835 resultados para Security Studies - Military


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Honing and Ladinig (2008) make the assertion that while the internal validity of web-based studies may be reduced, this is offset by an increase in external validity possible when experimenters can sample a wider range of participants and experimental settings. In this paper, the issue of internal validity is more closely examined, and it is agued that there is no necessary reason why internal validity of a web-based study should be worse than that of a lab-based one. Errors of measurement or inconsistencies of manipulation will typically balance across conditions of the experiment, and thus need not necessarily threaten the validity of a studys findings.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most of creativity in the digital world passes unnoticed by the industry practices and policies, and it isn't taken into account in the cultural and economic strategies of the creative industries. We should find ways to catalyze this creative production, showing how the user's contribution may contribute to social learning, cultural and economic advancement. To that effect, we must know what is an open creative system and how it works. Based on this diagnosis, the author that interdisciplinarity is urgent and there is also a need for a science of culture. What is at stake is a strategy of integrated development, as regards the upcoming innovation in its complex, productive and learning aspects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This fourth edition of Communication, Cultural and Media Studies: The Key Concepts is an indispensible guide to the most important terms in the field. It offers clear explanations of the key concepts, exploring their origins, what theyre used for and why they provoke discussion. The author provides a multi-disciplinary explanation and assessment of the key concepts, from authorship to censorship; creative industries to network theory; complexity to visual culture. The new edition of this classic text includes: * Over 200 entries including 50 new entries * All entries revised, rewritten and updated * Coverage of recent developments in the field * Insight into interactive media and the knowledge-based economy * A fully updated bibliography with 400 items and suggestions for further reading throughout the text

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been growing interest in how to make tertiary education more global and international not only in context but, also, in approach and methodology. One area of the education sector that has come under specific focus is the higher education sector curriculum and its design. This paper addresses the process of internationalising the curriculum through the specific example of designing a new literary unit for undergraduate students, mainly literary studies and creative writing students. The literary unit entitled: Imagining the Americas: Contemporary American Literature and Culture, has the added complexity of being a unit about national fiction. This paper explores the practical problems and obstacles encountered in setting up this unit while using a framework of internationalisation. The case study examines the practicalities in implementing strategies that reflect the overall objective of creating global thinkers within a tertiary environment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The article explains and compares sustainability programs available for use by residential and commercial premises; as well as the respective legal tenure frameworks of commercial and residential tenancies. It identifies that while the desire of commercial tenants drive the participation by landlords in these programs, residential tenants appear to be ignorant of sustainable measures. The article contends that the reason for this difference is rooted in the legal and social status of residential tenants. It explores the impact that secure tenure may have in promoting residential sustainability programs and concludes by observing that the lack of involvement of residential tenants in programs stems from the absence of tenure security, which prevents any long term cooperation between the parties.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

While requiring students to think reflectively is a desirable teaching goal, it is often fraught with complexity and is sometimes poorly implemented in higher education. In this paper, we describe an approach to academic reflective practices that fitted a design subject in fashion education and was perceived as effective in enhancing student learning outcomes. In many design-based disciplines, it is essential to evaluate, through a reflective lens, the quality of tangible design outcomes - referred to here as artefacts. Fashion studio based practice (unlike many other theory based disciplines)requires an artefact to be viewed in order to initiate the reflective process. This reflection is not solely limited to reflective writing; the reflection happens through sight, touch and other non-traditional approaches. Fashion students were asked to reflect before, during and after the development of an artefact. Through a variety of media, a review of the first garment prototype - called a Sample Review - occurred. The reflective practices of students during the Sample Review provided a valuable insight into their own learning, as well as a valid assessment indicator for the lecturer. It also mirrored industry practices for design evaluation. We believe that this deliberative approach, characterised by artefact-prompted reflection, has wide applicability across undergraduate courses in a variety of discipline areas.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Existing secure software development principles tend to focus on coding vulnerabilities, such as buffer or integer overflows, that apply to individual program statements, or issues associated with the run-time environment, such as component isolation. Here we instead consider software security from the perspective of potential information flow through a programs object-oriented module structure. In particular, we define a set of quantifiable "security metrics" which allow programmers to quickly and easily assess the overall security of a given source code program or object-oriented design. Although measuring quality attributes of object-oriented programs for properties such as maintainability and performance has been well-covered in the literature, metrics which measure the quality of information security have received little attention. Moreover, existing securityrelevant metrics assess a system either at a very high level, i.e., the whole system, or at a fine level of granularity, i.e., with respect to individual statements. These approaches make it hard and expensive to recognise a secure system from an early stage of development. Instead, our security metrics are based on well-established compositional properties of object-oriented programs (i.e., data encapsulation, cohesion, coupling, composition, extensibility, inheritance and design size), combined with data flow analysis principles that trace potential information flow between high- and low-security system variables. We first define a set of metrics to assess the security quality of a given object-oriented system based on its design artifacts, allowing defects to be detected at an early stage of development. We then extend these metrics to produce a second set applicable to object-oriented program source code. The resulting metrics make it easy to compare the relative security of functionallyequivalent system designs or source code programs so that, for instance, the security of two different revisions of the same system can be compared directly. This capability is further used to study the impact of specific refactoring rules on system security more generally, at both the design and code levels. By measuring the relative security of various programs refactored using different rules, we thus provide guidelines for the safe application of refactoring steps to security-critical programs. Finally, to make it easy and efficient to measure a system design or programs security, we have also developed a stand-alone software tool which automatically analyses and measures the security of UML designs and Java program code. The tools capabilities are demonstrated by applying it to a number of security-critical system designs and Java programs. Notably, the validity of the metrics is demonstrated empirically through measurements that confirm our expectation that program security typically improves as bugs are fixed, but worsens as new functionality is added.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Talk of a possible Israeli strike on Irans nuclear facilities has re-ignited debate over the right of self-defence under international law. Some academics, including Anthony D'Amato and Alan Dershowitz, have claimed that an attack on Iran would be a permissible act of self-defence. Others, such as Kevin Jon Heller, argue that such action would be a clear breach of international law. So, who is correct? Would military action against Iran be legal or illegal?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The emerging principle of a responsibility to protect (R2P) presents a direct challenge to Chinas traditional emphasis on the twin principles of non-intervention in the domestic affairs of other states and non-use of military force. This paper considers the evolution of Chinas relationship with R2P over the past ten years. In particular, it examines how China engaged with R2P during the recent Libyan crisis, and considers what impact this conflict may have first, on Chinese attitudes to R2P, and second, on the future development and implementation of the doctrine itself. This paper argues that Chinas decision to allow the passage of Security Council resolution 1973, authorising force in Libya, was shaped by an unusual set of political and factual circumstances, and should not be viewed as evidence of a dramatic shift in Chinese attitudes towards R2P. More broadly, controversy over the scope of NATOs military action in Libya has raised questions about R2Ps legitimacy, which have contributed to a lack of timely international action in Syria. In the short term at least, this post-Libya backlash against R2P is likely to constrain the Security Councils ability to respond decisively to other civilian protection situations.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper considers four examples of statutory interventions into the common law concept of charity, namely, those of Pennsylvania, Barbados, the definition recommended by the Report of the Inquiry into the Definition of Charities in Australia, and the Recreational Charities legislation of the United Kingdom. It comments on some issues affecting each style of intervention. The paper does not argue against statutory intervention but submits that legislative changes are best made by deeming a particular purpose to be charitable, or not charitable, so that, except to that extent, the common law concept remains intact this is the approach adopted by the Recreational Charities legislation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Examines the effects of national surveillance and local right-wing intimidation on the literary works of author Eleanor Dark during the 1940s and 1950s in Australia. Reason Dark was subjected to national surveillance and right-wing intimidation; Relationship of Dark with local and national security forces; Accusations against the Dark family; Censorship faced by writers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Developing awareness of and maintaining interest in Korea and Korean culture for non-language secondary and tertiary students continues to challenge educators in Australia. A lack of appropriate and accessible creative and cultural materials is a key factor contributing to this challenge. In light of changes made to 'fair use' guidelines for the Digital Millennium Copyright Act in the United States in July 2010, and in order to prepare for a time in the near future when Australian copyright regulations might follow suit, this article offers a framework for utilizing film and digital media contents in the classroom. Case studies of the short digital animation film 'Birthday Boy' (2004) and the feature film The Divine Weapon (2008) are presented in order to illustrate new educational approaches to popular Korean films---the cinematic component of the 'Korean Wave' ('Hanryu' or 'Hallyu' in Korean). It is hoped that this work-in-progress will enable teachers to inspire students with limited language skills to learn more about Korean popular culture, history, and tradition as well as media, politics, and genre studies in dynamic ways through the use of films as cultural texts in the classroom.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose: To study the effect of the size of the surface-coated polycaprolactone (PCL) microparticle carriers on the aerosolization and dispersion of Salbutamol Sulfate (SS) from Dry Powder Inhaler (DPI) formulations. Methods: The microparticles were fabricated using an emulsion technique in four different sizes (25, 48, 104 and 150m) and later coated with Magnesium stearate (MgSt) and leucine. They were characterized by laser diffraction and SEM. The Fine Particle Fraction (FPF) of SS from powder mixtures was determined by a Twin Stage Impinger (TSI). Results: As the carrier size increased from 25m to 150m, the FPF of the SS delivered by the coated PCL particles increased approximately four fold. A linear relationship was found between the FPF and Volume mean Diameter (VMD) of the particles over this range. Conclusions: The dispersion behaviour of SS from PCL carriers was dependent on the inherent size of the carriers and the increased FPF of SS with increased carrier size probably reflects the higher mechanical forces produced due to the carrier-carrier collisions or collisions between the carrier particles and the internal walls of the inhaler during aerosolization.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study reviews the exploratory implementation of an internationalising the curriculum policy in relation to a cultural studies unit within a Creative Industries Faculty at an Australian university. Charting certain pedagogical practices in the delivery of transnational film studies, this case study involves a critical, contextual examination of student feedback as well as current theories about transcultural curricula in general and film studies curricula in particular. The study shows that tertiary students can be provided with an extraordinarily rich range of differing, sometimes conflicting, but always engaging transcultural insights and understandings. It is further argued that transnational competencies may be developed and enabled through the innovative realisation of a type of border crossing pedagogical model, largely by foregrounding transcultural affective issues around social justice.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Although the demand for pre-service teachers to be better informed about Indigenous issues in Australia has been broadly articulated, it is reasonably new for universities to make Indigenous studies a compulsory area of study, or to define what is meant by 'Indigenous education'. This book was motivated by the growing necessity for an approach to Indigenous education that would include more than just a summarising of Indigenous history and traditional culture. It is useful for anyone with an interest in challenging their ideas about culture, identity and history in Australia.