935 resultados para Media and communications


Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper attends to the idea of disconnection as a way of theorising people’s lived experience of social networking sites. Enrolling and extending a disconnective practice lens we suggest that the disconnective strategies of suspension and prevention are operational necessities for those we might see as the users and owners of sites such as Facebook. Indeed, our work demonstrates that disconnection in these contexts need not be associated only with modes of resistance and departure, but can also act as socioeconomic lubricant.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Building on hashtag datasets gathered since January 2011, this paper will compare patterns of Twitter usage during the popular revolution in Egypt and the civil war in Libya. Using custom-made tools for processing ‘big data’ (boyd & Crawford, 2011), we will examine the volume of tweets sent by English-, Arabic-, and mixed-language Twitter users over time, and examine the networks of interaction (variously through @replying, retweeting, or both) between these groups as they developed and shifted over the course of these uprisings. Examining @reply and retweet traffic, we will identify general patterns of information flow between the English- and Arabic-speaking sides of the Twittersphere, and highlight the roles played by key boundary riders connecting both language spheres. Further, we will examine the URLs shared in these hashtags by Twitter participants, to identify the most prominent overall information sources, examine differences in the information diet experienced by English- and Arabic-language users, and investigate whether there are any online sources whose URLs are transcending language boundaries more frequently than others.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Asking why is an important foundation of inquiry and fundamental to the development of reasoning skills and learning. Despite this, and despite the relentless and often disruptive nature of innovations in information and communications technology (ICT), sophisticated tools that directly support this basic act of learning appear to be undeveloped, not yet recognized, or in the very early stages of development. Why is this so? To this question, there is no single factual answer. In response, however, plausible explanations and further questions arise, and such responses are shown to be typical consequences of why-questioning. A range of contemporary scenarios are presented to highlight the problem. Consideration of the various inputs into the evolution of digital learning is introduced to provide historical context and this serves to situate further discussion regarding innovation that supports inquiry-based learning. This theme is further contextualized by narratives on openness in education, in which openness is also shown to be an evolving construct. Explanatory and descriptive contents are differentiated in order to scope out the kinds of digital tools that might support inquiry instigated by why-questioning and which move beyond the search paradigm. Probing why from a linguistic perspective reveals versatile and ambiguous semantics. The why dimension—asking, learning, knowing, understanding, and explaining why—is introduced as a construct that highlights challenges and opportunities for ICT innovation. By linking reflective practice and dialogue with cognitive engagement, this chapter points to specific frontiers for the design and development of digital learning tools, frontiers in which inquiry may find new openings for support.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In recent years, many studies have provided evidence that exosomes secreted by cells contain various components, including microRNAs [1]. It is thought that exosomes have important roles in many biological processes. However, the role of exosomes and their components, especially miRNAs, in wound healing is poorly understood. In order to understand whether or not primary human epidermal keratinocytes and dermal fibroblasts, two important cell types contributing to wound healing process, release exosomes and what species of wound healing-associated miRNAs accumulate in these vesicles, this project will use a combination of methods to isolate and characterize exosomes, to profile exosomal cargo’s, especially miRNAs in exosomes. The results showed that keratinocytes and fibroblasts released exosomes into conditioned media and these exosomes contain some target miRNAs.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Supervisory Control and Data Acquisition (SCADA) systems are one of the key foundations of smart grids. The Distributed Network Protocol version 3 (DNP3) is a standard SCADA protocol designed to facilitate communications in substations and smart grid nodes. The protocol is embedded with a security mechanism called Secure Authentication (DNP3-SA). This mechanism ensures that end-to-end communication security is provided in substations. This paper presents a formal model for the behavioural analysis of DNP3-SA using Coloured Petri Nets (CPN). Our DNP3-SA CPN model is capable of testing and verifying various attack scenarios: modification, replay and spoofing, combined complex attack and mitigation strategies. Using the model has revealed a previously unidentified flaw in the DNP3-SA protocol that can be exploited by an attacker that has access to the network interconnecting DNP3 devices. An attacker can launch a successful attack on an outstation without possessing the pre-shared keys by replaying a previously authenticated command with arbitrary parameters. We propose an update to the DNP3-SA protocol that removes the flaw and prevents such attacks. The update is validated and verified using our CPN model proving the effectiveness of the model and importance of the formal protocol analysis.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Emergency Response Teams increasingly use interactive technology to help manage information and communications. The challenge is to maintain a high situation awareness for different interactive devices sizes. This research specifically compared a handheld interactive device in the form of an iPad with a large interactive multi-touch tabletop. A search and rescue inspired simulator was designed to test operator situation awareness for the two sized devices. The results show that operators had better situation awareness on the tabletop device when the operation related to detecting of moving targets, searching target locations, distinguishing target types, and comprehending displayed information.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to provide a critical analysis of recent examples of action competence among young people engaged in democratic participatory action in sustainability programs in Australia. It explores examples of priorities identified for citizen action, the forms this action takes and the ways that democratic participation can achieve positive outcomes for future sustainability. It suggests multiple ways for developing action competence that provides further opportunities for authentic and engaging citizen action for youth connected to school- and community-based learning, in new and powerful ways. Design/methodology/approach – This conceptual paper examines international literature on the theory of “action competence,” its significance for education for sustainability (EfS) and the ways it can inform education for young people’s democratic participatory citizenship and civic engagement. It analyses examples of the development of action competency among young people in Australia, including the problems and priorities identified for citizen action, the forms this action takes and how it can achieve positive outcomes for sustainability. Following this analysis, the paper suggests multiple ways for developing action competence in EfS in schools and communities in new and powerful ways. Findings – Developing EfS to increase democratic and participatory action among young citizens is now widely regarded as an urgent education priority. There are growing exemplars of school and community organizations’ involvement in developing EfS learning and teaching to increase participatory citizenship. Young people are being empowered to develop a greater sense of agency through involvement in programs that develop action competence with a focus on sustainability in and out of school. New forms of participation include student action teams and peer collaboration among youth who are marshaling social media and direction action to achieve change. Originality/value – It contributes to the literature on multiple ways for developing action competence in EfS.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper introduces research in progress that examines how queer women perform sexual identity across social media platforms. Applying a lens of queer theory and Actor Network Theory, it discusses women’s embodied self-representations as taking on forms that both conform to and elaborate upon the selfie genre of digital representation. Acknowledging similarities and differences across platforms, specifically between Instagram and Vine, a novel walkthrough method is introduced to identify platform characteristics that shape identity performances. This method provides insights into the role of platforms in identity performances, which can be combined with analysis of user-generated content and interviews to better understand digital media’s constraints and affordances for queer representation.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Drawing on two case studies, this article considers the allegation of a disgruntled author: ’Defamation was framed to protect the reputations of 19th century gentlemen hypocrites'. The first case study considers the litigation over Bob Ellis' unreliable political memoir, ’Goodbye Jerusalem', published by Random House. The second case study focuses upon the litigation over the allegation by Media Watch that Richard Carleton had plagarised a documentary entitled ’Cry from the Grave'. The article considers the meaning of defamatory imputations, the range of defences, and the available remedies. It highlights the competing arguments over the protection of reputation and privacy, artistic expression, and the freedom of speech. This article concludes that defamation law should foster ’gossip we can trust'.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This article provides an account of one of Australia's great literary hoaxes - the Demidenko affair. In particular, it focuses upon the accusations that Helen Darville plagiarised a number of historical and literary texts in her novel, The Hand That Signed The Paper. This article considers how the dispute was interpreted in three different contexts - the literary community, the legal system, and the media. Part 1 examines how writers, publishers, and editors understood the controversy in terms of the aesthetics and ethics of plagiarism. Part 2 details how lawyers framed the discussion in light of economic rights and moral rights under copyright law. Part 3 deals with the media attention upon the personalities and politics of the scandal. The conclusion charts the competition between these various communities over who should resolve the dispute.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Current educational practice tends to ascribe a limiting vision of the good student as one who is well behaved, performs well in assessments and demonstrates values in keeping with dominant expectations. This paper argues that this vision of the good student is antithetical to the lived experience of students as they negotiate their positionality within complex power games in secondary schools. Student voices in focus group research nominate six rationales of the good student that inform their ‘performances’ of the good student. Understanding the multiplicity and dynamism of the good student is an educational imperative as schools seek to meet the changing needs of society in the new millennium.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

All media are social—they are after all media, in between, intermediating between producers and consumers of content, information, conversation, between the actors in the media and the audiences who read, listen, and watch. And the sociality of the media does not stop there: the processes of media production are social processes just as much as the activities of media audiencing. So strictly speaking, all media are social media. But only a particular subset of all media are fundamentally defined by their sociality, and thus distinguished from the mainstream media of print, radio, and television. It is the actual uses which are made of any medium which determine whether it is indeed a social medium—so let us investigate their roles in and interplay with the societies in which they operate.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This qualitative study of parent-child communication examined the views of parents and children in a province of Saudi Arabia concerning how family interactions, parental authority and children’s behaviours are affected by the globalising influences of media and technology. Impacts reported include how tension in family communication arises as children develop a hybrid culture through accessing Western ideas and ideologies that are profoundly challenging to traditional Islamic culture.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This article considers copyright law and the art of appropriation in an Australian context. It tells four stories about Australian artists - Imants Tillers, Gordon Bennett, Juan Davila and Tracey Moffatt. The stories examine the postmodern critique of copyright law, indigenous copyright and self-determination, the introduction of moral rights, and copyright, photography and film. The article concludes that the work of such contemporary artists has practical implications for the reform of copyright law.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security and performance metrics of those cryptographic functions in their embedded context needs to be understood. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to assess security performance. This research simulates sensitive healthcare information being transferred over networks, and then measures data delivery times with selected security parameters for various communication scenarios on Linux-based and Windows-based systems. Based on our test results, this research has revealed a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes practical recommendations based on the test results for the effective selection of network security controls to achieve an appropriate balance between network security and performance