368 research outputs found

    Comparing the production of a formula with the development of L2 competence

    Get PDF
    This pilot study investigates the production of a formula with the development of L2 competence over proficiency levels of a spoken learner corpus. The results show that the formula in beginner production data is likely being recalled holistically from learners’ phonological memory rather than generated online, identifiable by virtue of its fluent production in absence of any other surface structure evidence of the formula’s syntactic properties. As learners’ L2 competence increases, the formula becomes sensitive to modifications which show structural conformity at each proficiency level. The transparency between the formula’s modification and learners’ corresponding L2 surface structure realisations suggest that it is the independent development of L2 competence which integrates the formula into compositional language, and ultimately drives the SLA process forward

    Security considerations in the open source software ecosystem

    Get PDF
    Open source software plays an important role in the software supply chain, allowing stakeholders to utilize open source components as building blocks in their software, tooling, and infrastructure. But relying on the open source ecosystem introduces unique challenges, both in terms of security and trust, as well as in terms of supply chain reliability. In this dissertation, I investigate approaches, considerations, and encountered challenges of stakeholders in the context of security, privacy, and trustworthiness of the open source software supply chain. Overall, my research aims to empower and support software experts with the knowledge and resources necessary to achieve a more secure and trustworthy open source software ecosystem. In the first part of this dissertation, I describe a research study investigating the security and trust practices in open source projects by interviewing 27 owners, maintainers, and contributors from a diverse set of projects to explore their behind-the-scenes processes, guidance and policies, incident handling, and encountered challenges, finding that participants’ projects are highly diverse in terms of their deployed security measures and trust processes, as well as their underlying motivations. More on the consumer side of the open source software supply chain, I investigated the use of open source components in industry projects by interviewing 25 software developers, architects, and engineers to understand their projects’ processes, decisions, and considerations in the context of external open source code, finding that open source components play an important role in many of the industry projects, and that most projects have some form of company policy or best practice for including external code. On the side of end-user focused software, I present a study investigating the use of software obfuscation in Android applications, which is a recommended practice to protect against plagiarism and repackaging. The study leveraged a multi-pronged approach including a large-scale measurement, a developer survey, and a programming experiment, finding that only 24.92% of apps are obfuscated by their developer, that developers do not fear theft of their own apps, and have difficulties obfuscating their own apps. Lastly, to involve end users themselves, I describe a survey with 200 users of cloud office suites to investigate their security and privacy perceptions and expectations, with findings suggesting that users are generally aware of basic security implications, but lack technical knowledge for envisioning some threat models. The key findings of this dissertation include that open source projects have highly diverse security measures, trust processes, and underlying motivations. That the projects’ security and trust needs are likely best met in ways that consider their individual strengths, limitations, and project stage, especially for smaller projects with limited access to resources. That open source components play an important role in industry projects, and that those projects often have some form of company policy or best practice for including external code, but developers wish for more resources to better audit included components. This dissertation emphasizes the importance of collaboration and shared responsibility in building and maintaining the open source software ecosystem, with developers, maintainers, end users, researchers, and other stakeholders alike ensuring that the ecosystem remains a secure, trustworthy, and healthy resource for everyone to rely on

    Contemporary constructions of 'sex offenders': Implications for the governance of known perpetrators living in the NSW community

    Full text link
    This thesis examines how the problematisation of sexual offending and contemporary constructions of ‘sex offenders’ have impacted on the emergence of technologies to govern known perpetrators living in the NSW community. Mechanisms include a sex offender register; extended supervision and continuing detention orders; restrictions on residency, movement and association; and intrusive surveillance. By means of a genealogical analysis, and a multi-method research design, it examines the incidents, actors, claims and rationalities that have influenced the emergence of an extensive and exceptional post-sentence governance regime aimed at community protection. It draws on the perceptions of 21 stakeholders (including psychiatrists, psychologists, lawyers, and volunteers who work with sex offenders) about the introduction, operation and impacts of the contemporary NSW post-sentence governance framework. It analyses participants’ views about monitoring and supervision of offenders, as well as the provision of treatment, support, and assistance to them. This thesis demonstrates that in NSW exclusionary, incapacitating crime control measures have been pursued with the aim of preventing sexual (re)offending, and that more inclusive, capacity-building mechanisms have been marginalised. This has occurred despite a lack of evidence that measures which rely on strictly enforced external controls reduce recidivism and mounting evidence that such approaches act as barriers to reintegration and desistance. This thesis finds the emergence of contemporary approaches has been influenced by a lack of understanding of the empirical realities of sexual offending; extremely negative (mis)perceptions about perpetrators; and the particular way that risk has been conceptualised in relation to sexual (re)offending. While tools to assess and manage the risks posed by sex offenders are imbued with an actuarial, impersonal and seemingly objective logic; risk assessment and management has also been underpinned by highly emotional and moralising discourse and perennial panic. These factors have rendered sex offenders exceptionally high-risk, both deserving and in need of exceptional governance measures. This thesis suggests that shifts in the NSW governance framework to reduce sexual (re)offending and enhance community safety are possible. However, this will require enhanced understanding and education about the realities of sexual offending and the factors that support desistance, and a reconfiguration of the extant risk-paradigm

    24th Nordic Conference on Computational Linguistics (NoDaLiDa)

    Get PDF

    Jornadas Nacionales de Investigación en Ciberseguridad: actas de las VIII Jornadas Nacionales de Investigación en ciberseguridad: Vigo, 21 a 23 de junio de 2023

    Get PDF
    Jornadas Nacionales de Investigación en Ciberseguridad (8ª. 2023. Vigo)atlanTTicAMTEGA: Axencia para a modernización tecnolóxica de GaliciaINCIBE: Instituto Nacional de Cibersegurida

    Digital writing technologies in higher education : theory, research, and practice

    Get PDF
    This open access book serves as a comprehensive guide to digital writing technology, featuring contributions from over 20 renowned researchers from various disciplines around the world. The book is designed to provide a state-of-the-art synthesis of the developments in digital writing in higher education, making it an essential resource for anyone interested in this rapidly evolving field. In the first part of the book, the authors offer an overview of the impact that digitalization has had on writing, covering more than 25 key technological innovations and their implications for writing practices and pedagogical uses. Drawing on these chapters, the second part of the book explores the theoretical underpinnings of digital writing technology such as writing and learning, writing quality, formulation support, writing and thinking, and writing processes. The authors provide insightful analysis on the impact of these developments and offer valuable insights into the future of writing. Overall, this book provides a cohesive and consistent theoretical view of the new realities of digital writing, complementing existing literature on the digitalization of writing. It is an essential resource for scholars, educators, and practitioners interested in the intersection of technology and writing

    Tourism and the emergence of nation-states in the Arab Eastern Mediterranean, 1920s-1930s

    Get PDF
    In the aftermath of World War I, the beaten paths of tourism guided an increasing number of international tourists to the hinterlands of the Arab Eastern Mediterranean, where they would admire pyramids and Roman ruins. Yet they were not the only visitors: Arab nationalists gathered in summer resorts, and Yishuvi skiing clubs practised on Lebanese mountain slopes. By catering to these travellers, local tour guides and advocates of tourism development pursued their agendas

    Negotiating Software: Redistributing Control at Work and on the Web

    Get PDF
    Since the 1970s, digital technologies increasingly determine who gets what, when, and how; and the workings of informational capitalism have concentrated control over those technologies into the hands of just a few private corporations. The normative stance of this dissertation is that control over software should be distributed and subject to processes of negotiation: consensus-based decision making oriented towards achieving collective benefits. It explores the boundaries of negotiating software by trying to effect a change in two different kinds of software using two different approaches. The first approach targets application software – the paradigmatic model of commodified, turn-key computational media – in the context of knowledge work – labour that involves the creation and distribution of information through non-routine, creative, and abstract thinking. It tries to effect change by developing negotiable software as an alternative to the autocratic application model, which is software that embeds the support for distributed control in and over its design. These systems successfully demonstrate the technological feasibility of this approach, but also the limitations of design as a solution to systemic power asymmetries. The second approach targets consent management platforms – pop-up interfaces on the web that capture visitor’s consent for data processing – in the context of the European Union’s data protection regulation. It tries to effect change by employing negotiation software, which is software that supports existing processes of negotiation in complex systems, i.e., regulatory oversight and the exercise of digital rights. This approach resulted in a considerable increase in data protection compliance on Danish websites, but showed that sustainable enforcement using digital tools also requires design changes to data processing technologies. Both approaches to effecting software change – making software negotiable and using software in negotiations – revealed the drawbacks of individualistic strategies. Ultimately, the capacity of the liberal subject to stand up against corporate power is limited, and more collective approaches to software negotiation need to be developed, whether when making changes to designs or leveraging regulation
    corecore