770 resultados para Poetics of identity


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ce mémoire de maîtrise porte sur une poétique de l’excès dans Orlando de Virginia Woolf et Nightwood de Djuna Barnes comme une stratégie combattant la tendance qu’a le modernisme à dévaloriser l’écriture des femmes comme étant trop ornementale. J’expose comment Ezra Pound, T.S. Eliot, et Wyndham Lewis tentent de récupérer la notion du détail afin d’affirmer une poétique masculin. Je fais appel également aux oeuvres de l’architecte autrichien Adolf Loos qui souligne sa dénonciation de l’ornement comme régressif. Dans Orlando et Nightwood, je considère l’excès associé au corps. Je soutiens que, dans ces textes, les corps dépassent les limites de la représentation moderniste. Je considère aussi comment Orlando et Nightwood font apparaître la narration comme ornement et écrivent excessivement l’histoire et le temps. Pour conclure, je propose une façon de lire l’excès afin de reconceptualiser le potentiel de production de la signification dans des textes modernistes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this computerized, globalised and internet world our computer collects various types of information’s about every human being and stores them in files secreted deep on its hard drive. Files like cache, browser history and other temporary Internet files can be used to store sensitive information like logins and passwords, names addresses, and even credit card numbers. Now, a hacker can get at this information by wrong means and share with someone else or can install some nasty software on your computer that will extract your sensitive and secret information. Identity Theft posses a very serious problem to everyone today. If you have a driver’s license, a bank account, a computer, ration card number, PAN card number, ATM card or simply a social security number you are more than at risk, you are a target. Whether you are new to the idea of ID Theft, or you have some unanswered questions, we’ve compiled a quick refresher list below that should bring you up to speed. Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money or get other benefits. Identity theft is a serious crime, which is increasing at tremendous rate all over the world after the Internet evolution. There is widespread agreement that identity theft causes financial damage to consumers, lending institutions, retail establishments, and the economy as a whole. Surprisingly, there is little good public information available about the scope of the crime and the actual damages it inflicts. Accounts of identity theft in recent mass media and in film or literature have centered on the exploits of 'hackers' - variously lauded or reviled - who are depicted as cleverly subverting corporate firewalls or other data protection defenses to gain unauthorized access to credit card details, personnel records and other information. Reality is more complicated, with electronic identity fraud taking a range of forms. The impact of those forms is not necessarily quantifiable as a financial loss; it can involve intangible damage to reputation, time spent dealing with disinformation and exclusion from particular services because a stolen name has been used improperly. Overall we can consider electronic networks as an enabler for identity theft, with the thief for example gaining information online for action offline and the basis for theft or other injury online. As Fisher pointed out "These new forms of hightech identity and securities fraud pose serious risks to investors and brokerage firms across the globe," I am a victim of identity theft. Being a victim of identity theft I felt the need for creating an awareness among the computer and internet users particularly youngsters in India. Nearly 70 per cent of Indian‘s population are living in villages. Government of India already started providing computer and internet facilities even to the remote villages through various rural development and rural upliftment programmes. Highly educated people, established companies, world famous financial institutions are becoming victim of identity theft. The question here is how vulnerable the illiterate and innocent rural people are if they suddenly exposed to a new device through which some one can extract and exploit their personal data without their knowledge? In this research work an attempt has been made to bring out the real problems associated with Identity theft in developed countries from an economist point of view.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this final week we will look at the tensions between ludology and narratology in games design, in effect how the agency of games has been reconciled with the dramatic requirements (and lack of agency) in narrative. I will argue that there are two broad approaches, the mainstream method of concentrating in the Fabula, and a method pioneered by many indie games of fusing narrative and play. We will look in more detail at what this might mean in terms of thematic cohesion, diegetic choices, and mechanics and metaphor. Finally we look at Spec Ops: The Line, as a rare example of a AAA title that takes this fusion approach. Looking at how the game uses many of the techniques we have explored.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

En este trabajo se expone e ilustra un modelo teórico para entender las funciones de la identidad, así como los mecanismos psicosociales asociados a su construcción: “Modelo Evolutivo y Funcional de la Identidad Mediada” (MEBIM). La identidad, mediada narrativamente, cumple una función personal orientada a la dirección de la propia vida, así como una función sociocultural vinculada a la búsqueda de reconocimiento de los derechos de los grupos sociales a los que uno se siente apegado. Se ilustran los factores asociados a la construcción de la identidad personal (sí mismos posibles, transiciones vitales, vínculo afectivo) y sociocultural (acción-transformación e identificación simbólica) a partir de 12 historias de vida realizadas con mestizos e indígenas de la Universidad Intercultural de Chiapas (México). Se sugiere que en contextos educativos formales, como la escuela o la Universidad, se deben propiciar narrativas personales y socioculturales con el objetivo de optimizar la identidad en un mundo a la vez globalizado y plural

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Rights as well as democracy play a crucial role in the legitimacy of the EU and constitutional patriotism has been influential in attempting to link them together. The article seeks to engage in a critique of constitutional patriotism on two fronts. First, it distinguishes between the various types of right that exist within EU law-Community, citizenship and fundamental-and then analyses the place of these rights within various political models of the EU ranging from nationalism to republicanism. It argues that constitutional patriotism does not enjoy a monopoly on rights discourse in the EU: most models of the EU see a place for rights; it is just that the type of right supported varies. Secondly, advocates of constitutional patriotism argue that EU rights generate European identity. The article questions the extent to which this is the case, arguing that identity potential varies considerably according to the type of EU right concerned.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Individual identification via DNA profiling is important in molecular ecology, particularly in the case of noninvasive sampling. A key quantity in determining the number of loci required is the probability of identity (PIave), the probability of observing two copies of any profile in the population. Previously this has been calculated assuming no inbreeding or population structure. Here we introduce formulae that account for these factors, whilst also accounting for relatedness structure in the population. These formulae are implemented in API-CALC 1.0, which calculates PIave for either a specified value, or a range of values, for F-IS and F-ST.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Is the human body a suitable place for a microchip? Such discussion is no longer hypothetical - in fact in reality it has not been so for some years. Restorative devices such as pacemakers and cochlear implants have become well established, yet these sophisticated devices form notably intimate links between technology and the body. More recent developments in engineering technologies have meant that the integration of silicon with biology is now reaching new levels - with devices which interact directly with the brain. As medical technologies continue to advance, their potential benefits for human enhancement will become increasingly attractive, and so we need to seriously consider where this may take us. In this paper, an attempt is made to demonstrate that, in the medical context, the foundations of more advanced implantable enhancement technologies are already notably progressed, and that they are becoming more science fact than is widely considered. A number of wider moral, ethical and legal issues stem from enhancement applications and it is difficult to foresee the social consequences, the fundamental changes on our very conception of self and the impact on our identity of adoption long term. As a result, it is necessary to acknowledge the possibilities and is timely to have debate to address the wider implications these possibilities may bring.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper discusses the RFID implants for identification via a sensor network. Brain-computer implants linked in to a wireless network. Biometric identification via body sensors is also discussed. The use of a network as a means for remote and distance monitoring of humans opens up a range of potential uses. Where implanted identification is concerned this immediately offers high security access to specific areas by means of only an RFID device. If a neural implant is employed then clearly the information exchanged with a network can take on a much richer form, allowing for identification and response to an individual's needs based on the signals apparent on their nervous system.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The criticism of Jack London’s work has been dominated by a reliance upon ideas of the ‘real’, the ‘authentic’ and the ‘archetypal’. One of the figures in London’s work around which these ideas crystallize is that of the ‘wolf’. This article will examine the way the wolf is mobilized both in the criticism of Jack London’s work and in an example of the work: the novel White Fang (1906). This novel, though it has often been read as clearly delimiting and demarcating the realms of nature and culture, can be read conversely as unpicking the deceptive simplicity of such categories, as troubling essentialist notions of identity (human/animal, male/female, white/Indian) and as engaging with the complexity of the journey in which a ‘small animal … becomes human-sexual by crossing the infinite divide that separates life from humanity, the biological from the historical, “nature” from “culture” ’ (Althusser 1971: 206).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Between 1972 and 2001, the English late-modernist poet Roy Fisher provided the text for nine separate artist's books produced by Ron King at the Circle Press. Taken together, as Andrew Lambirth has written, the Fisher-King collaborations represent a sustained investigation of the various ways in which text and image can be integrated, breaking the mould of the codex or folio edition, and turning the book into a sculptural object. From the three-dimensional pop-up designs of Bluebeard's Castle (1973), each representing a part of the edifice (the portcullis, the armoury and so on), to ‘alphabet books’ such as The Half-Year Letters (1983), held in an ingenious french-folded concertina which can be stretched to over a metre long or compacted to a pocketbook, the project of these art books is to complicate their own bibliographic codes, and rethink what a book can be. Their folds and reduplications give a material form to the processes by which meanings are produced: from the discovery, in Top Down, Bottom Up (1990), of how to draw on both sides of the page at the same time, to the developments of The Left-Handed Punch (1987) and Anansi Company (1992), where the book becomes first a four-dimensional theatre space, in which a new version of Punch and Judy is played out by twelve articulated puppets, and then a location for characters that are self-contained and removable, in the form of thirteen hand-made wire and card rod-puppets. Finally, in Tabernacle (2001), a seven-drawer black wooden cabinet that stands foursquare like a sculpture (and sells to galleries and collectors for over three thousand pounds), the conception of the book and the material history of print are fully undone and reconstituted. This paper analyses how the King-Fisher art books work out their radically material poetics of the book; how their emphasis on collaboration, between artist and poet, image and text, and also book and reader – the construction of meaning becoming a co-implicated process – continuously challenges hierarchies and fixities in our conception of authorship; and how they re-think the status of poetic text and the construction of the book as material object.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The relationship between developmental experiences, and an individual’s emerging beliefs about themselves and the world, is central to many forms of psychotherapy. People suffering from a variety of mental health problems have been shown to use negative memories when defining the self, however little is known about how these negative memories might be organised and relate to negative self-images. In two online studies with middle-aged (N = 18; Study 1) and young (N = 56; Study 2) adults, we found that participants’ negative self-images (e.g., I am a failure) were associated with sets of autobiographical memories that formed clustered distributions around times of self-formation, in much the same pattern as for positive self-images (e.g., I am talented). This novel result shows that highly organised sets of salient memories may be responsible for perpetuating negative beliefs about the self. Implications for therapy are discussed.