484 resultados para Authenticity


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper investigates the oracy (listening/speaking) genres enacted in an undergraduate entry point unit in the internationalised university of the 21st century, and the kind of knowledges these genres elicit and perform. This paper focuses on a series of lectures in the business studies unit and how anecdotal knowledge from both the lecturer’s and the students’ lived experiences was elicited as grist for the curriculum. The analysis of lecture talk suggests that the lecture today is no longer a monologic display of expert disciplinary knowledge bestowed upon the learner. Rather, it is increasingly a multimedia performance with an underlying ethic of engagement and interactivity. Of particular interest is the way international students’ knowledges were elicited to resource the internationalised curriculum with authenticity and insight. The knowledges thus assembled are analysed through Bernstein’s conceptual distinction between vertical and horizontal knowledge structures. The paper offers suggestions on how to maximise the potential and minimize the risks of this more interactive genre of lecture, with particular regard to enabling the participation of the international student.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper builds on work I presented at the PESA conference in 2007, which moved through both aesthetic and ethical theory to generate a new theory of creative integrity around the issues of autonomy, agency and authenticity. This preliminary theorizing had its origins in my undergraduate ethics classroom where I was confronted with advertising students who resisted the idea of being taught ethics, along with all the philosophical ethical theories traditionally used to do this.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The process of compiling a studio vocal performance from many takes can often result in the performer producing a new complete performance once this new "best of" assemblage is heard back. This paper investigates the ways that the physical process of recording can alter vocal performance techniques, and in particular, the establishing of a definitive melodic and rhythmic structure. Drawing on his many years of experience as a commercially successful producer, including the attainment of a Grammy award, the author will analyse the process of producing a “credible” vocal performance in depth, with specific case studies and examples. The question of authenticity in rock and pop will also be discussed and, in this context, the uniqueness of the producer’s role as critical arbiter – what gives the producer the authority to make such performance evaluations? Techniques for creating conditions in the studio that are conducive to vocal performances, in many ways a very unnatural performance environment, will be discussed, touching on areas such as the psycho-acoustic properties of headphone mixes, the avoidance of intimidatory practices, and a methodology for inducing the perception of a “familiar” acoustic environment.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node. Unlike previous software public-key implementations this approach provides E- Commerce grade security; is computationally fast, energy efficient; and has low financial cost — all essential attributes for secure large-scale sen- sor networks. We describe the secFleck message security services such as confidentiality, authenticity and integrity, and present performance re- sults including computation time, energy consumption and cost. This is followed by examples, built on secFleck, of symmetric key management, secure RPC and secure software update.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article presents the design and implementation of a trusted sensor node that provides Internet-grade security at low system cost. We describe trustedFleck, which uses a commodity Trusted Platform Module (TPM) chip to extend the capabilities of a standard wireless sensor node to provide security services such as message integrity, confidentiality, authenticity, and system integrity based on RSA public-key and XTEA-based symmetric-key cryptography. In addition trustedFleck provides secure storage of private keys and provides platform configuration registers (PCRs) to store system configurations and detect code tampering. We analyze system performance using metrics that are important for WSN applications such as computation time, memory size, energy consumption and cost. Our results show that trustedFleck significantly outperforms previous approaches (e.g., TinyECC) in terms of these metrics while providing stronger security levels. Finally, we describe a number of examples, built on trustedFleck, of symmetric key management, secure RPC, secure software update, and remote attestation.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Communication security for wireless sensor networks (WSN) is a challenge due to the limited computation and energy resources available at nodes. We describe the design and implementation of a public-key (PK) platform based on a standard Trusted Platform Module (TPM) chip that extends the capability of a standard node. The result facilitates message security services such as confidentiality, authenticity and integrity. We present results including computation time, energy consumption and cost.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The diversity of community voices in the SEQ ‘bellwether region’ has grown from a muted murmur in the mid twentieth century supporting provision of urban services, rural conservation and green belts, to the current clamour against over-development, and in favour of protecting local and regional open space, wetlands and natural habitats. This in turn has often resulted in vigorous campaigns against unpopular roads, dams, dumps and tall buildings. In the last twenty years community issues have played a major part in local government elections throughout the region and have even helped unseat (in 1995-1996) a state government which discounted their authenticity and community resolve.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As the acceptance and popularity of wireless networking technologies has proliferated, the security of the IEEE 802.11 wireless local area network (WLAN) has advanced in leaps and bounds. From tenuous beginnings, where the only safe way to deploy a WLAN was to assume it was hostile and employ higherlayer information security controls, to the current state of the art, all manner of improvements have been conceived and many implemented. This work investigates some of the remaining issues surrounding IEEE 802.11 WLAN operation. While the inherent issues in WLAN deployments and the problems of the original Wired Equivalent Privacy (WEP) provisions are well known and widely documented, there still exist a number of unresolved security issues. These include the security of management and control frames and the data link layer protocols themselves. This research introduces a novel proposal to enhance security at the link layer of IEEE 802.11 WLANs and then conducts detailed theoretical and empirical investigation and analysis of the eects of such proposals. This thesis �rst de�nes the state of the art in WLAN technology and deployment, including an overview of the current and emerging standards, the various threats, numerous vulnerabilities and current exploits. The IEEE 802.11i MAC security enhancements are discussed in detail, along with the likely outcomes of the IEEE 802.11 Task Group W1, looking into protected management frames. The problems of the remaining unprotected management frames, the unprotected control frames and the unprotected link layer headers are reviewed and a solution is hypothesised, to encrypt the entire MAC Protocol Data Unit (MPDU), including the MAC headers, not just the MAC Service Data Unit (MSDU) commonly performed by existing protocols. The proposal is not just to encrypt a copy of the headers while still using cleartext addresses to deliver the frame, as used by some existing protocols to support the integrity and authenticity of the headers, but to pass the entire MPDU only as ciphertext to also support the con�dentiality of the frame header information. This necessitates the decryption of every received frame using every available key before a station can determine if it is the intended recipient. As such, this raises serious concerns as to the viability of any such proposal due to the likely impact on throughput and scalability. The bulk of the research investigates the impacts of such proposals on the current WLAN protocols. Some possible variations to the proposal are also provided to enhance both utility and speed. The viability this proposal with respect to the eect on network throughput is then tested using a well known and respected network simulation tool, along with a number of analysis tools developed speci�cally for the data generated here. The simulator's operation is �rst validated against recognised test outputs, before a comprehensive set of control data is established, and then the proposal is tested and and compared against the controls. This detailed analysis of the various simulations should be of bene�t to other researchers who need to validate simulation results. The analysis of these tests indicate areas of immediate improvement and so the protocols are adjusted and a further series of experiments conducted. These �nal results are again analysed in detail and �nal appraisals provided.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper describes a number of techniques for GNSS navigation message authentication. A detailed analysis of the security facilitated by navigation message authentication is given. The analysis takes into consideration the risk of critical applications that rely on GPS including transportation, finance and telecommunication networks. We propose a number of cryptographic authentication schemes for navigation data authentication. These authentication schemes provide authenticity and integrity of the navigation data to the receiver. Through software simulation, the performance of the schemes is quantified. The use of software simulation enables the collection of authentication performance data of different data channels, and the impact of various schemes on the infrastructure and receiver. Navigation message authentication schemes have been simulated at the proposed data rates of Galileo and GPS services, for which the resulting performance data is presented. This paper concludes by making recommendations for optimal implementation of navigation message authentication for Galileo and next generation GPS systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Instrumental music performance is a well-established case of real-time interaction with technology and, when extended to ensembles, of interaction with others. However, these interactions are fleeting and the opportunities to reflect on action is limited, even though audio and video recording has recently provided important opportunities in this regard. In this paper we report on research to further extend these reflective opportunities through the capture and visualization of gestural data collected during collaborative virtual performances; specifically using the digital media instrument Jam2jam AV and the specifically-developed visualization software Jam2jam AV Visualize. We discusses how such visualization may assist performance development and understanding. The discussion engages with issues of representation, authenticity of virtual experiences, intersubjectivity and wordless collaboration, and creativity support. Two usage scenarios are described showing that collaborative intent is evident in the data visualizations more clearly than in audio-visual recordings alone, indicating that the visualization of performance gestures can be an efficient way of identifying deliberate and co-operative performance behaviours.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose - This chapter examines individual and collective quests for authenticity, as experienced through consumption activities within an urban neighbourhood. It investigates the interplay between consumption experiences as authenticating acts and authoritative performances (Arnould and Price 2000), and considers the implications with regard to Zukin’s (2010) theories on urban authenticity, and how it may be experienced as new beginnings and origins. Methodology - The chapter is based on autoethnographic research that explores how interaction and identity definition within servicescapes can work to construct place-based community. Findings - It describes how a servicescape of new beginnings offered opportunities for individual authentication that also enabled personal identification with a specific cultural group. This authentication drew on the cultural capital embedded in such locations, including their association with gentrification. This is contrast with the collective identification offered by a servicescape operating as a place of exposure. This site of origins displayed the social practices of a different demographic, which worked to highlight a relational link between the authentication practices of the broader neighbourhood. These sites also worked cumulatively, to highlight the inauthenticities within my identification practices and offer opportunities for redress. Through this interplay it was possible to establish an authentic sense of neighbourhood that drew on its new beginnings and its origins, and was both individual and collective. Originality - Through the combination of urban and consumption-based perspectives of authenticity, and an autoethnographic methodology, this chapter offers a different insight into the ways identification with, and attachment to, a neighbourhood can develop through consumption experiences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research project looks to engage audiences in a variety of experiential ways by reexamining and manipulating the traditional presentation paradigm for viewing Western contemporary dance. It considers how the audience may be situated in the creation and presentation of contemporary dance generally, and specifically in the work The Voyeur, which researched these issues in action. By situating the body of the audience member as a site of understanding and meaning making, this practice-based research considers the audience within the artists’ creative process from the inception of a creative work, rather than after the work has been created. The research questions how a ‘lived experience’ of contemporary dance could be deepened for the audience. It presents a series of ‘tools’ to create alternative frameworks of presentation that challenge the dominant modes of creation, presentation and meaning making in contemporary dance. The five tools established and applied in this research are: site, liminality, agency, proximity and performer authenticity. These tools are framed as a series of calibrated scales that allow choreographers to map decisions made in the studio in relation to potential audience engagement. These scales have the ability to house multiple presentation formats from the traditional to the avant garde and open up possibilities for broad analysis of a wide range of artistic dance works.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many luxury heritage brands operate on the misconception that heritage is interchangeable with history rather than representative of the emotional response they originally developed in their customer. This idea of heritage as static history inhibits innovation, prevents dynamic renewal and impedes their ability to redefine, strengthen and position their brand in current and emerging marketplaces. This paper examines a number of heritage luxury brands that have successfully identified the original emotional responses they developed in their customers and, through innovative approaches in design, marketing, branding and distribution evoke these responses in contemporary consumers. Using heritage and innovation hand-in-hand, these brands have continued to grow and develop a vision of heritage that incorporates both historical and contemporary ideas to meet emerging customer needs. While what constitutes a ‘luxury’ item is constantly challenged in this era of accessible luxury products, up-scaling and aspirational spending, this paper sees consumers’ emotional needs as the key element in defining the concept of luxury. These emotional qualities consistently remain relevant due to their ability to enhance a positive sense of identity for the brand user. Luxury is about the ‘experience’ not just the product providing the consumer with a sense of enhanced status or identity through invoked feelings of exclusivity, authenticity, quality, uniqueness and culture. This paper will analyse luxury heritage brands that have successfully combined these emotional values with those of their ‘heritage’ to create an aura of authenticity and nostalgia that appeals to contemporary consumers. Like luxury, the line where clothing becomes fashion is blurred in the contemporary fashion industry; however, consumer emotion again plays an important role. For example, clothing becomes ‘fashion’ for consumers when it affects their self perception rather than fulfilling basic functions of shelter and protection. Successful luxury heritage brands can enhance consumers’ sense of self by involving them in the ‘experience’ and ‘personality’ of the brand so they see it as a reflection of their own exclusiveness, authentic uniqueness, belonging and cultural value. Innovation is a valuable tool for heritage luxury brands to successfully generate these desired emotional responses and meet the evolving needs of contemporary consumers. While traditionally fashion has been a monologue from brand to consumer, new technology has given consumers a voice to engage brands in a conversation to express their evolving needs, ideas and feedback. As a result, in this consumer-empowered era of information sharing, this paper defines innovation as the ability of heritage luxury brands to develop new design and branding strategies in response to this consumer feedback while retaining the emotional core values of their heritage. This paper analyses how luxury heritage brands can effectively position themselves in the contemporary marketplace by separating heritage from history to incorporate innovative strategies that will appeal to consumer needs of today and tomorrow.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The decision of the High Court in Butcher v Lachlan Elder Realty Pty Ltd [2004] HCA 60 involves issues that affect every person who is induced to buy real estate in Australia by statements in sales brochures distributed by real estate agents. One of these issues is the extent to which estate agents unwittingly engage in misleading or deceptive conduct under s 52 of the Trade Practices Act 1974 (Cth) (‘the Act’) when they distribute sales brochures that contain untrue or misleading statements prepared by others. A further issue is the extent to which agents can escape liability by relying on disclaimers about the authenticity of false statements contained in brochures prepared by them.