assessments and targeted classroom activities are mapped within and between units. This partnership can counteract the tendency of isolated, unsupported academics to concentrate on day-to-day teaching at the expense of consistency between units and big picture objectives. Support staff may have a more holistic view of a course or degree than coordinators of individual units, making communication and truly collaborative planning even more critical. As well, due to staffing time pressures, design and delivery of new curriculum is generally done quickly with no option for the designers to stop and reflect on the experience and outcomes. It is vital we take this unique opportunity to closely examine what QUT has and hasn’t achieved to be able to recommend a better way forward. This presentation will discuss these important issues and stumbling blocks, to provide a set of best practice guidelines for QUT and other institutions. The aim is to help improve collaboration within the university, as well as to maximize students’ ability to put information literacy skills into action. As our students embark on their own grand challenges, we must challenge ourselves to honestly assess our own work.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

"The success of Criminal Laws lies both in its distinctive features and in its appeal to a range of readerships. As one review put it, it is simultaneously a "textbook, casebook, handbook and reference work". As such it is ideal for criminal law and criminal justice courses as a teaching text, combining as it does primary sources with extensive critical commentary and a contextual perspective. It is likewise indispensable to practitioners for its detailed coverage of substantive law and its extensive references and inter-disciplinary approach make it a first point of call for researchers from all disciplines. This fifth edition strengthens these distinctive features. All chapters have been systematically updated to incorporate the plethora of legislative, case law, statistical and research material which has emerged since the previous edition. The critical, thematic, contextual and interdisciplinary perspectives have been continued."--Publisher's website. Table of Contents: 1. Some themes -- 2. Criminalisation -- 3. The criminal process -- 4. Components of criminal offences -- 5. Homicide: murder and involuntary manslaughter -- 6. Defences -- 7. Assault and sexual assault -- 8. Public order offences -- 9. Drugs offences -- 10. Dishonest acquisition -- 11. Extending criminal liability: complicity, conspiracy and association -- 12. Sentencing and penality.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Royal commissions are approached not as exercises in legitimation and closure but as sites of struggle that are heavily traversed by power holders yet are open to the voices of alternative and unofficial social groups, social movements, and individuals. Three case studies are discussed that highlight the hegemony of the legal methodology and discourse that dominate many inquiries. The first case, involving a single-case miscarriage inquiry, involves a man who was accused, convicted, and served a prison sentence for the murder of his wife. Nineteen years following the murder another man confessed to the crime. The official inquiry found that nothing had gone wrong in the criminal justice process; it had operated as it should. Thus, in the face of evidence that the criminal justice process may be flawed, the discursive strategy became one of silence; no explanation was offered except for the declaration that nothing had gone wrong. The fallibility of the criminal justice system was thus hidden from public view. The second case study examines the Wood Royal Commission into corruption charges within the NSW Police Service. The royal commission revealed a bevy of police misconduct offenses including process corruption, improper associations, theft, and substance abuse, among others. The author discusses the ways in which the other criminal justice players, the judiciary and prosecuting attorneys, emerge only briefly as potential ethical agents in relation to police misconduct and corruption and then abruptly disappear again. Yet, these other players are absolved of any responsibility for police misconduct. The third case study involves a spin-off inquiry into the facts surrounding the Leigh Leigh rape and murder case. This case illustrates how official inquires can seek to exclude non-traditional viewpoints and methodologies; in this case, the views of a feminist criminologist. The third case also illustrates how the adversarial process within the legal system allows those with power to subjugate the viewpoints of others through the legitimate use of cross-examination. These three case studies reveal how official inquiries tend to speak from an “idealized conception of justice” and downplay any viewpoint that questions this idealized version of the truth.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The use of hierarchical Bayesian spatial models in the analysis of ecological data is increasingly prevalent. The implementation of these models has been heretofore limited to specifically written software that required extensive programming knowledge to create. The advent of WinBUGS provides access to Bayesian hierarchical models for those without the programming expertise to create their own models and allows for the more rapid implementation of new models and data analysis. This facility is demonstrated here using data collected by the Missouri Department of Conservation for the Missouri Turkey Hunting Survey of 1996. Three models are considered, the first uses the collected data to estimate the success rate for individual hunters at the county level and incorporates a conditional autoregressive (CAR) spatial effect. The second model builds upon the first by simultaneously estimating the success rate and harvest at the county level, while the third estimates the success rate and hunting pressure at the county level. These models are discussed in detail as well as their implementation in WinBUGS and the issues arising therein. Future areas of application for WinBUGS and the latest developments in WinBUGS are discussed as well.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed generation (DG) resources are commonly used in the electric systems to obtain minimum line losses, as one of the benefits of DG, in radial distribution systems. Studies have shown the importance of appropriate selection of location and size of DGs. This paper proposes an analytical method for solving optimal distributed generation placement (ODGP) problem to minimize line losses in radial distribution systems using loss sensitivity factor (LSF) based on bus-injection to branch-current (BIBC) matrix. The proposed method is formulated and tested on 12 and 34 bus radial distribution systems. The classical grid search algorithm based on successive load flows is employed to validate the results. The main advantages of the proposed method as compared with the other conventional methods are the robustness and no need to calculate and invert large admittance or Jacobian matrices. Therefore, the simulation time and the amount of computer memory, required for processing data especially for the large systems, decreases.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RC4(n, m) is a stream cipher based on RC4 and is designed by G. Gong et al. It can be seen as a generalization of the famous RC4 stream cipher designed by Ron Rivest. The authors of RC4(n, m) claim that the cipher resists all the attacks that are successful against the original RC4. The paper reveals cryptographic weaknesses of the RC4(n, m) stream cipher. We develop two attacks. The first one is based on non-randomness of internal state and allows to distinguish it from a truly random cipher by an algorithm that has access to 24·n bits of the keystream. The second attack exploits low diffusion of bits in the KSA and PRGA algorithms and recovers all bytes of the secret key. This attack works only if the initial value of the cipher can be manipulated. Apart from the secret key, the cipher uses two other inputs, namely, initial value and initial vector. Although these inputs are fixed in the cipher specification, some applications may allow the inputs to be under the attacker control. Assuming that the attacker can control the initial value, we show a distinguisher for the cipher and a secret key recovery attack that for the L-bit secret key, is able to recover it with about (L/n) · 2n steps. The attack has been implemented on a standard PC and can reconstruct the secret key of RC(8, 32) in less than a second.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study investigated the population genetics, demographic history and pathway of invasion of the Russian wheat aphid (RWA) from its native range in Central Asia, the Middle East and Europe to South Africa and the Americas. We screened microsatellite markers, mitochondrial DNA and endosymbiont genes in 504 RWA clones from nineteen populations worldwide. Following pathway analyses of microsatellite and endosymbiont data, we postulate that Turkey and Syria were the most likely sources of invasion to Kenya and South Africa, respectively. Furthermore, we found that one clone transferred between South Africa and the Americas was most likely responsible for the New World invasion. Finally, endosymbiont DNA was found to be a high resolution population genetic marker, extremely useful for studies of invasion over a relatively short evolutionary history time frame. This study has provided valuable insights into the factors that may have facilitated the recent global invasion by this damaging pest.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we present the results of a survey conducted to measure the attitudes of the consumers of eHealth towards Accountable-eHealth systems which are designed for information privacy management. A research model is developed that can identify the factors contributing to system acceptance and is validated using quantitative data from 187 completed survey responses from university students studying non-health related courses at a university in Queensland, Australia. The research model is validated using structural equation modelling and can be used to identify how specific characteristics of Accountable-eHealth systems would affect their overall acceptance by future eHealth consumers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper strives to identify barriers that hamper eHealth implementation from different perspectives. The benefits offered by eHealth and the need for eHealth preparedness is first discussed. This is followed by a discussion on the integral components of a robust eHealth infrastructure. Then, the barriers to eHealth such as technical interoperability issues, lack of holistic approach and technology disconnect are explained in detail. Finally, solutions to promote better adoption of eHealth through government policies, standardisation and training are also discussed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A commitment in 2010 by the Australian Federal Government to spend $466.7 million dollars on the implementation of personally controlled electronic health records (PCEHR) heralded a shift to a more effective and safer patient centric eHealth system. However, deployment of the PCEHR has met with much criticism, emphasised by poor adoption rates over the first 12 months of operation. An indifferent response by the public and healthcare providers largely sceptical of its utility and safety speaks to the complex sociotechnical drivers and obstacles inherent in the embedding of large (national) scale eHealth projects. With government efforts to inflate consumer and practitioner engagement numbers giving rise to further consumer disillusionment, broader utilitarian opportunities available with the PCEHR are at risk. This paper discusses the implications of establishing the PCEHR as the cornerstone of a holistic eHealth strategy for the aggregation of longitudinal patient information. A viewpoint is offered that the real value in patient data lies not just in the collection of data but in the integration of this information into clinical processes within the framework of a commoditised data-driven approach. Consideration is given to the eHealth-as-a-Service (eHaaS) construct as a disruptive next step for co-ordinated individualised healthcare in the Australian context.