828 resultados para Language-based security
Resumo:
The thesis discusses the result of a critical language study (CLS) of Tanzanian Presidential Kiswahili political oratory (TPKPO). The CLS was motivted by the belief that one of the principal contributions that linguists could make to the survival and development of their societies is to adopt what Shapiro (1990:12) paraphrasing Foucault (1977) has callled "a commitment to a form of inquiry aimed at the continuous disruption of the structures of "intelligibility" upon which some of the prevailing hegemonic political prejudices and biases are based. Faifclough's (1989) ideas regarding the need for and how to conduct CLS were dapted to suit the specific goal of the curren study which was to determine the inter and intra speker vriation within contemporary Tanzanian Kiswahili political discourse taking the oratory ex-president J. K. Nyerere and tha of Prersident A. H. Mwinyi as a case in point. The results of the study, which adopted a largely ethnographic research design, permit one to make two important observations about TPKPO.
Resumo:
Could language be a reason why women are under-representedat senior level in the business world? The Language of Female Leadership investigates how female leaders actually use language to achieve their business and relational goals. The author proposes that the language of women leaders is shaped by the type of corporation they work for. Based on the latest research, three types of ‘gendered corporation’ appear to affect the way women interact with colleagues: the male-dominated,the gender-divided and the gender-multiple. This book shows that senior women have to carry out extra ‘linguistic work’ to make their mark in the boardroom. In male-dominated and gender-divided corporations, women must develop an extraordinarylinguistic expertise just to survive. In gender-multiple corporations, this linguistic expertise helps them to be highly regarded and effective leaders.Judith Baxter lectures in Applied Linguistics at the University of Aston. She has written and edited many publications in the field of language and gender, language and education and the language of leadership. She won a government award to conduct a major research study in the language of female leadership.
Resumo:
Recently discovered sources indicate that the Jewish population of East Frisia in Northwest Germany used a variety based on Western Yiddish as an in-group vernacular well into the 20th century. The East Frisian Jewish variety shows contact-induced traces of Low German, mainly in the lexicon but also in a number of morphological structures. This study does not only analyzes the influence of Low German on the East Frisian Jewish variety but also asks the question, whether three hundred years of language contact have led to traces of the Jewish variety in east Frisian Low German.
Resumo:
Der vorliegende Beitrag untersucht die Frage, in welchem Maße sich Institutionen, die niederdeutsche Kulturszene und individuelle Sprecher des Niederdeutschen moderne Kommunikationstechnologien wie das Internet zunutze machen und ob computervermittelte Kommunikation helfen kann, dem Rückgang des Niederdeutschen Einhalt zu gebieten. Die grundsätzliche Herangehensweise ist eine soziolinguistische, die das Internet als sozialen Handlungsraum versteht, in dem Individuen und Institutionen kommunizieren. Für eine derartige Perspektive stehen weniger das Medium oder das Genre im Mittelpunkt des Interesses als vielmehr das kommunizierende Individuum und die Sprachgemeinschaft, in diesem Fall die virtuelle Sprachgemeinschaft. Based on studies that analyse the potential of computer-mediated communication (cmc) to help fight language shift in lesser-used languages, this paper discusses the situation of Low German in Northern Germany. Over the last three decades, Low German has lost more than half of its active speakers. The article raises the question of whether and, if so, how Low German speakers make use of cmc to stem this tide. Following a sociolinguistic approach focussed on the individual speakers who use the Internet as a space for social interaction, it gives an overview of the discursive field of Low German on the internet and analyses in detail the most popular Low German discussion board. It shows that one of the main obstacles to a more successful use of cmc can be found in speakers' complex attitude toward written Low German. © Franz Steiner Verlag Stuttgart.
Resumo:
This hands-on, practical guide for ESL/EFL teachers and teacher educators outlines, for those who are new to doing action research, what it is and how it works. Straightforward and reader friendly, it introduces the concepts and offers a step-by-step guide to going through an action research process, including illustrations drawn widely from international contexts. Specifically, the text addresses: •action research and how it differs from other forms of research •the steps involved in developing an action research project •ways of developing a research focus •methods of data collection •approaches to data analysis •making sense of action research for further classroom action. Each chapter includes a variety of pedagogical activities: •Pre-Reading questions ask readers to consider what they already know about the topic •Reflection Points invite readers to think about/discuss what they have read •action points ask readers to carry out action-research tasks based on what they have read •Classroom Voices illustrate aspects of action research from teachers internationally •Summary Points provide a synopsis of the main points in the chapter
Resumo:
Basic literacy skills are fundamental building blocks of education, yet for a very large number of adults tasks such as understanding and using everyday items is a challenge. While research, industry, and policy-making is looking at improving access to textual information for low-literacy adults, the literacy-based demands of today's society are continually increasing. Although many community-based organizations offer resources and support to adults with limited literacy skills, current programs have difficulties reaching and retaining those that would benefit most from them. To address these challenges, the National Research Council of Canada is proposing a technological solution to support literacy programs and to assist low-literacy adults in today's information-centric society: ALEX© – Adult Literacy support application for EXperiential learning. ALEX© has been created together with low-literacy adults, following guidelines for inclusive design of mobile assistive tools. It is a mobile language assistant that is designed to be used both in the classroom and in daily life, in order to help low-literacy adults become increasingly literate and independent.
Resumo:
This paper proposes a novel framework of incorporating protein-protein interactions (PPI) ontology knowledge into PPI extraction from biomedical literature in order to address the emerging challenges of deep natural language understanding. It is built upon the existing work on relation extraction using the Hidden Vector State (HVS) model. The HVS model belongs to the category of statistical learning methods. It can be trained directly from un-annotated data in a constrained way whilst at the same time being able to capture the underlying named entity relationships. However, it is difficult to incorporate background knowledge or non-local information into the HVS model. This paper proposes to represent the HVS model as a conditionally trained undirected graphical model in which non-local features derived from PPI ontology through inference would be easily incorporated. The seamless fusion of ontology inference with statistical learning produces a new paradigm to information extraction.
Resumo:
Towards the end of the university stage, students residing in the United Arab Emirates and specialising in subjects other than English are expected- amongst other university requirements- to have acquired adequate communicative competence as well as a repertoire of critical thinking skills. Despite the efforts made within the field of teaching English to EFL university students in the country, the output gained in terms of acquired skills and competencies is still below expectations. The main concerns of the current thesis are, therefore, a) to investigate the factors which inhibit EFL university students’ progress in the areas of acquiring adequate communicative competence as well as critical thinking skills, and b) to propose a course book and pedagogic methods to improve students’ progress in the areas of acquiring adequate communicative competence as well as critical thinking skills. Believing in the essential role literature plays in enhancing critical thinking and promoting communicative competence on the part of EFL learners, the current study introduces a course, designed and implemented by the researcher: LEARN AND GAIN. The proposed course is fiction-based language teaching, adopting the view that literature is a resource rather than an object, thus advocating the use of literature as one of the main resources in foreign/second language acquisition. Investigating whether or not the proposed course was effective in promoting EFL university students’ communicative competence as well as enhancing their critical thinking skills, a study sample taken from the study population was selected. Adopting an experimental design, the research project involved two groups: experimental and control. The experimental group students were exposed to the proposed course whilst the control group students were exposed to a general English language course. To examine treatment effectiveness, the researcher set and administered a pre-post test. Divided into two main parts, communicative critical reading competence and communicative critical writing competence, the pre-post test measured subjects’ communicative critical reading competence and subjects’ communicative critical writing competence. In addition, a pre-post questionnaire was administered and a semi-structured interview was conducted involving the experimental group students, to gain an awareness of students’ attitudes towards learning literary texts in general, and the proposed course in particular. To examine issues of interest and relevance, gender differences: male vs. female, and university major: science vs. non-science, were also examined for enrichment purposes. For the purpose of gathering sufficient data about subjects’ achievements on the pre-post, the following statistical tests were conducted: Mann-Whitney test, and paired data t-test. Based on the statistical findings, the experimental group students’ performance on the communicative critical reading competence pre-post test and the communicative critical writing competence pre-post test was significantly better than their counterparts of the control group students. Speaking of gender differences in relation to language performance on the communicative critical reading competence pre-post test and the communicative critical writing competence pre-post test, no significant differences were cited. Neither did the researcher cite any significant performance differences between science/non-science students on the communicative critical reading competence pre-post test and the communicative critical writing competence pre-post test. As far as the questionnaire’s findings are concerned, the experimental group students’ responses to the post-questionnaire’s items were more positive than those of their responses to the pre-questionnaire’s, thus indicating some positive attitudes towards literature, which students possibly gained throughout the course of implementation. Relating the discussion to the interview’s results, students conveyed their satisfaction with the proposed course, emphasising that promoting English language skills through the use of literary texts was rewarding. In the light of findings and conclusions, a number of recommendations as well as implications have been proposed. The current study aimed to arrive at some appropriate suggestions to a number of enquiries, yet concluding with some areas of enquiry to be explored for further research.
Resumo:
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.
Resumo:
This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.
Resumo:
Dynamically adaptive systems (DASs) are intended to monitor the execution environment and then dynamically adapt their behavior in response to changing environmental conditions. The uncertainty of the execution environment is a major motivation for dynamic adaptation; it is impossible to know at development time all of the possible combinations of environmental conditions that will be encountered. To date, the work performed in requirements engineering for a DAS includes requirements monitoring and reasoning about the correctness of adaptations, where the DAS requirements are assumed to exist. This paper introduces a goal-based modeling approach to develop the requirements for a DAS, while explicitly factoring uncertainty into the process and resulting requirements. We introduce a variation of threat modeling to identify sources of uncertainty and demonstrate how the RELAX specification language can be used to specify more flexible requirements within a goal model to handle the uncertainty. © 2009 Springer Berlin Heidelberg.
Resumo:
The recent explosive growth of voice over IP (VoIP) solutions calls for accurate modelling of VoIP traffic. This study presents measurements of ON and OFF periods of VoIP activity from a significantly large database of VoIP call recordings consisting of native speakers speaking in some of the world's most widely spoken languages. The impact of the languages and the varying dynamics of caller interaction on the ON and OFF period statistics are assessed. It is observed that speaker interactions dominate over language dependence which makes monologue-based data unreliable for traffic modelling. The authors derive a semi-Markov model which accurately reproduces the statistics of composite dialogue measurements. © The Institution of Engineering and Technology 2013.
Resumo:
Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.
Resumo:
Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.
Resumo:
This paper seeks to advance research and practice related to the role of employers in all stages of the assessment process of work-based learning (WBL) within a tripartite relationship of higher education institution (HEI), student and employer. It proposes a research-informed quality enhancement framework to develop good practice in engaging employers as partners in assessment. The Enhancement Framework comprises three dimensions, each of which includes elements and questions generated by the experiences of WBL students, HEI staff and employers. The three dimensions of the Enhancement Framework are: 1. ‘premises of assessment’ encompassing issues of learning, inclusion, standards and value; 2. ‘practice’, encompassing stages of assessment made up of course design, assessment task, responsibilities, support, grading and feedback; 3. ‘communication of assessment’ with the emphasis on role clarity, language and pathways. With its prompt questions, the Enhancement Framework may be used as a capacity-building tool for promoting, sustaining, benchmarking and evaluating productive dialogue and critical reflection about assessment between WBL partners. The paper concludes by emphasising the need for professional development as well as policy and research development, so that assessment in WBL can more closely correspond to the potentially transformative nature of the learning experience.