912 resultados para ”we” identity
Resumo:
I den här avhandlingen är intresset riktat mot svensk utbildningspolitik och medborgarskap. I tider av globalisering, och med ett etablerat svenskt medlemskap i Europeiska unionen, har det nationella policyskapandet kring utbildningens medborgardanande funktion hamnat under ökat tryck. I studien undersöks hur detta hanteras i svensk utbildningspolitik under 1990-talet, en tid som utmärker sig genom betydande förändringar på utbildningsområdet i Sverige. Frågan är, mera precist, vilken riktning för skolans, enligt lag befästa, uppdrag att fostra demokratiska medborgare som utstakas i svensk utbildningspolitik vid denna tid. Genom att fästa vikt vid mål, visioner och motiv som formuleras i utbildningspolitiska 1990-talstexter klarläggs förståelser av medborgarskap som karaktäriserar svensk utbildningspolitik under denna tid. Även en bredare historisk analys görs, ur vilken historiska målsättningar med skolans medborgarfostran som föregår 1990-talets framträder. Studiens syfte är kritiskt. Förståelserna granskas utifrån vad de innesluter och vad de utesluter, vilka möjliga konsekvenser de kan tänkas få för olika individer och grupper i samhället, och om det finns öppningar för tänkbara alternativ. Studien visar på två historiska skiften vad gäller medborgarskapets innehåll och mening i det inhemska policyskapandet. Det första skiftet äger rum under 1990-talets tidiga del. Då bryts en etablerad samhällsbyggande medborgarroll upp, till förmån för andra mera marknadsorienterade medborgarroller. Under 1990-talets senare del, då marknadsorienteringen förstärks i neoliberal riktning, sker ett andra skifte; en historiskt vedertagen gemenskapstanke – nationen – bryts upp som grund för medborgerlig gemenskap. Denna tanke ersätts av en annan som är globaliseringsinriktad, vilken visar sig ha andra inne- och uteslutande mekanismer för olika individer och samhällsgrupper. Utifrån dessa forskningsrön tecknas avslutningsvis några konturer till ett alternativt sätt att tänka kring medborgarskap och gemenskap. Detta alternativ tar form i ambitionen att, i högre grad än vad som blir synligt i svensk utbildningspolitik, resonera kring möjligheter för ett medborgarskap bortom förhandstecknade indelningsgrunder för ett “vi”. Språk som politisk och samhällelig förändringskraft ges en central betydelse i avhandlingen. I analysen av texternas tal om skolans medborgarfostrande roll undersöks pågående politiska motsättningar när det gäller att vinna tal- och tolkningsföreträde till skolans fostransmål. Utgångarna av dessa motsättningar belyses genom tre områden för medborgarfostran som urskilts som centrala; ett politiskt, ett kulturellt samt ett ekonomi- och arbetslivsriktat. Genom dessa har rådande medborgarskapsdiskurser tagit form, ur vilka de utbildningspolitiska förståelserna av medborgarskap gestaltas och diskuteras.
Resumo:
We argue that attitudes about immigration can be better understood by paying closer attention to the various ways in which national group boundaries are demarcated. We describe two related lines of work that address this. The first deals with national group definitions and, based on evidence from studies carried out in England and analyses of international survey data, argues that the relationship between national identification and prejudice toward immigrants is contingent on the extent to which ethnic or civic definitions of nationality are endorsed. The second, which uses European survey data, examines support for ascribed and acquired criteria that can be applied when determining who is permitted to migrate to one's country, and the various forms of national and individual threat that affect support for these criteria. We explain how the research benefits from a multilevel approach and also suggest how these findings relate to some current policy debates.
Resumo:
In this article we question recent psychological approaches that equate the constructs of citizenship and social identity and which overlook the capacity for units of governance to be represented in terms of place rather than in terms of people. Analysis of interviews conducted in England and Scotland explores how respondents invoked images of Britain as “an island” to avoid social identity constructions of nationality, citizenship, or civil society. Respondents in Scotland used island imagery to distinguish their political commitment to British citizenship from questions relating to their subjective identity. Respondents in England used island imagery to distinguish the United Kingdom as a distinctive political entity whilst avoiding allusions to a common or distinctive identity or character on the part of the citizenry. People who had moved from England to Scotland used island imagery to manage the delicate task of negotiating rights to social inclusion in Scottish civil society whilst displaying recognition of the indigenous population’s claims to distinctive national culture and identity.
Resumo:
Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.
Resumo:
This research examines how men react to male models in print advertisements. In two experiments, we show that the gender identity of men influences their responses to advertisements featuring a masculine, feminine, or androgynous male model. In addition, we explore the extent to which men feel they will be classified by others as similar to the model as a mechanism for these effects. Specifically, masculine men respond most favorably to masculine models and are negative toward feminine models. In contrast, feminine men prefer feminine models when their private self is salient. Yet in a collective context, they prefer masculine models.These experiments shed light on how gender identity and self-construal influence male evaluations and illustrate the social pressure on men to endorse traditional masculine portrayals. We also present implications for advertising practice.
Resumo:
A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.
Resumo:
The dream of a cosmopolitical utopia has been around for thousands of years. Yet the promise of being locally situated and at the same time globally connected and mobile has never seemed more possible than it is today. The question remains as to whether it is positive and realistic for us to have multiple loyalties. Can we sustain community and solidarity with our neighbours while we look beyond our nation? And if we can't - or won't – consider distant strangers as part of our own world, are there increasingly dire consequences? This book reconnects classical sociological theory and contemporary ideas on mobility, otherness, material assemblages, consumption and surveillance to render the idea of a global cosmopolitan utopia amenable to sociological investigation. The book takes a realistic approach to the development of cosmopolitical arrangements. It embraces the imaginative impulses the cosmopolitan dream provides, but takes into account the political, ethical and cultural dimensions of such cosmopolitan developments. In revisiting the relevance of classical sociological approaches in the context of contemporary theoretical challenges, the distinctive approach this book takes to understanding cosmopolitanism will be of use to scholars and students alike.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
This chapter considers the complex literate repertoires of 21st century children in multicultural primary classrooms in Adelaide South Australia. It draws on the curricular and pedagogical work of two experienced primary school teachers who explore culture, race and class, by positioning children as textual producers across a variety of media. In particular we discuss two child-authored texts – A is for Arndale – a local alphabet book co-authored by children aged between eight and ten, and – Cooking Afghani Style - a magazine style film produced by a multi-aged class of children (aged eight to thirteen) recently arrived in Australia. In the process of making these texts, primary children engaged in reading as a cultural practice – re-reading and re-writing their neighbourhoods and identities (both individual and collective). This involved frequent excursions to local key sites, both familiar and unfamiliar to the children. They investigated how diverse children experienced and lived their lives in particular places within changing communities.
Resumo:
Issue addressed: Measures of 'social identity' and 'psychological sense of community' were included within a broader formative research inquiry to gain insight into the identity characteristics and level of connectedness among older recreational road travellers (commonly known as Grey Nomads). The research sought to gain insights on how best to reach or speak to this growing driver cohort. ----- ----- Method: Participants included 631 older recreational road travellers ranging in age from 50 years to over 80 years. Data were obtained through three scales which were incorporated into a larger formative research survey; an identity hierarchy, the Three Factor Model of Social Identity and the Sense of Community Index. ----- ----- Results: Older recreational road travellers see themselves principally as couples, with social group identity being secondary. Although many identified to some degree with the Grey Nomad identity, when asked to self categorise as either members of the Broad Network of Recreational Vehicle Travellers or as Grey Nomads, the majority categorised themselves as the former. Those identifying as Grey Nomads, however, reported significantly higher levels of 'social identification' and 'sense of community'. ----- ----- Conclusion: The Grey Nomad identity may not be the best identity at which to target road safety messages for this cohort. Targeting travelling 'couples' may be more efficacious. Using the 'Grey Nomad' identity is likely to reap at least some success, however, given that many identified to some degree with this group identity. Those identifying as Grey Nomads may be more open to community participation or behaviour change given their significantly higher levels of 'social identity' and 'sense of community'.
Resumo:
In this chapter we describe a history of collaboration between university-based literacy researchers and school-based teachers in teacher development programs and practitioner inquiries designed to improve literacy outcomes for students living in low-socioeconomic circumstances. We consider how an inquiry stance has informed teachers working for social justice through curriculum and pedagogy designed to connect children’s developing literacy repertoires with their changing material, social and linguistic contexts. We use examples from the practices of two of our long-term teacher-collaborators to show what has been possible to achieve, even in radically different policy contexts, because of teachers’ continued commitment to themes of place and belonging, and language and identity.
Resumo:
There is no doubt that fraud in relation to land transactions is a problem that resonates amongst land academics, practitioners, and stakeholders involved in conveyancing. As each land registration and conveyancing process increasingly moves towards a fully electronic environment, we need to make sure that we understand and guard against the frauds that can occur. What this paper does is examine the types of fraud that have occurred in paper-based conveyancing systems in Australia and considers how they might be undertaken in the National Electronic Conveyancing System (NECS) that is currently under development. Whilst no system can ever be infallible, it is suggested that by correctly imposing the responsibility for identity verification on the appropriate individual, the conveyancing system adopted can achieve the optimum level of fairness in terms of allocation of responsibility and loss. As we sit on the cusp of a new era of electronic conveyancing, the framework suggested here provides a model for minimising the risks of forged mortgages and appropriately allocating the loss. Importantly it also recognises that the electronic environment will see new opportunities for those with criminal intent to undermine the integrity of land transactions. An appreciation of this now, can see the appropriate measures put in place to minimise the risk.