999 resultados para aesthetic security


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thesis (D.M.A.)--University of Washington, 2016-06

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper we discuss how an innovative audio-visual project was adopted to foster active, rather than declarative learning, in critical International Relations (IR). First, we explore the aesthetic turn in IR, to contrast this with forms of representation that have dominated IR scholarship. Second, we describe how students were asked to record short audio or video projects to explore their own insights through aesthetic and non-written formats. Third, we explain how these projects are understood to be deeply embedded in social science methodologies. We cite our inspiration from applying a personal sociological imagination, as a way to counterbalance a ‘marketised’ slant in higher education, in a global economy where students are often encouraged to consume, rather than produce knowledge. Finally, we draw conclusions in terms of deeper forms of student engagement leading to new ways of thinking and presenting new skills and new connections between theory and practice.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The lived experience of the soldier has long been the subject of artistic inquiry and scholarly analysis. In this paper I reflect on my own art practice and research into Fijian military embodiment and the ways that Fijian soldiers and private security workers negotiate a liminal space between embodied indigenous knowledge (presence) and somaesthetic military practice (absence). As Maltby and Thornham (2012, 37) explain, “the dual articulation of the body constructs multiple understandings of it as simulta- neously lived and imagined, public and private, present and absent, experienced and represented”. I broaden these ideas around visibility/invisibility and the absence and presence of the military body through an analysis of key works by contemporary artists Lisa Barnard and Suzanne Opton.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper identifies a number of critical infrastructure applications that are reliant on location services from cooperative location technologies such as GPS and GSM. We show that these location technologies can be represented in a general location model, such that the model components can be used for vulnerability analysis. We perform a vulnerability analysis on these components of GSM and GPS location systems as well as a number of augmentations to these systems.