956 resultados para ”we” identity


Relevância:

60.00% 60.00%

Publicador:

Resumo:

I den här avhandlingen är intresset riktat mot svensk utbildningspolitik och medborgarskap. I tider av globalisering, och med ett etablerat svenskt medlemskap i Europeiska unionen, har det nationella policyskapandet kring utbildningens medborgardanande funktion hamnat under ökat tryck. I studien undersöks hur detta hanteras i svensk utbildningspolitik under 1990-talet, en tid som utmärker sig genom betydande förändringar på utbildningsområdet i Sverige. Frågan är, mera precist, vilken riktning för skolans, enligt lag befästa, uppdrag att fostra demokratiska medborgare som utstakas i svensk utbildningspolitik vid denna tid. Genom att fästa vikt vid mål, visioner och motiv som formuleras i utbildningspolitiska 1990-talstexter klarläggs förståelser av medborgarskap som karaktäriserar svensk utbildningspolitik under denna tid. Även en bredare historisk analys görs, ur vilken historiska målsättningar med skolans medborgarfostran som föregår 1990-talets framträder. Studiens syfte är kritiskt. Förståelserna granskas utifrån vad de innesluter och vad de utesluter, vilka möjliga konsekvenser de kan tänkas få för olika individer och grupper i samhället, och om det finns öppningar för tänkbara alternativ. Studien visar på två historiska skiften vad gäller medborgarskapets innehåll och mening i det inhemska policyskapandet. Det första skiftet äger rum under 1990-talets tidiga del. Då bryts en etablerad samhällsbyggande medborgarroll upp, till förmån för andra mera marknadsorienterade medborgarroller. Under 1990-talets senare del, då marknadsorienteringen förstärks i neoliberal riktning, sker ett andra skifte; en historiskt vedertagen gemenskapstanke – nationen – bryts upp som grund för medborgerlig gemenskap. Denna tanke ersätts av en annan som är globaliseringsinriktad, vilken visar sig ha andra inne- och uteslutande mekanismer för olika individer och samhällsgrupper. Utifrån dessa forskningsrön tecknas avslutningsvis några konturer till ett alternativt sätt att tänka kring medborgarskap och gemenskap. Detta alternativ tar form i ambitionen att, i högre grad än vad som blir synligt i svensk utbildningspolitik, resonera kring möjligheter för ett medborgarskap bortom förhandstecknade indelningsgrunder för ett “vi”. Språk som politisk och samhällelig förändringskraft ges en central betydelse i avhandlingen. I analysen av texternas tal om skolans medborgarfostrande roll undersöks pågående politiska motsättningar när det gäller att vinna tal- och tolkningsföreträde till skolans fostransmål. Utgångarna av dessa motsättningar belyses genom tre områden för medborgarfostran som urskilts som centrala; ett politiskt, ett kulturellt samt ett ekonomi- och arbetslivsriktat. Genom dessa har rådande medborgarskapsdiskurser tagit form, ur vilka de utbildningspolitiska förståelserna av medborgarskap gestaltas och diskuteras.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We argue that attitudes about immigration can be better understood by paying closer attention to the various ways in which national group boundaries are demarcated. We describe two related lines of work that address this. The first deals with national group definitions and, based on evidence from studies carried out in England and analyses of international survey data, argues that the relationship between national identification and prejudice toward immigrants is contingent on the extent to which ethnic or civic definitions of nationality are endorsed. The second, which uses European survey data, examines support for ascribed and acquired criteria that can be applied when determining who is permitted to migrate to one's country, and the various forms of national and individual threat that affect support for these criteria. We explain how the research benefits from a multilevel approach and also suggest how these findings relate to some current policy debates.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this article we question recent psychological approaches that equate the constructs of citizenship and social identity and which overlook the capacity for units of governance to be represented in terms of place rather than in terms of people. Analysis of interviews conducted in England and Scotland explores how respondents invoked images of Britain as “an island” to avoid social identity constructions of nationality, citizenship, or civil society. Respondents in Scotland used island imagery to distinguish their political commitment to British citizenship from questions relating to their subjective identity. Respondents in England used island imagery to distinguish the United Kingdom as a distinctive political entity whilst avoiding allusions to a common or distinctive identity or character on the part of the citizenry. People who had moved from England to Scotland used island imagery to manage the delicate task of negotiating rights to social inclusion in Scottish civil society whilst displaying recognition of the indigenous population’s claims to distinctive national culture and identity.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper examines identity issues in multicultural Australia. In its extreme, negative form, assumptions that certain characteristics apply to all members of an ethnic group can be attributed to racism. However, the belief that individuals who share the same ethnic background have similar needs, interests and perceptions is also reflected in business, government policy and academic research. Often, ethnic groupings used for research and policy formulation are very broad and fail to take into account within-group differences. The criteria used to assess an individuals membership of an ethnic group can be problematic. Criteria based purely on objective measures such as country of birth or ethnic ancestry do not take into account acculturation processes or the degree to which individuals consider themselves to be 'ethnic '. These objective measures are complicated further as individuals may have ethnic roots from multiple countries depending on their family composition over several generations. This theory-focused paper proposes that ethnic identity should be viewed as a subjective phenomenon where individuals are likely to align themselves with the ethnic background to which they most identify. This has implications for research and policy making in multicultural societies.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Preview of the article : Ever since the publication of Fictions in Autobiography in 1985, Paul John Eakin has been a major presence in the field of autobiography studies. As with his other monographs, Eakin’s latest work, Living Autobiographically: How We Create Identity in Narrative, brings together elegance and range, as well as clarity and conceptual complexity. Like his other works, too, Living Autobiographically covers a wide range of theoretical and autobiographical texts. While not indifferent to literary theory per se, Eakin (as has been apparent for some time) is profoundly stimulated by theory that goes beyond not only the literary but also the humanities. Most notable in this monograph is Eakin’s use of recent research in neurobiology. With regard to his choice of autobiographical texts for discussion, most are American, though Eakin does discuss the Australian writer David Malouf (a long-time favorite of Eakin’s), as well as the Norwegian autobiographical narratives analyzed in Marianne Gullestad’s Everyday Life Philosophers: Modernity, Morality, and Autobiography in Norway (1996). Eakin’s interest in Gullestad’s work, which is based on a project that elicited autobiographical narratives from “ordinary” individuals, shows that he is not solely concerned with so-called “literary” texts, something also seen in his discussion of the “Portraits of Grief ” series that appeared in the New York Times in the wake of 9/11.

Bringing together such disparate texts, auto/biographical procedures, and theoretical concerns is an ambitious enterprise. Most ambitious of all is that Living Autobiographically brings “culturalist” and biological frameworks together as a way of answering the question

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This article explores the politically contentious issue of White working-class student under-achievement within one particular school – a large and culturally diverse comprehensive secondary school in the greater London area. The article examines the equity philosophies and identity politics articulated by staff in their understanding of and approach to this under-achievement. It challenges the distributive logic and group identity politics that simplify, dislocate and distort equity issues. The article provides an illustration and theorising of remedies that offer potential in raising the educational performance of White working-class students – remedies not based on ethnic identity but rather on destabilising the patterns of economic distribution and social disengagement that compromise these students’ schooling attainment.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research examines how men react to male models in print advertisements. In two experiments, we show that the gender identity of men influences their responses to advertisements featuring a masculine, feminine, or androgynous male model. In addition, we explore the extent to which men feel they will be classified by others as similar to the model as a mechanism for these effects. Specifically, masculine men respond most favorably to masculine models and are negative toward feminine models. In contrast, feminine men prefer feminine models when their private self is salient. Yet in a collective context, they prefer masculine models.These experiments shed light on how gender identity and self-construal influence male evaluations and illustrate the social pressure on men to endorse traditional masculine portrayals. We also present implications for advertising practice.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A strong designated verifier signature scheme makes it possible for a signer to convince a designated verifier that she has signed a message in such a way that the designated verifier cannot transfer the signature to a third party, and no third party can even verify the validity of a designated verifier signature. We show that anyone who intercepts one signature can verify subsequent signatures in Zhang-Mao ID-based designated verifier signature scheme and Lal-Verma ID-based designated verifier proxy signature scheme. We propose a new and efficient ID-based designated verifier signature scheme that is strong and unforgeable. As a direct corollary, we also get a new efficient ID-based designated verifier proxy signature scheme.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The dream of a cosmopolitical utopia has been around for thousands of years. Yet the promise of being locally situated and at the same time globally connected and mobile has never seemed more possible than it is today. The question remains as to whether it is positive and realistic for us to have multiple loyalties. Can we sustain community and solidarity with our neighbours while we look beyond our nation? And if we can't - or won't – consider distant strangers as part of our own world, are there increasingly dire consequences? This book reconnects classical sociological theory and contemporary ideas on mobility, otherness, material assemblages, consumption and surveillance to render the idea of a global cosmopolitan utopia amenable to sociological investigation. The book takes a realistic approach to the development of cosmopolitical arrangements. It embraces the imaginative impulses the cosmopolitan dream provides, but takes into account the political, ethical and cultural dimensions of such cosmopolitan developments. In revisiting the relevance of classical sociological approaches in the context of contemporary theoretical challenges, the distinctive approach this book takes to understanding cosmopolitanism will be of use to scholars and students alike.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.