880 resultados para Book clubs (Discussion groups)
Resumo:
This three-hour workshop tackles the crucial question of whether globally coordinated, market based approaches to funding open access monographs can support the unique needs of Australian research communities. The workshop takes place in the context of the release in August 2013 of the Book Industry Collaborative Council (BICC) report and especially the recommendations included in the chapter on scholarly book publishing in the humanities and social sciences. This workshop, with expert speakers from the BICC Committee and from across the scholarly publishing industry, will discuss the policy issues most likely to ensure that Australian scholarly communities and audiences are best served in an era of digital technology and globalisation. Australia must think globally and support developments that enhance the accessibility of publicly-funded research. Speakers will outline recent developments in scholarly monograph publishing including new Open Access initiatives and developments. Knowledge Unlatched, is one example of an attempt to create an internationally coordinated, market-based route to open access for Humanities, Arts and Social Sciences (HASS) monographs. Knowledge Unlatched, a not-for-profit London-based company is piloting a global library consortium approach to funding open access monographs and released its pilot program in early October with 28 titles from 13 publishers. The workshop invites discussion and debate from librarians, publishers, researchers and research funders on the role of international coordination and markets in securing a more open future for Australian HASS scholarship.
Resumo:
This chapter begins with a discussion of the economic, political, and social context of the recent global financial crisis, which casts into relief current boundaries of criminology, permeated and made fluid in criminology's recent cultural turn. This cultural turn has reinvigorated criminology, providing new objects of analysis and rich and thick descriptions of the relationship between criminal justice and the conditions of life in ‘late modernity’. Yet in comparison with certain older traditions that sought to articulate criminal justice issues with a wider politics of contestation around political economies and social welfare policies of different polities, many of the current leading culturalist accounts tend in their globalized convergences to produce a strangely decontextualized picture in which we are all subject to the zeitgeist of a unitary ‘late modernity’ which does not differ between, for example, social democratic and neo-liberal polities, let alone allow for the widespread persistence of the pre-modern. It is argued that that contrary to this globalizing trend there are signs within criminology that life is being breathed back into social democratic and penal welfare concerns, habitus, and practices. The chapter discusses three of these signs: the emergence of neo-liberalism as a subject of criminology; a developing comparative penology which recognizes differences in the political economies of capitalist states and evinces a renewed interest in inequality; and a nascent revolt against the ‘generative grammar’, ‘pathological disciplinarities’, and ‘imaginary penalities’ of neoliberal managerialism.
Resumo:
“The challenge today is not just retaining talented people, but fully engaging them, capturing their minds and hearts at each stage of their work lives” (Kaye & Jordan-Evans, 2003, p. 11). Engaged employees produce positive work outcomes such as increased productivity satisfaction, and reduced turnover (Kahn, 1990, 1992; Saks, 2006). Engaged employees also impact on customers and co-workers’ positive experiences such as increased customer satisfaction (Wagner & Harter, 2006). Further, engaged employees demonstrate higher levels of trust in management and share more positive experiences with co-workers than disengage employees (Payne, Cangemi, Fuqua, & Muhleakamp, 1998). Past studies show that having a high proportion of engaged employees increases organizational performance, such as profitability and reputation (Wagner & Harter, 2006; Fleming & Asplund, 2007; Ketter, 2008). Having experienced the benefits of having engaged employees, organizations have become more aware of this issue and have been focusing on facilitating engagement climate within workplaces. Recently, an interest in positive psychology, instead of negative aspects of human behaviours, has become a focus for both scholars and practitioners. The trend towards positive psychology has led to the emergence of the concept of work engagement(Chughtai & Buckley, 2008). This article reviews literatures in the area of positive psychology and psychological stress, and discusses how organizations can increase work engagement among their organizational members. The remainder of this article is organised in four sections. First, we define work engagement as used in this article and psychological outcomes of work engagement. Second, we identify ways to increase work engagement among employees. Following this, we further discuss how gender roles influence individuals’ engagement at work. The final sections conclude the paper with a discussion of the practical implications.
Resumo:
Royal commissions are approached not as exercises in legitimation and closure but as sites of struggle that are heavily traversed by power holders yet are open to the voices of alternative and unofficial social groups, social movements, and individuals. Three case studies are discussed that highlight the hegemony of the legal methodology and discourse that dominate many inquiries. The first case, involving a single-case miscarriage inquiry, involves a man who was accused, convicted, and served a prison sentence for the murder of his wife. Nineteen years following the murder another man confessed to the crime. The official inquiry found that nothing had gone wrong in the criminal justice process; it had operated as it should. Thus, in the face of evidence that the criminal justice process may be flawed, the discursive strategy became one of silence; no explanation was offered except for the declaration that nothing had gone wrong. The fallibility of the criminal justice system was thus hidden from public view. The second case study examines the Wood Royal Commission into corruption charges within the NSW Police Service. The royal commission revealed a bevy of police misconduct offenses including process corruption, improper associations, theft, and substance abuse, among others. The author discusses the ways in which the other criminal justice players, the judiciary and prosecuting attorneys, emerge only briefly as potential ethical agents in relation to police misconduct and corruption and then abruptly disappear again. Yet, these other players are absolved of any responsibility for police misconduct. The third case study involves a spin-off inquiry into the facts surrounding the Leigh Leigh rape and murder case. This case illustrates how official inquires can seek to exclude non-traditional viewpoints and methodologies; in this case, the views of a feminist criminologist. The third case also illustrates how the adversarial process within the legal system allows those with power to subjugate the viewpoints of others through the legitimate use of cross-examination. These three case studies reveal how official inquiries tend to speak from an “idealized conception of justice” and downplay any viewpoint that questions this idealized version of the truth.
Resumo:
Review(s) of: An opening: Twelve love stories about art, by Stephanie Radok 2012, Wakefield Press, Adelaide, xiv, 168 p., ISBN 9781743050415 (pbk).
Resumo:
Despite the dominancy of medical explanations for difficult child behavior, the shifting sands that lie beneath the ADHD construct provide an unstable foundation for educational practice. It can be somewhat liberating to remember that “attention deficit hyperactivity disorder” is a label (one of many, including minimal brain damage and hyperkinetic reaction of childhood) that the medical domain has coined to both group and describe certain challenging behaviors exhibited by children and young people (see Smith, Chapter 2). The label is but one conceptualization of what these behaviors mean and, despite the existence of powerful lobby groups, it may not be the best way forward. In what follows, I present an alternative typology to the medical conceptualization by describing some common issues that bring this group of children to attention. In an effort to introduce educationally useful responses to students who are difficult to teach, I will then outline what classroom teachers need to recognize in order to work with these students and realize their potential. To assist teachers in thinking pedagogically, these observations are coupled with well-known and relevant qualities of good teaching to remind teachers of what they already know and to reacquaint them with the power of that knowledge.
Resumo:
The terrorist attacks in the United States on September 11, 2001 appeared to be a harbinger of increased terrorism and violence in the 21st century, bringing terrorism and political violence to the forefront of public discussion. Questions about these events abound, and “Estimating the Historical and Future Probabilities of Large Scale Terrorist Event” [Clauset and Woodard (2013)] asks specifically, “how rare are large scale terrorist events?” and, in general, encourages discussion on the role of quantitative methods in terrorism research and policy and decision-making. Answering the primary question raises two challenges. The first is identify- ing terrorist events. The second is finding a simple yet robust model for rare events that has good explanatory and predictive capabilities. The challenges of identifying terrorist events is acknowledged and addressed by reviewing and using data from two well-known and reputable sources: the Memorial Institute for the Prevention of Terrorism-RAND database (MIPT-RAND) [Memorial Institute for the Prevention of Terrorism] and the Global Terror- ism Database (GTD) [National Consortium for the Study of Terrorism and Responses to Terrorism (START) (2012), LaFree and Dugan (2007)]. Clauset and Woodard (2013) provide a detailed discussion of the limitations of the data and the models used, in the context of the larger issues surrounding terrorism and policy.
Resumo:
This is a discussion of the journal article: "Construcing summary statistics for approximate Bayesian computation: semi-automatic approximate Bayesian computation". The article and discussion have appeared in the Journal of the Royal Statistical Society: Series B (Statistical Methodology).
Resumo:
We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.
Resumo:
We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,⋅), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted.
Resumo:
Review(s) of: Settling the Pop Score: Pop Texts and Identity Politics, Stan Hawkins, Aldershot, Hants. : Ashgate, 2002, ISBN 0 7546 0352 0; pb, 234pp, ill, music exx, bibl. , discog. , index. The scholarly study of popular music has its origins in sociology and cultural studies, disciplinary areas in which musical meaning is often attributed to aspects of economical and sociological function. Against this tradition, recent writers have offered what is now referred to as ‘popular musicology’: a method or approach that tends towards a specific engagement with ‘pop texts’ on aesthetic, and perhaps even ‘musical’ terms. Stan Hawkins uses the term popular musicology ‘at his own peril,’ clearly recognising the implicit scholarly danger in his approach, whereby ‘formalist questions of musical analysis’ are dealt with ‘alongside the more intertextual discursive theorisations of musical expression’ (p. xii). In other words, popular musicologists dare to tread that fine line between text and context. As editor of the journal Popular Musicology Online, Hawkins is a leading advocate of this practice, specifically in the application of music-analytical techniques to popular music. His methodology attests to the influence of other leading figures in the area, notably Richard Middleton, Allan F. Moore and Derek Scott (general editor of the Ashgate Popular and Folk Music Series in which this book is published).
Resumo:
Contribution to a curated book of Australian 45rpm single covers. This contribution is a discussion about the possibilities afforded by available technologies in the late 70s in the production of music-related artwork: record covers, posters, handbills etc.
Reframing Conceptions of Contemporary Literacy Capabilities in Pre-Service Primary Teacher Education
Resumo:
This chapter describes the challenges of integrating new technologies with literacy education in pre-service primary teacher education in Australia. The authors describe the policy context and regulatory mechanisms controlling pre-service education, including a national set of professional standards for graduate teachers, a new national curriculum for school students, the introduction of high stakes national assessment for school students, and the looming threat of decontextualized back-to-the-basics professional entry tests for aspiring teachers. The chapter includes three case studies of the authors’ pedagogical practices that attempt to reframe conceptions of the literacy capabilities of pre-service teachers to reflect the complex and sophisticated requirements of teachers in contemporary schooling. The authors conclude the chapter with a discussion of the implications of these case studies as they illustrate the ways that pre-service teachers can be scaffolded and supported to develop creative capacity and critical awareness of the kinds of literacies required in the digital age despite restrictive regimes.
Resumo:
Most previous work on unconditionally secure multiparty computation has focused on computing over a finite field (or ring). Multiparty computation over other algebraic structures has not received much attention, but is an interesting topic whose study may provide new and improved tools for certain applications. At CRYPTO 2007, Desmedt et al introduced a construction for a passive-secure multiparty multiplication protocol for black-box groups, reducing it to a certain graph coloring problem, leaving as an open problem to achieve security against active attacks. We present the first n-party protocol for unconditionally secure multiparty computation over a black-box group which is secure under an active attack model, tolerating any adversary structure Δ satisfying the Q 3 property (in which no union of three subsets from Δ covers the whole player set), which is known to be necessary for achieving security in the active setting. Our protocol uses Maurer’s Verifiable Secret Sharing (VSS) but preserves the essential simplicity of the graph-based approach of Desmedt et al, which avoids each shareholder having to rerun the full VSS protocol after each local computation. A corollary of our result is a new active-secure protocol for general multiparty computation of an arbitrary Boolean circuit.