Dissertations / Theses on the topic 'Ontological security'

To see the other types of publications on this topic, follow the link: Ontological security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Ontological security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Alexandersson, Robert. "Taiwan In Sino-American Relations : An Ontological Security Study." Thesis, Högskolan i Halmstad, Sektionen för hälsa och samhälle (HOS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22947.

Full text
Abstract:
The purpose of this thesis is to explain why China put so much emphasizes on the Taiwan issue in their relations with the U.S. This will be explored by looking at what elements are affecting the commitment to the Taiwan question in Sino-American relations and how this can be explained by using ontological terms such as "rooted identity" and "significant others". Two key elements has been identified to analyze this; victimization and legitimacy. To evaluate the subject two research questions will be used; how can legitimacy and victimization explain China’s commitment to the Taiwan question when it comes to Sino-American relations? What is the connection between legitimacy, victimization and the PRC’s rooted identity? Policy-statement and official documents will be used to sheed light on the Taiwan-questions affects on Sino-American relations from an ontological security theory perspective. The thesis will argue that the PRC’s early history has great effects on their commitment to this issue and that legitimacy and victimization is affecting China’s commitment to Taiwan to the extent that it cannot accept an independent Taiwan. Hence this issue will continue to have great impact on China’s foreign relations, especially with the U.S. However, despite strong rhetoric’s China does not necessarily need to achieve unification with Taiwan in the near future.
APA, Harvard, Vancouver, ISO, and other styles
2

Krüger, Katharina. "Ontological Security of Women : The Role of Digital Feminist Activism." Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-89032.

Full text
Abstract:
Ontological Security Studies have been grounded on the ideas of Giddens (1991a,b). It describes how humans can face challenges of the modern world without being overwhelmed by anxieties. Since then many scholars such as Steele (2008) and Mitzen (2006) have developed his ideas furthermore. However, ontological security still lacks in terms of gender aspects (Kinnvall and Mitzen, 2016), individual security seeking (Croft and Vaughan-Williams, 2016) or the role of community rather than the state to secure ontological security (Berenskoetter, 2012). This thesis focusses on all three themes when analysing how women use mechanisms to strengthen their ontological security within the online community. Feminism is a strategy for women to build a common identity. Women used the #metoo to share their experience of sexual harassment and anxieties in a gender-hierarchical power system. Human development and security is not only physical security but includes living in freedom of fear, want and in dignity. Threats which challenge systems of believe, such as living in an equal world or living without fear, lead to ontological insecurity. Therefore, women look out for new routines which provide security. Drawing on existing scholarship, this thesis aims to undercover if digital feminist activism can be a source for women to gain ontological security when the state fails to provide it. A social constructivist approach is followed within the research. The aim is to acknowledge the experience and practices of the different perspectives: by female activists and women opposed to feminist movements. Therefore, the empirical basis of this study contains 198 Twitter posts which are sampled out of 6679 posts. A content analysis helped to understand the dynamics of online behaviour and furthermore, puts it into the context of their everyday experience.
APA, Harvard, Vancouver, ISO, and other styles
3

Ralston, Robert James. "Ontological Security: State Identity and Self-Image in the Digital Age." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/76785.

Full text
Abstract:
The driving argument of this thesis is that states, particularly the United States, are vulnerable in cyberspace for reasons that go beyond the material vulnerabilities that present studies on state insecurity in cyberspace focus on. This vulnerability in cyberspace is an ontological insecurity. Ontological insecurity reveals itself in the contradictions in official state discourse regarding cyberspace. State security of self—preserving and maintaining the seemingly concrete and consistent nature of what a state is about, how the state is understood in relation to other states, and how the state comes to understand itself through its own conceptions of self-identity—is challenged by cyberspace as a vehicle for massive amounts of information and challenges to state identity in relation to the state's behavior in cyberspace. Therefore, state identity and self-image are challenged in relation to cyberspace in two ways: first, through the vehicle that is cyberspace, and, second, through the practices that the state adopts to secure cyberspace and its broader security aims. The language that states, in this case the United States, use in order to justify surveillance practices and to impose meaning to cyberspace ultimately leads to projections of power that attempt to reinforce state strength and legitimacy vis-à-vis cyberspace, but these attempts fall short; contradictions arise in state discourse, and weaknesses are highlighted through these contradictions. Cyberspace, then, is an ontological as well as physical security threat to states.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
4

McGoldrick, John. "Ontological security and identity work : a case study of management consultancy." Thesis, University of Bristol, 2017. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738559.

Full text
Abstract:
This thesis explores a core concept in the social sciences, ontological security, and seeks to demonstrate its relevance to management and organization studies. Following Giddens (1984, 1991), ontological security is seen as a system of basic trust in oneself which offers a resource for meaningful continuity in self-identity, albeit one always open to disruption. However, the view, almost naturalised in critical management studies is that such security will only ever be fleeting, temporary and futile (Knights and Clarke, 2014) and that it is ontological insecurity that lies at the heart of work place relations and regulation (Alvesson and Willmott, 2002) is challenged. In addition, the research contributes to identity work theory by drawing on a Ricoeurian lens of the continuity and mobility of identity to differentiate between significant contexts of identity work. These are linked to identity regulation and processes of resistance and identity assertion and repair that can represent moments of micro-emancipation as well as resources to support future identity work. These dynamics are explored in the empirical context of individuals in the field of management consultancy in the UK, using an adapted learning history method (Roth and Kleiner, 1998) as a form of dialogical narrative analysis. This approach is shown to support two additional objectives of this research – heightened critical reflection among participants and avoiding a monopolisation of voice by the researcher.
APA, Harvard, Vancouver, ISO, and other styles
5

Hiscock, Rosemary Esther. "The relationship between housing tenure and health : does ontological security play a role?" Thesis, University of Glasgow, 2001. http://theses.gla.ac.uk/6146/.

Full text
Abstract:
Previous research in the UK and elsewhere has found that housing tenure (i.e. whether the dwelling is owned or rented) predicts mortality and morbidity. This thesis aims to explain whether ontological security (a long term tendency to believe things are reliable and secure as opposed to threatening) is more likely to be associated with owner occupation, and therefore whether it helps to explain the observed association with tenure and health. For the purposes of this study ontological security was operationalised as being formed of three components: protection, autonomy and prestige. A scale was devised to measure ontological security arising from the home through these three components. This scale was included in a postal survey that also included questions on health, housing area, psychological and sociodemographic characteristics. The postal survey was sent to a random sample of adults in the West of Scotland and nearly 300 completed questionnaires were returned. I found that ontological security was associated with owner occupation but not independently of features of housing. Ontological security was not independently related to housing tenure itself. Owner occupiers reported more ontological security from their homes because their homes were in better condition, situated in better areas and of higher value than social renters. Ontological security appeared to be related to health particularly through psychological characteristics. Other reasons for the associations between tenure and health were that owners were on average younger and richer than social renters. This study suggests that social meaning per se may not be health damaging, but that social rented homes might put their occupants at greater health risk because they are in poorer condition, located in more poorly resourced and problem ridden areas and of lower status. These features of social renting may also be observed in other countries (e.g. USA).
APA, Harvard, Vancouver, ISO, and other styles
6

Charoenvattananukul, Peera. "Ontological security and status-seeking : Thailand's proactive behaviours during the Second World War." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/278717.

Full text
Abstract:
The puzzle that drives this study is why Thailand pursued a proactive foreign policy towards greater powers during the Second World War. The main literature on Thai foreign policy-making generally suggests that Thailand is traditionally passive vis-à-vis greater powers. Oftentimes, it is believed that the fate of Thailand is subjected to the dictate of great powers. The empirical cases of Thailand during the Second World War suggest otherwise. How could a conventional understanding of Thai foreign policy make sense of Thailand’s war against France in 1940-41? Similarly, how could one understand Thailand’s defiant behaviours vis-à-vis Japan in 1941-44 despite the latter’s greater military capabilities and influence? This thesis employs the approaches of ontological security and status concern to interpret Thai proactive behaviours during the wartime period. It argues that concerns for status and recognition from the great powers were the primary motivations of Thailand’s proactive behaviours. In order to discern material and ideational motives of the Thai foreign policy-makers, this research heavily relies on archival research and utilises documents which were formerly considered to be classified. This methodological quest is to establish and enhance the credibility of the argument presented in the study.
APA, Harvard, Vancouver, ISO, and other styles
7

Harries, Tim. "Householder responses to flood risk : the consequences of the search for ontological security." Thesis, Middlesex University, 2008. http://eprints.mdx.ac.uk/13589/.

Full text
Abstract:
As the recent floods in the UK have shown, most householders in at-risk areas are not prepared for floods. In fact, even amongst those who know they are at risk, less than 10% have taken any practical steps to prepare for flooding. This research attempts to explain that phenomenon by examining the effects of the rhetorical strategies that lay-people employ to help them cope with household flood risk. Looking at at-risk householders who have been flooded, as well as at those who have not, it combines close textual analysis of spoken interviews with secondary analysis of survey data to identify the rationalities that structure lay-people's talk and behaviour on the issue of flood risk. The low take-up of mitigation measures, it concludes, can be explained by the fact that householders prioritise the reduction of anxiety over the reduction of the risk of physical harm. Anxiety is familiar, predictable and causes immediate harm; flooding is unfamiliar to most residents, is unpredictable and is represented as difficult to control. As a result, householders eschew mitigation measures if they are uncertain of their efficacy and if they feel they will make them more anxious. Instead, they choose to protect a representation of life that enables them to feel secure. If state agencies are to influence householder responses to flood risk, it is suggested, they need to understand this rationale and to work with it. In order to increase the take-up of mitigation measures they should minimise the anxiety associated with taking mitigation measures - avoiding messages that provoke fear responses, making flood risk mitigation seem a normal part of home security and providing householders with individually tailored advice so that they feel less anxious about making a mistake when they choose which measures to implement.
APA, Harvard, Vancouver, ISO, and other styles
8

Fontenele, Marcelo Paiva. "Designing a method for discovering expertise in cyber security communities : an ontological approach." Thesis, University of Reading, 2017. http://centaur.reading.ac.uk/71325/.

Full text
Abstract:
Cyber security aims to protect our connected society from threats affecting services that rely on cyberspace. The pervasive nature of those threats requires a collaborative engagement in which a heterogeneous set of stakeholders request or provide security services. One of the major challenges in current cyber security initiatives is to place skilled people wherever needed whilst reducing the overall knowledge gap. Thus, in order to orchestrate roles in such a complex and dynamic environment, a novel approach to discover talent within the cyber security community is required. This PhD research addresses this challenge by devising a conceptual model and an ontological methodology, which aids a robust discovery of the fittest expertise driven by the specific needs of cyber security projects, as well as benchmarking expertise shortages. Talent management, knowledge management and organisational modelling theories provide the theoretical foundations upon which the cyber security community is articulated. Mixed methods were performed within a cyber security community to triangulate findings in the literature, test the method and appraise the solution. The method for discovering expertise in cyber security communities (DECYSE) is capable of delivering a seamless solution for processes involving expertise discovery. This method enables learning from previous projects; supports selection, ranking and assessment of experts according to specified requirements in a project profile; and provides indicators to measure knowledge gaps and shortages in the cyber security community. The DECYSE method is robust and underpinned by analytical techniques, considering complex interactions and perspectives from the actors involved. In order to promote ongoing improvement on the method itself, this thesis also details the conceptual model which articulates the requirements for developing DECYSE. A round of experiments was successfully conducted, where a team of three experts, out of sixty-six participant profiles, met the criteria in a cyber security project. The method was also positively appraised by a board of experts working with strategic CS projects. DECYSE enables ongoing improvement and contributes to both theory and the cyber security community.
APA, Harvard, Vancouver, ISO, and other styles
9

Kirke, Alexander Tom Sebastian. "Political myth and the need for significance : finding ontological security during times of terror." Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/3707.

Full text
Abstract:
This thesis offers a novel theoretical framework for analysing how political and media elites invoke political myths following terror attacks. It does not define political myths as necessarily false claim or untrue stories, but instead draws on the existentialist approaches of Hans Blumenberg and Chiara Bottici to argue that they are form of dramatic narrative that answers human needs for significance (Bedeutsamkeit). Human beings require significance to live in a world that is otherwise indifferent to them or, as Martin Heidegger put it, they are “thrown” into. The thesis thereby connects modern literature on political myth to concept of Angst, most prominently discussed by Søren Kierkegaard and expanded upon by later existentialist philosophers. The thesis elaborates on this with the novel insight that the process of finding significance is also an act of constructing ontological security, and that this is particularly apparent in times of crisis. Following the works of Anthony Giddens and Stuart Croft, the thesis defines ontological security as a condition in which people have constructed a sense of biographical continuity, have a strong web of trust-relations, and are able to avoid Angst. The thesis argues that terror attacks are moments where ontological security (not just physical security) is under threat, and that the process of finding significance (Bedeutsamkeit) through the work on myth simultaneously (re)establishes ontological security. It focuses on two empirical examples: the 7th July 2005 bombings in London and the 2013 Murder of Fusilier Lee Rigby. Following these terror attacks, senior political figures and media commentators invoked a political myth which portrayed the United Kingdom as embroiled in an existential conflict with violent radical Muslims inspired by a warped interpretation of Islam. The thesis concludes that its novel theoretical framework can enable an understanding of discursive responses to other terror attacks across the globe.
APA, Harvard, Vancouver, ISO, and other styles
10

Chaplin, Aliviah N. "The Ontological Security Complex: The Impact of System Altering Events on States’ Existential Identities." Ohio University Honors Tutorial College / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1556210264741664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Bolton, Derek. "Identity maintenance & foreign policy decision-making : the quest for ontological security in the DPRK." Thesis, University of Bath, 2018. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.760979.

Full text
Abstract:
This thesis analyzes how the need for ontological security (OS), the ‘security of being’,impacts the foreign policy decision-making of states. Traditional security studies focus primarily on physical threats to the state. By contrast, an OS framework argues individuals feel secure when they are able to maintain communal narrative. This narrative in turn becomes the lens through which policymakers, and thus states, analyze events, while also becoming a potential source of conflict if challenged. Therefore, while physical security is still important, one is better positioned to account for perceptions of physical (and non physical) threats, and subsequent policies seemingly contradictory to traditional security studies, by employing an OS framework. While this will be explored within the context of the DPRK, the applicability of such a framework is far greater, holding key insights for International Relations and Foreign Policy Analysis (FPA). DPRK narrative formed out of the postcolonial nationalism of Japanese occupation, culminating into the hyper-nationalist ideology of Juche. North Korea’s seemingly ‘abnormal’ behavior might in turn be indicative of its unique national narrative and history of colonization and humiliation, leading to a different set of behavioral expectations than states whose narratives do not encompass such stories or reference points. While not all states are expected to act in the same manner as North Korea, the framework would expect them to defend and promote their respective national narratives. Moreover, while narratives can double as sources of legitimacy, as seen increasingly in the DPRK, this in no way detracts from, and merely compounds, the emphasis on narrative maintenance. Examining the historical record, it is argued the OS framework is consistently better at accounting for DPRK policies than traditional security studies. Therefore, more broadly in FPA, by taking seriously group narrative as a key component of OS, one can better account for perceptions and foreign policy decision-making.
APA, Harvard, Vancouver, ISO, and other styles
12

Williams, Rebecca Sian. "Television fan distinctions and identity : an analysis of 'quality' discourses and threats to 'ontological security'." Thesis, Cardiff University, 2008. http://orca.cf.ac.uk/55778/.

Full text
Abstract:
This thesis contributes to the existing literature in fan and audience research, particularly within television studies. By focusing upon issues of identity, ontological security, and cultural value, this thesis proposes a conceptualisation of fandom which accounts for inherent dualisms such as the tension between community and hierarchy, and the internal importance of fandom to individuals and the impact of external social factors. Whist prior work has failed to adequately theorise such contradictions, this thesis draws on the work of sociologists Pierre Bourdieu and Anthony Giddens to propose that we view fandom as forms of 'pure relationship' which enable fans to negotiate their self-identities, gain trust and comfort, and accrue levels of fan power. These ideas are demonstrated via empirical data generated by a cross comparative multi fandom case study of three online fan communities devoted to the television programmes Big Brother UK7, Neighbours, and The West Wing. This thesis demonstrates that fans across different fandoms make distinctions regarding the 'quality' of their chosen fan objects, those who create them, and the position of fellow fans. They also rely upon the routines and repetitions of television scheduling to provide them with ontological security and a sense of trust in the fan object. This thesis also examines the results when this trust is undermined by unwelcome narrative developments or the total cessation of the fan object, which this work uniquely theorises as 'post-object fandom'. Furthermore, fan practices are enacted within the specific arena of the broadcasting field, and this thesis situates the battles over fan objects between producers and fans within the context of this field. Thus, this thesis proposes a theoretical model which considers fandom as a community and a hierarchical site of struggles over power and capital, accounts for the internal impact of an individual's fandom on their sense of self, and treats fan/object and fan/fan relationships equally.
APA, Harvard, Vancouver, ISO, and other styles
13

Byg, Reed Lauren. "Sprawling Fields and Food Deserts: An ontological exploration of food and farming systems in Ohio." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/99295.

Full text
Abstract:
Ohio is one of the largest agricultural producers in the United States and yet Ohioans experience food insecurity at a rate two percent higher than the national average. An analysis of Ohio's agricultural sector in relation to the current global food system suggests that the neoliberal imaginary orders social and ecological relations at both the international and domestic levels. This ordering perpetuates and justifies the continued exploitation of both labor and land and is based on ontological separation of human and ecological systems. This imaginary has given rise to the framework of food security, which has become the singular framework under which solutions to food and climate challenges are outlined by both local policy makers and major development and agricultural organizations. This effectively limits the possible solutions to only those solutions that fit within this imaginary. In considering the continued prevalence of food insecurity in both national and international contexts, it is necessary to explore other avenues for proposing solutions to the current food challenges, which will only grow as the impacts of climate change worsen. Food sovereignty, more specifically urban food sovereignty, offers an alternative ontological framework that expands the realm of possible solutions to food insecurity as a feature of the food sovereignty movement's recognition of multiple ways of being.
Master of Arts
Ohio is one of the largest agricultural producers in the United States and yet, Ohioans experience food insecurity at a rate two percent higher than the national average. An analysis of Ohio's agricultural development in relation to the rise of the current global food system illustrates the ideological connections between the two systems, and the dependencies of these systems on the continued exploitation of both land and labor. Thus, these systems and the food security framework that has arisen from the same ideology or imaginary, can only provide limited solutions to food insecurity at the national or international level. The solutions that have been proposed and implemented under the security framework maintain dependency and vulnerability of insecure populations. As the impacts from climate change worsen and threaten to disrupt food systems, there is the need to move away from the food security framework towards a framework of food sovereignty and the incorporation of urban spaces into the solutions proposed.
APA, Harvard, Vancouver, ISO, and other styles
14

Andreasson, Emelie. "All in the name of security : A qualitative content analysis regarding the concept of security in the movie Zero Dark Thirty." Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-7100.

Full text
Abstract:
This study explores how the concept of security is presented in current American action movies.This study will use the movie Zero Dark Thirty as an illustrative example to examine the concept ofsecurity during the ’War on Terror’-era. The study will use qualitative content analysis in order toexamine the concept of security.
APA, Harvard, Vancouver, ISO, and other styles
15

von, Essen Hugo. "A typology of ontological insecurity mechanisms : Russia's military engagement in Syria." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-431593.

Full text
Abstract:
The concept of ontological security has grown extensively in the International Relationsliterature, owing to the new explanations it generates for states’ security- and identity-relatedbehavior. In the process, however, the concept has become sprawling, vague and incoherent,due to the multitude of different understandings of the concept. To improve the concept’sadequacy, counter the risk of conceptual stretching, and provide the foundation for a commonresearch agenda, this essay constructs a typology to divide and classify the ontological securityliterature in IR. The typology’s main contribution is the dimension of ontological insecuritymechanisms, understood as the different ways that the ontological security of an agent can bethreatened, and the different types of existential anxieties that follow. To test and illustrate thistypology, the essay conducts an empirical case study of Russia’s engagement in the conflict inSyria since 2015. The results strongly indicate the presence of all ontological insecuritymechanisms, thus clearly implying that Russian behavior in Syria is driven by ontologicalsecurity concerns. The findings also demonstrate the typology’s usefulness and fruitfulness inmore closely specifying the nature of the ontological insecurity in particular cases.
APA, Harvard, Vancouver, ISO, and other styles
16

Krasnodębska, Maria. "The politics of stigmatization : Poland as a 'latecomer' in the European Union." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/276915.

Full text
Abstract:
The accession into NATO and the EU, from the perspective of the new Central and Eastern European members, symbolized their ‘return to Europe’. However, as the former outsiders have become insiders, they have become subjected to a new form of hierarchy. This is even reflected in international relations literature that studies the socialization of the new members into ‘European’ or ‘Western’ states (Checkel 2005; Gheciu 2005; Schimmelfennig and Sedelmeier 2005, etc.). The new members continue to be perceived as geographically and culturally on the ‘verge of Europe’, ‘not quite European’ or ‘in transition’ (Wolff 1994; Kuus 2004a; Mälksoo 2010; Zarycki 2014). Their status as ‘latecomers’ in Western institutions has become a stigma. This dissertation asks how stigmatization and subjection to tacit hierarchies, constructed through discourse, affect a state’s foreign policy. It focuses on the East-West relation in the European Union as one example of a hierarchy within this community of states. This dissertation looks at Poland’s foreign policy in the EU. Analytically, I build on the concept of strategic culture, a set of collective, historically shaped ideas and norms guiding a state’s pursuit of security. I go beyond the existing literature to argue that the guiding principle of a state’s strategic culture is the pursuit of not just physical but ontological security, which refers to stable subjectivity (Giddens 1991; Kinnvall 2004; Mitzen 2006a; Zarakol 2010). The recognition as a full member of the ‘Western’ and ‘European’ identity community is essential for Poland’s ontological security. This dependence on recognition makes Poland particularly sensitive to stigmatization within that community. In three case studies, the 2003 Iraq crisis, the 2008 Russo-Georgian war, and the 2013/4 Ukraine crisis, I study how its ‘latecomer’ stigma, and quest for recognition as a full-fledged member of ‘Europe’, and the ‘West’, affects Poland’s foreign policy. I show how Polish foreign policy-makers alternate between two possible responses to stigmatization, adaptation and contestation, and how, paradoxically, both of these strategies often reinforce stigmatization.
APA, Harvard, Vancouver, ISO, and other styles
17

D'Adamo-Damery, Philip Carl. "Ontological Possibilities: Rhizoanalytic Explorations of Community Food Work in Central Appalachia." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/51247.

Full text
Abstract:
In the United States, the community food movement has been put forward as a potential solution for a global food system that fails to provide just and equitable access to nutritious food. This claim has been subject to the criticism of a variety of scholars and activists, some of whom contend that the alternative food movement is complicit in the re-production of neoliberalism and is therefore implicated in the making of the unjust system. In this dissertation I use theories of Deleuze (and Guatarri) and science and technology scholars to enter the middle of this dichotomy. I argue that both readings of community food work, as just and unjust, rely on realist epistemologies that posit knowledge as representative of an existing reality. I alternatively view knowledge as much more contingent and plural, resulting in a multiplicity of realities that are much less fixed. The idea that reality is a product of knowledge, rather than the inverse, raises the question of how reality might be made differently, or of ontological politics. This is the question I set out to interrogate: how might the realities of community food work be read and made differently, and how this reading might open new possibilities for transformation? To explore this question, I conducted interviews with 18 individuals working for three different non-profit community food organizations in central Appalachia. I used and appreciative inquiry approach to capture stories that affected these individuals' stories about their work captured their visions and hope for food system change. I then used a (non)method, rhizoanalysis, to code the data affectively, reading for the interesting, curious, and remarkable, rather than attempting to trace a strong theory like neoliberalism onto the data. Drawing on Delueze and Guattari, I mapped excerpts from the data into four large narrative cartographies. In each cartography, the narrative excerpts are positioned to vibrate against one another; my hope is that these resonances might open lines of flight within the reader and space for new ontological possibilities. For adult and community educators, I posit this rhizoanalysis as a poststructuralist contribution to Freire's concept of the generative theme and of use to broader project of agonistic pluralism.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
18

Paredes, Julie-Ann. "Reading Race: A study of reading as an approach to changing racial consciousness." Thesis, The University of Sydney, 2017. http://hdl.handle.net/2123/18125.

Full text
Abstract:
Ongoing inequality persists in Australia between Aboriginal and non-Aboriginal populations. While traditional forms of government programs have been implemented for many decades there has been no meaningful change to the statistics, referred to in common vernacular as “the Gap”. This research proposes a different approach: one which has as its focus non-Indigenous Australians’ race consciousness. The question is how race consciousness can be changed. This study investigates how reading might work as a means of change. This is examined through the lens of readers in book clubs. A study was conducted in two phases. In the first phase seven interviews were conducted with members of a reading group in a metropolitan area which engaged in reading texts which only present engagement with Aboriginal issues. In the second phase, four book clubs meeting in a regional city read a common text concerned with settler/Aboriginal relations. Their group discussions were recorded, transcribed and analysed. This was followed by individual interviews with twenty-eight members of these groups. These were transcribed and analysed, and individual case studies prepared from six of them. While the text engendered anti-racist sentiments and empathy, these feelings could also be submerged within group peer pressure. These group and individual studies provided interesting data relating both to the initial problem and to the method itself.
APA, Harvard, Vancouver, ISO, and other styles
19

Nuth, Michael John. "Ontological Security and the Global Risk Environment: A Case Study of Risk and Risk Perception in the Tourist-Dependent Township of Akaroa." Thesis, University of Canterbury. Sociology and Anthropology, 2007. http://hdl.handle.net/10092/988.

Full text
Abstract:
This thesis is about global catastrophic risks and the conscious effect of such risks at the level of everyday life. Utilising R. D. Laing's concept of "ontological security", this thesis questions the extent to which risks that loom in the global environment cause a sense of ontological insecurity amongst individuals at the local-level. In addressing this question, this thesis responds to the theories of Ulrich Beck and Anthony Giddens who maintain that the contemporary age is marked both by the emergence of global risks that exist as the unintended consequences of modernisation and a greater sense of risk owing to how information about such risks is disseminated by the media. While no objection is made to the argument that the global environment has become more objectively threatening, this thesis questions whether individuals in fact perceive such threat in their daily lives. This argument rests on the view that global risks, in the main, lack a tangible dimension needed to elicit a sense of urgency. Seeking to ground the risk literature from the level of theoretical abstraction to that of lived experience, this thesis presents a case study of how risk is perceived in the tourist-dependent township of Akaroa. Despite the fact that New Zealand is generally seen as "safe" and "secure" and removed from the vicissitudes of global events, its economic reliance on international tourism ensures a susceptibility to external forces that disrupt global tourism flows. Given the recent publicity as to how such risks as climate change and peak oil may undermine international tourism in New Zealand, it is clear that areas that are particularly reliant on the international visitor market, like Akaroa, are significantly exposed to global events. This not only makes Akaroa an ideal case study in which to establish the extent to which global risks undermine ontological security in daily life, it also helps measure how seriously individuals in tourist-dependent areas consider the possibility of a substantial tourist decline.
APA, Harvard, Vancouver, ISO, and other styles
20

Dağlı, İlke. "Identities in limbo : securitisation of identities in conflict environments and its implications on ontological security : prospects of desecuritisation for reconciliation in Cyprus." Thesis, University of Warwick, 2016. http://wrap.warwick.ac.uk/91250/.

Full text
Abstract:
With the overall aim of contributing to the peace efforts in Cyprus and facilitating transformative peace on the island, this thesis explores the relationship between (de)securitisation, ontological security and reconciliation in protracted conflict environments. The theoretical framework is built upon this trilateral nexus and uses Cyprus as a single case study for its application. In line with the overall aim, the thesis improves to the theorisation of institutionalised securitisations by complimenting the Copenhagen School with the Paris School, enriches the concept of (de)securitisation with ontological security literature and broadens the dual-ethnic approach to the Cyprus Problem by adding the Turkish settlers/immigrants to the empirical analysis. Underpinned by both theoretical and empirical contributions to the relevant literature, the thesis provides a more nuanced understanding of identity and friend-enemy configurations by analysing the securitisation dynamics that go beyond the primary self to include other-others, other-selves and othered-selves through a strategic blend of quantitative and qualitative methods. Finally, the thesis suggests that we need to couple the concept desecuritisation with ontological security considerations in order to fully understand and explore its potential as a facilitating tool for transformative peace. More specifically for the case of Cyprus, the thesis argues that securitisation of Turkish immigrants as a threat creates ontological dissonance and peace-anxieties for the two main communities in Cyprus; thus, calls for their desecuritisation and inclusion in peacebuilding efforts.
APA, Harvard, Vancouver, ISO, and other styles
21

Lindstrand, Anton, and Tibella Morad. "Hur upplever behovsanställda sin livssituation? -En sociologisk studie med fokus på otrygghet och trygghetsskapande strategier." Thesis, Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-83436.

Full text
Abstract:
The swedish labour market has gone through an increasing flexiblization in part through an increase in insecure employment such as on-call employment. Research shows that these forms of employment have a number of negative consequences for example in the form of family life issues, economic worry, health issues and reduced life satisfaction. This essay investigates which sources of insecurity on-call employees experience and which strategies they use to feel safe. Six semi-structured interviews were performed with individuals using on-call employment as their primary source of income. This way the respondents own experiences and stories were explored. The analysis was primarily done through the terms ontological security with Anthony Giddens, the precariat from Guy Standing, The psychological contract and Lazarus and Folkman’s coping strategies. The result shows sources of insecurity primarily in the form of employment insecurity, economic insecurity and demand on availability. The respondents used strategies such as saving, adaptable routines, workplace participation and action aiming to achieve future safety such as continuous job searching and applying to education.
APA, Harvard, Vancouver, ISO, and other styles
22

Magnusson, Daniella. "Being attached to an unsustainable lifestyle : A case study on accounting for the persistence of high emission lifestyles using an Ontological Security Lens." Thesis, Linköpings universitet, Tema Miljöförändring, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177660.

Full text
Abstract:
To fully acknowledge the complexity of the climate change, responses to climate change needs to be redefined, taking into consideration social aspects.  In this study, I explored the social aspect of ontological security defined as a lens to understand high emission lifestyles. The aim of this study was to explore how ontological security helps to explain high emission lifestyles and explore what ontological security suggest in terms of policies addressing climate change emissions directed at high emission lifestyles. The study was conducted as a case study with a qualitative method where eight interviewees living in a high emission lifestyle region were selected from a combination of convenience and snowball sampling. The interviews were then analyzed based on the ontological security lens that was created before the interviews. The findings illustrate that being ontologically secure for people with high emission lifestyles could mean being attached to a lifestyle that is threatening the climate and that this attachment makes it hard to move away from unsustainable behaviours since that would risk reducing their ontological security. This indicates that their behavior is a cultural trait and ontological security show that the required change on individual level requires more than them just changing by individual choice. Based on the findings of the study, I argue that ontological security provides valuable insights within the social field of climate change and valuable insights in policy development.
APA, Harvard, Vancouver, ISO, and other styles
23

Ljusteräng, Johannes. "Ryssland: neutral, allierad, radikal : En studie om identitetskonstruktioner av Ryssland och ontologisk (o)säkerhet i svenska försvarspropositioner sedan kalla krigets slut." Thesis, Försvarshögskolan, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-8337.

Full text
Abstract:
The purpose of this thesis is to demonstrate the significance of identity as a driving force behind Swedish security policy change. By studying social identity constructions of Russia in Swedish defence propositions from 1992, 2004 and 2015, the thesis concludes that these constructions might have resulted in shifts in Swedish security policy. The thesis uses discourse analysis to examine how Russia was socially constructed as 'difference' in the propositions. Drawing on self/other theories in IR, the study concludes that Russia was constructed in more or less antagonistic forms of ‘otherness’/’difference’ in the different propositions. In 1992, Russia was constructed as a neutral other and a temporally radical other. In 2004, Russia was constructed as a connected other. In 2015, Russia was constructed as a radical other, mostly due to the Russian aggression against and annexation of Crimea. Moreover the article concludes, through a qualitative content analysis, that these perceptions of Russia may have generated ontological (in)security for Swedish political identity. Drawing on Mitzen (2006) and others, the thesis demonstrates that ontological (in)security may have been a driving force behind security policy change. This thesis argues that the search for ontological security may have resulted in European integration for Sweden in 1992, expanded cooperation with Russia in 2004 and a proposition on a strengthened defence capability in 2015. In relation to existing research on Swedish security policy change, this thesis highlights the importance of identity and perceptions of 'others' as a driving force behind security policy change.
APA, Harvard, Vancouver, ISO, and other styles
24

Bennett, Joshua. "The memory of the Holocaust as a point of state ontological (in)security : A comparative discursive analysis of the United Kingdom and Poland." Thesis, Uppsala universitet, Hugo Valentin-centrum, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-413283.

Full text
Abstract:
This thesis utilises the context of European Holocaust memory to test differences within the existing literature of the theory of ‘ontological security’. The differences centre on questions of identity preservation in the face of threats to a states ‘sense of self’. The paper builds a connection between theories within the field of collective memory and ontological security (a sub-field known as ‘mnemonic security’) and applies these to two case studies within the European context: the UK and Poland. These cases were chosen based on disparity of experience of the Holocaust within the European context in order to determine if these disparities may explain any potential variation in mnemonic security strategies. This is achieved with use of discourse analysis of state leader and representatives speeches (and other relevant discourse) given at Holocaust remembrance events in order to classify strategies in reference to the theoretical differences within the ontological security framework. It finds that differences in forms of memory exist, but their theoretical explanations within the framework are similar despite their disparities of experience. The thesis attempts to fill a gap of empirical evidence in regards to these arguments and in regards to discourse analysis of leader’s speeches and statements at said Holocaust remembrance events.
APA, Harvard, Vancouver, ISO, and other styles
25

Gonen, Hakan. "Japan." Phd thesis, METU, 2013. http://etd.lib.metu.edu.tr/upload/12615372/index.pdf.

Full text
Abstract:
This dissertation aims at exploring and analysing the effects of Japan&rsquo
s trust-based relations in the region of East Asia in the post-Cold War period within the framework of its anti-militaristic state identity and outlook. The main research question is based on how the Japanese policy makers constructed the meaning of the post-Cold War period, opening the ways and ideas to solidify the anti-militaristic state identity and posture. In this sense, Japan provides a significant case study for examining ontological security. The main argument of dissertation is based on building up Japan&rsquo
s ontological security structure in the regional context. Since the end of the Second World War, Japan has pursued an anti-militaristic state identity and posture. This attitude has been the guiding principle of Tokyo&rsquo
s foreign and security policy. In this dissertation, for the continuance of anti-militaristic identity successfully in the post-Cold War period, Japanese policy decision-makers have both configured and further sustained the country&rsquo
s trust-based relations with neighbouring countries in the region. This dissertation was analysed under the five main headings except the introduction chapter: (1) The historical background telling the story of anti-militaristic identity and posture of Japan, (2) Japan&rsquo
s emerging human security agenda in the Post-Cold War period, (3) Japan&rsquo
s cooperative initiatives at the regional level by focusing in particular on APEC and ARF. (4) Japan&rsquo
s relations with the significant others for its identity preservation. (5) The conclusions.
APA, Harvard, Vancouver, ISO, and other styles
26

Serper, Alan. "An analytical critique, deconstruction, and dialectical transformation and development of the living educational theory approach." Thesis, University of Bath, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.526626.

Full text
Abstract:
This thesis critically analyses, reconstructs and deconstructs the Living Educational Theory (LET) approach. It examines, challenges and modifies it, dialectically transforms it and offers a more suitable alternative to it. Whilst LET has not been well received in academia for two decades, this thesis is being written at a point in time when LET has greater recognition and influence. The thesis is composed of three parts. The first part examines and reconstructs the LET approach as a theoretical possibility and a practical methodological and heuristic approach. It introduces the LET approach and its key features, components, intentions and practices. It examines and interrelates the writings of the developers of that approach and its history and development. It also relates that approach to educational, action, reflective practice, practitioner and ontological research and the work and educational development of this author. The second part criticises, deconstructs and transforms the LET approach and proposes an alternative heuristic tool, solution and approach. It criticises the claim of living educational theorists that LET is an improved approach to the theorisation of a human existence and the educational, ontological, professional and epistemological development of practitioners. As well as criticising the new directions which the LET approach has recently taken, it introduces an alternative educational action research heuristic tool and approach that is based on self-dialectical reflective enquiry. The proposed alternative is based on creative and auto-phenomenological writing, self-dialectical and cathartic logging, public blogging and enquiring-within-writing logging into the question: how do I lead a more meaningful existence in the world for myself? It seeks to transform the LET approach into a deeper ontological, auto-phenomenological, and self-therapeutic auto-analysis, self-reevaluation and auto-empowerment. The third part concludes the thesis and reflects on my learning from my engagement with the LET approach and my hopes and intentions for the future.
APA, Harvard, Vancouver, ISO, and other styles
27

Steele, Aaron. "Ontological lockdown assessment : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Information Technology at Massey University, Palmerston North, New Zealand." Massey University, 2008. http://hdl.handle.net/10179/946.

Full text
Abstract:
In order to keep shared access computers secure and stable system administrators resort to locking down the computing environment in order to prevent intentional and unintentional damage by users. Skilled attackers are often able to break out of locked down computing environments and intentionally misuse shared access computers. This misuse has resulted in cases of mass identity theft and fraud, some of which have had an estimated cost ranging in millions. In order to determine if it is possible to break out of locked down computing environments an assessment method is required. Although a number of vulnerability assessment techniques exist, none of the existing techniques are sufficient for assessing locked down shared access computers. This is due to the existing techniques focusing on traditional, application specific, software vulnerabilities. Break out path vulnerabilities (which are exploited by attackers in order to break out of locked down environments) differ substantially from traditional vulnerabilities, and as a consequence are not easily discovered using existing techniques. Ontologies can be thought of as a modelling technique that can be used to capture expert knowledge about a domain of interest. The method for discovering break out paths in locked down computers can be considered expert knowledge in the domain of shared access computer security. This research proposes an ontology based assessment process for discovering break out path vulnerabilities in locked down shared access computers. The proposed approach is called the ontological lockdown assessment process. The ontological lockdown assessment process is implemented against a real world system and successfully identifies numerous break out path vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
28

Chernobrov, Dmitry. "The portrait of an other : metaphor, stereotype and the drawing self in international perceptions." Thesis, University of St Andrews, 2015. http://hdl.handle.net/10023/7066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Reitz, Annika. "Political Campaign Strategies of the party Alternative for Germany : A qualitative Study of Posters for the 2017 Federal Election." Thesis, Högskolan för lärande och kommunikation, Högskolan i Jönköping, HLK, Medie- och kommunikationsvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-44369.

Full text
Abstract:
During the past ten years, European politics experienced a rise of far right-wing parties because of intensified levels of insecurity among the public (Falasca & Grandien, 2017). These parties organize their political discourse around topics of nationalism and a strong opinion against immigration, the Euro and the European Union (Breeze, 2019; Häusler, 2018). One of these parties is the Alternative for Germany (AfD) which celebrated a major success in the federal elections in 2017 where it became the third largest party in the German Bundestag.   The present study aims to analyze the campaign posters of the AfD as one element of their strategic political communication for the 2017 election period in the context of the party’s growing popularity among German society. To accomplish that goal, the qualitative method of multimodal critical discourse analysis (MCDA) is applied. The MCDA analyzes written and visual content. The study seeks to identify the narratives implemented by the party and analyze them by drawing on the concept of nationalism. Furthermore, the analysis aims to identify the frames created around the main issues addressed in the party’s political agenda by discussing them in relation to the concepts of ontological security and existential anxiety by Giddens (1991) and the framing theory by Goffman (1974).   The study reveals that the AfD highlights in its political communication one main conflict: The German public versus the immigrants. The immigrants are framed as the threatening strange other whose cultural values, and religious beliefs contradict with those of the Germans who are depicted as the victims. This is achieved through the posters which seek to elicit fear and hatred towards the strange new to increase the insecurities perceived by the public. The party, on the contrary, represents itself as the savior of the German nation, its traditions, and values which they aim to maintain and protect from Muslim influence.
APA, Harvard, Vancouver, ISO, and other styles
30

Martinez, Strömberg Valentin Erik. "Greenland: The Master Shaper of the Arctic? : A study about making change happen." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-154347.

Full text
Abstract:
The Arctic region is changing. This is an oft-cited statement researcher, policy-makers and the general public say about the Arctic. But who can change the Arctic order? This academic paper is interested in determine Greenland’s role and ‘actorness’ in this changeable region. Adopting an interpretivist approach, I advocate to embrace the narrative turn in IR as a useful move to understand how Greenland, as a sub-state regional entity, can enhance its agency capacity in Arctic affairs. Using phronetical case study, govermentality and narrative analysis as main methodologies, this study decipher how the Arctic governance has changed and been shaped by different narratives and governmental practices. Greenland’s possibilities to exercise more power have been analysed through the lenses of ontological security theory because this theory is intimately related to human agency. However, this theory presents several challenges that must be overcome by doing a revision of the theory. The final results are discusses in a reflexive manner adopting four phronetical value-rational questions that policy-makers should take into account when planning any relevant strategic action, such as Greenland’s visibility and empowerment in Arctic affairs.
APA, Harvard, Vancouver, ISO, and other styles
31

Hanova, Selbi. "Understanding Central Asian cooperation through state narratives : cases of Kyrgyzstan and Turkmenistan." Thesis, University of St Andrews, 2017. http://hdl.handle.net/10023/11096.

Full text
Abstract:
This thesis examines the influence of state identity narratives on regional cooperation frameworks in Central Asia. It applies the perspectives of ontological security theory to the self-articulation of state identities of Kyrgyzstan and Turkmenistan to decipher socialization mechanisms in each of the cases. Consequently, it traces the routinization of the state narratives of Kyrgyzstan and Turkmenistan toward the region and regional organizations. Ontological security theory argues that, in addition to physical security, states seek ideational security, security of identity and security of being. Using a grounded theory approach to study the formation of the state narratives of Kyrgyzstan and of Turkmenistan and utilizing official and media sources and interviews conducted during fieldwork, the thesis analyzes the process of routinization of state identity narratives, showcasing the narrators, the narratives and the processes of self-articulation. The key process that is traced is the routinization of the state narratives, i.e. the sequence of repeated actions (inter-textualized through speech acts and textual references) that transform the self-articulated stories of the states into the realm of the habitual. This process of routinization is then analyzed within the regional context, examining how these routinized narratives influence inter-state cooperation in Central Asia. As such, the thesis contributes to two main bodies of literature: the growing literature on the ideational aspects of regional cooperation in Central Asia; and existing research on the role of state identification practices in the foreign policies of Central Asian states.
APA, Harvard, Vancouver, ISO, and other styles
32

WHITMORE, Margaret, and whittys2002@yahoo com au. "The search for character: servant-leadership in an Australian organisation." Edith Cowan University. Business And Public Management: School Of Business And Law, 2004. http://adt.ecu.edu.au/adt-public/adt-ECU2006.0003.html.

Full text
Abstract:
This study is in response to globalisation, changing world values and the call in modern literature for leaders of good character. Servant-leadership is offered to fill this requirement because its effectiveness is said to be reliant on the good character of the leader. In the literature this type of leadership is said to represent a new paradigm. The work of servant-leadership's proponent, Robert Greenleaf, is thoroughly examined to explain how his understanding of trust as faith is linked to spirituality and this is the key to understanding the character of servant-leaders. Greenleaf's work is compared with the modern servant-leadership literature and identifies a gap in the literature explaining Greenleaf's spirituality.This is a qualitative analysis using classical Grounded Theory and uses the work of Anthony Giddens to give it a modern sociological grounding. Classical Grounded Theory uses typologies or
APA, Harvard, Vancouver, ISO, and other styles
33

Gouveia, Tânia Maria de Oliveira Almeida. "Corporeidade e segurança ontológica no contexto padronizador do mercado." reponame:Repositório Institucional do FGV, 2013. http://hdl.handle.net/10438/11376.

Full text
Abstract:
Submitted by Tânia Maria Oliveira Almeida Gouveia (almeida.tania@globo.com) on 2013-12-16T13:21:25Z No. of bitstreams: 1 Tese - Tânia Maria de Oliveira Almeida Gouveia.pdf: 1262465 bytes, checksum: 59168773b7d37540985bb2b82ea64d65 (MD5)
Approved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2013-12-18T14:29:53Z (GMT) No. of bitstreams: 1 Tese - Tânia Maria de Oliveira Almeida Gouveia.pdf: 1262465 bytes, checksum: 59168773b7d37540985bb2b82ea64d65 (MD5)
Approved for entry into archive by Marcia Bacha (marcia.bacha@fgv.br) on 2014-01-02T19:02:35Z (GMT) No. of bitstreams: 1 Tese - Tânia Maria de Oliveira Almeida Gouveia.pdf: 1262465 bytes, checksum: 59168773b7d37540985bb2b82ea64d65 (MD5)
Made available in DSpace on 2014-01-02T19:23:53Z (GMT). No. of bitstreams: 1 Tese - Tânia Maria de Oliveira Almeida Gouveia.pdf: 1262465 bytes, checksum: 59168773b7d37540985bb2b82ea64d65 (MD5) Previous issue date: 2013-11-25
In this thesis, we talk about the socially constructed body, the body which is linked to subjectivity and to the identity ofthe individual, and which is impregnated by social and cultural elements. According to Giddens (2009), controlling the body is essential to the individual as to preserve what the author calls ontological security - which brings personal meaning to the individual's !ife and provides points of reference to help him carry on. In the consumer culture, appearance tends to be standardized; and, the cult of the body, among other things, has a selfindulgence appeal. Our main goal is to understand - within the context of normative aesthetics - the discourse and consumption practices of individuaIs in relation to their own bodies, identifying how it connects to their ontological security. In order to achieve this goal, we will: (a) understllIld how the individual sees hisl hers own body, assessing how it relates to their ontologicill'iecurity, (b) examine the presence ofthe market discourse in the tripod 'individualbody - ontological security', (c) identify and arialyze discursive elements as related to physical appearance; trying to understand the role of consumption in this context, (d) investigate the motivations that lead the individual to act, or not, in accordance to the aesthetic norm, analyzing body related consumer practices. The primary data collection was done through qualitative interviews. Respondents were men and women of varied professional activities, 18-50 years, belonging to classes A, B and C (ABEP, 2012), ali ofthem !iving in Rio de Janeiro. Field work was performed from October 2012 to July 2013. The data was ana1yzed using the approach of discourse analysis, considering the French school, particularly Pecheux's view. In line with authors such as Giddens (2002), Goffman (1978) and Schouten (1991), the research concludes that the body is an important part in the individual's notion of self and is also part of the construction of hislher identity. How the individual handles the market's normative message gives us c\ues about his ontological security. The ontologically secure individual is not one who dismisses the market and whose body related consumption practices escape the aesthetic norm. What differentiates a person whose ontological security is fragile is their motivation to adhere to certain stimu!i; and, how he/she deals with their consumer choices. We conclude that the individual with ontological security is less anxious about body related consumption options; and that he/she does not have somebody else's view of their body as a shadow when making decisions about their own appearance. In contrast, individuais without ontological security are more anxious when facing the market's message. There is, to a certain extent, anguish about not meeting these standards; and the body's aesthetic appearance becomes an important part oftheir lives.
Nesta tese, falamos do corpo construído socialmente, vinculado à subjetividade e à identidade do indivíduo e que está impregnado por elementos sociais e culturais. Para Giddens (2009), o controle do corpo é fundamental para que o indivíduo preserve aquilo que o autor chama de segurança ontológica – ou seja, para que ele tenha um sentido pessoal para a vida e pontos de referência que o ajudem a seguir adiante no cotidiano. Na cultura de consumo, sua aparência tende a ser normatizada e o culto ao corpo, entre outros aspectos, tem o apelo de autoindulgência. Nosso objetivo principal é compreender, dentro de um contexto de normatividade estética, o discurso e as práticas de consumo dos indivíduos em relação ao próprio corpo, identificando de que modo isso se conecta à sua segurança ontológica. Para alcançar esse objetivo, procuramos: (a) entender o olhar o indivíduo em relação a seu próprio corpo, avaliando de que forma isso tem relação com sua segurança ontológica; (b) examinar a presença do mercado no tripé indivíduo-corpo-segurança ontológica; (c) identificar e analisar elementos discursivos relacionados à aparência física, procurando entender o papel do consumo nesse contexto e (d) investigar as motivações que levam o indivíduo a agir ou não em conformidade com a norma estética, analisando as práticas de consumo relacionadas ao corpo. A coleta de dados primários foi feita por meio de entrevistas qualitativas. Foram entrevistados homens e mulheres, de atividades profissionais variadas, de 18 a 50 anos, pertencentes às classes A, B e C (ABEP, 2012), todos eles residentes no Rio de Janeiro. Este campo aconteceu no período de outubro de 2012 a julho de 2013. Os dados foram analisados a partir da abordagem de análise do discurso, considerando-se sua linha francesa e, particularmente a visão pecheutiana. Esta pesquisa conclui, em linha com autores como Giddens (2002), Goffman (1978) e Schouten (1991), que o corpo é algo importante na noção do indivíduo sobre si mesmo e faz parte de sua construção identitária. Além disso, a maneira como o sujeito lida com a mensagem normativa do mercado traz indícios sobre sua segurança ontológica. O indivíduo ontologicamente seguro não é aquele que descarta o mercado e cujas práticas de consumo relativas ao corpo fogem à norma estética. O que o diferencia daquele cuja segurança ontológica é frágil é sua motivação para aderir a determinado estímulo e a forma como ele lida com essas escolhas de consumo. Depreendemos que o indivíduo com segurança ontológica tem menos ansiedade em suas opções relativas ao corpo e não tem o olhar do outro como uma sombra quando toma decisões sobre sua própria aparência. Diferentemente, os indivíduos sem segurança ontológica são mais ansiosos diante da mensagem do mercado. Há, em algum grau, sofrimento quando não atendem a norma estética e, portanto, a aparência do corpo ganha um espaço importante em suas vidas.
APA, Harvard, Vancouver, ISO, and other styles
34

Simonyi, André. "Waiting for the Cows to Come Home: A Political Ethnography of Security in a Complex World. Explorations in the Magyar Borderlands of Contemporary Ukraine." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/26126.

Full text
Abstract:
This dissertation explores the ways in which the everyday (in)securities of people in southwestern Ukraine can illuminate our understanding of contemporary political life. Rather than using traditional units of analysis or given categories—the state, the individual, identity—the dissertation focuses on relations between people in and connected to a single village to develop a novel framework for analyzing politics and the political. The dissertation opens with an interrogation of the practical and theoretical challenges associated with current conceptualizations of security; our understanding of the political; and the role of ethnography in theorization and presents a research design meant to address those challenges. Drawing upon extensive participant-observation and other immersion-based research in a post-Soviet borderland wedged between Ukraine and Slovakia, and using an analytical tool I call “togetherness,” the thesis presents an ethnographic account of social interactions, economy, and authority in this largely Hungarian-speaking rural area. The third part of the dissertation applies the idea of an ontological shift and draws on complex systems and structuration theory (Luhmann and Giddens, respectively) to rethink the ethnographic analysis and to highlight relationships between structural and existential realms of political life. Here, the concept of security becomes central to the theorization, and the overall argument illuminates the intimate relationship between the idea of security and the political. Ultimately, this approach allows us to expand the scope of political ethnography: theorizing beyond thick description; integrating broader perspectives without losing the texture of the local; and developing an approach to research that can be replicated in other settings.
APA, Harvard, Vancouver, ISO, and other styles
35

Martimiano, Luciana Andréia Fondazzi. "Sobre a estruturação de informação em sistemas de segurança computacional: o uso de ontologias." Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-02102006-091853/.

Full text
Abstract:
Como a quantidade e a complexidade de informações disponíveis sobre incidentes de segurança é crescente, as tarefas de manipular e gerenciar essas informações tornaram-se bastante custosas. Diversas ferramentas de gerenciamento de segurança estão disponíveis para auxiliar os administradores. Essas ferramentas podem monitorar tudo que entra e saí de uma intranet, como os firewalls; podem monitorar o tráfego interno da rede para saber o que está acontecendo e detectar possíveis ataques, como os sistemas de detecção de intrusão (SDIs); podem varrer arquivos em busca de códigos maliciosos, como os antivírus; podem criar filtros de emails para evitar spams, vírus ou worms; ou podem varrer uma rede em busca de vulnerabilidades nos sistemas, como os scanners e os agentes móveis inteligentes. Essas ferramentas geram uma grande quantidade de logs com informações que são coletadas e armazenadas em formatos próprios e diferentes. Essa falta de um formato único para armazenar as informações de incidentes de segurança, faz com que o trabalho dos administradores fique ainda mais difí?cil, pois eles/elas devem ser capazes de entender todos esses formatos para identificar e correlacionar informações quando, por exemplo, há um ataque ou uma invasãoo em andamento. Esta tese descreve o projeto e o desenvolvimento de ontologias para representar em uma estrutura padronizada informações sobre incidentes de segurança. A ontologia desenvolvida é denominada OntoSec - Security Incident Ontology. Este trabalho cobre: (i) como utilizar ontologias para compartilhar e reusar informações sobre incidentes; (ii) como correlacionar incidentes por meio de ontologias; (iii) como facilitar a interoperabilidade entre diferentes ferramentas de segurança; (iv) a modelagem de um sistema de gerenciamento de incidentes com base na ontologia; e (v) o processo de avaliação da ontologia desenvolvida. Além disso, a OntoSec pretende apoiar as decisões gerenciais realizadas pelos administradores quando problemas de segurança acontecem, possibilitando que essas decisões sejam tomadas de maneira mais eficiente e eficaz
As the amount and the complexity of security incidents information have grown exponentially, managing and manipulating these information have become more expensive. Several security tools can be used to assist the administrators in performing these tasks. These tools can monitor what comes from Internet and goes to it, as the firewalls do; they can monitor the intranet traffic, as usually is done by an Intrusion Detection System (IDS); they can search for malicious codes in files or emails, as made by the antivirus; they can create filters to process spams, viruses or worms; or they can scan the intranet for vulnerabilities, as the scanners and the intelligent agents. These tools collect and store a great amount of information, using different formats. This lack of unique commonly agreed formats to store information about security incidents, make the administrators? job even harder, because they have to be able to understand all these formats to identify and to correlate information when, for instance, there is an attack or an invasion in progress. In this thesis I describe the design and development of ontologies to represent in a standard structure information about security incidents. The ontology developed is named OntoSec - Security Incident Ontology. This work covers: (i) how to use ontologies to share and reuse information about incidents; (ii) how to make it easier to correlate incidents; (iii) how to make it possible the interoperability amongs security tools; (iv) modeling of a security incident management system based on OntoSec; and (v) evaluation process of the ontology that has been developed. Besides that, the OntoSec aims to support the decisions made by the administrators when security problems happen, making the process more efficient and effective
APA, Harvard, Vancouver, ISO, and other styles
36

Ribeiro, de Azevedo Ryan. "CoreSec: uma ontologia para o domínio de segurança da informação." Universidade Federal de Pernambuco, 2008. https://repositorio.ufpe.br/handle/123456789/2120.

Full text
Abstract:
Made available in DSpace on 2014-06-12T15:54:41Z (GMT). No. of bitstreams: 2 arquivo1991_1.pdf: 2164656 bytes, checksum: 1155c56e11920c8db2f44538c0dec97f (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2008
Em ambientes corporativos e heterogêneos, o compartilhamento de recursos para a resolução de problemas é fortemente associado à segurança da informação. Um aspecto crítico a ser considerado para as organizações é a exigência de uma eficaz e eficiente aquisição e distribuição de conhecimento a respeito de riscos, vulnerabilidades e ameaças que podem ser, portanto, exploradas e causar incidentes de segurança e impactar negativamente nos negócios. Os diversos ambientes de atuação humana necessitam de meios transparentes para planejar e gerenciar problemas relacionados à segurança da informação. Há um aumento significativo na complexidade de se projetar e planejar segurança necessitando que meios de manipulação da informação sejam adotados. Para isso, esta dissertação propõe uma ontologia para este domínio de segurança computacional, denominada CoreSec. O estudo visa demonstrar que uma vez que o conhecimento é formalizado, é possível reusá-lo, realizar inferência, processá-lo computacionalmente, como também torna-se passível de comunicação entre seres humanos e agentes inteligentes. Nossa proposta considera que a segurança da informação será mais eficiente se esta for baseada em um modelo formal de informações do domínio, tal como uma ontologia, podendo ser aplicada para auxiliar as atividades dos responsáveis de segurança, na análise e avaliação de riscos, elicitação de requisitos de segurança, análise de vulnerabilidades e desenvolvimento de ontologias mais específicas para o domínio de segurança da informação
APA, Harvard, Vancouver, ISO, and other styles
37

Whitmore, Margaret R. "The search for character: Servant-leadership in an Australian organisation." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2004. https://ro.ecu.edu.au/theses/113.

Full text
Abstract:
This study is in response to globalisation, changing world values and the call in modern literature for leaders of good character. Servant-leadership is offered to fill this requirement because its effectiveness is said to be reliant on the good character of the leader. In the literature this type of leadership is said to represent a new paradigm. The work of servant-leadership’s proponent, Robert Greenleaf, is thoroughly examined to explain how his understanding of trust as faith is linked to spirituality and this is the key to understanding the character of servant-leaders. Greenleaf’s work is compared with the modern servant-leadership literature and identifies a gap in the literature explaining Greenleaf’s spirituality. This is a qualitative analysis using classical Grounded Theory and uses the work of Anthony Giddens to give it a modern sociological grounding. Classical Grounded Theory uses typologies or “created groups” to give meaning to the way in which participants view their circumstance. The application of Giddens’ work allows for the data analysis to incorporate the historical social context that has shaped the views of the participants. Greenleaf and Giddens share the same understanding of trust and this alignment of Giddens and Greenleaf permeates the work. Giddens identifies two types of trust, which this research has termed Reciprocal Trust, and Trust as Principle. The research gives an explanation of the two types of trust and argues that understanding Trust as Principle is the key to understanding new paradigm thought. It is also the key to understanding character in terms of servant-leadership character. The research for this thesis was carried out in an organisation that until recently had been a government entity and for the purpose of this research is given the fictitious name of Railcorp. The historical circumstances of Railcorp have led to major dysfunctions, which are inhibiting the business progress of the company. There is a crisis of culture and a crisis in leadership. There is evidence of servant-leadership existing in Railcorp and these leaders have a vital role in providing the new leadership required to take Railcorp forward.
APA, Harvard, Vancouver, ISO, and other styles
38

Colobran, Huguet Miquel. "A general-purpose security framework." Doctoral thesis, Universitat Autònoma de Barcelona, 2015. http://hdl.handle.net/10803/322814.

Full text
Abstract:
La Informàtica ha sofert grans transformacions al llarg de la seva curta història. Va començar amb grans màquines en entorns especialitzats i molt restringits i s'ha convertit en petits dispositius que formen part de la societat i la vida quotidiana de totes les persones. La seguretat ha estat una de les àrees més afectades per aquests canvis i ha sofert grans canvis també a nivell tecnològic. Per aquesta raó, creiem que la definició "tradicional" de la seguretat informàtica és insuficient, sobretot si tenim en compte les noves seguretats que han aparegut en altres àrees de coneixement. La definició actual prové dels anys 70 i la seguretat, al segle XXI, és conceptualment, teòrica i pràctica diferent. Per tant, l'objectiu principal d'aquesta tesi és revisar el concepte mateix de seguretat informàtica per tal de proposar una definició juntament amb un model genèric que permeti una implementació. Per tal d'aconseguir-ho es proposa un anàlisi del concepte. El mètode d'anàlisi es basa en mètodes conceptuals d'obtenció de coneixement utilitzats en l'enginyeria del coneixement. El model conceptual es realitza utilitzant el diagrama de classes (UML) com un llenguatge gràfic de representació. El mètode proposat s’aplica a un conjunt de fonts seleccionades prèviament, per tal d'obtenir el model. El model conceptual del concepte de seguretat s'expressa com un conjunt de conceptes i relacions entre conceptes. En base al model genèric proposat, es realitza una descripció formal del concepte de seguretat i, finalment, el model s'implementa per mitjà d'un sistema basat en el coneixement utilitzant una ontologia. En conseqüència, les contribucions principals de l'estudi són el desenvolupament d'una metodologia d'anàlisi conceptual i una definició de seguretat juntament amb el seu model genèric. El marc de seguretat està descrit en forma algebraica i també és possible implementar-lo utilitzant tecnologies com Java, proporcionant mètriques de seguretat. L'estructura de la tesi és la següent: A la part 1, es fa una aproximació teòrica del concepte de seguretat, posant especial atenció a altres disciplines no relacionades amb l'enginyeria. Es fa una aproximació històrica de l'estudi del concepte de seguretat, tenint cura d’aquells conceptes o models proposats pels experts en el camp de la seguretat (no exclusivament en el camp de la seguretat informàtica). La part 2 explica les eines que s'utilitzen per a construir el model. S’utilitzen eines de modelat conceptuals i de coneixement. Es defineix un mètode d'anàlisi i s'utilitza en el disseny del model. A la part 3 es proposa un model genèric de seguretat. L'objectiu és proposar un model integrador que inclogui moltes de les seguretat existents. A més es fa una formulació algebraica del model de seguretat. Finalment, la part 4 està dedicada a aplicar el model proposat en un escenari real. Això demostra que el model és operatiu i capaç de mesurar el nivell de seguretat.
Computer Science has undergone major transformations throughout its short history. It started with great machines and very restricted and specialized environments and It has become in small devices that are part of society and daily life of every person. Security has been one of the areas most affected by those changes and has undergone major changes in technology also. For this reason, we think that the “traditional” definition of computer security is narrow, especially if we consider the new securities that have appeared in other areas of knowledge. Current definition comes from the 70s and security, in the twenty-first century, is conceptually, theoretically and practically something different. Therefore, the main objective of this thesis is review the concept of computer security itself in order to propose a definition together with a framework model capable to be implemented. In order to achieve it, an analysis method is proposed. The analysis method is based on conceptual methods of obtaining knowledge (knowledge acquisition) used in knowledge engineering. The conceptual model is performed using the Class Diagram (UML) as a graphical representation language. After that, apply the proposed method to a set of selected sources, in order to obtain the model. The conceptual model of the concept of security is expressed as a set of concepts and relationships among concepts. Based on the proposed model, an algebraic expression of the concept of security is drawn, and finally the model is implemented by means of a knowledge-based system using an ontology. Consequently, the study’s principal contributions are the development of a methodology of conceptual analysis and a definition of security along with its framework. The framework is expressed in algebraic manner also and is capable to be implemented using technologies such as Java, providing security metrics. The structure of the thesis is as following: In part 1, a theoretic approach to the study of security, paying attention to other disciplines not related to engineering. An historical approach of the study of the concept of security is made, having special attention to those concepts or models proposed by scholars in the field of security (not exclusively in the field of computer security). Part 2 explains the tools used to build the model. Modeling tools are used both conceptual and knowledge based ones. A method of analysis is constructed and used in the model design. In part 3 a generic model of security is proposed. The aim is to propose an integrative model that includes many of the existing securities. Additionally an algebraic formulation of the security model is made. Finally, part 4 is dedicated to apply the proposed model to a real scenario. This demonstrates that the model is operative and capable to measure the level of security.
APA, Harvard, Vancouver, ISO, and other styles
39

SILVA, Rayane Meneses da. "UMA ONTOLOGIA DE APLICAÇÃO PARA APOIO À TOMADA DE DECISÕES EM SITUAÇÕES DE AMEAÇA À SEGURANÇA DA INFORMAÇÃO." Universidade Federal do Maranhão, 2015. http://tedebc.ufma.br:8080/jspui/handle/tede/1885.

Full text
Abstract:
Submitted by Maria Aparecida (cidazen@gmail.com) on 2017-08-31T14:44:32Z No. of bitstreams: 1 Rayane.pdf: 4026589 bytes, checksum: 7e6066416420555456030ab6db3a1231 (MD5)
Made available in DSpace on 2017-08-31T14:44:32Z (GMT). No. of bitstreams: 1 Rayane.pdf: 4026589 bytes, checksum: 7e6066416420555456030ab6db3a1231 (MD5) Previous issue date: 2015-06-24
Many security mechanisms, such as Intrusion Detection Systems (IDSs) have been developed to approach the problem of information security attacks but most of them are traditional information systems in which their threats repositories are not represented semantically. Ontologies are knowledge representation structures that enable semantic processing of information and the construction of knowledge-based systems, which provide greater effectiveness compared to traditional systems. This paper proposes an application ontology called “Application Ontology for the Development of Case-based Intrusion Detection Systems” that formally represents the concepts related to information security domain of intrusion detection systems and “Case Based Reasoning”. The “Case Based Reasoning” is an approach for problem solving in which you can reuse the knowledge of past experiences to solve new problems. The evaluation of the ontology was performed by the development of an Intrusion Detection System that can detect attacks on computer networks and recommend solutions to these attacks. The ontology was specified using the “Ontology Web Language” and the Protégé ontology editor and. It was also mapped to a cases base in Prolog using the “Thea” tool. The results have shown that the developed Intrusion Detection System presented a good effectiveness in detecting attacks that the proposed ontology conceptualizes adequately the domain concepts and tasks.
Muitos mecanismos de segurança, como os Sistemas de Detecção de Intrusão têm sido desenvolvidos para abordar o problema de ataques à Segurança da Informação. Porém, a maioria deles são sistemas de informação tradicionais nos quais seus repositórios de ameaças não são representados semanticamente. As ontologias são estruturas de representação do conhecimento que permitem o processamento semântico das informações bem como a construção dos sistemas baseados em conhecimento, os quais fornecem uma maior efetividade em relação aos sistemas tradicionais. Neste trabalho propõe-se uma ontologia de aplicação denominada “Application Ontology for the Development of Case-based Intrusion Detection Systems” que representa formalmente os conceitos relacionados ao domínio de Segurança da Informação, dos sistemas de detecção de intrusão e do “Case-Based Reasoning”. O “Case-Based Reasoning” é uma abordagem para resolução de problemas nos quais é possível reutilizar conhecimentos de experiências passadas para resolver novos problemas. A avaliação da ontologia foi realizada por meio do desenvolvimento de um Sistema de Detecção de Intrusão que permite detectar ataques a redes de computadores e recomendar soluções a esses ataques. A ontologia foi especificada na linguagem “Ontology Web Language” utilizando o editor de ontologias Protegé e, logo após, mapeada a uma base de casos em Prolog utilizando o ferramenta “Thea”. Os resultados mostraram que o Sistema de Detecção de Intrusão desenvolvido apresentou boa efetividade na detecção de ataques e portanto, conclui-se que a ontologia proposta conceitualiza de forma adequada os conceitos de domínio e tarefa abordados.
APA, Harvard, Vancouver, ISO, and other styles
40

Venturini, Yeda Regina. "MOS - Modelo Ontológico de Segurança para negociação de política de controle de acesso em multidomínios." Universidade de São Paulo, 2006. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-19092006-165220/.

Full text
Abstract:
A evolução nas tecnologias de redes e o crescente número de dispositivos fixos e portáteis pertencentes a um usuário, os quais compartilham recursos entre si, introduziram novos conceitos e desafios na área de redes e segurança da informação. Esta nova realidade estimulou o desenvolvimento de um projeto para viabilizar a formação de domínios de segurança pessoais e permitir a associação segura entre estes domínios, formando um multidomínio. A formação de multidomínios introduziu novos desafios quanto à definição da política de segurança para o controle de acesso, pois é composto por ambientes administrativos distintos que precisam compartilhar seus recursos para a realização de trabalho colaborativo. Este trabalho apresenta os principais conceitos envolvidos na formação de domínio de segurança pessoal e multidomínios, e propõe um modelo de segurança para viabilizar a negociação e composição dinâmica da política de segurança para o controle de acesso nestes ambientes. O modelo proposto é chamado de Modelo Ontológico de Segurança (MOS). O MOS é um modelo de controle de acesso baseado em papéis, cujos elementos são definidos por ontologia. A ontologia define uma linguagem semântica comum e padronizada, viabilizando a interpretação da política pelos diferentes domínios. A negociação da política ocorre através da definição da política de importação e exportação de cada domínio. Estas políticas refletem as contribuições parciais de cada domínio para a formação da política do multidomínio. O uso de ontologia permite a composição dinâmica da política do multidomínio, assim como a verificação e resolução de conflitos de interesses, que refletem incompatibilidades entre as políticas de importação e exportação. O MOS foi validado através da análise de sua viabilidade de aplicação em multidomínios pessoais. A análise foi feita pela definição de um modelo concreto e pela simulação da negociação e composição da política de controle de acesso. Para simulação foi definido um multidomínio para projetos de pesquisa. Os resultados mostraram que o MOS permite a definição de um procedimento automatizável para criação da política de controle de acesso em multidomínios.
The evolution in the network technology and the growing number of portable and fixed devices belonging to a user, which shares resources, introduces new concepts and challenges in the network and information security area. This new reality has motivated the development of a project for personal security domain formation and security association between them, creating a multi-domain. The multi-domain formation introduces new challenges concerning the access control security policy, since multi-domains are composed by independent administrative domains that share resources for collaborative work. This work presents the main concept concerning the personal security domains and multi-domains, and proposes a security model to allow the dynamic security policy negotiation and composition for access control in multi-domain. The proposed model is called MOS, which is an ontological security model. The MOS is a role-based access control model, which elements are defined by an ontology. The ontology defines a semantic language, common and standardized, allowing the policy interpretation by different domains. The policy negotiation is made possible by the definition of the policy importation and exportation in each domain. These policies mean the partial contributions of each domain for the multi-domain policy formation. The use of ontology allows the dynamic multi-domain policy composition, as well as the verification and resolution of interest conflicts. These conflicts mean incompatibilities between the importation and exportation policy. The MOS was validated through the viability analysis for personal multi-domain application. The analysis was made through the definition of a factual model and the simulation of access control policy negotiation and composition. The simulation was taken place through the definition of a collaborative research projects multi-domain. The results demonstrate the MOS is feasible for implementation in automatic procedures for multi-domain access control policy creation.
APA, Harvard, Vancouver, ISO, and other styles
41

Rosa, Diórgenes Yuri Leal da. "EXEHDA-SO: uma abordagem ontológica para ciência de situação aplicada ao domínio de segurança da informação." Universidade Federal de Pelotas, 2017. http://repositorio.ufpel.edu.br:8080/handle/prefix/3841.

Full text
Abstract:
Submitted by Aline Batista (alinehb.ufpel@gmail.com) on 2018-04-18T15:04:36Z No. of bitstreams: 2 license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Dissertacao_Diorgenes_Yuri_Leal_da_Rosa.pdf: 3317198 bytes, checksum: ffad37e3b8f5606e8102f983c5628ac8 (MD5)
Approved for entry into archive by Aline Batista (alinehb.ufpel@gmail.com) on 2018-04-19T14:43:29Z (GMT) No. of bitstreams: 2 Dissertacao_Diorgenes_Yuri_Leal_da_Rosa.pdf: 3317198 bytes, checksum: ffad37e3b8f5606e8102f983c5628ac8 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2018-04-19T14:43:40Z (GMT). No. of bitstreams: 2 Dissertacao_Diorgenes_Yuri_Leal_da_Rosa.pdf: 3317198 bytes, checksum: ffad37e3b8f5606e8102f983c5628ac8 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-12-22
Sem bolsa
As infraestruturas computacionais modernas, típicas da Computação Ubíqua, pressupõem características de flexibilidade e de permissividade quanto a conectividade do ambiente. Estas características contribuíram ao longo dos últimos anos com a concretização da emergente Internet das Coisas, a qual estende a demanda de conectividade e, por conseguinte, eleva o tráfego em redes de computadores. Entretanto, os mesmos fatores que permitem estas evoluções também potencializam problemas no que diz respeito a Segurança da Informação. Recorrentemente são implantadas, em redes de computadores, soluções de Segurança da Informação para fins específicos, desenvolvidas em linguagens de sintaxe própria, provendo eventos em formatos também distintos. Estes fatores individualizam a análise destas soluções, o que acaba dificultando a identificação de incidentes. Neste sentido, a Ciência de Situação, enquanto estratégia capaz de integrar eventos de diferentes fontes, torna-se requisito fundamental para a implementação de controles de segurança, permitindo a flexibilidade típica da UbiComp. Considerando isto, a presente dissertação propõe uma abordagem ontológica para Ciência de Situação aplicada ao domínio de Segurança da Informação, denominada EXEHDA-SO (Execution Environment for Highly Distributed Applications - Security Ontology). Por meio de processamento de eventos heterogêneos, provenientes de diferentes fontes contextuais, busca-se uma contribuição a fase de compreensão de Ciência de Situação. O modelo EXEHDA-SO é apresentado em três fragmentos denominados Core, Scope e InterCell Analyzer. De forma a validar o modelo proposto foi desenvolvido um estudo de caso alusivo `a infraestrutura computacional da Universidade Federal de Pelotas. Nesta avaliação, considerando as características de heterogeneidade e distribuição do ambiente, foi possível observar as principais contribuições propostas nesta dissertação.
Modern computing infrastructures, typical of Ubiquitous Computing, assume characteristics of flexibility and permissiveness regarding the connectivity of the environment. These characteristics have contributed over the last few years to the emerging Internet of Things, which extends the demand for connectivity and therefore raises computer networks traffic. However, the same factors that allow these evolutions also potentiate problems with regard to Information Security. Information security solutions for specific purposes are developed in computer networks, developed in their own syntax languages, providing events in different formats. These factors individualize the analysis of these solutions, which brings difficulties to incidents identification. In this sense, Situational Science, as a strategy capable of integrating events from different sources, becomes a fundamental requirement for the security controls implementation, allowing the typical flexibility of UbiComp. Considering this, the present dissertation proposes an ontological approach to Situation Science applied to the Information Security domain, called EXEHDA-SO (Execution Environment for Highly Distributed Applications - Security Ontology). Through the processing of heterogeneous events, coming from different contextual sources, a contribution is made to the understanding phase of Situational Science. The EXEHDA-SO model is presented in three fragments called Core, Scope and InterCell Analyzer. In order to validate the proposed model a case study was developed allusive to Universidade Federal de Pelotas computational infrastructure. In this evaluation, considering the characteristics of heterogeneity and distribution of the environment, it was possible to observe the main contributions proposed in this dissertation.
APA, Harvard, Vancouver, ISO, and other styles
42

Leal, Gabriel Rodrigues. "Fundamentos filosóficos, políticos e educativos da polícia: da sensação de segurança à instituição policial." Pontifícia Universidade Católica de São Paulo, 2015. https://tede2.pucsp.br/handle/handle/9851.

Full text
Abstract:
Made available in DSpace on 2016-04-27T14:31:36Z (GMT). No. of bitstreams: 1 Gabriel Rodrigues Leal.pdf: 3004314 bytes, checksum: 75b9d11c996e62b959fcb5bd40d9b86a (MD5) Previous issue date: 2015-08-20
Conselho Nacional de Desenvolvimento Científico e Tecnológico
This work aims to support the police science analyzing, first, the affection "sense of security" through a structured ontology in triangulation between the "moral failure" in Pascal, the "science of affection" in Espinosa and the "instinct death "in Freud:" ontology of the abyss. " Given this initial ontoantropológica construction, held the book I will trace a brief genealogy of the police institution in Book II now accosted in stud procedure Nietzsche and documentary research on the history of security institutions, or rather, the security-military thinking , greatly Brazilian army. It is, in Book II, therefore, to follow the history of these institutions and their adherence or not to book ontology I. In Book III, in turn, began to investigate the police-military education and general lines an understanding of police-military educational process to give scope to the idea of a precise scientific object or set to public safety sciences, then described in Book IV. Therefore, a sequence of arguments juxtaposition we rely, first, in the ontology; later, in the institutional history of military thought followed by their educational practice scoped to the object "security," to bring in the book IV, an introductory proposal of "public safety sciences," trying to understand their epistemological foundations founded on epistemology Virtue Ernst Sosa (2013) and also moral, established and reading in orthopraxis military values. In short, it is investigating the possibility of understanding security, and its structural affection for the man, as an object of knowledge of police institutions with scientific status, which is founded first and foremost, the year of the first science, philosophy and its offer of elucidating the problem of evil cogent to man and consequently the whole social body, read, since the front pages through an analysis of Hobbes. It is based, in general, still, reading the police not only as reassuring institution and guarantee rights in democracy, insist as public policies, but also as the ultimate repository of cohesion and social peace through the systematic use of violence to "subject Hobbesian "to preserve order, the foundation of social coexistence possible
Este trabalho tem como objetivo fundamentar as ciências policiais analisando, primeiramente, o afeto sensação de segurança por meio de uma ontologia estruturada na triangulação entre a insuficiência moral em Pascal, a ciência dos afetos em Espinosa e a pulsão de morte em Freud: ontologia do abismo . Diante dessa inicial construção ontoantropológica, realizada no Livro I, traçaremos uma breve genealogia da instituição policial no Livro II, agora, acostados no procedimento genealógico de Nietzsche observado por Foucault em sede de normalização e biopolítica e em pesquisa documental acerca da história das instituições de segurança, ou melhor, do pensamento militar à segurança, sobremaneira do Exército brasileiro. Trata-se, no Livro II, portanto, de acompanhar a história dessas instituições e sua aderência, ou não, à ontologia do Livro I. No Livro III, por sua vez, começamos a investigar a educação policial-militar e as linhas gerais de uma compreensão de processo educativo policial-militar para dar escopo à ideia de um objeto científico preciso ou definido às ciências policiais, descritas então no Livro IV. Portanto, numa sequência de justaposição de argumentos baseamonos, primeiramente, na ontologia; posteriormente, na história institucional do pensamento militar seguido de sua prática educativa com escopo ao objeto segurança , para trazer, no Livro IV, uma proposta introdutória das ciências policiais , buscando compreender seus fundamentos epistemológicos fundados na epistemologia da virtude de Ernst Sosa (2013) e, também, morais, com sede de compreensão e leitura na ortopráxis dos valores militares. Em suma, trata-se de investigar a possibilidade de compreender a segurança, e seu afeto estrutural ao homem, como objeto de conhecimento das instituições policiais com status científico, e que se funda antes de mais nada, no exercício da ciência primeira, a filosofia, e sua oferta de elucidação ao problema do mal cogente ao homem e consequentemente a todo corpo social, lido, já nas primeiras páginas através de uma análise em Hobbes. Assenta-se, em caráter geral, ainda, na leitura das polícias não somente como instituição asseguradora e garantia de direitos na democracia, como insistem as políticas públicas, mas também como repositório último da coesão e paz social mediante o uso sistemático da violência ao sujeito hobbesiano para preservação da ordem, o fundamento da convivência social possível
APA, Harvard, Vancouver, ISO, and other styles
43

Chatzipanagiotou, Matthildi. "Practicing the law of human dignity." Doctoral thesis, Humboldt-Universität zu Berlin, Juristische Fakultät, 2016. http://dx.doi.org/10.18452/17459.

Full text
Abstract:
Die philosophischen Grundlagen der Meta-Dimension des Rechts auf Menschenwürde lösen eine Fragestellung aus, die die Grenzen der Disziplin des Rechts übertrifft: wie könnte das Transzendentale als ein Aspekt der Bedeutung von Menschenwürde dargestellt werden? Das Beharren auf der nicht-Bestimmung des Menschenbildes oder auf dem Begriff ‚Gott’ in der Präambel des Deutschen Grundgesetzes, wie es sich in der Deutschen Dogmatik widerspiegelt, gepaart mit dem Bestreben nach einer Fall-zu-Fall ad hoc Konkretisierung dessen, was Menschenwürde bedeutet, inspiriert diese Untersuchung von ‚etwas fehlt’ [‘something missing’]. In postmoderner Art und Weise beschreibt diese Geschichte das Gesetz der Menschenwürde als Trojanisches Pferd und bietet hermeneutische und literarische Grundlagen für eine affirmative Haltung gegenüber einer ''leeren'' Rede im juristischen Diskurs. Die Forschungsfrage erweckt und umkreist die polemisch verbrämten Begriffe von ‚Leere’ und ‚Black Box’: Warum erscheint der Rechtsbegriff der Menschenwürde ‚leer’? Oder wie ist er ‚leer’? Warum und wie ist er eine ‚Black Box’? Wie erscheinen Manifestationen des Konzepts abstrakt wie Universalien, aber im Einzelnen konkret? Die ontologischen, sprachlich-analytischen und phänomenologischen philosophischen Erkenntnisse, vorgestellt im ersten Kapitel, bilden die Linse, durch die fünf maßgebliche Fälle des Bundesverfassungsgerichtes – über Abtreibung, lebenslange Freiheitsstrafe, Transsexualität, staatliche Reaktion auf Terroranschläge und die Gewährleistung eines menschenwürdigen Existenzminimums – im zweiten Kapitel analysiert werden. Die philosophischen Quellen werden nicht als Momente im langen Verlauf der Menschenwürde in der Geschichte der Ideen eingeklammert.
The philosophical underpinnings of what may be called the meta-dimension of the law of human dignity trigger a question that surpasses the boundaries of the discipline of law: how could the transcendental as an aspect of human dignity meaning be portrayed? The insistence on non-determination of the Menschenbild [human image] or ‘God’ in the Preamble to the German Basic Law [Grundgesetz] reflected in German legal doctrine, paired with the commitment to case-by-case ad hoc concretization of what human dignity means inspire this story of ‘something missing’. In postmodern fashion, this story portrays the law of human dignity as a Trojan Horse and provides hermeneutic and literary foundations for an affirmative stance towards ‘emptiness’ talk in legal discourse. The research question rekindles and twists polemically framed ‘emptiness’ and ‘black box’ contentions: Why does the legal concept of human dignity appear ‘empty’? Or, how is it ‘empty’? Why and how is it a ‘black box’? How do manifestations of the concept appear abstract as universals and concrete as particulars? The ontological, linguistic-analytical, and phenomenological philosophical insights presented in Chapter One compose the lens through which five benchmark Bundesverfassungsgericht cases – on abortion, life imprisonment, transsexuals, state response to terrorist attacks, and the guarantee of a dignified subsistence minimum – are analyzed in Chapter Two. The philosophical sources are not bracketed as moments in the long course of human dignity in the history of ideas.
APA, Harvard, Vancouver, ISO, and other styles
44

Liang, Po Jui, and 梁珀瑞. "An Ontological Evaluation on Information Security Risk Modeling Languages." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/42410458411422020483.

Full text
Abstract:
碩士
長庚大學
資訊管理學系
100
Information system modeling languages can support the analysts to represent user requirements. Because information security has been taken seriously, information security modeling languages have been developed. This study is based on the Bunge-Wand-Weber (BWW) ontology to evaluate the extended i* modeling language. We propose some propositions as the results of applying the BWW ontology to analyze the extended i* language. The elements of the analyzed language are divided into two groups. One group called Fundamental Elements which represent the building block of the language. The other group called Advanced Elements the definition of which can be derived from an element in the Fundamental Elements. To reduce the subjectivity that our ontological analysis may produce, we conducted an investigation based on the Delphi method to the analysis results on the Fundamental Elements. The propositions we proposed are as below: (1)Resource is-a-kind-of Thing; (2)Task is-a-kind-of Process; (3)Actor is-a-kind-of Thing; (4)Goal is-a-kind-of Lawful State Space; (5)Actor is-a-kind-of System; (6)Softgoal is-a-kind-of Lawful State Space; (7)Vulnerability is-a-kind-of Lawful State Space; (8)Dependency is-a-kind-of Coupling; (9)Decomposition have no ontology mapping; (10)Means-end have no ontology mapping; (11)Contribution, Vulnerability Effect, Countermeasure and Exploit all have no ontology mapping; (12)Attacker, Malicious Task, Malicious Goal and Malicious Softgoal are all elements extended form Fundamental Elements. The study also proposes some suggestions to improve the extended i* modeling language. Because the scarcity of experts in i* and BWW available to this study, there is still a limitation in applying the propositions proposed in this study. Another limitation may arise when it comes to the validity of Advanced Elements because they are not validated as their counterparts in a Delphi survey.
APA, Harvard, Vancouver, ISO, and other styles
45

WU, JUI-JHE, and 吳睿哲. "Influence of Ontological Security and Reflective Learning on Personal Career Development." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/92f6gt.

Full text
Abstract:
碩士
國立暨南國際大學
諮商心理與人力資源發展學系終身學習與人力資源發展研究所
105
This research is trying to understand what factors infect on everyone’s ontological security and how ontological security infect everyone’s reflective learning, giving themselves special life-meaning, Also referencing to career development mode to understand what kinds of career mission in each Chi Wei Wang’s career development stage. And provide advice on the development of a person's career or the planning of a career development program. The results are summarized as follows: First, people use professional knowledge and skill, family, personal experience correct their self-identity consistently, and obtain the living-environment of trust. The dependence of important people and support can help individual turning a stumbling block into a stepping stone smoothly when they face the accident. Furthermore, when people find that their new method could solve problem, they will enhance strong confident and build a concrete self-identity. Also, more economic or social resource people can use, more efficient reduce the damage and stress produced by impact. It also give strength to people reflecting themselves and making difference. Second, reflexive learning can enhance one’s ontological security, on the contrary, ontological security also induce people process reflexive learning when they encounter impact. Third, of course, important other is people establishing their self-identity and ontological security strongly. However, it also could interfere self-identity and ontological security. It depends on people’s communicating and realizing. Finally, based on the above finding, this research is aimed to providing suggestion to who feel hesitate to career development, interested for career development and future related researcher.
APA, Harvard, Vancouver, ISO, and other styles
46

Baratov, Shuhrat. "Hero-making as ontological security practice: Tajikistan's identity politics and relations with Uzbekistan." Phd thesis, 2017. http://hdl.handle.net/1885/133760.

Full text
Abstract:
Remembering national heroes is one of the most important aspects of the politics of national identity. Due to their exemplary lives and deeds, the national heroes get portrayed as the role models for the nation. How do states choose the heroes? What are the ‘selection criteria’? What is the role of commemorating the heroes in defining the relations between the national ‘self’ and ‘other’? Using the case of the ‘Heroes of Tajikistan’ and this nation’s problematic relations with neighbouring Uzbekistan, this thesis attempts to find the answers to these questions. In doing so, it relies on the poststructuralist theories of IR. The study reveals that the discursive construction of the national ‘self’ and ‘other’ through commemorating the ‘Heroes of Tajikistan’ is a correlative of Uzbekistan’s threatening behaviour in relations with Tajikistan. In other words, remembering the heroes in particular, and the identity politics in general, are not the simple matters of domestic affairs, but rather can be the crucial factors in studying international relations. As this research revealed, the national identity discourses in Tajikistan honour the ‘Heroes’ for their leadership in achieving national independence from Uzbekistan in the 1920s (Makhsum and Shotemur), and defending the Tajik language and literary traditions from the discriminatory attitude of the Uzbek nationalists in the late 1920s (Aini),as well as writing the history of Tajiks throughout the Soviet period in a way that represents Tajiks as the indigenous people of Central Asia and Uzbeks as the occupants (Ghafurov). Uzbekistan’s interference in the Tajik civil war (1992-1997) and its hostile position towards the construction of the Roghun hydroelectric power station in Tajikistan (since 2004) triggered the negative memories about the traditional Uzbek ‘other.’ At the same due to the predominance of the narratives about the traditionally negative image of Uzbeks, the behaviour of Uzbekistan in the post-Soviet period appears as a self-fulfilling prophecy. In the light of ever-growing Tajik-Uzbek tension, literary, academic and journalistic discourses in Tajikistan portray the President of Tajikistan Emomali Rahmon, another officially recognised ‘Hero of Tajikistan’, as continuing the struggle of the past heroes against Uzbeks.
APA, Harvard, Vancouver, ISO, and other styles
47

Banham, RT. "Seeing the forest for the trees : ontological security and experiences of Tasmanian forests." Thesis, 2019. https://eprints.utas.edu.au/31414/1/Banham_whole_thesis.pdf.

Full text
Abstract:
This thesis explores Tasmanians’ experiences of forests. Tasmania has been socially and environmentally shaped by decades of conflict popularly and provocatively termed the ‘forestry wars’. In this context, I examine the link between human-forest engagements and ‘ontological security’ – a sense of familiarity and trust in the world and the self. In critiquing and remodelling Giddens’ conceptualisation of ontological security, I argue that forests do important emotional and existential ‘work’ for people. For most participants, the state’s forests symbolised ontological and emotional aspects of ontological security. Environmental sociology literature often adopts macro-level, realist, and/or quantitative frameworks which privilege themes of self-interest, rationality, or ‘quantifiable’ experiences of the nonhuman environment. The existing literature regarding Tasmanians’ experiences with/in forests is dominated by political, discursive, and historical perspectives which heavily emphasise the construction of environmental conflict. Sociological approaches to this Tasmanian case study are absent. In contrast to these bodies of literature, I explore human-forest engagements through under-examined themes of vulnerability, ontology, emotion, and relationship. I conducted semi-structured interviews with 27 Tasmanians across the state. Eleven participants also contributed materials that they felt represented Tasmanian forests, including photographs, lyrics, and written pieces. Almost all participants were critical and distrustful of Tasmanian forestry politics, management, and practices, expressed concerns about local and global environmental issues, and associated forest experiences with processes of wellbeing, immersion, self-identity, and ontology. Yet participants also expressed ambivalent attitudes about Tasmania’s forestry industry. These key findings indicate that Tasmanians’ engagements with/in forests are complex, emotionally significant, and are bound up in experiences of identity, ontology, and vulnerability. These data illustrate Tasmanian forests as symbolic of six key aspects of ontological security: material constancy; routine and ritual; escape and refuge; self-narrative; the nonhuman; and the future. Through these operationalised points, I argue that participants’ understandings and experiences of Tasmanian forests reflect the construction and experience of ontological security. This thesis contributes a unique micro-sociological approach to understanding human-forest engagements in Tasmania, and in doing so, undermines the polarising and alienating rhetoric of ‘Tasmania’s forestry wars’. This research also contributes a reworked model of ontological security, demonstrating the utility of the concept for qualitative research in environmental sociology.
APA, Harvard, Vancouver, ISO, and other styles
48

Sullivan, Paul W., and Parveen Akhtar. "The effect of territorial stigmatisation processes on ontological security: A case-study of Bradford politics." 2018. http://hdl.handle.net/10454/16662.

Full text
Abstract:
Yes
We investigate the effect of territorial stigmatisation on ontological security through a qualitative case-study of Bradford politics during the 2015 General Election. Territorial stigmatisation and ontological security are important constructs in political geography but there is relatively little research on how territorial stigmatisation effects ontological security in everyday lived experience – in this case, the lived experience of political contests. We conducted thirty in-depth interviews, generated three themes and present and analyse these three themes in the form of three ‘created dialogues’ as outlined by Sullivan (2012), with a smaller sample of ten out of thirty of our participants. Drawing on Bakhtin’s (1981) concept of ‘chronotope’ we identity three key effects of territorial stigmatisation on ontological security: i) A negative reputation of ‘parallel societies’ has the potential to create double meanings for the inhabitants of that society; ii) Local reputation enhances ontological security through linking particular places to particular personalities but potentially decreases ontological security for a district as a whole; iii) Everyday lived experiences sometimes acquire charged emotional symbolic significance, which could encourage the reflexive side of ontological security. Our findings went through a positive member-checking process with five of the participants.
Research Development Fund Publication Prize Award winner, October 2018.
APA, Harvard, Vancouver, ISO, and other styles
49

Chen, Yi-Ru, and 陳怡汝. "A study on influence of ontological security on reflective learning of primary caregivers of rare disorders." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/83221725686458435535.

Full text
Abstract:
碩士
國立暨南國際大學
成人與繼續教育研究所
97
The purpose of this study rare diseases through the primary caregivers of narrative to understand the impact of its sense of ontological security related factors, and ontological security for all types of learning to take care strategy, given its own special meaning of life on the impact of reflexive learning, and the provision of adult education the field of rare diseases for caregivers to reflexive learning on the recommendations of the study program planning. The results are summarized as follows: Firstly, the rare diseases primary caregivers from the medical knowledge, religious tradition, experience and personal reflection to take care of the amendment between the past self-awareness, and gain the trust of the community a sense of the world. Furthermore, it is important to rely on others to support and contribute to the individual in the event of " fatefulness" the incident, smoothly into the sound development of the impact. In addition, when primary caregivers can find themselves competent to take care of work and to other members of homogeneous groups help, allow them to re-establish their own value, access to self-identity. Finally, the family's economic security and material support to the higher impact of rare diseases with less pressure, and primary caregivers can have the spare capacity to think and plan of life, so that their own better. Secondly, reflective learning can enhance the ontological security of primary caregivers of rare diseases, however, for too substantial ontological security, it might be the obstacles of reflective learning of primary caregivers of rare diseases. Thirdly, through the continuing process of reflection, ontological security of primary caregivers of rare diseases, it makes them willing to try different challenges from the past and obtain the distinctive perspectives. When the primary caregivers survive from the crisis of great shock with these new ideas and methods, they establish more positive self-identity and firm their ontological security more as well. Besides, they construct their self-identity continually with the process of interaction of outside world and then proceed to enhance ontological security to re-establish their life meaning. Finally, based on the above findings, this study is aimed at providing suggestions from primary caregivers of rare diseases, related practical workers (related patient groups and adult educationists) and future related researches as well.
APA, Harvard, Vancouver, ISO, and other styles
50

Hutchinson, HE. "My heart is in two places: ontological security, emotions and the health of African refugee women in Tasmania." Thesis, 2010. https://eprints.utas.edu.au/17681/2/hutchison_thesis.pdf.

Full text
Abstract:
For historical reasons the Australian health system has been linked to immigration since the time of the first settlement and has retained its control of immigration health and its influence on settlement policy. Health professionals interpret emotional distress as a mental disorder, so that health provisions for refugees, who are perceived by Australian health professionals as necessarily suffering from traumatic experiences as a result of war, torture and terror, have focussed on mental health. While the health system has addressed many cultural issues considered by Western health authorities to have an effect on the health of refugee women such as problems of access, of communication, and the perceived insensitivity of health staff to cultural values and practices, other differences should also be taken into consideration. This research project uses a unique combination of qualitative research methods to trace the impact of forced separation from family members remaining in Africa on the health of refugee women from Sudan, Ethiopia and Sierra Leone. In contrast to other studies of transnational families, refugee families are identified as "stretched" in Massey's (1994) sense of retaining close relationships over distance, and also "stretched" in terms of the emotional strain of caring for family members who are in constant danger. "Stretched" also applies to the economic burdens which must be met to comply with family obligations and the requirements of the immigration and health systems before family members can be re-united with those in Australia. Participants in this research, who are often described by researchers as victims, and without agency, react to forced separation from their families by implementing strategies to bring their family members to Australia. Employment is a priority because they must also support their family members in another country, save money for sponsorship, medicals and transport, as well as support themselves in Australia. In order to find work they have to overcome barriers which include learning a foreign language, undergoing work training and gaining work experience. The emotional stress which results from the passage of time, the search for employment, the uncertainties of the family reunion process, and the availability of modern technologies, which connect refugees to the lives of their family members on a daily basis, have embodied consequences for participants in the research. Western health systems interpret emotional pain as either of physical or mental origin, and apply appropriate medical treatments. However the embodied emotional pain experienced by the participants in this study is directly related to the circumstances of family separation and is only relieved when their family members are safe in Australia. Emotions are culturally created to respond to cultural values. Ontological insecurity is experienced as a result of ongoing social, emotional and physical stress due to unmet expectations. The body suffers from the stress created by the emotional determinants of health. Emotion, ontological insecurity and embodied health are connected through culture and social structure. Social ills require social healing.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography