965 resultados para Old Book List
Resumo:
The term ‘‘new media’’ has been in play for decades now, and one might be forgiven for wondering how much longer digital forms and platforms can really be called ‘‘new,’’ or even what the scholarship of new media contributes to knowledge. Is it possible to say new things about new media? We think so. This Companion not only demonstrates the variety, salience, and importance of new media studies but also proposes a distinctive approach to the topic : an approach we call ‘‘new media dynamics.’’ In this view, what’s interesting about ‘‘new media’’ is not novelty as such but dynamism. Capitalism, technology, social networks, and media all evolve and change, sometimes to our delight, sometimes our dismay. This incessant process of disruption, renewal, and eventual (if often partial) replacement is now one of humanity’s central experiences. This cutting-edge collection brings together a stellar array of the world’s top researchers, cultural entrepreneurs, and emerging scholars to give the dynamics of new media their first full-length, multidisciplinary, historical, and critical treatment. Across 34 chapters, an international line-up of the very best authors reflects on the historical, technical, cultural, and political changes that underlie the emergence of new media, as existing patterns and assumptions are challenged by the forces of ‘‘creative destruction’’ and innovation, both economic and cultural. At the same time they show that familiar themes and problems carry through from ‘‘old’’media – questions of identity, sexuality, politics, relationships, and meaning.
Resumo:
The quality of data collection methods selected and the integrity of the data collected are integral tot eh success of a study. This chapter focuses on data collection and study validity. After reading the chapter, readers should be able to define types of data collection methods in quantitative research; list advantages and disadvantages of each method; discuss factors related to internal and external validity; critically evaluate data collection methods and discuss the need to operationalise variables of interest for data collection.
Resumo:
Review(s) of: An opening: Twelve love stories about art, by Stephanie Radok 2012, Wakefield Press, Adelaide, xiv, 168 p., ISBN 9781743050415 (pbk).
Resumo:
Television drama used to be the poor relation of the full length feature film made for cinema. No self-respecting movie star would be seen dead in the former, and successful TV actors rarely sustained careers of comparable brilliance in the film industry. Those days are gone, if a series such as House of Cards is any indicator of the trends.
Resumo:
Review(s) of: Settling the Pop Score: Pop Texts and Identity Politics, Stan Hawkins, Aldershot, Hants. : Ashgate, 2002, ISBN 0 7546 0352 0; pb, 234pp, ill, music exx, bibl. , discog. , index. The scholarly study of popular music has its origins in sociology and cultural studies, disciplinary areas in which musical meaning is often attributed to aspects of economical and sociological function. Against this tradition, recent writers have offered what is now referred to as ‘popular musicology’: a method or approach that tends towards a specific engagement with ‘pop texts’ on aesthetic, and perhaps even ‘musical’ terms. Stan Hawkins uses the term popular musicology ‘at his own peril,’ clearly recognising the implicit scholarly danger in his approach, whereby ‘formalist questions of musical analysis’ are dealt with ‘alongside the more intertextual discursive theorisations of musical expression’ (p. xii). In other words, popular musicologists dare to tread that fine line between text and context. As editor of the journal Popular Musicology Online, Hawkins is a leading advocate of this practice, specifically in the application of music-analytical techniques to popular music. His methodology attests to the influence of other leading figures in the area, notably Richard Middleton, Allan F. Moore and Derek Scott (general editor of the Ashgate Popular and Folk Music Series in which this book is published).
Resumo:
"This invaluable companion to The Mammals of Australia is intended to be taken out into the field and used in conjunction with the more comprehensive volume. Genuinely practical in the outdoors, the book includes accounts of 389 species and newly developed, comprehensive identification keys. The Field Companion is introduced by a Mammal Distribution Matrix, which provides a classified checklist of all mammals in Australia (including those extinguished since European settlement) and the distribution of extant species in each state and territory. Species accounts provide initial differentiation, and include notes on identification, size, abundance, habitat and federal list/status, photograph and distribution map, as well as key references, which provide quick access to all relevant state identification keys in the Field Companion and to the longer entry in The Mammals of Australia. The authors have developed separate keys, illustrated with detailed drawings and maps, for the six states and the Northern Territory, to simplify the identification process and allow the reader to confidently separate all mammal species, no matter how subtle the differences. With the addition of these identification keys, this book becomes more than a field guide - although it is intended primarily to be used outdoors - and allows the user to finish identification based on more obscure characteristics, which is an advantage for some hard-to-identify species groups."--Libraries Australia
Resumo:
Mocombe and Tomlin’s Language, Literacy, and Pedagogy in Postindustrial Societies: The Case of Black Academic Underachievement is part of the Routledge Research in Education series. The purpose of the work is to set out a theoretical framework for understanding the black/white academic achievement gap in the age of globalisation and post-industrialism. The authors use each chapter to develop an explanation for the persistent black/white academic achievement gap, by theorising that the gap is an epiphenomenon of global capitalist, post-industrial structures, reinforced by education as an apparatus of the system...
Resumo:
In this chapter we continue the exposition of crypto topics that was begun in the previous chapter. This chapter covers secret sharing, threshold cryptography, signature schemes, and finally quantum key distribution and quantum cryptography. As in the previous chapter, we have focused only on the essentials of each topic. We have selected in the bibliography a list of representative items, which can be consulted for further details. First we give a synopsis of the topics that are discussed in this chapter. Secret sharing is concerned with the problem of how to distribute a secret among a group of participating individuals, or entities, so that only predesignated collections of individuals are able to recreate the secret by collectively combining the parts of the secret that were allocated to them. There are numerous applications of secret-sharing schemes in practice. One example of secret sharing occurs in banking. For instance, the combination to a vault may be distributed in such a way that only specified collections of employees can open the vault by pooling their portions of the combination. In this way the authority to initiate an action, e.g., the opening of a bank vault, is divided for the purposes of providing security and for added functionality, such as auditing, if required. Threshold cryptography is a relatively recently studied area of cryptography. It deals with situations where the authority to initiate or perform cryptographic operations is distributed among a group of individuals. Many of the standard operations of single-user cryptography have counterparts in threshold cryptography. Signature schemes deal with the problem of generating and verifying electronic) signatures for documents.Asubclass of signature schemes is concerned with the shared-generation and the sharedverification of signatures, where a collaborating group of individuals are required to perform these actions. A new paradigm of security has recently been introduced into cryptography with the emergence of the ideas of quantum key distribution and quantum cryptography. While classical cryptography employs various mathematical techniques to restrict eavesdroppers from learning the contents of encrypted messages, in quantum cryptography the information is protected by the laws of physics.
Resumo:
Objective While many jurisdictions internationally now require learner drivers to complete a specified number of hours of supervised driving practice before being able to drive unaccompanied, very few require learner drivers to complete a log book to record this practice and then present it to the licensing authority. Learner drivers in most Australian jurisdictions must complete a log book that records their practice thereby confirming to the licensing authority that they have met the mandated hours of practice requirement. These log books facilitate the management and enforcement of minimum supervised hours of driving requirements. Method Parents of learner drivers in two Australian states, Queensland and New South Wales, completed an online survey assessing a range of factors, including their perceptions of the accuracy of their child’s learner log book and the effectiveness of the log book system. Results The study indicates that the large majority of parents believe that their child’s learner log book is accurate. However, they generally report that the log book system is only moderately effective as a system to measure the number of hours of supervised practice a learner driver has completed. Conclusions The results of this study suggest the presence of a paradox with many parents possibly believing that others are not as diligent in the use of log books as they are or that the system is too open to misuse. Given that many parents report that their child’s log book is accurate, this study has important implications for the development and ongoing monitoring of hours of practice requirements in graduated driver licensing systems.
Resumo:
Increasing role of electronic health care in Australia - possibilities of e-health in terms of provider-to-consumer initiatives and of business-to-business initiatives - challenges of e-health in the context of existing laws and recent reforms - assessment of the adequacy of existing laws to meet the challenges posed by e-health