981 resultados para Identity texts
Resumo:
Struggles over Difference addresses education, schools, textbooks, and pedagogies in various countries of the Asia-Pacific, offering critical curriculum studies and policy analyses of national and regional educational systems. These systems face challenges linked to new economic formations, cultural globalization, and emergent regional and international geopolitical instabilities and conflicts. Contributors offer insights on how official knowledge, text, discourse and discipline should be shaped; who should shape it; through which institutional agencies it should be administered: and social and cultural practices through which this should occur.
Resumo:
Embedded generalized markup, as applied by digital humanists to the recording and studying of our textual cultural heritage, suffers from a number of serious technical drawbacks. As a result of its evolution from early printer control languages, generalized markup can only express a document’s ‘logical’ structure via a repertoire of permissible printed format structures. In addition to the well-researched overlap problem, the embedding of markup codes into texts that never had them when written leads to a number of further difficulties: the inclusion of potentially obsolescent technical and subjective information into texts that are supposed to be archivable for the long term, the manual encoding of information that could be better computed automatically, and the obscuring of the text by highly complex technical data. Many of these problems can be alleviated by asserting a separation between the versions of which many cultural heritage texts are composed, and their content. In this way the complex inter-connections between versions can be handled automatically, leaving only simple markup for individual versions to be handled by the user.
Resumo:
Kineikonic texts – sites of the moving image – are increasingly prevalent with the rise of digital television, Web 2.0 tools, broadband Internet, and sophisticated mobile technologies. Digital practices are changing the shape of the literacy curriculum, calling for new metalanguages to describe digital and multimodal texts. This paper combines multiliteracies and functional approaches to map conventional and new textual features of a popular kineikonic text – the claymation movie. Enlivened with data from an ethnically diverse, Year 6 classroom, the author outlines filmic conventions to enable teachers and students to analyse and design movies
Resumo:
Immediate indefeasibility is the cornerstone of the Torrens system of land registration. However, when combined with the apparent ease in which forged mortgages become registered, the operation of this doctrine can come into question. This article seeks to argue that, rather than question indefeasibility, the focus should be on the verification of identity of parties to land transactions. Whilst no system can ever be infallible, it is suggested that by correctly imposing the responsibility for identity verification on the appropriate individual, the Torrens system can retain immediate indefeasibility as its paramount principle, yet achieve the optimum level of fairness in terms of allocation of responsibility and loss. With the dawn of a new era of electronic conveyancing about to begin, the framework suggested here provides a model for minimising the risks of forged mortgages and appropriately allocating the loss.
Resumo:
Details of a project which fictionalises the oral history of the life of the author's polio-afflicted grandmother Beth Bevan and her experiences at a home for children with disabilities are presented. The speech and language patterns recognised in the first person narration are described, as also the sense of voice and identity communicated through the oral history.
Resumo:
The purpose of this study is to contribute to the cross-disciplinary body of literature of identity and organisational culture. This study empirically investigated the Hatch and Schultz (2002) Organisational Identity Dynamics (OID) model to look at linkages between identity, image, and organisational culture. This study used processes defined in the OID model as a theoretical frame by which to understand the relationships between actual and espoused identity manifestations across visual identity, corporate identity, and organisational identity. The linking processes of impressing, mirroring, reflecting, and expressing were discussed at three unique levels in the organisation. The overarching research question of How does the organisational identity dynamics process manifest itself in practice at different levels within an organisation? was used as a means of providing empirical understanding to the previously theoretical OID model. Case study analysis was utilised to provide exploratory data across the organisational groups of: Level A - Senior Marketing and Corporate Communications Management, Level B - Marketing and Corporate Communications Staff, and Level C - Non-Marketing Managers and Employees. Data was collected via 15 in-depth interviews with documentary analysis used as a supporting mechanism to provide triangulation in analysis. Data was analysed against the impressing, mirroring, reflecting, and expressing constructs with specific criteria developed from literature to provide a detailed analysis of each process. Conclusions revealed marked differences in the ways in which OID processes occurred across different levels with implications for the ways in which VI, CI, and OI interact to develop holistic identity across organisational levels. Implications for theory detail the need to understand and utilise cultural understanding in identity programs as well as the value in developing identity communications which represent an actual rather than an espoused position.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
Special collections, because of the issues associated with conservation and use, a feature they share with archives, tend to be the most digitized areas in libraries. The Nineteenth Century Schoolbooks collection is a collection of 9000 rarely held nineteenth-century schoolbooks that were painstakingly collected over a lifetime of work by Prof. John A. Nietz, and donated to the Hillman Library at the University of Pittsburgh in 1958, which has since grown to 15,000. About 140 of these texts are completely digitized and showcased in a publicly accessible website through the University of Pittsburgh’s Library, along with a searchable bibliography of the entire collection, which expanded the awareness of this collection and its user base to beyond the academic community. The URL for the website is http://digital.library.pitt.edu/nietz/. The collection is a rich resource for researchers studying the intellectual, educational, and textbook publishing history of the United States. In this study, we examined several existing records collected by the Digital Research Library at the University of Pittsburgh in order to determine the identity and searching behaviors of the users of this collection. Some of the records examined include: 1) The results of a 3-month long user survey, 2) User access statistics including search queries for a period of one year, a year after the digitized collection became publicly available in 2001, and 3) E-mail input received by the website over 4 years from 2000-2004. The results of the study demonstrate the differences in online retrieval strategies used by academic researchers and historians, archivists, avocationists, and the general public, and the importance of facilitating the discovery of digitized special collections through the use of electronic finding aids and an interactive interface with detailed metadata.
Resumo:
This document outlines the system submitted by the Speech and Audio Research Laboratory at the Queensland University of Technology (QUT) for the Speaker Identity Verification: Application task of EVALITA 2009. This competitive submission consisted of a score-level fusion of three component systems; a joint-factor analysis GMM system and two SVM systems using GLDS and GMM supervector kernels. Development evaluation and post-submission results are presented in this study, demonstrating the effectiveness of this fused system approach. This study highlights the challenges associated with system calibration from limited development data and that mismatch between training and testing conditions continues to be a major source of error in speaker verification technology.
Resumo:
The Australian beach is now accepted as a significant part of Australian national culture and identity. However, Huntsman (2001) and Booth (2001) both believe that the beach is dying: “intellectuals have failed to apply to the beach the attention they have lavished on the bush…” (Huntsman 2001, 218). Yet the beach remains a prominent image in contemporary literature and film; authors such as Tim Winton and Robert Drewe frequently set their stories in and around the coast. Although initially considered a space of myth (Fiske, Hodge, and Turner 1987), Meaghan Morris labelled the beach as ‘ordinary’ (1998), and as recently as 2001 in the wake of the Sydney Olympic Games, Bonner, McKee, and Mackay termed the beach ‘tacky’ and ‘familiar’. The beach, it appears, defies an easy categorisation. In fact, I believe the beach is more than merely mythic or ordinary, or a combination of the two. Instead it is an imaginative space, seamlessly shifting its metaphorical meanings dependent on readings of the texts. My studies examine the beach through five common beach myths; this paper will explore the myth of the beach as an egalitarian space. Contemporary Australian national texts no longer conform to these mythical representations – (in fact, was the beach ever a space of equality?), instead creating new definitions for the beach space that continually shifts in meaning. Recent texts such as Tim Winton’s Breath (2008) and Stephen Orr’s Time’s Long Ruin (2010) lay a more complex metaphorical meaning upon the beach space. This paper will explore the beach as a space of egalitarianism in conjunction with recent Australian fiction and films in order to discover how the contemporary beach is represented.
Resumo:
In this paper we consider the place of early childhood literacy in the discursive construction of the identity( ies) of ‘proper’ parents. Our analysis crosses between representations of parenting in texts produced by commercial and government/public institutional interests and the self-representations of individual parents in interviews with the researchers. The argument is made that there are commonalities and disjunctures in represented and lived parenting identities as they relate to early literacy. In commercial texts that advertise educational and other products, parents are largely absent from representations and the parent’s position is one of consumer on behalf of the child. In government-sanctioned texts, parents are very much present and are positioned as both learners about and important facilitators of early learning when they ‘interact’ with their children around language and books. The problem for which both, in their different ways, offer a solution is the ‘‘not-yet-ready’’ child precipitated into the evaluative environment of school without the initial competence seen as necessary to avoid falling behind right from the start. Both kinds of producers promise a smooth induction of children into mainstream literacy and learning practices if the ‘good parent’ plays her/his part. Finally, we use two parent cases to illustrate how parents’ lived practice involves multiple discursive practices and identities as they manage young children’s literacy and learning in family contexts in which they also need to negotiate relations with their partners and with paid and domestic work.
Resumo:
Mainstream representations of trans people typically run the gamut from victim to mentally ill and are almost always articulated by non-trans voices. The era of user-generated digital content and participatory culture has heralded unprecedented opportunities for trans people who wish to speak their own stories in public spaces. Digital Storytelling, as an easy accessible autobiographic audio-visual form, offers scope to play with multi-dimensional and ambiguous representations of identity that contest mainstream assumptions of what it is to be ‘male’ or ‘female’. Also, unlike mainstream media forms, online and viral distribution of Digital Stories offer potential to reach a wide range of audiences, which is appealing to activist oriented storytellers who wish to confront social prejudices. However, with these newfound possibilities come concerns regarding visibility and privacy, especially for storytellers who are all too aware of the risks of being ‘out’ as trans. This paper explores these issues from the perspective of three trans storytellers, with reference to the Digital Stories they have created and shared online and on DVD. These examplars are contextualised with some popular and scholarly perspectives on trans representation, in particular embodied and performed identity. It is contended that trans Digital Stories, while appearing in some ways to be quite conventional, actually challenge common notions of gender identity in ways that are both radical and transformative.
Resumo:
There has recently been an emphasis within literacy studies on both the spatial dimensions of social practices (Leander & Sheehy, 2004) and the importance of incorporating design and multiple modes of meaning-making into contemporary understandings of literacy (Cope & Kalantzis, 2000; New London Group, 1996). Kress (2003) in particular has outlined the potential implications of the cultural shift from the dominance of writing, based on a logic of time and sequence in time, to the dominance of the mode of the image, based on a logic of space. However, the widespread re-design of curriculum and pedagogy by classroom teachers to allow students to capitalise on the various affordances of different modes of meaning-making – including the spatial – remains in an emergent stage. We report on a project in which university researchers’ expertise in architecture, literacy and communications enabled two teachers in one school to expand the forms of literacy that primary school children engaged in. Starting from the school community’s concerns about an urban renewal project in their neighbourhood, we worked together to develop a curriculum of spatial literacies with real-world goals and outcomes.
Resumo:
This thesis traces the influence of postmodernism on picturebooks. Through a review of current scholarship on both postmodernism and postmodern literature it examines the multiple ways in which picturebooks have responded to the influence of postmodernism. The thesis is predominantly located in the field of Cultural and Literary Studies, which informs the ways in which children’s literature is positioned within contemporary culture and how it responds to the influences which shape its production and reception. Cultural and Literary Studies also offers a useful theoretical frame for analysing issues of textuality, ideology, and originality, as well as social and political comment in the focus texts. The thesis utilises the theoretical contributions by, in particular, Linda Hutcheon, Brian McHale, and Fredric Jameson as well as reference to children’s literature studies. This thesis makes a significant contribution to the development of an understanding of the place of the postmodern picturebook within the cultural context of postmodernism. It adds to the field of children’s literature research through an awareness of the (continuing) evolution of the postmodern picturebook particularly as the current scholarship on the postmodernism picturebook does not engage with the changing form and significance of the postmodern picturebook to the same extent as this thesis. This study is significant from a methodological perspective as it draws on a wide range of theoretical perspectives across literary studies, visual semiotics, philosophy, cultural studies, and history to develop a tripartite methodological framework that utilises the methods of postclassical narratology, semiotics, and metafictive strategies to carry out the textual analysis of the focus texts. The three analysis chapters examine twenty-two picturebooks in detail with respect to the ways in which the conventions of narrative are subverted and how dominant discourses are interrogated. Chapter 4: Subverting Narrative Processes includes analysis of narrative point of view, modes of representation, and characters and the problems of identity and subjectivity. Chapter 5: Challenging Truth, History, and Unity examines questions of ontology, the difficulties of representing history, and addresses issues of difference and ‘otherness’. The final textual analysis chapter, Chapter 6: Engaging with Postmodernity, critiques texts which engage with issues of globalisation, mass media, and consumerism. Brief discussion of a further fifteen picturebooks throughout the thesis provides additional support. Children’s texts have a tradition of being both resistant and compliant. Its resistance has made a space for the development of the postmodern picturebook; its compliance is evident in its tendency to take a route around a truly radical or iconoclastic position. This thesis posits that children’s postmodern picturebooks adopt what suits their form and purposes by drawing from and reflecting on some influences of postmodernism while disregarding those that seem irrelevant to its direction. Furthermore, the thesis identifies a shift in the focus of a number of postmodern picturebooks produced since the turn of the twenty-first century. This trend has seen a shift from texts which interrogate discourses of liberal humanism to those that engage with aspects of postmodernity. These texts, postmodernesque picturebooks, offer contradictory perspectives on aspects of society emanating from the rise in global trends mentioned above.