391 resultados para outsider-insider
Resumo:
This chapter discusses research undertaken for a PhD in dance, highlighting the oscillating and ambivalent nature of practice-led research methods. Holding an unusual position within the field of practice-led research in dance, the researcher adopted the role of dancer within four creative processes led by four choreographers. Although instigating and leading this research, the author produced new knowledge of dancing practices whilst being directed creatively by the choreographers in the research environment. In line with many definitions of practice-led research, the methods used were emergent from the research arena and responsive to the requirements of the project. Deeply imbricated in the research environment, the researcher used her embodied self as a research tool, as the one who participated, discovered and recorded. This outsider/insider role of researcher/participant produced a series of meta-positions, leading to a mixed-modal outcome that encompassed live performance, a movement treatise and a written thesis.
Resumo:
Much of the literature on ethical issues in child and youth participation has drawn on the episodic experiences of participatory research efforts in which young people’s input has been sought, transcribed and represented. This literature focuses in particular on the power dynamics and ethical dilemmas embedded in time-bound adult/child and outsider/insider relationships. While we agree that these issues are crucial and in need of further examination, it is equally important to examine the ethical issues embedded within the “everyday” practices of the organizations in and through which young people’s participation in community research and development often occurs (e.g., community-based organizations, schools and municipal agencies). Drawing on experience from three summers of work in promoting youth participation in adult-led organizations of varying purpose, scale and structure, a framework is postulated that presents participation as a spatial practice shaped by five overlapping dimensions. The framework is offered as a point of discussion and a potential tool for analysis in ecipation in relation to organizational practice.
Resumo:
An electricity demand reduction project based on comprehensive residential consumer engagement was established within an Australian community in 2008. By 2011, both the peak demand and grid supplied electricity consumption had decreased to below pre-intervention levels. This case study research explored the relationship developed between the utility, community and individual consumer from the residential customer perspective through qualitative research of 22 residential households. It is proposed that an energy utility can be highly successful at peak demand reduction by becoming a community member and a peer to residential consumers and developing the necessary trust, access, influence and partnership required to create the responsive environment to change. A peer-community approach could provide policymakers with a pathway for implementing pro-environmental behaviour for low carbon communities, as well as peak demand reduction, thereby addressing government emission targets while limiting the cost of living increases from infrastructure expenditure.
Resumo:
Breen Smyth, M. (2005). Insider Outsider issues in researching violence and divided societies. In E. Porter, G. Robinson, M. Smyth, A. Schnabel, and E. Osaghae (Eds.), Researching Conflict in Africa: Insights and Experiences (pp.9-23). Tokyo: United Nations University Press. RAE2008
Resumo:
Judah Benjamin (1811-1884) was one of the greatest of nineteenth century lawyers. This article analyses how a young man who might have been marginalized in society because of the circumstances of his birth, ethnic origin and religious identity rose to prominence in law, politics and business in the United Kingdom and the United States.
Resumo:
Background Through an account of prevailing experiences of art and mental illness, this paper aims to raise awareness, open dialogue and create agency about art created by people with experience of mental illness. Methods This paper draws on personal narrative and inquiry by an artist with mental illness and data collected as part of a larger participatory action research project that investigated understandings of identity, art and mental illness. Result An inquiry through art raised awareness and attentiveness to the importance of choice in identity construction and exposed frequent dichotomies in art and mental illness that were negotiated to eschew prescribed social stratification. As an artist, the first author challenged values present in one idea and absent in the other, and the options and concessions available to authorise her own dialogue and agency of being an artist. Conclusion Constructing an identity is an important part of being human, the labels that we choose or are chosen for us attribute to our identity. Reflections and recommendations are offered to consider expanded ways of thinking about art and mental illness and the functions that art play in identity construction.
Resumo:
In australia, 'Aboriginality' is often defined by people in constrictive ways that are heavily influenced by the coloniser's epistemological frameworks. An essential component of this is a 'racial' categorisation of peoples that marks sameness and difference, thereby influencing insider and outsider status. In one sense, this categorisation of people acts to exclude non-aboriginal 'others' from participation in preinvasion indigenous ontologies, ways of living that may not have contained such restrictive identity categories and were thereby highly inclusive of outsiders. One of the effects of this is that aboriginal peoples' efforts for 'advancement' - either out of 'disadvantage' and/or towards political independence (ie, sovereignty) - become confined and restricted by what is deemed possible within the coloniser's epistemological frameworks. This is so much so that aboriginal people are at risk of only reinforcing and upholding the very systems that resulted in their original and continuing dispossession.
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
We introduce multiple-control fuzzy vaults allowing generalised threshold, compartmented and multilevel access structure. The presented schemes enable many useful applications employing multiple users and/or multiple locking sets. Introducing the original single control fuzzy vault of Juels and Sudan we identify several similarities and differences between their vault and secret sharing schemes which influence how best to obtain working generalisations. We design multiple-control fuzzy vaults suggesting applications using biometric credentials as locking and unlocking values. Furthermore we assess the security of our obtained generalisations for insider/ outsider attacks and examine the access-complexity for legitimate vault owners.
Resumo:
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.
Resumo:
A group key exchange (GKE) protocol allows a set of parties to agree upon a common secret session key over a public network. In this thesis, we focus on designing efficient GKE protocols using public key techniques and appropriately revising security models for GKE protocols. For the purpose of modelling and analysing the security of GKE protocols we apply the widely accepted computational complexity approach. The contributions of the thesis to the area of GKE protocols are manifold. We propose the first GKE protocol that requires only one round of communication and is proven secure in the standard model. Our protocol is generically constructed from a key encapsulation mechanism (KEM). We also suggest an efficient KEM from the literature, which satisfies the underlying security notion, to instantiate the generic protocol. We then concentrate on enhancing the security of one-round GKE protocols. A new model of security for forward secure GKE protocols is introduced and a generic one-round GKE protocol with forward security is then presented. The security of this protocol is also proven in the standard model. We also propose an efficient forward secure encryption scheme that can be used to instantiate the generic GKE protocol. Our next contributions are to the security models of GKE protocols. We observe that the analysis of GKE protocols has not been as extensive as that of two-party key exchange protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for GKE protocols. We model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure against KCI attacks. A new proof of security for an existing GKE protocol is given under the revised model assuming random oracles. Subsequently, we treat the security of GKE protocols in the universal composability (UC) framework. We present a new UC ideal functionality for GKE protocols capturing the security attribute of contributiveness. An existing protocol with minor revisions is then shown to realize our functionality in the random oracle model. Finally, we explore the possibility of constructing GKE protocols in the attribute-based setting. We introduce the concept of attribute-based group key exchange (AB-GKE). A security model for AB-GKE and a one-round AB-GKE protocol satisfying our security notion are presented. The protocol is generically constructed from a new cryptographic primitive called encapsulation policy attribute-based KEM (EP-AB-KEM), which we introduce in this thesis. We also present a new EP-AB-KEM with a proof of security assuming generic groups and random oracles. The EP-AB-KEM can be used to instantiate our generic AB-GKE protocol.