To see the other types of publications on this topic, follow the link: Implicit certificates.

Journal articles on the topic 'Implicit certificates'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 42 journal articles for your research on the topic 'Implicit certificates.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kwon, Hee-Yong, and Mun-Kyu Lee. "Fast Verification of Signatures With Shared ECQV Implicit Certificates." IEEE Transactions on Vehicular Technology 68, no. 5 (May 2019): 4680–94. http://dx.doi.org/10.1109/tvt.2019.2902382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Siddhartha, Valmiki, Gurjot Singh Gaba, and Lavish Kansal. "A Lightweight Authentication Protocol using Implicit Certificates for Securing IoT Systems." Procedia Computer Science 167 (2020): 85–96. http://dx.doi.org/10.1016/j.procs.2020.03.185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Eldefrawy, Mohamed H., Nuno Pereira, and Mikael Gidlund. "Key Distribution Protocol for Industrial Internet of Things Without Implicit Certificates." IEEE Internet of Things Journal 6, no. 1 (February 2019): 906–17. http://dx.doi.org/10.1109/jiot.2018.2865212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Teniou, Ahcene, and Boucif A. Bensaber. "Efficient and dynamic elliptic curve qu-vanstone implicit certificates distribution scheme for vehicular cloud networks." Security and Privacy 1, no. 1 (January 2018): e11. http://dx.doi.org/10.1002/spy2.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McCord, Michael, Martin Haran, Peadar Davis, and John McCord. "Energy performance certificates and house prices: a quantile regression approach." Journal of European Real Estate Research 13, no. 3 (August 31, 2020): 409–34. http://dx.doi.org/10.1108/jerer-06-2020-0033.

Full text
Abstract:
Purpose A number of studies have investigated the relationship between energy performance certificates (EPCs) and house prices. A majority of studies have tended to model energy performance pricing effects within a traditional hedonic conditional mean estimate model. There has been limited analysis that has accounted for the relationship between EPCs and the effects across the pricing distribution. Moreover, there has been limited research examining the “standard cost improvements EPC score”, or “potential score”. Therefore, this paper aims to quantify and measure the dynamic effects of EPCs on house prices across the price spectrum and account for standardised cost-effective retrofit improvements. Design/methodology/approach Existing EPC studies produce one coefficient for the entirety of the pricing distribution, culminating in a single marginal implicit price effect. The approach within this study applies a quantile regression approach to empirically estimate how quantiles of house prices respond differently to unitary changes in the proximal effects of EPCs and structural property characteristics across the conditional distribution of house prices. Using a data set of 1,476 achieved transaction prices, the quantile regression models apply both assessed EPC score and bands and further examine the potential EPC rating for improved energy performance based on an average energy cost improvement. Findings The findings show that EPCs are valued differently across the quantiles and that conditional quantiles are asymmetrical. Only property prices in the upper quantiles of the price distribution show significant capitalisation effects with energy performance, and only properties with higher EPC scores display positive significant effects at the higher end of the price distribution. There are also brown discount effects evident for lower-rated properties within F- and G-rated EPC properties at the higher end of the pricing distribution. Moreover, the potential energy efficiency rating (score) also shows increased effects with sales prices and appears to minimise any brown discount effects. The findings imply that energy performance is a complex feature that is not easily “averaged” for valuation effect purposes. Originality/value While numerous studies have investigated the pricing effects of EPCs, they have tended to provide a single estimate to determine the relationship with price. This paper extends the traditional analytical insights beyond the conditional mean estimate by examining the quantiles of the relationship between EPCs and house prices to enhance the understanding of this esoteric and complex issue. In addition, this research applies the assessed energy efficiency potential to establish whether effective cost improvements enhance the relationship with sales price and capitalisation effects.
APA, Harvard, Vancouver, ISO, and other styles
6

Rana, Muhammad, and Quazi Mamun. "A Robust and Lightweight Key Management Protocol for WSNs in Distributed IoT Applications." International Journal of Systems and Software Security and Protection 9, no. 4 (October 2018): 1–16. http://dx.doi.org/10.4018/ijsssp.2018100101.

Full text
Abstract:
To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication with a robust pervasive communication mechanism. However, due to the resource constraints and heterogeneous characteristics of the sensor devices, traditional authentication and key management schemes are not effective for such applications. Here, we propose a pervasive lightweight authentication and keying mechanism for WSNs in distributed IoT applications in which the sensor nodes can establish secure links with peer sensor nodes and end-users. The established authentication scheme is based on implicit certificates, and it provides application-level end-to-end security. A comprehensive description of the scenario based behaviour of the protocol is presented. With the performance evaluation and the security analysis, it is justified that the proposed scheme is viable to deploy in the resource constrained WSNs.
APA, Harvard, Vancouver, ISO, and other styles
7

Flores, Marcel, Andrew Kahn, Marc Warrior, Alan Mislove, and Aleksandar Kuzmanovic. "Utilizing Web Trackers for Sybil Defense." ACM Transactions on the Web 15, no. 2 (May 2021): 1–19. http://dx.doi.org/10.1145/3450444.

Full text
Abstract:
User tracking has become ubiquitous practice on the Web, allowing services to recommend behaviorally targeted content to users. In this article, we design Alibi, a system that utilizes such readily available personalized content, generated by recommendation engines in real time, as a means to tame Sybil attacks. In particular, by using ads and other tracker-generated recommendations as implicit user “certificates,” Alibi is capable of creating meta-profiles that allow for rapid and inexpensive validation of users’ uniqueness, thereby enabling an Internet-wide Sybil defense service. We demonstrate the feasibility of such a system, exploring the aggregate behavior of recommendation engines on the Web and demonstrating the richness of the meta-profile space defined by such inputs. We further explore the fundamental properties of such meta-profiles, i.e., their construction, uniqueness, persistence, and resilience to attacks. By conducting a user study, we show that the user meta-profiles are robust and show important scaling effects. We demonstrate that utilizing even a moderate number of popular Web sites empowers Alibi to tame large-scale Sybil attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Smith, Jessica. "Tracing lines in the lawscape: Registration/pilgrimage and the sacred/secular of law/space." Sociological Review 68, no. 5 (April 21, 2020): 917–31. http://dx.doi.org/10.1177/0038026120915705.

Full text
Abstract:
The aim of this article is to draw upon sacred/secular ‘journeying’ to explore the inherent movement invoked by the state’s documentation of the life course. In tracing this motion, the article follows two intersecting pathways – the literal travel of those who register a life event and the figurative ‘journeying’ of legal identity. The argument develops from a case study conducted at the Beaney House of Art & Knowledge (Canterbury, UK): a museum, gallery, library, cafe, community exhibition, tourist information point and registration hub. But rather than using the building as a frame, to follow more closely the activity of registrars and citizens, I locate imaginative potential in the Beaney’s ‘tessellating’ spaces. Accordingly, the spatial account which is developed is ‘fictive’ in its very nature and offers an implicit critique of a bureaucratic act of governance embedded with legal fiction. In doing so, the article contributes to critical work on registration which deploys the language of ‘journeying’ to outline the performative force of state documentation, and more broadly, to spatial approaches which illustrate patterns of movement within the ‘lawscape’. The article argues that the ‘journeying’ of registration represents a pilgrimage, whereby individuals are ‘called’ to bureaucratic space at the centre of their local sphere, and the certificates they take with them, much like the badges of medieval pilgrims, are ‘takeaway tokens’ of the state – documents which impress legal identities upon us.
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Hai Lin, and Yang Lu. "Hierarchical Certificate-Based Encryption: Definition and an Efficient Construction." Applied Mechanics and Materials 513-517 (February 2014): 1971–74. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1971.

Full text
Abstract:
Certificate-based encryption is a new paradigm which was introduced by Gentry to address the complex public key revocation problem in traditional public key cryptosystems. It represents an interesting and potentially useful balance between traditional public-key encryption and identity-based encryption. In this paper, we introduce the notion of hierarchical certificate-based encryption that preserves the advantages of certificate-based encryption such as implicit certificate and key-escrow free while inheriting the properties of hierarchical identity-based encryption. We formalize the definition of hierarchical certificate-based encryption and also propose a concrete hierarchical certificate-based encryption scheme that is chosen-ciphertext secure under the hardness of bilinear Diffie-Hellman problem in the random oracle model.
APA, Harvard, Vancouver, ISO, and other styles
10

Poulter, Jim. "A birth certificate is not a biological property title: Has an insidiously persistent idea finally reached its use-by date?" Children Australia 32, no. 1 (2007): 37–42. http://dx.doi.org/10.1017/s1035077200011457.

Full text
Abstract:
Particularly in western societies, the notion that children are biological property has been a strongly implicit idea for many generations. It has therefore also been an idea that has implicitly pervaded our child welfare legislation and practice for generations, despite frequent legal rhetoric about the rights of the child. In this paper, the author traces the negative effects on welfare practice that this notion of children as property has had over the last half century. In doing so, the author calls not only on his professional experience, but also on his personal experience as a foster, adoptive and permanent care parent. Some provisions within the new Victorian child protection legislation are examined to gauge their capacity to address the negative effects on practice of this persistent notion, and reason found for some guarded optimism.
APA, Harvard, Vancouver, ISO, and other styles
11

Middleton, Owen L., Daniel S. Atherton, Elizabeth A. Bundock, Elizabeth Donner, Daniel Friedman, Dale C. Hesdorffer, Heather S. Jarrell, et al. "National Association of Medical Examiners Position Paper: Recommendations for the Investigation and Certification of Deaths in People with Epilepsy." Academic Forensic Pathology 8, no. 1 (March 2018): 119–35. http://dx.doi.org/10.23907/2018.009.

Full text
Abstract:
Sudden unexpected death of an individual with epilepsy (SUDEP) can pose a challenge to death investigators, as most deaths are unwitnessed and the individual is commonly found dead in bed. Anatomic findings (e.g., tongue/lip bite) are commonly absent and of varying specificity, limiting the evidence to implicate epilepsy as a cause of or contributor to death. Thus, it is likely that death certificates significantly underrepresent the true number of deaths in which epilepsy was a factor. To address this, members of the National Association of Medical Examiners, North American SUDEP Registry, Epilepsy Foundation SUDEP Institute, American Epilepsy Society, and the Centers for Disease Control and Prevention convened an expert panel to generate evidence-based recommendations for the practice of death investigation and autopsy, toxicological analysis, interpretation of autopsy and toxicology findings, and death certification to improve the precision of death certificate data available for public health surveillance of epilepsy-related deaths. The recommendations provided in this paper are intended to assist medical examiners, coroners, and death investigators when a sudden, unexpected death in a person with epilepsy is encountered.
APA, Harvard, Vancouver, ISO, and other styles
12

Lazar, Gillian, and Eddie Ellis. "Genre as Implicit Methodology in a Collaborative Writing Initiative." International Journal of English Studies 11, no. 1 (June 1, 2011): 155. http://dx.doi.org/10.6018/ijes/2011/1/137151.

Full text
Abstract:
It is often assumed that the academic genres taught by EAP specialists at universities are fixed and stable, provide easily accessible exemplars for student writers and feature in programmes running prior or parallel to the students‟ courses. This paper describes a collaborative writing initiative in which these assumptions were challenged. A writing specialist collaborated with a team of academics on a Post-graduate Certificate of Education (PGCE) in order to improve students‟ writing of a Masters-level assignment. While the writing specialist was implicitly committed to a genre-based teaching methodology, this was necessarily framed in terms of the aims of the PGCE academics, who were particularly concerned about improving student understanding of both assignment guidelines and assessment criteria. An impact study detailing positive outcomes for this collaboration, suggests that a genre-aware pedagogy can still inform a programme for writing within the disciplines even when the focus on genre is implicit.
APA, Harvard, Vancouver, ISO, and other styles
13

Chen, Zhonglin, Shanzhi Chen, Hui Xu, and Bo Hu. "A Security Scheme of 5G Ultradense Network Based on the Implicit Certificate." Wireless Communications and Mobile Computing 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/8562904.

Full text
Abstract:
The ultradense network (UDN) is one of the most promising technologies in the fifth generation (5G) to address the network system capacity issue. It can enhance spatial reuse through the flexible, intensive deployment of small base stations. A universal 5G UDN architecture is necessary to realize the autonomous and dynamic deployment of small base stations. However, the security of the 5G UDN is still in its infancy, and the data communication security among the network entities is facing new challenges. In this paper, we proposed a new security based on implicit certificate (IC) scheme; the scheme solves the security problem among the access points (APs) in a dynamic APs group (APG) and between the AP and user equipment (UE). We present each phase regarding how two network entities obtain the Elliptic Curve Qu-Vanstone (ECQV) implicit certificate scheme, verify each other’s identity, and share keys in an UDN. Finally, we extensively analyze our lightweight security communication model in terms of security and performance. The simulation on network bandwidth evaluation is also conducted to prove the efficiency of the solution.
APA, Harvard, Vancouver, ISO, and other styles
14

Bostan, Atila. "Implicit learning with certificate warning messages on SSL web pages: what are they teaching?" Security and Communication Networks 9, no. 17 (August 25, 2016): 4295–300. http://dx.doi.org/10.1002/sec.1607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Park, Chang-Seop. "A Secure and Efficient ECQV Implicit Certificate Issuance Protocol for the Internet of Things Applications." IEEE Sensors Journal 17, no. 7 (April 1, 2017): 2215–23. http://dx.doi.org/10.1109/jsen.2016.2625821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Wei, Min, Shuaidong Zhang, Ping Wang, and Keecheon Kim. "An authentication and key agreement mechanism for OPC Unified Architecture in industrial Internet of Things." International Journal of Distributed Sensor Networks 14, no. 1 (January 2018): 155014771875479. http://dx.doi.org/10.1177/1550147718754793.

Full text
Abstract:
As an industrial communication data interaction specification, OPC Unified Architecture effectively solves the industrial Internet of Things system integration problem. This article designs an authentication and key agreement scheme based on implicit certificate using the security model provided by OPC Unified Architecture. It establishes the secure channel and provides a guarantee for secure session for the OPC Unified Architecture server and client. Then, the test verification platform is implemented to verify the feasibility of the scheme. The result shows that the mechanism is feasible, and the system security and availability are effectively improved.
APA, Harvard, Vancouver, ISO, and other styles
17

Ren, Yongjun, Fujian Zhu, Jian Qi, Jin Wang, and Arun Kumar Sangaiah. "Identity Management and Access Control Based on Blockchain under Edge Computing for the Industrial Internet of Things." Applied Sciences 9, no. 10 (May 18, 2019): 2058. http://dx.doi.org/10.3390/app9102058.

Full text
Abstract:
Edge computing provides a unified platform for computing, networking, and storage resources, enabling data to be processed in a timely and efficient manner near the source. Thus, it has become the basic platform for industrial Internet of things (IIoT). However, computing′s unique features have also introduced new security problems. To solve the problem, in this paper, blockchain-based identity management combining access control mechanism is designed under edge computing. The self-certified cryptography is utilized to realize the registration and authentication of network entities. We bind the generated implicit certificate to its identity and construct the identity and certificate management mechanism based on blockchain. Secondly, an access control mechanism based on Bloom filter is designed and integrated with identity management. Moreover, for secure communication in resource-constrained edge devices, a lightweight secret key agreement protocol based on self-authenticated public key is constructed. These mechanisms work together to provide data security guarantees for IIoT such as authentication, auditability, and confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
18

Lee, Cheng-Chi, Min-Shiang Hwang, and I.-En Liao. "On the Security of Self-Certified Public Keys." International Journal of Information Security and Privacy 5, no. 2 (April 2011): 54–60. http://dx.doi.org/10.4018/jisp.2011040104.

Full text
Abstract:
Many cryptosystems have been developed to solve the problem of information security, and some approaches are based on the self-certified public key proposed by Girault. In Girault’s scheme, the public key is computed cooperatively by both the system authority (SA) and the user. One of the advantages is that the public key is able to implicitly authenticate itself without any additional certificates. Another advantage is that the SA is not able to forge a public key without knowing the user’s secret key. Despite the advantages of Girault’s system, in this paper, the authors demonstrate that the system still suffers from two main weaknesses. As a result, the authors propose a slight improvement on Girault’s system.
APA, Harvard, Vancouver, ISO, and other styles
19

Hubball, Harry, John Collins, and Daniel Pratt. "Enhancing Reflective Teaching Practices: Implications for Faculty Development Programs." Canadian Journal of Higher Education 35, no. 3 (September 30, 2005): 57–81. http://dx.doi.org/10.47678/cjhe.v35i3.183514.

Full text
Abstract:
Reflecting on one’s teaching practice is often an implicit goal for faculty development programs. Yet very little has been documented how programs for diverse groups of university teachers actually engage faculty in such reflection. This paper examines how theoretical constructs of reflective practice were applied in the context of an 8-month UBC Faculty Certificate Program on Teaching and Learning in Higher Education (FCP). The Teaching Perspectives Inventory (TPI) was particularly useful for providing faculty cohort members with a means of looking more deeply at the underlying values and assumptions that constituted their philosophical orientations to teaching. Furthermore, a change in faculty members’ TPI scores indicate that participants reflected more comprehensively on their teaching at the end of the program, than they did at the beginning of the program. Barriers to facilitating reflection included inadequate time allocation, unclear expectations and goals for reflection activities, and varying cultural norms for reflective teaching practices within academe.
APA, Harvard, Vancouver, ISO, and other styles
20

Duggan, Shane B. "Becoming ‘I’." Narrative Inquiry 23, no. 1 (December 12, 2013): 214–26. http://dx.doi.org/10.1075/ni.23.1.11dug.

Full text
Abstract:
This article draws upon the orientation ‘blog’ posts from a current PhD study focusing on identity formation in young people undertaking their final year of secondary schooling within the Victorian Certificate of Education (VCE). It critically investigates how participants define the ‘purpose’ of their engagement with the study and the subjectivities they employ in those interactions. The online blogs designed for this study are intended to create a space in which participants are able to act a-synchronously and discuss their ‘day-to-day’ experiences of the VCE. A key focus of this paper is to explicate the nature of this activity as performative, that is, participants contributing to blogs actively consider the nature of their engagement and construct an implicit ‘Other’ — a relationship that is informed by the purpose for participating in the research. Utilising Deleuze’s concept of ‘becoming’ (1987) along with a narrative methods framework (Riessman, 2008), it investigates the concept of ‘Other’ and will trace the process of ‘becoming storyteller’ as an active performance in Blog participation.
APA, Harvard, Vancouver, ISO, and other styles
21

Farooq, Shaik Mullapathi, S. M. Suhail Hussain, Siddavaram Kiran, and Taha Selim Ustun. "Certificate Based Security Mechanisms in Vehicular Ad-Hoc Networks based on IEC 61850 and IEEE WAVE Standards." Electronics 8, no. 1 (January 15, 2019): 96. http://dx.doi.org/10.3390/electronics8010096.

Full text
Abstract:
When equipped with an on-board wireless kit, electric vehicles (EVs) can communicate with nearby entities, e.g., road side units (RSUs), via a vehicle ad-hoc network (VANET). More observability enables smart charging algorithms where charging stations (CSs) are allocated to EVs based on their current state of charge, destination, and urgency to charge. IEEE 1609 WAVE standard regulates VANETs, while IEC 61850 is emerging as the smart grid communication standard. In order to integrate these two domains of energy management, past research has focused on harmonizing these two standards for a full smart city solution. However, this solution requires very sensitive data to be transmitted, such as ownership of EV, owners’ personal details, and driving history. Therefore, data security in these networks is of prime concern and needs to be addressed. In this paper, different security mechanisms defined by the IEEE 1609 WAVE standard are applied for both vehicle-to-infrastructure (V2I) and vehicle-to-grid (V2G) communication. The former relates to EV–RSU, while the latter covers EV–CS communication. The implicit and explicit certificate mechanism processes proposed in IEEE 1609 WAVE for authentication are studied in great detail. Furthermore, a performance evaluation for these mechanisms is presented in terms of total time lapse for authentication, considering both the computational time and communication time delays. These results are very important in understanding the extra latency introduced by security mechanisms. Considering that VANETs may be volatile and may disappear as EVs drive away, overall timing performance becomes vital for operation. Reported results show the magnitude of this impact and compare different security mechanisms. These can be utilized to further develop VANET security approaches based on available time and the required security level.
APA, Harvard, Vancouver, ISO, and other styles
22

Bauer, Janis, Holger Fink, and Eva Stoller. "Are Issuer Margins Fairly Stated? Evidence from the Issuer Estimated Value for Retail Structured Products." Forecasting 2, no. 4 (September 29, 2020): 387–409. http://dx.doi.org/10.3390/forecast2040021.

Full text
Abstract:
From 2014 to 2018, issuers of retail structured products in Germany established and calculated the Issuer Estimated Value (IEV), a fair value designed to offer more transparency for retail investors. By reporting the IEV in the product information sheet, banks implicitly make a statement on their expected gross margin and, as one of the first papers, we provide an empirical study of the fairness of these disclosed figures. On a sample of discount and capped bonus certificates, we find that reported issuer margins can be verified using standard option pricing models and we illustrate that hedging costs take on an important role for structured product valuation. Consequently, the answer to the raised question in the title seems to be an (initial) ‘yes’ for our chosen product sample. Even though in 2018 the IEV calculations have been replaced by similar margin and cost statements due to the newly introduced Packaged Retail and Insurance-based Investment Products Regulation, this finding might still be a good guide for future research.
APA, Harvard, Vancouver, ISO, and other styles
23

Mhango, Mtendeweka, and P. Thejane. "Provisional Registration of a Retirement Fund under Scrutiny in Swaziland." African Journal of Legal Studies 5, no. 1 (2012): 45–61. http://dx.doi.org/10.1163/170873812x626090.

Full text
Abstract:
Abstract Recently the Industrial Court of Swaziland was faced with a complaint in Mngadi v Motor Vehicle Accident Fund’s Pension Fund, which raised two important issues of first impression in Swaziland retirement law. This note discusses the significance and effects of Mngadi on provisional registration of retirement funds in Swaziland. It argues that Mngadi should be welcomed because it clarifies the significance of the need for retirement funds to operate in accordance with their registered rules. The note also discusses the problems with the Registrar’s power to issue a provisional certificate of registration under Section 5 in light of the problems that emerged in Mngadi. The note argues that Mngadi should be welcomed because it highlights the characteristics of a defined benefit fund, and implicitly distinguishes it from a defined contribution fund. While Mngadi should generally be welcomed, the Industrial Court should be criticised for its failure to develop the law.
APA, Harvard, Vancouver, ISO, and other styles
24

Lee, Dae-Hwi, and Im-Yeong Lee. "A Lightweight Authentication and Key Agreement Schemes for IoT Environments." Sensors 20, no. 18 (September 18, 2020): 5350. http://dx.doi.org/10.3390/s20185350.

Full text
Abstract:
In the Internet of Things (IoT) environment, more types of devices than ever before are connected to the internet to provide IoT services. Smart devices are becoming more intelligent and improving performance, but there are devices with little computing power and low storage capacity. Devices with limited resources will have difficulty applying existing public key cryptography systems to provide security. Therefore, communication protocols for various kinds of participating devices should be applicable in the IoT environment, and these protocols should be lightened for resources-restricted devices. Security is an essential element in the IoT environment, so for secure communication, it is necessary to perform authentication between the communication objects and to generate the session key. In this paper, we propose two kinds of lightweight authentication and key agreement schemes to enable fast and secure authentication among the objects participating in the IoT environment. The first scheme is an authentication and key agreement scheme with limited resource devices that can use the elliptic curve Qu–Vanstone (ECQV) implicit certificate to quickly agree on the session key. The second scheme is also an authentication and key agreement scheme that can be used more securely, but slower than first scheme using certificateless public key cryptography (CL-PKC). In addition, we compare and analyze existing schemes and propose new schemes to improve security requirements that were not satisfactory.
APA, Harvard, Vancouver, ISO, and other styles
25

Sugiarto, Eko. "NILAI-NILAI KARAKTER DALAM PEMBELAJARAN APRESIASI SENI BERBASIS MULTIKULTURAL." Sabda : Jurnal Kajian Kebudayaan 8, no. 1 (October 1, 2013): 52. http://dx.doi.org/10.14710/sabda.v8i1.13241.

Full text
Abstract:
Cultural values in accordance with the substance a/education which is to educate the nation as a whole, have changed direction into a value-and-job oriented human beings. Going to school or college, a person is only to get the predicate of "pass" with apiece of evident "certificate", instead of becoming an educated intelligent man intellectually, emotionally, and spiritually. Such reality raises various concerns among education observers. Indonesia is gradually losing its national character. The issue of national character is a question of culture. Therefore, the character education should also be multiculturally based, -which is implicitly inherent in "learning about the arts ", "learning the arts ", and "learning through the arts ". Art education has a strategic position, so it has the potential to implement the national character education. The development of the implementation of art education leading more greatly to multicultural-based character value that requires conceptual contribution of all parties is needed. In general this paper discusses the implementation of art learning in order to manifest multicultural-based character education as a response to the road map for arts-education, Unesco.
APA, Harvard, Vancouver, ISO, and other styles
26

Oorschot, Leo. "Dutch Hybrid Neighbourhoods of 1860–1910 in Heat Transition: The Case Study of Zeeheldenkwartier in The Hague." Energies 13, no. 20 (October 10, 2020): 5255. http://dx.doi.org/10.3390/en13205255.

Full text
Abstract:
This paper explores the typo-morphologic characteristics of late 19th century hybrid neighbourhoods in urban regions of The Netherlands and possibilities of a feasible climate neutral energy system in the future. The Zeeheldenkwartier neighbourhood in The Hague is used as a case study. Sustainable Development Goals (SDG) are involved to ensure access to affordable and clean energy (SDG 7) and make cities inclusive, safe, resilient and sustainable (SDG 11). With the 2019 Dutch-Climate-Agreement The Netherlands decided on a neighbourhood approach to the transition from natural gas to a climate neutral energy supply in buildings. Implicit homogeneity in most buildings of neighbourhoods is presupposed, in contrast to older neighbourhoods that were laid out before World War I. These are nowadays heterogenic, attractive, mixed and often protected neighbourhoods because of the quality of the architecture. Establishing a generic energy plan here is a challenge. The foremost important conclusion is the recognition of the architectural and urban quality and features of these kinds of neighbourhoods and to develop specific legislation and rules about insulation, service and energy systems. Another conclusion about the strategy is that one should not rely on a single generic solution but rather apply multiple forms of heat supply over a longer period of time. There is lack of heat and construction capacity. Box-in-box-renovation is best done when people are moving and the house is uninhabited. The tenants of a neighbourhood should oganise, not building owners, and implement legislation and framework for rental apartments. Insulation should be done to mandatory Energy Performance Certificate (EPC) label B or C, adding sound and energy production of heat pumps and district heating.
APA, Harvard, Vancouver, ISO, and other styles
27

Van Zyl, J. Marinda, Christoffel Johannes Els, and A. Seugnet Blignaut. "Development of ODL in a newly industrialised country according to face-to-face contact, ICT, and e-readiness." International Review of Research in Open and Distributed Learning 14, no. 1 (January 22, 2013): 84. http://dx.doi.org/10.19173/irrodl.v14i1.1342.

Full text
Abstract:
<p>A large number of unqualified and under-qualified in-service teachers are holding back socio-economical development in South Africa, a newly industrialized country. Open and distance learning (ODL) provides an innovative strategy and praxis for developing and newly industrialized countries to reach their educational and socio-economical objectives through professional development and training. In order to examine factors which affect the success of ODL offered by the North-West University in South Africa, a qualitative and quantitative research approach is used. Factors examined include face-to-face classroom contact, the implementation and use of ICTs, and e-readiness. The relationships between these factors are also discussed. A questionnaire was administered to 87 teacher-students in four Advanced Certificate in Education (ACE) programs to collect quantitative data regarding aspects of their classes and the e-readiness of students. This data was qualitatively elaborated upon by three semi-structured, open-ended focus-group interviews. Besides descriptive statistics, Spearman’s rank-order correlations (<em>r</em>) were determined between variables pertaining to negative feelings towards face-to-face classroom contact, ODL as students’ choice of delivery mode, and students’ positive attitude towards information and communication technology (ICT). Combined quantitative and qualitative findings were used to evaluate the effectiveness of contact classes as well as the e-readiness of students towards the attainment of ODL development Phase D. This phase refers to UNESCO’s description of ICT implementation, integration, and use. Relationships (Spearman’s rank-order correlations) between ODL, as teacher-students’ choice of educational delivery mode, and aspects of their e-readiness suggest that the e-readiness of teacher-students is implicit to their choice of ODL as educational delivery mode for professional development.</p>
APA, Harvard, Vancouver, ISO, and other styles
28

Pramana, Baldi, and Busyra Azheri. "PELAKSANAAN PENGIKATAN JUAL BELI RUMAH MELALUI SISTEM PESAN BANGUN PADA PT. PRATAMA GRIYA MAKMUR KABUPATEN PASAMAN BARAT." ALHURRIYAH: Jurnal Hukum Islam (ALHURRIYAH JOURNAL OF ISLAMIC LAW) 4, no. 1 (June 30, 2019): 11. http://dx.doi.org/10.30983/alhurriyah.v4i1.954.

Full text
Abstract:
<p><em>The home marketing strategy that is currently being used is home sales in the form of images (pre-project selling). The transaction is set out in the form of Bonds for Sale and Purchase (PJB) which in practice raises various problems, both in terms of PJB content and the quality of work results. PJB for developers is often used to break the law and legislation such as by disguising the actions of company directors for and on behalf of themselves, consumers are required to pay excess land prices that were not previously agreed and thought of, down payments that originally increased from the price offered, the construction of the house is not in accordance with the specifications and general standards, the delay in the submission of the certificate, the fasum problem, which should be the responsibility of the developer. From the description above, the problem examined was how to implement the sale and purchase of houses through the built-in message system at PT. Pratama Griya Makmur Regency of West Pasaman and how to protect the rights of consumers. This study uses an empirical juridical approach. The results of the study show the implementation and legal protection for consumers in buying and selling houses through a built-in message system at PT. Pratama Griya Makmur, West Pasaman Regency has been carried out by breaking the rules, namely parties representing companies in making PJB are directors, acting for and on behalf of themselves, in PJB the building specifications are not included, sanctions for cancellation of agreements, rights and obligations of the parties are not included implicitly.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
29

Satria Yudistira, Made Bagus. "PENGATURAN HUKUM SERTIFIKAT HAK ATAS MEREK SEBAGAI JAMINAN FIDUSIA DALAM PROSES PENGAJUAN KREDIT DI PERBANKAN BERDASARKAN UNDANG-UNDANG NOMOR 20 TAHUN 2016." Jurnal Magister Hukum Udayana (Udayana Master Law Journal) 6, no. 3 (January 11, 2018): 310. http://dx.doi.org/10.24843/jmhu.2017.v06.i03.p04.

Full text
Abstract:
United Nations Commission on Intellectual Trade Law (UNCITRAL) in a conference held on 39th round in 2006, this round brought to the result of intellectual properties, specifically on the Trademarks that has been the source of bank financing. Then the things that to be discussed regarding to the legal arrangements of the rights certificate on the trademark as fiduciary assurance in the process of application for bank credit and also the ideal form provisions of the trademark as an object that used as an assurance object. The purpose of this writing is to find the explication of the rule of law concerning about the rights provision to the trademark as a fiduciary assurance after the issuance of the constitutions number 20 of 2016 about trademark and geographical indications, because in that constitution there was nothing firm as it stated on the article that related to the rights of the trademark as fiduciary assurance or the norm is blurred and implicitly stated that the rights of the trademark can be used as an object of fiduciary assurance. Besides that there was also the non-law factor and the bank policy that complicates the process in banking. Nevertheless there is a legal basis that arranged by the constitutions number 42 of 1999 regarding the fiduciary assurance and the code of civil law concerning the elements of the trademark that can be used as fiduciary assurance in the process of credit application. United Nations Comission on Intellectual Trade Law (UNCITRAL) dalam pertemuan yang diselenggarakan pada putaran ke 39 yaitu pada tahun 2006, putaran in menghasilkan kekayaan intelektual, khususnya Merek telah menjadi sumber pembiayaan Perbankan. Maka yang perlu dibahas mengenai Pengaturan Hukum sertifikat Hak atas Merek sebagai jaminan Fidusia dalam proses pengajuan kredit di perbankan serta ketentuan wujud ideal dari merek sebagai benda yang dijadikan obyek jaminan. Tujuan dari Penulisan adalah mencari kejelasan aturan hukum mengenai ketentuan Hak atas merek sebagai jaminan fidusia setelah diterbitkannya Undang-undang no 20 tahun 2016 tentang Merek dan Indikasi Geografis, karena di dalam Undang-undang tersebut tidak menyatakan dengan tegas Pasal yang berkaitan dengan hak Merek sebagai jaminan fidusia atau norma kabur yang tidak secara tegas menyatakan Hak atas Merek dapat dijadikan objek sebagai Jaminan fidusia. Di samping itu juga terdapat faktor non-hukum serta kebijakan Bank yang mempersulit prosesnya di perbankan. Walaupun demikian sesungguhnya terdapat dasar hukum yang diatur oleh Undang-undang no 42 tahun 1999 tentang jaminan Fidusia dan Kitab Undang-undang hukum Perdata mengenai unsur-unsur Merek bahwa dapat dijadikan sebagai jaminan fidusia dalam proses pengajuan kredit.
APA, Harvard, Vancouver, ISO, and other styles
30

Ciornei, Laurențiu. "László Rákosy: ”Serviciile oferite de natură sunt multiple și complexe. Va trebui să învățăm să le percepem și să le apreciem”." Bucovina Forestiera 20, no. 2 (January 12, 2021): 163–70. http://dx.doi.org/10.4316/bf.2020.019.

Full text
Abstract:
László Rákosy: “Prin pierderea biodiversității se ajunge la colapsul ecologic al planetei.” Pasiunea domniei sale pentru fluturi a început la vârsta de 10 ani, când a avut privilegiul să vadă colecția adevărată de fluturi a profesorului său de biologie, Michael Konrad. Această pasiune l-a determinat să studieze biologia pentru a cunoaște și înțelege mai bine viața spectaculoasă a necuvântătoarelor. Acum, profesorul László Rákosy este director al Departamentului de Taxonomie și Ecologie în cadrul Facultății de Biologie și Geologie a Universității „Babeș-Bolyai” din Cluj și președintele Societății Lepidopterologice Române. Cartea sa, “Fluturii diurni din România. Cunoaştere, protecţie, conservare”, l-a fascinat deja pe Charles, Prinț de Wales, moștenitor al tronului Regatului Unit și prieten al ținutului transilvan. Prin protejarea neprețuitului Albăstrel transilvan (Pseudophilotes bavius hungarica), profesorul László Rákosy merge cu pasiune pe urmele celebrului naturalist Alexandru Borza, cel care a înființat o arie protejată, acum nouă decenii, pentru protejarea plantei unice Astragalus peterfii. Albăstrelul transilvan este un fluturaș endemic pentru habitatele cu caracter stepic din Câmpia Transilvaniei și a devenit un simbol al Transilvaniei. Deși este protejat în România, Albăstrelul transilvan este cunoscut mai mult în străinătate, fiind trecut pe lista speciilor protejate de UE. Cea mai importantă populație s-a menținut în Situl Natura 2000 de la Suatu, la 35 km nord de Cluj-Napoca, unde numeroși specialiști și iubitori ai naturii veneau anual, la sfârșit de aprilie sau început de mai, pentru a vedea și admira acest unicat al naturii. Potrivit opiniei profesorului László Rákosy, oamenilor trebuie să le pese de protejarea speciilor endemice pentru că acestea trăiesc în areale foarte restrânse, iar perturbarea mediului în care trăiesc poate duce la extincția lor din patrimoniul mondial. Din nefericire, în anul 2016, populația de Albăstrel transilvan de la Suatu a fost complet distrusă când jaleșul cârn (Salvia nutans), planta preferată a fluturelui, a fost consumată de oi, exact în perioada în care în inflorescențele plantei se găseau ouăle și larvele acestuia. Dacă autoritățile locale ar fi fost vigilente, Albăstrelul transilvan ar fi putut deveni un brand local, așa cum alte specii endemice au devenit simboluri naționale, pentru multe dintre țările lumii. Dacă un bun din patrimoniul cultural mai poate fi restaurat, reparat sau îmbunătățit, dispariția unui taxon endemic nu poate fi înlocuită sau reparată prin niciun efort. Omenirea trebuie să învețe să mențină biodiversitatea la acel nivel la care rețelele ecologice să rămână funcționale. Sub îndrumarea profesorului László Rákosy, Societatea Lepidopterologică Română, alături de alte câteva ONG-uri, s-a implicat masiv în ultimii 15 ani în procesul de conștientizare a comunităților locale cu privire la atitudinea față de natură. Susține practicarea artei compromisului, ce va permite lăsarea brâielor de vegetație spontană dintre parcele ori proprietăți, pentru polenizatori și parazitoizi. Acestea vor reduce pesticidele și vor facilita certificarea produselor ”BIO”. În acest fel, câștigurile vor fi mai mari în timp, iar biodiversitatea refăcută. Profesorul László Rákosy iubește oamenii, expedițiile în zone mai puțin cunoscute (Amazon, Africa, Asia etc), familia, cei doi câini și arta fotografiei. Relația sa cu natura este una specială, iar pandemia generată de virusul SARS-CoV-2 l-a determinat să redescopere frumusețea Munților Apuseni, a grădinii sale, a plantelor și pomilor pe care îi îngrijește. Natura poate exista fără OM, omul fără NATURĂ nu!
APA, Harvard, Vancouver, ISO, and other styles
31

Jim, Danny, Loretta Joseph Case, Rubon Rubon, Connie Joel, Tommy Almet, and Demetria Malachi. "Kanne Lobal: A conceptual framework relating education and leadership partnerships in the Marshall Islands." Waikato Journal of Education 26 (July 5, 2021): 135–47. http://dx.doi.org/10.15663/wje.v26i1.785.

Full text
Abstract:
Education in Oceania continues to reflect the embedded implicit and explicit colonial practices and processes from the past. This paper conceptualises a cultural approach to education and leadership appropriate and relevant to the Republic of the Marshall Islands. As elementary school leaders, we highlight Kanne Lobal, a traditional Marshallese navigation practice based on indigenous language, values and practices. We conceptualise and develop Kanne Lobal in this paper as a framework for understanding the usefulness of our indigenous knowledge in leadership and educational practices within formal education. Through bwebwenato, a method of talk story, our key learnings and reflexivities were captured. We argue that realising the value of Marshallese indigenous knowledge and practices for school leaders requires purposeful training of the ways in which our knowledge can be made useful in our professional educational responsibilities. Drawing from our Marshallese knowledge is an intentional effort to inspire, empower and express what education and leadership partnership means for Marshallese people, as articulated by Marshallese themselves. Introduction As noted in the call for papers within the Waikato Journal of Education (WJE) for this special issue, bodies of knowledge and histories in Oceania have long sustained generations across geographic boundaries to ensure cultural survival. For Marshallese people, we cannot really know ourselves “until we know how we came to be where we are today” (Walsh, Heine, Bigler & Stege, 2012). Jitdam Kapeel is a popular Marshallese concept and ideal associated with inquiring into relationships within the family and community. In a similar way, the practice of relating is about connecting the present and future to the past. Education and leadership partnerships are linked and we look back to the past, our history, to make sense and feel inspired to transform practices that will benefit our people. In this paper and in light of our next generation, we reconnect with our navigation stories to inspire and empower education and leadership. Kanne lobal is part of our navigation stories, a conceptual framework centred on cultural practices, values, and concepts that embrace collective partnerships. Our link to this talanoa vā with others in the special issue is to attempt to make sense of connections given the global COVID-19 context by providing a Marshallese approach to address the physical and relational “distance” between education and leadership partnerships in Oceania. Like the majority of developing small island nations in Oceania, the Republic of the Marshall Islands (RMI) has had its share of educational challenges through colonial legacies of the past which continues to drive education systems in the region (Heine, 2002). The historical administration and education in the RMI is one of colonisation. Successive administrations by the Spanish, German, Japanese, and now the US, has resulted in education and learning that privileges western knowledge and forms of learning. This paper foregrounds understandings of education and learning as told by the voices of elementary school leaders from the RMI. The move to re-think education and leadership from Marshallese perspectives is an act of shifting the focus of bwebwenato or conversations that centres on Marshallese language and worldviews. The concept of jelalokjen was conceptualised as traditional education framed mainly within the community context. In the past, jelalokjen was practiced and transmitted to the younger generation for cultural continuity. During the arrival of colonial administrations into the RMI, jelalokjen was likened to the western notions of education and schooling (Kupferman, 2004). Today, the primary function of jelalokjen, as traditional and formal education, it is for “survival in a hostile [and challenging] environment” (Kupferman, 2004, p. 43). Because western approaches to learning in the RMI have not always resulted in positive outcomes for those engaged within the education system, as school leaders who value our cultural knowledge and practices, and aspire to maintain our language with the next generation, we turn to Kanne Lobal, a practice embedded in our navigation stories, collective aspirations, and leadership. The significance in the development of Kanne Lobal, as an appropriate framework for education and leadership, resulted in us coming together and working together. Not only were we able to share our leadership concerns, however, the engagement strengthened our connections with each other as school leaders, our communities, and the Public Schooling System (PSS). Prior to that, many of us were in competition for resources. Educational Leadership: IQBE and GCSL Leadership is a valued practice in the RMI. Before the IQBE programme started in 2018, the majority of the school leaders on the main island of Majuro had not engaged in collaborative partnerships with each other before. Our main educational purpose was to achieve accreditation from the Western Association of Schools and Colleges (WASC), an accreditation commission for schools in the United States. The WASC accreditation dictated our work and relationships and many school leaders on Majuro felt the pressure of competition against each other. We, the authors in this paper, share our collective bwebwenato, highlighting our school leadership experiences and how we gained strength from our own ancestral knowledge to empower “us”, to collaborate with each other, our teachers, communities, as well as with PSS; a collaborative partnership we had not realised in the past. The paucity of literature that captures Kajin Majol (Marshallese language) and education in general in the RMI is what we intend to fill by sharing our reflections and experiences. To move our educational practices forward we highlight Kanne Lobal, a cultural approach that focuses on our strengths, collective social responsibilities and wellbeing. For a long time, there was no formal training in place for elementary school leaders. School principals and vice principals were appointed primarily on their academic merit through having an undergraduate qualification. As part of the first cohort of fifteen school leaders, we engaged in the professional training programme, the Graduate Certificate in School Leadership (GCSL), refitted to our context after its initial development in the Solomon Islands. GCSL was coordinated by the Institute of Education (IOE) at the University of the South Pacific (USP). GCSL was seen as a relevant and appropriate training programme for school leaders in the RMI as part of an Asia Development Bank (ADB) funded programme which aimed at “Improving Quality Basic Education” (IQBE) in parts of the northern Pacific. GCSL was managed on Majuro, RMI’s main island, by the director at the time Dr Irene Taafaki, coordinator Yolanda McKay, and administrators at the University of the South Pacific’s (USP) RMI campus. Through the provision of GCSL, as school leaders we were encouraged to re-think and draw-from our own cultural repository and connect to our ancestral knowledge that have always provided strength for us. This kind of thinking and practice was encouraged by our educational leaders (Heine, 2002). We argue that a culturally-affirming and culturally-contextual framework that reflects the lived experiences of Marshallese people is much needed and enables the disruption of inherent colonial processes left behind by Western and Eastern administrations which have influenced our education system in the RMI (Heine, 2002). Kanne Lobal, an approach utilising a traditional navigation has warranted its need to provide solutions for today’s educational challenges for us in the RMI. Education in the Pacific Education in the Pacific cannot be understood without contextualising it in its history and culture. It is the same for us in the RMI (Heine, 2002; Walsh et al., 2012). The RMI is located in the Pacific Ocean and is part of Micronesia. It was named after a British captain, John Marshall in the 1700s. The atolls in the RMI were explored by the Spanish in the 16th century. Germany unsuccessfully attempted to colonize the islands in 1885. Japan took control in 1914, but after several battles during World War II, the US seized the RMI from them. In 1947, the United Nations made the island group, along with the Mariana and Caroline archipelagos, a U.S. trust territory (Walsh et al, 2012). Education in the RMI reflects the colonial administrations of Germany, Japan, and now the US. Before the turn of the century, formal education in the Pacific reflected western values, practices, and standards. Prior to that, education was informal and not binded to formal learning institutions (Thaman, 1997) and oral traditions was used as the medium for transmitting learning about customs and practices living with parents, grandparents, great grandparents. As alluded to by Jiba B. Kabua (2004), any “discussion about education is necessarily a discussion of culture, and any policy on education is also a policy of culture” (p. 181). It is impossible to promote one without the other, and it is not logical to understand one without the other. Re-thinking how education should look like, the pedagogical strategies that are relevant in our classrooms, the ways to engage with our parents and communities - such re-thinking sits within our cultural approaches and frameworks. Our collective attempts to provide a cultural framework that is relevant and appropriate for education in our context, sits within the political endeavour to decolonize. This means that what we are providing will not only be useful, but it can be used as a tool to question and identify whether things in place restrict and prevent our culture or whether they promote and foreground cultural ideas and concepts, a significant discussion of culture linked to education (Kabua, 2004). Donor funded development aid programmes were provided to support the challenges within education systems. Concerned with the persistent low educational outcomes of Pacific students, despite the prevalence of aid programmes in the region, in 2000 Pacific educators and leaders with support from New Zealand Aid (NZ Aid) decided to intervene (Heine, 2002; Taufe’ulungaki, 2014). In April 2001, a group of Pacific educators and leaders across the region were invited to a colloquium funded by the New Zealand Overseas Development Agency held in Suva Fiji at the University of the South Pacific. The main purpose of the colloquium was to enable “Pacific educators to re-think the values, assumptions and beliefs underlying [formal] schooling in Oceania” (Benson, 2002). Leadership, in general, is a valued practice in the RMI (Heine, 2002). Despite education leadership being identified as a significant factor in school improvement (Sanga & Chu, 2009), the limited formal training opportunities of school principals in the region was a persistent concern. As part of an Asia Development Bank (ADB) funded project, the Improve Quality Basic Education (IQBE) intervention was developed and implemented in the RMI in 2017. Mentoring is a process associated with the continuity and sustainability of leadership knowledge and practices (Sanga & Chu, 2009). It is a key aspect of building capacity and capabilities within human resources in education (ibid). Indigenous knowledges and education research According to Hilda Heine, the relationship between education and leadership is about understanding Marshallese history and culture (cited in Walsh et al., 2012). It is about sharing indigenous knowledge and histories that “details for future generations a story of survival and resilience and the pride we possess as a people” (Heine, cited in Walsh et al., 2012, p. v). This paper is fuelled by postcolonial aspirations yet is grounded in Pacific indigenous research. This means that our intentions are driven by postcolonial pursuits and discourses linked to challenging the colonial systems and schooling in the Pacific region that privileges western knowledge and learning and marginalises the education practices and processes of local people (Thiong’o, 1986). A point of difference and orientation from postcolonialism is a desire to foreground indigenous Pacific language, specifically Majin Majol, through Marshallese concepts. Our collective bwebwenato and conversation honours and values kautiej (respect), jouj eo mour eo (reciprocity), and jouj (kindness) (Taafaki & Fowler, 2019). Pacific leaders developed the Rethinking Pacific Education Initiative for and by Pacific People (RPEIPP) in 2002 to take control of the ways in which education research was conducted by donor funded organisations (Taufe’ulungaki, 2014). Our former president, Dr Hilda Heine was part of the group of leaders who sought to counter the ways in which our educational and leadership stories were controlled and told by non-Marshallese (Heine, 2002). As a former minister of education in the RMI, Hilda Heine continues to inspire and encourage the next generation of educators, school leaders, and researchers to re-think and de-construct the way learning and education is conceptualised for Marshallese people. The conceptualisation of Kanne Lobal acknowledges its origin, grounded in Marshallese navigation knowledge and practice. Our decision to unpack and deconstruct Kanne Lobal within the context of formal education and leadership responds to the need to not only draw from indigenous Marshallese ideas and practice but to consider that the next generation will continue to be educated using western processes and initiatives particularly from the US where we get a lot of our funding from. According to indigenous researchers Dawn Bessarab and Bridget Ng’andu (2010), doing research that considers “culturally appropriate processes to engage with indigenous groups and individuals is particularly pertinent in today’s research environment” (p. 37). Pacific indigenous educators and researchers have turned to their own ancestral knowledge and practices for inspiration and empowerment. Within western research contexts, the often stringent ideals and processes are not always encouraging of indigenous methods and practices. However, many were able to ground and articulate their use of indigenous methods as being relevant and appropriate to capturing the realities of their communities (Nabobo-Baba, 2008; Sualii-Sauni & Fulu-Aiolupotea, 2014; Thaman, 1997). At the same time, utilising Pacific indigenous methods and approaches enabled research engagement with their communities that honoured and respected them and their communities. For example, Tongan, Samoan, and Fijian researchers used the talanoa method as a way to capture the stories, lived realities, and worldviews of their communities within education in the diaspora (Fa’avae, Jones, & Manu’atu, 2016; Nabobo-Baba, 2008; Sualii-Sauni & Aiolupotea, 2014; Vaioleti, 2005). Tok stori was used by Solomon Islander educators and school leaders to highlight the unique circles of conversational practice and storytelling that leads to more positive engagement with their community members, capturing rich and meaningful narratives as a result (Sanga & Houma, 2004). The Indigenous Aborigine in Australia utilise yarning as a “relaxed discussion through which both the researcher and participant journey together visiting places and topics of interest relevant” (Bessarab & Ng’andu, 2010, p. 38). Despite the diverse forms of discussions and storytelling by indigenous peoples, of significance are the cultural protocols, ethics, and language for conducting and guiding the engagement (Bessarab & Ng’andu, 2010; Nabobo-Baba, 2008; Sualii-Sauni & Aiolupotea, 2014). Through the ethics, values, protocols, and language, these are what makes indigenous methods or frameworks unique compared to western methods like in-depth interviews or semi-structured interviews. This is why it is important for us as Marshallese educators to frame, ground, and articulate how our own methods and frameworks of learning could be realised in western education (Heine, 2002; Jetnil-Kijiner, 2014). In this paper, we utilise bwebwenato as an appropriate method linked to “talk story”, capturing our collective stories and experiences during GCSL and how we sought to build partnerships and collaboration with each other, our communities, and the PSS. Bwebwenato and drawing from Kajin Majel Legends and stories that reflect Marshallese society and its cultural values have survived through our oral traditions. The practice of weaving also holds knowledge about our “valuable and earliest sources of knowledge” (Taafaki & Fowler, 2019, p. 2). The skilful navigation of Marshallese wayfarers on the walap (large canoes) in the ocean is testament of their leadership and the value they place on ensuring the survival and continuity of Marshallese people (Taafaki & Fowler, 2019; Walsh et al., 2012). During her graduate study in 2014, Kathy Jetnil-Kijiner conceptualised bwebwenato as being the most “well-known form of Marshallese orality” (p. 38). The Marshallese-English dictionary defined bwebwenato as talk, conversation, story, history, article, episode, lore, myth, or tale (cited in Jetnil Kijiner, 2014). Three years later in 2017, bwebwenato was utilised in a doctoral project by Natalie Nimmer as a research method to gather “talk stories” about the experiences of 10 Marshallese experts in knowledge and skills ranging from sewing to linguistics, canoe-making and business. Our collective bwebwenato in this paper centres on Marshallese ideas and language. The philosophy of Marshallese knowledge is rooted in our “Kajin Majel”, or Marshallese language and is shared and transmitted through our oral traditions. For instance, through our historical stories and myths. Marshallese philosophy, that is, the knowledge systems inherent in our beliefs, values, customs, and practices are shared. They are inherently relational, meaning that knowledge systems and philosophies within our world are connected, in mind, body, and spirit (Jetnil-Kijiner, 2014; Nimmer, 2017). Although some Marshallese believe that our knowledge is disappearing as more and more elders pass away, it is therefore important work together, and learn from each other about the knowledges shared not only by the living but through their lamentations and stories of those who are no longer with us (Jetnil-Kijiner, 2014). As a Marshallese practice, weaving has been passed-down from generation to generation. Although the art of weaving is no longer as common as it used to be, the artefacts such as the “jaki-ed” (clothing mats) continue to embody significant Marshallese values and traditions. For our weavers, the jouj (check spelling) is the centre of the mat and it is where the weaving starts. When the jouj is correct and weaved well, the remainder and every other part of the mat will be right. The jouj is symbolic of the “heart” and if the heart is prepared well, trained well, then life or all other parts of the body will be well (Taafaki & Fowler, 2019). In that light, we have applied the same to this paper. Conceptualising and drawing from cultural practices that are close and dear to our hearts embodies a significant ontological attempt to prioritize our own knowledge and language, a sense of endearment to who we are and what we believe education to be like for us and the next generation. The application of the phrase “Majolizing '' was used by the Ministry of Education when Hilda Heine was minister, to weave cultural ideas and language into the way that teachers understand the curriculum, develop lesson plans and execute them in the classroom. Despite this, there were still concerns with the embedded colonized practices where teachers defaulted to eurocentric methods of doing things, like the strategies provided in the textbooks given to us. In some ways, our education was slow to adjust to the “Majolizing '' intention by our former minister. In this paper, we provide Kanne Lobal as a way to contribute to the “Majolizing intention” and perhaps speed up yet still be collectively responsible to all involved in education. Kajin Wa and Kanne Lobal “Wa” is the Marshallese concept for canoe. Kajin wa, as in canoe language, has a lot of symbolic meaning linked to deeply-held Marshallese values and practices. The canoe was the foundational practice that supported the livelihood of harsh atoll island living which reflects the Marshallese social world. The experts of Kajin wa often refer to “wa” as being the vessel of life, a means and source of sustaining life (Kelen, 2009, cited in Miller, 2010). “Jouj” means kindness and is the lower part of the main hull of the canoe. It is often referred to by some canoe builders in the RMI as the heart of the canoe and is linked to love. The jouj is one of the first parts of the canoe that is built and is “used to do all other measurements, and then the rest of the canoe is built on top of it” (Miller, 2010, p. 67). The significance of the jouj is that when the canoe is in the water, the jouj is the part of the hull that is underwater and ensures that all the cargo and passengers are safe. For Marshallese, jouj or kindness is what living is about and is associated with selflessly carrying the responsibility of keeping the family and community safe. The parts of the canoe reflect Marshallese culture, legend, family, lineage, and kinship. They embody social responsibilities that guide, direct, and sustain Marshallese families’ wellbeing, from atoll to atoll. For example, the rojak (boom), rojak maan (upper boom), rojak kōrā (lower boom), and they support the edges of the ujelā/ujele (sail) (see figure 1). The literal meaning of rojak maan is male boom and rojak kōrā means female boom which together strengthens the sail and ensures the canoe propels forward in a strong yet safe way. Figuratively, the rojak maan and rojak kōrā symbolise the mother and father relationship which when strong, through the jouj (kindness and love), it can strengthen families and sustain them into the future. Figure 1. Parts of the canoe Source: https://www.canoesmarshallislands.com/2014/09/names-of-canoe-parts/ From a socio-cultural, communal, and leadership view, the canoe (wa) provides understanding of the relationships required to inspire and sustain Marshallese peoples’ education and learning. We draw from Kajin wa because they provide cultural ideas and practices that enable understanding of education and leadership necessary for sustaining Marshallese people and realities in Oceania. When building a canoe, the women are tasked with the weaving of the ujelā/ujele (sail) and to ensure that it is strong enough to withstand long journeys and the fierce winds and waters of the ocean. The Kanne Lobal relates to the front part of the ujelā/ujele (sail) where the rojak maan and rojak kōrā meet and connect (see the red lines in figure 1). Kanne Lobal is linked to the strategic use of the ujelā/ujele by navigators, when there is no wind north wind to propel them forward, to find ways to capture the winds so that their journey can continue. As a proverbial saying, Kanne Lobal is used to ignite thinking and inspire and transform practice particularly when the journey is rough and tough. In this paper we draw from Kanne Lobal to ignite, inspire, and transform our educational and leadership practices, a move to explore what has always been meaningful to Marshallese people when we are faced with challenges. The Kanne Lobal utilises our language, and cultural practices and values by sourcing from the concepts of jouj (kindness, love), kautiej (respect), and jouj eo mour eo (reciprocity). A key Marshallese proverb, “Enra bwe jen lale rara”, is the cultural practice where families enact compassion through the sharing of food in all occurrences. The term “enra” is a small basket weaved from the coconut leaves, and often used by Marshallese as a plate to share and distribute food amongst each other. Bwe-jen-lale-rara is about noticing and providing for the needs of others, and “enra” the basket will help support and provide for all that are in need. “Enra-bwe-jen-lale-rara” is symbolic of cultural exchange and reciprocity and the cultural values associated with building and maintaining relationships, and constantly honouring each other. As a Marshallese practice, in this article we share our understanding and knowledge about the challenges as well as possible solutions for education concerns in our nation. In addition, we highlight another proverb, “wa kuk wa jimor”, which relates to having one canoe, and despite its capacity to feed and provide for the individual, but within the canoe all people can benefit from what it can provide. In the same way, we provide in this paper a cultural framework that will enable all educators to benefit from. It is a framework that is far-reaching and relevant to the lived realities of Marshallese people today. Kumit relates to people united to build strength, all co-operating and working together, living in peace, harmony, and good health. Kanne Lobal: conceptual framework for education and leadership An education framework is a conceptual structure that can be used to capture ideas and thinking related to aspects of learning. Kanne Lobal is conceptualised and framed in this paper as an educational framework. Kanne Lobal highlights the significance of education as a collective partnership whereby leadership is an important aspect. Kanne Lobal draws-from indigenous Marshallese concepts like kautiej (respect), jouj eo mour eo (reciprocity), and jouj (kindness, heart). The role of a leader, including an education leader, is to prioritise collective learning and partnerships that benefits Marshallese people and the continuity and survival of the next generation (Heine, 2002; Thaman, 1995). As described by Ejnar Aerōk, an expert canoe builder in the RMI, he stated: “jerbal ippān doon bwe en maron maan wa e” (cited in Miller, 2010, p. 69). His description emphasises the significance of partnerships and working together when navigating and journeying together in order to move the canoe forward. The kubaak, the outrigger of the wa (canoe) is about “partnerships”. For us as elementary school leaders on Majuro, kubaak encourages us to value collaborative partnerships with each other as well as our communities, PSS, and other stakeholders. Partnerships is an important part of the Kanne Lobal education and leadership framework. It requires ongoing bwebwenato – the inspiring as well as confronting and challenging conversations that should be mediated and negotiated if we and our education stakeholders are to journey together to ensure that the educational services we provide benefits our next generation of young people in the RMI. Navigating ahead the partnerships, mediation, and negotiation are the core values of jouj (kindness, love), kautiej (respect), and jouj eo mour eo (reciprocity). As an organic conceptual framework grounded in indigenous values, inspired through our lived experiences, Kanne Lobal provides ideas and concepts for re-thinking education and leadership practices that are conducive to learning and teaching in the schooling context in the RMI. By no means does it provide the solution to the education ills in our nation. However, we argue that Kanne Lobal is a more relevant approach which is much needed for the negatively stigmatised system as a consequence of the various colonial administrations that have and continue to shape and reframe our ideas about what education should be like for us in the RMI. Moreover, Kannel Lobal is our attempt to decolonize the framing of education and leadership, moving our bwebwenato to re-framing conversations of teaching and learning so that our cultural knowledge and values are foregrounded, appreciated, and realised within our education system. Bwebwenato: sharing our stories In this section, we use bwebwenato as a method of gathering and capturing our stories as data. Below we capture our stories and ongoing conversations about the richness in Marshallese cultural knowledge in the outer islands and on Majuro and the potentialities in Kanne Lobal. Danny Jim When I was in third grade (9-10 years of age), during my grandfather’s speech in Arno, an atoll near Majuro, during a time when a wa (canoe) was being blessed and ready to put the canoe into the ocean. My grandfather told me the canoe was a blessing for the family. “Without a canoe, a family cannot provide for them”, he said. The canoe allows for travelling between places to gather food and other sources to provide for the family. My grandfather’s stories about people’s roles within the canoe reminded me that everyone within the family has a responsibility to each other. Our women, mothers and daughters too have a significant responsibility in the journey, in fact, they hold us, care for us, and given strength to their husbands, brothers, and sons. The wise man or elder sits in the middle of the canoe, directing the young man who help to steer. The young man, he does all the work, directed by the older man. They take advice and seek the wisdom of the elder. In front of the canoe, a young boy is placed there and because of his strong and youthful vision, he is able to help the elder as well as the young man on the canoe. The story can be linked to the roles that school leaders, teachers, and students have in schooling. Without each person knowing intricately their role and responsibility, the sight and vision ahead for the collective aspirations of the school and the community is difficult to comprehend. For me, the canoe is symbolic of our educational journey within our education system. As the school leader, a central, trusted, and respected figure in the school, they provide support for teachers who are at the helm, pedagogically striving to provide for their students. For without strong direction from the school leaders and teachers at the helm, the students, like the young boy, cannot foresee their futures, or envisage how education can benefit them. This is why Kanne Lobal is a significant framework for us in the Marshall Islands because within the practice we are able to take heed and empower each other so that all benefit from the process. Kanne Lobal is linked to our culture, an essential part of who we are. We must rely on our own local approaches, rather than relying on others that are not relevant to what we know and how we live in today’s society. One of the things I can tell is that in Majuro, compared to the outer islands, it’s different. In the outer islands, parents bring children together and tell them legends and stories. The elders tell them about the legends and stories – the bwebwenato. Children from outer islands know a lot more about Marshallese legends compared to children from the Majuro atoll. They usually stay close to their parents, observe how to prepare food and all types of Marshallese skills. Loretta Joseph Case There is little Western influence in the outer islands. They grow up learning their own culture with their parents, not having tv. They are closely knit, making their own food, learning to weave. They use fire for cooking food. They are more connected because there are few of them, doing their own culture. For example, if they’re building a house, the ladies will come together and make food to take to the males that are building the house, encouraging them to keep on working - “jemjem maal” (sharpening tools i.e. axe, like encouraging workers to empower them). It’s when they bring food and entertainment. Rubon Rubon Togetherness, work together, sharing of food, these are important practices as a school leader. Jemjem maal – the whole village works together, men working and the women encourage them with food and entertainment. All the young children are involved in all of the cultural practices, cultural transmission is consistently part of their everyday life. These are stronger in the outer islands. Kanne Lobal has the potential to provide solutions using our own knowledge and practices. Connie Joel When new teachers become a teacher, they learn more about their culture in teaching. Teaching raises the question, who are we? A popular saying amongst our people, “Aelon kein ad ej aelon in manit”, means that “Our islands are cultural islands”. Therefore, when we are teaching, and managing the school, we must do this culturally. When we live and breathe, we must do this culturally. There is more socialising with family and extended family. Respect the elderly. When they’re doing things the ladies all get together, in groups and do it. Cut the breadfruit, and preserve the breadfruit and pandanus. They come together and do it. Same as fishing, building houses, building canoes. They use and speak the language often spoken by the older people. There are words that people in the outer islands use and understand language regularly applied by the elderly. Respect elderly and leaders more i.e., chiefs (iroj), commoners (alap), and the workers on the land (ri-jerbal) (social layer under the commoners). All the kids, they gather with their families, and go and visit the chiefs and alap, and take gifts from their land, first produce/food from the plantation (eojōk). Tommy Almet The people are more connected to the culture in the outer islands because they help one another. They don’t have to always buy things by themselves, everyone contributes to the occasion. For instance, for birthdays, boys go fishing, others contribute and all share with everyone. Kanne Lobal is a practice that can bring people together – leaders, teachers, stakeholders. We want our colleagues to keep strong and work together to fix problems like students and teachers’ absenteeism which is a big problem for us in schools. Demetria Malachi The culture in the outer islands are more accessible and exposed to children. In Majuro, there is a mixedness of cultures and knowledges, influenced by Western thinking and practices. Kanne Lobal is an idea that can enhance quality educational purposes for the RMI. We, the school leaders who did GCSL, we want to merge and use this idea because it will help benefit students’ learning and teachers’ teaching. Kanne Lobal will help students to learn and teachers to teach though traditional skills and knowledge. We want to revitalize our ways of life through teaching because it is slowly fading away. Also, we want to have our own Marshallese learning process because it is in our own language making it easier to use and understand. Essentially, we want to proudly use our own ways of teaching from our ancestors showing the appreciation and blessings given to us. Way Forward To think of ways forward is about reflecting on the past and current learnings. Instead of a traditional discussion within a research publication, we have opted to continue our bwebwenato by sharing what we have learnt through the Graduate Certificate in School Leadership (GCSL) programme. Our bwebwenato does not end in this article and this opportunity to collaborate and partner together in this piece of writing has been a meaningful experience to conceptualise and unpack the Kanne Lobal framework. Our collaborative bwebwenato has enabled us to dig deep into our own wise knowledges for guidance through mediating and negotiating the challenges in education and leadership (Sanga & Houma, 2004). For example, bwe-jen-lale-rara reminds us to inquire, pay attention, and focus on supporting the needs of others. Through enra-bwe-jen-lale-rara, it reminds us to value cultural exchange and reciprocity which will strengthen the development and maintaining of relationships based on ways we continue to honour each other (Nimmer, 2017). We not only continue to support each other, but also help mentor the next generation of school leaders within our education system (Heine, 2002). Education and leadership are all about collaborative partnerships (Sanga & Chu, 2009; Thaman, 1997). Developing partnerships through the GCSL was useful learning for us. It encouraged us to work together, share knowledge, respect each other, and be kind. The values of jouj (kindness, love), kautiej (respect), and jouj eo mour eo (reciprocity) are meaningful in being and becoming and educational leader in the RMI (Jetnil-Kijiner, 2014; Miller, 2010; Nimmer, 2017). These values are meaningful for us practice particularly given the drive by PSS for schools to become accredited. The workshops and meetings delivered during the GCSL in the RMI from 2018 to 2019 about Kanne Lobal has given us strength to share our stories and experiences from the meeting with the stakeholders. But before we met with the stakeholders, we were encouraged to share and speak in our language within our courses: EDP05 (Professional Development and Learning), EDP06 (School Leadership), EDP07 (School Management), EDP08 (Teaching and Learning), and EDP09 (Community Partnerships). In groups, we shared our presentations with our peers, the 15 school leaders in the GCSL programme. We also invited USP RMI staff. They liked the way we presented Kannel Lobal. They provided us with feedback, for example: how the use of the sail on the canoe, the parts and their functions can be conceptualised in education and how they are related to the way that we teach our own young people. Engaging stakeholders in the conceptualisation and design stages of Kanne Lobal strengthened our understanding of leadership and collaborative partnerships. Based on various meetings with the RMI Pacific Resources for Education and Learning (PREL) team, PSS general assembly, teachers from the outer islands, and the PSS executive committee, we were able to share and receive feedback on the Kanne Lobal framework. The coordinators of the PREL programme in the RMI were excited by the possibilities around using Kanne Lobal, as a way to teach culture in an inspirational way to Marshallese students. Our Marshallese knowledge, particularly through the proverbial meaning of Kanne Lobal provided so much inspiration and insight for the groups during the presentation which gave us hope and confidence to develop the framework. Kanne Lobal is an organic and indigenous approach, grounded in Marshallese ways of doing things (Heine, 2002; Taafaki & Fowler, 2019). Given the persistent presence of colonial processes within the education system and the constant reference to practices and initiatives from the US, Kanne Lobal for us provides a refreshing yet fulfilling experience and makes us feel warm inside because it is something that belongs to all Marshallese people. Conclusion Marshallese indigenous knowledge and practices provide meaningful educational and leadership understanding and learnings. They ignite, inspire, and transform thinking and practice. The Kanne Lobal conceptual framework emphasises key concepts and values necessary for collaborative partnerships within education and leadership practices in the RMI. The bwebwenato or talk stories have been insightful and have highlighted the strengths and benefits that our Marshallese ideas and practices possess when looking for appropriate and relevant ways to understand education and leadership. Acknowledgements We want to acknowledge our GCSL cohort of school leaders who have supported us in the development of Kanne Lobal as a conceptual framework. A huge kommol tata to our friends: Joana, Rosana, Loretta, Jellan, Alvin, Ellice, Rolando, Stephen, and Alan. References Benson, C. (2002). Preface. In F. Pene, A. M. Taufe’ulungaki, & C. Benson (Eds.), Tree of Opportunity: re-thinking Pacific Education (p. iv). Suva, Fiji: University of the South Pacific, Institute of Education. Bessarab, D., Ng’andu, B. (2010). Yarning about yarning as a legitimate method in indigenous research. International Journal of Critical Indigenous Studies, 3(1), 37-50. Fa’avae, D., Jones, A., & Manu’atu, L. (2016). Talanoa’i ‘a e talanoa - talking about talanoa: Some dilemmas of a novice researcher. AlterNative: An Indigenous Journal of Indigenous Peoples,12(2),138-150. Heine, H. C. (2002). A Marshall Islands perspective. In F. Pene, A. M. Taufe’ulungaki, & C. Benson (Eds.), Tree of Opportunity: re-thinking Pacific Education (pp. 84 – 90). Suva, Fiji: University of the South Pacific, Institute of Education. Infoplease Staff (2017, February 28). Marshall Islands, retrieved from https://www.infoplease.com/world/countries/marshall-islands Jetnil-Kijiner, K. (2014). Iep Jaltok: A history of Marshallese literature. (Unpublished masters’ thesis). Honolulu, HW: University of Hawaii. Kabua, J. B. (2004). We are the land, the land is us: The moral responsibility of our education and sustainability. In A.L. Loeak, V.C. Kiluwe and L. Crowl (Eds.), Life in the Republic of the Marshall Islands, pp. 180 – 191. Suva, Fiji: University of the South Pacific. Kupferman, D. (2004). Jelalokjen in flux: Pitfalls and prospects of contextualising teacher training programmes in the Marshall Islands. Directions: Journal of Educational Studies, 26(1), 42 – 54. http://directions.usp.ac.fj/collect/direct/index/assoc/D1175062.dir/doc.pdf Miller, R. L. (2010). Wa kuk wa jimor: Outrigger canoes, social change, and modern life in the Marshall Islands (Unpublished masters’ thesis). Honolulu, HW: University of Hawaii. Nabobo-Baba, U. (2008). Decolonising framings in Pacific research: Indigenous Fijian vanua research framework as an organic response. AlterNative: An Indigenous Journal of Indigenous Peoples, 4(2), 141-154. Nimmer, N. E. (2017). Documenting a Marshallese indigenous learning framework (Unpublished doctoral thesis). Honolulu, HW: University of Hawaii. Sanga, K., & Houma, S. (2004). Solomon Islands principalship: Roles perceived, performed, preferred, and expected. Directions: Journal of Educational Studies, 26(1), 55-69. Sanga, K., & Chu, C. (2009). Introduction. In K. Sanga & C. Chu (Eds.), Living and Leaving a Legacy of Hope: Stories by New Generation Pacific Leaders (pp. 10-12). NZ: He Parekereke & Victoria University of Wellington. Suaalii-Sauni, T., & Fulu-Aiolupotea, S. M. (2014). Decolonising Pacific research, building Pacific research communities, and developing Pacific research tools: The case of the talanoa and the faafaletui in Samoa. Asia Pacific Viewpoint, 55(3), 331-344. Taafaki, I., & Fowler, M. K. (2019). Clothing mats of the Marshall Islands: The history, the culture, and the weavers. US: Kindle Direct. Taufe’ulungaki, A. M. (2014). Look back to look forward: A reflective Pacific journey. In M. ‘Otunuku, U. Nabobo-Baba, S. Johansson Fua (Eds.), Of Waves, Winds, and Wonderful Things: A Decade of Rethinking Pacific Education (pp. 1-15). Fiji: USP Press. Thaman, K. H. (1995). Concepts of learning, knowledge and wisdom in Tonga, and their relevance to modern education. Prospects, 25(4), 723-733. Thaman, K. H. (1997). Reclaiming a place: Towards a Pacific concept of education for cultural development. The Journal of the Polynesian Society, 106(2), 119-130. Thiong’o, N. W. (1986). Decolonising the mind: The politics of language in African literature. Kenya: East African Educational Publishers. Vaioleti, T. (2006). Talanoa research methodology: A developing position on Pacific research. Waikato Journal of Education, 12, 21-34. Walsh, J. M., Heine, H. C., Bigler, C. M., & Stege, M. (2012). Etto nan raan kein: A Marshall Islands history (First Edition). China: Bess Press.
APA, Harvard, Vancouver, ISO, and other styles
32

"Pairing Free Certificate Based Signcryption Schemes Using ECQV Implicit Certificates." KSII Transactions on Internet and Information Systems 13, no. 3 (March 31, 2019). http://dx.doi.org/10.3837/tiis.2019.03.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Hyla, Tomasz, and Jerzy Pejaś. "A Hess-Like Signature Scheme Based on Implicit and Explicit Certificates." Computer Journal, August 22, 2016. http://dx.doi.org/10.1093/comjnl/bxw052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Feuilloley, Laurent, Pierre Fraigniaud, Juho Hirvonen, Ami Paz, and Mor Perry. "Redundancy in distributed proofs." Distributed Computing, October 7, 2020. http://dx.doi.org/10.1007/s00446-020-00386-z.

Full text
Abstract:
Abstract Distributed proofs are mechanisms that enable the nodes of a network to collectively and efficiently check the correctness of Boolean predicates on the structure of the network (e.g., having a specific diameter), or on objects distributed over the nodes (e.g., a spanning tree). We consider well known mechanisms consisting of two components: a prover that assigns a certificate to each node, and a distributed algorithm called a verifier that is in charge of verifying the distributed proof formed by the collection of all certificates. We show that many network predicates have distributed proofs offering a high level of redundancy, explicitly or implicitly. We use this remarkable property of distributed proofs to establish perfect tradeoffs between the size of the certificate stored at every node, and the number of rounds of the verification protocol.
APA, Harvard, Vancouver, ISO, and other styles
35

Häusler, Maja, and Zrinjka Glovacki-Bernardi. "Grammatikvermittlung in neueren kroatischen DaF-Lehrwerken." Linguistik Online 41, no. 1 (January 1, 2010). http://dx.doi.org/10.13092/lo.41.427.

Full text
Abstract:
The first part of the article deals with the presentation of grammar from the linguistic point of view. It gives the results of the analysis of the presentation of grammar in textbooks for German as a foreign language written by Croatian authors (in textbooks for elementary school, grammar school; for German as the first and the second foreign language). The analysis is carried out under the following criteria: explicit or implicit presentation of grammar, theoretical grammatical foundations, usage of metalinguistic terms, the language used for explanations. The second part of the article presents the analysis of grammar teaching in selected textbooks under didactical and methodical aspects (usage in texts, types of exercises and assignments). The results of the analysis are evaluated in terms of the supposed appropriateness and contemporary views regarding the grammar teaching in teaching foreign languages. What we are also interested in is the question whether and to what extent the requirements of the common international competencies description for the exam certificate have modified or changed the significance of grammar teaching in Croatian textbooks for German as a foreign language.
APA, Harvard, Vancouver, ISO, and other styles
36

Easterbrook-Smith, Gwyn. "“Change can never be ‘complete’”: the legal right to self-identification and incongruous bodies." International Journal of Gender, Sexuality and Law 1, no. 1 (July 30, 2020). http://dx.doi.org/10.19164/ijgsl.v1i1.976.

Full text
Abstract:
<p class="ArticleTitle">At the time of writing, New Zealand's government is considering select committee recommendations to simplify the process for changing the sex recorded on a birth certificate (Governance and Administration Committee 2018). This article argues that the inconsistent requirements for binary and non-binary transgender people to amend their documentation indicates a scepticism of the legitimacy of non-binary identities. The current process for transgender people seeking to change their sex marker is onerous and often expensive (Noonan and Liddicoat 2008). Attaining an "indeterminate" marker on a birth certificate is so difficult as to be functionally impossible. Crown Law have suggested that “social factors” (how a person’s gender is perceived by others) would be considered by the courts when deciding on the veracity of their stated gender identity, indicating that being identifiable as a binary-gendered person is a contributor to achieving legal recognition of one’s gender. The proposal presumes that recording an "official" gender is natural and necessary. Legal recognition of non-binary people signals an expanded understanding of recognisable gender identities, but requires situating oneself within a bureaucratic framework. In light of the new process being proposed, I argue that if passed this Bill implicitly raises the question of why identity documents must have a sex marker on them at all.</p>
APA, Harvard, Vancouver, ISO, and other styles
37

Chen, Szu-Chieh, Thomas Chang-Yao Tsao, Ko-Huang Lue, and Yafang Tsai. "Google analytics of a pilot study to characterize the visitor website statistics and implicate for enrollment strategies in Medical University." BMC Medical Education 20, no. 1 (December 2020). http://dx.doi.org/10.1186/s12909-020-02373-1.

Full text
Abstract:
Abstract Background Taiwan’s colleges and universities are struggling to maintain their student enrollment rates owing to the declining fertility rate. Focusing on students in higher education programs, this study aims to analyze online behavioral patterns for university departmental websites and accordingly, suggests response strategies to increase the rate of enrollment. Methods We use Google Analytics to examine the websites of two departments in a medical university between February 1 and July 30, 2018. We study website patterns during the study periods for three college admission routes: STARS program, personal applications, and admission through examination and placement. Results Most website visitors during the three visiting date ranges for the two departments are 18–24 years. The visitor groups are mainly freshmen at the university and their parents. The homepage and Subject Credits, Course Planning, Teacher Lineup, and Certificate of Subjects were the most visited webpages. The overall number of daily page views varied by academic event. Conclusions University departments should enhance the presentation of featured courses on their webpage or distinguish course characteristics from those of competing departments in the curriculum to ensure clear market segmentation. In addition, departments should consider examining online data to identify suitable high schools that can be visited to attract potential students and to improve students’ willingness to choose their university.
APA, Harvard, Vancouver, ISO, and other styles
38

Zhao, Di, Traci M. Bartz, Nona Sotoodehnia, Wendy S. Post, Susan R. Heckbert, Alvaro Alonso, Ryan J. Longchamps, et al. "Mitochondrial DNA copy number and incident atrial fibrillation." BMC Medicine 18, no. 1 (September 16, 2020). http://dx.doi.org/10.1186/s12916-020-01715-6.

Full text
Abstract:
Abstract Background Mechanistic studies suggest that mitochondria DNA (mtDNA) dysfunction may be associated with increased risk of atrial fibrillation (AF). The association between mtDNA copy number (mtDNA-CN) and incident AF in the general population, however, remains unknown. Methods We conducted prospective analyses of 19,709 participants from the Atherosclerosis Risk in Communities Study (ARIC), the Multi-Ethnic Study of Atherosclerosis (MESA), and the Cardiovascular Health Study (CHS). mtDNA-CN from the peripheral blood was calculated from probe intensities on the Affymetrix Genome-Wide Human single nucleotide polymorphisms (SNP) Array 6.0 in ARIC and MESA and from multiplexed real-time quantitative polymerase chain reaction (qPCR) in CHS. Incident AF cases were identified through electrocardiograms, review of hospital discharge codes, Medicare claims, and death certificates. Results The median follow-up time was 21.4 years in ARIC, 12.9 years in MESA, and 11.0 years in CHS, during which 4021 participants developed incident atrial fibrillation (1761 in ARIC, 790 in MESA, and 1470 in CHS). In fully adjusted models, participants with the lowest quintile of mitochondria DNA copy number had an overall 13% increased risk (95% CI 1 to 27%) of incident atrial fibrillation compared to those with the highest quintile. Dose-response spline analysis also showed an inverse association between mitochondria DNA copy number and hazard for atrial fibrillation for all three cohorts. These associations were consistent across subgroups. Conclusions Mitochondria DNA copy number was inversely associated with the risk of AF independent of traditional cardiovascular risk factors. These findings implicate mitochondria DNA copy number as a novel risk factor for atrial fibrillation. Further research is warranted to understand the underlying mechanisms and to evaluate the role of mitochondria DNA copy number in the management of atrial fibrillation risk.
APA, Harvard, Vancouver, ISO, and other styles
39

Weiss, Salome, Indrani Sen, Ying Huang, Jill M. Killian, W. Scott Harmsen, Jay Mandrekar, Alanna M. Chamberlain, Philip P. Goodney, Veronique L. Roger, and Randall R. DeMartino. "Abstract 204: Cardiovascular Mortality and Non-fatal Cardiovascular Events After Diagnosis of Acute Aortic Syndrome." Circulation: Cardiovascular Quality and Outcomes 11, suppl_1 (April 2018). http://dx.doi.org/10.1161/circoutcomes.11.suppl_1.204.

Full text
Abstract:
Background: Acute aortic syndrome (AAS) includes aortic dissection (AD), intramural hematoma (IMH) and penetrating aortic ulcer (PAU) and confers high rates of aortic related events. However, the risk of cardiovascular (CV) events in this patient group is unknown. The aim of this study was to define the rates of CV events in an incident cohort of AAS patients. Methods: Medical records and death certificates of all Olmsted County, MN residents with a diagnosis of AAS from 1995-2015 were reviewed and compared to age- and sex- matched population controls. Primary outcome was non-aortic CV mortality. Secondary outcome was overall mortality and first time non-fatal CV event (myocardial infarction (MI), heart failure (HF) or stroke). Events were analyzed using Cox proportional hazards regression adjusting for comorbidities. Results: Of 133 patients with AAS (77 AD, 21 IMH, 35 PAU) 57% were male, median age was 72 (SD 14) and median follow-up was 10 years. Overall survival in AAS cases and controls was 62% versus 83% at 5 years and 44% versus 60% at 10 years (adj HR 1.8, p<.001, 95% CI 1.3-2.4). CV death occurred in 21 (29%) of 73 AAS decedents due to HF (9), MI (5), other cardiac causes (5), stroke (1) and peripheral vascular disease (1). CV-related survival at 5 and 10 years after AAS diagnosis (91% and 81%) was not significantly different from controls (95% and 86%) after adjustment for comorbidities (adj HR 1.8, p=.1, 95% CI 0.9-3.6). AAS was associated with an increased risk of any first time CV event (adj HR 2.6, p<.001, 95% CI 1.6-4.4; Figure), first time diagnosis of MI (adj HR 2.8, p<.001, 95% CI 1.7-4.7) and HF (adj HR 3.2, p<.001, 95% CI 1.6-6.2) but not stroke. When excluding acute events within 14 days of diagnosis, AAS was still associated with a significantly higher mortality (adj HR 1.6, p=.011, 95% CI 1.1-2.4) and an increased risk of any first time CV event (adj HR 2.2, p=.018, 95% CI 1.1-4.1), first time MI (adj HR 2.2, p=.012, 95% CI 1.2-4.1) and HF (adj HR 2.9, p=.006, 95% CI 1.4-6.2) but not stroke. Conclusions: AAS is associated with a higher overall mortality and an increased risk of any first time CV event, first time MI and HF that persists beyond the acute phase. These data highlight the risk of CV events among those with AAS and implicate the need for long-term cardiovascular management in these patients.
APA, Harvard, Vancouver, ISO, and other styles
40

Stooksbury, Kara E., Lori Maxwell, and Cynthia S. Brown. ""Spin Zones" in American Presidential Elections." M/C Journal 14, no. 5 (October 19, 2011). http://dx.doi.org/10.5204/mcj.410.

Full text
Abstract:
If one morning I walked on top of the water across the Potomac River, the headline that afternoon would read: "President Can't Swim". —Lyndon B. Johnson Introduction The term “spin” implies manipulating the truth, and this concept, along with “spin doctoring,” is now common in media and public discourse. The prevalence of “spin zones” in American politics is undeniable; media outlets themselves, such as Bill O’Reilly’s “No Spin Zone” on Fox News, now run segments on the topic. Despite this apparent media certainty about what constitutes “spin” there is a lack of conceptual clarity regarding the term among those who study media and politics. This article will draw on previous literature to identify two competing yet overlapping spin zones in American politics: the media’s spin zone and the President’s spin zone. Highlighting examples from the two most recent American presidential election campaigns, the article will evaluate the interplay of these zones and the consequences for future campaigns. Spin Zones In the United States, the press and the President are engaged in a struggle over providing information. Ever since the Watergate Scandal, the media is increasingly expected to be a “watchdog” that informs citizens and keeps the Executive accountable (Coronel 13) The President, conversely, may attempt to use the power of his position to set the discursive agenda or frame the political debate in his favor. Furthermore, with the rise of multi-media access and information provision, the lines between the spin doctoring of the Executive and the media have become even more blurred. Because of the complexities of these overlapping spin zones, many scholars disagree on how to define and/or precisely measure these effects. The following section briefly describes the ‘spin zone’ tools of agenda setting, framing, and priming, and then considers the example of a candidate who failed to prime his negative evaluation and a President who primes his image and successfully counterattacks his negative evaluation. The literature recognises two separate, yet interrelated zones that are integral to understanding these media/presidential relations: what we term the presidential spin zone and the media spin zone. The interplay between these zones comes together around three key concepts—agenda setting, framing, and priming. A key difficulty for scholars is that the President, his electoral challengers, and the press are engaged in agenda setting, framing and priming, sometimes simultaneously. Agenda setting is a broad concept and refers to focusing on certain issues to the exclusion of others. Framing is defined as the decision by the news media to “emphasise certain elements to define the ‘public’s belief’ about social and political issues” (Van Gorp 488). Other scholars describe priming as “a disproportionate amount of public comments with the hope . . . of causing voters to base their selection among the candidates on [that] issue” (Druckman et al. 1181; see also Druckman “Framing Effects”; Nelson, Clawson and Oxley; Van Gorp). Candidates may also undertake “image priming,” which is proposed by James Druckman et al., as a tool that can be used to counteract negative candidate evaluations (1182–1183). The definition of the media spin zone is, in most instances, synonymous with priming. Defining the presidential spin zone is more complex. Clearly the presidential spin zone involves both the previously-discussed “issue framing abilities of the president” and how he “set[s] the agenda” (Miller and Krosnick 301; see also, Gamson and Modigliano, Baumgardner and Jones; Druckman, “Framing Effects”). Mark Rozell, for instance, found that the Ford and Carter administrations had difficulty controlling the public agenda since many issues were either beyond their control, or because the president and his advisors lacked the strategy or skill to affect media coverage. The Reagan White House however was able to use his “image” to control the media (85–86). Similarly, George W. Bush’s administration was able to implement policies concerning the invasion of Iraq after the 9-11 through “issue framing” scare tactics, which were constantly reinforced by media outlets (Kellner 643). However, the President can also be engaged in priming at any given time. In other words, the President (or candidate) may attempt to prime what the media has already spun about him/her. A problem, of course, is that the President or candidate, in attempting to prime an issue that has already been spun in a sense tacitly admits they have lost the opportunity to set the agenda in the first place. However, this is when he can seize the aforementioned opportunity to use “image priming” to counterattack the media. In the examples that follow we examine whether the President or candidate can use priming to effectively counterattack the media spin zone, with a focus on two political tools that have been historically reserved for the President or candidates, namely, holding the base and wedge issues. Holding the Base and the Media Spin Zone Holding the base has been defined as a way in which candidates or Presidents can use the media to strengthen support among voters who already identify with their political party (Iyengar and McGrady 246). A classic example of this is the 1984 Reagan/Bush re-election campaign, the “The Bear.” This featured a bear in the woods that “some” could “see” and others didn’t “see at all” which was an implicit threat regarding Soviet communism and a reminder that Reagan was tough on foreign policy (“The Bear”). However, the evidence indicates that the media has increasingly begun “holding the base” on its own to facilitate its partisan framing and priming of candidates or Presidents. The Swift Boat Veterans for Truth attack advertisements on 2004 Democratic presidential candidate John Kerry is a key example of a media attempt to “hold the base.” In these advertisements, former “Swift Boat Veterans attack[ed] his [Kerry’s] military record” (Muravchik A17). While this initiative began as a means to collect Republican donations, Shanto Iyengar and Jennifer McGrady maintain that the amount was “trivial” and that the real impact came with “the torrent of news reports across the country” (150). Indeed, Kathleen Jamieson and Joseph Capella found that by August 2004, “viewers of Fox News were more likely than other network viewers to say that candidate John Kerry did not earn his Vietnam medals” (279). Their evaluation of this data demonstrated the power of the media spin zone: “He (Limbaugh) employs intense language, disparaging information and negative framing to distance perceptions of the Democratic candidate from those of the anointed Republican candidate” (Jamieson and Capella 228). The coverage of disputes surrounding Kerry’s military record was augmented by the media’s simultaneous coverage of the threat of terrorism. This priming “in the media continued, reaching a high peak of 55 threat messages in August 2004, a month later 25% of the public was very concerned about another major terrorist attack in the US—two months before the presidential election” (Nacos, Bloch-Elkon and Shapiro 120). Both President Bush and Candidate Kerry acknowledged that their respective win/loss could be attributed in some measure to the press coverage of the “war on terror” (Nacos, Bloch-Elkon and Shapiro 124). While questions loomed about his military experience against the backdrop of the war on terror, Senator Kerry won the first two Presidential debates by significant margins. Alec Gallup and Frank Newport suggested that the Kerry camp had “won the spin contest … to characterize their own candidate as the winner” (406). So, what happened to Kerry? The media spin zone stopped him. The presidential debate wins were 30 September 2004 and 8 October 2004, respectively. Iyengar and McGrady demonstrate that before the debates even began the number of Swift Boat veteran stories primed in the national and international press went from under 100 to over 500 (151). According to Kim Fridkin et al. the media’s spin was a significant factor in the third debate. They found that media coverage concerning Senator Kerry’s response to one question on whether homosexuality was a choice affected citizens’ evaluations of the candidate. In the post debate coverage, the tone “in newspapers, on the Internet, and on television was uniformly negative in its assessment of Senator Kerry’s comments” (Fridkin et al. 30). The impact of this negative framing was sufficiently strong to override positive evaluations of Kerry held by those who watched the debate. In sum, the “perfect storm of media coverage lessened the bounce that Senator Kerry received from the actual debate and led people to develop negative impressions of Kerry a mere three weeks before Election Day” (Fridkin 43). Despite these liabilities, Kerry should have counterattacked the media spin zone. He should have “counterpunched,” as noted by Drew Westen, priming the media that he was “a different kind of Democrat”—“one who knows when it’s time to take off the gloves” (337). Westen’s advice is echoed in Druckman’s call for further research in this area as well as by his own research findings. The media’s framing and priming led to negative evaluations of Kerry, which afforded him the opportunity to prime his “image” in a counterattack, as Druckman suggests (1183). Overcoming the Wedge Issues of the Media Spin Zone President Obama, however, orchestrates a different outcome in dealing with the media spin zone attack against him which centered on a “wedge” or “us verses them” issue. Iyengar and McGrady note that “wedge issues are designed to pit groups against each other, to appeal to voters’ sense of group identity” (145). However, they define wedge issues within the context of presidential spin zones; thus, the candidate or the president would be framing the “us versus them” topic. In this instance, the media framed a wedge issue, the status of President Obama’s citizenship, against him. In this case the birther movement, oft-promoted by conservative radio host Rush Limbaugh, argued that President Obama was not a US citizen. This issue became so prominent that it was soon adopted by the media spin zone. The media framing demanded proof in addition to the short form birth certificate that the President had already released (Wilson 109). For his part, President Obama handled the media spin zone’s wedge issue with great aplomb, responding in a brief statement to the public on 27 April 2011: “We do not have time for this kind of silliness” (Shear). Moreover, he did not alienate the media for framing the birther movement, but he placed the blame implicitly on Donald Trump who had taken up the birther gauntlet thrown down by Rush Limbaugh. It was “clearly Trump” he was priming when he indicated that he did not want to be “distracted by sideshows and carnival barkers” (Shear). Moreover, his strategic focus on “silliness” is an illustration of “image priming”. He did not allow himself to be drawn into the race-baiting or religious controversy that was a component of some of the media talk show discussions. The Washington Post reported after Obama’s speech that the percentage of Americans who questioned his legitimacy to serve as President dropped from 20% to 10%—thus legitimating his choice to address the nation. This result meant that the President responded to an attack from the media spin zone with a counterattack of his own; he effectively counterattacked to prime his image. Interestingly, Stephen Ansolobehare and Iyengar have indirectly demonstrated the efficacy of counterattacks in presidential spin zone situations by evaluating situations where one candidate attacks another and the “victim” of the attack either, does not respond, responds with a positive message or responds with a counterattack (143). They found overwhelming evidence that voters prefer their party’s candidate to counterattack rather than be victimised. Conclusion In this paper we have furthered the call for conceptual clarity in the field by joining Druckman et al. in emphasising the need for more research on “image priming” on the part of candidates and Presidents in the interplay between the press and the presidency. If used properly, image priming seems a viable way for the presidency to counterattack against media framing and priming, but squandered opportunities may irreparably harm candidates. President Obama faced a difficult wedge issue that had undercurrents of both racial and religious tensions, but he deftly avoided those issues and found a way to “use Trump as a foil and present the president as a more serious leader” (Shear). His counterattack against the wedge used by the media spin zone was successful. Senator Kerry, on the other hand, failed to counterattack the media spin zone’s rallying of the base. His silence allowed the media to generate both issue and image frames and priming against him. This is an important lesson for future candidates and presidents and the media and presidential spin zones are important topics for further research. References Ansolabehare, Stephen, and Shanto Iyengar. Going Negative: How Political Advertisements Shrink and Polarize the Electorate. New York: Free Press, 1995. Baumgardner, Frank, and Bryan D. Jones. Agendas and Instability in American Politics. Chicago, Illinois: U of Chicago P, 1993. Cappella, Joseph N., and Kathleen Hall Jamieson. Spiral of Cynicism: The Press and the Public Good. New York: Oxford UP, 1997. Coronel, Sheila S. “The Media as Watchdog.” The Role of the News Media in the Governance Realm 29–31 May 2008. 18 Oct. 2011 ‹http://www.hks.harvard.edu/fs/pnorris/Conference/Conference%20papers/Coronel%20Watchdog.pdf›. Druckman, James N. “On the Limits of Framing Effects: Who Can Frame?” The Journal of Politics 63.4 (2001): 1041–1066. ——. “The Power of Television Images.” The Journal of Politics 65.2 (2003): 559–71. Druckman, James N., et al. “Candidate Strategies to Prime Issues and Image.” The Journal of Politics 66.4 (2004): 1180–1202. Esser, Frank, Carsten Reinemann, and David Fan. “Spin Doctoring in British and German Election Campaigns: How the Press Is Being Confronted with a New Quality of Political PR.” European Journal of Communication 15.2 (2000): 209–239. Fridkin, Kim L., et al. “Spinning Debates: The Impact of the News Media’s Coverage of the Final 2004 Presidential Debate.” The International Journal of Press/Politics 13.1 (2008): 29–51. Funk, Carolyn. “Bringing the Candidate in Models of Candidate Evaluation.” The Journal of Politics 61.3 (1999): 700–720. Gallup, Alec M., and Frank Newport. The Gallup Poll: Public Opinion in 2004. Lanham, Maryland: Rowland & Littlefield Publishers, 2006 Gamson, William A., and Andre Modigliani. “Media Discourse and Public Opinion on Nuclear Power: A Constructionist Approach.” American Journal of Sociology 95.1 (1989): 1–37. Goffman, Erving. Frame Analysis: An Essay on the Organization of Experience. New York: Harper and Row, 1974 Iyengar, Shanto, and Jennifer A. McGrady. Media Politics: A Citizens Guide. New York: W.W. Norton, 2007. Iyengar, Shanto, and Donald R. Kinder. News That Matters. Chicago: U of Chicago P, 1987. Jacobs, Lawrence R., and Robert Y. Shapiro. “Politicians Don’t Pander: Political Manipulation and the Loss of Democratic Responsiveness.” Chicago: U of Chicago P, 2000. Jamieson, Kathleen Hall, and Joseph N. Capella. Echo Chamber: Rush Limbaugh and the Conservative Media Establishment. New York: Oxford UP, 2008. Kellner, Douglas. “Bushspeak and the Politics of Lying: Presidential Rhetoric in the War on Terror.” Presidential Studies Quarterly 37.4 (2007): 622–645. Miller, Joanne M., and Jon A. Krosnick. “News Media Impact on the Ingredients of Presidential Evaluations: Politically Knowledgeable Citizens are Guided by a Trusted Source.” American Journal of Political Science 44.2 (2000): 301-315. Muravchik, Joshua. “Kerry’s Cambodia Whopper.” Washington Post 24 Aug. 2004: A17. Nacos, Brigette L., Yaeli Boch-Elkon, Robert Y. Shapiro. “Post 9-11 Terrorism Threats, News Coverage, and Public Perceptions in the United States.” International Journal of Conflict and Violence 1.2 (2007): 105–126. Nelson, Thomas E., Rosalee A. Clawson, and Zoe M. Oxley. “Media Framing of Civil Liberties Conflict and Its Effect on Tolerance.” American Political Science Review 91 (1997): 567-583. Rozell, M.J. “Presidential Image-Makers on the Limits of Spin Control.” Presidential Studies Quarterly 25.1 (1995): 67–90. Scheufele, Dietram A., and David Tewksbury. “Framing, Agenda Setting, and Priming: The Evolution of Three Media Effects Models.” Journal of Communication 57.1 (2007): 9–20. Shear, Michael D. “With Document, Obama Seeks to End Birther Issue.” New York Times 28 April 2011. 18 Oct 2011 ‹http://www.nytimes.com/2011/04/28/us/politics/28obama.html›.“The Bear.” 4President TV 2 Oct 1984. 18 Oct 2011 ‹http://tv.4president.us/1984/reagan1984bear.htm›. Tversky, Amos, and Daniel Kahneman. “The Framing of Decisions and the Psychology of Choice.” Science 211.4481 (1981): 452–58. Van Gorp, Baldwin. “Where Is the Frame: Victims and Intruders in the Belgian Press Coverage of the Asylum Issue?” European Journal of Communication 20.4 (2005): 484–507. Westen, Drew. The Political Brain. New York: Public Affairs, 2007. Wilson, John K. The Most Dangerous Man in America: Rush Limbaugh’s Assault on Reason. New York: St. Martin’s Press, 2011.
APA, Harvard, Vancouver, ISO, and other styles
41

Herb, Annika. "Non-Linear Modes of Narrative in the Disruption of Time and Genre in Ambelin Kwaymullina’s The Interrogation of Ashala Wolf." M/C Journal 22, no. 6 (December 4, 2019). http://dx.doi.org/10.5204/mcj.1607.

Full text
Abstract:
While Young Adult dystopian texts commonly manipulate expectations of time and space, it is largely in a linear sense—projecting futuristic scenarios, shifting the contemporary reader into a speculative space sometimes only slightly removed from contemporary social, political, or environmental concerns (Booker 3; McDonough and Wagner 157). These concerns are projected into the future, having followed their natural trajectory and come to a dystopian present. Authors write words and worlds of warning in a postapocalyptic landscape, drawing from and confirming established dystopian tropes, and affirming the activist power of teenage protagonists in cultivating change. This article examines the intersections between dystopian Young Adult literature and Indigenous Futurisms, and the possibilities for sharing or encoding Indigenous Knowledge through the disruption or revision of genre, where the act itself become a movement of activism and survival echoed in text. Lynette James acknowledges the “ruptures” (157) Indigenous authors have made in the genre through incorporating Indigenous Knowledge into story as an embedded element – not only of narrative, but of structure. Ambelin Kwaymullina, of the Palyku people of the Pilbara region of Western Australia, exemplifies this approach in her disruption or rupture of the dystopian genre in her embodiment of Indigenous Knowledge in the Young Adult (YA) text The Interrogation of Ashala Wolf. Kwaymullina centres Indigenous Knowledge throughout the trilogy, offering a powerful revision of key tropes of the dystopian YA genre, creating a perspective that privileges Indigenous Knowledge. This is most significantly identified through her depiction of time as a non-linear concept, at once realised narratively, conceptually, and structurally in the text. The Interrogation of Ashala Wolf, the first of a trilogy of novels in “The Tribe” series, presents a futuristic post-apocalyptic world, set 300 years after the Reckoning, a cataclysmic environmental disaster. The protagonist, Ashala Wolf, is one of a number of people with supernatural abilities that are outlawed by their government and labelled Illegals. As the novel begins, Ashala is being interrogated by the villainous Neville Rose, held in a detention centre as she plots to escape, free her fellow detainees, and return to the Tribe in the Firstwood. The plot draws from historical and contemporary parallels in Australia, yet part of the text’s subversive power is that these parallels and connections are never made explicit on the page. The reader is invited to become an active participant in coding meaning by applying their own understandings of the context and connections, creating an inter-subjective dialogue between reader and text, and Indigenous and non-Indigenous knowing. This article looks to the first novel in the trilogy as the key exemplifier of the disruption of genre and knowledge through the representation of time. It is in this novel that these concepts are established and realised most clearly, being predominantly from Ashala’s perspective as a direct descendant of Indigenous Australians, with the following two novels divided between Ashala, Georgie, and Ember as polyphonic narrative focalisers. Acting as an introduction to the series, The Interrogation of Ashala Wolf presents a foundation for readers to challenge their perceptions on both genre and knowledge. Kwaymullina entangles the two, imbuing knowledge throughout narrative and structure which in turn disrupts genre. In her revisioning of narrative through genre and structural focus of time as a non-linear concept, Kwaymullina puts into practice Conrad Scott’s argument that “the potential healing of moments or processes of crisis in Indigenous dystopias is never possible without a strategic engagement with narrative itself, and even the formal aspects of the text” (73).While the series fits the conventions of the dystopian genre, it has been more commonly identified as speculative fiction, or Indigenous futurism, as Kwaymullina herself defines her work. James notes the significance of acknowledging a text as Indigenous futurism, writing, “identifying a work as Indigenous futurism rather than simply as YA dystopia asks readers, critics, and scholars to adjust their orientation in ways that may radically alter both their perception and reception of it” (153). For the purposes of this article, I acknowledge the clear value and importance of identifying the text as Indigenous futurism, but also find value in the movements that define the shift from dystopian literature to Indigenous futurism, in its engagement with and recasting of dystopian conventions in the text. In embedding Indigenous Knowledge in her worldbuilding and narrative, Kwaymullina actively rewrites dystopian expectations and tropes. These notions would be expected or normalised when grounded in Indigenous futurism, but are regarded as a subversion and revision when read in dystopian fiction. The text engages directly with the specific tropes and expectations of dystopian genre—its significance in rewriting the spaces, narratives, and structures of the genre cannot be overstated. The employment of the dystopian genre as both framework and space of revision speaks to larger debates of the value of dystopian fiction in examining socio-cultural issues over other genres such as realism. Critics argue the speculative nature of dystopian fiction that remains linked to concerns of the present and past allows audiences to envision and experience their own transformative experience, effecting political change (Kennon; Mallan; Basu, Broad, and Hintz; Sypnowich). Balaka Basu, Katherine Broad, and Carrie Hintz argue that serious issues presented in fantastic futuristic scenarios “may provide young people with an entry point into real-world problems, encouraging them to think about social and political issues in new ways, or even for the first time” (4-5). Kerry Mallan notes the “ability of dystopian fiction to open up to readers a dystopian social elsewhere serves a double function: On the one hand, it offers readers an opportunity to reflect on their current existence to compare the similarities and differences between the real and the fictional; on the other, these stories implicitly exhort young people to take responsibility for their own lives and the future of society” (16). Drawing on these metanarrative structures with the interweaving of Indigenous knowledge increases the active responsibility for the reader. It invokes Nnedi Okorafor’s labelling of Indigenous Futurisms as “the most truthful way of telling the truth” (279), creating opportunities for the Indigenous and non-Indigenous reader to engage with narratives of a real apocalypse on invaded land. The dystopian setting and expectations form a buffer between reader and text (Basu, Broad, and Hintz 4), making the narrative more accessible to the reader without shying away from the embedded trauma, while drawing on dystopian fiction’s balance of despair and optimism (Basu, Broad, and Hintz 2).The stakes and value of dystopian fiction are heightened when engaging with Indigenous narratives and knowledge; as Claire Coleman (a Noongar woman from the south coast of Western Australia) notes, Indigenous Australians live in a post-apocalyptic state as “all Aboriginal and Torres Strait Islander people alive today are the descendants of people who survived an apocalypse” (n.p.). James, quoting Uppinder Mehan, concurs, writing “these narrators are ‘survivors—or the descendants of survivors’ [162], not just of broken dystopian worlds or post-cataclysmic events but of the real historical legacies of slavery, conquest, and oppression” (157). Writing on Indigenous futurisms in dystopian and utopian fiction, Mary Morrison argues “people outside Western hegemonic power structures would likely be well-placed to transform the utopian imagination, to decolonize it” (11), acknowledging the significance in the intersection of genre and lived experience by author and character.Kwaymullina expands on this, noting that for Indigenous authors the tropes of speculative fiction are familiar lived experiences. She writes thatmany of the ideas that populate speculative-fiction books – notions of time travel, astral projection, speaking the languages of animals or trees – are part of Indigenous cultures. One of the aspects of my own novels that is regularly interpreted as being pure fantasy, that of an ancient creation spirit who sung the world into being, is for me simply part of my reality. (“Edges” 27)Kwaymullina affirms Coleman and James in her approach, writing “Indigenous people lived through the end of the world, but we did not end. We survived by holding on to our cultures, our kin, and our sense of what was right in a world gone terribly wrong” (“Edges” 29). The Tribe series demonstrates survivance, with Kwaymullina’s approach forming possibilities for intersubjective dialogues across genre. The concept is reinforced through Ashala’s repeated, joyful cries of hope throughout the text: “I live! We live! We survive!” (197, 200, 279, 391).Sara K. Day, Miranda A. Green-Barteet, and Amy L. Montz note dystopian literature considers possible futures from the outlook and failures of the present (8), arguing “the label ‘dystopia’ typically applies to works that simultaneously imagine futures and consider the present, essentially occupying a liminal space between these times” (Day, Green-Barteet, and Montz 9). This sense of liminality is heightened with the engagement of time from an Indigenous perspective; as Scott writes, “Indigenous dystopian fiction presents not only the crisis of the future but the ongoing crisis of the present time, and that which is still resonant from the past” (73). In “Respect, Relationships, Renewal: Aboriginal Perspectives on the Worlds of Tomorrow”, Kwaymullina notes that linear time can “become a tool of ideology, with colonial characterisations of Indigenous peoples as being of an earlier (less ‘advanced’) time through the use of terms such as ‘primitive’, ‘prehistoric’ and ‘prehistory’” (“Respect” 126).In shifting to a dystopian world where Australia as a colonised or invaded country is no longer recognised, but Country is still alive and read by those who live on it, Kwaymullina recasts the use of linear time as a tool of ideology to reaffirm Coleman’s argument that Indigenous Australians already exist in a post-apocalyptic state. She draws from the past and present and casts it into the future, while simultaneously recognising that all three are linked and circular—events are repeating and being relived. Kwaymullina depicts numerous parallels between the dystopian world and a post-invasion Australia, populating her world with references to detention centres; othering and distinct labelling of a vilified minority deemed a threat or aberrant to the majority colonising community; the name and title of the series’ central villain Chief Administrator Neville Rose in a clear reference to A.O. Neville, WA Chief Protector of Aborigines.At the outset, the government uses labels to separate and denigrate the Other—individuals with Abilities are called Illegals, distinct from Citizens, although they can apply for Exemptions if their Ability is deemed useful and passive. The terminology of Exemption draws deliberate connections to the Exemption Certificate Indigenous Australians could apply for from the Aborigines Protection (Amendment) Act 1943. The text consistently operates in modes of survivance, as Ashala and the Tribe redefine their world through a distinctly Indigenous perspective (Murphy 179). Ashala gains power through the tool used to suppress her by claiming and embracing this status, identifying her friends and herself as the Tribe and choosing a forest name emblematic of the totems that each Tribe member has a particular connection to (e.g. Georgie Spider, Ember Crow, Ashala Wolf). Continual parallels are drawn to Indigenous Knowledge: Ashala’s Ability is Sleepwalking, where she enters a state in dreaming where she can alter reality, a liminal space that suggests connections to the Dreamtime. While the land is no longer called or recognised as Australia, and the tectonic plates have shifted land mass, it remains Country, as recognised in Ashala’s relationship with the Firstwood. The Balance, the inherent harmony between all life, animate and inanimate, is a clear reflection of an Indigenous understanding, positioning it as the mainstream ideology.Kwaymullina weaves Indigenous knowledge through the text as demonstrated through narrative, key thematic concepts, and structure, disrupting the tropes of dystopian fiction in a manner that subverts genre and presents new possibilities for both reader and writer while presenting a shift to Indigenous Futurisms. As an organic by-product of this ideological framework, regressive or gendered tropes are re-envisioned as feminist and ecologically centred, ultimately conveying a sense of hope and survivance. Key tropes of YA dystopian fiction include a female teenager protagonist oppressed by her government, often initially unknowingly so embedded is she in the system, potentially profiting from it in some way. She is often introduced to the reader in a setting that the character initially reads as utopian, but is revealed to be dystopian and authoritarian in its construction. As identified by Ann M.M. Childs, a common dynamic in the genre that reinforces gender roles in heterosexual relationships see the protagonist introduced to the concept of rebellion or dissent through a male love interest already embedded in a resistance movement, at the cost of losing or betraying a female friend (188). Childs notes the protagonist may be resistant to the idea of rebellion, but after falling for the love interest, grows to genuinely care for the cause. Technology is depicted as advanced, alien or dehumanising, and both belongs to and represents the repressive society the protagonist seeks to escape and change. The natural environment is depicted in binary opposition, with characters finding resilience, freedom, and personal agency in a return to nature (McDonough and Wagner 157). Society will have attempted to restrict, destroy, or otherwise mine the natural world, but this attempt for control will inevitably fail or backfire. Initially the environment is displayed as a potentially antagonistic element, wild and dangerous; however, after the character escapes their confining world, it becomes an ally. In her employment of a perspective framed by Indigenous Knowledge, Kwaymullina subverts each of these established tropes, offering an alternative reading of conventions often embedded in the genre. Ashala is introduced as already entrenched in a rebellion that she is both leader and pivotal figure of. Inverting the dynamic outlined by Childs, she is love interest Connor’s motivation for rejecting the government and joining the Tribe: “You are the reason I came here, Ashala Wolf” (Kwaymullina 263). Kwaymullina dismisses Childs’ concern over the removal of female friendship in favour of heterosexual romance by centering Ashala’s relationships with Georgie and Ember as fundamental to Ashala’s well-being, where sistahood is a key paradigm of hope: “I carry my friends with me” (Kwaymullina 39). For Ashala and the Tribe, nature as exemplified through the Firstwood is Country, not only sanctuary but an animate being that Ashala speaks with, asks permission to live within, and offers protection and apology for the harm down to it by humans in the past. The privileging of environment, and reading all animate or inanimate beings as living, extends to challenging the nature/technology dichotomy. Even the static or sterile environments of the detention centres are recognised for their connection to nature in their construction from recycled materials: “Nothing ever truly ends, only transforms” (Kwaymullina 141). In “Learning to Read the Signs: Law in an Indigenous Reality”, Ambelin Kwaymullina and Blaze Kwaymullina write thatsince everything must interconnect and interrelate to survive, if a pattern is fixed in time, it loses its ability to dynamically connect with other patterns. To be temporally fixed is therefore to be isolated; frozen. In an Indigenous worldview, it is, in fact, an impossibility – for that which cannot move, cannot interact, and that which cannot interact is inanimate. And there is nothing inanimate in country. (200)This can be read as representative of Kwaymullina’s rupture or revision of dystopian tropes and genre. When tropes are read as static or absolute, they run the risk of freezing or limiting the knowledge encoded in these stories. By integrating Indigenous Knowledge, new patterns can emerge and interact, extending to the reader’s own understanding of genre, time, and epistemology. Kwaymullina’s revisioning of dystopian tropes through an embedded and celebrated Indigenous perspective culminates in the successful thematic, narrative, and structural expression of time as a non-linear concept. Kwaymullina and Kwaymullina acknowledge the division between the reductionist and linear perspective of time through a Western worldview in comparison to the non-linear perception from that of an Indigenous Australian worldview. They acknowledge that their expression of time is not to be read as representative of all Indigenous Australians’ perspective of time, but one informed by their own Country and upbringing. Kwaymullina and Kwaymullina write,in an Aboriginal worldview, time—to the extent that it exists at all—is neither linear nor absolute. There are patterns and systems of energy that create and transform, from the ageing process of the human body to the growth and decay of the broader universe. But these processes are not ‘measured’ or even framed in a strictly temporal sense, and certainly not in a linear sense. (199)This is enacted through the narrative structure of The Interrogation of Ashala Wolf. The text is set across four days, yet spans years, shifting through narrative in a non-linear manner and reflecting the Indigenous understanding of time as a circular, evolving concept. These four days act as the containers for the text, as Kwaymullina distinguishes the departure from linear time for the uninitiated reader by including headings and subheadings in chapter titles, marked as “Day One”, “Day Two”, “Day Three”, and “Day Four”, before the final section, “The Escape”. Within these containers, themselves marked linearly, narrative ebbs and flows across time and space, taking Ashala away from the Detention Centre to different moments from her past, spanning years. These ‘flashbacks’ are not presented in a linear fashion; the text revisits and repeats key moments of Ashala’s life out of sequence, providing an immediate focus on these seemingly past moments. This is key in shaping the reader’s understanding of “the patterns and systems of energy that create and transform” (Kwaymullina and Kwaymullina 199)—as Ashala revisits or rediscovers memory through time, perceptions of character, motive, relationships, and key plot points are changed and transformed. Meaning is formed through this relationship of narrative and time in a manner not possible through a linear structure. Over the course of the novel, Ashala and the reader find she’s chosen to give herself false memories to protect the Tribe and complete a master plan to defeat Neville Rose. As such, as the novel begins the reader, aligned with Ashala as narrative focaliser, is positioned to read key points through a flawed perspective. Connor is presented as an enemy and betrayer of the Tribe, while Ashala denies her feelings towards him. The reader is aligned with Ashala’s perspective—she has already fallen in love with Connor, but neither she nor the reader knows it due to the displacement of knowledge through narrative structure and memory. This also speaks to identity formation in the text—Ashala is herself, and not herself until the novel reaches full circle, and she and the reader have experienced multiple points of time. As Ember explains, “it’s not about losing small pieces of information. This stuff shapes your entire understanding of reality” (Kwaymullina 167). If the reader revisits the text with this knowledge, they find further value in exploring the non-linear, circular narrative, finding subtext in characters’ interactions and decisions. The disruption in the non-linear narrative structure is twofold: to reflect the representation of time in an Indigenous epistemology, further rewriting the genre; and to create an intersubjective dialogue. As such, the narrative structure creates a space of invitation to the reader. Rather than positioning Ashala as embedded and aware of her status as a custodian of Indigenous knowledge, the text places her as ingrained in Indigenous epistemology, but unaware of it. In this way, the text effectively invites the reader in, mirroring Ashala’s journey of (re)discovery. The non-Indigenous reader enters the text alongside Ashala, with Indigenous knowledge embedded subtly throughout the text echoed in Kwaymullina’s engagement with dystopian tropes, and integrated Indigenous epistemology. By the time Ashala meets the Serpent, her Grandfather, and has her ancestry explained to her, the reader has already been immersed in Ashala’s own way of thinking, an inherently Indigenous one; for instance, throughout the text, she acknowledges the value and interconnectedness of all beings, human and non-human, animate and inanimate. The text leaves space for the reader to be active in their own construction of meaning and knowledge by never using the terms “Indigenous” or “Aboriginal”, themselves colonial inventions employed to control and label. Instead, the reader is encouraged to engage in the metatextual intersubjective dialogue introduced by Kwaymullina to acknowledge Indigenous epistemology—but by way of her approach, Kwaymullina further encourages the reader to “forget Aborigines” (Healy 219) by centring knowledge in its own right, rather than in direct opposition to Western epistemologies. That is, Kwaymullina disrupts Western perspectives framing of Indigenous knowledge as “other”, altering expectations of the norm as non-Indigenous. As Kwaymullina writes, to conceive of time in a non-linear way is at once a great gift and a great responsibility. The responsibility is that our individual actions matter powerfully, radiating out across relationships and affecting all that might be thought of in a linear sense as past, present and future. But the gift is that the passage of linear time has never moved us so far that we cannot take meaningful action to heal the wounds of colonialism. (“Respect” 126-127)In The Interrogation of Ashala Wolf, Kwaymullina realises this gift and responsibility. By framing structural, conceptual, and narrative time through an Indigenous epistemology, Kwaymullina privileges Indigenous Knowledge and effectively subverts and revises the genre through the rupture of dystopian conventions. Possibilities of hope and healing emerge in the text’s construction of time and genre as spaces of growth and change are emphasised; like Ashala, the reader finds themselves at the end and beginning of the world at once.ReferencesBasu, Balaka, Katherine R. Broad, and Carrie Hintz, eds. Contemporary Dystopian Fiction for Young Adults: Brave New Teenagers. New York: Routledge, 2013. Booker, M. Keith. Dystopian Literature: A Theory and Research Guide. Westport, CT: Greenwood P, 1994. Bradford, Clare, et al. New World Orders in Children’s Literature: Utopian Transformations. New York: Palgrave Macmillan, 2011. Childs, Ann M.M. “The Incompatibility of Female Friendships and Rebellion.” Female Rebellion in Young Adult Dystopian Fiction. Eds. Sara K. Day et al. Farnham: Taylor & Francis, 2014. 187-201.Coleman, Claire G. “Apocalypses Are More than the Stuff of Fiction — First Nations Australians Survived One.” ABC News 8 Dec. 2017. 30 Sep. 2019 <https://www.abc.net.au/news/2017-12-08/first-nations-australians-survived-an-apocalypse-says-author/9224026>.Day, Sara K., Miranda A. Green-Barteet, and Amy L. Montz, eds. Female Rebellion in Young Adult Dystopian Fiction. Farnham: Taylor & Francis, 2014. Green-Barteet, Miranda A., and Meghan Gilbert-Hickey. “Black and Brown Boys in Young Adult Dystopias: Racialized Docility in ‘The Hunger Games Trilogy’ and ‘The Lunar Chronicles Feather Journal.’” Red Feather Journal 8.2 (2017). 30 Sep. 2019 <https://www.redfeatherjournal.org/volume-8-issue-2.html>.Harris, Anita. Future Girl: Young Women in the Twenty-First Century. New York: Routledge, 2004. Healy, Chris. Forgetting Aborigines. Sydney: U of NSW P, 2008.Hintz, Carrie, and Elaine Ostry, eds. Utopian and Dystopian Writing for Children and Young Adults. New York: Routledge, 2003.James, Lynette. “Children of Change, Not Doom: Indigenous Futurist Heroines in YA.” Extrapolation: A Journal of Science Fiction and Fantasy 57.1-2 (2016). 20 Sep. 2019 <https://online.liverpooluniversitypress.co.uk/doi/pdf/10.3828/extr.2016.9>.Kennon, Patricia. “‘Belonging’ in Young Adult Dystopian Fiction: New Communities Created by Children.” Papers: Explorations into Children's Literature 15.2 (2005). 28 Sep. 2019 <http://www.paperschildlit.com/pdfs/Papers_2005_v15no2_p40.pdf>.Kwaymullina, Ambelin. The Interrogation of Ashala Wolf. Newtown: Walker Books Australia, 2012.———. “Edges, Centres and Futures: Reflections on Being an Indigenous Speculative-Fiction Writer.” Kill Your Darlings 18 (2014): 22-33.———. “Respect, Relationships, Renewal: Aboriginal Perspectives on the Worlds of Tomorrow.” Westerly 64.1 (2019): 121-134. Kwaymullina, Ambelin, and Blaze Kwaymullina. “Learning to Read the Signs: Law in an Indigenous Reality.” Journal of Australian Studies 34.2 (2010). 21 Sep. 2019 <https://doi.org/10.1080/14443051003721189>.Mallan, Kerry. “Dystopian Fiction for Young People: Instructive Tales of Resilience.” Psychoanalytic Inquiry 37.1 (2017). 22 Sep. 2019 <https://doi.org/10.1080/07351690.2017.1250586>.McDonough, Megan, and Katherine A. Wagner. “Rebellious Natures: The Role of Nature in Young Adult Dystopian Female Protagonists’ Awakenings and Agency.” Female Rebellion in Young Adult Dystopian Fiction. Eds. Sara K. Day et al. Farnham: Taylor & Francis, 2014. 157-170.Montz, Amy L. “Rebels in Dresses: Distractions of Competitive Girlhood in Young Adult Dystopian Fiction.” Female Rebellion in Young Adult Dystopian Fiction. Eds. Sara K. Day et al. Farnham: Taylor & Francis, 2014. 107-121.Morrison, Mary. “Decolonizing Utopia: Indigenous Knowledge and Dystopian Speculative Fiction.” Dissertation. U of California, 2017.Murphy, Graham J. “For Love of Country: Apocalyptic Survivance in Ambelin Kwaymullina’s Tribe Series.” Extrapolation: A Journal of Science Fiction and Fantasy 57.1-2 (2016). 20 Sep. 2019 <https://online.liverpooluniversitypress.co.uk/doi/pdf/10.3828/extr.2016.10>.Okorafor, Nnedi. “Organic Fantasy.” African Identities 7.2 (2009). 22 Sep. 2019 <https://doi.org/10.1080/14725840902808967>.Scott, Conrad. “(Indigenous) Place and Time as Formal Strategy: Healing Immanent Crisis in the Dystopias of Eden Robinson and Richard Van Camp.” Extrapolation: A Journal of Science Fiction and Fantasy 57.1-2 (2016). 20 Sep. 2019 <https://online.liverpooluniversitypress.co.uk/doi/pdf/10.3828/extr.2016.6>.Sypnowich, Christine. “Lessons from Dystopia: Critique, Hope and Political Education.” Journal of Philosophy of Education 52.4 (2018). 22 Sep. 2019 <https://doi.org/10.1111/1467-9752.12328>.
APA, Harvard, Vancouver, ISO, and other styles
42

Leaver, Tama. "The Social Media Contradiction: Data Mining and Digital Death." M/C Journal 16, no. 2 (March 8, 2013). http://dx.doi.org/10.5204/mcj.625.

Full text
Abstract:
Introduction Many social media tools and services are free to use. This fact often leads users to the mistaken presumption that the associated data generated whilst utilising these tools and services is without value. Users often focus on the social and presumed ephemeral nature of communication – imagining something that happens but then has no further record or value, akin to a telephone call – while corporations behind these tools tend to focus on the media side, the lasting value of these traces which can be combined, mined and analysed for new insight and revenue generation. This paper seeks to explore this social media contradiction in two ways. Firstly, a cursory examination of Google and Facebook will demonstrate how data mining and analysis are core practices for these corporate giants, central to their functioning, development and expansion. Yet the public rhetoric of these companies is not about the exchange of personal information for services, but rather the more utopian notions of organising the world’s information, or bringing everyone together through sharing. The second section of this paper examines some of the core ramifications of death in terms of social media, asking what happens when a user suddenly exists only as recorded media fragments, at least in digital terms. Death, at first glance, renders users (or post-users) without agency or, implicitly, value to companies which data-mine ongoing social practices. Yet the emergence of digital legacy management highlights the value of the data generated using social media, a value which persists even after death. The question of a digital estate thus illustrates the cumulative value of social media as media, even on an individual level. The ways Facebook and Google approach digital death are examined, demonstrating policies which enshrine the agency and rights of living users, but become far less coherent posthumously. Finally, along with digital legacy management, I will examine the potential for posthumous digital legacies which may, in some macabre ways, actually reanimate some aspects of a deceased user’s presence, such as the Lives On service which touts the slogan “when your heart stops beating, you'll keep tweeting”. Cumulatively, mapping digital legacy management by large online corporations, and the affordances of more focussed services dealing with digital death, illustrates the value of data generated by social media users, and the continued importance of the data even beyond the grave. Google While Google is universally synonymous with search, and is the world’s dominant search engine, it is less widely understood that one of the core elements keeping Google’s search results relevant is a complex operation mining user data. Different tools in Google’s array of services mine data in different ways (Zimmer, “Gaze”). Gmail, for example, uses algorithms to analyse an individual’s email in order to display the most relevant related advertising. This form of data mining is comparatively well known, with most Gmail users knowingly and willingly accepting more personalised advertising in order to use Google’s email service. However, the majority of people using Google’s search engine are unaware that search, too, is increasingly driven by the tracking, analysis and refining of results on the basis of user activity (Zimmer, “Externalities”). As Alexander Halavais (160–180) quite rightly argues, recent focus on the idea of social search – the deeper integration of social network information in gauging search results – is oxymoronic; all search, at least for Google, is driven by deep analysis of personal and aggregated social data. Indeed, the success of Google’s mining of user data has led to concerns that often invisible processes of customisation and personalisation will mean that the supposedly independent or objective algorithms producing Google’s search results will actually yield a different result for every person. As Siva Vaidhyanathan laments: “as users in a diverse array of countries train Google’s algorithms to respond to specialized queries with localised results, each place in the world will have a different list of what is important, true, or ‘relevant’ in response to any query” (138). Personalisation and customisation are not inherently problematic, and frequently do enhance the relevance of search results, but the main objection raised by critics is not Google’s data mining, but the lack of transparency in the way data are recorded, stored and utilised. Eli Pariser, for example, laments the development of a ubiquitous “filter bubble” wherein all search results are personalised and subjective but are hidden behind the rhetoric of computer-driven algorithmic objectivity (Pariser). While data mining informs and drives many of Google’s tools and services, the cumulative value of these captured fragments of information is best demonstrated by the new service Google Now. Google Now is a mobile app which delivers an ongoing stream of search results but without the need for user input. Google Now extrapolates the rhythms of a person’s life, their interests and their routines in order to algorithmically determine what information will be needed next, and automatically displays it on a user’s mobile device. Clearly Google Now is an extremely valuable and clever tool, and the more information a user shares, the better the ongoing customised results will be, demonstrating the direct exchange value of personal data: total personalisation requires total transparency. Each individual user will need to judge whether they wish to share with Google the considerable amount of personal information needed to make Google Now work. The pressing ethical question that remains is whether Google will ensure that users are sufficiently aware of the amount of data and personal privacy they are exchanging in order to utilise such a service. Facebook Facebook began as a closed network, open only to students at American universities, but has transformed over time to a much wider and more open network, with over a billion registered users. Facebook has continually reinvented their interface, protocols and design, often altering both privacy policies and users’ experience of privacy, and often meeting significant and vocal resistance in the process (boyd). The data mining performed by social networking service Facebook is also extensive, although primarily aimed at refining the way that targeted advertising appears on the platform. In 2007 Facebook partnered with various retail loyalty services and combined these records with Facebook’s user data. This information was used to power Facebook’s Beacon service, which added details of users’ retail history to their Facebook news feed (for example, “Tama just purchased a HTC One”). The impact of all of these seemingly unrelated purchases turning up in many people’s feeds suddenly revealed the complex surveillance, data mining and sharing of these data that was taking place (Doyle and Fraser). However, as Beacon was turned on, without consultation, for all Facebook users, there was a sizable backlash that meant that Facebook had to initially switch the service to opt-in, and then discontinue it altogether. While Beacon has been long since erased, it is notable that in early 2013 Facebook announced that they have strengthened partnerships with data mining and profiling companies, including Datalogix, Epsilon, Acxiom, and BlueKai, which harness customer information from a range of loyalty cards, to further refine the targeting ability offered to advertisers using Facebook (Hof). Facebook’s data mining, surveillance and integration across companies is thus still going on, but no longer directly visible to Facebook users, except in terms of the targeted advertisements which appear on the service. Facebook is also a platform, providing a scaffolding and gateway to many other tools and services. In order to use social games such as Zynga’s Farmville, Facebook users agree to allow Zynga to access their profile information, and use Facebook to authenticate their identity. Zynga has been unashamedly at the forefront of user analytics and data mining, attempting to algorithmically determine the best way to make virtual goods within their games attractive enough for users to pay for them with real money. Indeed, during a conference presentation, Zynga Vice President Ken Rudin stated outright that Zynga is “an analytics company masquerading as a games company” (Rudin). I would contend that this masquerade succeeds, as few Farmville players are likely to consider how their every choice and activity is being algorithmically scrutinised in order to determine what virtual goods they might actually buy. As an instance of what is widely being called ‘big data’, the data miing operations of Facebook, Zynga and similar services lead to a range of ethical questions (boyd and Crawford). While users may have ostensibly agreed to this data mining after clicking on Facebook’s Terms of Use agreement, the fact that almost no one reads these agreements when signing up for a service is the Internet’s worst kept secret. Similarly, the extension of these terms when Facebook operates as a platform for other applications is a far from transparent process. While examining the recording of user data leads to questions of privacy and surveillance, it is important to note that many users are often aware of the exchange to which they have agreed. Anders Albrechtslund deploys the term ‘social surveillance’ to usefully emphasise the knowing, playful and at times subversive approach some users take to the surveillance and data mining practices of online service providers. Similarly, E.J. Westlake notes that performances of self online are often not only knowing but deliberately false or misleading with the aim of exploiting the ways online activities are tracked. However, even users well aware of Facebook’s data mining on the site itself may be less informed about the social networking company’s mining of offsite activity. The introduction of ‘like’ buttons on many other Websites extends Facebook’s reach considerably. The various social plugins and ‘like’ buttons expand both active recording of user activity (where the like button is actually clicked) and passive data mining (since a cookie is installed or updated regardless of whether a button is actually pressed) (Gerlitz and Helmond). Indeed, because cookies – tiny packets of data exchanged and updated invisibly in browsers – assign each user a unique identifier, Facebook can either combine these data with an existing user’s profile or create profiles about non-users. If that person even joins Facebook, their account is connected with the existing, data-mined record of their Web activities (Roosendaal). As with Google, the significant issue here is not users knowingly sharing their data with Facebook, but the often complete lack of transparency in terms of the ways Facebook extracts and mines user data, both on Facebook itself and increasingly across applications using Facebook as a platform and across the Web through social plugins. Google after Death While data mining is clearly a core element in the operation of Facebook and Google, the ability to scrutinise the activities of users depends on those users being active; when someone dies, the question of the value and ownership of their digital assets becomes complicated, as does the way companies manage posthumous user information. For Google, the Gmail account of a deceased person becomes inactive; the stored email still takes up space on Google’s servers, but with no one using the account, no advertising is displayed and thus Google can earn no revenue from the account. However, the process of accessing the Gmail account of a deceased relative is an incredibly laborious one. In order to even begin the process, Google asks that someone physically mails a series of documents including a photocopy of a government-issued ID, the death certificate of the deceased person, evidence of an email the requester received from the deceased, along with other personal information. After Google have received and verified this information, they state that they might proceed to a second stage where further documents are required. Moreover, if at any stage Google decide that they cannot proceed in releasing a deceased relative’s Gmail account, they will not reveal their rationale. As their support documentation states: “because of our concerns for user privacy, if we determine that we cannot provide the Gmail content, we will not be able to share further details about the account or discuss our decision” (Google, “Accessing”). Thus, Google appears to enshrine the rights and privacy of individual users, even posthumously; the ownership or transfer of individual digital assets after death is neither a given, nor enshrined in Google’s policies. Yet, ironically, the economic value of that email to Google is likely zero, but the value of the email history of a loved one or business partner may be of substantial financial and emotional value, probably more so than when that person was alive. For those left behind, the value of email accounts as media, as a lasting record of social communication, is heightened. The question of how Google manages posthumous user data has been further complicated by the company’s March 2012 rationalisation of over seventy separate privacy policies for various tools and services they operate under the umbrella of a single privacy policy accessed using a single unified Google account. While this move was ostensibly to make privacy more understandable and transparent at Google, it had other impacts. For example, one of the side effects of a singular privacy policy and single Google identity is that deleting one of a recently deceased person’s services may inadvertently delete them all. Given that Google’s services include Gmail, YouTube and Picasa, this means that deleting an email account inadvertently erases all of the Google-hosted videos and photographs that individual posted during their lifetime. As Google warns, for example: “if you delete the Google Account to which your YouTube account is linked, you will delete both the Google Account AND your YouTube account, including all videos and account data” (Google, “What Happens”). A relative having gained access to a deceased person’s Gmail might sensibly delete the email account once the desired information is exported. However, it seems less likely that this executor would realise that in doing so all of the private and public videos that person had posted on YouTube would also permanently disappear. While material possessions can be carefully dispersed to specific individuals following the instructions in someone’s will, such affordances are not yet available for Google users. While it is entirely understandable that the ramification of policy changes are aimed at living users, as more and more online users pass away, the question of their digital assets becomes increasingly important. Google, for example, might allow a deceased person’s executor to elect which of their Google services should be kept online (perhaps their YouTube videos), which traces can be exported (perhaps their email), and which services can be deleted. At present, the lack of fine-grained controls over a user’s digital estate at Google makes this almost impossible. While it violates Google’s policies to transfer ownership of an account to another person, if someone does leave their passwords behind, this provides their loved ones with the best options in managing their digital legacy with Google. When someone dies and their online legacy is a collection of media fragments, the value of those media is far more apparent to the loved ones left behind rather than the companies housing those media. Facebook Memorialisation In response to users complaining that Facebook was suggesting they reconnect with deceased friends who had left Facebook profiles behind, in 2009 the company instituted an official policy of turning the Facebook profiles of departed users into memorial pages (Kelly). Technically, loved ones can choose between memorialisation and erasing an account altogether, but memorialisation is the default. This entails setting the account so that no one can log into it, and that no new friends (connections) can be made. Existing friends can access the page in line with the user’s final privacy settings, meaning that most friends will be able to post on the memorialised profile to remember that person in various ways (Facebook). Memorialised profiles (now Timelines, after Facebook’s redesign) thus become potential mourning spaces for existing connections. Since memorialised pages cannot make new connections, public memorial pages are increasingly popular on Facebook, frequently set up after a high-profile death, often involving young people, accidents or murder. Recent studies suggest that both of these Facebook spaces are allowing new online forms of mourning to emerge (Marwick and Ellison; Carroll and Landry; Kern, Forman, and Gil-Egui), although public pages have the downside of potentially inappropriate commentary and outright trolling (Phillips). Given Facebook has over a billion registered users, estimates already suggest that the platform houses 30 million profiles of deceased people, and this number will, of course, continue to grow (Kaleem). For Facebook, while posthumous users do not generate data themselves, the fact that they were part of a network means that their connections may interact with a memorialised account, or memorial page, and this activity, like all Facebook activities, allows the platform to display advertising and further track user interactions. However, at present Facebook’s options – to memorialise or delete accounts of deceased people – are fairly blunt. Once Facebook is aware that a user has died, no one is allowed to edit that person’s Facebook account or Timeline, so Facebook literally offers an all (memorialisation) or nothing (deletion) option. Given that Facebook is essentially a platform for performing identities, it seems a little short-sighted that executors cannot clean up or otherwise edit the final, lasting profile of a deceased Facebook user. As social networking services and social media become more ingrained in contemporary mourning practices, it may be that Facebook will allow more fine-grained control, positioning a digital executor also as a posthumous curator, making the final decision about what does and does not get kept in the memorialisation process. Since Facebook is continually mining user activity, the popularity of mourning as an activity on Facebook will likely mean that more attention is paid to the question of digital legacies. While the user themselves can no longer be social, the social practices of mourning, and the recording of a user as a media entity highlights the fact that social media can be about interactions which in significant ways include deceased users. Digital Legacy Services While the largest online corporations have fairly blunt tools for addressing digital death, there are a number of new tools and niche services emerging in this area which are attempting to offer nuanced control over digital legacies. Legacy Locker, for example, offers to store the passwords to all of a user’s online services and accounts, from Facebook to Paypal, and to store important documents and other digital material. Users designate beneficiaries who will receive this information after the account holder passes away, and this is confirmed by preselected “verifiers” who can attest to the account holder’s death. Death Switch similarly provides the ability to store and send information to users after the account holder dies, but tests whether someone is alive by sending verification emails; fail to respond to several prompts and Death Switch will determine a user has died, or is incapacitated, and executes the user’s final instructions. Perpetu goes a step further and offers the same tools as Legacy Locker but also automates existing options from social media services, allowing users to specify, for example, that their Facebook, Twitter or Gmail data should be downloaded and this archive should be sent to a designated recipient when the Perpetu user dies. These tools attempt to provide a more complex array of choices in terms of managing a user’s digital legacy, providing similar choices to those currently available when addressing material possessions in a formal will. At a broader level, the growing demand for these services attests to the ongoing value of online accounts and social media traces after a user’s death. Bequeathing passwords may not strictly follow the Terms of Use of the online services in question, but it is extremely hard to track or intervene when a user has the legitimate password, even if used by someone else. More to the point, this finely-grained legacy management allows far more flexibility in the utilisation and curation of digital assets posthumously. In the process of signing up for one of these services, or digital legacy management more broadly, the ongoing value and longevity of social media traces becomes more obvious to both the user planning their estate and those who ultimately have to manage it. The Social Media Afterlife The value of social media beyond the grave is also evident in the range of services which allow users to communicate in some fashion after they have passed away. Dead Social, for example, allows users to schedule posthumous social media activity, including the posting of tweets, sending of email, Facebook messages, or the release of online photos and videos. The service relies on a trusted executor confirming someone’s death, and after that releases these final messages effectively from beyond the grave. If I Die is a similar service, which also has an integrated Facebook application which ensures a user’s final message is directly displayed on their Timeline. In a bizarre promotional campaign around a service called If I Die First, the company is promising that the first user of the service to pass away will have their posthumous message delivered to a huge online audience, via popular blogs and mainstream press coverage. While this is not likely to appeal to everyone, the notion of a popular posthumous performance of self further complicates that question of what social media can mean after death. Illustrating the value of social media legacies in a quite different but equally powerful way, the Lives On service purports to algorithmically learn how a person uses Twitter while they are live, and then continue to tweet in their name after death. Internet critic Evgeny Morozov argues that Lives On is part of a Silicon Valley ideology of ‘solutionism’ which casts every facet of society as a problem in need of a digital solution (Morozov). In this instance, Lives On provides some semblance of a solution to the problem of death. While far from defeating death, the very fact that it might be possible to produce any meaningful approximation of a living person’s social media after they die is powerful testimony to the value of data mining and the importance of recognising that value. While Lives On is an experimental service in its infancy, it is worth wondering what sort of posthumous approximation might be built using the robust data profiles held by Facebook or Google. If Google Now can extrapolate what a user wants to see without any additional input, how hard would it be to retool this service to post what a user would have wanted after their death? Could there, in effect, be a Google After(life)? Conclusion Users of social media services have differing levels of awareness regarding the exchange they are agreeing to when signing up for services provided by Google or Facebook, and often value the social affordances without necessarily considering the ongoing media they are creating. Online corporations, by contrast, recognise and harness the informatic traces users generate through complex data mining and analysis. However, the death of a social media user provides a moment of rupture which highlights the significant value of the media traces a user leaves behind. More to the point, the value of these media becomes most evident to those left behind precisely because that individual can no longer be social. While beginning to address the issue of posthumous user data, Google and Facebook both have very blunt tools; Google might offer executors access while Facebook provides the option of locking a deceased user’s account as a memorial or removing it altogether. Neither of these responses do justice to the value that these media traces hold for the living, but emerging digital legacy management tools are increasingly providing a richer set of options for digital executors. While the differences between material and digital assets provoke an array of legal, spiritual and moral issues, digital traces nevertheless clearly hold significant and demonstrable value. For social media users, the death of someone they know is often the moment where the media side of social media – their lasting, infinitely replicable nature – becomes more important, more visible, and casts the value of the social media accounts of the living in a new light. For the larger online corporations and service providers, the inevitable increase in deceased users will likely provoke more fine-grained controls and responses to the question of digital legacies and posthumous profiles. It is likely, too, that the increase in online social practices of mourning will open new spaces and arenas for those same corporate giants to analyse and data-mine. References Albrechtslund, Anders. “Online Social Networking as Participatory Surveillance.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/article/view/2142/1949›. boyd, danah. “Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence.” Convergence 14.1 (2008): 13–20. ———, and Kate Crawford. “Critical Questions for Big Data.” Information, Communication & Society 15.5 (2012): 662–679. Carroll, Brian, and Katie Landry. “Logging On and Letting Out: Using Online Social Networks to Grieve and to Mourn.” Bulletin of Science, Technology & Society 30.5 (2010): 341–349. Doyle, Warwick, and Matthew Fraser. “Facebook, Surveillance and Power.” Facebook and Philosophy: What’s on Your Mind? Ed. D.E. Wittkower. Chicago, IL: Open Court, 2010. 215–230. Facebook. “Deactivating, Deleting & Memorializing Accounts.” Facebook Help Center. 2013. 7 Mar. 2013 ‹http://www.facebook.com/help/359046244166395/›. Gerlitz, Carolin, and Anne Helmond. “The Like Economy: Social Buttons and the Data-intensive Web.” New Media & Society (2013). Google. “Accessing a Deceased Person’s Mail.” 25 Jan. 2013. 21 Apr. 2013 ‹https://support.google.com/mail/answer/14300?hl=en›. ———. “What Happens to YouTube If I Delete My Google Account or Google+?” 8 Jan. 2013. 21 Apr. 2013 ‹http://support.google.com/youtube/bin/answer.py?hl=en&answer=69961&rd=1›. Halavais, Alexander. Search Engine Society. Polity, 2008. Hof, Robert. “Facebook Makes It Easier to Target Ads Based on Your Shopping History.” Forbes 27 Feb. 2013. 1 Mar. 2013 ‹http://www.forbes.com/sites/roberthof/2013/02/27/facebook-makes-it-easier-to-target-ads-based-on-your-shopping-history/›. Kaleem, Jaweed. “Death on Facebook Now Common as ‘Dead Profiles’ Create Vast Virtual Cemetery.” Huffington Post. 7 Dec. 2012. 7 Mar. 2013 ‹http://www.huffingtonpost.com/2012/12/07/death-facebook-dead-profiles_n_2245397.html›. Kelly, Max. “Memories of Friends Departed Endure on Facebook.” The Facebook Blog. 27 Oct. 2009. 7 Mar. 2013 ‹http://www.facebook.com/blog/blog.php?post=163091042130›. Kern, Rebecca, Abbe E. Forman, and Gisela Gil-Egui. “R.I.P.: Remain in Perpetuity. Facebook Memorial Pages.” Telematics and Informatics 30.1 (2012): 2–10. Marwick, Alice, and Nicole B. Ellison. “‘There Isn’t Wifi in Heaven!’ Negotiating Visibility on Facebook Memorial Pages.” Journal of Broadcasting & Electronic Media 56.3 (2012): 378–400. Morozov, Evgeny. “The Perils of Perfection.” The New York Times 2 Mar. 2013. 4 Mar. 2013 ‹http://www.nytimes.com/2013/03/03/opinion/sunday/the-perils-of-perfection.html?pagewanted=all&_r=0›. Pariser, Eli. The Filter Bubble: What the Internet Is Hiding from You. London: Viking, 2011. Phillips, Whitney. “LOLing at Tragedy: Facebook Trolls, Memorial Pages and Resistance to Grief Online.” First Monday 16.12 (2011). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/3168›. Roosendaal, Arnold. “We Are All Connected to Facebook … by Facebook!” European Data Protection: In Good Health? Ed. Serge Gutwirth et al. Dordrecht: Springer, 2012. 3–19. Rudin, Ken. “Actionable Analytics at Zynga: Leveraging Big Data to Make Online Games More Fun and Social.” San Diego, CA, 2010. Vaidhyanathan, Siva. The Googlization of Everything. 1st ed. Berkeley: University of California Press, 2011. Westlake, E.J. “Friend Me If You Facebook: Generation Y and Performative Surveillance.” TDR: The Drama Review 52.4 (2008): 21–40. Zimmer, Michael. “The Externalities of Search 2.0: The Emerging Privacy Threats When the Drive for the Perfect Search Engine Meets Web 2.0.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/2136/1944›. ———. “The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance.” Web Search. Eds. Amanda Spink & Michael Zimmer. Berlin: Springer, 2008. 77–99.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography